10/14/16 – In Reflection of The Pain of This Week

By Katie IndiCrow, 10/14/2016

Some have noticed that I’ve been unusually quiet this week. It may seem strange because SO MUCH is going on, and so many people are facing the darkness of both themselves and their societies. Storms are happening. Lies are being exposed. Things have been incredibly brittle and yet I have had nothing to say. The reason for that, dear friends, is I’ve been working to support energy shifting through transmutation. This isn’t something I normally share with others, but the energies have been so incredibly powerful that I feel it important to table. For me, transmutation often means physically and emotionally holding the energies that I am shifting inside of my being, whatever that may be. The last week, dear friends, I have been feeling an incredible amount of sadness and pain with you. I want to acknowledge that and remind you just how important what you are going through is.

We are in rapidly shifting times, dear ones, and the ‘shake up’ of the foundations of the fear based controllers are now well underway. Some people are feeling incredibly confused, for in their hearts they feel that we should be moving forward (or ascending) whereas they see destruction, chaos, and death. Change is not always easy, dear ones, and I remind you about how you have felt (or are feeling) as you travel through the dark night of the soul in order to reach the light. I remind you that facing this darkness is an incredibly important part of healing ourselves, our societies, and Mother Earth. Feel it, face it, and then let it go. For at the same time, beautiful friends, much is being created – I will return to that in a moment.

Recent portal openings have created space for rapid energy shifting, within and without, once again. Our upcoming moon, Hurricane Matthew, and events like the US election and Dakota Pipeline have drawn out deep seeded, long buried pain in many of us. It is with this pain that I have been sitting for the last week, and it is to those of you who are feeling it that I speak directly now. As I’ve gone into the pain space with my soul these past days, I have felt the betrayals and disappointments that so many of you are experiencing to my very core. You are seeing the extreme fragility of the political and economic systems, the bold faced lies and manipulation that have been running many of your societies for so long. You’re asking yourselves how you could have been so duped and you are going through an incredible range of emotions like shock, rage, and embarrassment. I have felt you feel helpless, hopeless, and like you’ve had enough. I have felt your shame, self hatred, and your struggle with drugs and alcohol. I want you to know that all of this self-realness is not for nothing. Rather, what you are moving through right now is incredibly important in the process we refer to as ascension.

So what are you doing when you are allowing yourselves to feel all this, dear friends? You are allowing yourself to begin to heal the things that have been holding you – and us – back. As shamanic principles show, in facing our darkness we bring it to light. In admitting we were wrong or we were duped, or that this system is broken and we need a new one you are getting to the truth. Your truth. OUR truth. I also want to remind you that there are others like me who do transmutation this way – many. Although you may not know us and we may not know you, we feel you, we Love you and we are HERE WITH YOU. So are your guides, ancestors, spirit animals, angels, ets and the list goes on. The notion of aloneness is an illusion, one that we will all see through more powerfully soon.

It is easy to fall into the false truth that we are entering into the dark ages of humanity. I ask you dear friends, to touch into that hope space in your heart that knows that we CAN do better than this and allow it to guide you. We are certainly in the thick of things. Don’t give up now.

Love always,

Katie IndiCrow

Katie IndiCrow is a teacher, gridworker, energy aligner, and writer. See her page, IndiCrow Energetics for a list of current offerings and more of her work: https://www.facebook.com/lightemissary1111/?fref=nf

~~~~~~~~
Sourced from: http://www.lovehaswon.org/love-blogs/in-reflection-of-the-pain-of-this-week

The Weathermen, Paid To Cover The Tracks Of Climate Engineering

“Weather forecasters” are now little more than script reading actors in a grand production that is completely orchestrated by those pulling the strings at the top. The military/industrial/climate engineering/media complex now controls the weather, and they control the weather “forecasters”. “Mostly Sunny” now generally means heavily sprayed skies with few natural clouds. The meteorological community, and especially the TV weathermen, are literally towing the line for the “collective insanity”. Their job is to convincingly put out the official narrative, to explain the completely engineered weather as if it’s completely natural. All of us need to contact and peacefully confront local meteorologists with credible data. Keep track of the information you are passing on and let the weathermen know you are making a record of the fact that they have been officially made aware of the climate engineering issue. Eliminate any excuse they might someday give that they just did not know, it’s time to hold them all to accountability. Radio show personality David Tulis has put more light on this subject in the excellent article below that he has just penned, my thanks to David for helping us to sound the alarm.
Dane Wigington
geoengineeringwatch.org

It’s perfectly rational for Barys, other weathermen to ignore sky striping

Source: Nooganomics, article by David Tulis

To keep their integrity, forecasters who created this chart at a Chattanooga TV station disregard weather-altering activities of Uncle Sam.

Governments talk up ways to “combat climate change” and have manipulated the weather with hazy factory skies for years. So why do weather forecasters reject sky striping as a developing “good government” or “environmental” story? To be men of integrity.

If they give 1 percent credence to chemtrailing as a story and an influence on the weather, that becomes the story and they lose their jobs. If they try to account for stratospheric aerosol geoengineering in the slightest, they have to inject into their forecast a human (anthropocentric) unknown outside their job description. As it is, weather forecasting is tricky enough, with no accurate forecast possible more than three days out. Sky striping is weather modification on a grand scale that creates cloud banks, dries up rainfall, tosses weather systems left and right. To attempt to account for jet traffic that manipulates weather patterns is ludicrous for the professional in front of the camera. It’s a separate story, coverable by the news department if any credible sources or interviews from officials emerge (none do, as officials insist weather control is merely theoretical).

Other points are in favor of rejecting the striking aerial visuals of sky striping. Most people, the forecaster knows, offhandedly reject or discount weird doings in the sky, the perpetual hazes, the magnification of the sun through layers of mist, the blurring out of your own shadow on sidewalk or wall, the whitening of sunlight. Hardly a soul notices. There is no cost socially or professionally to denying visible effects of sky striping. No stigma attaches to one who ignores solar radiation management and keeps it out of his daily weather storytelling.

