Essential Quotes

I have sworn on the altar of God eternal hostility against every form of tyranny over the mind of man.
Thomas Jefferson

Wednesday, December 30, 2009

The Sirens Song

"Once he hears to his heart's content, sails on, a wiser man.
We know all the pains that the Greeks and Trojans once endured
on the spreading plain of Troy when the gods willed it so—
all that comes to pass on the fertile earth, we know it all!"

One Day We Will All Be Terrorists

By Chris Hedges

Syed Fahad Hashmi can tell you about the dark heart of America. He knows that our First Amendment rights have become a joke, that habeas corpus no longer exists and that we torture, not only in black sites such as those at Bagram Air Base in Afghanistan or at Guantánamo Bay, but also at the federal Metropolitan Correctional Center (MCC) in Lower Manhattan. Hashmi is a U.S. citizen of Muslim descent imprisoned on two counts of providing and conspiring to provide material support and two counts of making and conspiring to make a contribution of goods or services to al-Qaida. As his case prepares for trial, his plight illustrates that the gravest threat we face is not from Islamic extremists, but the codification of draconian procedures that deny Americans basic civil liberties and due process. Hashmi would be a better person to tell you this, but he is not allowed to speak.

This corruption of our legal system, if history is any guide, will not be reserved by the state for suspected terrorists, or even Muslim Americans. In the coming turmoil and economic collapse, it will be used to silence all who are branded as disruptive or subversive. Hashmi endures what many others, who are not Muslim, will endure later. Radical activists in the environmental, globalization, anti-nuclear, sustainable agriculture and anarchist movements—who are already being placed by the state in special detention facilities with Muslims charged with terrorism—have discovered that his fate is their fate. Courageous groups have organized protests, including vigils outside the Manhattan detention facility. They can be found at www.educatorsforcivilliberties.org or www.freefahad.com. On Martin Luther King Day, this Jan. 18 at 6 p.m. EST, protesters will hold a large vigil in front of the MCC on 150 Park Row in Lower Manhattan to call for a return of our constitutional rights. Join them if you can.

The case against Hashmi, like most of the terrorist cases launched by the Bush administration, is appallingly weak and built on flimsy circumstantial evidence. This may be the reason the state has set up parallel legal and penal codes to railroad those it charges with links to terrorism. If it were a matter of evidence, activists like Hashmi, who is accused of facilitating the delivery of socks to al-Qaida, would probably never be brought to trial.

Hashmi, who if convicted could face up to 70 years in prison, has been held in solitary confinement for more than 2½ years. Special administrative measures, known as SAMs, have been imposed by the attorney general to prevent or severely restrict communication with other prisoners, attorneys, family, the media and people outside the jail. He also is denied access to the news and other reading material. Hashmi is not allowed to attend group prayer. He is subject to 24-hour electronic monitoring and 23-hour lockdown. He must shower and go to the bathroom on camera. He can write one letter a week to a single member of his family, but he cannot use more than three pieces of paper. He has no access to fresh air and must take his one hour of daily recreation in a cage. His “proclivity for violence” is cited as the reason for these measures although he has never been charged or convicted with committing an act of violence.

Read full report here:
http://www.truthdig.com/report/item/one_day_well_all_be_terrorists_20091228/

Friday, December 25, 2009

The Secret State's Surveillance Machine

Underming the American People's Right to Privacy: The Secret State's Surveillance Machine. Following the Money Trail: Telecoms and ISPs

"Follow the money."

And why not. As the interface between state and private criminality, following the money trail is oxygen and combustible fuel for rooting out corruption in high places: indelible signs left behind like toxic tracks by our sociopathic masters.

After all, there's nothing quite like exposing an exchange of cold, hard cash from one greedy fist to another to focus one's attention on the business at hand.

And when that dirty business is the subversion of the American people's right to privacy, there's also nothing quite like economic self-interest for ensuring that a cone of silence descends over matters best left to the experts; a veritable army of specialists squeezing singular advantage out of any circumstance, regardless of how dire the implications for our democracy.

In light of this recommendation researcher Christopher Soghoian, deploying the tools of statistical analysis and a keen sense of outrage, reaffirmed that "Internet service providers and telecommunications companies play a significant, yet little known role in law enforcement and intelligence gathering."

That the American people have been kept in the dark when it comes to this and other affairs of state, remain among the most closely-guarded open secrets of what has euphemistically been called the "NSA spying scandal."

