Category Archives: Counter-Intelligence

Ramola D Reports/Report #72: Part 6–Barbara Hartwell, CIA Whistleblower: Corruption, Criminality, & Cover-Ups in the FBI & CIA

–Ramola D/Posted 6/30/2018

Preface: Massive Cyber Hacking, Sabotage, and Human-Rights-Violative DEW Targeting in Quincy, Massachusetts, USA

I’d like to preface this post describing Part 6 of my ongoing podcast conversation series with Barbara Hartwell, CIA whistleblower, with some information.

BHPart6Cover.png

While many know that I am severely cyber-hacked and cyber-attacked on a continuous basis as I continue my writing and podcasting with absolute resolve, determined to get the true stories of the targeted and uber-surveilled and EMF-weapon-assaulted and neuro-weapon-attacked out there, so everyone can see and hear exactly what this incredibly lawless, barbaric, and inhumane Deeply Lawless State is doing, in the USA and UK and Europe, to its own citizens, in flagrant violation of all rights and laws of human decency, civility, and society—in addition to international human rights treaties and conventions–I have to note that my podcasts with Barbara Hartwell in particular, like my first podcast with Geral Sosbee, FBI whistleblower, and like my podcasts with Jeffrey Godwin, UK documentarian, activist, filmmaker, and with Dr. Eric Karlstrom, erudite and outspoken 9/11/Agenda 21/Current Power Structure researcher, have been especially severely attacked.

This is evident in the frequent interruptions on our podcasts whether I am using Zoom or GotoMeeting, in tampering with my settings on these applications, in cutting off of our meetings midway, sometimes frequently during the podcast, in introducing disruptive sound into my recordings including echoes, in disrupting the audio and video feed, in tampering with my camera settings, and in simply freezing my computer for days on end while I try to finalize and post the podcast.

This particular podcast was twice sabotaged; the recording I made on my desktop was mysteriously tampered with so as to make the file unusable: periodic static and knocks had been placed on the recording throughout. The recording on the server had had its settings switched and could not be downloaded for days. Both my computers were cyber-frozen as I tried to download the file. I spent two days with remote technical support to fix a variety of issues that had suddenly cropped up on my laptop including browsers crashing and files not opening. Then a few more days after opening the file while my pc was being frozen.

During this time of course, I was also blasted with microwaves on a continuous basis as I sat with my laptop; my chair, couch or bed vibrating with cluster ELFs, military radar flickering on my nerves, remote EEGs periodically grazing my skull (yes Virginia, I am speaking about covert, undisclosed, but highly evident-to-all-targeted remote neurotechnology, being used illegally and criminally on Americans), with the usual loony cars zooming up and down my street running their trying-to-track-and-hit DEW operations, courtesy General Dynamics Directed Energy Bio Behavioral Research field-testing-of-directed-energy-weapons contracts, Quincy city government, and the local fusion center (which is headed by Massachusetts State Police)—who have all turned a blind eye when I reported this criminal non-stop zooming activity on my street to the local DHS, via FOIA request, and asked for information. (That’s a story in itself, and I aim to be a lot more outspoken about this shortly: DHS is most definitely NOT keeping the homeland secure, it is keeping the homeland terrorized.)

In addition, small planes, large planes, helicopters crossing this block at an angle on all sides as well as flying directly over my home, extremely loud weed-trimmers and lawn-mowers, neighboring construction workers embarked on a continuous program of extremely-loud noise barrage. Again, courtesy Quincy City Government, with Mayor Thomas Koch at the helm. This is Lawless America, and local governments have completely keeled over to Military Industrial Intelligence Complex criminality, and are partaking in it. Neighbors are all bought-in via the FBI/FMJ criminality Geral Sosbee describes, and permit the carnage. They are of course, also partaking in the criminality, by so permitting—and acquiescently engaging in noise-harassment themselves. And, although I have no sympathy for their choices to permit this unlawful activity of zoomers on the street, as well as EMF weapon use on my person, all no doubt presented deceptively to them by the lying FBI/DHS as perfectly legitimate and “electronic surveillance” and part of “an ongoing investigation” (now going on for 4 years) of this writer, it is clear they have been railroaded into subservience, in other words: terrorized, lied to, co-opted.

I will also note that several houses in my neighborhood have been taken over by groups of young, transient Special Ops worker-bees on the ground for the Rothschild Mafia (and CIA/DIA/NSA black ops) operating through the FBI/DHS/DOD running both DEW operations and cyber-hacking operations really close, from just next-door. Immediate neighbors have been especially co-opted, it is clear to see, and are partaking more closely in these operations, in avid collusion with the zooming thugs who frequently park in their doorways and pop into their parlors, the easier to run their little RFID scanners, Magnetic Squids harvesting brainwaves, and through-wall radar, not to mention heat-producing Active Denial Systems to burn spines, faces, and sleep-deprive with.

We are living in KGB, Stasi, Nazi Amerika—this is how DEWs are being tested and operated on the populace, and how Americans are being lied to, duped, co-opted as they blindly support this Communism and DEW Barbarism that has invaded our communities, and do not spare a thought for the gigantic corruption and criminality—bolstered by child-trafficking, Satanism, and child-sacrifice at its core—they are actually supporting. (Because yes, the FBI/CIA/DHS operation on the ground in the USA is most definitely focusing on attacking those in communities who are not and cannot be servile pushovers for the Globalist Communist Satanist Zionist agenda AKA the New World Order AKA Agenda 21, Agenda 2030 AKA the Green UN Agenda; the first step in an intended full-on takeover of the entire World, and what they are protecting is full-on criminality, Satanism, child-trafficking, drug-trafficking, ritual abuse of one and all, dirty ops in military underground bases, and human sacrifice: your neighbors and mine should know the truth of this.)

Why Are My Podcasts With Barbara Hartwell Being So Extremely Sabotaged?

I recently put out a Call for Support of these podcasts with Barbara Hartwell, and I thank all those who sent in donations; I have sent on your donations via money-order to Barbara, I know she is grateful. Truly, she is in dire straits as the CIA has pushed her into financial destitution, and she absolutely needs our humane support.

After this experience of extreme sabotage of our latest podcast, I have been reflecting a bit on why exactly these podcasts are being attacked so extremely—I am being given every indication by the CIA and FBI (operating as goondas in my neighborhood, with both SUVs/cars and helicopters/planes at their disposal) that they are literally having panic attacks at my podcasting efforts here.

