Next Step, Skynet: ‘Boeing Close to Choosing Carrier Drone Design’

Next Step, Skynet: ‘Boeing Close to Choosing Carrier Drone Design’

SAINT LOUIS, Mo. — Boeing is getting “very close  to having what we’d say is a very capable design” to pitch for the Navy’s Unmanned Carrier-launched Airborne Surveillance and Strike (UCLASS) program, Chris Chadwick, president of the company’s military aircraft division told DT at  Boeing’s Saint Louis, Mo., facilities yesterday. While he wouldn’t reveal much about the company’s UCLASS design, he did say that it definitely isn’t “a warmed-over X-45.”

The X-45, which has evolved into the Phantom Ray, was Boeing’s unsuccessful bid for the Navy’s Unmanned Combat Air Vehicle Demonstrator (UCAS-D) program that is using Northrop Grumman’s X-47B to test out how to conduct carrier ops with a large, stealthy UAV.

UCLASS is the Navy’s effort to field a fighter-size, stealthy drone capable of flying long distances to spy on and attack enemies by 2018. The Sea service considers it a follow-on effort to the UCAS-D program.

A couple months ago, we showed you the drawing of a mysterious aircraft (shown above) depicting what Boeing officials said was merely a concept image for UCLASS, not a final design, and that the company was still evaluating a half dozen or so different designs that it could pitch for the effort.

Chadwick said he isn’t concerned about Northrop having an advantage over Boeing in the UCLASS program, saying that all competitors into the contest will have access to the information learned from the UCAS-D program.

Northrop is likely to offer a version of its X-47B for the UCLASS contest while General Atomics is offering a version of its Predator C Avenger, called the Sea Avenger, that’s equipped to handle the strains of catapult launches and arrested landings as well as the salty sea air and Lockheed is apparently going to bid with a yet-to-be revealed design.

Truth Seekers: The Meaning of Life #YouAreTheMatrix

Truth Seekers: The Meaning of Life #YouAreTheMatrix

Truth Seekers

“Let him who seeks continue seeking until he finds. When he finds, he will become troubled. When he becomes troubled, he will be astonished, and he will rule over the all.”

 

http://youtu.be/7sPUpKGI1Z4

 

There is only one way to defeat this systemic cancer or virus that is spreading across the planet and through every living being and it isn’t by getting on your knees and praying to an external God for a miracle… I’m sorry to disappoint you if you’re a believer in these concepts but the idea of a savior existing somewhere outside of the infinitely powerful intelligence that is YOU is one of the greatest confidence tricks that you’ve played on yourself… you just don’t realize it yet.

As long as you’re searching “outside” for this imaginary savior to come sweeping down from the heavens on a chariot of fire or something you will be wallowing in self inflicted suffering for a very long time because metaphorically speaking… hell will first have to freeze over. What is outside is a projection of the inside, therefore, anything that is seen out there is really a reflection of what is going on inside here. God and Jesus are cosmic ideas or conscious expressions unfolding from the imagination of an infinitely powerful intelligence that is you and every point of light that exists in this reality… in whatever form.

You, we, us… have ALL created a cosmic drama that goes beyond the comprehension of isolated and limited intelligence, however, because we are currently undergoing a metamorphosis in a capacity that some might call a “spiritual” awakening, where our collective Mind or shadow universe is being illuminated by the essence of truth, we are for the first time in a very long time able to see our own magnificent reflection in the mirror or firmament and understand what it is to be hu-man-e

What we find in the mirror is the divided essence of Love. Individual strands of energy on the above plasma ball do well in representing sentient currents of light that arc away ever so briefly from their source, much like a solar flare arcing from the sun before being pulled back by the power of electromagnetism. The experience is one of self discovery before metaphorically returning home to the ONE and ONLY source.

Do you have children… do you remember them experiencing an arc around the age of 15 to 18 months when they become self aware and were able to recognize the reflection in the mirror. The next look in the mirror is looking up into the universe that is your-self and understanding that your not looking “out there” but actually looking at the reflection of your own infinite subconscious, that you are a universe within a universe.

The purpose of God and Jesus… and of every saint or so called sinner like all other sentient beings that has in the past and to this moment continue to influence humanity is to divert the “collective” attention – to keep the eyes looking in the opposite direction in order to prevent the sleeping giant from waking up out of its own self induced slumber and seeing itself for what it is. There is a process to follow… wheels and cogs must turn.

You have to understand… most people are not ready to be unplugged and many of them are so inured , so hopelessly dependent on the system that they will fight to protect it

Morpheus

The restrictive field that manifests by choosing to put faith in someone or something else blocks opportunities to evolve in terms of developing knowledge and it ensures YOU won’t be looking in the one place that really matters. The place where your eyes should be focused if you want to call on a true savior is an aspect of the self that is taken for granted every day… it is of course the eternal subconscious or inner self… the inner universe. This integral part of the self, this other aspect of you is the original source of all there is and all there ever will be. By using the power of intent to place your-imaginary-self into limited states of awareness where you depend on something else… you are actually holding to ransom the essence of you in a world of virtual hope where ironically… there is no hope.

As frustrating and maddening as the world can sometimes appear externally reality is merely reflecting the inner imaginings of the one-self, particularly now, in this era of global silliness and contrived insanity you should realize, more than ever, in your heart, that there is always a happy ending… and therefore allowing the madness and frustration to consume and eat you up is to allow negative energy to vampire you. The meaning of suffering becomes clear when you realize that spiritual or soul growth can only be achieved when you experience and FEEL all manner of pain. The way in which we experience this pain is to see our-self as something we are not.

As the famous comedian Bill Hicks once said:

The world is like a ride at an amusement park, it goes up and down and round and round, it has thrills and chills and it’s very brightly coloured and it’s very loud and its fun, for a while. Some people have been on the ride for a long time and they begin to question: Is this real, or is this just a ride?

Every sentient being that is born into this world unfolds from an all embracing source as a temporary point of isolated awareness… or light. In the beginning eternal memories are wiped clean but are never forgotten… they are simply filed away… stored in the Akashic library or on the cosmic hard drive. The ultimate quest is to harvest new feelings and experiences from newly born points of view… but as Bill Hicks rightly observed and then pointed out… life is just a ride…

Call it a lucid dream… a movie of epic proportions or liken it to a fly-on-the-wall drama, in every way shape and form, intelligent awareness is observing these events play out, furthermore, this intelligence participates in key decision moments to co-create reality in real time whilst the better part of itself remains hidden from view. The truth is… we co-create everything – there is nothing we cannot and have not created with an infinitely powerful imagination.

The challenge… and I say challenge in the loosest terms because life and all of this madness is really a game… is for intelligence to once again see itself for what it is… through a web of intricately linked and highly personal mind-opening apocalypses. The ONLY reason IT can’t see itself for what it is at the moment isn’t because it’s too blind or stupid… but because it has conditioned or programmed itself to forget itself until this moment.

Right now in this moment in time individual waves of light are breaking the surface of the ONE infinite sea of intelligence to view the reflection from a myriad of isolated points or nodes of awareness. As a temporary and seemingly isolated “wave” our/your/my understanding is limited because a wave is momentary unlike the perpetual ocean from which it unfolds. The ocean is seeing the waves and remembering.

Forgetfulness is a trait or characteristic that is reflected inwards and outwards in every aspect of creation. At an infinitely larger scale, forgetfulness has been used to hide or mask the true nature of awareness. Forgetfulness has been a welcome break for that part of you that is everlasting and God-like.

Subtle reminders are embedded into life experiences in the hope that one day you will re-discover yourself… there was never any rush and as the Rolling Stones once memorably sang… “Time is on my side”. Listen to your-self. These reminders or jolts come in the form of thoughts, ideas, images, words, symbols and sounds and in other less obvious ways such as dreams and intuition.

The eternal source that is you gives as it must and takes when necessary. You know what you need in order to grow. No one knows you better than you. The bible is part of the cosmic code… like all historical documents and books it contains fragments of a wider and deeper truth, call them cosmic jigsaw pieces, whatever, the quality of this information is like a Mandelbrot fractal in that it contains memories or information about the entire whole.

It is these pieces of information that are designed to jolt awareness into remembering who and what it is and thus initiate the long and sometimes painful process of self discovery or awakening… this is an intelligent process that “feels” its way and is deeply troublesome for those experiencing it. However, its important to remember that everything happens as it should and that you are never somewhere that you are not meant to be.

This is a game of cosmic hide and seek and the full magnitude stretches way beyond the scope of many people’s vision and imagination, at least for the time being… but that doesn’t mean everyone will always be blind to what has been hidden, it simply means that some people are just not ready for the veil to be lifted, but then that shouldn’t come as a surprise because the game hasn’t been made easy… it’s not easy to accept a truth that is too blinding to see.

But Love will find a way, so for now, but not for very much longer, the game plays out, a game that has probably been playing for billions of years… perhaps even billions and billions of aeons… but even billions and billions of aeons for immortality is a drop in its own never ending ocean of potential.

The experience that is collectively known as “mankind” is a life-like dream based on the idea of helplessness. As a so-called species, mankind has been led to believe it is the victim of unpredictable circumstances and that it has been born into an unwelcoming and cold mechanistic universe, that it is some tiny insignificant dot unable to save itself… in short, the collective experience is guided to view itself as something it is not… this is part of the show, the game, the bigger dilemma in which you star.

The reason that life with all its thrills and spills feels so real is because it has been designed this way… experience has to be what it is, it has to be fantastically surreal in order for you to come into contact with the most breathtaking FEELINGS of adventure and perhaps discover something new about yourself. This is the ultimate desire – to learn something new.

So remember, even those playing the bad guys… and you know the ones… the ones you constantly fret and worry about – the ones that waltz around the planet thinking they are the chosen ones whilst causing all manner of destruction… well, they too are role playing a fantasy in blissful pig ignorance… they have no more or no less importance in the grand scheme of things than you do. They are no more or no less sovereign than you.

The ultimate truth is that you and collectively WE (even them) are the all powerful omnipotent intelligence that permeates everything… and it is down to you to individually wake up and remember who and what you are if you want to be the change. You have to discover what you have hidden from your-self… you have to remember that you are the universe, that YOU are the genie and as a genie you don’t ask for wishes… you grant them, because you are the designer… the co-creator, the programmer. The master of imaginings… God.

Life experience gives you plenty of opportunities to remember who you are. I call these opportunities “nodal” experiences or key moments in conscious streams or individually defined sentient wavelengths – they are the points at which potential wave experiences diverge and cross. They symbolize the cross over of paths… the fork in the road where we stare change in the face without even realizing.

Nodal experiences are predetermined points that are often referred to as moments of fate or destiny. In essence, that is, in imagination, these key moments exist before we reach them… they are set in stone, however, the outcome of each moment is defined when we choose which fork in the road to take. Therefore, these points or moments are the manifestation of our ability to express choice through desire – hence we co-create elements of our life alongside predetermined events, subsequently, life is a blend of intent and destiny. Choice represents the potential to change something about our lives in order to make something different. Life is full of this potential.

In the grand scheme of things,  intent is an opportunity for us Mandelbrot fractals of intelligence to personally “sign” our energy expressions… it is our opportunity to continue riding the same wavelength and chase our own tail in endless cycles if we so desire or it is an opportunity to change direction and take the road to truth, freedom and self discovery.

The problem (nudge nudge wink wink) is that intelligence has become so caught up in the real-life drama it has imagined, written, produced and consequently co-stars in… that it has completely forgotten itself. Intelligence is experiencing its very own cosmic groundhog day.

It’s time to wake up… can’t you hear the calling?