To be a man of honor who supports his family, his employer and meets the expectations of his TV and radio audience, my city’s top forecaster has to pretend no irrational and no unpredictable human factor exists in his forecasts. He has to pretend that the only computer-aided tea leaf sifting he does is upon nature itself. Implied in his stolidity is the hope that God owns nature, God owns the weather — and by His agency has charge over wind and drought. The forecaster’s job is to discern trends based on existing cloud and rain patterns using his best judgment. His presupposition is that nature exists and rules, that it is not “over,” as one commentator on weather modification put it in Time magazine in 2012. Paul Barys, David Karnes and Patrick Core — the three main TV forecasters in Chattanooga — suppose an organized universe, an orderly creation that stands apart from mankind and is not subject to his whim. Weather may mystify, but not because some federal joker is wobbling a joystick.

Sky striping as a meteorological cause raises the margin of error to an unknown level, and makes any reasonable professional forecaster realize that he has an impossible task. To intellectually account for U.S. weather control programs in the stratosphere, thus, injects an element into his professional career that is irrational, dangerous to his income and estate, and disruptive of his routines and personal studio and production relationships.

Weather forecasts routinely ignore the biggest weather story that in my hometown I am attempting to cover. This blindness is lamentable, perhaps. But we can understand it and assume no bad faith or ill will on the part of the meteorological clan. Their inputs are consistent, their premises orderly; the great narrative of the war on global climate, instead, is breaking on other media platforms.

Source: Nooganomics, article by David Tulis

Sourced from: Geoengineering Watch

Common Core – Standardized Reality And The Slow Kill Of Divergent Thinking

transhumanist-education, alternate education, education


Nathaniel Mauka, Staff Writer
Waking Times

We’ve come a long way in education since the 1960s, but not necessarily in a positive direction. The psychologist J.P. Guilford once drew a distinction between two forms of thinking: convergent and divergent. One produces alternative theories, creative ideas, and useful solutions, the other, the dogmatization of information and a ‘single’ correct answer which can be force-fed to students on standardized tests and in common core classrooms.

Divergent thinking is done by a mind that is turned ‘on’ and engaged in the constant questioning of reality, instead of passively ‘dumbed down’ by rote solutions force-fed through memorization and shallow learning. Divergent thinking creates fantastical worlds such as those imagined by the likes of Nikola Tesla, Buckminster FullerBeethoven, Einstein, Pythagorus, Leonardo Da Vinci, Marina Abramovic, and similar personalities.

Standardize Everything

Standardized education in America causes the slow death of divergent thinking, in its aim to create psychologically muted and Pavlovian-trained followers who won’t buck the system.

Dr. Joseph Farrell, and Gary Lawrence, authors of Rotten to the (Common) Core, state:

Standardized Testing in America has a troubled history. Its agenda has long remained veiled behind “expert opinions” and “latest studies.” The future of American education stands in a tradition of social engineering, data mining, pseudo-psychology, and dumbing down classroom strategies.

Common Core promises great advances though its true benefits are monetary ones for software companies and partner politicians.

It it is our contention that the goal of Common Core, or rather, of its assessment process, is nothing less than a massive addition to the power of the surveillance state, to the privileged corporations destined to manage it, to the further drastic curtailment of our civil liberties, and to the eventual inhibition of any individual creativity, genius, responsibility, and any general or popular intellectual culture resulting from them.

Our argument is different than that leveled by many critics against the Common Core standards, for our focus is thus not upon pedagogy, or content but rather upon its assessment process and its implicit consequences for parents, students, and the teaching profession.

Our goal is to stimulate not only discussion of Common Core’s radical agenda for the consolidation of the surveillance state, but for its ultimate rejection.”

[read more=”Click here to Read More” less=”Read Less”]

Education as Social Engineering

The common core curriculum is anti-human, and arguably not educational in any regard, unless of course you are educating future slaves. As Dr. Farrell explains, it is simply another form of social engineering and elite mind control. He believes the problem with common core is so significant that a ‘black market’ in education will be created whereupon someone who actually understands a subject will be paid to tutor our children, though they’ve just spent eight hours being drilled with useless information.

Farrell points to the habit of the ‘elite,’ who send their children to very expensive schools in Silicon Valley. These children aren’t learning on computers, nor with all the latest technology, because it would rob them of the chance to develop higher levels of learning. You can know a million facts, but creativity is still the highest form of intelligence. It is what you do with all those ‘facts’ that matters. Common core divests our children of this innate skill, slowly killing their creative urges, and the development of this quintessential skill.

READ: Renowned Scholar Warns Common Core Education Dumbing Down Kids

Absorb and Synthesize

For example, Beethoven was very strict with himself about his ‘absorb’ and ‘synthesize’ states of learning. This allows abstract ideas to marinate and then be fleshed out in the world as something more succinct and tangible. He took long walks through the forests of Vienna in order to let deep, subconscious ‘eureka’ moments percolate to the surface of his mind.

Common core children are not allowed to synthesize latent creativity, and they spend little time in nature. They also are not given an inspiring human mentor, as much as a by-the-book curriculum regurgitating ‘teacher’ who has also been dumbed down by the educational system. This person is more concerned, through their own educational brainwashing, to apply the latest psychological theories, without truly teaching a child to be on fire for learning.

As Farrell says, “We get teachers who spend more time learning about psychological flap trap and edu-blither than learning the very disciplines, that supposedly they are teaching.”

Deep State Training and Mind Control

It goes one step further. As our children go from young to old, and enter into college, some of them very prestigious, they are not allowed to graduate with a degree until they attend lectures by homeland security. Once again, a creative mind is subtly influenced through the militarization of ‘education,’ from kindergarten through University.

Intelligence agencies also infiltrate the educational system in order to train and recruit future elite personnel. People are chosen based on their ability to follow orders, not diverge from the transhumanist agenda. Common core is a massive take-over of the educational system, similar to the takeover of the agricultural system, our water, our banking system, etc. In short, it benefits the military industrial complex and a handful of corporations, not your children’s budding intellectual genius.

