Etiket arşivi: Program

FETÖ ÖRGÜTÜ DOSYASI : FETÖ ‘Candy Crush Saga’ görünümlü program kurdu


FETÖ ‘Candy Crush Saga’ görünümlü program kurdu

FETÖ/PDY mensuplarının kriptolu haberleşme ağı ‘ByLock’un ardından Mart başından itibaren ‘Candy Crush Saga’ görünümlü yeni bir mesajlaşma programı üzerinden bilgilendirildiği belirlendi. FETÖ elebaşı Gülen’in, ağ üzerinden mesajlar göndererek, itirafların önüne geçip örgütün direncini artırmaya çalıştığı belirlendi. Uygulamanın nasıl yüklendiği ve kimler tarafından kullanıldığı araştırılıyor.

FETÖ’nün kullandığı yeni mesajlaşma programının ‘Candy Crush Saga’ görünümlü olduğu tespit edildi.

FETÖ’nün Bylock, Eagle, Talk ve Kakao’dan sonra mart ayından itibaren yeni bir ağ üzerinden örgüt üyelerine motivasyon ve yönlendirme mesajları göndermeye başladığı ortaya çıktı. Güvenlik birimleri, milyonlarca kişi tarafından oynanan "Candy Crush Saga" görünümlü yeni mesajlaşma programını deşifre etti.

Örgütün, bu program üzerinden çözülmelerin ve itirafların önüne geçmek için gözaltına alınma ve tutukluluk sırasında hangi hallerin işkence ve kötü muameleye delil olduğu yönünde bilgi verdiği belirlendi.

Örgütün, üyelerine hakim karşısında işkence ve kötü muamele gördükleri yönünde şikayetlerini yüksek sesle dillendirmeleri talimatı verdiği de ortaya çıktı.

Bu konuda ‘Avrupa İşkenceyi Önleme Komitesi’ ve ‘Birleşmiş Milletler İnsan Hakları Yüksek Komiserliği’ne başvurulması, kendilerine yardımcı olunacağı mesajı verildiği tespit edildi.

İtiraflar harekete geçirdi

Darbe girişiminin ardından gözaltı ve ihraç süreçlerinde bazı FETÖ üyeleri, itirafçı oldu. Bu itirafların önüne geçmek isteyen örgütün, üyelerinin moral ve motivasyonlarını yüksek tutmak amacıyla farklı yöntemlere başvurduğu öğrenildi. Örgütün, bu çerçevede mart ayından itibaren haberleşme için milyonlarca kişi tarafından oynanan “Candy Crush Saga" görünümlü yeni bir mesajlaşma programını devreye koyduğu saptandı.

FETÖ’nün haberleşme ağı ‘By Lock’ adım adım böyle çözüldü

Fuatavni operasyonunda yakalanan Başbakanlık Veri Uzmanı Akif Mustafa Koçyiğit’in örgüt içi iletişim ağına dair itiraflar ‘By Lock’ isimli bir programa işaret ederken, bu programın istihbarat ekiplerince deşifre edildiği sürece dair tüm detaylara yenisafak.com ulaştı. Elde edilen verilere göre örgüt, Kasım 2014 itibariyle "By Lock" adlı hem android hem de iOS tabanlı cihazlara uygun olan kriptolu mesaj uygulamasını kullanmaya başladı. Kısa süre içinde Milli İstihbarat Teşkilatı’nın istihbarat birimleri örgüt mensuplarının kriptolu mesajlarını arşivlemeye ve çözümlemeye başladı. Mehmet Acet: En ciddi veriler By Lock’tanYeni Şafak Yazarı Mehmet Acet, 27 Temmuz kaleme aldığı "FETÖ’nün haberleşme ağı ne ölçüde çözüldü?" başlıklı köşe yazısında "By Lock" hakkında çarpıcı tespitlerde bulunmuş ve "Devletin elinde şu an için FETÖ ile ilgili bulunan en ciddi veriler, işte bu gizli programın ele geçirilmesi, takibinin yapılması ve arşivinin tutulması ile elde edilen bilgilerden oluşuyor" ifadelerine yer vermişti.40 bin terörist listedeBu kapsamda 2016 Mayıs ayı itibariyle ‘By Lock’ uygulamasını kullanan FETÖ üyelerinin isimleri, lokasyonları, telefon numaraları hakkındaki bilgiler büyük oranda çözülürken yazışmaların içerikleri kısmi olarak çözülebildi ve onbinlerce isim çalıştıkları kurumlara göre tasnif edilmeye başlandı.

TSK olmak üzere devlet kurumlarına sızan 40 bine yakın FETÖ üyesi belirlendi ve devlet makamlarınca Mayıs 2016 itibariyle paylaşılmaya başlandı. İşte ilk gününden bu yana FETÖ’nün irtibat için kullandığı ‘By Lock’ uygulamasının perde arkası:

FETÖ, 1973’den bu yana bir istihbarat örgütü şeklinde teşkilatlanmış ve haberleşme şeklini buna göre dizayn etmişti. Ancak klasik istihbarat haberleşme yöntemlerinin yanında teknolojik gelişmeleri takip ederek kripto mesaj uygulamalarını kullandı.

Özellikle 17-25 Aralık 2013 sürecinde devlet içine sızmış FETÖ’cülerin başarısız bürokratik darbe girişiminden sonra deşifre olmamak için klasik haberleşme yöntemlerini bırakarak, şifreli mesajlaşma uygulamalarını kullanmaya başladığı görüldü.

FETÖ üyeleri Kasım 2014 itibariyle "By Lock" adlı hem android hem de iOS tabanlı cihazlara uygun olan kriptolu mesaj uygulamasını kullanmaya yöneldi.- Milli İstihbarat Teşkilatı birimleri, FETÖ’cülerin By Lock uygulamasını kullandığı tespit ettikten sonra ilgili teknik birimlerin uygulamada zaafiyet bulma çalışmaları hız kazandı. Teknik istihbarat birimlerinin ilgili uygulamada zaafiyet bulmasından sonra Türkiye lokasyonlu kullanıcılara hem Türkiye içinden hem de yurt dışından gelen tüm yazışmalar belgelendi.

Elde edilen yazışmalar kriptolandığı için kriptografi uzmanları şifrelemeyi çözme sürecine başlamış ancak ve süreç içinde örgütün kripto sistemi kısmi olarak çözüldü.-

2016 Mayıs ayı itibariyle By Lock uygulamasını kullanan FETÖ üyelerinin isimleri, lokasyonları, telefon numaraları hakkındaki bilgiler büyük oranda çözülürken yazışmaların içerikleri kısmi olarak çözülebilmiştir ve onbinlerce isim çalıştıkları kurumlara göre tasnif edilmeye başlandı.- Bu uygulamayı kullanan FETÖ’cülerin deşifre edilemesiyle beraber Ağustos 2016’da yapılacak olan YAŞ ile ilgili olarak asker içine sızan 600 rütbeli askerin ismi 11 Temmuz 2016’da Milli Savunma Bakanlığı ile paylaşıldı.

Bu 600 FETÖ üyesi rütbeli askerin deşifresi 15 Temmuz 2016’da gerçekleştirilmiş olan başarısız darbe girişiminin YAŞ öncesine çekilmesine neden oldu.- Ayrıca bu uygulamadan elde edilen istihbarat bilgileri sayesinde başta TSK olmak üzere devlet kurumlarına sızan 40.000’ne yakın FETÖ üyesi belirlenmiştir ve devlet makamlarınca Mayıs 2016 ayı itibariyle paylaşılmaya başlandı. Halen çözümler devam etmektedir. 40.000 sayısı çözümler devam ettikçe artıyor.-

Bu belirleme sayesinde başarısız darbe sürecinden sonra devletin gerçekleştirdiği soruşturmalar, gözaltılar çok daha hızlı olmuş ve nokta atışı operasyonlar gerçekleştiriliyor.

İşkence talimatı

Güvenlik birimleri, bu programın deşifre edilmesine yönelik önemli bir çalışma yaptı. Örgütün, bu ağ üzerinden üyelerine gözaltına alınma ve tutukluluk sırasında hangi hallerin işkence ve kötü muameleye delil olduğu yönünde bilgi verdiği tespit edildi.

Örgüt üyelerinden, hakim karşısında işkence ve kötü muamele gördükleri yönünde şikayette bulunmaları istendi. Bir süre önce Balıkesir’de tutuklu örgüt üyelerinin toplu olarak mahkemede yüksek sesle işkence gördüklerini dile getirdikleri, hakimin de tahliye isteminde bulunduğu yönünde mesajların örgüt mensuplarına iletildiği görüldü.

"Bylock’u kabul etmeyin"

Örgütün, mensuplarını ByLock’u kabul etmemeleri için talimatlandırdığı belirlendi. Örgüt, yeni ağı kullanan mensuplarına gönderdiği mesajda, “Telefonlarda çıkan ByLock programları için düzmece ByLock görüşmeleri hazırlanacak, bunlar üzerinden itiraf almaya çalışacaklar, kesinlikle kabul edilmemeli, bu tarz bir sorgulamanın işkence olduğu belirtilmeli" denildi.

Mesajlarda, örgüt üyelerinden işkence ve kötü muamele iddialarını Avrupa İşkenceyi Önleme Komitesi ve Birleşmiş Milletler İnsan Hakları Yüksek Komiserliği’ne iletmelerinin istendiği bilgisine ulaşıldı. Örgütün bu kurumlara yapılan başvurulara destek vereceği ifade edildi.

FETÖ’cülerin yazışma uygulaması ByLock’un ara yüzü ilk kez gösterildi

FETÖ’nün gizli haberleşme programı Bylock hakkında her geçen gün dikkati çeken veriler ortaya çıkarılırken, CHP’nin yayımladığı bir raporda yer alan bulgular ilk kez açıklandı.CHP Genel Başkan Yardımcısı Erdal Aksünger, konuk olduğu Habertürk canlı yayınında ByLock konusunda yapılan araştırmanın sonuçlarını paylaştı.Elde edilen verilere göre örgüt, Kasım 2014 itibariyle "By Lock" adlı hem android hem de iOS tabanlı cihazlara uygun olan kriptolu mesaj uygulamasını kullanmaya başladı. Kısa süre içinde Milli İstihbarat Teşkilatı’nın istihbarat birimleri örgüt mensuplarının kriptolu mesajlarını arşivlemeye ve çözümlemeye başladı.Galeri: ByLock’un arayüzü ortaya çıktı Bylock’un arayüzünde neler var?Şu an indirilemeyen uygulamaya dair en son güncellemeyle birlikte elde edilen ‘ara yüz’ görselini paylaşan Aksünger, farklı zaman dilimlerinde ByLock için güncellemelerin yapılmış olabileceğine dikkati çekti.Uygulamada, ‘Arkadaşlar’ yada ‘Gruplar’ oluşturma imkanının bulunduğu görülüyor. Whatsapp ve Facebook Messenger gibi iletişim uygulamalarına benzerliği göze çarpan ByLock’taki sohbet paneli üzerinden dosya gönderiminin de mümkün olduğu görülüyor. En yoğun arama Çorum’danCHP’nin ByLock raporunda 1-7 Eylül 2014 tarihlerinde ByLock kullanımının yoğun olduğu bildirildi. Türkiye’deki arama trafiği ise şöyle: Çorum, Kırklareli, Amasya, Edirne ve Adıyaman.Dünya genelindeki arama yoğunluğu da raporla birlikte ortaya çıkarıldı. Buna göre; ByLock’un yüzde 80’in üzerinde Türkiye’de kullanılmış olduğu görüldü.FETÖ’nün haberleşme ağı ‘By Lock’ adım adım böyle çözüldü Hürriyet’in ByLock haberi FETÖ’ye can simidi oldu FETÖ’nün haber sitesi görünümlü ByLock’u ortaya çıktı Video: FETÖ’nün mobil ağının kodları Galeri: FETÖ ile bağlantısı olanlar böyle deşifre ediliyor

Elebaşı Gülen’in mesajı

FETÖ elebaşısı Fethullah Gülen’in yeni iletişim ağı üzerinde bazı mesajları da belirlendi. Habertürk’ün haberine göre, Gülen’in, örgüt mensuplarını uyararak, "Süreç bize ne kazandırdı sorusuna cevap olarak, yeniden ikaz edildik. Dualarınız, teheccütleriniz eksikti kendinize gelmeniz için Allah sizlere yeni yöntemler öğretti. Allah bu hizmetteki kömür ruhları ayırdı. Münafıklığı ve başka cemaatleri gösterdi. Vifak ve ittifakımızı pekiştirdi" ifadesini kullandığı kaydedildi.

Kullanıcılar tek tek ortaya çıkarılacak

Güvenlik birimleri, ByLock gibi yeni programı da tüm ayrıntıları ve boyutlarıyla ortaya koymak için çalışmalarını derinleştirdi. Programın nasıl yüklendiği ve kimler tarafından kullanıldığının tespiti ile mesaj içeriklerinin çözümüne yönelik çalışmalar aralıksız devam ediyor.

Reklamlar

GÜNDEM ANALİZİ /// VİDEO : GÜNDEM ÖZEL PROGRAMI – 14 ŞUBAT 2017


VİDEO LİNK :

https://www.youtube.com/watch?v=NXyj_y3kOIg&feature=em-subs_digest

ÇOCUK HAKLARI DOSYASI : Çatışma Çocukları Programı İstanbul Çalıştayı – SONUÇ RAPORU (TA SLAK)


atma ocuklar Program stanbul altay – SONU RAPORU (TASLAK).pdf

MK ULTRA PROJECT /// VİDEO : Targeted Individual Program /// 2017.02.07


VİDEO LİNK :

https://www.youtube.com/watch?v=rPDTEFk-0T8&feature=em-subs_digest

PSİKOLOJİK HARP DOSYASI /// VİDEO : GİZLİ GERÇEKLER PROGRAMI /// 14 01 2017 /// YONCA ALPAN /// PSİKOLOJİK HARP


VİDEO LİNK :

https://www.youtube.com/watch?v=jk4RiwjIdKc&feature=youtu.be&a

GÜNDEM ANALİZİ /// VİDEO : GÜNDEM ÖZEL PROGRAMI /// 24 OCAK 2017 /// EMEKLİ BÜYÜKELÇİ ONUR ÖYMEN – LEVENT YILDIZ


VİDEO LİNK :

https://www.youtube.com/watch?v=o1UChgAcqQE&feature=em-subs_digest

TARİH : Tartışma Programlarındaki Cumhuriyet Tarihi Yalanlarına Cevap – 1


1

Atatürk’e saldırmayı misyon edinmiş, kalemini sadece Atatürk’e ve onun devrimlerine saldırmak için kullanan paralı kalemşörleri her gün bir TV programında görüyoruz. Bu programlardan biri dün gece CNN Türk’te yayınlandı. Programın konukları Yeni Akit yazarı Kenan Alpay, İMKANDER başkanı Murat Özer, Akademisyen tarihçi Orhan Çekiç ve Sözcü gazetesi yazarı Ayşe Sucu.

Tartışmanın konusu ”Cumhuriyet’in kurucu değerleriyle neden kutuplaşıyoruz?”

Konuya ve konuklara bakıldığında nasıl bir tartışma olacağı baştan belli bir program. Bu yüzden böyle programları izlemeyi pek sevmem. Ancak dün gece Atatürk düşmanlarının nasıl bir algı operasyonu yaptığını, insanların beynini yıkamak için nasıl bir üslup kullandıklarını tüm açıklığıyla anlatmak için izledim. İzlerken notlar aldım. Bazı kilit cümleler var ki bunlar tüm Atatürk düşmanlarının ağız birliği yapmışcasına söylediği cümleler… Aşağı yukarı her programda isimler farklı olsa da aynı şeyleri söylüyorlar. Yazımda anlatacaklarım sadece Kenan Alpay ve Murat Özer ile sınırlı değildir. Tüm Atatürk düşmanı yazarları kapsayan tespitlerdir.

Öncelikle programı izlerken aldığım notları konu başlığı olarak tek tek yazmak istiyorum. Yazacağım cümleler Kenan Alpay ve Murat Özer’in kendi cümleleridir. İşte iki şeriatçının bazı cümleleri

· Tek bir kişiye dayalı tarih yazımı doğru değildir

· 1. Meclis ruhuna geri dönmeliyiz. Bizim kabul ettiğimiz 1. meclistir

· Kemalizm, Faşizm, Stalinizm gibi diktatörlük rejimidir. Artık yıkılma zamanı gelmiştir

· Geri kalmamızın nedeni Kemalizmdir

· Mustafa Kemal çarşafı yasaklayıp şapka giymeyenleri idam etmiştir

· Türk milleti müslümandır laiklik bize ters

· Osmanlı’nın dini yok muydu?