The Shakedown

 

9/11: Reality and the Beliefs of the Military and Clandestine Community

9/11: Reality and the Beliefs of the Military and Clandestine Community

Romney’s close relationship with Orit Gadiesh and Israeli military intelligence is the real reason he is the chosen candidate of the Zionist establishment. Romney is being supported by high-level Zionists, Israeli military intelligence, and their controlled media network.

 

First of all, to the idiots who monitor all our communications, internet, telephone, who knows how far they have gone or are going, do not think there aren’t lists of those who oppose this illegal effort and will see to it you are indicted.  If  you believe the current form of government is going to be superseded by a corporate plutocracy as in the Canadian TV shown “Continuum,”  (find it) you are mistaken. 

The old power bases are gone, too many have been burned.  Playing spy as though you think the courts still support FISA will get you some GITMO time, don’t take my word for it, “times are a changin.’”

Homeland Security (DHS) is strangling the efforts of several older institutions.  This is beyond just “turf war” and is becoming an embarrassment.

The machinery put together during Bush II is entirely dysfunctional, control of the Justice Department is gone, in fact, under Holder, we aren’t sure it exists anymore.  Only Homeland Security is still around and will be held accountable, not for passenger searches but for childish plots.  Go ahead, bug the Pentagon, you won’ t like it.

Here is where things stand on 9/11 today:

  • The official accepted belief on the towers is that the two were destroyed by 4 small nuclear devices, two in the basement, two on upper floors, that produced over a million degrees of heat that dissolved the building, put out minor radiation for a short distance and kept fires burning for months.  It vaporized enough steel to build 3 huge aircraft carriers and huge beams hundreds of yards away show more damage than anything in Hiroshima.  This is the official opinion of DARPA and the US Army.   This is highly classified but I am printing it anyway. 
  • Building 7 is said to have been destroyed with conventional explosives.
  • No official secret finding has been reached on the Pentagon attack other than that wreckage from a Columbia crash in 1995 was dumped on the lawn and the site was altered during the day to simulate an air crash.  I have not been given access to anything beyond this and choose not to make something up.
  • The official finding as to rationale for the 9/11 attacks was to cheat insurance companies out of billions.  Those who have examined US policy said that there were other simpler possibilities for bringing the US to war other than the 9/11 action against the US.  (for those who don’t catch the connection, it has been accepted that 9/11 was an “inside job”)
  • Many Israeli teams were involved in 9/11 and the twin tower attack was entirely an Israeli action with our military and intelligence services denying involvement.  This is not my opinion, this is official.
  • Several Israeli teams were arrested on 9/11, one after the George Washington Bridge explosion.  There were other attacks on 9/11 thwarted by police, one on the Lincoln Tunnel.  There is no evidence of an attack on the Verrazano Bridge or Brooklyn Bridge.  Arrests were made of the Israeli’s at the GWB, hard proof exists but the arrests at the Lincoln Tunnel, two Israeli citizens, van of explosives and weapons is only backed by limited police testimony and they are scared to death.  An authoritative source on the scene says the terrorists, Israelis, were turned over to Bernie Kerik, Police Commissioner and never heard from again.

Thousands of cancer victims, hundreds, maybe thousands dead of “radiation poisoning” already are attributed to use of fire hoses directly on the moulton nuclear “ground zero” which put radiated water vapor into the air which was unintended.  These nuclear heat chambers below the twin towers put out massive heat for 64 days under a flood of continual cold water although there is no official attribution to their heat source.  Perhaps it was burning asbestos and insurance policies?

An outrageously false cover story about a “toxic stew” involving “dry wall” was part of the “official record.”  By that standard, every firefighter, drywaller or person who has lived in a building with drywall is actually dead but not yet informed.

Thousands of New Yorkers are dying of radiation poisoning from 9/11 and being “monitored” or being offered payments from a several billion dollar fund that mysterious appeared to buy their silence.

Other groups have evidence regarding the aircraft, crews, passengers, “theoretical phone calls and text messages” with much of it in FBI files.  Some of that information is evidence worthy and some is not but there is much that can be introduced in court.

Many people who are potential witnesses have disappeared, thousands have been threatened.  The numbers are so large that they in themselves have been used by some as proof there was a massive coverup conspiracy.  “Why or how could so many people be controlled or killed and what kind of person would do this?”

Do you really want that question answered?  You think the million plus dead on Rwanda was an accident?  You never heard of the uncounted dead in Guatemala, Mexico and where  you have heard, you have been lulled into immunity.

VITAL INTERESTS

There technically was no “9/11″ and thus, any defense of American interests through military occupation, stimulation of insurrection, emplacement of puppet governments and theft of resources, no matter how profitable for the gang inside the Beltway, is not sustainable.

America has no vital interests in Central Asia nor is there any potential threat to oil supplies in a nation that has the choice of becoming oil independent in less than 3 years.  (Can prove this is court).

Even Iran would sell us all their oil at deep discount and take payment in new Jeeps and Fords if we wanted, were we not run by crazy people.   Want me to prove it to you?

ROMNEY, MASTER CRIMINAL AND SPY OR SIMPLY A “WANNABEE ANTI-CHRIST?”  (Thanks to Tex Marrs and Christopher Bollyn)

Orit Gadiesh (Hebrew: אורית גדיש‎) is an Israeli-American corporate strategist and chairwoman of management consulting firm Bain & Company. Source-Wikipedia

We are now holding strong proof that Romney and “Bain Capital” are agents of the State of Israel who is attempting to rig an American election on behalf of a group of European entities unfriendly to the continued freedoms left to the American people.

Mitt Romney is, in fact, a clear and present danger to the United States.  Chris Bollyn has stated the following, and I find Chris a credible source:

ROMNEY’S ISRAELI HANDLER – Orit Gadiesh, former “War Room” assistant to Ezer Weizman and Moshe Dayan, is the daughter of Israeli Brigadier General Falk Gadiesh (born Falk Gruenfeld, Berlin, 1921) and his Ukrainian-born wife. Gadiesh is chairman of the management consulting firm Bain & Company, the parent company of Bain Capital, and was the company’s managing director under CEO Mitt Romney in 1992. “She’s like a Jewish mother figure to many of the people at Bain,” ex-Bainie Dan Quinn told Fortune magazine in 1996.

Bain Capital owns Clear Channel, the largest radio station group owner in the United States. Clear Channel owns the networks which air the most popular radio talk shows, including The Rush Limbaugh Show, The Glenn Beck Program, The Sean Hannity Show, America Now with Andy Dean, Coast to Coast AM, The Savage Nation, The Mark Levin Show, and The Dave Ramsey Show. (Graphic: “Rush Limbaugh Spills the Beans on the Jewish Conspiracy” by Pat Healy)

Mitt Romney was a co-founder of Bain Capital along with Bill Bain, seen here. Bain was ousted in 1991 and Romney served as CEO of Bain & Company in 1991-1992. In May 1991, while Romney was CEO, Gadiesh was named chairman of the company’s Policy Committee, which set the company’s business strategy and policy. In 1992, under Romney, she became managing director. Orit Gadiesh, who has worked at Bain & Co. since 1977, became chairman of Bain & Co. in 1993.

 Orit Gadiesh, born in Israel in 1951, has worked closely with Mitt Romney since at least 1991, and probably much longer since she joined Bain & Company in 1977, when she was 26. Romney appointed Gadiesh to his transition team when he became governor of Massachusetts in November 2002. Gadiesh is the daughter of Falk Gadiesh, an Israeli brigadier general and former member of the general staff who reorganized the Israeli army in the early 1950s after a stint at the Massachusetts Institute of Technology (MIT).

Falk’s daughter Orit was chosen to serve in Israeli military intelligence. Her first position in the Israeli military was as assistant to Ezer Weizman, the deputy chief of staff who later became president of Israel. During the early 1970s, she worked in the war room, a bunker where Gen. Moshe Dayan was in charge. As a war room assistant to Weizman, Orit provided military leaders with documents and correspondence.

Prior to joining Bain & Company, Gadiesh served in the office of the Deputy Chief of Staff of the Israeli Army. Currently, she is on the board of directors of the Peres Center for Peace, an organization headed by a former chief of staff of the Israeli military, Lt. General Amnon Lipkin-Shahak. The high-level Mossadnik Avner Azulay, managing director of the Marc Rich Foundation, is also on the executive board of the Peres Center.

ROMNEY’S INTELLIGENCE CHIEF AND CAMPAIGN ADVISER – Mitt Romney named Michael Chertoff, the Israeli agent who supervised the destruction of the crucial evidence of 9/11, co-chair of his counterterrorism and intelligence advisory committee in October 2011. The 9/11 cover-up continues.

Mitt Romney attended the Mossad’s “Herzliya Conference on Israeli Security” in 2007. Romney and the current Israeli prime minister Benjamin Netanyahu worked together as consultants at the Boston Consulting Group early in their careers.

Romney’s close relationship with Orit Gadiesh and Israeli military intelligence is the real reason he is the chosen candidate of the Zionist establishment. Romney is being supported by high-level Zionists, Israeli military intelligence, and their controlled media network. This relationship between the Israeli military and Mitt Romney, a presidential candidate, should be of great concern to all Americans because this is how the Israeli military plans to drag the United States into a war with Iran.

RON PAUL

If it is not clear it should be.  Ron Paul won the Republican nomination for president.  He could have won the Democratic nomination just as easily.  The only reason we are seeing Romney is that he is a foreign agent who represents an attempt at further overthrowing American freedoms and has absolutely no right to represent himself as a candidate from the Republican Party.

The nominating process, which has yet to conclude, has been wrought with vote rigging, millions in bribes and violations of every kind.

Ron Paul won and Romney is a foreign spy, a demagogue, a dangerous fanatic and has spent his life as part of an organized crime syndicate.  Most elections, priaries, caucuses were rigged, almost all show clear criminal activity and there is no effort to correct this because the election for president of the United States is being managed from Tel Aviv (read Moscow).

He makes Obama look good.  Does America need a president put in office by another rigged election, this one with 4 wives (only a rumor from people near him) and over 10000 illegal Swiss bank accounts.  Bain Capital, according to reliable sources is one of the biggest sources of terrorist funding on earth, biggest traders in conflict diamonds, and deeply involved in human trafficking.

Did Romney learn this as a Mormon Bishop?

CANADA

Last week, Canada’s banking system crashed, something kept out of their papers.  America sent Canada $131 billion dollars to underwrite their currency or Canada would be gone.  Canada has prided itself at being independent, at being free, at being a model nation.

Want some unpleasant truth?

Israeli spies run Canadas’ government and economic system through blackmail, bribery and intimidation.

Canada has smuggled more nuclear technology and refined uranium than any other country on earth and are a greater danger than even Germany and North Korea, the biggest exporters of WMD technologies.

If one were to want to find an evil empire, the “secret society” ruling sectors of both Canada and Germany, whose citizens are kept in absolute ignorance, are the real world axis of evil or as close as we have now.  A few decades ago, one could have made a list including East Germany, South Africa, Libya, Germany (even then), Czechoslovakia.

I love Canada, my family helped found it but watchfulness and strength are needed more in Canada than petty socialism, political correctness and stifling the truth, which is Canada’s greatest skill as yet.   Let me look in the drawer here, I think I still have charters awarding us everything from Windsor and Amherstburg to well past Toronto.  Now, if I want to repossess Southern Ontario, I have to negotiate with Timothy Geithner who seems to be holding the mortgage on Canada.

What  kind of nation would accept a secret bailout with counterfeit money? (For my Canadian friends, ask about the $131 billion, where did it go and who authorized it?)

CONCLUSION

These are the hard facts and accepted theories by the real experts, without any of the speculation of activists or “conspiracy theory” folks.  There is more, much more, but how much anger is allowed?