About the Author

Nathaniel Mauka is a researcher of the dark side of government and exopolitics, and a staff writer for Waking Times.

Sourced from: Waking Times

[/read]

The truth about commercial eggs exposed in shocking video

Editor’s note:  Buy local, pastured eggs if possible.  

Wednesday, October 12, 2016 by: David Gutierrez, staff writer
(NaturalNews) A video by activist Erin Janus claims to be the first to expose “in full detail,” all the things that the egg industry doesn’t want you to know about how its products are produced.

The video chronicles everything from the horrible physical and psychological abuse inflicted on egg-laying hens and “useless” male chicks, the environmental impacts of egg-producing factory farms, and the effects of factory farmed egg production on human health.

Janus also exposes the labels “cage free” and “free range” as toothless whitewashing that can still be applied to hens raised in horrific, factory-farmed conditions.

Used up and tossed into a woodchipper

The video opens by highlighting the physiological stress that egg-laying hens endure by necessity, even on supposedly humane farms. Janus notes that if left to their own devices, hens would lay only about 12 to 13 eggs in the course of their lifetime, most of those resulting in a live birth. Yet in order to turn hens into food producers, egg farmers remove their eggs each day, causing physiological changes that spur the hen to lay 300 to 350 eggs per year. But egg production is a highly intensive process–as is the laying itself, which can take up to 26 hours, comparable to human childbirth.

Common physical repercussions of a lifetime of constant egg-laying include nutrient deficiencies, osteoporosis, beak and bone deformity, fatty liver disease, and ovarian cancer. Farmers also typically cut or burn off hens’ beaks to keep them from trying to replenish nutrients by eating their own eggs.

Because a hen’s egg production tends to drop after eight to 12 months of such an intensive schedule, it has become standard industry practice to “force molt” them — that is, shock their bodies into producing more eggs by starving them or feeding them nutrient-deficient filler, depriving them of water and keeping them in the dark.

A hen’s natural lifespan is 10-20 years, but most egg-laying hens are slaughtered at a year and a half, when their bodies start to give out. Because poultry are exempted from the Humane Slaughter Act, common methods of killing “spent” hens and “useless” male chicks include tossing them into woodchippers alive or suffocating them in garbage bags. They are typically turned into pellets and fed back to other hens, cows or pigs.

On factory farms, the conditions faced by hens are even worse. Unfortunately, labels such as “free range” or “cage free” don’t mean the chickens were not factory farmed. “Cage free” simply means that birds are not confined in cages, but tens of thousands can still be crammed into a single shed with no access to the outdoors. “Free range” simply means some outdoor access must be provided, for as little as a few minutes a day. This can consist of a single small opening in a shed packed with 20,000 chickens.

Breeding bird flu

It’s not just chickens that suffer from the egg industry’s practices. Producing eggs on such a massive scale is an incredible waste of resources. It takes 200 liters (50 gallons) of water to produce just a single egg.

When hundreds of thousands of chickens are crammed together, they also produce enormous amounts of waste. Indeed, feces from poultry operations is a major source of pollution to clean water supplies. It is also a major vector for the spread of foodborne illness, including salmonella.

In fact, chicken meat and eggs are the top two causes of salmonella poisoning.

The effects on human health go beyond simple contamination, however. It is now widely accepted that factory farming of poultry is a major incubator for more virulent and dangerous forms of the influenza virus, including the highly lethal form known as “bird flu.” As far back as 2005, the United Nations warned that the crowded, unsanitary conditions of factory farming “provide ideal conditions for the [influenza] virus to spread and mutate into a more dangerous form.” Around the same time, the American Public Health Organization called for a moratorium on factory farms, condemning them as breeding grounds for disease.

Sources for this article include:

http://www.govtslaves.info

http://blog.humanesociety.org

Sourced from: http://www.naturalnews.com/055621_commercial_eggs_factory_farms_industry_practices.html

Tom Heneghan Intel Report – “The Nazi Bush-Clinton NSA Faces U.S. Military Decapitation”

Exclusive, explosive reports from the patriot
Joint U.S.-French Intelligence Task Force,
operating on American soil for over 200 years

TOM HENEGHAN INTELLIGENCE BRIEFINGS

ALL Patriot Americans MUST know with sources inside American/European intelligence agencies and INTERPOL reporting what is really going on behind the scenes of thecorporate-controlled, fascist, extortion-friendlypropaganda U.S. media’s massive deceptionsProtect and defend     YOUR     Constitution Bill of Rights,the Supreme Law of the United States.

 

Thursday   October 13, 2016
THE NAZI BUSH-CLINTON NSA FACES U.S. MILITARY DECAPITATION
by Tom Heneghan, International Intelligence Expert


UNITED States of America   –   It can now be reported that the U.S. NAZI Paperclip NSA, CIA and the TREASONOUS UN-Constitutional Department of Homeland Security (DHS) have declared MARTIAL LAW on American soil and now have 100% control of the U.S. corporate extortion-friendly media filth.


NAZI German 93-year old sociopath George Herbert Walker Bush has gone vile threatening to have his political opponents assassinated and threatening to use a 9-11 style FALSE FLAG attack (bio-chemical) on the American People if the U.S. Military Flag Officers refuse to capitulate in what will be a rigged and stolen 2016 presidential election on behalf of daddy Bush’s CIA Mena, Arkansas, drug trafficking business partners Hillary and Bill Clinton.

The U.S. Military Flag Officers have responded with a direct threat to get physical with the Bushes and Clintons and the U.S. corporate, extortion-friendly media elite within 24 hours unless they stand down and immediately surrender ending NAZI Paperclip NSA-CIA occupation of the United States of America.

Yes, folks, it is about to get physical, so lock and load.

Note:  NAZI German daddy Bush aka George H.W. Bush, who had President John F. Kennedy assassinated, and attempted to have President Ronald Reagan assassinated, scripted the 1980 “October Surprise”; hired Bill Clinton as his Mena, Arkansas drug trafficking and foreign currency laundry business partner; and finally, helped script the blatant THEFT of the year 2000 presidential election on behalf of his deviate son, junior George W. BushFRAUD, remains the DIRECT ENEMY of the American People and their sacred U.S. Constitution and American Republic.