· Şeriat, sınırlarını Allahın çizdiği adaleti temel alan rejimdir

· Mustafa Kemal’e türbe yaptınız. Atatürk’e tapıyorsunuz

· Tekke ve Zaviyeler yeniden açılmalı

Programı izlerken aldığım notlar bunlar… Hepsini birçok programda duymuşsunuzdur. Klasik karşı devrim yalanlarından başka bir şey değil… Şimdi bu iddialara tek tek cevap vereceğim

1- Tek bir kişiye dayalı tarih yazımı doğru değildir iddiasına cevap: Kenan Alpay’a ait olan bu iddiaya verilecek en güzel cevap Osmanlı tarihidir. 623 yıllık Osmanlı tarihi sadece padişahlara dayalı bir tarih yazımı değil midir? Mesela İstanbul’un fethi anlatılırken Fatih Sultan Mehmet’e dayalı bir anlatım yok mudur? Ya da Mohaç zaferi anlatılırken Kanuni’nin zaferi olarak anlatılmıyor mu? 623 yıllık tarih sadece 36 kişiyi kutsayarak, hatta evliya mertebesine yükseltilerek anlatılıyor. Peki o zaman Kenan Alpay buna cevabın nedir? Dünyanın her ülkesinde milletler tarihindeki sembol isimlerle övünürler. Bu kişiler ön plana çıkarılır. Çünkü savaşları kazandıran liderin, komutanın yeteneğidir. Lider olmadan zafer olmaz. Dünyanın en büyük özgürlükçü ülkesi olan ABD, başkentine kurucusunun adını verip Washington demiştir. Ancak ABD de kimse bunu Washington’a tapmak şeklinde yorumlamıyor. Ankara’nın ismi Atatürk olsa bugün neler söylenirdi tahmin bile edemiyorum. Kenan Alpay tek kişilik tarih yazımına bakmak istiyorsa önce Osmanlı tarihine baksın. Padişaha karşı çıkan herkesin hain ilan edildiği tarih yazımı ne kadar demokratiktir önce bunu konuşalım.

2- 1. Meclis ruhuna geri dönmeliyiz. Bizim kabul ettiğimiz 1. meclistir cümlesine cevap: Atatürk düşmanlarının sakız gibi çiğneyip durduğu 1. meclis ruhuna geri dönmeliyiz cümlesi basit bir manipülasyondan başka bir şey değildir. 1. Meclis ruhu nedir diye sorduğunuzda ”Barış, kardeşlik, tam bağımsızlık, Yenikapı ruhudur” diye cevap alırsınız. Bu tamamen aldatmadır. Atatürk düşmanlarının 1. meclisten kastettiğini anlamak için o dönemde nelerin olduğuna, nelerin olmadığına bakmamız gerekiyor. 1. meclis döneminde olanları ve olmayanları tek tek sıralayalım.

Cumhuriyet yoktu, Saltanat ve hilafet vardı

Laiklik yoktu, şeriat vardı

Takım elbiseli vekiller yoktu, sarıklı hocalar vardı

Kadın özgürlüğü yoktu, erkeğin egemenliği vardı

Bu önemli noktaları göz önünde bulundurduğumuzda 1. meclis ruhundan kastedilen şey Cumhuriyet ve laikliği yıkıp yerine şeriata dayalı bir saltanat, hilafet devleti kurmaktır. Bu iddiayı savunanlara şu soruyu sormak gerekir. Madem 1. meclise bu kadar saygınız var neden dualarla, hatimlerle açılan meclisin açılışının sembolü olan 23 Nisanı kutlamıyorsunuz? 19 Mayıs ve 29 Ekimi bir yana koydum o bayramlarda Atatürk ve Cumhuriyet var. Peki 23 Nisanı kutlamamanızın nedeni nedir? Mesela her sene 23 Nisan’da bir anma programı düzenleyebilirsiniz. Neden bunları sizde göremiyoruz?

3- Kemalizm, Faşizm, Stalinizm gibi diktatörlük rejimidir. Artık yıkılma zamanı gelmiştir iddiasına cevap: Yıllardır tekrarlanan saçma bir iddiadan başka bir şey değildir. Bu iddiayı savunanların ne faşizmi ne Stalinizmi ne Nazizmi bilmediğine iddiaya girerim. Her 3 ideoloji 20. yüzyılı kana bulayan emperyalist ideolojilerdir. Yani ortak amaçları dünyayı yönetmektir. Kemalizm emperyalist bir ideoloji değildir. Böyle olmadığı için ”Yurtta Sulh, Cihanda Sulh” sözünü korkaklık olarak niteleyenler sizler değil misiniz? Eğer bu ideolojilere benzer bir ideoloji görmek istiyorsanız aynaya bakın. Sizin savunduğunuz şeriatta dünyayı kendine benzetme misyonunu üstlenen fetihçi ve yayılmacı bir ideoloji değil midir? Ayrıca söz konusu ideolojilerde meclis kapalıyken Türkiye’de 2 kez çok partili sisteme geçiş denemesi yapılmıştır. 1930 lu yıllarda Almanya’da insanlar daha güzel nasıl öldürülür diye sapıkça deneyler yapan Josef Mengele gibi ruh hastaları varken Türkiye’de tarih bölümleri, ziraat fakülteleri, opera binaları açılmıştır. Hitler, Yahudileri sistematik şekilde öldürürken Yahudi bilim adamları Atatürk’e sığınmıştır. Tıpkı 1492 yılında Sefarad Yahudilerinin II. Bayezid’e sığınması gibi… O halde şunu soralım Kemalizm Faşizm ile aynıysa Yahudi bilim adamları neden 441 yıl sonra tekrar Türkiye’ye sığındılar?

4-Geri kalmamızın nedeni Kemalizmdir iddiasına cevap: Neresinden tutsanız elinizde kalacak bir iddia…Şu iddiayı duyan bir insan Cumhuriyetten önce çok gelişmiş bir Osmanlı olduğunu zanneder. Medreseler harıl harıl çalışıp bilimsel tezler yayınlıyordu da biz mi bilmiyorduk? Ampulü Edison değil de Osmanlı medreselerinde bir molla buldu da haberimiz mi yok? Cumhuriyet ilan edildiğinde okuma yazma oranı %3-4 iken 1938 de bu oran % 18 e çıkmıştır. Nobel ödülünü kazanan Aziz Sancar bir Cumhuriyet çocuğudur ve köy enstitüsü mezunudur. Nobel kazandığında ilk açıklamasında bana bu ödülü kazandıran Cumhuriyettir demiştir. İlber Ortaylı, Halil İnalcık gibi dünya çapında tarihçileri yetiştiren Cumhuriyet’in okullarıdır. Dünya çapında kalp doktoru olan Mehmet Öz, İstanbul Üniversitesi Tıp Fakültesinde okuduktan sonra ABD de dünya çapında üne kavuşmuştur. 2007 yılında bir kaza sonucu ölen atom fizikçisi Engin Arık’ı yetiştiren Cumhuriyettir ve en önemlisi bir kadındır. Osmanlı döneminde bir kadın bilim insanı gösterebilir misiniz? Her şey bir yana bugün eşiniz, anneniz AKP ye oy verebiliyorsa bu hakkı veren de Cumhuriyettir. Tansu Çilleri Başbakan yapan da Cumhuriyettir. Hangi geri kalmışlık? Madem geri kaldık Türk milleti cahildir diyenlere neden kızıyorsunuz? Lütfen biraz tutarlı olun

5- Mustafa Kemal çarşafı yasaklayıp şapka giymeyenleri idam etmiştir iddiasına cevap: Artık bayatlamış bir Cumhuriyet tarihi yalanıdır. Bu iddiayı söyleyenlerin şapka kanununu 1 kez bile okumadığına eminim… Çünkü şapka kanunu sadece devlet memurları için çıkarılmıştır. Sıradan vatandaşlar için şapka giyme mecburiyeti yoktur. Şapka kanununun bir benzerini 1828 yılında II. Mahmud çıkarmıştır. Kanuna göre tüm devlet memurları fes ve pantolon giymeye mecbur kılınmıştır. Bu kanun nedeniyle o zamanın yobaz ulema takımı II. Mahmud’a ”Gavur padişah” demiştir.

Gelin görün ki yaklaşık 100 yıl sonra aynı yobaz takımı fesi kaldırdığı için Atatürk’e de gavur demiştir. Yani değişen bir şey yok. Bu yobazlardan biri İskilipli Atıftır. Şapka’nın gavurluk alameti olduğunu söyleyen İskilipli Atıf şapka kanununa muhalif olmuştur. Ancak İskilipli Atıf’ın şapka giymediği için asıldığı tamamen yalandır. Çünkü İskilipli Atıf şapka risalesi davası için Giresun İstiklal mahkemesinde yargılanmış ve risale, kanundan önce yazıldığı için beraat etmiştir. Ayrıca risalenin dağıtımı yasaklanmıştır. Bu gerçeği Necip Fazıl bile son devrin din mazlumları kitabında inkar etmemiştir.

İskilipli Atıf, Giresun İstiklal mahkemesinde beraat ettikten sonra Anadolu’da bazı illerde çıkan şapka isyanlarında yasaklanan risalesinin halkı kışkırttığı ve dağıtımının devam ettiği tespit edilmiştir ve Ankara İstiklal mahkemesinde yargılanmıştır. Ankara İstiklal mahkemesindeki dava, şapka davası değil devlete karşı silahlı isyan davasıdır. Davada İskilipli Atıf isyan kışkırtıcılığı ile suçlanarak 25 Şubat 1925 te çıkarılan vatana ihanet edenler hakkındaki kanun gereğince idam edilmiştir. Kanunun metni şöyledir:

”Dini ve dinin kutsal kavramlarını siyasi amaçlara esas ya da alet etmek için dernekler kurulması yasaktır. Bu tür dernekleri kuranlar ya da bu derneklere girenler vatan haini sayılır. Dini ya da dinin kutsal kavramlarını alet ederek devletin şeklini değiştirmek ve başkalaştırmak ya da devletin güvenini bozmak veya dini ya da dinin kutsal kavramlarını alet ederek her ne surette olursa olsun halk arasında bozgunculuk ve ayrımcılık sokmak için gerek tek başına gerek toplu olarak sözle ya da yazı ile ya da fiilen ya da nutuk söyleyerek ya da yayın yaparak harekette bulunanlar vatan haini sayılırlar”

10806279_1398637690441034_5314521034547209849_n

Bir noktaya özellikle dikkat çekmek istiyorum. Şapka kanunu yüzünden idam edilenler şapka giymediği için değil devlete isyan ettiği için idam edilmiştir. Şapka sadece bir bahanedir. Gavur memur istemiyoruz denilerek jandarma karakolları basılmış, askerler şehit edilmiştir. Mazlum dediğiniz insanlar bunlar mı? Hiçbir devlet kendine silah doğrultanı affetmez. İsterse çorap giymeyeceğim diye isyan etmiş olsun ortada bir isyan varsa sebebi teferruattır. En komiği ise madem şapka giymeyenler idam edildi neden Atatürk’ün birçok fotoğrafında başında şapka yok? Neden fotoğraflarında çevresinde şapka giymeyen birçok sıradan vatandaş var?

Diğer bir önemli nokta şapka giymemenin cezası nedir? Bu sorunun cevabı da 1 Mart 1926 tarihinde kabul edilen TCK nın 526. maddesidir. Kanuna göre şapka giymemenin cezası 50 lira para cezası ya da 1 ay hapistir. Menderes döneminde 3 ay hapis ve 600 lira para cezası olarak değiştirilmiştir

ömööm

1 Mart 1926 tarihli TCK 526. maddesi

1

13 Mart 1926 tarihli Resmi gazete

1

Okurken sıkılmamanız için yazıyı iki bölüm olarak yazacağım. Şimdilik bu kadar…

TIBBIYELİ HİKMET

GÜNDEM ANALİZİ /// VİDEO : HALK ARENASI PROGRAMI /// 14 EKİM 2016 /// TEK PARÇA


VİDEO LİNK :

https://www.youtube.com/watch?v=yn9Xl41g56I&feature=share

KOMPLO TEORİLERİ /// ÜNLÜ ARAŞTIRMACI VE KOMPLO TEORİSYENİ ERTAN ÖZYİĞİİT’İN PROGRAM I : KRAL VE BEN (62 BÖLÜM BİRDEN)


Kral ve Ben 1. Bölüm Obama ve Amerikan seçimlerinin dünyaya yansıması TEK PART

https://www.youtube.com/watch?v=KF6Aq-8sGEQ

Kral ve Ben 2. Bölüm – Casusluk Tarihi ve Nasıl Casus olunur?

https://www.youtube.com/watch?v=NSo0FuTwmYI

Kral ve Ben 3. Bölüm – Brezinski Kimdir?

https://www.youtube.com/watch?v=3S6uclIEHcw

Kral ve Ben 4. Bölüm Brezinski kimdir? Tek Part

https://www.youtube.com/watch?v=SM2SpsLXXT4

Kral ve Ben 5. Bölüm Popüler müziği gizli güçler mi yönetiyor Tek Part

https://www.youtube.com/watch?v=La4LgHDdOJk

Kral ve Ben 6. Bölüm Ortadoğu, Filistin ve İsrail projeksiyonu Tek Part

https://www.youtube.com/watch?v=GERbed-zP2A

Kral ve Ben 6. Bölüm – Global ekonomik Krize Farklı Bir Yaklaşım

https://www.youtube.com/watch?v=TbdYtojz75c

Kral ve Ben 7. Bölüm – Türkiye ve Bölgesine Etkileri

https://www.youtube.com/watch?v=yGXLY_Zy4Uw

Kral ve Ben 8. Bölüm – Davosun Sonuçları

https://www.youtube.com/watch?v=XFbNm4pm7vM

Kral ve Ben 9. Bölüm – Mu Kıtası Gerçeği

Kral ve Ben 10. Bölüm – Cumhuriyet Öncesi ve Sonrası Azınlıklar

https://www.youtube.com/watch?v=LLKPgbEYNj8

Kral ve Ben 11. Bölüm – Uçak Kazaları ve Hayatta Kalma Teknikleri

https://www.youtube.com/watch?v=9NZP6d-CHp8

Kral ve Ben 12. Bölüm Global ekonomik krizin etkileri TEK PART

https://www.youtube.com/watch?v=qS1ItM9GRyQ

Kral ve Ben 13. Bölüm – Çizgi Roman’ın Sosyopolitik Etkileri

https://www.youtube.com/watch?v=VAALLgjhdxY

Kral ve Ben 14. Bölüm – Yeni Dünya Düzeni’nde Afrika’nın Rolü

Kral ve Ben 15. Bölüm Uçak Kazaları ve hayatta kalma teknikleri TEK PART

https://www.youtube.com/watch?v=u5mxTKADk-s

Kral ve Ben 16. Bölüm Japonya — Türkiye ilişkileri TEK PART

https://www.youtube.com/watch?v=i7Fp0tLV6BQ

Kral ve Ben 17 Bölüm Yeni dünya düzeninde Afrikanın rolü Tek Part

https://www.youtube.com/watch?v=RS0CR_OmOhg

Kral ve Ben 18. Bölüm Çizgi Romanın sosyopolitik etkileri ve Illuminati’yle ilişkisi TEK PART

https://www.youtube.com/watch?v=MBJbSE2seY4

Kral ve Ben 19. Bölüm Tarih yeniden yazılıyor: Sümerliler TEK PART

https://www.youtube.com/watch?v=WGLctvtEQ08

Kral ve Ben 20. Bölüm Ortadoğu nasıl şekil aldı ? TEK PART

https://www.youtube.com/watch?v=STSIg36M6OU

Kral ve Ben 21. Ufo fenomeni TEK PART

https://www.youtube.com/watch?v=WZjupZ62mU4

Kral ve Ben 22. Futurism (Gelecek Bilimi) TEK PART

https://www.youtube.com/watch?v=G94P6VbmzVY

Kral ve Ben 23. Bölüm Geleceğe projeksiyon ve Yapay Zeka TEK PART

https://www.youtube.com/watch?v=Fsn83XWJDRg

Kral ve Ben 24. Ermeni sorunu ve Gerçekler TEK PART

https://www.youtube.com/watch?v=UT3O7W0a1_A

Kral ve Ben 25. Türk Emniyet Teşkilatı ve Sanal Suç TEK PART

https://www.youtube.com/watch?v=YHRh1dfXZ2w

Kral ve Ben 26. Bölüm Deccal Tabakta: GDO (Genetiği Değiştirilmiş Organizmalar) Tek Part