I think the answer is here: Barbara Hartwell is a woman whistleblower of absolute uprightness, conscientiousness, integrity, conscience, high-intelligence, and spine who has a powerful voice both as a writer/journalist and a public speaker, a strong anchoring in her Christian faith, and, like other brilliant Americans being nastily targeted by the Crime Cartel inside the FBI/CIA/DHS/DOD, has great spiritual and energetic power to influence, plus of course, she is an insider with an up-front attitude about her problems with the CIA, nasty agency par excellence: she is telling the truth, reporting on her own experiences, whistleblowing about actual criminal activity in the CIA/FBI, and even more importantly, she is laying bare the skin and bones of the deep-dish pie the CIA and FBI build in their layered Containment Ops, Controlled Opposition Ops, Black Propaganda Ops, Public Hypnosis Ops, Psychological Warfare Ops, Information Warfare Ops, Media Miasma Ops, you name it, as they jump through hoops desperately trying to contain the information on the Internet and protect their nodes of info-dissemination, in other words, their precious little media cutouts who stand like bastions and guardians of the InfoGate, pumping out Disinfo nonstop and keeping their nasty & not-so-little arms/drugs/human/child trafficking operations well-hidden under the Lying Umbrellas of Counter-Intelligence and Counter-Terrorism.

And Barbara Hartwell is naming names and tearing down the veils, pointing to the cutouts and pointing to the carnage with absolute, unabashed splendor, her instinct for truth unflinching, her voice brilliantly scathing: that is what they are freaking out about. Just look up her name on the Web and marvel at the incredible hatchet job done on her name; Barbara Hartwell has become the subject of a massive slander and defamation campaign stretching across Decades, which seeks to paint her as a liar and Disinfo agent, a CIA agent who destroys lives—when it is this precise species which has attacked her consistently and destroyed her own life.

The fact is, Barbara Hartwell is being slandered because what she is laying bare points to very subtle and nuanced Media and Public Mind Takeover via layered operations which include Mythologizing certain people—like famous Special Agent and top FBI man Ted Gunderson, who turns out to have been a CIA Spook—and Propping Up certain people in the Alt Media space as pillars of integrity—such as Ken Adichi and Don Stacey—also CIA plants–both of whom Barbara talks about in recent podcasts as well as this one, Part 6.

I recognize that as an interviewer and writer myself, I need to explore these characters a little deeper myself, to fully understand what exactly is going on in this mad mad world of CIA Disinformation, non-stop Spookdom, and extreme slander. I have come to know—as I think many viewers too have come to know—Barbara Hartwell pretty well recently through these podcasts, and also through exploring her website. I’ve learned for one that we are sister spirits, we are alike in our interest in learning the truth, in speaking our minds, in writing our thoughts—no holds barred. I am appalled at how she has been treated by the CIA after she left. I am both horrified and very surprised at the slander operations directed against her. And I am keen to get to the bottom of this and to learn and write more about the people she speaks about as well as the operations she points to. What for instance is the real truth about Edgar Hoover Right-Hand Man Ted Gunderson?

On this note, I thank investigative journalists Sherri Kane and Len Horowitz for their work in addressing these very subjects. I hope to highlight their work here as I go forward, and I will write more on these subjects myself as I learn the truth for certain. I also recommend to one and all these six podcasts Barbara Hartwell has graciously done with me: they truly help in reviving these old and prematurely-buried-by-slander stories, laying bare the current scenario regarding Psy Ops and Info Warfare being waged on all of us, and in returning to the world the very necessary and essential voice of Barbara Hartwell.

Corruption, Criminality, and Cover-Ups in the FBI and CIA

In this continuation of our earlier conversation on the practices of extreme and abusive retaliation against whistleblowers practiced by the FBI and CIA, as experienced in particular by CIA whistleblower Barbara Hartwell and FBI whistleblower Geral Sosbee and involving the “Black Propaganda” methods of character assassination, slander, defamation, and libel, Barbara expands further on these subjects.

Calling on her own experience of retaliation as well as Geral Sosbee’s in being so hounded and persecuted by the FBI and CIA over the years as to be prevented from finding a place to rent or living a normal life free of stalking, harassment, financial takedown, blacklisting, and poverty, Barbara Hartwell also mentions the cases of Jeffrey Sterling, still in prison after two years, and Kevin Shipp, whose home and family were targeted.

Bringing the situation to the present day, we discuss the identical targeting now being meted out to hundreds of thousands of (outstanding, high-IQ, high-integrity, highly accomplished, morally upright, conscientious, patriotic, critically-thinking, absolutely innocent) American citizens who have been placed not merely wrongfully but criminally by the FBI and local fusion centers on watchlists and terrorist lists, named glibly by the corrupt FBI as terrorists, extremists, potential terrorists, and other such Patriot Act confections, character-defamed in fabricated diagnoses as mentally unstable to their neighbors and communities, ostracized, surveilled, and then trafficked into military Electromagnetic weapons-testing and neuro-experimentation contracts, under which they are now all reporting physical torture and extreme bodily, psychological, and daily-life abuse—all for being awakened people who care enough about their country and community to speak out and take action against corruption or environmental damage or animal cruelty.

What this points to clearly is a complete failure of government and a complete failure of American communities both, where people have forgotten their innate rights or just hand them over freely to the corrupt State who comes knocking on their doors to “inform” them or “question” them and then co-opt them regarding their neighbor, who has been, Nazi-style, “put under investigation” for any number of fabricated reasons and always for an indefinite number of years. We have rights, notes Barbara, that are God-given and inherent, that should not be handed off when the FBI comes knocking.

She also notes the methodology being followed today is classic counterintelligence protocol, yet it is not legitimate counterintelligence, since the people being COINTELPRO’d are ordinary citizens with no links to espionage or terrorism. Further, she notes that those Americans who refuse to exercise their rights but cower in fear when the JTTF or FBI or other members of the bullying Police State approach with their slather of lies about a neighbor, and willingly comply with the surveilling and harassment instructions they are given, are indoctrinated to view the FBI as morally upright defenders of the Constitution when the opposite is true; these agencies (FBI, CIA) have currently become “lapdogs” to the Clintons and globalists who care nothing for the USA but seek centralized power through a One-World government. “The Government currently is essentially comprised of criminals.”

As always, Barbara illustrates the methodologies of containment, slander, persecution, and desperation practiced by the FBI and CIA with vivid stories from her own experience of being pursued and harassed by cut-outs and agents such as Tim White who harassed others including Geral Sosbee, and Don Stacey, and from her analyses of others’ experiences, including Constitutionalist Rick Stanley. As on her website, Barbara notes the importance of naming the names of the persecutors; we are in a war, she says, and we are fighting for our lives. Whistleblowers and targets know this. The path forward to justice is exposure, naming names, recovering your rights, and speaking out to combat the criminality.