The U.S. Military Flag Officers have concluded that NAZI German George Herbert Walker Bush will be held accountable and dealt with immediately with due prejudice.

In closing, daddy Bush has gone vile reference the Russian Federation Tesla technology audit of the year 2000 presidential election that proves that the U.S. NSA blatantly STOLE the year 2000 presidential election from then Vice President now year 2000 DULY ELECTED President Albert Gore Jr. of Carthage, Tennessee, along with the fact that the Russian Federation now has photographs of junior BushFRAUD having hot homosexual sex with White House prostitute Jeff Gannon and lifelong lover, former Yale University roommate, Victor Ashe.

The Russian Federation also has recently obtained videos of Bush Crime Family CIA business partner, Nazi Jew neocon Hillary Rodenhurst Clinton engaging in hot lesbian sex aka raping a 9-year old girl named Kathy O’Brien.

Reference:  The U.S. Secret Service is ready to unload not only on Bush and Clinton but on the corporate CIA-controlled homosexual media that has enabled:

  • the DESTRUCTION of the United States of America,
  • the LOOTING of the U.S. Treasury,
  • the DESTRUCTION of our electoral process,
  • the WRECKING of the U.S. economy,
  • criminal UNCONSTITUTIONAL wars, and
  • the SHREDDING of our U.S. Constitution protected freedoms and privacy, the Supreme Law of our Land


Final message to the NAZI Paperclip Bush-Clinton-NSA-CIA-DHS crime syndicate:

Prepare for your worst nightmare:  American-French revolutionary style Jacobinian rage.

Air-Raid Sirens in San Diego and Tacoma; Fighter Jets Seen Scrambling, Reports of “Explosion Sounds”

Post by Newsroom

– Oct 13, 2016

3:24 AM EDT 13 October 2016 — Numerous reports began filtering into SuperStation 95 about two hours ago that air raid sirens were blaring in San Diego, CA, with one reader sending us …

https://www.superstation95.com/index.php/world/2236

John St. Clair Akwei vs.NSA, Ft. Meade, MD, USA

Evidence for the Lawsuit filed at the US courthouse in Washington, D.C.
(Civil Action 92-0449)
John St.Clair Akwei vs. NSA Ft George G. Meade, MD

My knowledge of the National Security Agency’s structure,
national security activities, proprietary technology,
and covert operations to monitor individual citizens.

==========

The NSA’s mission and the NSA’s domestic Intelligence operation.

Communications Intelligence (COMINT)

Blanket coverage of all electronic communication in the U.S. and the world to ensure national security. The NSA at Ft. Meade, Maryland has had the most advanced computers in the world since the early 1960’s. NSA technology is developed and implemented in secret from private corporations, academia, and the general public.

Signals Intelligence (SIGINT)

The Signals Intelligence mission of the NSA has evolved into a program of decoding EMF waves in the environment for wirelessly tapping into computers and tracking persons with the electrical currents in their bodies.

Signals Intelligence is based on the fact that everything in the environment with an electric current in it has a magnetic flux around it which gives off EMF waves. The NSA/DoD has developed proprietary advanced digital equipment which can remotely analyze all objects whether man-made or organic that have electrical activity.

Domestic Intelligence (DOMINT)

The NSA has records on all U.S. citizens. The NSA gathers information on U.S. citizens who might be of interest to any of the over 50,000 NSA agents (HUMINT). These agents are authorized by executive order to spy on anyone. The NSA has a permanent National Security Anti-Terrorist surveillance network in place. This surveillance network is completely disguised and hidden from the public.

Tracking individuals in the U.S. is easily and cost-effectively implemented with the NSA’s electronic surveillance network. This network (DOMINT) covers the entire U.S., involves tens of thousands of NSA personnel, and tracks millions of persons simultaneously. Cost effective implementation of operations is assured by NSA computer technology designed to minimize operations costs.

NSA personnel serve in Quasi-public positions in their communities and run cover businesses and legitimate businesses that can inform the intelligence community of persons they would want to track. N.S.A. personnel in the community usually have cover identities such as social workers, lawyers and business owners.

Individual citizens occasionally targeted for surveillance by independently operating NSA personnel.

NSA personnel can control the lives of hundreds of thousands of individuals in the U.S. by using the NSA’s domestic intelligence network and cover businesses. The operations independently run by them can sometimes go beyond the bounds of law. Long-term control and sabotage of tens of thousands of unwitting citizens by NSA operatives is likely to happen. NSA Domint has the ability to covertly assassinate U.S. citizens or run covert psychological control operations to cause subjects to be diagnosed with ill mental health.

NSA’s domestic electronic surveillance network

As of the early 1960’s the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology.

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA’s Signals Intelligence (SIGINT) mission.

The NSA’s electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs.

With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

Signals Intelligence Remote Computer Tampering

The NSA keeps track of all PCs and other computers sold in the U.S. This is an integral part of the Domestic Intelligence network.

The NSA’s EMF equipment can tune in RF emissions from personal computer circuit boards (while filtering out emissions from monitors and power supplies). The RF emission from PC circuit boards contains digital information in the PC. Coded RF waves from the NSA’s equipment can resonate PC circuits and change data in the PC’s. Thus the NSA can gain wireless modem-style entry into any computer in the country for surveillance or anti-terrorist electronic warfare.

Radio and Television signals can be substituted at the receiving end with special EMF equipment. Replacing signals in Radios and Televisions is another outgrowth of the NSA’s Signals Intelligence (SIGINT) mission.
Detecting EMF Fields in Humans for Surveillance.

A subject’s bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person’s brain-states and thoughts. The subject is then perfectly monitored from a distance.

NSA personnel can dial up any individual in the country on the Signals lntelligence EMF scanning network and the NSA’s computers will then pinpoint and track that person 24 hours-a-day. The NSA can pick out and track anyone in the U.S.