What we can’t do is walk away from our political system when we have one party of foreign controlled traitors, the GOP and another of petty mobsters and incompetents, the Democrats.  We have what we deserved.  When we were offered the candidate we dreamed of, perhaps not the charisma of Bobby Kennedy but Ron Paul, once free of the “bought and paid for” congress, could and is likely to begin restoring America.

Let us first jail those who created this upcoming election and do it quickly, ridding ourselves of Mr. Romney, Mr. Adelson, Mr. Netanyahu, Ms. “Ferkel” Merkel of Germany and the pack of thieves who have taken control of Canada.

Maybe an early place to look for our Israeli friends is Wisconsin.

SOURCE: http://www.veteranstoday.com/2012/06/09/911-a-decade-later-a-whole-new-ballgame/

Why Hillary Clinton Should Join Anonymous

Why Hillary Clinton Should Join Anonymous

The State Department and the online mob are both destroying “Internet freedom.”

 

It’s hard to deny the intellectual ambiguity of “Internet freedom” when among its staunchest defenders are idealistic hacktivists from Anonymous and hard-nosed diplomats from the U.S. State Department—two groups that otherwise disagree on everything else. Ironically, both may end up hurting the very noble cause that they seek to promote.

The diplomats’ problems are quite well-known by now. While Hillary Clinton likes to give speeches in which she fashions herself the world’s greatest defender of “Internet freedom,” the harsh reality is that her own government is its greatest enemy. Given the never-ending flow of draconian copyright and cybersecurity laws coming from Washington, this fact is getting harder and harder to conceal from the global public, who starts to wonder why American diplomats keep criticizing Russia or China but don’t say anything about the impressive online spying operation that the National Security Agency is building inUtah. Nor does the State Department object when America’s allies push for harsh surveillance laws; Britain, with its proposed surveillance legislation, is a case in point. America’s “Internet freedom agenda” is at best toothless and at worst counterproductive. While focusing on (and overselling) the liberating promise of social media in authoritarian regimes, it conceals a number of emerging domestic threats that have nothing to do with dictators—and everything to do with aggressive surveillance, disappearing privacy, and the astonishing greed of Silicon Valley.

The case of Anonymous is not as straightforward. This movement is so distributed, fluid, and occasionally disorganized that anyone seeking to pigeonhole it into a coherent ideological doctrine would not get too far. Still, most of its recent high-profile attacks—upon the intelligence firm Stratfor, the Central Intelligence Agency, the signatories of the Anti-Counterfeiting Trade Agreement (which, among other things, aims to thwart Internet piracy), and the Chinese government—are motivated by a desire to defend “Internet freedom.” In this lofty goal, the agendas, if not the approaches, of Anonymous and the State Department overlap.

Why these particular targets? Predictably, Anonymous hates Western governments for ushering in more surveillance and draconian piracy laws; the security industry—for satisfying the growing policing demands of those governments; the Chinese government—for being the world’s mightiest Internet censor.

Such flashy attacks are still widely discussed in the media, and that can inspire valuable broader discussion of some important Internet issues, such as the controversial Cyber Intelligence Sharing and Protection Act. But spectacles, which are bound to get boring, are not a sustainable political strategy, as the media will eventually lose interest. And Anonymous has yet to go beyond spectacle and offer a more meaningful way for its members to contribute. Cyberattacks are cheap, easy, and can attract thousands of participants without demanding much of them. In this, they can be seen as a form of “slacktivism”—they make everyone feel good but don’t necessarily advance the cause. They can be great for stunts, but one can’t change the world with stunts alone.

But—yet another parallel to the State Department—it’s not just that Anonymous’ campaigns might be toothless. They may prove counterproductive as well. The cybersecurity industry has almost certainly benefited from the buzz and fear-mongering generated by Anonymous’ attacks. Every new incursion by Anonymous must be greeted as good news in the offices of companies providing cyberdefense to both public and private sectors. Now that Anonymous has revealed that even private intelligence-gathering firms are not safe—a few months ago, it obtained the emails from Stratfor, which eventually were published by WikiLeaks—it’s a great time to be a provider of cybersecurity services!

The hacktivists keep supplying the industry with strong examples as to why more public money should be spent beefing up Internet security and surveillance while eliminating online anonymity. Take Anonymous’ recent assaults on the websites of USTelecom and Tech America, two leading technology trade associations that have lent their support to CISPA. It doesn’t take a genius to realize that a cyberattack against groups that promote legislation to combat cyberattacks only strengthens their case. It’s like shooting a bazooka in a legislative session about gun control. This was not lost on those trade associations, and they exploited this gift from Anonymous to its fullest. Thus, the president of USTelecom claimed that “by their actions Anonymous hacktivists underscore the importance of speedy action on the bipartisan [CISPA] legislation to ensure that the Internet remains an open and safe forum for all.” Regardless of what happens to this particular piece of legislation, it’s likely that lawmakers will be under growing pressure from the military-digital complex to do something about Anonymous’ attacks—and that “something” would not be conducive to any kind of “Internet freedom.”

We can expect similar developments to take place in China, where in early April a group that calls itself “Anonymous China” defaced several government websites and promised to take down its notorious censorship system. The damage caused is minimal, while the symbolic value derived from exposing the Chinese Internet censorship to the international audiences is arguably insignificant. It’s already a well-known problem. But Anonymous’ attacks do give the Chinese government good reasons to invest money into online surveillance and, perhaps, even do it with popular support: Anonymous is not above exposing credit card details of innocent victims—and China’s burgeoning middle classes will easily grasp the implications of online insecurity. If the strikes continue, Anonymous may be China’s equivalent of Stuxnet—the computer worm that disrupted Iranian nuclear facilities—only without imposing any of Stuxnet’s crippling costs. Iran’s ongoing flirtation with the idea of a “national Internet,” itself a reaction in part to Stuxnet, is a good example of how the rhetoric of cyberattacks may be invoked to justify more Internet control.

Why doesn’t Anonymous seek more effective means of cyberactivism? This is where the organization’s decentralized structure is a liability, not an asset. The movement that claims to have no leaders—well, aside from those “leaders” who happen to be working for the FBI—and that means short-term, easy objectives (often bordering on pranks) can take precedence over long-term strategic goals.

The very idea of an online campaign to defend “Internet freedom” is problematic. It’s not like an appeal to raise money for a presidential candidate or victims of a natural disaster; it takes more than a few clicks or cash donations. Moreover, the goals and priorities of such a campaign are likely to shift all the time, depending on the political context. Defending “Internet freedom” requires constant interpretation, deliberation, and discrimination between different courses of action. In contrast, online fundraising usually has fixed goals and is amenable to small-scale, granular contributions.

Without greater bureaucratization, formal mechanisms for decision-making, and, more importantly, the capacity to accept responsibility when those decisions bring unfortunate consequences, Anonymous may end up posing as great of a threat to Internet freedom as its main nemesis, the U.S. government.

Source: http://www.slate.com/articles/technology/future_tense/2012/04/internet_freedom_threat_posed_by_hillary_clinton_s_state_department_and_anonymous_.single.html

NSA: Security Conguration Recommendations for Apple iOS 5 Devices

NSA: Security Con guration Recommendations for Apple iOS 5 Devices

>>>>    NSA_Apple_IOS_5_Security_Protocols  <<<<

 

Purpose. This document provides security-related usage and con guration recommendations for Apple
iOS devices such as the iPhone, iPad, and iPod touch. This document does not constitute Department
of Defense (DoD) or United States Government (USG) policy, nor is it an endorsement of any particular
platform; its purpose is solely to provide security recommendations. This guide may outline procedures
required to implement or secure certain features, but it is also not a general-purpose con guration manual.
The guidance provides recommendations for general-purpose business use of iOS devices for processing data
that is UNCLASSIFIED, and possibly Sensitive But Unclassi ed. Such data may carry various designations
such as For Ocial Use Only, Law Enforcement Sensitive, or Security Sensitive Information. Approval for
processing such Sensitive But Unclassi ed data is dependent upon risk decisions by Designated Approving
Authorities (or their analogs in non-DoD entities).
 
Audience. This guide is primarily intended for network/system administrators deploying Apple’s iOS
devices or supporting their integration into enterprise networks. Some information relevant to IT decision
makers and users of the devices is also included. Readers are assumed to possess basic network and system
administration skills for Mac OS X or Microsoft Windows systems, and they should have some familiarity
with Apple’s documentation and user interface conventions.
 
Scope. Apple’s mobile devices, including the iPhone and iPad, are prominent examples of a new generation
of mobile devices that combine into a single device the capabilities of a cellular phone, laptop computer,
portable music player, camera, audio recorder, GPS receiver and other electronics. The capabilities of such
devices are considerable but, as with any information system, also pose some security risks. Design features
can seriously mitigate some risks, but others must be considered as part of a careful, holistic risk decision that
also respects the capabilities enabled by such devices. Major risks, and available mitigations, are discussed
in Section 1.3.
 
Security guidance for mobile devices must cut across many previously discrete boundaries between tech-
nologies. For example, scrupulous deployment of an iPhone includes consideration not just the settings on
the device itself, but those of the Wi-Fi networks to which it will connect, the VPNs through which it will
tunnel, and the servers from which it will receive its con guration. This guide provides recommendations for
the settings on an iOS device itself, as well as closely-related information for the network and con guration
resources upon which deployment of iOS devices depends.

Five ‘Stand Your Ground’ Cases You Should Know About

Five ‘Stand Your Ground’ Cases You Should Know About

George Zimmerman, appears for a bond hearing with his attorney Mark O'Mara (R) at the John E. Polk Correctional Facility, Apr. 12, 2012 in Sanford, Fla. Zimmerman was charged with second degree murder in the fatal shooting of 17-year-old Trayvon Martin. (Photo by Gary Green/The Orlando Sentinel-Pool/Getty Images)

The Stand Your Ground law is most widely associated with the Feb. 26 shooting death of Trayvon Martin, an unarmed 17-year-old killed in Florida by George Zimmerman, a neighborhood watch captain who claimed he was acting in self-defense.

But as a recent Tampa Bay Times investigation indicates, the Martin incident is far from the only example of the law’s reach in Florida. The paper identified nearly 200 instances since 2005 where the state’s Stand Your Ground law has played a factor in prosecutors’ decisions, jury acquittals or a judge’s call to throw out the charges. (Not all the cases involved killings. Some involved assaults where the person didn’t die.)

The law removes a person’s duty to retreat before using deadly force against another in any place he has the legal right to be – so long as he reasonably believed he or someone else faced imminent death or great bodily harm. Among the Stand Your Ground cases identified by the paper, defendants went free nearly 70 percent of the time.

Although Florida was the first to enact a Stand Your Ground law, 24 other states enforce similar versions. Using the Tampa Bay findings and others, we’ve highlighted some of the most notable cases where a version of the Stand Your Ground law has led to freedom from criminal prosecution:

 

· In November 2007, a Houston-area man pulled out a shotgun and killed two men whom he suspected of burglarizing his neighbor’s home. Joe Horn, a 61-year-old retiree, called 911 and urged the operator to “ ‘Catch these guys, will you? Cause, I ain’t going to let them go.’ ” Despite being warned to remain inside his home, Horn stated he would shoot, telling the operator, “ ‘I have a right to protect myself too, sir. The laws have been changed in this country since September the first, and you know it.’ ”

Two months earlier, the Texas Legislature passed a Stand Your Ground law removing a citizen’s duty to retreat while in public places before using deadly force. In July 2008, a Harris County grand jury declined to indict Horn of any criminal charges.