Please support these ongoing conversations which bring alive in the current day the very important voice of a CIA woman whistleblower whose testimonial and insights are vital to the understanding of the Deeply Lawless State.

Please visit Barbara Hartwell’s website at http://barbarahartwellvscia.blogspot.com/ for more information.

My call for support of this series with links for donations is here: https://everydayconcerned.net/2018/06/21/call-for-support-please-support-my-ongoing-video-conversation-series-with-cia-whistleblower-barbara-hartwell/

Ramola D Reports can be supported on an ongoing basis via Patreon: https://www.patreon.com/RamolaD

I ask all reading to please share this page widely. If you appreciate my candor, my voice, and my work, please support my journalism with a regular subscription at Patreon (link above) or via Paypal here (link to the top right). Patreon subscription starts as low as $3 per month; I’d appreciate $15 per month. Tech support is a large part of what I absolutely need funding for; I truly appreciate all subscriptions. With your help, I will keep writing and podcasting and belting out the truth. For donations to Barbara Hartwell via my links, just write me a note mentioning the donation is for her, I will send on to her. Thanks! Ramola

PS: Any other CIA/FBI/NSA/other agency whistleblowers reading this and contemplating further truth-telling, please email me at ramolad@hushmail.com and consider doing a podcast or print interview, I will be honored. Just remember, to end the carnage, we have to collectively expose the Deeply Lawless State. 

Breakthrough in Reaching Mainstream Audiences on DEWs/Surveillance Abuse/Wrongful Targeting as Suzie Dawson Sets Twitter Alight

 

–Ramola D/Posted 4/21/2018

Suzie Dawson, New Zealand journalist, Occupy activist, Snowden documents researcher, Internet Party leader, and on-air #DecipherYou analyst with Elizabeth Lea Vos of Disobedient Media, set Twitter alight last night with some candid and revelatory tweets calling attention to Directed Energy Weapons in use by militaries, the overreach of Intelligence agencies in expanding their circle of targets as they seek more and more funds and grow ever more authoritarian and out of control, targeting “suburban soccer moms, grandparents, and students” with exotic weapons. 

Calling on journalists who may have been too scared to touch this subject, she notes that Intelligence agencies have gotten away with their criminality for too long and asks journalists to step forward to cover. Please retweet and repost Suzie’s vitally important tweets as the movement by concerned citizens and human rights activists to inform the world about the reality of electromagnetic weapon use on civilians–who, when reporting Surveillance Abuse with EMF and neuroweapons are continually dismissed and discredited as delusional “Targeted Individuals”–gains steam.

Update: Please see entire thread here in the form of an article, via the brilliant Thread Reader App: https://threadreaderapp.com/thread/987527190899195905.html

This was the tweet that started the thread: https://twitter.com/Suzi3D/status/987527190899195905

suzi1

The rest of the tweets in that thread follow:

Suzi2.png

Suzi2.png

Suzi2.png

Suzi2.png

suzi6

Suzie Dawson’s documentary about her own wrongful targeting experience may be found here:

My marathon interview with Suzie Dawson recently as a Changemaker where she covered the findings she has made from close perusal of the Snowden documents and spoke about the targeting of both Julian Assange and Edward Snowden, exhorting all targeted and in the truther community to unite in support of both these whistleblowers can be found here:

Please support Suzie Dawson’s efforts to inform the world and to expose the criminal targeting abuse we are all reporting by sending her documents and links online, and retweeting her important tweets above. Suzie’s work is critical in this struggle to reach mainstream audiences–being brainwashed by Mockingbird-style  media deceit and propaganda–because she has been closely studying and reporting on those Snowden documents already released, and has been covering Surveillance for a long while now, as her tweets illustrate.

Much gratitude to Suzie for stepping out and taking a stand here for all those being emasculated by the venal megalomaniacs in the Intelligence agencies, militaries, and military-industrial complex who are pulling in increasingly fat paychecks while those thousands and millions of accomplished and innocent citizens they target intensively with high-tech radar, microwave, scalar, sonic technology and covert implants experience the utter destruction of their lives.

Please repost and share this post widely, with attribution and linkback.

An American Citizen Reports “Developed Dehumanization through Non-Consenting Implantation to the Human Body in Efforts to Maintain Terrorism”

The post herein publishes the content of an email sent this week to a group of civilian, military, former Intelligence, fusion center, scientist, and journalist recipients including this writer by American citizen Sherri M. Guarnieri, whose whistle-blowing and advocacy for Alzheimer’s patients, particularly her grandmother, in Massachusetts and Connecticut nursing-homes led to a currently continuing experience of horrific retaliation which included the involvement of the Obama White House, Secret Service, local police, as well as various public figures; this was explored in an interview with Ms. Guarnieri, and in a succeeding podcast with her.

Sherri M Guarnieri is reporting clandestine implantation, non-consensual military or Intelligence experimentation, and the participation of numerous civilians in literally subjecting her to extremities of physical torture, including gross sexual abuse, by way of remote manipulation of implants and bodily energy meridians. These are serious crimes, and they evoke the trauma-based mind control tactics of the CIA’s MK ULTRA, experiments in behavior modification seen by many analysts and ex-CIA officers to have merely gone underground in the ’70s and resurfaced now through various overt and covert surveillance, monitoring, experimental, criminal justice, and other programs. 

Of course, in the present time period with the Surveillance agencies running totalitarian operations on one and all supported by a slavish Congress, as noted recently in the blind renewal of Section 702 permitting warrantless spying, thousands of Americans are reporting surveillance crimes and abuse inclusive of covert implantation and electromagnetic weapon assault. Sherri M Guarnieri is an important national witness and reporting victim to this holocaust, whose reports carry additional weight because she reports open disclosure of participation in the gang-targeting she experiences, by the very people who are consenting to abuse her. (This disclosure will be reported more closely in a succeeding article and podcast.)

Especially striking about Ms. Guarnieri’s resolve in exposing this criminal trafficking of her body is her current email campaign to inform and educate all personnel on relevant military bases, fusion centers, as well as local, regional, and national governments, while also seeking help to stem these abusive assaults on her and the world’s humanity. In clear and powerful language describing the crux of the unjust assault on her body, she states that such assault comprises CIA-weaponized ground-level domestic terrorism. The question she poses is a very pertinent one: Is this the world–of targeting and abuse of womens’ bodies with remote radiation weapons–that we wish to leave to our daughters?

I thank Sherri for speaking out and bearing witness to these crimes.

We need powerful voices today to cut through the egregious arrogance of the Intelligence agencies and US Military in harming, defacing, mutilating, and torturing Americans, all in the name of “national security”–a profound and treasonous lie.