https://www.youtube.com/watch?v=2UbgXjyY29k

Kral ve Ben 27. Bölüm Ekopolitik ve Politik Psikoloji TEK PART

https://www.youtube.com/watch?v=Ia3dMbAzyoY

Kral ve Ben 28. Bölüm Dünyadaki son gelişmeler ve ekopolitik analiz TEK PART

https://www.youtube.com/watch?v=hFflKSqM65c

Kral ve Ben 29. Bölüm Yakın tarihin ışığında günümüzü farklı okumak TEK PART

https://www.youtube.com/watch?v=Og2dwUBLJ7A

Kral ve Ben 30. Bölüm İnsanoğlu aya gerçekten çıktı mı ve İslam’da hurafeler TEK PART

https://www.youtube.com/watch?v=bGjR-Eyx8JQ

Kral ve Ben 31. Bölüm Sigara ve silah sanayisini kim yönetiyor. Tek

https://www.youtube.com/watch?v=olgpO49vgbc

Kral ve Ben – 32.Bölüm – Eski Bölümlerden Derleme (TEK PART)

https://www.youtube.com/watch?v=77bqyWBv84U

Kral ve Ben 33.Bölüm Dünya ekonomisini kim yönetiyor ? TEK PART

https://www.youtube.com/watch?v=QBh-9bNCyMw

Kral ve Ben 34. Bölüm Kuran’da Uzay ve varlık ayetleri

https://www.youtube.com/watch?v=v8s0Mi8HG6A

Kral ve Ben 35. Bölüm Mehdi, Mesih ve Deccal TEK PART

https://www.youtube.com/watch?v=VUu_QVKu0-I

Kral ve Ben 36 Bölüm Şeytan, cinler, büyü, fal, kehanet ve reenkarnasyon TEK PART

https://www.youtube.com/watch?v=vezZXhsPKj8

Kral ve Ben 37 Bölüm Konu: Kolaj (Derleme Bölüm) TEK PART

https://www.youtube.com/watch?v=XEd6aDMb_C4

Kral ve Ben 38 Bölüm Yeni dünya düzenine ekopolitik bir bakış TEK PART

https://www.youtube.com/watch?v=8vQ1khfYcJo

Kral ve Ben 39 Bölüm Aytunç Altındal kimdir ve dünyayı yöneten gizli güçler…

https://www.youtube.com/watch?v=cS8lr9TFqWE

Kral ve Ben 40. Bölüm Dünyanın gizli güçleri ve ilahi örtülü savaş ? TEK PART

https://www.youtube.com/watch?v=eGcMfl7xLzw

Kral ve Ben – 41. Bölüm – Dünya Dışı Varlıklar Tarafından Alıkonulma Olayları (TEK PART)

https://www.youtube.com/watch?v=orlOWAxSSAA

Kral ve Ben 43. Bölüm Türk dilinin tarihsel yolculuğu TEK PART

https://www.youtube.com/watch?v=JLZ_pe04s54

Kral ve Ben – 44.Bölüm – Dış Politikada Yeni Stratejiler (TEK PART)

https://www.youtube.com/watch?v=W31-1KPA2b8

Kral ve Ben 45 Bölüm Türkiye’de kültür ve turizm politikaları Tek Part

https://www.youtube.com/watch?v=utF_EYmb_is

Kral ve Ben 46.Bölüm Türk turizmi ve sorunları TEK PART

https://www.youtube.com/watch?v=zov8gkk5S8M

Kral ve Ben 47.Bölüm Barnabas İncili TEK PART

https://www.youtube.com/watch?v=UsEpqkbHtiI

Kral ve Ben 48. Bölüm Müfit Yüksel Kürt Sorunu TEK PART

https://www.youtube.com/watch?v=xtlnjQL4JB0

Kral ve Ben (Biz Geleceğiz) 49. Bölüm TEK PART

https://www.youtube.com/watch?v=f9vi1UPjGSg

Kral ve Ben 51. Bölüm Biz Geleceğiz Ortadoğu

https://www.youtube.com/watch?v=SJep_0qy1Zc

Kral ve Ben 52.Bölüm (Biz Geleceğiz) TEK PART

https://www.youtube.com/watch?v=jobJgXqaG-4

Kral ve Ben 53. Bölüm Dünyayı yönetenler sinema endüstrisini nasıl kullanıyor ?

https://www.youtube.com/watch?v=BUbku4tNnm0

Kral ve Ben 54.Bölüm Azerbaycan Hocali Katliamı

https://www.youtube.com/watch?v=rPB24gX5Mq0

Kral ve Ben 55.Bölüm Türk dış politikasında Dünyaya ve Orta Doğu’ya bakış TEK PART

https://www.youtube.com/watch?v=sPF6KJu9Fn4

Kral ve Ben 56. Bölüm Tarihin Bilinmeyen Yönleriyle İSTANBUL (Tek Part)

https://www.youtube.com/watch?v=Le3uOW0u2Ck

Kral ve Ben 57. Bölüm Dünya tarihindeki suikastler TEK PART

https://www.youtube.com/watch?v=hVN08BfEErs

Kral ve Ben 58. Bölüm Genetiği değiştirilmiş organizmaları kim yönetiyor TEK PART

https://www.youtube.com/watch?v=H1HNdze8kQk

Kral ve Ben 59. Bölüm Ertan ÖZYİĞİT ile Ata NİRUN Gizemli Dosyalar

https://www.youtube.com/watch?v=x6njhT7hdd8

Kral ve Ben 60.Bölüm Ertan ÖZYİĞİT ile Volkan Kemal ERGENEKON Cin ve Büyüden Kurtulma Yöntemleri

https://www.youtube.com/watch?v=SHqd64b53vo

Kral ve Ben 61. Bölüm Ertan ÖZYİĞİT ile Ata NİRUN Gizemli – Kayıp Uygarlıklar

https://www.youtube.com/watch?v=xF0EYH6XD1A

Kral ve Ben 62. Bölüm Ertan ÖZYİĞİT ile Serhat Ahmet TAN – Dinler Tarihine farklı bir bakış

https://www.youtube.com/watch?v=sRG51LMhc5Q

Kral ve Ben 63. Bölüm Ertan ÖZYİĞİT ile Prof. Dr Hasan KÖNİ – Batı hakimiyetinin çöküşü

https://www.youtube.com/watch?v=jjVx2-4jNBA

Kral ve Ben 62. Bölüm Ertan ÖZYİĞİT ile Serhat Ahmet TAN – Dinler Tarihine farklı bir bakış

https://www.youtube.com/watch?v=sRG51LMhc5Q

ARAŞTIRMA DOSYASI : The FBI Stay-Behind Special Agent Program in Alaska


2016-08-14_14-37-13

Background

Between 1950 and 1951, the FBI was involved in planning for and beginning to implement a program to identify and train personnel who would act in a clandestine capacity in Alaska should the USSR invade the area.

This Stay Behind Agent Program, also called STAGE by the FBI, was to be done in concert with other government agencies. The FBI abruptly ended its involvement in September of 1951; the reason why is not indicated in the materials released.

Declassified Documents

Air Force Office of Special Investigations (AFOSI)

pdf.gifAir Force Office of Special Investigations (AFOSI) Declassified Documents [703 Pages, 26.9MB] – Special thanks to GovernmentAttic.org for receiving this batch of documents.

Federal Bureau of Investigation (FBI) Declassified Documents

pdf.gifFederal Bureau of Investigation (FBI) Declassified Documents [382 Pages, 282MB]

pdf.gifFederal Bureau of Investigation (FBI) Declassified Documents “Vault Release” [1,626 Pages, 69.9MB] – These are the documents released by the FBI and placed online in their “Vault”. They may overlap with the above, but wanted to add them here to ensure all documents released were available for download.

MK ULTRA PROJECT /// MK (Mind Kontrolle) Ultra Program : PsyOps & Satanic Infiltration


LİNK : http://www.youtube.com/watch?feature=player_embedded&v=vorz81iVFQk

Child Protection & Safety Resources /// by Jerry McMullin, M.A., M.L.I.S.

LİNK : http://www.saferchildren.net/mindcontrol/blogs.html

LİNK : http://www.youtube.com/watch?feature=player_embedded&v=QK2Yoz8M8uw

fr: Thanks For The Memories – Brice Taylor

The Council members were kingpins of drug coordination and money laundering down through specific American corporations in order to get political favors and laws enacted in their favor to keep their top companies. AT&T was one of them. The Council insured the financial success of these companies so they could continue using them as fronts for their operations. The Council is at the top of the power brokers. Each President went along with them or they are killed like JFK was. “Many, many people are under mind control and have been working for them for years – men and women who are dentists, attorneys, stockbrokers, doctors, psychiatrists, psychologists, politicians, bankers, corporate heads, engineers, newspaper editors or owners, nurses, teachers, principals, etc. etc. etc. And all these programmed people are used to further “the cause,” each placed in strategic positions for use by the Council. The technology available is so advanced that most people couldn’t even dream of it. It far surpasses anything yet seen on sci-fi movies or read about in books — total automation, even of people.”[MUST SEE: Offit Orac Blair]

The Council plans are to have a robotic working class that won’t cause any problems, but will simply work to supply the needs of the Elite-those who by their breeding and intellect are deemed worthy of being allowed to be “awake” so they can rule, live and create without any interference from the common man. They say that the working class already makes non-thinking robots of their own everyday lives, and it might as well be more planned and regulated so that others who want to create, invent, and otherwise use their minds, can do so without hindrance from the common man.

They view the “common man” with great disdain as a lower form of the human species. And they figure that by the time the year 2000 rolls around, when the purse cinches shut, and they are in full control, that people will already be sufficiently conditioned and won’t even be able to think to figure out or even be aware that a change has taken place. They see it as the perfect cover up for the continuation of the experiments in mind control they have participated in and feel very assured that the public will never be able to discover what happened because the more intelligent pubic has been sufficiently “tamed” and conditioned to go along with the rest of the herd.

As I explained before, the Council is made up of a secret and powerful group of men who are not public and meet in the shadows. Their true power and ability to rule over the masses comes from the fact that they are publicly unknown. They exist in their own environments, with little outside contact. But they have many highly tested, tried and true programmed or aligned individuals who go out and do their work, bringing back the information they need, making the contacts necessary to insure the success of their mighty plan for world domination. They have the power to insure the election of a President, to bring a celebrity to fame, to decide the fate of a nation, to bring about war, to incite riot, to bring down whole cities or countries, to kill out a certain ethnic race, to introduce a new chemical into the food of the masses for control, to loose upon a community a new virus, to decide which people are to live and which are to die. They gave direction to people like Ronald Reagan, George Bush [Scherff], Henry Kissinger and the Rockefellers, but they are not ignorant enough to allow a public identity to make them vulnerable to any kind of investigation or public knowledge of their lives and their purpose. They seek people out in their own time; people don’t contact them. Sometimes the contact comes in the form of another person slipping a message in or telling someone to be at a certain place at a specified time, but their whereabouts is not ever known. And to report this to you, I had to dismantle lots of death programming that was installed in an attempt to keep me from remembering any of this.

fr: Thanks For The MemoriesBrice Taylor

“The Tavistock Institute of Human Relations was set up in London in 1921 to study the “breaking point” of humans. Kurt Lewin, a German psychologist, became the director of the Tavistock Institute in 1932, about the same time Nazi Germany was increasing its research into neuropsychology, parapsychology and multigenerational occultism. Interestingly, a progressive exchange of scientific ideas was taking place between England and Germany, most notably in the field of eugenics: the movement devoted to “improving” the human species through the control of hereditary factors in mating. “

* * *

Intheknow7 BLOG Purpose:

Dr. Sigmund Freud– Rothschild

s “Mind Science” Monster

1) Establish diabolical MK-Ultra Monarch Mind Control Program has NEVER been discontinued, but ingrained in our culture via Tavistock (TBRI), chiefly in entertainment/music industry/academia/science/medicine. It operates w/full support of U.S. Congress (foreign gov’ts also), w/budgetary authority residing w/ Senate Appropriations Committee — it’s Chairman until March 2010 was former Klu Klux Klansman Sen. Robert C. Byrd positively ID by Cathy O’Brien in “Tranceformation of America” as her master/programmer/owner !Sen. Byrd was the longest serving member of the Senate. The program, as originally intended is fully supported by Military-Intel-Hollywood-Political-Behavorial Science apparatus, incl. but not limited to: NSA, DoD, CIA, FBI, USJFCom, USA, USMC, USN, Defense Intel Agency, Office Naval Intel…

Mind Kontrolle is the core of U.S. State Dept. (foreign policy) as well as worldwide Behavioral Sciences (Mental Health) Industry (Tavistock); The purpose of Hollywood, Music Industry (Media) Operates fr select military bases, select universities, hospitals, Catholic Girls School System (esp. secondary level) orphanages and private estates…

2) Assist readers to recognize Mind Kontrolle Prog’mg Modes in “pop” culture; geopolitical arena (my specific area of interest) and where I feel my knowledge base is strongest…

Reichsfuhrer-SS Heinrich Himmler; Jesuit Papal Knight

3) Provide additional research material (see sidebar). We (Esoteric Kitten) will always attempt to provide links and encourage readers to leave comments in comment section. Obviously we cannot respond to all, but will direct readers toward others more knowledgeable than ourselves. In recent years more survivors of Monarch Prog’mg have begun the slow and painful process of “memory recovery” and have come forward with greater regularity — more information is gained w/ each survivors testimony. I strongly urge readers study this horrific mind science with eyewitness accounts from: Cisco Wheeler, Cathy O’Brien, Brice Taylor, Fritz Springmeier (currently incarcerated on false charges) Rosanne Barr, McKenzie Phillips and others – these people “were there” and have inside knowledge of the sadistic nature of our leaders. Please be mindful, great efforts have been taken, by powerful forces to suppress information of MK-Ultra Mind Control — all “information gaps” simply cannot be filledGMT does not want this Intel to reach “critical mass”…it would mean the end of their ability to “program” us! MK victims are ridiculed, bought off, scared off, killed off daily. This is very high on GMT agenda, and one of the biggest open secrets among “those in the know”, thus they spare no expense keeping a lid on ongoing MK-Ultra Mind Control Programming. The American public (sheeple) have been fleeced by the fraudulent IRS (Internal Revenue Service) to fund massive DoD expenditures which created an army of Mind Kontrolled Slaves/Human Robots worldwide — this is their ”master race”…

Allen Dulles: OSS/CIA Papal Knight

Families are used/abused by vicious Prog’mrs/Handlers to sell them out, luring them into traps. Sadistic individuals specialize in torturing re-captured Mind Kontrolled Slaves….

* * *

Gov’t attempts to control populations (subjects) through “mind control” is not new, however GMT perfected the practice during reign of Jesuit-Papal Third Reich. This blog attempts to shine the spotlight on MK-Ultra Mind Control during 20th century, specifically in the U.S. where the citizenry STILL believe that their leaders “care about them”…

We urge readers to research the following before attacking/dismissing Intel contained in this blog…just because you’re not aware of something, doesn’t mean it doesn’t exist…

It’s all about “genetic linkages” — GMT hides behind a multi-layered architectural structure of deceit, protected by NSA & Unified Intel Agencies, shielded by corporate controlled media, and bound by Occult-Masonic “blood oaths” funded by global banksters and “Bloodline Dynastic families” — they “hide in plain sight”

Joseph Mengele (aka Dr. Green, Angel of Death) Mind Kontrolle Prog’mr

MK-Ultra = Mind (Kontrolle) Ultimate or Ultimate Mind Controlled Slave — a person who’s been subjected to horrible ritual trauma/torture (usually rape) for the specific purpose of creating multiple personalities (MPD) now classified as DID (dissociative identity disorder)

When a child is subjected to ritual rape/torture the mind “splits” or “fractures” as natural way to protect itself — this fracturing causes “alters” or “files” in the sub-conscious that can are called up as “personas” to used however they’ve been programmed. All females receive Beta programming where “cat/kitten” alters are created — this programming is “ANYTHING, ANYTHING, ANYWHERE, with ANYONE who has access codes “triggers” to activate different files, and “protective” files (alters) who don’t — “a man who doesn’t value his life messes w/me when my master isn’t around”…

MONARCH BUTTERFLY

Abridged from “Project Monarch: Nazi Mind Control – by Ron Patton

LİNK : http://www.youtube.com/watch?feature=player_embedded&v=5EkEa25ofHU

oau1) Scientists first discovered that human behavior is transferred from generations through genetic code (DNA) in the blood from the study of the monarch butterfly. Multi-generational “bloodline” families transfer their genetic code to their children, carefully selected on the basis of their ability to “dissociate”– meaning how much trauma/torture they can endure, the higher the tolerance, the more “alters” (files) can be created. MK’s have been diagnosed as DID (MPD) having thousands of “alters” (files) each file is a different “persona” to be used by GMT. MK’s have alters (files) for each assigned task, whether it’s using Beta Sex-Slave “cat/kitten” alters to seduce an individual for blackmail, downloading coded Intel, assassination, or paraded before the electorate as politicians who care about voters –they will perform the task w/stunning efficiency w/out displaying any emotion –they truly are human robots!