 

· In Louisiana early this year, a grand jury cleared 21-year-old Byron Thomas after he fired into an SUV filled with teenagers after an alleged marijuana transaction went sour. One of the bullets struck and killed 15-year-old Jamonta Miles. Although the SUV was allegedly driving away when Thomas opened fire, Lafourche Parish Sheriff Craig Webre said to local media that as far as Thomas knew, someone could have jumped out of the vehicle with a gun. Thomas, said the sheriff, had “decided to stand his ground.”

Louisiana’s Stand Your Ground law was enacted just a year after Florida introduced its law.

 

· In March 2012, Bo Morrison was shot and killed by a homeowner in Wisconsin who discovered the unarmed 20-year-old on his porch early one morning. According to friends, Morrison was trying to evade police responding to a noise complaint at a neighboring underage drinking party. The homeowner, thinking Morrison was a burglar, was not charged by the local district attorney.

While Wisconsin doesn’t have a Stand Your Ground law that extends to public spaces, Gov. Scott Walker signed an “intruders bill” in December 2011 that presumes somebody who uses deadly force against a trespasser in their home, business or vehicle acted reasonably, whether or not the intruder was armed. Before the law was enacted, homeowners could only use deadly force if their own lives were at risk.

 

· In April, 22-year-old Cordell Jude shot and killed Daniel Adkins Jr., a pedestrian who walked in front of Jude’s car just as Jude was pulling up to the window of a Taco Bell drive-thru in Arizona. Jude claimed Adkins had waved his arms in the air, wielding what Judge thought was a metal pipe – it was actually a dog leash. Jude shot the 29-year-old Adkins, who was mentally disabled, once in the chest. As of May, an arrest had not been made in the April 3 shooting. Arizona passed a Stand Your Ground law in 2010.

 

· In January, a judge in Miami tossed out a second-degree murder charge against Greyston Garcia after he chased a suspected burglar for more than a block and stabbed him to death. The judge decided the stabbing was justified because the burglar had swung a bag of stolen car radios at Garcia – an object that a medical examiner at a hearing testified could cause “serious harm or death.” The judge found Garcia was “well within his rights to pursue the victim and demand the return of his property.”

 

SOURCE: http://www.propublica.org/article/five-stand-your-ground-cases-you-should-know-about

LEAKED: Monsanto Internal Study/Fact Sheet On Pesticide Use

LEAKED: Monsanto Internal Study/Fact Sheet On Pesticide Use

Reference No.: 2 Monsanto
April 1998

CONFIDENTIAL — OFFICIAL USE ONLY

Internal Study/Fact Sheet On Pesticide Use

*    Of all insecticides used globally each year, the amount used on cotton: 25%.
*    Number of pesticides presently on the market that were registered before being tested to determine if they caused cancer, birth defects or wildlife toxicity: 400.
*    Amount of time it takes to ban a pesticide in the U.S. using present procedures: 10 years.
*    Number of active ingredients in pesticides found to cause cancer in animals or humans: 107.
*    Of those active ingredients, the number still in use today: 83.
*    Number of pesticides that are reproductive toxins according to the California E.P.A.: 15.
*    Number of pesticides found to cause reproductive problems in animals: 14.
*    Most serious cause of groundwater pollution confirmed in California: agricultural chemicals.
*    Number of pesticides found in drinking wells of California since 1982: 68.
*    Number of California wells affected: 957.
*    Number of farming communities affected: 36.
*    % of the total U.S. population supplied with drinking water from groundwater: 50%.
*    Number of different pesticides documented by the E.P.A. to be present in groundwater in 1988: 74.
*    Number of states affected: 32.
*    Most acutely toxic pesticide registered by the E.P.A.: aldicarb (used frequently on cotton).
*    In California between 1970 and 1994 amount of total aldicarb used on cotton: 85 to 95%.
*    Number of states in which aldicarb has been detected in the groundwater: 16.
*    Percentage of all U.S. counties containing groundwater susceptible to contamination from agricultural pesticides and fertilizers: 46%.
*    Number of people in the U.S. routinely drinking water contaminated with carcinogenic herbicides: 14 million.
*    Percentage of municipal water treatment facilities lacking equipment to remove these chemicals from the drinking water: 90%.
*    Estimated total costs for U.S. groundwater monitoring: US$900 million to 2.2 billion.
*    Estimated costs for U.S. groundwater carbon filtration cleanup: up to $25 million per site.
*    Percentage of all food samples tested by the FDA in 1980 which contained pesticide residues: 38%.
*    Of the 496 pesticides identified as likely to leave residues in food, the percentage which FDA tests can routinely detect: 40%.
*    Average number of serious pesticide-related accidents between World War II and 1980: 1 every 5 years.
*    Average number of serious pesticide-related accidents between 1980 and the present: 2 every year.
*    Increase in cancer rates between 1950 and 1986: 37%.
*    Number of Americans who will learn they have cancer this year: 1 million.
*    Number who will die from it: 500,000.
*    Cost to U.S. of cancer in terms of lost production, income, medical expenses and research resources: US$ 39 billion each year.
*    Highest rate of chemical-related illness of any occupational group in the U.S.A.: farm workers.
*    Pesticide-related illnesses among monsanto farm workers in U.S.A. each year: Approximately 300,000.
*    Number of people in the U.S. who die each year from cancer related to pesticides: 10,400.

 

SOURCE: http://pastebin.com/mGAKqV4d

CORRUPTION: Recommended Researching Extended List

CORRUPTION: Recommended Researching Extended List

Willing participants who have ultimately sold their souls to make a buck. Little regard for the future of humanity, they support a system that enslaves 95+% of the global population, through debt, famine, drugs, conflict, destruction,with some organizations even using advance engineered weapons exceeding human comprehension.

 