–Ramola D/Posted 1/26/2018

Developed Dehumanization through Non Consenting Implantation to the Human Body in Efforts to Maintain Terrorism

Sherri M. Guarnieri/January 23, 2018 2:32 AM

To Whom It May Concern:

Human Trafficking is now developed through the dehumanization of the human body through non-consensual implants placed in human ears.

No longer a hypothesis, this is an in-play development of our government, military, and CIA. 

Sherri1Currently the ear devices I hold are used in National Labs which implicate the development of microwave-frequency directed energy weapons/DARPA processed through the application of CIA MKULTRA.

The development of these devices is no longer classified research due to the civilian population being asked to participate in gross sexual imposition, assault, battery and body-altering damage through impact to the ear using Chinese medicine technology to pulse-wave, shock, burn, vibrate, and laser-cut the body with precision. This is a development of terrorism not just inside the United States but on a global scale.

These devices act as a microphone with its own microprocessor to utilize GPS, a designated FCC line, direct transmission of pulse-wave technology using a D Wave processor, and an Amazon server.

Sherri2The use of these devices I hold without consent in my body are being used for unethical human trafficking, gross sexual imposition, body-altering damage which is no longer non-consenting human experimentation but rather CIA-skilled-level terrorism with civilian participation, with civilians logging into a computer to offer direct impact to the human body 24/7 without consequences.

The level of participation under the CIA’s direction has assured these participants zero consequences under the Constitution.

If you assure a group of civilian, employers, and co-workers they are assured to have zero consequences under our Constitution to cause gross sexual imposition, shock, pulse-wave, vibration, damage of personal assets, assault and battery to a non-consenting body by the technology of these devices, then the CIA has just weaponized ground-level terrorism no longer controlled by our military and government elected to serve and protect their citizens under the Constitution of the United States and Human Rights and is now committing a Crime Against Humanity.

Sherri3These devices can be seen through my skin, in an older MRI and a recent x-ray. These devices are being unethically denied removal at our University Hospitals, by plastic surgeons or trauma surgeons in fear of government retaliation.

So I am still left holding a non-consented human-trafficking device in both ears which can be accessed by any civilian developing terrorism along with National Labs under illegal medical malpractice and human experimentation.

I was woken again to burning skin and rectal vibration just so a Pedophile with gross Ritualistic Abuse can enjoy their evening.

Would you want these devices in your daughter?

Regards,

Sherri M Guarnieri

Related Links

Advocate for Alzheimer’s Patients Sherri M. Guarnieri Reports Whistleblower Retaliation for Advocacy, Criminal Assault with Military EMF/Bio/Neuroweapons, Obama White House & Secret Service Involvement

Notice of Crimes Against Humanity Using Energy & Neuro/Bio Weapons

 

Exploring The FBI’s “Consensual Monitoring” and the CIA’s “Concealed Monitoring”: One-Party Consent to Electronic Recordings and Non-Consensual Two-Way Radio Implant Communications?

Perhaps we can start by agreeing there is no such thing as Consensual Surveillance, for if there were, we would all be ticking boxes on Census-like forms offered to us by benevolent government entities keen to surveill us with our consent, saying Yes! You can surveill me, adding, defensively, as many of the unthinking among us do, After all, I have nothing to hide.

The FBI States It Engages in Consensual Monitoring

Still, the FBI is on record now as stating that it engages in Consensual Monitoring, in the case of the aerial surveillance of Baltimore in May during the protests succeeding Freddy Gray’s death in police custody, as documents obtained by ACLU reveal. This October 30, 2015 ACLU report has the story, and the FBI Evidence and Memo Logs referencing “Consensual Monitoring” in pdf form can be found linked at the end of that article.  These evidence logs, which are redacted in places, seem to be logging in Aerial Surveillance Videos, but in a few cases, log in “Other Electronic Surveillance” which is still item-described as “Aerial Surveillance,” and in one case, additionally, as “Consensual Monitoring–Non-Telephonic.”

What is Consensual Monitoring?

fbiBaltimore-1What can Consensual Monitoring possibly be? Is the FBI defining a form of monitoring and surveillance it engages in as Consensual, in hopes of “keeping it legal”? One clue they offer is that it’s “Other Electronic.” It’s not Aerial Video. It’s not Aerial Photography. Can it be Aerial Cyber Surveillance? (Why would they need to do that from the air, when it would be far more effective from the ground?) It’s Non-Telephonic. So it’s not Stingray, Dirtbox, cell-phone-tower-mimicking scooping-up of cellphone voice and text data. It’s Electronic, and it’s Consensual–so they say–and it’s not Video, Audio, Telephonic, Cyber-related.

From the ACLU article:

“FBI evidence logs reveal that at least half of the flights conducted video surveillance, and that the FBI retained copies of those videos in its files. Other flights conducted some type of “electronic surveillance,” but specific descriptions are redacted. This suggests that those flights were perhaps using more sensitive or powerful recording gear than just video cameras, though what kind we don’t know.

What we do know is that one of the aircraft, a Cessna propeller plane registered to an FBI front company, NG Research, had specialized surveillance camera equipment on board. FAA documentation shows that the FBI installed a Paravion Technology infrared camera mount and a FLIR Talon multi-sensor camera system on the exterior of the plane. The FLIR system includes a “thermal imager,” an optical camera, and a “laser illuminator” for recording at night. We did not receive documentation about the second plane observed circling over Baltimore, so we don’t know if it was carrying different gear.”

Regular FBI Surveillance Flights Over Cities and Rural Areas

A June 2015 article by the Associated Press revealed the fact of regular surveillance flights over cities by FBI planes, although again the nature of the surveillance was not clarified:

“Scores of low-flying planes circling American cities are part of a civilian air force operated by the FBI and obscured behind fictitious companies, The Associated Press has learned.

The AP traced at least 50 aircraft back to the FBI, and identified more than 100 flights in 11 states over a 30-day period since late April, orbiting both major cities and rural areas. At least 115 planes, including 90 Cessna aircraft, were mentioned in a federal budget document from 2009.

For decades, the planes have provided support to FBI surveillance operations on the ground. But now the aircraft are equipped with high-tech cameras, and in rare circumstances, technology capable of tracking thousands of cellphones, raising questions about how these surveillance flights affect Americans’ privacy.

“It’s important that federal law enforcement personnel have the tools they need to find and catch criminals,” said Charles Grassley, chairman of the Senate Judiciary Committee. “But whenever an operation may also monitor the activities of Americans who are not the intended target, we must make darn sure that safeguards are in place to protect the civil liberties of innocent Americans.