2) Electroshock trauma re-enforcement — when MK’s are subjected to electroshock, a feeling of weightlessness or floating like a butterfly is experienced — the image of the orange/black/white insect and those specific color combos act as re-enforcers…

3) Transformation or metamorphosis from one creature to another — from cocoon (dormant, standby mode) to butterfly (active, new creation) which will return to its point of origin (the programmer). Such is the migratory pattern that makes this species unique.

4) Brain image visualization — if one were to slice the skull from ear-to-ear, take a “top-down” image scan of the brain, it would resemble the pattern of butterfly wings

MK-Ultra Monarch Program was being perfected by Dr. Joseph Mengele (Dr. Green, Angel of Death) under Wild Bill Donovan, Allen Dulles OSS (Office of Secret Service, forerunner to CIA) British Intel MI6 and top SS Nazi officer Heinrich Himmler — conducted in Nazi concentration [human sacrificial] camps under general description of “experiments”…downplaying sadistic nature of what he, along w/others were actually creating — “a master race.” Yes, they achieved their goal; not that nonsense about “blond haired, blue-eyed” Aryan’s”, that was but a cover spread by unified Intel agencies, to conceal the truth of MK-Ultra Program. They had in fact, perfected the creation of human robots who would without question perform on command the most depraved, heinous acts, serve as their personal army of human carrier pigeons, perform as highly skilled sex slaves, all while entertaining masses as singers, dancers, actors and athletes. Countless subjects died under Sigmund Freud, Mengele, Himmler’s brutal “mind science horrors…

Operation Paper Clip: CIA Op to smuggle Nazi officer core to Russia, Britain (UK), Latin America and U.S. in order to continue Mind Control experimentation on a global scale. The Papacy was instrumental in this massive undertaking to preserve Nazi core leadership, engineers and Mind Kontrolle scientists. (Vatican Ratlines)

Tavistock Behavioral Research Institute in City of London: worlds premiere Mind Control Facility where Mind Control is perfected, by the worlds top behavioral scientists, neurosurgeons, psychiatrists, pharmacologists. This “black art” is not only used to program (control) individuals, but entire nations. Founded in London in 1947 (same year as NSA was established in U.S.) w/aid of a grant from the Rothschild agents, the Rockefeller Foundation — Address: 30 Tabernacle Street
London EC2A 4UE; Email:Tel: +44(0)20 7417 0407 ; Fax: +44(0)20 7417 0566 click here for Official Tavistock website

National Security Agency (NSA) a.k.a. “The Puzzle Palace” founded “formally” in 1947 (was in operation since 1921) to provide military cover for MK-Ultra Monarch Prog’mg — exported to America from Tavistock Behavioral Research Institute in London – NSA is primary gov’t agency in control of MK-Ultra Monarch Program in U.S. — serves as nerve center of abominable program in U.S. today… click here to see behind the banner of “National Security”

China Lake Naval Air Weapons Station (NAWS) California – primary MK-Ultra Monarch Prog’mg center in U.S. where children are brought in by car, rail, plane and programmed by top neurosurgeons, behavioral scientists, psychiatrists for different roles in society.

Stanford Research Institute (SRI)American branch of Tavistock Behavorial Reseach Institute in City of London, functions as premiere MK institution in U.S. — trains NSA/CIA officials …

False Memory Syndrome Foundation

[Integral part of multi-layered architectural structure providing cover for MK-Ultra Monarch Prog. Functions as massive “dis-info” org. Founded/funded/operated by those atop of Behavioral Sciences Industry as response to testimony of MK-Ultra Mind Controlled Survivors (Victims) reaching “critical mass” classic “PsyOps” trade-craft. Ed.]

fr: ” Illuminati Formula To Create A Totally Undetectable Mind Controlled Slave” — Cisco Wheeler/Fritz Springmeier – False Memory “Spin-drome” Foundation Hq — 3401 Market St., Suite 130, Philadelphia, PA 19104. Some of the original founders were doctors of Univ. Pennsylvania — inside story about these early FMS doctors of Univ. Pennsylvania is they practiced Satanic Rituals during their work days. What is unusual about this — is that generally satanic rituals are performed at night, but these doctors did their coven work during daylight; now you can see why these men started the FMS! They started it to cover their own sins, because many of them were abusers themselves. In other words many of the EMS people are abusers of trauma-based mind-controlled slaves, or the victims of abuse who are in denial about their own abuse from trauma-based mind-control. Martin T. Orn (credited w/ founding FMS and known CIA-asset). classic “fox in hen house…”

Two members of the EMS advisory board, Ralph Underwager, Ph.D. and theologians along with Hollida Wakefield, M.A let the cat out of the bag when they publicly supported pedophilia in an interview with a Dutch magazine Paidika, The Journal of Pedophilia (Winter,1993). A conspiracy by the perpetrators of mind-control, because conspiracies supposedly don’t and can’t happen, they want us to believe that all therapists are conspiring together to implant false memories of abuse into their clients, which could not be further from the truth.”

Iconic Oz-Dorothy identifying & triggering “ruby red slippers”; bejeweled pentagram wand

fr: Thanks For The Memories – Brice Taylor

“Ritual abuse is a brutal form of abuse of children, adolescents, and adults, consisting of physical, sexual and psychological abuse, and involving the use of rituals. Ritual does not necessarily mean satanic. However, most survivors state that they were ritually abuse as part of satanic worship for the purpose of indoctrinating them into satanic beliefs and practices. Ritual abuse rarely consists of a single episode. It usually involves repeated abuse over an extended period of time. [Moderator makes no distinction between satanic and non-satanic ritual abuse, any form of abuse involving children of any age is of satanic origin]Ed.

The physical abuse is severe, sometimes including torture and killing. The sexual abuse is usually painful, sadistic, and humiliating, intended as a means of gaining dominance over the victim. The psychological abuse is devastating and involves the use of ritual/indoctrination, which includes mind control techniques and mind altering drugs, and ritual/intimidation which conveys to the victim a profound terror of the cult members and of the evil spirits they believe cult members can command. Both during and after the abuse, most victims are in a state of terror, mind control, and dissociation in which disclosure is extremely difficult.”

Los Angeles County Commission For Women, 1991; Neurofeedback and Other Interventions for Patients with Ritual Abuse, Mind Control, and Dissociative Disorders by Susan Ford (Brice Talyor)

They believe they have learned what form of government would work best by installing different varieties of governments in different countries with leaders they chose, studied, and watched to see which form would be likely to meet their needs in the year 2000 and beyond. They saw different national governments as ‘projects.’ For awhile, they thought communism would be the best, until the mind control technology showed them they could covertly rule the masses without communism. With this technology, they believe they can rule the masses easily and effortlessly, and governing can be limited because they feel all of the elite will have much the same wants, needs, and goals. They already have the central banking system in place and have a master plan for the laws, rules, and regulations that will govern those that are left…

* * *

Alters and Triggers

An easy way to explain this convoluted victimization of body and soul is by looking at it as a complex computer program: a file (alter) is created through trauma/torture, repetition and reinforcement. In order to activate (trigger) the file, a specific access code or password (cue or command) is required. The victim/survivor is called a “slave” by the programmer/handler, who in turn is perceived as “master” or “god.” About 75% are female, since they possess higher tolerances for pain and tend to “dissociate” easier than males. Subjects are used mainly for covert operations, prostitution, under ground porno; entertainment industry is FULL of Monarch Slaves.

There are an inordinate amount of alters in the victim/survivor with numerous back-up programs, mirrors and shadows. A division of light-side (good) and dark-side (bad) alters are interwoven in the mind and rotate on an axis. One of the main internal structures, (of which there are many) within the system is shaped like a double-helix, consisting of seven levels. Each system has an internal programmer which oversees the “gatekeeper” who grant or deny entry into the different “rooms”.

Mental images of internal systems predominately seen by victims/survivors are:

Trees, Cabalistic “Tree of Life,” with adjoining root systems, infinity loops, ancient symbols/letters, spider webs, mirrors or glass shattering, masks (esp. porcelain), castles, mazes, demons/monsters/aliens, sea shells, butterflies, snakes, ribbons, bows, flowers, hour glasses, clocks, robots, chain-of-command diagrams , schematics of computer circuitry boards…[think how many times the reader has seen these images projected in movies, on television?]Ed.

Levels of Programming

ALPHA – ”general” or regular programming within base control personality; characterized by extremely pronounced memory retention [photographic] along w/ substantially increased physical strength/visual ability. Alpha programming is accomplished through deliberately subdividing the victims personality which, in essence, causes a left brain-right brain division, allowing for a programmed union of L and R through neuron pathway stimulation.

BETA – referred to as “sexual programming” — this programming eliminates all learned moral convictions and stimulates the primitive sexual instinct, devoid of inhibitions. “Cat” (Kitten) alters come out at this level. [this accounts for the pervasiveness of "kitten" or "cat" imagery surrounding models, actors, actresses and musical artists]

DELTA – known as “killer programming”, originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, CIA/Mossad/MI6/KGB, etc.) in covert operations. Optimal adrenal output / controlled aggression is evident. Subjects are devoid of fear; systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.

THETA – considered “psychic programming”. Bloodliners (from multi-generational Satanic families) were determined to exhibit a greater propensity for having telepathic abilities than did non-bloodliners (non-hierarchical). Due to its evident limitations, however, various forms of electronic mind control systems were developed and introduced, namely, bio-medical human telemetry devices (brain implants), directed-energy lasers using microwaves and/or electromagnetic — these are used in conjunction with highly-advanced computers and sophisticated satellite tracking systems.

OMEGA “self-destruct programming”, also known as “Code Green.” The corresponding behaviors include suicidal tendencies and/or self-mutilation [cutting]. This program is generally activated when victim/survivor begins therapy or interrogation and too much memory is being recovered.

GAMMA – Another form of system protection is through “deception” programming, which elicits misinformation and misdirection. This level is intertwined with demonology and tends to regenerate itself at a later time if inappropriately deactivated.

Kurt Lewin

Methods & Components: Initial process begins w/ creating “dissociation” within subject, usually occurring from birth to about 6yrs [the formative years] — primarily achieved through electroshock (ECT) and at times performed even when child is in mother’s womb (in-utero) — Due to severe trauma induced through ECT, sexual abuse and other methods, the mind splits off into alternate personalities from the core. Formerly referred to as Multiple Personality Disorder (MPD), it is presently recognized as Dissociative Identity Disorder (DID) and is the basis for Monarch programming. Further conditioning of victim’s mind is enhanced through hypnotism, double-bind coercion, pleasure-pain reversals, food, water, sleep and sensory deprivation, along w/ various drugs which alter certain cerebral functions.

The next stage is to embed and compress detailed commands or messages within specified alters. This is achieved through the use of hi-tech headsets, in conjunction w/ computer-driven generators which emit inaudible sound waves or harmonics that affect RNA covering of neuron pathways to the subconscious and unconscious mind. “Virtual Reality” optical devices are sometimes used simultaneously w/ harmonic generators projecting pulsating colored lights, subliminal and split-screen visuals. High voltage electroshock is then used for memory dissolution.

Programming is updated periodically and reinforced through visual, auditory and written mediums. Some of the first programming themes included “The Wizard of Oz”and “Alice and Wonderland” produced by the Disney family, both heavily saturated w/ occult symbolism [these programming modes are still used and Disney imagery is pervasive, not only in U.S. but has a global presence, they’ve also become one of the largest media empires on the planet] Disneyland in California and Disney World in Orlando are still used as MK programming centers…

MARIONETTE (DOLL) Programming (WARNING GRAPHIC)

fr: Illuminati Formula To Create An Undetectable Totally Mind Controlled Slave – Cisco Wheeler/Fritz Springmeier

“The painful rape of a child with its legs held in a butterfly configuration is used to get butterfly alters. To create a puppet, drugs are administered which paralyze the child. Then electro-shock is applied to certain muscles upon the command of the programmer. The effect is that the child has no control over his body, and the programmer can make the child’s body parts jerk and move by electro-shocking the muscles. The child actually becomes the puppet of the programmer. This is a very powerful program.”

“One of the names connected with Monarch programming is Marionette Programming. The child literally becomes a Marionette. This concept appears to have been cooked up by the Germans under Hitler. An alter system as a child is physically shown that they are a marionette puppet. Their muscles are electro-shocked in such a way as to take advantage of the natural reflexes. When electro-shocked that way, the victim’s body parts jerk out of our control at the whim of the programmer to prove to the victim that they are a puppet. At this time, the rules are given and rule number (8) is that the alters are their puppet. Illuminati programmer Dr. [Joseph]Mengele[Dr.Green] used puppets in a dollhouse as he programmed. He did skits with his puppets. “Dance Marionette dance,” he’d say in his thick German accent. Pinocho’s story was used to name the spirit guide Jimney Cricket. Along with rule no. (8) he taught the following rules at this point: (1) Listen to your instructions (2) There is no room for error (3) “The Game Timer”, these were the specifics of how to move, the melted mirror, etc. (4) There is a chain of command, the King’s men (5) Your Master would chart your course (6) You will receive orders, what to do, a memorized script to follow and fulfill (7) The Creator and Master would always own you into infinity (8) You are puppets on a string. “Dance Marionette dance. You are to speak only those words told to you, and to only speak those words when your string is pulled (9) There is no room for questions (10) The controller always plays the role of the White Rabbit. Dark side alters of a System are taught to know these rules as part of their being.”

* * *

Since partnership w/ Esoteric Kitten this blog extended its focus to incl. Monarch Mind Kontrolle Prog’mg in Pop Culture. Numerous other sites w/excellent analysis just a click away in blogroll…

Blatant Marionette (Doll) Prog’mg w/recording artist Mariah Carey who has Monarch Butterfly motif imprinted on her entire career (appears w/Nicki Minaj another Mind Kontrolle Slave)

LİNK : http://www.youtube.com/watch?feature=player_embedded&v=5i7GEMQC2IY

Note: robotic eye fluttering (mimicking flapping butterfly wings); breaking out of “doll” packaging; butterfly imagery everywhere; Monarch Color Coding (orange, black,white); identifying & triggering; also appearing w/BETA Sex Kitten Nicki Minaj

* * *

The “White Rabbit” in Disney’s primary MK Prog’mg film “Alice In Wonderland” re-enforces programmer ALTERS (files) and so does the Playboy bunny logo for Hugh Hefner’s MK factory Playboy Enterprises Pres. Model MK’d Marilyn Monroe, was first cover girl. Palms Hotel Towers in Vegas has (6) suites above huge Playboy bunny (“White Rabbit”=Programmer) w/enclosed “glass” partitioned balcony/diving platforms protruding from building, used for “dissociative”/trauma reinforcement i.e. falling/heights (acrophobia) sense of floating on air (electroshock re-enforcement) all used in Monarch Prog’mg…

Pseudo Occult-Media

Esoteric Kitten You Tube & Blog (Big Screen Deception)

view fr pool of Hugh Hefner Sky Villa; Palms Hotel in Vegas; also serves as “Aerial Trauma Reinforcement Platform”

“Hey Kitty, check out the view — imagine falling from this height…”

Hugh Hefner

s MK trauma/torture re-enforcement platform

Palms Hotel w/ (6) trauma/torture platforms above “white rabbit” Prog

MK-Ultra Monarch Programmer/Handler, Zionist-Mishpucka Hugh Hefner has enriched himself as America’s # 1 MK Pimp for over 50yrs by supplying Global Management Team and whoever else has codes “triggers” and enough money to afford “state of the art” Oz-Dorothy, Jewel prog’md DID (MPD) lovelies — this NSA-CIA asset w/his degree in psychology (read Monarch Mind Control expert) controls an army of Beta-trained Sex Slaves available for blackmail, espionage, underground porn (pedophilia, bestiality, necrophilia, snuff films etc.) and whatever else their ”alters” (mind files) are programmed for. Hefner works closely w/MK Prog’mr/handler Heinz (Henry) Kissinger, and operates under full protection of NSA/CIA military-apparatus…

Abridged from “Project Monarch” : Nazi Mind Control, Ron Patton

Disney movies and cartoons are used in a two-fold manner:

  • desensitizing the majority of the population, using subliminals and neuro-linguistic programming
  • deliberately constructing specific triggers and keys for base programming of highly-impressionable Monarch children

A prime example of how subliminal programming works is by looking at the recent Disney cinematic sensation Pochahontas, curiously billed as their “33rd” (highest degree in Scottish Rite Freemasonry) animated movie.

In the movie, Grandmother Willow is a mystical 400 year old tree who counsels motherless Pochahontas to listen to her heart and help her realize all the answers lie within. Grandmother Willow is constantly talking in “double-speak” and using “reversals” (i.e. “Sometimes the right path is not the easiest one”; the esoteric derivative being: the left path [the path that leads to destruction] is the easiest one.