And when the Electronic Frontier Foundation (EFF) posted thousands of pages of documents "detailing behind-the-scenes negotiations between government agencies and Congress about providing immunity for telecoms involved in illegal government surveillance" last month, they lifted the lid on what should be a major scandal, not that corporate media paid the least attention.

A lid that Obama's "change" regime hopes to slam back down as expeditiously as possible.

Hoping to forestall public suspicions of how things actually work in Washington, the administration has declared that "it will continue to block the release of additional documents, including communications within the Executive Branch and records reflecting the identities of telecoms involved in lobbying for immunity," according to EFF's Senior Staff Attorney Kurt Opsahl.

No small matter, considering that should a court ever find avaricious telecoms and ISPs liable for violating the rights of their customers, fines could mount into the billions. Even in today's climate of corporate bailouts and "too big to fail" cash gifts to executive suite fraudsters, damages, both in monetary terms and adverse publicity, would hardly be chump change.

Hence, last year's mad scramble for the retroactive immunity avidly sought by these grifters and granted by congressional con men on both sides of the aisle when they passed the despicable FISA Amendments Act, hastily signed into law by our former "war president."

Without belaboring the point that corporate media largely failed to expose the extent of the dirty deals struck amongst these scofflaws, Soghoian, a graduate student no less, stepped into the breech and filled some necessary gaps in the surveillance story.

Believing, naïvely perhaps, that numbers don't lie and that laying out the facts might just wake us from our deadly slumber, Soghoian writes: "If you were to believe the public surveillance statistics, you might come away with the idea that government surveillance is exceedingly rare in the United States."

Indeed, "the vast majority of ... [court] intercept orders are for phone wiretaps. Thus, for example, of the 1891 intercept orders granted in 2008, all but 134 of them were issued for phone taps."

Which begs the question: "How often are Internet communications being monitored, and what kind of orders are required in order to do so."

Unsurprisingly, the threshold for obtaining personal records is exceedingly low and "very few of these methods require an intercept order."

All the government need do to obtain a pen register or trap and trace order, which examine to/from/subject lines of email messages, URLs of viewed web pages, search terms, telephone numbers dialed and the like, is to unilaterally declare that information obtained via this backdoor route is "relevant" to an ongoing criminal or counterterrorist investigation.

In other words, give us everything we want and move along!

The nation's telecoms and ISPs have been very accommodating in this regard. And, as with other recent historical examples that come to mind such as the rush by U.S. firms to "rebuild" Iraq, Afghanistan and other benighted nations "liberated" by that "shining city upon a hill" that bombs, maims and generally does what it pleases because it can, servicing the secret state's limitless appetite for "actionable intelligence" has proven to be a very lucrative cash cow indeed.

Go Here Now: http://www.globalresearch.ca/index.php?context=va&aid=16497

Saturday, December 19, 2009

Another Obamanation

Why would someone want this much innocent blood on their hands? It boggles my mind.

U.S Kill 63 Civilians, 28 Children in Yemen Air Strikes

http://www.informationclearinghouse.info/article24226.htm

US Attack Kills 120 In Yemen
Obama Ordered U.S. Military Strike on Suspected "Terrorists"

http://www.informationclearinghouse.info/article24225.htm

"Nobel Peace Prize Winner Barack Obama, is Preparing for War in South America"; Interview with Eva Golinger

http://www.globalresearch.ca/index.php?context=va&aid=16604

September 11, 2001: America and NATO Declare War on Afghanistan
NATO's Doctrine of Collective Security