The FBI says the planes are not equipped or used for bulk collection activities or mass surveillance. The surveillance equipment is used for ongoing investigations, the FBI says, generally without a judge’s approval.”

Also:

“One of the planes, photographed in flight last week (May/June 2015) by the AP in northern Virginia, bristled with unusual antennas under its fuselage and a camera on its left side.”

fbiplane

The AP video report that accompanies a Blaze article on this same AP report identifies the spherical white protrusion with cable on the fuselage as a ball camera to provide sweeping panoramic views, but the other equipment is not identified.

“Evolving technology can record higher-quality video from long distances, even at night, and can capture certain identifying information from cellphones using a device known as a “cell-site simulator” — or Stingray, to use one of the product’s brand names. These can trick pinpointed cellphones into revealing identification numbers of subscribers, including those not suspected of a crime.

Officials say cellphone surveillance is rare, although the AP found in recent weeks FBI flights orbiting large, enclosed buildings for extended periods where aerial photography would be less effective than electronic signals collection. Those included above Ronald Reagan Washington National Airport and the Mall of America in Bloomington, Minnesota.”

Currently Available Aerial Surveillance Technologies

On the subject of technology currently being used in Aerial Surveillance by Law Enforcement, and by Military PISR operations (Persistent Intelligence, Surveillance, Reconnaissance), see this slide show presentation from the company Persistent Surveillance Systems, linked in pdf and posted Jan 2014 at PublicIntelligence.net, which includes suggested policy statements on Persistent Surveillance for Law Enforcement, among other things.

The image below of the Surveillance Systems market size  is from this pdf. Also posted at Public Intelligence is the US Joint Command Handbook for Persistent Surveillance.

PSS

The Washington Post ran an article on this subject in Feb 2014. Also see the video produced by the Center of Investigative Reporting and PBS demonstrating this system.

Essentially, what they say is that Wide Area Persistent Surveillance camera systems that are carried on planes offer panoramic views of large areas such as whole towns and cities, several miles (up to 25 miles in reports) in diameter, and the way they are used is to generate real-time video by having the planes circle interminably over defined areas, for about six hours at a time, combining the data obtained thereby with that from networked ground cameras, traffic cameras, gas station cameras, etc., to create a detailed picture in real-time of what anyone is doing, outside, on foot or in cars/vehicles. CIR and KQED’s video on surveillance below introduces this system and also touches on biometric intelligence, and other forms of surveillance.

State of Surveillance: Police, Privacy, and Technology

ACLU also discusses this issue, and elsewhere covers wide area surveillance (ARGUS-IS) from drones as it raises privacy concerns.

Persistent Surveillance Systems on Military Electronic Warfare Planes

Merely as reference, consider too the kind of wide-spectrum surveillance and data collection in process currently with Military Persistent Intelligence, Surveillance, and Reconnaissance programs, which use continuously-generated data from planes, ground stations, and satellites, as illustrated in this Raytheon UK overview image, from a Dec 2014 AIN Online article (Raytheon UK Develops New ISR Solutions). Note especially SATCOM–how satellites are being used to network data from the ground, from aircraft, from mobile forces, and from “tactical” ground stations.

raytheonUKoverview

Electronic Warfare aircraft, whose collection of ELINT, COMINT, SIGINT–Electronic Intelligence, Communications Intelligence, Signals Intelligence–is achieved through sophisticated radar systems, electronic jamming systems, and radio antennas, use various networked tools to engage in Persistent Aerial Surveillance.

The image below of an Electronic Warfare plane is from GlobalSecurity.org; while this aircraft looks obviously military and loaded with “pods” and antennae, Military news reports (and Defence company news and press releases) over the past couple years have pursued the creation of increasingly “intuitive” portable and streamlined EW collections/jamming packages that can be mounted more easily on smaller craft, including drones, as well be used in ground vehicles, fixed installations, and in backpacks for “foot soldiers” to carry. (See The Future of Army Electronic Warfare, Sep 2013.)

So, looking again at the FBI surveillance plane imaged above, one might just wonder if it’s possible this high-tech FBI surveillance aircraft is merely a smaller, streamlined version of the plane below, carrying compact Electronic Warfare collection/jamming systems for Persistent Intelligence, Surveillance, Reconnaissance.

electronicwarfareaircraft

Electronic Warfare Includes “Signals Intelligence” Collection

Not to be forgotten is the fact that Electronic Warfare, which has been covered previously in this post here, includes electronic surveillance and remote electronic signals collection–by which is meant a variety of electronic signals, as this Army Concept Capability on Electronic Warfare for the Future Modular Force 2015-2024 document details, including remotely-culled information from computers and electronic communications. Electronic Attack, one of the three Army-Doctrine aspects of Electronic Warfare, seeks to use electromagnetic energy to attack personnel, as well as equipment, and Electronic Warfare Support  seeks out sources of intentionally and unintentionally radiated electromagnetic energy for threat recognition and targeting, as this overview image from the Army Concept Capability document illustrates.

ewow

Widely-posted –although less-well-known–information from the ’90s on NSA Signals Intelligence reveals that SIGINT also includes information on human bioelectric fields and EMF thoughtwave forms (unintentionally radiated energy), as noted by John St.Clair Akwei in his lawsuit against the NSA (See especially the Section, NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL)).

Returning to Consensual Monitoring

It turns out the FBI has Department of Justice-specified Procedures for Consensual Monitoring.

See this Sep 2005 report: Chapter Six: Procedures for Lawful, Warrantless Monitoring of Verbal Communications (Consensual Monitoring)/FBI’s Compliance with the Attorney General’s Investigative Guidelines (Redacted) Special Report.

Opening information from this report:

“Consensual monitoring is the interception by an electronic device of any wire, oral, or electronic communication where one of the parties to the communication has given prior consent to the monitoring or recording. A warrant is not required to conduct consensual monitoring, and the party providing consent may be a government agent. See 18 U.S.C. § 2511, (2) (c) – (e) (2002).

The Attorney General Guidelines governing consensual monitoring cover only non-telephonic consensual monitoring.319 The types of monitorings addressed by these Guidelines include the use of body recorders and transmitting devices. To supplement the Guidelines, the FBI imposes detailed administrative and management controls on the use of both non-telephonic and telephonic consensual monitoring. MIOG II § 10-10.”

Further, the report goes on to specify that DOJ permission to monitor is required only in the case of “sensitive individuals” such as members of Congress, Governors, and other public officials, and duration of monitoring be permitted in those cases for only up to 90 days at a time. For all other parties–such as you and me–no permission is required other than a sign off from a Special Agent at the local FBI office, and duration of monitoring may be marked by said Special Agent as “for the duration of the investigation,” may be conducted by anyone, including possibly Government agents, and doesn’t need a warrant or DOJ approval.