In Illuminati Structured MPD Systems, the willow tree represents the occultic powers of Druidism. The intrinsic imagery of the tree’s branches, leaves and root systems are very significant, as some of the dark spiritual proper ties associated with the Willow Tree Programming are:

(1) The branches are used to whip victims in rituals for “cleansing” purposes

(2) A willow tree can endure severe weather disturbances (i.e. storms) and is known for it’s flexibility. Victims/Survivors of programming describe the willow’s branches wrapping around them, with no hope of escape.

(3) The deep root system of the willow tree makes victim/survivor feel as if they are falling deeper and deeper into an abyss while in a hypnotic trance.

Music plays an instrumental role in programming, through combinations of variable tones, rhythms and words

Frightmeister Stephen King’s numerous novels and subsequent movies, are purported by credible sources to be used for such villainous purposes. One of his books, “Insomnia”, features a picture of King w/trigger phrase “WE NEVER SLEEP,” (indicative of someone with MPD/ DID) below an all-seeing eye [Masonic].

Partial list of other mediums used to reinforce base programming are:

Pinnochio, Sleeping Beauty, Snow White, Beauty and the Beast, Aladdin,The Little Mermaid, The Lion King,E. T., Star Wars, Ghost Busters, Trancers II, Batman, Bewitched, Fantasy Island, Reboot,Tiny Toons, Duck Tails,The Dead Sea Scrolls ,The Tall Book of Make Believe. A few movies which depict or portray some aspect of MONARCH programming are Hell raiser 3, Raising Cain, Labyrinth, Telefon, Johnny Mneumonic, Point of No Return, The Lawnmower Man and Closet Land. [Parents had better start paying attention to what type of entertainment you’re providing your children with…they are being mind controlled!]

Programmers and Places

It’s difficult to pinpoint exactly who the original programmer of this satanic project was, due to substantial ongoing campaign of disinformation, misinformation and outright lies propagated by GMT …

China Lake Naval Air Weapons Stations (NAWS) #1 MK Program Center in U.S.; virtual assembly line of Monarch Slaves for Hollywood/Vegas/Porn Industry

Two that went by color-coded names are Dr. Green (Joseph Mengele a.k.a. Angel of Death) and Dr. Gruenbaum, who collaborated w/ Nazis during WW2 – Dr. Josef Mengele, whose trademark of cold blooded, calculating brutality has not only scarred souls of survivors from Auschwitz, but countless number of victims throughout the world. Mengele’s direct involvement at Auschwitz concentration camp was downplayed during Nuremberg Trials, and consequently no intensified effort by U.S. and it’s allies was directed toward his capture…not surprising! To confuse investigators as to his whereabouts, U.S. officials would report Mengele being a non-threatening recluse in Paraguay or Brazil, or that he was simply dead (the “Angel of Death” miraculously must have come back to life at least five different times). His unprecedented research, at the expense of thousands of lives, undoubtedly was a significant bonus to U.S. interests. Besides using the pseudonym of Dr. Green, survivors knew him as Vaterchen (daddy), Schoner Josef (beautiful Joseph), David and Fairchild. A gracefully handsome man of slight stature, Mengele would disarm people with his charming demenor, then explode into violent rages. Other characteristics remembered by survivors were the cadence of his shiny black boots as he paced back and forth and his “I-love-you, l-love-you-not” daisy game. When he pulled off the last daisy petal, he would maliciously torture and kill a small child in front of the other child he was programming. Distraught survivors also recalled being thrown naked into cages with monkeys sexual attacking them. Evidently, Mengele enjoyed reducing people to the level of animals. He also would purposely restrain his victims from crying, screaming, or showing any excessive emotion.

Dr. D. Ewen Cameron [aka Dr. White] was former head of the Canadian, American & World Psychiatric Associations. CIA’s Allen Dulles funneled millions of dollars throughout organizations like The Society For The Investigation of Human Ecology, which Cameron ruthlessly presided over. Experimentation was conducted at several locations in Montreal, mostly at McGill University, St Mary’s Hospital and Allan Memorial Institute, under the guise of treating mental retardation. Besides conventional methods of psychiatric tyranny, such as electroshock drug injections and lobotomies, Cameron conceived the technique of “psychic driving,” wherein unsuspecting patients were kept in a drug induced coma for several weeks and administered a regimen of electroshocks, while electronic helmets were strapped to their heads and repetitive auditory messages were transmitted at variable speeds. Many of those exploited were abused children which had been run through the Roman Catholic orphanage system for children for Monarch Prog] Not surprisingly, Dr Cameron has been conveniently left out of most psychiatric journals. This may have been, in fact, largely due to Project MK-ULTRA being publicly exposed in 1970, through lawsuits filed by Canadian survivors and their families. The CIA and Canadian government settled out of court so as not to be required to officially admit to any wrongdoing [victims were paid and told to shut their mouths,permanently]

A former U.S. Army Lt. Col. Michael Aquino, in the DIA’s psychological Warfare Division, was the latest in a line of alleged government-sponsored sadists. Aquino, an eccentric genius obsessed with Nazi pagan rituals, founded the Temple of Set , an offshoot of Anton LaVey’s Church of Satan. Aquino was connected w/ Presidio Army Base day care scandal, in which he was accused child molestation. Much to the dismay of the young victims’ parents, all charges were dismissed. Code-named “Malcolm”, Aquino was reported to have developed training tapes on how to create a Monarch slave and worked as a liaison between Government/Military Intelligence and various criminal organizations and occult groups in the distribution of MONARCH slaves. Heinrich Mueller was another important programmer who went under the code names “Dr. Blue” or “Gog.” He apparently has two sons who have carried on the trade. The original “Dr. Black” was Leo Wheeler, the nephew of deceased General Earle G. Wheeler, who was Commander Joint Chiefs of Staffs (JCS) during Vietnam War. (also MK Ultra Monarch Slave Cathy O’Brien’s uncle) Wheeler’s protégé, E. Hummel is active in the Northwest, along with W. Bowers (from Rothschild Bloodline, see Fritz Springmeier Bloodlines of The Illuminati).

Other MK-Ultra Mind Control Programmers

Dr. Sydney Gottleib, Lt. Col John Alexander, Richard Dabney Anderson (USN), Dr. James Monroe, Dr. John Lilly, Lt. Comdr. Thomas Narut, Dr William Jennings Bryan, Dr. Bernard L. Diamond, Dr. Martin T. Orne, Dr. Louis J. West, Dr Robert J. Lifton,Dr. Harris Isbel,Col. Wilson Green

ITK7: Not some nameless, faceless conspiracy, these are your military leaders, sadistic beasts that call for the sacrifice of your children, by fighting so-called enemies, they fund, in “pre-planned” wars, so they can further enrich themselves. Banksters loaning the world’s gov’ts money to conduct satanic rituals effecting genocide….

In order to keep MK-ULTRA from being easily detected, NSA-CIA segmented its sub-projects into specialized fields of research and development at universities, prisons, private laboratories and hospitals. Of course, they were rewarded generously w/ government grants and miscellaneous funding. [They also had their sycophants, ex-Director of CIA William(Bill) Casey and Bill Clinton offer smug apologies for this sinister program, while increasing military budgets to cover it’s costs!]

Names/locations of some major institutions involved in Monarch programming

Cornell, Duke, Princeton, UCLA, University of Rochester, MIT, Georgetown University Hospital, Maimonides, Medical Center,St. Elizabeth’s Hospital (Washington D.C.),Walter Reed Army Medical Hospital, Bell Laboratories, Stanford Research Institute (SRI), Mount Sinai, NY, New York Presbyterian, NY [Clinton treated here recently] Westinghouse Friendship Laboratories,General Electric, ARCO, Mankind Research Unlimited…

* * *

The “final product” was/is usually created on military installations and bases, where maximum security is required. Referred to as (re) programming centers or near-death trauma centers, the most heavily identified are: China Lake Naval Weapons Center (NAWS formerly NOTS) oldest and largest producer of MK’s, many shipped directly to San Fernando Valley and Vegas for immediate use in multi-billion dollar porn industry [oh you believed so many beautiful young girls had no other options in life?] China Lake functions as a virtual assembly line for porn industry and Vegas! A well known secret is Tiger Woods 1st “mistresses” Rachel Uchitel (Mispucka princess) is a fully-functioning MK’d Monarch Beta Sex Slave, as well as Elin Nordegren and many other TigerSluts — see Tiger Woods, Murder Inc. & Mishpucka Vegas Connection

The Presidio, Ft. Dietrick, Ft. Campbell, Ft. Lewis, Ft. Hood, Redstone Arsenal, Offutt AFB, Patrick AFB, McClellan AFB, MacGill AFB, Kirkland AFB, Nellis AFB, Homestead AFB, Grissom AFB, Maxwell AFB, Tinker AFB

other major MK prog’mg sites; Google locations and notice how ordinary looking they are…“camouflage and concealment”

  • Langley Research Center
  • Los Alamos National Laboratories
  • Tavistock Institute Behavioral Institute
  • Areas in or by Mt. Shasta, CA, Lampe, MO and Las Vegas, NV

Hollywood, Music Industry, Political & Military Realms FULL of Monarch Slaves

purchase @ Amazon

Sarah L. Palin is an UPGRADED Brice Taylor (2/11/64 Dr. Ewen Cameron a.k.a. Dr. White model) w/ Marionette (DOLL) Prog’mg, BETA Sex Slave (Kitten) ALTERS, “fully functional in all rooms” — controlled by Herr Heinz (Henry) Kissinger; Kissinger Associates, Inc., 350 Park Avenue, New York

MK ULTRA PROJECT : TELEGRAM İLE İLGİLİ HER ŞEY /// U.S. Government Mind Control Programs


MKULTRA and Other Documented U.S. Government Mind Control Programs

MKULTRA was a U.S. government research program on mind and behavior control which ran from the early 1950s into the 1960s. Rather than being terminated, though, MKULTRA was "rolled over" into other programs such as MKSEARCH. To dispense with such name-change games, MKULTRA is occasionally used to generically refer to U.S. government mind control operations, particularly those of the CIA.

 Parascope has some MKULTRA documents online, including the 1977 Senate MKULTRA hearing.

 The Ritual Abuse, Ritual Crime, and Healing site has online a listing of MKULTRA documents, including subprojects, in the John Marks Collection at the National Security Archive. The page does not give details of Subproject 119, which was a study of bioelectrical sensors, recording and analysis techniques, and "techniques of activation of the human organism by remote electronic means." Subproject 94 dealt with improving techniques already developed for "conditioning and control of animals" using "miniaturized stimulating electrode implants in specific brain areas."

"Non-Lethal" and Directed-Energy Weapons

Non-lethal (or nonlethal) weapons is a term used to describe weapons which can incapacitate, subdue, or alter the behavior of people without killing them or resulting in permanent harm. It is a misnomer, because the weapons can be lethal or crippling. Much of the recent publicity involves such weapons as bean bag guns and giant nets, which make for good public relations without revealing the more secretive technology. The real concern is electromagnetic and acoustic weapons (as well as chemical and biological agents), especially those that can be used covertly with "plausible denial."

 A Newsweek article from 1994, "Soon, ‘Phasers on Stun’" describes the push for so-called non-lethal arms.

…the list of exotic technologies that could be harnessed for nonlethal weapons is already large and growing. It includes lasers, microwaves, sound waves, strobe lights, electromagnetic pulses, microbes, chemicals, computer viruses — even giant nets…

…Sources tell Newsweek that the FBI consulted Moscow experts on the possible use of a Soviet technique for beaming subliminal messages to Koresh. The technique uses inaudible transmissions that could have convinced Koresh he was hearing the voice of God inside his head. The air force offered a top secret nonlethal system that, according to one source, "would have given [the FBI] the ability to make a surprise attack with a large number of agents." …

 Here is a recent U.S. News article, by Douglas Pasternak, on the newest generation of weapons in development. It is from July 1997, and is titled "Wonder Weapons: The Pentagon’s quest for nonlethal arms is amazing. But is it smart?"

By using very low frequency electromagnetic radiation — the waves way below radio frequencies on the electromagnetic spectrum — he [Eldon Byrd] found he could induce the brain to release behavior-regulating chemicals. "We could put animals into a stupor," he says by hitting them with these frequencies. "We got chick brains — in vitro — to dump 80 percent of the natural opioids in their brains,’"Byrd says. He even ran a small project that used magnetic fields to cause certain brain cells in rats to release histamine. In humans, this would cause instant flulike symptoms and produce nausea. "These fields were extremely weak. They were undetectable," says Byrd. "The effects were nonlethal and reversible. You could disable a person temporarily," Byrd hypothesizes. "It [would have been] like a stun gun."

Byrd never tested any of his hardware in the field, and his program, scheduled for four years, apparently was closed down after two, he says. "The work was really outstanding," he grumbles. "We would have had a weapon in one year." Byrd says he was told his work would be unclassified, "unless it works." Because it worked, he suspects that the program "went black." Other scientists tell similar tales of research on electromagnetic radiation turning top secret once successful results were achieved. There are clues that such work is continuing. In 1995, the annual meeting of four-star U.S. Air Force generals — called CORONA — reviewed more than 1,000 potential projects. One was called "Put the Enemy to Sleep/Keep the Enemy From Sleeping." It called for exploring "acoustics," "microwaves," and "brain-wave manipulation" to alter sleep patterns. It was one of only three projects approved for initial investigation.

 In February, 1998, the Joint Economic Committee of the U.S. Congress held hearings on Radio Frequency Weapons and Proliferation: Potential Impact on the Economy. These hearings dealt with anti-materiel weapons rather than anti-personnel weapons, but the testimony presented to the committee contains good general information on portable RF generation technology, etc.

 This pair of articles about non-lethal weapons appears in The Bulletin of the Atomic Scientists, Sept/Oct, 1994. The articles are "The ‘Soft Kill’ Fallacy" by Steven Aftergood and "Oh yes… they’re probably illegal" by Barbara Hatch Rosenberg.

 The book Electromagnetism and Life by Robert Becker and Andrew Marino is online at Marino’s web site.

 These are excerpts from "Microwaves and Behavior," by Don Justesen, American Psychologist, Mar. 1975:

Human beings can "hear" microwave energy. The averaged densities of energy necessary for perception of the hisses, clicks, and pops that seem to occur inside the head are quite small, at least an order of magnitude below the current permissible limit in the United States for continuous exposure to microwaves, which is 10 mW/cm^2….

To "hear" microwave energy, it must first be modulated so that it impinges upon the "listener" as a pulse or a series of pulses of high amplitude….

Sharp and Grove … found that appropriate modulation of microwave energy can result in direct "wireless" and "receiverless" communication of speech. They recorded by voice on tape each of the single-syllable words for digits between 1 and 10. The electrical sine-wave analogs of each word were then processed so that each time a sine wave crossed zero reference in the negative direction, a brief pulse of microwave energy was triggered. By radiating themselves with these "voice-modulated" microwaves, Sharp and Grover were readily able to hear, identify, and distinguish among the 9 words. The sounds heard were not unlike those emitted by persons with artificial larynxes.

Note that the published date is 1975. There is little doubt that improved modulation and microwave generation techniques have been developed in the meantime. This is a fairly sophisticated application of microwave harassment techniques. The same article notes that basic microwave heating can cause damage before sensations of heating are even noticed. Microwave attacks by thermal loading can inflict brain damage and other physical damage.

 The Air Force Research Laboratory has some reports online concerning the bioeffects of RF radiation, including the Radiofrequency Radiation Dosimetry Handbook.

 This report, by Julianne McKinney of the Association of National Security Alumni, was one of the first to openly describe microwave anti-personnel weapons and their use in harassment. Here is a copy at the Pink Noise site, "Microwave Harassment and Mind-Control Experimentation."

 This article by Tom Jaski, "Radio Waves & Life," in Popular Electronics, Sept. 1960, details some of the history of research into the biological effects of radio-frequency electromagnetic radiation. It describes research going back to the 1920s. Jaski also replicated some of these early results, as the following somewhat lengthy excerpt describes:

This brings to mind the work of a man who started publishing articles on this kind of subject more than 35 years ago. An Italian university professor named Cazzamalli placed human subjects in a shielded room, subjected them to high-frequency radio waves, and claimed to be able to record a "beat" which, he received on a simple untuned receiver consisting of a galena crystal, a small capacitor, antenna and sensitive galvanometer. Cazzamalli’s equipment, as well as it can be determined from his early articles, is shown in Fig. 1.

The one item which he never mentions, perhaps because he could not accurately determine it, is the power of his transmitter.

He published oscillograms purportedly showing variations of the "beats" when his subjects were emotionally aroused or engaged in creative efforts.

Later experiments delivered much more startling results: he found that some of his subjects would hallucinate under the influence of the high-frequency radio waves, which ranged all the way up to 300 MC.