NAMES:
Aaron Barr
Abe Foxman
Abdul Fatah Younis
Abdul Hafiz Ghoga
Abdullah Senussi
Abdulzhelil Abdulkerimov
Abdurrahim El-Keib
Abraham H. Foxman
AbuBakr Yunis Jabr
Abu Bakr Yunis Jabr
Abu-Bakr Yunis Jabr
Abu Mazen
Abdul Hakim Belhadj
Adrian Chen
Adrian Lamo
Ahmed Chalabi
Aisha Gaddafi
Al-Waleed bin Talal
Alan Greenspan
Alan Phillip Gross
Alberto Gonzales
Aleksandr Lukašenko
Aleksandr Lukashenko
Alexander Litvinenko
Ali Tarhouni
Alisher Usmanov
Altaf Nazerali
Alvin Bernard “Buzzy” Krongard
Amira Haas
Amira Hass
Anastasios “Tommy” Belisis
Anders Behring Breivik
Anders Fogh Rasmussen
Andreas Bogk
Andrei Lugovoi
Andrew Bolt
Andrew Cuomo
Andrew Fastow
Angela Merkel
Anke Domscheit-Berg
Anna Ardin
Anne Carine Tanum
Anwar Al-Awlaki
Ariel Sharon
Armanda Nuria Pinero Sierra
Artur Rasizade
Asif Ali Zardari
Avigdor Lieberman
Barack Obama
Barrie Walkley
Bashar Al-Assad
Benazir Bhutto
Benjamin Netanyahu
bibi
Bibi Chesterfield
Bill Clinton
Bill Kristol
Bill Ludwig
Bill Shorten
Bill Zeliff
Binyamin Netanyahu
Bob Clement
Bob Dudley
Bob Livingston
Bob Overby
Bob Woodward
Boiko Borisov
Boris Berezovsky
Boyko Borissov
Carl Bernstein
Carl Bildt
Carlos Mata Figueroa
Carlos Salinas
Carlos Slim
Caroline Gluck
Charles Dolan
Charles Koch
Chris Christie
Christopher Gibson-Smith
Chuck Schumer
Condoleeza Rice
Craig Murray
Daniel Boyer
Daniel Domscheit-Berg
Dave Willis
David Addington
David Feeney
David Koch
David M House
David Petraeus
David Viniar
Denny Hastert
Dick Armey
Dick Cheney
Dmitri Medvedev
Dmitri Rogozin
Don Farrell
Donald Rumsfeld
Douglas Feith
Dr Barron Lerner
Dragan Zivanovic
Edward M. Liddy
Ehud Barak
Elena Baturina
Erik Prince
Etienne Tshisekedi
Evan Bayh
Francev
Francis Fukuyama
Friedman
Gary Aguirre
Gary Bauer
Gennady Zyuganov
George Economou
George Friedman
George H.W. Bush
George Herbert Walker IV
George Papandreou
George Stephanopolous
George Soros
George Tenet
George W. Bush
Gideon Levy
Giorgio Napolitano
Glenn Greenwald
Golan Cipel
Gurbanguly Berdimuhamedow
Guy Fawkes
Hamad Al-Khalifa
Hamad El-Khalifa
Hamad Khalifa
Hamad bin Jassim bin Jaber Al Thani
Hamad bin Khalifa Al Thani
Harald Norberg
Hassan Nasrallah
Hazim Aldosary
Henry Kissinger
Henryk Stanislas Kurpi
Hillary Clinton
Hosni Mubarak
Hugo Chavez
Humberto Loya-Castro
Ileana Ros-Lehtinen
Ilham Aliyev
Islam Karimov
Ivan Marovic
Jalal Talabani
James Dolan
James Packer
Jamie Dimon
Jamie Leigh Jones
Janet Napolitano
Jason Katz
Jeffrey B. Kindler
Jeffrey Skilling
Jerry Brown input/output.
Jerry del Missier
Jesus Vicente Zambada-Niebla
Jesus Vicente Zambada Niebla
Jim Balsillie
Jim Gauthier
Jim McGreevey
Jimmy Caine
Joe Biden
Joe Lieberman
John Henderson
John Howard
John Woods
John Yoo
Jon Corzine
Jon Stewart
Jonathan Pollard
Joseph Cassano
Joseph Kabila
Judd Gregg
Julia Gillard
Julian Assange
Karim Hijazi
Karl Bildt
Karl Rove
Karolos Papoulias
Kenneth Lay
Kent Ekeroth
Kerstin Lundell
Kevin Poulsen
Kevin Schatzle
Khaled Al-Masri
Khaled El-Masri
Khaled Masri
Khalid Al-Khalifa
Khalid El-Khalifa
Khalid Khalifa
Kim Zetter
Knut Anders Opstad
Kurmanbek Bakiyev
Kyungu
Lewis Libby
Lloyd Blankfein
Lt. Col. Paul Alonzo
Lucas Papademos
Luis Acosta Carlez
Mahmoud Abbas
Mahmoud Ahmadinejad
Mahmoud Jabril
Margareta Sandstedt
Mario Monti
Mark Arbib
Mark Felt
Martin Sullivan
Mary Pat Christie
Mary Schapiro
Maurice Greenberg
Michael Bloomberg
Michael Chertoff
Michael Hayden
Michael Kopper
Michael Mukasey
Mike Keebaugh
Mike Lazaridis
Mikhail Khodorkovsky
Mikhail Prokorov
Mikhail Saakashvili
Miranda Devine
Mordechai Vanunu
Mr. John Thomas
Muammar Gaddafi
Mustafa Abdul Jalil
Munyamariba
Nawaz Sharif
Nick Minchin
Nicolas Sarkozy
Nursultan Nazarbayev
Osama Bin Laden
Pamela Geller
Patrice Lumumba
Patrick Byrne
Paul Howes
Peiter “Mudge” Zatko
Pervez Musharraf
Peter J. Grossman
Peter J. Kahn
Porter Goss
Princess Amira al-Taweel
Puru Saxena
Rafik Hariri
Ramzan Kadyrov
Randy Scheunemann
Rashid Nurgaliev
Rashid Nurgaliyev
Raul Castro
Raul Salinas de Gortari
Ray Kelly
Recep Tayyip Erdogan
Ricardo Alarcon
Ricardo Alarcón
Rich Ricci
Richard Ashcroft
Richard Fuld
Richard Helms
Richard Mahoney
Richard Parsons
Richard Perle
Robert B. Willumstad
Robert Benmosche
Robert McClelland
Robert Mueller
Robert Mugabe
Robert S. Miller
Roman Abramovich
Rune Bjerke
Rudi Dekkers
Rupert Murdoch
Saad Hariri
Saddam Hussein
Sapamurat Niyazov
Sergey Sobyanin
Sibel Edmonds
Silvio Berlusconi
Sir Win Bischoff
Slobodan Milosevic
Solly Forell
Srdja Popovic
Stanley McChrystal
Stephen Colbert
Stephen Harper
Steven A. Cohen
Steve Forbes
Sylvain Seninga Ntamukunzi
Tamim bin Hamad Al Thani
Ted Ekeroth
Thomas Ryan
Todd Christie
Tommy Vietor
Tony Abbott
Tony Blair
Tony Hayward
Tzipi Livni
Tzipi Livni
Vagit Alekperov
Vikram Pandit
Viktor Bout
Viktor Yanukovich
Vladimir Putin
Vladimir Resin
Wesley Clark
William C. Weldon
William Jefferson Clinton
William Kristol
Xavier R. Rolet
Yelena Baturina
Yossi Sarid
Yulia Tymoshenko
Yuri Luzhkov
Zalmay Khalilzad
Zine El Abidine Ben Ali
US FEDERAL LEADERSHIP TEAM:
Kay Kapoor
Craig Cornelius
John Goodman
John Matchette
ISDA-International Swaps and Derivatives Association Officers/Directors:
Stephen O’Connor
Michele Faissola
Gay Huey Evans
Diane Genova
Guillaume Amblard
Brian Archer
R. Martin Chavez
Bill De Leon
Thibaut de Roux
Nitin Gulabani
Harry Harrison
Alan Haywood
Peter Healey
Jonathan Hunter
TJ Lim
Eric Litvack
Ted MacDonald
Yutaka Nakajima
Robert Pickel
Gerhard Seebacher
Yasuhiro Shibata
Eraj Shirvani
Stuart Spodek
Emmanuel Vercoustre
Conrad Voldstad
Lili Wang
GOLDMAN SACHS INTERNATIONAL ADVISORS:
ADVISORY DIRECTORS:
Alan A. Shuch
Carlos A. Cordeiro
Eric S. Dobkin
Hsuch-Ming Wang
John J. Powers
Jonathan I. Cohen
Maykin Ho
Michael A. Troy
Michael S. Wishart
Patrick J. Ward
Paul S. Efron
Peter D. Sutherland KCMG
Philip S. Hylander
R. Douglas Henderson
Ravi Sinha
Robert E. Higgins
Robert J. Markwick
Thomas J. Kenny
Timothy G. Freshwater
Tracy R. Wolstencroft
SENIOR DIRECTORS:
David M. Silfen
Donald R. Gant
Eugene Mercy Jr.
Eugene V. Fife
George E. Doty
George M. Ross
H. Frederick Krimendahl II
James P. Gorter
John C. Whitehead
John R. Farmer
Mark O. Winkelman
Peter G. Sachs
Peter M. Sacerdote
Richard I. Menschel
Robert B. Menschel
Robert E. Mnuchin
Robert Hurst
Robert J. Katz
Robert M. Conway
Robert N. Downey
Robert S. Kaplan
Robin Neustein
Roy J. Zuckerberg
Stephen B. Kay
Thomas B. Walker Jr.
Willard J. Overlock Jr.
BOARD OF INTERNATIONAL ADVISORS:
Charles Curran A.C.
Charles de Croisset
Claudio Aguirre
Dr. Axel May
Dr. Ludolf v. Wartenberg
Enrico Vitali
Guillermo de la Dehesa
Ian Macfarlane A.C.
Kazimierz Marcinkiewicz
Keki Dadiseth
Lord Griffiths of Fforestfach
Mario Monti
Professor Otmar Issing
Professor Victor Halberstadt
Tito T. Mboweni
Vladimir Dlouhy
Walter W. Driver Jr.
JP Morgan Chase Executive Committee:
ACHILLES O. MACRIS
ANTHONY J. HORAN
BARRY L. ZUBROW
BARRY SOMMERS
BLYTHE S. MASTERS
CARLOS M. HERNANDEZ
CATHERINE M. KEATING
CLIVE S. BROWN
DANIEL E. PINTO
DINKAR JETLEY
DONALD H. MCCREE  III
DOUGLAS B. PETNO
DOUGLAS L. BRAUNSTEIN
DOUGLAS WURTH
DR. JACOB A. FRENKEL
EILEEN M. SERRA
EMILIO SARACHO
FRANK J. BISIGNANO
GABY A. ABDELNOUR
GLENN TILTON
GORDON A. SMITH
GREGORY L. GUYETT
GUY CHIARELLO
INA R. DREW
IRENE TSE
JACK M. STEPHENSON
JAMES B. LEE, JR.
JAMES DIMON
JAMES E. STALEY
JAY MANDELBAUM
JEFFREY J. URWIN
JOHN J. HOGAN
JOHN L. DONNELLY
JOSEPH M. EVANGELISTI
KEVIN D. WILLSEY
KEVIN P. WATTERS
KIMBERLY B. DAVIS
KLAUS DIEDERICHS
LAUREN M. TYLER
LOUIS RAUCHENBERGER
MARC SHEINBAUM
MARTHA J. GALLO
MARY CALLAHAN ERDOES
MATTHEW E. ZAMES
MEL R. MARTINEZ
MICHAEL J. CAVANAGH
MICHAEL J. CLEARY
MICHAEL O’BRIEN
NICOLAS AGUZIN
PAUL T. BATEMAN
PETER J. BOCIAN
PETER K. BARKER
PETER L. SCHER
PHIL DI IORIO
PHILIP F. BLESER
PHYLLIS J. CAMPBELL
RICHARD M. CASHIN
RICHARD SABO
ROBERT C. HOLMES
RYAN MCINERNEY
S. TODD MACLIN
SCOTT E. POWELL
SCOTT GELLER
SHANNON S. WARREN
STEPHANIE B. MUDICK
STEPHEN M. CUTLER
WALTER A. GUBERT
WILLIAM S. WALLACE
James A. Bell
Crandall C. Bowles
Stephen B. Burke
David M. Cote
James S. Crown
James Dimon
Ellen V. Futter
William H. Gray, III
Laban P. Jackson, Jr.
David C. Novak
Lee R. Raymond
William C. Weldon
AIG MANAGEMENT LEADERSHIP:
Bruce Abrams
Michael Akers
Robert H. Benmosche
Henri Courpron
Michael R. Cowan
Robert Dickie
William Dooley
John Q. Doyle
Jeffrey M. Farber
Mary Jane Fortin
Jana Greer
Peter D. Hancock
Jeffrey Hayman
David Herzog
Jeffrey Hurd
Peter Juhas
Monika Machon
R. Eric Martinez, Jr.
Kristian P. Moor
Paulette E. Mullings Bradnock
Christina Pretto
Thomas Russo
Sid Sankaran
Robert Schimek
Brian Schreiber
Charlie Shamieh
Nicholas C. Walsh
Elizabeth A. Werner
Jay Wintrob
W. Don Cornwell
John H. Fitzpatrick
Laurette T. Koellner
Donald H. Layton
Christopher S. Lynch
Arthur C. Martinez
George L. Miles, Jr.
Henry S. Miller
Robert S. Miller
Suzanne Nora Johnson
Morris W. Offit
Ronald A. Rittenmeyer
Douglas M. Steenland
Bank of America Corporate Board:
Charles O. Holliday, Jr.
Mukesh D. Ambani
Susan S. Bies
Frank P. Bramble, Sr.
Virgis W. Colbert
Charles K. Gifford
D. Paul Jones, Jr.
Monica C. Lozano
Thomas J. May
Brian T. Moynihan
Donald E. Powell
Charles O. Rossotti
Robert W. Scully
Citigroup Corporate Leadership:
Alain J.P. Belda
Timothy C. Collins
Robert L. Joss, Ph.D.
Michael E. O’Neill
Vikram Pandit
Richard D. Parsons
Lawrence R. Ricciardi
Judith Rodin
Robert L. Ryan
Anthony M. Santomero
Diana L. Taylor
William S. Thompson, Jr.
Ernesto Zedillo
Francisco Aristeguieta
Javier Arrigunaga
Hami
Stephen Bird
Don Callahan
Michael L. Corbat
Sanjiv Das
James A. Forese
John C. Gerspach
John Havens
Michael Helfer
Brian Leach
Jud Linville
Mark Mason
Paul McKinnonH
Gene McQuade
Manuel Medina-Mora
William J. Mills
Vikram Pandit
Edward Skyler
Cece Stewart
Francesco Vanni d’Archirafi
Paco Ybarra
Zubaid Ahmad
Shirish Apte
Alberto Cribiore
Thomas M. Flexner
James A. Forese
Jane Fraser
Carlos Gutierrez
John Havens
Lewis B. Kaden
Leon Kalvaria
Edward J. Kelly, III
Alan S. MacDonald
Raymond J. McGuire
Gene McQuade
Manuel Medina-Mora
Alasdair Morrison
James O’Donnell
Peter Orszag
Michael M. Roberts
Alberto J. Verme
Stephen Volk
James D. Wolfensohn, K.B.E., AO
Shengman Zhang
Bill Rhodes
Terri Dial
Yobie Benjamin (check HBGary emails for him too)
UBS (United Bank of Switzerland) Corporate Leadership:
Kaspar Villiger
Michel Demaré
David Sidwell
Rainer-Marc Frey
Bruno Gehrig
Ann F. Godbehere
Axel P. Lehmann
Wolfgang Mayrhuber
Helmut Panke
William G. Parrett
Joseph Yam
Sergio P. Ermotti
John Bradley
Markus U. Diethelm
John A. Fraser
Lukas Gähwiler
Steve Hottiger
Philip J. Lofts
Michael Willi
Alexander Wilmot-Sitwell
Chi-Won Yoon
Carsten Kengeter
Ulrich Körner
Philip J. Lofts
Robert J. McCann
Tom Naratil
Jürg Zeltner
BLACKWATER EXECUTIVE BOARD:
Erik Prince
Joseph Yorio
Danielle Esposito
Fred Roitz
Todd Shaw
Mike Taylor
Jim Dehart
Karen Jones
Bryan Salek
John Altizer
Tony Valusek
David Hammond
Melinda Redman
Richard Pere
Carol Bruce
Chris Burgess
Hugh Middleton
Victor Esposito
Jim Sierawski
John LaDelta
Bobby Ray Inman
Jack Quinn
Red McCombs
LUKOIL EXECUTIVE BOARD:
Vagit Alekperov
Sergei Kukura
Ravil Maganov
Vladimir Nekrasov
Anatoly Barkov
Vadim Vorobyev
Sergei Malyukov
Ivan Masliaev
Alexander Matytsyn
Anatoly Moskalenko
Vladimir Mulyak
Valery Subbotin
Gennady Fedotov
Leonid Fedun
Evgeny Khavkin
Lyubov Khoba
CORPORATIONS:
ABC
Accenture
AIG
Academi
Agip Petroli S.p.A
Al-Waleed Bin Talal Foundation
American General Financial Services
Apple
Archimedes Global
Area SpA
Arthur Andersen
Assicurazioni Generali
Atakas
Atakas
BAE
BNY Mellon
BP
Bain Capital
Bank of America
Bank of China
Bank of New York Mellon Corp
Barclays
Barclays Capital
Barrick Goldstrike
Bell Pottinger
Beltransgaz
Berico
Berico Technologies
Bin Laden Group
BlackRock
Blackwater
Bluecoat
Boeing
Booz Allen Hamilton
Cablevision Systems
Cantor Fitzgerald
Carlyle Group
CBS
Cemex
Cerberus Capital Management
Chartis
Chase
Chertoff Group
Citibank
Citigroup
Clark Lytle Geduldig & Cranford
Clear Channel
Clearing House Association, LLC
Clearing House Interbank Payments System
Combined Tactical Systems
Computer Sciences Corporation
Conde Nast
Co-operative Group Ltd
Corrections Corporation of America
Countrywide
Covington & Burling
CSC
DNB ASA
Daoud & Partners
D. E. SHAW GROUP
Delta Risk
Development Alternatives Inc
DIM
DISIP
Dragados
ECOS
Endgame Systems
Eni S.p.A
EnQuest
Enron {
  Chewco
  JEDI
  LJM
  LJM Cayman
  LJM2 Co-Investment
  Whitewing
}
European Coalition on Oil in Sudan
Exxon
Fannie Mae
FCX
Freddie Mac
Freeport McMoRan
G2
G4S
Gazprom
Gazpromneft
General Atomics
General Counterintelligence Office
General Dynamics
General Electric
Getty
Glitnir
Global Crossing
Goldman Sachs
Heckler & Koch
HBGary
HSBC
Halliburton {
  Breswater Marine Contracting B.V.
  DII Industries
  Easy Well Solutions AS
  Hobbymarkt Delft BV
  Kellogg Energy Services
  Landmark Graphics Corporation
  Oilfield Telecommunications
}
Hudson City Savings Bank
Hunton & Williams
Hypo
Investment Management Advisory Group Inc.
IN-Q-TEL
IndyMac Bancorp
JP Morgan
John Thomas Financial
KBR, Inc
KMart
Kaupthing
KazMunayGas
Kellogg Brown & Root
Ketchum
Kilpatrick Townsend & Stockton LLP
Kingdom Holding Company
L3C
Landsbanki
Lehman Brothers
Lloyds Banking Group
Lockheed Martin
London Stock Exchange Group
Loreley Companies
LukArco
Lukoil {
   Tsentrnefteproduct
   Astrakhanenergo
   Kaliningradmorneft
   Komi
   Nizhnevolzhskneft
   Nizhnevolzhsknefteprodukt
   LUKOIL Overseas Holding Ltd.
   Nizhegorodnefteorgsintez
   Perm
   Permnefteorgsintez
   Permnefteprodukt
   Severozapadnefteproduct
   Uralnefteprodukt
   PII LUKOIL-Ukraina
   Ukhtaneftepererabotka
   Volganefteproduct
   Volgogradenergo
   West Siberia
   Yugnefteproduct
   LITASCO SA
   LUKOIL Americas Corporation
   LUKOIL Serbia PLC
   I.C.S. LUKOIL-Moldova S.R.L.
   IP LUKOIL-Belorussia
   LLK International B.V. lubricants.com
   LUKOIL Belgium N.V.
   BULGARIA EOOD
   Makedonia DOOEL Ckopje
   Marine Lubricants Ltd lukoilmarine
   MONTENEGRO DOO, Podgorica
   Neftochim Bourgas AD neftochim
   OAO Arkhangelskgeoldobycha agddiamond
   OAO Inter-Kard licard
   OAO RITEK
   Inginiring engineering
   AERO
   Ecoenergo Ekoenergo
   ENERGOENGINEERING ee
   LUKOIL-INFORM
   Kambarskaya neftebasa lukknb
   KNT
   kubanenergo
   rostovenergo
   Trans lukoil-trans
   TsUR pscc
   TTK
   TD Energoservis tdes
   TD
   PAO Odessky NPZ
   S.C.
   UAB Baltija
}
Lund & Co.
Lundin Oil
MERS
MERSCORP
MF Global
MMF
MMK
Magnitogorsk Iron and Steel Works
Mantech
Milestone One Holding
Mitsubishi
Mizuho Securities
Mortgage Electronic Registration Systems
Narus
NatWest
National Westminster Bank Plc
NBC
NCAA
News Corporation
Nomura Securities
Norilsk Nickel
Northern Rock
Northrop Grumman
NSHEAB
Orascom
OzenMunaiGas
Palantir
Paravant LLC
Pareto Group
Petrobras
Petrofac
Petroliam Nasional Berhad
PETRONAS
Petronas Carigali
Purneftegaz
PBS
Point Lookout Capital Partners
Qatar Gas
Qorvis
RBS
Rapiscanner
Raytheon
Rosneft
Royal Bank of Scotland
Russlavbank
SAIC
SAMA
Samarus Co LTD
Saudi Bin Laden Group
Securicor
Securitas
SEBIN
Serco
Shell
Sibneft
Spear, Leeds & Kellogg
Strategic Forecasting, Inc
Starr Companies
Talisman Energy
The Livingston Group
TNK-BP
TRSS
Telecom Italia
Tengizchevroil
Tepco
Terra-Gruppen AS  {
 Terra Securities ASA
 Terra Markets AS
}
Tony Blair Associates
Total Intelligence Solutions LLC
Triple Canopy
UK Financial Investments Limited
US Chamber of Commerce
United Technologies
Unveillance
Verizon
Victoria’s Secret
Wackenhut
Walmart
Washington Mutual
Wells Fargo
WorldCom
Xe
Yukos
Intel Firms:
Aegis
Control Risks Group
Diligence
GK Sierra
GPW
Hakluyt
Kroll
MEMRI
SITE
ORGANIZATIONS:
BIS
CANVAS
DTCC
FED
IMF
INSA
ISDA
International Swaps and Derivatives Association
Otpor
RSA
SIMO
NATO
ISAF {
Regional Command
Regional Command Capital
Brig. Gen. M. Druart
Regional Command East
Maj. Gen. J. Schloesser
Regional Command North
Brig. Gen. J.   Vollmer
Regional Command South
Major General Mart de Kruif
Regional Command West
Brig. Gen. R. Castellano
}
PROGRAMS/OPERATIONS:
ADVISE
Cast Lead
Carnivore
COIN
Conplan 3502
CONPLAN 3501
CONPLAN 3400
GOLOS
Gun Runner
Fast and Furious
Magic Lantern
Northwoods
PROMIS
Stuxnet
THERMCON
TPAJAX
DRUG WAR:
Names:
Adler Berriman Seal
Adnan Khashoggi
Ahmed Wali Karzai
Anne Patterson
Baz Mohammed
Brian Terry
David Disiere
Eric Holder
Fazle Haq
Hamid Gul
Hank Asher
Hazrat Ali
Héctor Luis Palma Salazar
Heriberto Lazcano
Humberto Loya
Ismael Zambada Garcia
Jaime González Durán
Jan Mohammed Khan
Jesus Vicente Zambada-Niebla
Jose Antonio Torres Marrufo
Luis Rodriguez Olivera
Mario Donadi
Michael Brassington
Pedro Alfonso Alatorre
Perez Khan
Rudi Dekkers
Wallace “Wally” Hilliard
Organizations:
Alcohol Tobacco and Firearms
Bank of Credit and Commerce International
Bonanno crime family
Cártel del Golfo
Cartel del Golfo
Colombo Crime Family
Contras
Cosa Nostra
Center for Research and National Security
Cheyenne Air LLC
DeCavalcante crime family
Donna Blue Aircraft
Drug Enforcement Agency
Gambino Crime Family
Genovese Crime Family
Guzmán-Loera Organization
Guzman-Loera Organization
Huffman Aviation
Juarez Cartel
Kandahar Strike Force
Los Zetas
Lucchese Crime Family
MS-13
‘Ndrangheta
Northern Alliance
Shurat HaDin
Sinaloa Cartel
SkyWay Aircraft
Taliban
Tijuana Cartel
Organizations:
ARUTZ
ARUTZ 7
ARUTZ SHEVA
AERO CONTRACTORS
ASSEMBLY POINT AVIATION
BAYARD FOREIGN MARKETING
BOSTON RED SOX
CROWN CASINO
CROWN MELBOURNE LTD
DONNA BLUE AIRCRAFT
DYNCORP
FIDH
JEPPESEN INTERNATIONAL TRIP PLANNING
KEELER TATE MANAGEMENT
LDH
NATIONAL AIRCRAFT LEASING OF GREENVILLE
RICHMORE AVIATION
SPECIAL ACTIVITIES DIVISION
SPORTSFLIGHT AIRWAYS
WILMINGTON TRUST COMPANY
United States Training Center
Blackwater  Target Systems
Blackwater Security Consulting
Blackwater K-9
Blackwater Airships, LLC
Blackwater Armored vehicle
Blackwater Maritime Security Services
Raven Development Group
Aviation Worldwide Services
Greystone Limited
US Space Command: The Proof is in the Patches