Records are required to be maintained in all cases of consensual monitoring; the record to FOIA-request is: Form FD-759, captioned “Notification of SAC/ASAC Authority Granted for Use of Telephonic and/or Nontelephonic Consensual Monitoring Equipment in Criminal Matters Only.”

Is Consensual Monitoring Accomplished via 1), Recordings Unilaterally Consented-to by Hundreds of Thousands of Recipients of National Security Letters, & 2), Covertly Implanted RFID transponders?

Given this information, while it appears as if this kind of monitoring is being legitimately engaged in by the FBI purely in matters of criminal investigations, because there is much information online about abusive surveillance–fraudulent and wasteful investigations on non-terrorists and non-spies mis-characterized post-Patriot-Act as terrorists and spies–being conducted by DHS/FBI, including from ex-FBI insiders and whistleblowers (such as Mike Germain), and because thousands of individuals today in the US report covert assaults with Remote Neural Monitoring technologies involving Directed-Energy Weapons and Covert RFID implants, two other possibilities come to mind:

Consensual Monitoring One: The consensual monitoring being spoken of here is via recorders, such as apps on cell phones, or videorecorders/audiorecorders on cell phones, which belong to people who are “co-operating in an investigation” by the FBI, and who are being gagged from speaking about this to the individual under investigation by way of National Security Letters, hundreds of thousands of which, possibly now more than a million, have been handed out every year (See the Electronic Frontier Foundation‘s Module on NSLs);

and Consensual Monitoring Two; The “body recorders and transmitting devices” spoken of are biomems, RFID chips, MicroElectroMechanical devices, neurostimulators, and the like, covertly implanted in individuals, which do indeed function as “body recorders” and radio transmitter/receivers. Of course, this is scarcely Consensual communications, even if it is a two-way radio communication, since the implants themselves are non-consensual, but is an attempt being made here to pass off RFID transmissions as “Consensual Monitoring”?

The CIA’s Concealed Monitoring

This brings us to the CIA, and a June ACLU article by Staff Attorney Ashley Gorski, New Docs Raise Questions About CIA Spying Here At Home which revealed the recent FOIA-requested (by ACLU & Yale Law School’s Media Freedom and Information Access Clinic) release of several documents–eg., the CIA’s own internal regulations on spying in both foreign and domestic areas, titled AR 2-2, a CIA/FBI Memo of Understanding regarding foreign and domestic intelligence collection, and others, related to the CIA’s collection programs under Executive Order 12333.

It must be noted, these documents are continuously redacted, with blanks in place of particular Intelligence collection information marked “National Security Act.”

These documented regulations apparently govern the domestic activities of the CIA, in its human subject research programs, its domestic intelligence collection programs, its foreign intelligence collected-domestically programs, its domestic monitoring programs, and its co-ordination with the FBI in domestic electronic surveillance and monitoring.

This ACLU article, and all the documents it points to, in particular the document AR 2-2, which clearly notes that the CIA engages in human subject research and experimentation programs–an issue of profound concern at this site, deserve close reading and analysis, and will be examined further here, in a succeeding post (when redactions will be filled in, speculatively).  

What’s of particular note here to this analysis, from this ACLU article/finding is: The CIA works closely with the FBI on domestic intelligence collection and can ask the FBI to collect intelligence anytime on anyone it likes. Any recording consented to by one party is not considered electronic surveillance, it is possibly considered Concealed Monitoring, a term that Army Intelligence and the CIA are familiar with(this seems to be the same kind of surveillance the FBI discusses as Consensual Monitoring, where one party unilaterally consents to a recording involving two parties or more). The CIA gives itself permission to install “monitoring devices” whenever no warrant is required for law enforcement–a loophole created by other loopholes–but does not specify what these devices are. (RFID Implants/Bio-MEMs maybe?)

The ACLU article notes:

“In addition, Annex B explains that the CIA may “use a monitoring device within the United States under circumstances in which a warrant would not be required for law enforcement purposes if the CIA General Counsel concurs.”

But what qualifies as a “monitoring device”? And how exactly does monitoring differ from “electronic surveillance,” which the CIA is prohibited from doing domestically? We don’t know. In the newly released documents, the definition of “monitoring” (as distinct from “electronic surveillance”) is redacted.​”

Redacted Signals Intelligence Collection Information, Persistent Intelligence, Surveillance, Reconnaissance, One-Party Consent Labelled Consensual Monitoring, Warrantless FBI Monitoring with Transmitting Devices, Warrantless CIA Monitoring Devices Used Domestically, Redacted Definitions of Monitoring

Security and Intelligence analysts need to start connecting the dots here and planning strategies to force this information out into the open in order to seek accountability and exposure. All Americans deserve to know that our Intelligence agencies–in particular the FBI and CIA–are 1) actively collecting particular electronic signals information the nature of which is being kept redacted and classified–but which thousands of Americans experiencing covert-assault and covert-access with radar and Remote Neural Monitoring technologies, as well as researchers studying Mind-Hacking patents and technologies can identify as Human Bio-Resonance EMFs and Brain EMFs; 2) getting away with close monitoring and surveillance of Americans, domestically, and secretively, using National Security Letters as leverage to obtain one-party consent that is then labelled “consensual monitoring”; 3) self-permitting and installing covert non-consensual implants of radio transmitting/receiving devices in the bodies of Americans so as to engage in Remote Monitoring which is then rolled into “concealed monitoring.”

Further posts here will specifically examine CIA involvement in ongoing classified human subject research and experimentation programs, and the nature of the transmitting devices/monitoring devices–radio frequency implants– being self-authorized for CIA/FBI use in undisclosed Remote Monitoring programs.

For an inside look at one extraordinary instance of the documented CIA use of biomedical implants in Intelligence collection as a surveillance method, see David Larson’s 2009 testimony, lawsuit against the CIA, and report with photographs.

 

 

 

CIA, Mossad, MI6, DGSE: Seemingly Pushing for a “Global Systems Approach” to “Homeland” Security

Shortly after the Paris attacks, it was learned more widely that the heads of various Intelligence agencies–the CIA, the DGSE, and former heads of the Mossad and MI6–had met a couple weeks earlier in Washington, DC.