NSA Signals Intelligence Use of EMF Brain Stimulation

NSA Signals Intelligence uses EMF Brain Stimulation for Remote Neural Monitoring (RNM) and Electronic Brain Link (EBL). EMF Brain Stimulation has been in development since the MKUltra program of the early 1950’s, which included neurological research into “radiation” (non-ionizing EMF) and bioelectric research and development. The resulting secret technology is categorized at the National Security Archives as “Radiation Intelligence,” defined as “information from unintentionally emanated electromagnetic waves in the environment, not including radioactivity or nuclear detonation.”

Signals Intelligence implemented and kept this technology secret in the same manner as other electronic warfare programs of the U.S. government. The NSA monitors available information about this technology and withholds scientific research from the public. There are also international intelligence agency agreements to keep this technology secret.

The NSA has proprietary electronic equipment that analyzes electrical activity in humans from a distance. NSA computer-generated brain mapping can continuously monitor all the electrical activity in die brain continuously. The NSA records aid decodes individual brain maps (of hundreds of thousands of persons) for national security purposes. EMF Brain Stimulation is also secretly used by the military for Brain-to-computer link. (In military fighter aircraft, for example.)

For electronic surveillance purposes electrical activity in the speech center of the brain can be translated into the subject’s verbal thoughts. RNM can send encoded signals to the brain’s auditory cortex thus allowing audio communication direct to the brain (bypassing the ears). NSA operatives can use this to covertly debilitate subjects by simulating auditory hallucinations characteristic of paranoid schizophrenia.

Without any contact with the subject, Remote Neural Monitoring can map out electrical activity from the visual cortex of a subject’s brain and show images from the subject’s brain on a video monitor. NSA operatives see what the surveillance subject’s eyes are seeing. Visual memory can also be seen. RNM can send images direct to the visual cortex. bypassing the eyes and optic nerves. NSA operatives can use this to surreptitiously put images in a surveillance subject’s brain while they are in R.E.M. sleep for brain- programming purposes.

Capabilities of NSA operatives using RNM

There has been a Signals Intelligence network in the U.S. since the 1940’s. The NSA, Ft. Meade has in place a vast two-way wireless RNM system which is used to track subjects and non-invasively monitor audio-visual information in their brain. This is all done with no physical contact with the subject. RNM is the ultimate method of surveillance and domestic intelligence. Speech and 3D sound, and subliminal audio can be sent to the auditory cortex of the subject’s brain (bypassing the ears) and images can be sent into the visual cortex. RNM can alter a subject’s perceptions, moods, and motor control.
Speech cortex/auditory cortex link has become the ultimate communications system for the intelligence community. RNM allows for a complete audio-visual brain-to-brain link or brain-to-computer link.

National Security Agency Signals Intelligence Electronic Brain Link Technology

NSA SigInt can remotely detect, identify and monitor a person’s bioelectric fields.

The NSA’s Signals Intelligence has the proprietary ability to remotely and non-invasively monitor information in the human brain by digitally decoding the evoked potentials in the 30-50 hz,.5 milliwatt electro-magnetic emissions from the brain.

Neuronal activity in the brain creates a shifting electrical pattern that has a shifting magnetic flux. This magnetic flux puts out a constant 30-50 hz, .5 milliwatt electromagnetic (EMF) wave. Contained in the electromagnetic emission from the brain are spikes and patterns called “evoked potentials.”

Every thought, reaction, motor command, auditory event, and visual image in the brain has a corresponding “evoked potential” or set of “evoked potentials.” The EMF emission from the brain can be decoded into the current thoughts, images and sounds in the subject’s brain.

NSA SigInt uses EMF-transmitted Brain Stimulation as a communications system to transmit information (as well as nervous system messages) to intelligence agents and also to transmit to the brains of covert operations subjects (on a non-perceptible level).

EMF Brain Stimulation works by sending a complexly coded and pulsed electromagnetic signal to trigger evoked potentials (events) in the brain, thereby forming sound and visual images in the brain’s neural circuits. EMF Brain Stimulation can also change a person’s brain-states and affect motor control.

Two-way Electronic Brain-Link is done by remotely monitoring neural audio-visual information while transmitting sound to the auditory cortex (bypassing the ears) and transmitting faint images to the visual cortex (bypassing the optic nerves and eyes, the images appear as floating 2-D screens in the brain).

Two-Way Electronic Brain Link has become the ultimate communications system for CIA/NSA personnel. Remote Neural Monitoring (RNM, remotely monitoring bioelectric information in the human brain) has become the ultimate surveillance system. It is used by a limited number of agents in the U.S. Intelligence Community.

RNM requires decoding the resonance frequency of each specific brain area. That frequency is then modulated in order to impose information in That specific brain area. The frequency to which the various brain areas respond varies from 3 Hz to 50 Hz. Only NSA Signals Intelligence modulates signals in this frequency band.

An example of EMF Brain Stimulation:

Brain Area

Bioelectric
Resonance
Frequency

Information Induced
Through Modulation
Motor Control Cortex

10 HZ
Motor Impulse Co-ordination
Auditory Cortex

15 HZ
Sound which bypasses the ears
Visual Cortex

25 HZ
Images in the brain, bypassing the eyes
Somatosensory Cortex

09 HZ
Phantom Touch Sense
Thought Center

20 HZ
Imposed Subconscious Thoughts

This modulated information can be put into the brain at varying intensities from subliminal to perceptible.

Each person’s brain has a unique set of bioelectric resonance/entrainment frequencies. Sending audio information to a person’s brain at the frequency of another person’s auditory cortex would result in that audio information not being perceived.

The Plaintiff learned of RNM by being in two-way RNM contact with the Kinnecome group at the NSA, Ft. Meade. They used RNM 3D sound direct to the brain to harass the Plaintiff from 10/90 to 5/91. As of 5/91 they have had two-way RNM communications with the Plaintiff and have used RNM to attempt to incapacitate the Plaintiff and hinder the Plaintiff from going to authorities about their activities against the Plaintiff in the last twelve years.