The Cazzamalli experiments were carefully duplicated with modern equipment, of much greater sensitivity than his…

…a previous experiment had indicated in a rather startling way that power was not required to evoke effects in the human nervous system. In fact, there seemed to be some sort of resonant frequency applicable to each individual human…

To discover if this "something" was subjectively noticeable by an individual, a weak oscillator swept through the band of 300 to 600 MC with the request that the subject indicate any points at which he might notice anything unusual. The subjects were not allowed to see the dial.

At a particular frequency between 380 to 500 MC for different subjects, they repeatedly indicated a point with almost unbelievable accuracy (as many as 14 out of 15 times).

Subsequent experiments with the same subjects showed that at the "individual" frequency, strange things were felt. Asked to describe the experience, all subjects agreed there was a definite "pulsing" in the brain, ringing in the ears and a desire to put their teeth into the nearest experimenter.

The oscillator in this case was putting out only milliwatts of power, and was placed several feet from the subject.

Implants

This page contains information about devices which can be implanted into a human body and used as part of a mind control operation. As the page will make clear, such devices exist right now in commercial form and have been researched for decades. This page also contains items related to nanotechnology.

 Applied Digital Solutions will soon begin marketing an implantable tracking chip. The company calls its product Digital Angel, and includes a description of the system and patent information on its web site.

 The Transponder News page has introductory articles and news about recent developments in transponder technology.

 NASA’s Sensors 2000! (S2K!) program is developing biotelemetry devices for use in space and other applications. [Here is a copy of the S2K! biotelemetry page from the Google cache, and here are some other related NASA sites .]

 These are excerpts from the book Journey Into Madness by Gordon Thomas. The excerpts describe research into implants, and in particular some American war crimes in Vietnam involving brain surgery and implants on prisoners of war.

In a closed-off compound at Bien Hoa Hospital, the Agency team set to work with three Vietcong prisoners who had been selected by the local station. Each man was anesthetized and the neurosurgeon, after he had hinged back a flap in their skulls, implanted tine electrodes in each brain.

When the prisoners regained consciousness, the behaviorists set to work. The prisoners were placed in a room and given knives. Pressing the control buttons on their handsets, the behaviorists tried to arouse their subjects to violence.

Nothing happened.

For a whole week the doctors tried to make the men attack each other. Baffled at their lack of success, the team flew back to Washington. As previously arranged in the case of failure, while the physicians were still in the air the prisoners were shot by Green Beret troopers and their bodies burned.

 This New Scientist article by Duncan Graham-Rowe, "‘Smart dust’ could soon be spying on you," describes dust-sized nanodevices currently in development which can contain sensors and communicate data.

 Here is an article from ABC News about smart dust. The article is by Jack Smith and is from Nov. 1999. The particular application being discussed involves minute airborne particles, which the article reports might communicate information using small lasers.

Researchers at the University of California have built a prototype the size of a matchbox that contains temperature, barometric pressure and humidity sensors, and has the same computing power as an IBM desktop did 15 years ago.

The new prototype is about the size of an aspirin tablet and will get even smaller.

"In the time frame of a year," Kahn predicts, "we should have out first working prototypes that are the size of a grain of sand."

 This article in the IBM Systems Journal describes personal area networks which allow data to be sent through the body. For example, the authors describe "the business card handshake" whereby skin contact between two people could automatically transfer data between their personal data devices. While this is not specifically implant technology, the technique could be used for data I/O between an implanted device and other devices.

 The home page of the National Institutes of Health (NIH) Neural Prosthesis Program.

 Here are some excerpts from the book As Man Becomes Machine, The Evolution of the Cyborg by David Rorvik, written in 1973. They are online at Peter Grafstrom’s site (and here is a local copy). The excerpts contain descriptions of experiments in electronic stimulation of the brain (ESB) as well as some of Rorvik’s speculations on the future uses and abuses of such technology.

 This brief article appeared in Technology Review, May-June 2000. It mentions research into using laryngeal nerve signals to control an electrolarnyx.

 This page at the Whitaker Foundation describes a thought-controlled neuroprosthesis which combines implanted muscle stimulators with a computer to analyze brain waves. It allows a handicapped person to, for example, open his or her hand by simply thinking the command "open."

 These are some excerpts from the book Wildlife Radio Tagging: Equipment, Field Techniques, and Data Analysis, Academic Press, 1987. Even though the technology involved is typically not the latest cutting edge, the book is interesting because tagging and tracking techniques for animals are openly discussed, whereas applications of those techniques to humans tend not to be. (No one is surprised or doubtful when a scientist devotes himself or herself to monitoring animals 24 hours a day to study their behavior — and gets funding for it.)

 See also Remote Sensing and Thought Inference.

Remote Monitoring and Thought Inference

This page deals with what might commonly be called "mind reading." More specifically and technically it deals with methods by which the thoughts a person is thinking can be inferred by analyzing physiological data obtained about that person from any sort of sensor devices. (This inference need not be 100% effective to be a powerful technique for information gathering from, and harassment of, a targeted individual. Even a remote heartbeat and breathing monitor, combined with surveillance cameras, would allow for thought inferences that would be extremely unnerving to a targeted person.) Combining such capabilities with techniques and technologies described on other pages of this site would allow for a "full-duplex" sort of mind manipulation.

 This article at the DOE Openness site deals with the remote measurement of physiological data using microwave techniques. It is titled "Measurement of Heart and Breathing Signals of Human Subjects Through Barriers With Microwave Life-Detection Systems."

 This 1981 Science Digest article by Gary Selden, "Machines That Read Minds," provides a good introduction to brainwave analysis as a means for thought inference. It describes some of the research being conducted at that time, and notes that the CIA actively funded such research.

 A technique described as brain fingerprinting has been developed to determine if a subject recognizes some aspect of a scene, etc. It is being marketed as a tool for law enforcement, like a brainwave version of a lie detector. It uses a technique like that described for the P300 "recognition wave" in the Gary Selden article above.

 This is a PubMed abstract of an article "Brain-wave recognition of words." See also the Related Articles. The full text of recent articles in the Proceedings of the National Academy of Sciences can be accessed online.

 Here is a brief excerpt from an article titled "Thought Control," by Peter Thomas, in New Scientist, March 9, 1996:

Last year, at the University of Tottori, near Osaka in Japan, a team of computer scientists lead by Michio Inoue took this idea further by analysing the EEG signals that correspond to a subject concentrating on a specific word…

The system depends on a database of EEG patterns taken from a subject concentrating on known words. To work out what the subject is thinking, the computer attempts to match their EEG signals with the patterns in the database. For the moment the computer has a vocabulary of only five words and takes 25 seconds to make its guess. In tests, Inoue claims a success rate of 80 percent, but he is working on improvements…

Note that the time to "guess" is not really meaningful by itself (depending on the computer and algorithm used) and that significant improvements to both the signal measurements and the pattern matching algorithm are almost surely possible.

 Scientists from the Department of Molecular and Cell Biology at the University of California, Berkeley, have successfully wired a cat’s visual system so that they are able to reconstruct computer images of what the cat sees. They attached electrodes to 177 cells in the thalamus region of the cat’s brain. Here is a BBC article, on the research, and these are images of the reconstructed views. (Here is a local copy of the images page.)

 This page at the C.A.H.R.A site includes an L.A. Times article from 1976 about research into inferring thoughts and remotely measuring magnetoencephalograph (MEG) data.

 One source of information about a person’s thought process is where the eyes focus. Eye gaze monitoring devices are currently being marketed for the disabled and for applications like studying the effectiveness of advertising. One such system, originally developed at the University of Virginia, is called ERICA. Stanford University has an Advanced Eye Interpretation Project, and the following quote is from their web site.

Our patented work on inferring mental states from eye-movement patterns allows us to better describe what users are doing. This ongoing research moves beyond merely asking where a person’s eyes are focused, but aims to infer high-level behaviors from observing various patterns of eye-movement. Interesting results become apparent when behaviors such as "reading" and "searching" are analyzed as users interact with dynamic, complex applications.

What do people do when they read on-line news? How much do they read on which providers? The Stanford/Poynter Eyetrack2000 Project is analyzing typical users’ eye-movements and surfing behavior as they read on-line news to answer these (and many more) questions.

 Here is a Scientific American article describing how researchers can predict a rhesus monkey’s arm movements from brain recordings a fraction of a second before the monkey’s muscles move.

 This Wired article from 1993, "The Desire to Be Wired," is about neural interfacing. Among other topics, it discusses independent, do-it-yourself researchers of brain interfacing devices. The following excerpt describes an experiment in EEG transference. It is not sufficiently documented in the article to be taken as a scientific study, but is nonetheless interesting.

David Cole of the non-profit group AquaThought is another independent researcher willing to explore the inside of his own cranium. Over the years, he’s been working on several schemes to transfer EEG patterns from one person’s brain to another. The patterns of recorded brain waves from the source subject are amplified many thousands of times and then transferred to a target subject (in this case, Cole himself). The first tests on this device, dubbed the Montage Amplifier, were done using conventional EEG electrodes placed on the scalp. The lab notes from one of the first sessions with the Amplifier report that the target (Cole) experienced visual effects, including a "hot spot" in the very location where the source subject’s eyes were being illuminated with a flashlight. Cole experienced a general state of "nervousness, alarm, agitation, and flushed face" during the procedure. The results of these initial experiments made Cole skittish about attempting others using electrical stimulation. He has since done several sessions using deep magnetic stimulation via mounted solenoids built from conventional iron nails wrapped with 22-gauge wire. "The results are not as dramatic, but they are consistent enough to warrant more study," he says.

This cyberpunk site, for example, contains related information.

 See also the page on implants.

Subliminal Influencing

This page deals with methods by which people’s behavior can be influenced or modified without their conscious awareness that the influencing is taking place.

 This report by Greg Harrison, "Electromagnetics and the Mind," provides some documented information on subliminals and related technologies and techniques. In particular, it references Congressional hearings on the subject held in 1984.

 These excerpts by Anna Keeler from Jim Keith’s book Secret and Suppressed: Banned Ideas and Hidden History provide some information on subliminal influencing. The 1984 Congressional hearings are mentioned as well as uses of audio subliminals to decrease shoplifting. Much other good information as well.

 The abstract of a paper, "Control of ‘choice’ by application of the electromagnetic field equivalents of spoken words: mediation by emotional meaning rather than linguistic dimensions?" is at the Government Mind Control site (a private site). The paper appeared in Perception and Motor Skills, Dec., 1997. The web page also has other interesting abstracts.

 This page at Parascope deals with some of the history of subliminal influencing, and popular scares about it. Keep in mind, though, that these are rather unsophisticated techniques being discussed and that some of the sources (such as documents released by the CIA from the 1950s and 1960s) are not necessarily reliable on this topic.

 See also the pages on "Non-lethal" and Directed-Energy Weapons and on Wide-Field Mind Control.

Press and Media Coverups

Americans like to think of their supposedly free press as a watchdog on government, a fourth branch — especially because the press itself shamelessly promotes that myth. One of the first tenets for the control of a population, though, is to control all sources of information the population receives (or at least those it believes, with other sources discredited). The mainstream American press is a controlled corporate/government megaphone, and the few real exceptions prove the rule.

 The revelations of U.S. radiation experiments that occurred at the end of 1993 and which resulted in a Presidential Commission to study the situation were treated as a new story. But the information had been known for almost a decade, openly, and most news organizations chose to ignore the story. Even the dying victims of the crimes, known to our supposed press "watchdogs," were never informed. The sources of these the revelations? The original activists were ignored for some time, but even after the House Subcommittee on Energy Conservation and Power issued a report in 1986 detailing the abuses it took almost a decade for the press to report them. This story by Geoffery Sea in the Columbia Journalism Review, "The Radiation Story No One Would Touch," describes the coverup.

 This CIA document from 1991, at Ralph McGehee’s CIABASE site, describes recent CIA programs to influence the media:

a. PAO now has relationships with reporters from every major wire service, newspaper, news weekly, and television network in the nation. This has helped up turn some "intelligence failure" stories into "Intelligence success" stories…In many instances, we have persuaded reporters to postpone, change, hold, or even scrap stories… The document also describes the CIA’s ongoing contacts with academics.

 A good example of the mainstream press not publicizing, minimizing, and misreporting important information related to intelligence matters is the matter of the CIA’s involvement with drug trafficking. This is an article by Norman Solomon from the Fairness and Accuracy in Reporting (FAIR) web site, "Snow Job: The Establishment’s Papers Do Damage Control for the CIA." There are two sidebars to the article: "That Delusional Mindset" concerns media insinuations that black people are simply paranoid about the CIA, and "Our Man at the Post" is about Walter Pincus at the Washington Post.,

 This is an article by Alex Constantine on the CIA’s Operation Mockingbird which infiltrated and influenced news organizations inside the U.S.

 It was not just the press that the CIA set out to influence during the Cold War (and afterward, unless you believe all of this magically stopped sometime). The goal was to influence the entire culture in a way that benefited those in charge. Here are some reviews of the book The Cultural Cold War: The CIA and the World of Arts and Letters by Frances Stonor Saunders. First is one by James Petras at The Monthly Review. Next is a copy of a review (here is another copy) by Laurence Zuckerman from The New York Times. Here also is a review by Jeff Sharlet at The Chronicle of Higher Education. Yes, the CIA really applied Orwellian tactics to Orwell’s literature. They really supported abstract painting in the hopes of supplanting other art with political content. Do you think they would somehow not tamper with popular art and music?

 This article at Parascope on Operation Mongoose shows the extent to which the CIA, often via its press proxies, employs symbolism and cultural analysis to influence populations. This particular example deals with Cuba, but similar examples exist for other Central and South American operations.

During Operation Mongoose, Patchell reported, the CIA "decided that the ‘worm’ is preferable to the ‘fish’ and that it has been popularized by Castro and we should take advantage of it." (Castro had derided opponents of the revolutionary government as "gusanos" — worms.) By late 1962 the CIA was pushing the slogan "Gusano Libre!" — Free Worm! — in its broadcasts to Cuba.

Patchell suggested using catch-phrases such as "the worm will turn" to bolster the propaganda pitch. He also recommended using bible verses to spread the message, such as this quote from the book of Isaiah: "Their worm shall not die, and their fire shall not be quenched."

 This article by Noam Chomsky, "Propaganda, American-style," gives his observations on the system of thought control in the U.S., with emphasis on the media. It is an expanded version of a magazine article by Chomsky from 1988, including information from an interview and an essay (though it is not clear who expanded it).

One reason that propaganda often works better on the educated than on the uneducated is that educated people read more, so they receive more propaganda. Another is that they have jobs in management, media, and academia and therefore work in some capacity as agents of the propaganda system — and they believe what the system expects them to believe. By and large, they’re part of the privileged elite, and share the interests and perceptions of those in power.

"Legal" and Judicial Aspects of Mind Control

This page concerns the legal aspects of mind control, as well as how victims of harassment and nonconsensual experimentation are denied effective redress in the U.S. judicial system. I encourage victims to pursue legal avenues for ending their harassment and trying to learn exactly what all was done to them, but they should be well informed of the actual situation. This page does not constitute legal advice. Victims should consult a competent attorney — if they can even get one to take their case and can afford one after their years of abuse.

 The Smartnews site has online an article, "The Law and Mind Control," which looks at five legal cases involving mind control.

 This article in Probe magazine, "Mind-Control Part 1: Canadian and U.S. Survivors Seek Justice," March-April 2000, describes some mind control experiments involving nonconsensual LSD testing, electroshock "depatterning," sensory deprivation, etc. It also summarizes several victims’ lawsuits and the resulting stonewalling and machinations of the CIA even decades later.

 The decision in the case Kronisch v. U.S. is online at the New York Law Journal.

 James Turner, in this article from the Hamline Journal of Public Law and Policy, Fall 1990, discusses his involvement in Orlikow, et al. v. United States, and general issues regarding public interest cases against the CIA.

This review of the CIA’s actions in the United States and Canada demonstrates how completely unprincipled was the Agency’s original brainwashing program, as well as its course of legal manoeuvers years later when it was required to answer for its misconduct. The story of the brainwashing suit and the barriers that were overcome before the CIA’s victims were finally compensated, illustrates both the formidable hurdles presented and the unique satisfactions gleaned in a public interest law suit.

 This is the case John Cary SIMS et al. v. CENTRAL INTELLIGENCE AGENCY et al. at the California First Amendment Coalition site.

 This article by Elaine M. Ramesh appeared in Risk, the official journal of the Risk Assessment and Policy Association, in 1997. It discusses the legal implications of the implantation of microchips in humans. The article is titled, "Time Enough? Consequences of Human Microchip Implantation."

 There are several sites online where you can search on case law. These include FindLaw, the Touro Law Center Web Server, and LawGuru.com.

 The United States Constitution (and Bill of Rights), describing a legitimate U.S. government in plain English — for what it is worth.