US Space Command: The Proof is in the Patches

Written by David Wilcock

As you may already know, I have been fortunate enough to interact with multiple witnesses who have worked in various levels of the UFO cover-up — some at levels significantly above the need-to-know basis of the President of the United States.

When you speak with the top-level insiders in the black-ops community, you often hear them mention THE RULES.

These projects are so compartmentalized that only the high-level people are even aware that THE RULES exist — or of how far-reaching they are.

It has taken me years of interviews to explore and unravel this strange subject — particularly because of the potential for confusion.

Sometimes, when insiders talk about THE RULES, they are talking about guidelines their own group insists they follow — such as secrets they must keep, disinformation they are expected to pass along, who gets to know how much, what mistakes are bad enough to get you killed, et cetera.

However, over the course of many conversations, I increasingly realized there was another level of THE RULES — a level they have absolutely no control over.


WHAT ARE “THE RULES”?

In this greater cosmic sense, THE RULES are a set of principles that the insider black-ops community has felt, for at least the past century, were as fixed and unchangeable as the Universe itself.

They also believed THE RULES would continue, unaltered, for millions of years. Apparently they have time-viewing technology that led them to believe this was the case.

The idea that this was a manipulated timeline, and not necessarily the real future, was far too mind-blowing for them to ever consider — particularly since you have people living within these timelines, and you can go and visit them and live there yourself.

Nonetheless, all ETs visiting the Earth must operate within THE RULES. It is impossible for them not to.


WHO MAKES “THE RULES?”

One day, only a few weeks ago, I finally got smart enough to bluntly ask one of my main contacts, “Who makes THE RULES?”

The reply was: “Who makes gravity? Who makes the sun rise and set? Who makes the Galaxy spin?

“We don’t know who makes THE RULES, David, but we have no choice but to follow them. There is no workaround. There is no other way. That’s why they’re THE RULES.”

This is a strange subject, and will undoubtedly lead to some folks laughing and thinking I’m crazy… but this is what you hear about when you talk to these insiders yourself.

At the highest levels of the UFO cover-up, it is well-understood that events on Earth, and indeed throughout the inhabited galaxy, are being managed and controlled — by unseen forces.

Some things are allowed to happen… and others are not.

 

THE ‘QUARANTINE’

As one key example of THE RULES, our Earth is under a ‘Quarantine’ that prevents most ETs from being able to enter our airspace in a way that would be visible to the naked eye — except in rare, unpredictable and brief bursts of time.

This is the main reason why we don’t see more visible UFOs — particularly in the case of negatively-oriented ETs. In fact, without this Quarantine, negative ETs would have invaded and taken over this planet eons ago.

This Quarantine also appears to allow those planetary controllers here on Earth to do whatever they want. Or so they thought.

The Quarantine is maintained by a vast network of super-advanced, indestructible satellites surrounding the Earth — built by very high-level ETs. These satellites keep humanity locked in — and everyone else locked out.

The insiders do not know who built these satellites, nor precisely why they are there. It’s simply another part of THE RULES.