The Kinnecome group has about 100 persons working 24-hours-a-day at Ft Meade. They have also brain-tapped persons the Plaintiff is in contact with to keep the Plaintiff isolated. This is the first time ever that a private citizen has been harassed with RNM and has been able to bring a lawsuit against NSA personnel misusing this intelligence operations method.

NSA Techniques and Resources

Remote monitoring/tracking of individuals in any location. inside any building, continuously, anywhere in the country.

A system for inexpensive implementation of these operations allows for thousands of persons in every community to be spied on constantly by the NSA.

Remote RNM Devices

a) NSA’s RNM equipment remotely reads the evoked potentials (EEGs) of the human brain for tracking individuals and can send messages through the nervous system to affect their performance.

b) [Information missing from original]

c) RNM can electronically identify individuals and track then anywhere in the U.S. This equipment is on a network and is used for domestic intelligence operations, government security, and military base security, and in case of bioelectric warfare.

Spotters and Walk-Bys in Metropolitan Areas

a) Tens of thousands of persons in each area working as spotters and neighborhood/business place spies (sometimes unwittingly) following and checking on subjects who have been identified for covert control by NSA personnel.

b) Agents working out of offices can be in constant communication with Spotters who are keeping track of the NSA’s thousands of subjects in public.

c) NSA Agents in remote offices can instantly identify (using RNM) any individual spotted in public whom is in contact with surveillance subject.

Chemicals and Drugs into Residential Buildings with hidden NSA-lnstalled and maintained plastic plumbing lines.

a) The NSA has kits for running lines into residential tap water and air ducts of subjects for the delivery of drugs (such as sleeping gas or brainwashing aiding drugs). This is an outgrowth of CIA pharmapsychology.

Brief Overview of Proprietary U.S. Intelligence/Anti- Terrorist Equipment Mentioned.

Fixed network of special EMF equipment that can read EEGs in human brains and identify/track individuals by using digital computers. ESB (Electrical Stimulation to the Brain) via EMF signal from the NSA Signals Intelligence is used to control subjects.

EMF equipment that gathers information from PC circuit boards by deciphering RF emissions thereby gaining wireless modem-style entry into any personal computer in the country.

All equipment hidden, all technology secret, all scientific research unreported (as in electronic warfare research).

Not known to the public at all, yet complete and thorough implementation of this method of domestic intelligence has been in place since the early 1980’s.

Resources

These publications have only been discovered since December 1991, after Plaintiff had already notified authorities (Dept. of Justice, etc.) of Public Corruption by named NSA employees. When no action was taken against the NSA employees I researched the Intelligence Community electronic surveillance technology involved and discovered the following publications:

The Body Electric
Electromagnetism and the Foundation of Life, by Robert Becker, M.D.
p. 265/313/318. Monitoringeuroelectric information in the brain. E-M wave E.S.B.
Cross Currents, by Robert Becker, M.D.
p. 70, p. 78, p. 105/210/216/220/242/299/303 E-M ESB. Simulating auditory hallucinations. p. 274, “Remote computer tampering using the RF emissions from the logic board.”
Currents of Death by Paul Brodeur
p. 27/93. Driving brain electrical activity with external E-M, Magnetophosphenes, Delgado.
The Zapping of America by Paul Brodeur
DoD E-M ESB Research, simulating auditory hallucinations.
Of Mice, Men and Molecules, by John H. Heller. 1963.
p. 110, Bioelectricity. probing the brain with E-M waves.
The 3-Pound Universe, by Judith Hooper
p. 29/132/137. CIA EEG research. EEG’s for surveillance.
In the Palaces or Memory, by George Johnson
E-M emissions from the brain,the brain as an open electromagnetic circuit.
The Puzzle Palace, by James Bamford
Signals intelligence, most advanced computers in the early Sixties
The U.S. Intelligence Community -Glossary terms at National Security Archives:
Radiation intelligence – information from unintentionally emanated electromagnetic energy, excluding radioactive sources.
The Search for the “Manchurian Candidate,” by John Marks
p. 327. Electrical or radio stimulation to the brain, CIA R&D in bioelectrics.
Secret Agenda, by Jim Hougan
National Security cult groups.
Crines of the Intelligence Commununity. by Morton Halperin
Surreptitious entries; intelligence agents running operations against government workers
War in the Age of Intelligent Machines
NSA computer supremacy, complete control of information
Alternate Computers, by Time-Life Books
Molecule Computers
The Mind, by Richard Restak, M.D.
p. 258, EEG Systems Inc., decoding brain E-M emanations, tracking thoughts on a computer.
MedTech, by Lawrence Gallon
Triggering events in the brain” direct to auditory cortex signals.
Cyborg, by D.S. Halacy, Jr. (1965)
Brain-to-computer link research contracts given out by the U.S. Govemment
Psychiatry and the C.I.A.: Victims of Mind Control by Harvey M. Weinstein. M.D.
Dr. Cameron, psychic driving. ultraconceptual communications.
Journey Into Madness: Ihe True Story of Secret CIA Mind Control and Medical Abuse, by Gordon Thomas
p. 127/276/116, 168-69. Intelligence R & D. Delgado. Psychic driving with radio telemetry.
Mind Manipulators, by Alan Scheflin and Edward M. Opton
MKULTRA brain research for information gathering
The Brain Changers, by Maya Pines.
p. 19. Listening to brain E-M emissions.

Modern Bielectricity
Inducing audio in the brain with e-m waves, DoD cover-up, E-M wave ESB. Remote EEGs.
Magnetic Stimulation in Clinical Neuropsysiology by Sudhansu Chokroverty
Magneto-Phosphenes. Images direct to the visual cortex.
The Mind of Man by Nigel Calder
U.S. Intelligence brain research
Neuroelectric Society Conference – 1971
Audio direct to the brain with e-m waves, two waf remote EEG.
Brain Control by Elliot S. Valenstein
ESB control of individuals
Towards Century 21 by C.S. Wallia
p. 21. Brain Stimulation for direct to brain communication.