Project Paperclip and Literal Nazi Connections

Project Paperclip was one of several government projects after World War II whereby Nazi scientists, some associated with Holocaust atrocities, were brought to the U.S. to work and live. Other Nazis, like Klaus Barbie, "The Butcher of Lyon," were used by U.S. intelligence and helped to escape from Germany and later to avoid capture.

 A memorandum prepared for the members of the Advisory Committee on Human Radiation Experiments which discusses possible Project Paperclip and Nazi links to American radiation experiments.

 Here is a web page at NameBase which lists books relating to Project Paperclip along with a few interesting excerpts. The following excerpt is attributed to the book Blowback by Christopher Simpson:

The CIA, the State Department, and U.S. Army intelligence each created special programs for the specific purpose of bringing selected former Nazis and collaborators to the United States…. The government employed these men and women for their expertise in propaganda and psychological warfare, for work in American laboratories, and even as special guerrilla troops for deployment inside the USSR in the midst of a nuclear war…. Hundreds, and perhaps thousands, of such recruits were SS veterans; some had been officers of the bloody Sicherheitsdienst (SD), the Nazi party’s security service.

 These are remarks by Mark Weitzman before the Nazi War Criminals Interagency Working Group at the web site of the National Archives and Records Administration.

Wide-Field Mind Control

Wide-field mind control refers to systems which can influence or affect the mental functioning or mood of people over a large geographic area. This page deals with wide-scale influencing via physical effects like electromagnetic fields and acoustic phenomena rather than by, for example, television broadcasts. Even if the percentage of a population susceptible to the influencing is small or the probability of influencing is low, significant effects could result from influencing a large enough population.

 This is a transcript of a CNN Special Assignment show, "Electromagnetic Weapons and Mind Control," from around 1985. It is online at the Mind Control Forum.

DeCaro: CNN enlisted the help of noted physicist Dr. Elizabeth Rausher and electrical engineer Bill VanBise to build and test an RF mind-interference machine from data found in Soviet scientific literature.

The machine itself was inexpensive and easy to construct using parts from a consumer electronics store. It emits a weak magnetic field pulsed at extremely low frequency. As the subject of the test I was blindfolded and my ears were blocked to prevent inadvertent clues as to what was happening. A magnetic probe was placed about 18 inches from my head. As the experiment began, two signal generators produced waveform patterns that were transmitted by the magnetic probe at about one one-thousandth of the Earth’s magnetic field strength.

VanBise — watching a chart recorder: Describe anything that you see, if any.

DeCaro: In the control room VanBise varied the waveforms being generated. In another room I could see waveforms changing shape in my mind.

DeCaro during experiment: A parabola just went by.

Rausher: A parabola just went by.

DeCaro: … Later, I asked VanBise what a weapon using this technology could do.

VanBise: Induce basically what would be considered hallucinations in people; direct them to do things against their so-called better judgment…

DeCaro: How easy would it be to assemble a weapon from existing off-the-shelf parts?

VanBise: Three weeks, I could put together a weapon that would take care of a whole town.

DeCaro: We showed the results of our test to Dr. Robert Becker, a two-time Nobel nominee for his work in the biological effects of electromagnetism.

Becker: This is a very significant experiment because it carries our understanding of how vision is actually performed a step further into the mystery.

 Michael Persinger’s article "On the Possibility of Directly Accessing Every Human Brain By Electromagnetic Induction of Fundamental Algorithms" from Perceptual and Motor Skills, June 1995, is archived at MindNet.

 This excerpt is from a 1977 Washington Post article by John L. Wilhelm, titled "Psychic Spying? The CIA, the Pentagon and the Russians Probe the Military Potential of Parapsychology." Despite the title and the references to parapsychology, the end of the article mentions research into ELF (extremely low frequency) radiation and mind control. The research was conducted at the Stanford Research Institute (SRI) and at the Navy’s Electronics Laboratory Center.

 See also Subliminal Influencing.

Operational Mind Control Systems

The other pages on this site tend to deal with individual technologies or techniques of mind control. This page deals with complete systems, whereby several techniques are combined to influence selected people and groups and where coverups and lies are employed to maintain secrecy. The main goal of this page is to get people thinking about the larger technological and sociological picture.

 To get a concrete, documented picture of how a group of people might go about covertly influencing individuals and entire societies it is instructive to study the techniques employed by the CIA in other countries. It does not take much imagination to get an idea of how the techniques and technologies of mind control would be employed in similar programs. The CIA’s covert action in Chile, 1963-1973, described in this report at Ralph McGehee’s CIABASE site, provides a good example.

 The following item is included because it discusses the use of combined techniques in a large-scale mind control operation, and because parts of it mirror the stated experiences of some mind control victims. It is therefore "food for thought," though it is not an official document; the claims of NSA involvement and some of the technological claims are unsubstantiated. The page is NSA Mind Control and Psyops and is at Wes Thomas’ site.

Activism Against Mind Control Abuses

These are some items related to activism against mind control abuses. Many U.S. citizens (and citizens of other countries) state that they have been harassed, tortured, and experimented on with high-tech devices. They describe symptoms which in many cases match the effects of technologies described on these pages. Nonetheless, these people’s claims are often met with ridicule and disbelief. In the United States, the actual history of such experimentation is not well publicized, and knowledge of the current state of mind control technology is almost nonexistent (or else it is politically expedient to pretend no knowledge of it). Remember that there are documented and acknowledged victims of MKULTRA and other mind control programs who are still ignored, ridiculed, and left to be considered mentally ill.

 The nonprofit group Citizens Against Human Rights Abuse (CAHRA) works to expose and stop abuses perpetrated using mind control techniques and technologies.

 The World Organization Against Torture, USA has recently issued a report on Torture in the United States. Among other abuses it includes a section on involuntary human scientific experimentation.

COINTELPRO and MHCHAOS

COINTELPRO stands for "counterintelligence program." It was an FBI program in the 1960s and early 1970s. It involved selecting so-called subversive people and groups for covert harassment, infiltration, and disruption. (Even groups such as women’s liberation groups were targeted.) In small letters, cointelpro refers to any such operation, including those that continued after COINTELPRO officially ended. (People are still in prison who were targeted and framed or set up by the original COINTELPRO.) MHCHAOS was a similar program by the CIA at around the same time which, for example, targeted independent newspapers and student groups. Much of what occurred under MHCHAOS, and who was targeted, is still classified as secret and not publicly known. This page contains links and items related to the sort of political harassment that occurred under COINTELPRO, regardless of the official designation or time frame.

 Here is an archive on U.S. Domestic Covert Operations at mediafilter.org. It contains a great deal of information on COINTELPRO, including how the course of U.S. history was altered by these criminal and undemocratic government actions — though this point is almost never mentioned in any of the nostalgic or supposedly informed retrospectives on the 1960s.

 The article "COINTELPRO Revisited: Spying and Disruption" by Brian Glick gives a brief introduction to COINTELPRO. Glick also discusses whether COINTELPRO really ended, and gives some advice for people and groups who may currently be undergoing cointelpro actions about how to cope with it.

 A good source of information on MHCHAOS is Angus Mackenzie’s book Secrets: The CIA’s War at Home. Here is a book review from the Columbia Journalism Review.

 This article by Verne Lyon, a former CIA operative, provides another description of Operation CHAOS. It is online at the Serendipity site and is titled, "Domestic Surveillance: The History of Operation CHAOS."

 The book The COINTELPRO Papers: Documents from the FBI’s Secret Wars Against Dissent in the United States, by Ward Churchill and Jim Vander Wall, documents COINTELPRO using numerous FBI documents. The entire book is online at Paul Wolf’s COINELPRO site. The book makes the point that there is no real reason to think COINTELPRO ever stopped, aside from name changes and increased secrecy. As an example of the documents, see the first page of the FBI’s 12-point master plan for COINTELPRO against the New Left and the second page. See this link at Pinknoiz for a description of the destruction of actress Jean Seberg’s life by the FBI because she supported the Black Panthers, based on the documents in Churchill and Wall’s book.

 This article in Covert Action Quarterly, Summer 1997, discusses recent trends in political spying. It is Mitzi Waltz and is titled, "Policing Activists: Think Global, Spy Local."

Nonconsensual Human Experimentation

This page deals with experiments of various sorts that are known to have been conducted on human beings without their consent, and often without their knowledge.

 The National Security Archive site has archived information about the activities of The Advisory Committee on Human Radiation Experiments, including the final report.

 This critique of the Advisory Committee report appeared in The Bulletin of the Atomic Scientists, Jan/Feb 1996.

"I have a suspicion that at root, there was too much deference to the experiment industry by this committee," Roisman of the Human Experiment Litigation Project said.

 The radiation experiments that the Advisory Committee dealt with are definitely not the only cases of nonconsensual experimentation, and in fact that committee only dealt with radiation experiments conducted before May 30, 1974. Besides radiation experiments, there are also known experiments in chemical and biological warfare, as well as mind and behavior control — but the nonconsensual victims of these experiments are still being kept in the dark as to the fact that they were used in experiments and what exactly was done to them. A U.S. News and World Report article from Jan. 24, 1994 describes some of these experiments and the unwitting victims still being denied their human rights.

…the government has long ignored thousands of other cold war victims, rebuffing their requests for compensation and refusing to admit its responsibility for injuries they suffered.

Continued secrecy and legal roadblocks erected by the government have made it virtually impossible for victims of these cold war human experiments to sue the government successfully, legal experts say.

Many of the stories of people whose lives were destroyed by mind-altering drugs, electroshock "treatments" and other military and CIA experiments involving toxic chemicals or behavior modification have been known for almost 20 years. But U.S. News has discovered that only a handful were ever compensated — or even told what was done to them.

Admiral Turner, in his 1983 deposition, conceded that "a disappointingly small number" were notified but defended the agency’s continuing refusal to declassify the names of the researchers and universities involved. "I don’t think that would have been necessarily the best way," Turner said. "Not in the litigious society we live in."

 These are Sen. John Glenn’s introductory remarks on bill S. 193 in the 105th Congress. The bill would have provided some protection to subjects of human experimentation, including classified experimentation. The bill was killed in committee. Glenn’s remarks detail why such a bill was needed — and is still needed.

You just think about your own family, your own son, your own daughter, or grandchildren who might be, the next time they go to a doctor, the subject of some medical experiment that they are not even told about. I do not think there can be many things more un-American than that.

 Healthnewsnet has online a history of secret human experimentation which gives a timeline of some major incidents.

 This is the text of a staff report prepared in 1994 for the Senate Veterans’ Affairs Committee, on military human experimentation (online at the A-albionic site).

 Steven Hale created the web pages Resources on Nonconsensual Human Experimentation for his English 101 students at DeKalb College — as well as for others who might want to access them. The site contains many useful links organized into categories.

 This site by Anthony Lalli has informative essays and other information related to human subjects protection, especially federal policy on human subjects research.

 Here is an article from the Penn History Review titled "Retin-A’s Wrinkled Past." It is by Jonathan Kaye and is from the Spring, 1997 issue. It discusses experiments on prisoners conducted by researchers from the University of Pennsylvania.

Revolution in Military Affairs

The "revolution in military affairs" (RMA) is a term that became popular in the early 1990s to describe the changes in military tactics, strategies, and doctrine that follow from (and lead to) the development and deployment of radically new technologies such as directed-energy weapons. It also includes such concepts as "information warfare." This page contains items related to these developments, as well as some general items on military practices.

  • In the report "The Revolution in Military Affairs and Conflict Short of War," Steven Metz and James O. Kievit of the Army War College describe the RMA in a cautionary manner. They envision a "future history" of a revolution of techno-authoritarianism, carried out in stages to alter some basic values of Americans that might stand in the way.

The advantage of directed energy weapons over conventional ones [in drug interdiction] is deniability. Against whom is such deniability aimed? …deniability must be aimed at the American people, who do not sanction the imprisonment, much less execution, of individuals without a trial…

Parascope has a description of some of the history of Army PSYOPS (Psychological Operations) in an article "Psywar Terror Tactics."

  • This article by Timothy L. Thomas, "The Age of the New Persuaders," is from Military Review, May-June 1997. It discusses manipulation, perception management, deception, and psychological operations. The following excerpt describes psychological manipulation devices.

psychological– this device turns personality weaknesses to one’s advantage, or provokes an individual to lose control. Under the influence of these conditions, the object may make mistakes which can benefit the manipulator. These methods included: –a statement with multiple-meanings, which shows the object much is known about him, but for some special motives is not being revealed; –citing authorities whose opinions cannot serve as evidence of the subject being discussed; –providing unsupportable pledges and promises in advance; –creating an atmosphere of trust, although in reality the manipulator hardly knows the object; –pretense of unity of thinking and closeness in spiritual values and interests; –discredit the person influencing the object and interfering with the manipulator’s achievement of his goal; –offering sympathy and support to the object under circumstances that eventually can be turned to the manipulator’s advantage. One can use an object’s vanity and conceit to advantage. This can be done by flattery and respect, and drawing one’s ally into the conversation against the object. The ally can offer mockery, insults, and disinterest to what the object says, and one can then appear to be more reasonable by disagreeing with the ally and agreeing with the object to gain trust.17

  • Here are two articles by Frank Morales which discuss the trend toward the militarization of the police, and the increasing involvement of the military in domestic police operations. The first is from Covert Action Quarterly, Spring-Summer 1999, "The Militarization of the Police." The second is a longer version of an article that appeared in CAQ‘s Spring-Summer 2000 issue. It is titled "U.S. Military Civil Disturbance Planning: The War At Home." (The article is also online at the the Cryptome site.) Among other topics, this article discusses the increasing circumvention of the Posse Comitatus Act. From the second article:

As this and numerous other documents reveal, U.S. military training in civil disturbance "suppression", which targets the American public, is in full operation today. The formulation of legitimizing doctrine, the training in the "tactics and techniques" of "civil disturbance suppression", and the use of "abusable", "non-lethal" weaponry, are ongoing, financed by tax dollars. According to the Pentagon, "US forces deployed to assist federal and local authorities during times if civil disturbance…will follow use-of-force policy found in Department of Defense Civil Disturbance Plan-Garden Plot." (Joint Chiefs of Staff, Standing Rules of Engagement, Appendix A, 1 October 1994.)

 Parascope has the CIA’s KUBARK interrogation manual online.

 The International Committee of the Red Cross (ICRC) has some articles online dealing with torture. This article is titled "Torture and Its Consequences."

First, it must be emphasized that merely "listing methods", a practice all too often used in the documentation of torture, is not an efficient way of dealing with the issue. Such listings cannot convey the real horror of a situation, and tend to separate "physical methods" from "psychological methods".

Second, it has to be underlined that visible and apparent lesions are only part of the story, and may indeed not be the worst part at all. ICRC delegates are trained to see beyond the mere scars or marks of torture they may initially see or be shown. "The worst scars are in the mind" (quoted from Dr. Sten W. jakobsson, Stockholm) [5], and it is much easier for torture victim to show the wounds on his back than to the about the wounds on the soul. What could be called the "WYSIWYG" (term meaning "What You See Is What You Get") approach to documentation should be avoided at a costs. Sequelae of torture have been widely documented elsewhere [6,7]. Unfortunately, many health professionals who work with asylum seekers, for example, have to produce "physical evidence" to prove that torture has taken place. Psychological evidence of torture has yet to be accepted in most countries as valid evidence.

Another informative article at the ICRC site is "How visits by the ICRC can help prisoners cope with the effects of traumatic stress."

 This Covert Action Quarterly article, "Textbook Repression: U.S. Training Manuals Declassified," describes some training and interrogation manuals recently declassified (including the KUBARK manual).

U.S. Domestic Spying

This page concerns the long history and continuing practice of the U.S. government spying on its own citizens.

 The American Civil Liberties Union (ACLU) now has an Echelon Watch web site.

 John Young’s Cryptome site has links to many items related to cryptography, spying, etc. It is updated on an ongoing basis and is worth checking regularly.

 Retired intelligence officer Mike Frost worked at Canada’s CSE, their equivalent of the NSA. He has recently worked to expose some of the abuses of the international spying system generically known as ECHELON, appearing on 60 Minutes and other shows. In this CBN News story, "Surveillance Society: A Spy’s Story," he describes the system as well as some of the harassment he has received since working to expose it.

"The pressure is being applied very subtly," he says. "Letters that arrive in an opened condition, strange things happening to my answering machine when I’m not even in the house — it becomes unplugged or turned off, or turned on and plugged in, strange footprints on my carpet, very subtle things. Not that I can go to anyone and say somebody broke into my home, because there is no sign of forced entry in any way. Constantly, my friends will say, what’s the matter with your phone; there’s an echo. So these things are being done just to keep me on my toes a little bit, and I’m aware of that."