http://www.globalresearch.ca/index.php?context=va&aid=16573

Tuesday, December 08, 2009

Liberty

"Educate and inform the whole mass of the people... They are the only sure reliance for the preservation of our liberty."

~~~ Thomas Jefferson

Sunday, December 06, 2009

Directed Energy Weapons (DEW's)

Take what you learned about Ionspheric Heaters (HAARP) in The Matrix Deciphered and apply it to the information below. Add this information to your awareness of the Infowar. In thinking about how to be effective on this level of the war I came up with a few ideas. The key weapon systems being used are the ionospheric heaters and possibly special/secret satellites, so these must be banned internationally and then dismantled so they can't be used again. Until this happens it would be helpful if people who have an education in this kind of info/knowledge could develop technology that can detect this energy when it is being used on a person or object; maybe something hand-held like a scanner/binoculars/camera etc. The second thing that should be developed is some sort of shielding device that can negate this energy and protect the individual or object that is targeted. It might be more practical if people with these knowledge/skills/abilities could do it anonymously and then make it public worldwide. Something akin to what happened with the latest climate revelation called Climategate. Spread this info to anybody you think might be effective and willing in this part of the Infowar. I don't think this war can be won without dealing with this aspect of it.

Spectogram

Used in many fields of study, it basically is a signature or finger print of a signal source broken down into all the individual frequency components. It can show what frequencies are absorbed, reflected, scattered, or changed. Every object from stars to humans has a unique spectrogram to identify them. Think of this as decomposition into what colors make up the object.

Phased Locked Loop

This is an electronics term. It is part of how tracking and precise targeting is done once a “lock on” of a target is achieved. It precisely measures Doppler frequency shift. In a continuous wave RADAR signal, the phased locked loop will guarantee tracking to very large velocities such as meteor tracking (60,000 km/hr). This is the same technology used to lock onto jet fighters and missiles.

Phased Array

A phased array is simply a tight grid of sensors that use the timing different of energy to triangulate on reflections. They can also emit energy in reverse to target objects with specific resonance energies for optimum absorption. The largest array on Earth is known as HAARP but all grids around the world are connected now. These are electromagnetic arrays but the same principle applies to the underwater arrays or ultra-sonic heterodyning sound arrays.

Neurological Weapons

The reason bio-communication and neurological weapons are classified as directed energy is because of the precise deposition of energy into the target without affecting surrounding objects. It is counter intuitive to many people to call a global weapon where the ubiquitous nature of the energy can penetrate deeply into materials and other objects without significantly affecting them electromagnetically, a directed energy weapon. One naturally thinks of heating weapons like lasers, masers, and ADS (active denial of service). When the nervous system of a human being or animal is the target, it is classified as a neurological weapon, often mis-classified as non-lethal. Neurological weapons are unpredictable lethal but do kill with prolonged exposure for sure and could be better described due to the human way it kills as worse-than-lethal weapons.

Targeting and Tracking

The last feature of any successful directed energy system is the tracking and targeting algorithms. The Earth has been covered with sensors that are all interconnected to create what is called holographic imaging. This is simply the reverse process of directing energy from thousands of locations. Targeting is done through signatures, be it a nuclear submarine, an airplane, a meteor, or a human. This allows recognition of the target. The Doppler (F-Spread) and what is called a phased locked loop. Using the entire spectrum plus pulsed, swept, and continuous RADAR technologies, multiple targets can be continuously tracked at any depth and location. Since the energy is from many locations, there are no blind spots with holographic imaging.

One last interesting technology to note but we will not get into the description here is a technique called ion cyclotron resonance. It is the gyro frequency of ions. This is a technique to measure speed (heat) of ions anywhere on the Earth. It is important in terms of one of the sensing technology capabilities.

Saturday, December 05, 2009

Eugenics

I agree with Barbara Marx Hubbard but the 1/4 destructive that she needs to talk about are the eugenicist, the war-mongers, the climate change liars, the shadow government, false flag terrorists, child kidnapping rings, economic hit men, corrupt bankers, corrupt politicians, and all other enemies against humanity and the ideals of freedom. Make the first move the samurai way (Hari-Kari).

Her quote.

"Out of the full spectrum of human personality, one-fourth is electing to transcend…One-fourth is ready to so choose, given the example of one other…One-fourth is resistant to election. They are unattracted by life ever-evolving. One-fourth is destructive. They are born angry with God…They are defective seeds…There have always been defective seeds. In the past they were permitted to die a ‘natural death’…We, the elders, have been patiently waiting until the very last moment before the quantum transformation, to take action to cut out this corrupted and corrupting element in the body of humanity. It is like watching a cancer grow…Now, as we approach the quantum shift from creature-human to co-creative human—the human who is an inheritor of god-like powers—the destructive one-fourth must be eliminated from the social body. We have no choice, dearly beloveds. Fortunately you, dearly beloveds, are not responsible for this act. We are. We are in charge of God’s selection process for planet Earth. He selects, we destroy. We are the riders of the pale horse, Death. We come to bring death to those who are unable to know God…The riders of the pale horse are about to pass among you. Grim reapers, they will separate the wheat from the chaff. This is the most painful period in the history of humanity…"

Futurist Barbara Marx Hubbard (who wanted to create a Dept. of Peace)