Mind Wars by Ron McRae, associate of Jack Anderson
p 62/106/136. Research into brain-to-brain electronic communications, remote neural e-m detection.
Mind Tools by Rudy Rucker
Brain tapping, communication with varying biomagnetic fields. p. 82
U.S. News and World Report 1/2/84
p. 88. e-m wave brain stimulation. Intelligence community high tech.
Ear Magazine article on extremely low frequency radio emissions in the natural environment, radio emissions from the human body.
City Paper article on FCC and NSA “complete radio spectrum” listening posts. 1/17/92.
Frontiers in Science – 1958 – by Edward Hutchings, Jr.
p. 48
Beyond Biofeedback – 1977 – by Elmer and Alyce Green
p. 118
The Body Quantum by Fred Alan Wolf
Cloning – A Biologist Reports by Robert Gilmore McKinnell
Ethical review of cloning humans.
Hoover’s FBI by former agent William Turner
p. 280. Routines of electronic surveillance work.
July 20, 2019 by Arthur C. Clarke
Lida, Neurophonics, Brain/Computer Link
MegaBrain by Michael Hutchison
p. 107/108/117/120/123. Brain stimulation with e-m waves. CIA research and information control.
The Cult of Information by Theodore Rosnak – 1986
NSA Directive #145. Personal Files in Computers. Computer automated telephone tapping
The Body Shop
1968 implantation of an electrode array on the visual cortex for video direct to the brain and other 1960s research into electronically triggering phosphenes in the brain, thus bypassing the eyes.
Evoked Potentials by David Regan
Decoding neuroelectric information in the brain
http://www.angelfire.com/or/mctrl/akwei.html

Sourced from: http://www.ascensionwithearth.com/2016/10/tom-heneghan-intel-report-nazi-bush.html#more

Dinar Chronicles Intel Update – Republic, GCR/RV, Presidential Election

Solo Los Hechos

Dinar ChroniclesNeither Donald nor Hillary will be President of the USA, Inc.. Both are just playing a pre-scripted role to make all things appear normal; this is why campaign rhetoric has gotten so far out of control. It’s all fiction.

An old/new form of government will return, it’s called the Republic of the United States.

It was created in 1776 via a Constitution that was written by the nations forefather to govern all of its affairs.

This Republic will be announced as restored very shortly, before Nov 8, and a new Republic election will be introduced with brand new candidates.

The Global Financial Reset (GFR) & Revaluation of Currencies (RVC) are each real fiscal events that have the approval of 209 sovereign nations per signed international treaty (Paris Agreement).

Both events are so massive in scope, news of such far reaching transitions have been kept classified, as well as painstakingly rolled out ever so slowly, as to ensure both a successful and safe implementation phase.

Know all currencies of the world have already been recalibrated (day and time unknown), collateralized per a new gold supply whose value is set daily in Shanghai, China as opposed to London.

Global monetary truth and balance have already been updated and right now operating on an equitable monetary platform with unhackable quantum computing system capacity.

This new sovereign digital currency for the old/new Republic was also quietly incorporated at midnight EDT Oct 1, 2016. Also a new Republic government including President, Cabinet, Congress and brand new Supreme Court bench was sworn in.

Suddenly the old/new Republic Treasury was allowed to settle all of its historic claims in its own sovereign digital currency at both domestic and international banks worldwide for all T1 (sovereign nations) & T2 (government) debt transactions. These transactions were private and not publicized.

Then at midnight EDT on Oct 10, 2016, T3 transactions were allowed to be settled also in old/new Republic digital currency for individual sovereign debt claims such as as historic bonds, legal judgements and indigenous tribe reparations. These transactions were private and not publicized.

Finally at midnight EDT on Oct 13, 2016 T4 transactions were authorized to begin for both domestic and International transactions in old/new Republic digital currency.

These transactions will also be private and not publicized, even though millions in the general public will be notified through the Internet with toll free numbers to set appointments at temporary off site banking locations.

T4 settlements are to include privately negotiated exchanges (PNE) for first basket revalued currencies such as: IQD, IRR, IDR, AFA, VND & ZIM. Domestically speaking in the US, all intake will convert into this old/new Republic digital currency.

Timing of the toll free release is unknown even to Wells Fargo who has off site bank location over site duties.

Meaning, the entire world is on standby, waiting for the global release at this hour.

Que Así Sea

Sourced from: http://www.ascensionwithearth.com/2016/10/dinar-chronicles-intel-update-republic.html#more

Worried Your Emails Might Be Spied On? Here’s What You Can Do

email-spyBy Monique Mann, Queensland University of Technology

We live in a post-Edward Snowden world, in which US tech companies have been accused of complicity in mass surveillance by the US National Security Agency (NSA). One recent allegation is the claim that Yahoo scanned hundreds of millions of emails at the NSA’s request.

We don’t truly know how much or how often this is happening within the companies that host millions of people’s email accounts.

According to Reuters, Yahoo was ordered by the secret US Foreign Intelligence Surveillance Court (FISC) to scour emails for a specific string of characters. This is significant, as it required Yahoo to create a custom-built program for real-time surveillance of email traffic.

The power for this type of surveillance was expanded by the US Patriot Act, which allows for the use of secret National Security Letters (NSL) to compel service providers to hand over customer data. The letters come with gag orders, prohibiting companies like Yahoo from even admitting that they have been ordered to monitor customers.

But email scanning does not only occur at the behest of national security agencies. The past decade has seen the rise of “surveillance capitalism” and “data brokers”, who collect your information for behavioural profiling and targeted advertising.

Google has admitted to scanning emails to deliver targeted advertising and customised search results. Facebook is currently facing legal action for scanning private messages to do the same. And earlier this year Yahoo itself settled a class action lawsuit for scanning non-Yahoo customer emails without consent.

Protecting your privacy

So with all this going on, is it possible to protect your privacy? And if so, how?

One way is through encryption, which allows only the sender and the receiver to read the content of messages, as it converts information into a secret code that requires a key to decode it.