 It is commonly believed that the CIA is not allowed to operate domestically within the United States, i.e., to spy on Americans in the U.S. This is not the CIA’s interpretation of the law, however, as indicated in the CIA’s own Frequently Asked Questions list.

…the CIA is restricted in the collection of intelligence information directed against US citizens. Collection is allowed only for an authorized intelligence purpose; for example, if there is a reason to believe that an individual is involved in espionage or

Abuses of Psychiatry and Politicized Science

This page concerns the abuse of the "healing professions" of psychiatry and psychology, and the long history of CIA and intelligence involvement in that community. It also deals with the manipulation of the scientific and engineering establishment to suppress knowledge of technological developments crucial to people’s health, well-being, and even their basic human rights.

 Dr. Robert Becker is a pioneer in electro-medicine and was twice nominated for the Nobel Prize. This is an excerpt from his book Cross Currents (1990) in which he describes the conspiracy to suppress research into and knowledge of nonthermal electromagnetic effects.

 Here is an interview with Dr. Colin Ross that is part of the CKLN-FM mind control series. He discusses a number of topic regarding mind control, including its relation to his profession of psychiatry.

It’s a very strange story. It tells us that there is something going on in our culture and in the mental health field that is hidden and secret. This is another kind of incest secret in the field of psychiatry that all of these people who have been running psychiatry in the latter half of the 20th century are either directly or loosely connected to a whole huge universe of covert hidden secretly funded mind control research, and as I emphasized, that’s a fact….

So this really went on, they really used psychics operationally and they believed in it enough to keep spending millions of dollars on it for several decades probably. Now when you read all the Senate materials from the 1970’s and you read all the existing literature, the claim of the intelligence community was that all this mind control research was stopped in 1973 due to Senate oversight and so on. One of the MKULTRA sub-projects is on the paranormal, esp and using esp for covert operations purposes. That element of MKULTRA didn’t stop in 1973. We now know from the CIA itself that it ran on until 1984. So we know for a fact that at least that element of this mind control research program that was said to have stopped in 1973, continued to 1984. My position is that it is simply implausible that this stuff isn’t ongoing up to the present….

Ewen Cameron, former Head of the Quebec Psychiatric Association, the Canadian Psychiatric Association, the American Psychiatric Association, the World Psychiatric Association – in fact, the founder of the World Psychiatric Association – and also one-time President of the Association for Biological Psychiatry. As politically connected a guy as ever existed in the entire field of psychiatry in the 20th Century, with his obituary in the American Journal of Psychiatry, funded through MKULTRA and Human Ecology Foundation, did LSD and other hallucinogen research funded by Canadian military and the CIA and was successfully sued (he had already died) – the CIA settled out of court actually…

(Ross does not mention that "psychic research" might be used as a cover for research in electronic and acoustic techniques, with eager "volunteers.") Ross’ talk also has a second segment.

 This is a PubMed abstract to a German article on Stasi persecution syndrome. It would seem that there should also be a CIA persecution syndrome or an FBI persecution syndrome, since those organizations are also known to have covertly harassed individuals with the intention of inflicting psychological harm.

 This is an article by Alan Scheflin from Psychiatric Times, November, 1999, titled, "Ground Lost: The False Memory/Recovered Memory Therapy Debate."

Mind Control and Children

The past and present of mind control research involves unspeakable atrocities committed against citizens. Perhaps the most hideous of these crimes involve mind control experiments on children. Because of the explosive and disgusting nature of such experiments there is even less information publicly available about them than about mind control atrocities committed against adults. Nonetheless, such experiments are known and documented to have been conducted.

"A person who claims to have been a victim of government mind-control programs is generally not going to be believed and is going to be considered mentally ill," said Mr. Scheflin. "And, indeed, a lot of people suffer from the neurotic delusion that they were victims of mind control. But not all of them are delusional. Otherwise there would be no victims. We know there are victims, because we know the experiments were done."

…Alan Scheflin believes the full story of government interest in mind control has yet to be told. "We know beyond any shadow of a doubt that the CIA and army mind-control programs were much bigger, and much broader and much more extensive that we have knowledge of at this time." … Mr. Scheflin notes that 149 projects involved work with children at juvenile facilities, but the records disclosed to date do not paint a complete picture.

According to this article from Southam News, the Royal Canadian Mounted Police spied on students as young as 13 during the Cold War. This spying on high school and university students continued until 1984, when the unit was disbanded.

By the 1970s, the Mounties were worried about young girls becoming involved in the feminist movement. One police note tells of several girls gathering to discuss birth control and women’s liberation.

Mind Control in Virginia

This page contains references and links related to mind control in Virginia.

 Sidney Gottlieb died in March 1999 at the UVA Medical Center. Here is an article from WorldNetDaily on his death. Counterpunch also had an article on his death, "CIA’s Sidney Gottlieb: Pusher, Assassin & Pimp."

 A Richmond company, Psychotechnologies Corp., holds the American rights to Russian psycho-correction technology, according to this 1993 Defense Electronics article. The device was considered for use against David Koresh in the Waco standoff.

In a series of closed meeting beginning March 17 in suburban Northern Virginia with Dr. Igor Smirnov of the Moscow Medical Academy, FBI officials were briefed on the Russian’s decade-long research on a computerized acoustic device allegedly capable of implanting thoughts in a person’s mind without that person being aware of the source of the thought.

The Monroe Institute is located in Faber, Va. They do research in "Hemi-Sync" audio technology, and hold several patents on the devices. (This typically involves sending different signals to each ear with an encoded beat pattern.)

"Standard" Surveillance Technologies

This page concerns such "standard" surveillance techniques as pinhole cameras, audio bugs, and through-the-wall radar. While such technologies are known by most people to exist at least from spy stories and such (with a few exceptions such as through-the-wall radar), many do not realize how available the devices are or how miniaturized they have become. Such devices can play an important role in mind control operations by providing feedback about a targeted person (for example in the operant conditioning of a person inside his or her home using remotely operated aversive stimuli). That is, it is important to consider how such feedback can be used in combination with the technologies described on other pages of this site to "close the control loop."

 The Granite Island Group Technical Surveillance Counter Measures (TSCM) site has a great deal of information on eavesdropping devices, detection (sweeping) techniques, TEMPEST technology, etc. The Spy Tech Agency has a similar site.

 The Security Magazine site provides Lexis-Nexus searches on some security-related matters.

 This article from Covert Action Quarterly, Spring 1996, concerns the increasing ability of technology to track and "profile" the actions of citizens. It is by David Banisar and is titled, "Big Brother Goes High Tech."

 This report, "An Appraisal of the Technology of Political Control," is a working document (though not an official document) of the European Parliament Scientific and Technological Options Assessment Programme (STOA). This copy is online at the Cryptome site. It is quite readable, and discusses recent technological developments applicable to political control. It also discusses the potential impact of the technologies on political systems, their legitimacy, and their level of authoritarianism.

Hypnosis and Trauma Conditioning

This page concerns the conditioning and controlling of human beings by way of hypnosis and purposely induced trauma. It has been well-known to torturers and mind manipulators, since at least the studies of Korean War prisoners in the 1950s, that inducing trauma, dependency, sleep deprivation, and guilt can be used to "turn" some people and alter their beliefs and behavior. Hypnosis is another technique which can go far beyond the public perception that hypnotized people cannot be induced to violate their basic sense of morality or belief.

 This site at Parascope, Hypnosis in Interrogation, provides an introduction to a CIA document on hypnosis as well as a link to the document itself.

 This early MKULTRA document from 1953 discusses experiments to be conducted in hypnosis. It is also online at Parascope. Among other experiments, research on "hypnotically induced anxieties" was planned, as well as research in the recall of hypnotically acquired information triggered by "very specific signals."

 These excerpts from a 1971 Science Digest article, "Hypnosis Comes of Age" by G.H. Estabrooks, appear at Tom Porter’s site. Estabrooks discusses military uses of hypnosis such as creating multiple personalities in subjects for their use as couriers.

HACKER DOSYASI : Cemaat darbecilerinin kullandığı programı bu kez kim kırdı ?


Dark Web adı verilen internetin en gizli ve karanlık noktalarında gezerek bilgi toplayan bu kişiler yakın zamanda Telegram’ın şifreli mesajlaşma özelliğini kırmayı da başardılar.

Channel 10 News adlı bir haber programında, İsrailli bir firmanın Telegram‘ı kırarak IŞİD‘e ait hesapları deşifre ettikleri ve örgütün yakın gelecekte saldırmayı planladıkları çok sayıda potansiyel hedefi deşifre ettikleri duyuruldu.

Dünya genelinde sadece 500 üyesi bulunan ve yeni üyelerin ancak bu 500 kişiden en az birinin tanıdığı olarak ekibe dahil olabildiği gizli topluluğun üyelerini de eski askerler, istihbarat elemanları ve hackerlardan oluşuyorlar. Dark Web adı verilen internetin en gizli ve karanlık noktalarında gezerek bilgi toplayan bu kişiler yakın zamanda Telegram‘ın şifreli mesajlaşma özelliğini kırmayı da başardılar.

Grubun CEO’luk görevini üstlenen Allon Arbatz, ele geçirdikleri listede aylar önce Normandiya’da bir kilisenin hedef olarak gösterildiği, geçtiğimiz Temmuz ayının sonlarında IŞİD militanları tarafından katledilen Jacques Hamel‘in tesadüfen değil, bir plan doğrultusunda hedef olarak seçilen kiliseye yapılan saldırı sonucunda öldürüldüğünü duyurdu.

Arbartz, aynı zamanda listede bulunan hedeflerin büyük bir bölümünü ABD’nin başka ülkelerde bulunan askeri üstlerini ve savaş uçaklarının havalandıkları havalimanlarının kusursuz doğruluktaki koordinatları ile yer aldıklarını, bilhassa ”İsrail’de bulunan hava üssü” saldırılması planlanan yerler arasında bulunduğu, ABD ile müttefik olan ve askeri ilişkisi içerisinde bulunan tüm ülkelerin de eşit oranda saldırı riski altında olduklarını belirtiyor.

Geçtiğimiz günlerde İranlı bir korsan grubun Telegram’ın şifresini çalmayı başardıkları ve milyonlarca İranlı kullanıcının özel bilgileri ile anlık mesajlaşmalarını ele geçirmeyi başardıklarını bildirmiştik. Telegram, Türkiye’deki 15 Temmuz darbe girişimini yapan Cemaatçi askerler tarafından da kullanılmıştı. MİT’in de bu programı kırdığı iddia edilmişti.

Kaynak: israelnationalnews.com ve rt.com

GÜNDEM ANALİZİ /// VİDEO : Nasıl Yani Programı /// 31.07.2016 /// Hanefi Avcı – Gülgün Feyma n Budak – Ulusal Kanal


VİDEO LİNK :

https://www.youtube.com/watch?v=QrNUtdj79Uk&list=TLDcoU-lLFhTwwMTA4MjAxNg

MK ULTRA PROJESİ /// VİDEO : Prof.Dr. Nevzat Tarhan : Zihin Kontrolü /// Akıl Oyunları Programı


VİDEO LİNK :

GÜNDEM ANALİZİ /// VİDEO : Nasıl Yani Programı /// 20.07.2016 /// Hüseyin Özbek – Gülg ûn Feyman Budak – Ulusal Kanal


VİDEO LİNK :

https://www.youtube.com/watch?v=q6LFai_k4c4&list=TLLb9NmYQZNOsyMDA3MjAxNg

GÜNDEM ANALİZİ /// VİDEO : Nasıl Yani Programı /// 18.07.2016 /// E. Tüma. Cem Gürdeniz – Gü lgûn Feyman Budak – Ulusal Kanal


VİDEO LİNK :

https://www.youtube.com/watch?v=WTbNUxsGHhM&list=TLIfkK6vdDK1oxOTA3MjAxNg

GÜNDEM ANALİZİ /// VİDEO : Nasıl Yani Programı /// 10.07.2016 /// Dr. Erol Mütercimler – Gül gûn Feyman Budak – Ulusal Kanal


VİDEO LİNK :

https://www.youtube.com/watch?v=qE4ohghOsMI&feature=em-subs_digest

ARAŞTIRMA DOSYASI : USAID’s Pandemic Influenza and Other Emerging Threats (PIOET) Program


2016-06-10_9-54-09

Background to the Pandemic Influenza and Other Emerging Threats (PIOET) Program

Nearly 75 percent of all new, emerging, or re-emerging diseases affecting humans at the beginning of the 21st century are zoonotic (i.e. originated in animals). Notable reminders of how vulnerable the increasingly interconnected world is to the global impact of new emergent diseases include HIV/AIDS, severe acute respiratory syndrome (SARS), the H5N1 strain of avian influenza, and the 2009 pandemic H1N1 influenza virus. The speed with which these diseases can emerge and spread presents serious public health, economic, and development concerns. It also underscores the need for the development of comprehensive disease detection and response capacities, particularly in “hot spot” areas such as central Africa, South and Southeast Asia, and Latin America where a confluence of risk factors may contribute to disease emergence.

The Pandemic Influenza and Other Emerging Threats (PIOET) Unit supports two major lines of work: H5N1 Avian Influenza, and Emerging Pandemic Threats. H5N1 Avian Influenza: Since 2005, USAID has strengthened the capacities of more than 50 countries for monitoring the spread of H5N1 avian influenza among wild bird populations, domestic poultry, and humans, to mount a rapid and effective containment of the virus when it is found, and to help countries prepare operational capacities in the event a pandemic capable virus emerges.

USAID’s efforts have contributed to dramatic downturns in poultry outbreaks and human infections, and a dramatic reduction in the number of countries affected; with five of these countries (Indonesia, Vietnam, China, Bangladesh and Egypt) as the primary reservoir of the virus. Although these successes are significant, the H5N1 virus remains a serious threat and sustained vigilance is required. Mindful of the need for vigilance USAID continues its efforts to build on its successes and further consolidate its programs in the highest risk countries. Emerging Pandemic Threats: As a complement to USAID’s work in H5N1, the PIOET Unit launched the Emerging Pandemic Threats program in 2009 to aggressively preempt or combat other diseases that could spark future pandemics.

This second line of work is composed of four complementary projects operating in 20 countries — PREDICT, PREVENT, IDENTIFY, and RESPOND—with technical assistance from the U.S. Centers for Disease Control and Prevention (CDC). The EPT global program draws on expertise from across the animal and human health sectors to build regional, national, and local “One Health” capacities for early disease detection, laboratory-based disease diagnosis, rapid response and containment, and risk reduction. At the country level, the EPT partners are working with governments and other key incountry and regional partners to enhance the understanding of viral distribution and key drivers of disease emergence—from deforestation and land use change to wildlife trade and livestock product demands.

This information, along with other EPT investments to strengthen country-level capacities for routine infectious disease detection and outbreak response, will be used to improve surveillance and response as well as risk-mitigation strategies.

These efforts will safeguard human and animal health and livelihoods in locations in Africa, Asia, and Latin America where new pandemic threats are likely to emerge. (Source: PIOET Fact Sheet / USAID)

PIOET Program Accomplishments

In March of 2016, I filed a FOIA to USAID for all documents pertaining to the accomplishments of this program. Although still an open FOIA request, I did start receiving documents in June of 2016. I will update this page as more records are released.

pdf.gifFirst Interim Release, June 9, 2016 [2,200 Pages, 69MB]

About USAID

U.S. foreign assistance has always had the twofold purpose of furthering America’s interests while improving lives in the developing world. USAID carries out U.S. foreign policy by promoting broad-scale human progress at the same time it expands stable, free societies, creates markets and trade partners for the United States, and fosters good will abroad.

Spending less than 1 percent of the total federal budget, USAID works in over 100 countries to:

  • Promote broadly shared economic prosperity;
  • Strengthen democracy and good governance;
  • Protect human rights;
  • Improve global health,
  • Advance food security and agriculture;
  • Improve environmental sustainability;
  • Further education;
  • Help societies prevent and recover from conflicts; and
  • Provide humanitarian assistance in the wake of natural and man-made disasters.

(Source: USAID Fact Sheet)

GÜNDEM ANALİZİ /// VİDEO : Gündem Özel Programı /// 24.05.2016 /// Başar Yaltı – Uğur Poyraz – L event Yıldız – Kanal B


VİDEO LİNK :

https://www.youtube.com/watch?v=lsLauwiAU_Y&list=TLF3Jy13YNfvAwNTA2MjAxNg

YÜKSEK STRATEJİ TÜRKİYE

strateji, istihbarat, güvenlik, politika, jeo-politik, mizah, terör, araştırma, teknoloji

Fight "Gang Stalking"

Expose illegal stalking by corrupt law enforcement personnel

İSTİHBARAT ALANI

Sınırsız, Seçkin, Sansürsüz, Kemalist Haber Blogu

The WordPress.com Blog

The latest news on WordPress.com and the WordPress community.