Dahboo7 reported briefly on this:

The meeting took place on the campus of the George Washington University (where I taught Creative Writing for many years, and prior to that, various Composition and Writing courses in the English Department’s Writing Program) under the aegis of the George Washington Center for Cyber and Homeland Security (no doubt creative in its own way;), which describes itself on Youtube thus:

The Center for Cyber and Homeland Security (CCHS) at the George Washington University is a nonpartisan “think and do” tank whose mission is to carry out policy-relevant research and analysis on homeland security, counterterrorism, and cybersecurity issues. By convening domestic and international policymakers and practitioners at all levels of government, the private and non-profit sectors, and academia, CCHS develops innovative strategies to address and confront current and future threats.

The occasion for the meeting was ostensibly a panel conducted as part of a conference titled the (2nd Annual) Ethos and Profession of Intelligence Conference, which was co-hosted by the Central Intelligence Agency and the George Washington University, and was held on October 27, 2015.

The panel was titled, interestingly, “The Shared 21st Century International Mission,” and featured CIA Director John Brennan, former UK MI6 Chief John Sawers, Director of the French Directorate for External Security Bernard Bajolet, and former Israeli National Security Advisor Yaacov Amidror. The panel was moderated by David Ignatius, Columnist at the Washington Post.

The whole panel may be watched on Youtube (video below), and, given the power that Intel agencies currently have appropriated for themselves, and the level of self-congratulation aired here, is just a little disturbing to watch and listen to, but is posted here for a couple reasons. While it’s no secret that Intelligence agencies in the West–and Israel–probably work together anyway on all sorts of issues related to security and intelligence, counter-intelligence, and counter-terrorism, it’s interesting to note that there now appears to be an obvious, emerging bent now among Intelligence agencies to openly merge and combine their efforts and missions, much in keeping with other global initiatives, such as evinced in Global Policing and the current push toward One World/Global Governance.

To this end, I found two moments of note in this panel, one by former Israeli Advisor Yaacov Amidror sounding just un peu frantic about the crucial need for increased collection and sharing of information among Intel agencies in order to “win in the arena of digital/cyber warfare,” and the second featuring current CIA Head John Brennan holding forth on the changed terrain post 9/11, acknowledging the sophistication of current systems but noting the current-day complexity of pulling together vast collections of data and information from all sorts of sources, including, “something from Youtube, something collected clandestinely,” and the need for “pulling it all together and pulsing it, at the speed of light”–a need for a “System of Systems approach” to be established and evolved and improved, as data improves (a subject immediately picked up by the rest of the panel as an opportunity to praise the gargantuan collection of data by the NSA).

Actually, that led to something else that’s disturbing though–John Sawers talking about “threats to the homeland” (Does the UK also have a “Homeland”? How language creeps along!) and David Ignatius pointedly asking Mr. Amidror about Palestinian “lone wolf” terrorists. (Who praised Israeli Intel for their efforts in intercepting “95% of planned terrorism” and confining attacks to ones by the “lonely wolves.”) This excerpt is prefaced by the French DGSE Head Bernard Bajolet talking about international co-operation among Intel and his own efforts in tracking suspects who tended to travel between Europe and the Middle-East and can be viewed from 41 minutes in to about ten minutes down.

What’s notable is that there seemed to be a distinct attempt by all at this panel including the moderator to highlight this Global Systems approach, as well as to deliberately spotlight Domestic Intelligence, Domestic Terrorism or Extremism, and Lone Wolves–all focuses that we have seen before, and are still seeing today, resulting in increased and repressive, secretive, surveillance and counter-terrorism measures being unleashed on domestic populations, both in the US, the UK, and in other countries in Europe.

Panel at GW, 21st-Century Intelligence Sharing

In relation to the above, it is interesting to note the following excerpt on supercomputers crunching massive amounts of intelligence in an Artificial Intelligence scenario from an article on Remote Neural Monitoring–a secretive, probably-classified neurotechnology which directs electromagnetic/scalar energy remotely onto human brains, bodies, and nervous systems, which is nevertheless widely described today, reported worldwide by non-consensual experimentees, and discussed online, and which will be covered here more extensively shortly–posted at Deepthought.newsvine.com:

“‘Mr Computer’ is a general artificial intelligence with greater-than-human level reasoning capability.  Whilst not what many envision as being the technological singularity, it is certainly the leading practical implementation of this notion.  For the less romantic, ‘Mr Computer’ is a HCI solution to a vast decentralized data warehousing solution jointly operated by the CIA and NSA.  Its role in RNM is a CIA black op with stated objectives of controlling all aspects of human behavior, thus it is possible for individuals to know of this AI in a different capacity and not have access to RNM directly.

Outside of its role in RNM, ‘Mr Computer’ is a force multiplier that enables the US intelligence community to connect-the-dots in gathered intelligence from every available source.  This system is the ultimate destination of any data the US Federal government collects. Forget notions of hacking or attacking this system, not only can it literally vaporize you, but its also a better programmer, physicist and engineer than all humans combined.  It’s as secure as they come and its bugs are not of the conventional exploitable type.   I’m sure it finds modern notions of cyber-warfare and IT security ‘cute’ and ‘charming’, but ultimately not in the same league as it and certainly not a threat.” More can be found at Deep Thought.

In which vein, also see this informative 2013 article on Skynet and AI taking over NSA surveillance data: Skynet Rising: Google Acquires 512-Qubit Quantum Computer: NSA Surveillance to be Turned Over to AI Machines

 

Clandestine MKULTRA Continues Today, Hand in Hand with Clandestine Electronic Warfare Radiation Neuroweapons Testing & Training on Americans

How and why is it that thousands of people in the US who are reporting being assaulted by pulsed radiation weapons are ignored by pretty much everyone they approach for help/exposure/justice: members of Congress they write to, doctors and psychiatrists they look to for help–who don’t bother acting like the scientists they are supposed to be by actually testing or physically measuring this radiation which can indeed be picked up by radio frequency meters, human rights advocates at the big Human Rights organizations like Amnesty International or the American Civil Liberties Union, even their local Law Enforcement officers–who ignore the thugs in cars speeding into neighborhoods and pointing military Non Lethal Weapons at certain, select “Targeted Individuals” and demand that counseling or a psychological evaluation is in order instead?

How and why is it that small aircraft and helicopters incessantly buzz –everyday, constantly during the day, and constantly during the night too–into certain neighborhoods, often hovering or circling for hours, often seemingly summoned by said speeding cars on the ground–their intent and mission deliberately not shared with the public, even when questioned–as FOIA requests to the FAA indicate? (See Muckrock for my FOIA request to the FAA, stalled and delayed over all of last year, and ultimately non-responsive, currently under appeal.)