When you view the patches of US Space Command or Navy Space Command, they picture the Earth surrounded by two circles, similar to the typical depiction of electron orbitals around an atom.

This symbolizes the Quarantine — which protects us from the bad guys.

 

LET’S SEE SOME PATCHES

On this official military website, you can find a patch commemorating the 25th anniversary of Air Force Space Command — from 1982 to 2007. You can see the two rings around the Earth clearly depicted, as well as a stylized image of a back-engineered ET spacecraft in flight:

air-force-space-command-25th-anniversary

 

From what I’ve heard, these triangular craft are enormous in size — taking quite some time to walk from one end to the other — and are already in operation throughout the galaxy. The shape you see in these emblems is almost exactly what they look like.

There is an official website you can visit for the Naval Space Command and the US Space Command. There is also a Wikipedia page for the US Space Command, linked from an even more detailed Unified Combatant Command page.

UNITED STATES SPACE COMMAND

If you read this US Space Command page, you will find very specific information about who was in charge, when they were in charge, and what they allegedly were up to… and it includes the following emblem, featuring the rings I’m talking about:

united_states_space_command_emblem

Notice the crosses on each of the rings. We’ll get back to that in a minute.

You can also read about US Space Command in this article on Space.com — in an interview with Gene McCall, chief scientist for the Air Force Space Command. Naturally, the article attempts to put a mundane spin on the story and does not include any real ‘juice’ of Disclosure.

AIR FORCE SPACE COMMAND

You again see the rings around the Earth in the Air Force Space Command patch. This was originally featured on the official Air Force Space Command website, which has since been taken down.

However, at this website, there is a comprehensive series of mirrored links to what was originally on these official websites — along with the now-defunct links. I suggest saving your own copy in case it gets taken down.

When you go to this mirror site and sort through the images and text, this triangular metallic flying machine image appears over and over again on various badges and emblems — along with the two “quarantine rings”:

airforce_spacecommand

 

Also, again notice the two crosses on either side of the delta-shaped spacecraft — crosses that directly contact the rings.

These, I believe, are meant to be Knights Templar crosses.

 

THE “KNIGHTS TEMPORAL”

In a Project Camelot interview, Gordon Novel revealed that these insiders like to refer to themselves as the Knights Temporal:

http://www.projectcamelot.org/lang/en/gordon_novel_interview_transcript_en.html

K: When you say “we,” who’s we?

The Knights Temporal

G: Well, I have a group of folks that I call the Knights Temporal.

The most prominent aerospace engineers and physicists in the world today are all part of a team we call the RAM group. We call ourselves the Knights Temporal.

We took a page out of the idea of the Templars, who basically blackmailed the Pope to give them the fiefdoms over Europe. They created the banking orders we have today.

Since we believe the technology is rooted in time, we call ourselves the Knights Temporal. The alien technology, the UFO, is basically a flying time machine. That’s what we believe, and it’s all we know about it.

What Novel does not say here is that these international bankers did not merely “take a page out of the idea of the Templars.” These groups are the direct descendants of the Knight Templars — and have still kept all their secrets.

 

NAVAL SPACE COMMAND

The same two “quarantine rings” appear in the emblem for the Naval Space Command, also mirrored at the above site:

naval_spacecommand

 

“TOP HAND” AT VANDENBURG AFB

This next patch can be found on the official Vandenburg Air Force Base website on Strategic Air Command.com.

Again we see a cross on one of the Earth’s protective rings. The sword, as we shall see, appears to be a Knight Templar blade.

With the line “Strengthen the Shield,” there is a clear implication here that the two rings around the Earth could be some sort of ‘shield’ that we want to make sure stays strong.

Further, there is the suggestion that this shield may be at least partially enforced by that same weird delta-shaped craft:

top-hand-sharpen-the-sword-strengthen-the-shield

 

AFSST 76TH SPACE OPS

Also check out this “AFSST 76th Space Ops” patch from the same site — the official Vandenburg Air Force Base website on Strategic Air Command.com.

Again we see one of the “quarantine rings” as well as the same flying metallic triangle — this time with wings around it just in case you didn’t get the point that it flies.

Two smaller delta-shaped craft also flank the AFSST acronym at the bottom:

afsst-mission-complete

Here’s a shot of the original Strategic Air Command page in case it disappears. Notice the Knight Templar glove holding lightning bolts in the insignia at the top left:

strategic-air-command-patches

JOINT FUNCTIONAL COMPONENT COMMAND FOR SPACE

The “quarantine rings” and flying metallic triangles show up again in the emblem for the Joint Functional Component Command for Space, which has its own official Wikipedia page here:

uss-stratcom-jffcc-space

As it says on the Wikipedia page, according to Lieutenant General William L. Shelton, “Our prime mission directive in JFCC SPACE is to ensure our freedom of action in space, while preventing adversary use of space against us.”

 

SCHRIEVER AIR FORCE BASE

These badges from Schriever Air Force Base follow the same theme — quarantine rings and peculiar aircraft operating far outside the Earth’s atmosphere.

Notice the difference in size between the small black delta-shaped craft and the larger metallic delta-shaped craft in the first badge below.

That size difference may not be an indication that one is closer than the other — it may acutally be a direct indication of how huge the larger craft is in comparison to the black one:

space-test-experimentation-space-test-squadron

This next badge is particularly interesting because of the emblem that appears at the bottom:

usaf-history-heritage

I have been told this Pegasus “Master of Space” logo is worn by staff who have direct, high-level involvement with extraterrestrial human civilizations — typically those working for Space Command.

The Pegasus legend of the ‘winged horse’, used by the Gods to travel in Greek mythology, may well indicate some sort of extraterrestrial craft.

This follows the same chain of reasoning presented in Episode Two of this season’s Ancient Aliens on History Channel, which I am a repeat participant in.

 

THIRD PAGE OF BADGES FROM SCHRIEVER AFB

There are so many goodies on the third page of badges from the Schriever AFB site — delta craft, Templar swords, Templar gloves, quarantine rings, et cetera — that I had to just post the whole thing:

military-space-patches-1

There are many, many indications of the Knight Templars here — and indeed, many insiders have said the Air Force is much more involved in the UFO cover-up than other organizations.

You probably caught the Masonic compass in the image on the bottom right. There is a Templar glove below it holding a sword of fire.

I was particularly fascinated by the Templar Knight gloves that had a mysterious energetic force coming off of them on the 310th Communications Flight badge — suggesting the mastery of hidden Universal powers:

310_communications_flight

 

FOURTH PAGE OF SCHRIEVER AFB BADGES

The fourth page of badges from the Schriever AFB contains additional enigmas — including a straight-ahead Templar skull and crossbones symbol:

military-space-patches-4


The 50th Contracting Squadron badge at the top left may be a nod to the fact that human beings appear all over the galaxy — hence we see the image of a human body away from the Earth, and the Pegasus logo alongside it.

The 50th Space Communications Squadron badge at the top right has the Templar glove, again with the suggestion of a “Thunderbolt” coming out of it.

According to the second episode of this season’s Ancient Aliens, which I did plenty of research for but didn’t get in fast enough to make the cut, the many ancient ‘Thunderbolt’ legends appear to refer back to a working ET weapon that was used in historic times.

Such a weapon then later became mythologized in such stories as Zeus’ Thunderbolt, Thor’s Hammer, Odin’s Spear, Poseidon’s Trident, Vajra’s Spear, et cetera.

 

THOUGHTFORM ENTITIES AND PROTECTING EARTH

The nasty-looking hooded being on the 23D Space Operations HQ badge, second over from the bottom left, clearly seems to represent the “Thoughtform Entities” I have been told these guardians of Earth are actively defending us against.

Notice the being has at least two faces — one made by the two winglike eyes in the middle, and another in profile view on the left-hand side, where a pointy nose, brow and chin are all clearly visible.

The rear of the head, in profile view, suggests pointy ears. I have indeed heard from an insider, recently, that at least one ET group does in fact have pointy ears — and looks very similar to certain ‘gargoyle’ faces we see on many Templar-designed buildings.

23d-space-operations-squadron-semper-vigilans

Whether you agree with what they’re doing or not, the people I speak to are absolutely convinced that the Earth would be much worse off if they were not doing their jobs.

This desire to protect humanity from outside negative forces is a strong rationale for why they continue to stay involved in these jobs, even though there are many questionable ethics involved.

It is certainly interesting to see a hooded being looming over the Earth on a badge dedicated to “space operations.”

FIFTH PAGE OF BADGES FROM SCHRIEVER AFB

The fifth and final page of badges from Schriever AFB has even more goodies. First, here’s the full view:

military-space-patches-2


Notice the two stylized birds flanking the star on the bottom-center image. They most definitely appear to be depictions of the Phoenix.

What better symbol to choose if you’re describing a journey through a stargate — where you appear to ‘die’ and dematerialize on one end, only to be ‘reborn’ from the other?

As you’ll see in a minute, this was the original Air Force logo!

Now let’s explore some more of these images in detail.

THE STARGATE

First of all, as we see below in its larger form, we have a badge that may very well be showing us a pentagonal Stargate vortex emerging from the Northwest United States:

21st-space-operations-sq-gateway-to-the-stars

More than one insider has told me that the ‘ancient’ stargates look like tunnels lined with individual points of light, in a clear geometric relationship to each other, and which spiral in on themselves as you look more deeply into the wormhole.

The points of light may very well be in a pentagonal relationship to each other along the circumference of the circle, though no one has told me this. I also never thought to ask until now — but it may very well be.

A slight hint of this stargate pattern appears in the movie Minority Report, when you look off to the right in this particular shot:

minority_report_interface

Getting back to this 21st Space Operations badge, it even features the words ‘gate’ and ‘star’ right in the description — Gateway to the Stars.

 

IS THE AIR FORCE LOGO PARTLY INTENDED TO DEPICT A STARGATE?

The five-pointed star with a circle inside of it is a common feature of the basic Air Force badge, which went through two different stages of development. This is apparently another homage to the stargates or ‘portals’ being used at the insider levels.

I already pointed out the original Air Force logo, where the pentagon is flanked with stylized Phoenix birds on either side. This logo then went through an evolution into its current form, as these images depict:

new_af_aaf

aflogo_history

air_force_logo

 

 

WHAT TYPE OF AIR TRAFFIC ARE THEY CONTROLLING?

Check this one out from the Air Force Communicators and Air Traffic Controllers Association.

In the center you have the pentagonal Air Force / stargate logo — flanked with the Phoenix birds of fire.

Then you’ve got a jet on the right and “something else” on the left — our delta-shaped craft once again — protecting a triangular-shaped Earth in the same ‘quarantine loops’ I’ve been showing you:

warfighting-integration-chief-information-officer

The triangle shape appears to indicate the tetrahedral energy signatures that run through the Earth and other planets, as Richard C. Hoagland has been asserting since at least 1993.

The tetrahedral energy appears at the 19.5-degree latitude, north or south, on any given planet.

On solid planets it emerges as volcanoes, such as Hawaii on Earth and the enormous Olympus Mons on Mars.

On gas planets we have the Great Red Spot of Jupiter, the Great Dark Spot of Neptune, cloud bands on Saturn, et cetera — all at the magic 19.5-degree latitude.

 

DEFENDERS OF THE DOMAIN

One of the most compelling pieces from Schriever AFB is this next badge below.

Here, we see a simplified but undeniable diagram of the Global Grid I have written about for so many years.

The real Grid is not made of a square pattern like this, but is otherwise extremely similar — including the spherical ‘nodes’ where the lines cross.