Public-key cryptography is one type of encryption, involving two paired keys – one public and one private. When an encrypted email is sent it is encoded or “locked” with the receiver’s public key. Only the receiver can “unlock” it with their private key.

End-to-end encryption involves encrypting information before it leaves your device, with it only being decrypted once it reaches the receiver’s device. In other words, it is encrypted “at the ends” where the keys are held. This means that security and privacy are not dependent on the channel of communication – in this case the email provider – because if the message is intercepted it cannot be deciphered. This prevents eavesdropping in transit.

There are now numerous services that promise free end-to-end encrypted communication, includingProtonMail, Tutanota, and the messaging app Signal. Look for those with open source code because it enables peer-review, guaranteeing there are no backdoors.

The push-back against encryption

With increased encryption comes more demands from authorities for companies to “unlock” information. The best example may be the Apple-FBI case, which saw the FBI attempt to compel Apple to unlock a suspect’s iPhone. In the end this wasn’t necessary. There has also been a simultaneous rise in companies like Cellebrite who offer digital forensic services to decrypt and extract data.

Therefore, the best services use principles of privacy by design, that limit how much information the service provider themselves can collect or access. ProtonMail and Signal, for example, cannot access their users’ information, no matter how hard they try. If issued with a subpoena all they could provide is the date and time a user registered and the last date of connection.

Partly as a result of this encryption war, some states are considering outlawing encryption entirely. Criminalising encryption has been discussed in the United States, Britain, Australia, andelsewhere.

Tech companies safeguarding secrecy

But not all hope is lost. There is a growing trend of tech companies fighting back and refusing to comply with surveillance orders.

In 2014 Lavabit chose to shut down rather than turn over the private encryption key to a customer’s account. This customer was later revealed to be Edward Snowden. Microsoft has refused to hand over emails stored on its servers in Ireland, arguing that this would constitute an impermissible extraterritorial search by the FBI. And of course, Apple refused to disable inbuilt security features to crack an encrypted iPhone.

This shows that service providers are aware of the importance of developing and maintaining consumer trust in matters of privacy. They are intimately, and commercially, invested in protecting it.

Transparency reports and warrant canaries

Another way companies have attempted to gain trust is through transparency reports that detail the orders they have received from authorities. These can be found on company websites and are often reported in the media. Many of these reports feature a workaround to the restrictions on letting customers know if surveillance has been ordered. Companies simply include a statement that they have not been subject to a secret order. If this statement ever goes missing, customers know an order has been issued. This is known as a “warrant canary”.

Several companies routinely issue transparency reports with warrant canaries. Apple and Reddit have set them off, implying that they have received secret orders to provide data.

The same workaround may not be available in Australia however. Recent data-retention laws introduced journalist information warrants that made it an offence to disclose information about the existence (or non-existence) of the warrant, effectively outlawing warrant canaries for journalists in Australia.

The future

Encryption and transparency reports are some of the last protections that consumers have against both governments and the big tech companies we rely on. As more of our lives transition online, we will need them to protect civil rights and individual privacy. We can’t afford for either to be weakened or outlawed.

There are a couple of challenges under way. NSL statutes and gag orders are currently being challenged by the Electronic Frontier Foundation and members of the US Congress as unconstitutional. Watch this space.

Monique Mann, Lecturer, School of Justice, Faculty of Law, Crime and Justice Research Centre,Queensland University of Technology

This article was originally published on The Conversation. Read the original article.

Sourced from: http://www.activistpost.com/2016/10/worried-emails-might-spied-heres-can.html

INNER-EARTH CIVILIZATIONS MAY SOON REVEAL THEMSELVES!

Editor’s note:  This past year, my mate and I have had a very similar dream where we were in this massive structure that was shaped like a mountain.  It was literally like the center of a beautiful crystal-like mountain had been carved out on the inside.  There were waterfalls and natural light came in from the top.  In the center was this massive, wooden table that ran the length of the particular section we were in.  There were about 50 people inside – all human/humanoid looking.  With the exception of my mate and child, I knew no one.  But the feeling of friendship and celebration was quite wonderful.  My mate had a very similar dream weeks later.  

Researcher believes Inner Earth Civilizations will soon reveal themselves to the World. In a new interview by Coast to Coast AM, author and researcher David Wilcock said that an alliance of ancient civilizations is living inside our planet. Wilcock says that according to his research, it seems that these cavities are utilized so that advanced civilizations have a place they can live while looking out for everything that happens on the ‘outer Earth’, the surface of our planet. These inner earth civilizations have been calling the inner Earth their home for extensive periods of time and they are about the reveal themselves to the world. Wilcock believes that the US government knows of their presence due to accidentally discovering them via undercover projects building secret underground bases. “I think we are going to find out that underground bases are much more extensive than we thought and much more ancient,” Wilcock said.

Sourced from: Disclose TV

WSO Oct 11 – Recent History and Current Evidence Point to WEIRD

Study Finds Trees Have Feelings, Make Friends And Look After Each Other Like An Old Couple

by James Gould-Bourn | Bored Panda

“They can feel pain, [and] have emotions, such as fear. Trees like to stand close together and cuddle. They love company and like to take things slow,” – these are just a couple of findings by Peter Wohlleben, a German researcher who devoted his work to studying trees.

“There is in fact friendship among trees,” says Wohlleben. “They can form bonds like an old couple, where one looks after the other. Trees have feelings.”

The new documentary, called ‘Intelligent Trees’, is the work of German forester, author, and tree whisperer Peter Wohlleben, and Suzanne Simard, an ecologist from the University of British Columbia. Watch the trailer below to get a glimpse into it.

“They can form bonds like an old couple, where one looks after the other. Trees have feelings”

Image credits: Chaiyun Damkaew

“Trees like to stand close together and cuddle. They love company. They can feel pain, [and] have emotions, such as fear”

Image credits: TOMÁŠ MORKES

See for yourself in the trailer below:

Sourced from: http://mysticalraven.com/news/2934/study-finds-trees-have-feelings-make-friends-and-look-after-each-other-like-an-old-couple