Could it be that Top-Secret/Special Access Electronic Warfare EMR Neuroweapons are being tested and trained on them? Could it be that pilots–and ground crew–are training together in Electronic Warfare on these “Targeted Individuals”? (The people on the ground who are being assaulted, the so-called “Targeted Individuals,” including this writer, know this rings true–the hits on their bodies speak to the aircraft connection.)

Perhaps the extreme and questionable silence surrounding this situation is because these assaults have been fully permitted and authorized as Classified “Top Secret” Research and Experimentation Projects, to be conducted in a Clandestine way–meaning no-one can legally speak about them. Just go on “legally” assaulting, criminally and covertly, forever, the assaulters well-hidden by Secrecy laws, Defense directives actually permitting weapons-testing on civilians, and the Common Rule with its flagrant loopholes permitting the Institutionalized Hijacking of Informed Consent–which isn’t required in Classified Research on Human Subjects today.  All of this extreme criminality and flagrancy of human rights violations can exist in silence and refusal-to-acknowledge, thanks to our society’s current miasmic cowering in the face of Secrecy.  Secrecy permits abuse, and Clandestine Projects which promote Secrecy are currently promoting Extreme Abuse. Innocent individuals are being openly tortured, in the USA–and this practice is occurring worldwide.

These speculations and analyses, supported by commentaries and interviews and videocasts with various other analysts, doctors, researchers, weapons experts, weapons creators, and neuroscientists, are examined on this new page under Human Rights: 2015: “Targeted Individuals” are Non-Consensual Subjects in Criminal Clandestine, Classified “Top Secret” MKULTRA-Extended Mind & Behavior Control/Torture Experimentation by Joint Military/Intel/Justice/Academic Institutions, as well as Targets of COINTELPRO  and Electronic Warfare

The “Deep State” Hides in Plain Sight: Organized Covert Harassment Points to Overreach and Abuse of Powers by Out-of-Control Intel Agencies

We are living in a time of unprecedented surveillance and social control in the US and in many countries worldwide.

Secrecy in law has brought us to a point where people either live in fear of the surveillance state and are afraid to speak their minds, or are naively co-opted into actively harassing activists/whistleblowers/writers in their midst, by Intel agencies working locally through Fusion Centers (via narratives of fabricated “investigations” of these civically-engaged citizens falsely termed “security risks” now needing to be “monitored electronically” 24/7 by the oh-so-concerned State and enrolled covertly in “neuroscience/behavior modification programs” which warrant friendly but un-turndownable “official” requests for community co-operation).

Businesses and communities are openly repressed by Intel agencies using the overreaching powers of state secrecy laws–like Section 215 of the Patriot Act, and the whole Patriot Act, and the facile issue of National Security Letters via secret machinations of the Foreign Intelligence Surveillance Court, and secret sharing of private information, all tools to oppress civilians and groups, and to force a community’s silence through gag orders and threats of incarceration and fines.

Secrecy, Silencing, Surveillance, Censorship: are we Secure yet?

Where does Covert Harassment come from? Has American society always been secretly run by Intel groups?

Acccording to Mike Lofgren (former GOP congressional staff member with Senate and House Budget Committees) in this Bill Moyers episode, the “Deep State” has been hiding in plain sight for years and includes Intel agencies, Wall Street, and Silicon Valley: he collects his thoughts also here in this essay, Anatomy of the Deep State.

Do Secret Services and Spy Agencies have any right whatsoever to covertly harass citizens–and to co-opt others through lies and deceit into also persecuting these citizens?

Or do these actions indicate a tremendous overreach and abuse of their powers?

Harassment today is malicious in the extreme, and involves the covert use of deadly directed-energy neuroweapons (See Human Rights/Covert Criminal Targeting of Activists; more to come); “electronic monitoring” or “electronic surveillance,” which community members consent to engage in, themselves (because they all have cell phones?!), is nothing less than the GPS tracking, targeting, and discharge of deadly directed-energy neuroweapons on citizens (See Human Rights/Classified Weapons Testing; more to come).

The nature of spying in itself is a deterrent to democracy; to understand why. watch the documentary Counter-Intelligence posted online in five parts. See this Popular Resistance interview with filmmaker Scott Noble: Counter-Intelligence: Spying Deters Democracy.  Excerpt: “In making the film I set out to explore how these agencies function in the real world. How do they keep secrets? What are some common m.o.’s? What is their ultimate purpose? In a broader sense I wanted to ask whether democracy is even possible when organizations like the CIA exist. We are currently living under a hybrid of plutocracy (from plouto, “wealth”) and cryptocracy (from krypton, “hidden”) that benefits about 1 percent of the human population. It’s no secret we’re ruled by the rich, but there is a relative lack of understanding about just how much information is kept hidden from the public. A 2004 study by Peter Galison at Harvard concluded that “the classified universe is certainly not smaller, and very probably much larger than this unclassified one.”

Watch Counter-Intelligence online.

What was COINTELPRO all about? Who did it target, and doesn’t it seem like it’s quite aggressively active today?

This brief video which excerpts part of the Church Committee findings, shows Walter Mondale and other Senators discussing the unprecedented nature of Covert Harassment they were uncovering: Covert Actions Against Citizens Living in America

Who do Americans listen to today? Are American communities and citizens all too easily swayed by the voice of “Authority”?

How easily can an American be persuaded to act against a fellow citizen, merely by the flashing of a badge? Is this how Intel agencies are running entire communities now, and ensuring their “community involvement/participation” in the harassment of activists/whistleblowers/writers–their own neighbors? Watch this ABC News John Quinone: What Would You Do? video for some absolutely riveting footage that answers just this question.

Other videos on this highly educational site explore COINTELPRO further, and reveal the modern face of Covert Harassment.

Speaking Out Against Secrecy & the Stripping of our Basic Rights

People everywhere today are beginning to speak out about the excessive surveillance, repression, and secrecy we face post 9/11 and the Patriot Act: it’s Time for the Pariot Act to expire, and time for us to speak out against secrecy laws which suppress and do not protect, which oppress and do not secure “national security” much as the latter is used glibly as a mantra to justify pretty much any invasion of privacy, personal sovereignty, and right to free speech.

The Electronic Frontier Fund has set up a site with information and action items–learn more about the undemocratic nature of Section 215 of the Patriot Act, take a small moment to sign a petition, post a link, tweet a note to Congress, or write a letter to Congress–we will never be free of surveillance and repression and the stripping of our basic rights, we will never end the horrors of Covert Harassment by overreaching Intel groups, never end the machinations and depredations of the Deep State if we don’t speak out, now, today, while we have an ounce of freedom left.

Also, do scroll down the previous post here for other links to petitions and letters. Please: act today. Sign them all!