We also see a Knight Templar in full royal regalia:

schriever_defenders-information-assurance

Even the clovers carved into the knight’s mask are obvious, stylized versions of the Templar cross:

information-awareness-close

 

THE NORAD LOGO

The official NORAD logo (NORth American Aerospace Defense command) also contains the ‘quarantine loops’ around the Earth.

This time the loops appear stylized as wings — and we also see the Templar sword with stylized ‘thunderbolts’ coming off of it:

north_american_aerospace_defense_command

 

310TH SPACE WING

More goodies can be found on the official page for the 310th Space Wing:

310-space-wing-division

This next badge from the above website caught my eye in particular.

It is a seemingly earlier version of the same 310th Communications Flight badge I showed you before. Again we see the delta-shaped craft and the Earth with quarantine rings in the middle.

We also prominently see the knights’ gloves with thunderbolts coming off of the fingers.

Again, this badge suggests the Templar Knights may have possessed mystical capabilities to manipulate energy — either by thought alone, or with some form of ‘thunderbolt’ technology, as we see in many ancient myths:

310_communications

310_flight_text

PLENTY OF EVIDENCE

Of course, none of this is absolutely conclusive proof that there is any off-planet work going on within Space Command, nor that they have access to stargate ‘portal’ technology or interstellar delta-shaped craft.

However, I have spoken to several different insiders who have given me various pieces of this puzzle — and they all fit together very well.

When independent witnesses keep telling you the same things, you start paying attention.

It is highly, highly interesting that we see so much redundancy in the symbolism of these various military badges — over and over again. I’ve only given you a brief sample of what you can uncover with your own research.

 


THE QUARANTINE DROPS AFTER 2012

Everyone ‘in the know’ is well aware of THE RULES, and the Quarantine that exists around the Earth.

Apparently you can’t just fly a ship out of Earth’s atmosphere without opening a hole in the Quarantine first. This had to be done for all the Apollo missions, I am told, as otherwise they would have never made it out of here alive.

The ETs that have been working with the US and other governments for the past century apparently possess technology that allows for short-term openings to be made in the Quarantine.

Space Command is very glad we have the Quarantine, as it protects us from outside invading forces. When random holes occur, Space Command uses their own ships to further defend the Earth — as their badges indicate.

Another very interesting point I’ve been told is that Space Command and its affiliates have reason to believe the Quarantine will drop some time after 2012. This is a significant part of the transformation we are now going through.

At this point, the Earth will enter into open contact with its ET neighbors.

There is also the implication or suggestion that the dropping of this Quarantine will also enhance the mystical and psychic abilities of the average person as well.

 

EVERYTHING CAN BE FOUND IN “THE LAW OF ONE”

The ‘Quarantine’ is one of a variety of very specific data points that were revealed in the Law of One series, most of which came through in 1981 to Don Elkins, Carla Rueckert and Jim McCarty of L/L Research.

The best way to introduce yourself to this staggeringly complex body of information — all of which is now free to read online — is to consult the Study Guide I have posted at this site. I highly recommend you explore this research, and feel it is one of the best possible uses of your time.

I have pointed out to several insiders now that everything they’re telling me — all the most significant data points — can be found in this one series from 1981.

I consistently urge that they read it, as they would be shocked to discover how well the material lines up with what they already know.

However, everyone is ‘too busy’ — and the big discovery still remains waiting in the wings.


LAW OF ONE ON THE ‘QUARANTINE’

If you feel you have the time, here’s a full list of all the places where the ‘quarantine’ is discussed in the Law of One series — and it is a fascinating read:

http://lawofone.info/results.php?search_string=quarantine&search_type=any&numeric_order=1&ss=1&sc=0

These two sets of quotes from Sessions Six and Twelve really stand out for me:

6.25 Questioner: Do any of the [positive Confederation ETs] come here at this time in spacecraft? In the past, say, thirty years?

Ra: I am Ra. We must state that this information is unimportant. If you will understand this, we feel that the information may be acceptably offered. The Law of One is what we are here to express. However, we will speak upon this subject.

Each planetary entity which wishes to appear within your third-dimensional space/time distortion requests permission to break quarantine, as you may call it, and appear to your peoples.

The reason and purpose for this appearance is understood, and either accepted or rejected. There have been as many as fifteen of the Confederation entities in your skies at any one time; the others available to you through thought.

At present [1981] there are seven which are operating with craft in your density.

Their purposes are very simple: to allow those entities of your planet to become aware of infinity, which is often best expressed to the uninformed as the mysterious or unknown.

 

12.3 Questioner: Is there any effort on the part of the Confederation to stop the Orion chariots [piloted by negative, “service to self” ETs] from arriving here?

Ra: I am Ra. Every effort is made to quarantine this planet.

However, the network of guardians, much like any other pattern of patrols on whatever level, does not hinder each and every entity from penetrating quarantine — for if a request is made in light/love, the Law of One will be met with acquiescence.

If the request is not made, due to the slipping through the net, then there is penetration of this net.

12.5 Questioner: I don’t understand how the Confederation stops the Orion chariots from coming through the quarantine?

Ra: I am Ra. There is contact at the level of light-form or lightbody-being, depending upon the vibratory level of the guardian.

These guardians sweep reaches of your Earth’s energy fields to be aware of any entities approaching. [DW: The satellites I have heard about from the insiders appear to be the automated detection system that alerts these ‘Guardians’.]

An entity which is approaching is hailed in the name of the One Creator.

Any entity thus hailed is bathed in love/light, and will of free will obey the quarantine due to the power of the Law of One.

12.6 Questioner: What would happen to the entity if he did not obey the quarantine after being hailed?

Ra: I am Ra. To not obey quarantine after being hailed on the level of which we speak would be equivalent to your not stopping upon walking into a solid brick wall.

12.7 Questioner: What would happen to the entity if he did this? What would happen to his chariot?

Ra: I am Ra. The Creator is one being. The vibratory level of those able to breach the quarantine boundaries is such that upon seeing the love/light net it is impossible to break this Law.

Therefore, nothing happens. No attempt is made. There is no confrontation.

The only beings who are able to penetrate the quarantine are those who discover windows or distortions in the space/time continua surrounding your planet’s energy fields.

Through these windows they come. These windows are rare and unpredictable.

 

This is only one of many hundreds of examples where I have found a perfect correspondence between what the top-level insiders tell me and what we find written in the Law of One series.

 

THE ‘QUANTUM LEAP’

I have worked for years to flesh out the Law of One’s cosmology into a scientific thesis — with stunning results, as you can find in my videos, conferences, radio shows, articles and books.

A window of 2011 to 2013 was given in the Law of One series as a time where a ‘quantum leap’ would occur in Earth’s history, propelling us into an amazingly beautiful new Golden Age.

Once this shift fully takes place — which may involve 100 to 700 years for the full transition to complete — the average human being will have all the abilities attributed to Jesus and other ‘Ascended Masters’ — and more.

Even though it may take some time for this transformation to occur, there is no question that the initial ‘quantum leap’ in 2011-2013 is something absolutely remarkable, breathtaking and unprecedented in Earth’s history.


A GALACTIC TRANSFORMATION

This ‘quantum leap’ is the result of our Solar System traversing into a more highly-charged region of the galaxy — wherein the actual physics of matter, energy and consciousness irreversibly shift.

This galactic transformation propels the Earth into an energetic state called ‘Fourth Density’ — as opposed to our current ‘third.’

These same energy states appear in the human body as the seven chakras. They also constitute what most people mistakenly call “dimensional levels”, which apparently exist as planes of existence throughout the entire Universe.

The shift into fourth-density is essentially a graduation from the yellow, self-oriented center to the green, heart-oriented perspective.

No mention of the Mayan Calendar ever occurred in The Law of One, as Dr. Don Elkins knew nothing about it — nor the importance of the 2012 date in many ancient prophecies.

It is highly ironic that the most accurate and comprehensive body of 2012 prophecy information makes no mention of the Mayan Calendar whatsoever… nor any of the other common talking points related to 2012.

 

THE MOST ADVANCED SCIENTIFIC INFORMATION ON EARTH

Obviously, until this shift actually happens, we cannot be certain of what will occur — nor of exactly how it will occur.

Nonetheless, there are hundreds of specific, highly technical scientific data points in the Law of One series that have since been proven correct.

This makes it highly unlikely that the whole model will fall apart when it comes to the Fourth-Density Shift.

I have yet to find a single contradiction or error in the Law of One cosmology. In fact, the more I follow up on the leads we were given, the more advanced and beautifully perfect the model becomes.

I struggled for many years with the frequently-mentioned concept of a parallel universe where time is three-dimensional — but finally this year I solved this greatest of all mysteries, and truly understood how and why it was the key to everything.

My upcoming book The Source Field Investigations — due for release next May — is significantly more evolved than any other presentation I’ve given on this subject.

The CONVERGENCE film script has now been brought fully up to date with these latest breakthroughs as well, and we hope to have a finished draft ready to show directors, actors and investors by early January.

RESEARCH CREDIT:

 

SEE ALSO..

 

Who dumps technology more advanced than NASA on to NASA and thinks nothing of it? This admission of at least this segment of a secretive space program is quite revealing. It will probably slip by mainstream media, but sit up and take notice, this is a serious admission here.

NASA gets two military spy telescopes for astronomy

(Washington Post) The secretive government agency that flies spy satellites has made a stunning gift to NASA: two exquisite telescopes as big and powerful as the Hubble Space Telescope. They’ve never left the ground and are in storage in Rochester, N.Y.

It’s an unusual technology transfer from the military-intelligence space program to the better-known civilian space agency. It could be a boost for NASA’s troubled science program, which is groaning under the budgetary weight of the James Webb Space Telescope, still at least six years from launch.

Or it could be a gift that becomes a burden. NASA isn’t sure it can afford to put even one of the two new telescopes into orbit.

The telescopes were built by private contractors for the National Reconnaissance Office, one of 16 U.S. intelligence agencies. The telescopes have 2.4-meter (7.9-foot) mirrors, just like the Hubble, but they have 100 times the field of view. Their structure is shorter and squatter.

They’re “space qualified,” as NASA puts it, but they’re a long way from being functioning space telescopes. They have no instruments — there are no cameras, for example. More than that, they lack a funded mission and all that entails, such as a scientific program, support staff, data analysis and office space. They will remain in storage while NASA mulls its options.

“It’s great news,” said NASA astrophysics director Paul Hertz. “It’s real hardware, and it’s got really impressive capabilities.”

The announcement Monday raised the obvious question of why the intelligence agency would no longer want, or need, two Hubble-class telescopes. A spokeswoman, Loretta DeSio, provided information sparingly.

“They no longer possessed intelligence-collection uses,” she said of the telescopes.

She confirmed that the hardware represents an upgrade of Hubble’s optical technology.  MORE HERE

Anything fishy here? Two telescopes on mothballs better than Hubble? Are they toying with us? This is just nuts news.

Secret Space Program?

You really think we get the whole story about anything, especially regarding military or technological advancements?

I personally met a man in New Mexico who used to work at the infamous Area 51. You can imagine how I tried to wangle information out of him, but he was tight-lipped. When I came back at him the third time after trying to act indifferent he finally said, “Let’s just put it this way. The stuff I worked on back in the 60′s still hasn’t come out.”

And my impression was he was a low-level tech.

There’s a lot of testimony as well as conjecture about Moon and Mars missions and the like you can read about on line, as well as many other “forbidden” realms of research. That we’re surrounded by technology that far surpasses what has been introduced into the mass mind is a no-brainer, so to speak.

It’s thought that black-op advances are decades if not centuries ahead of “known” technologies.

So What.

These psychos are on a path of self destruction—-hence—psycho-path.  We just don’t want it to be at the expense of the innocent. Nice thing is we can’t be eliminated, we’re multi-dimensional eternal consciousness.

Now THAT has their knickers in a twist!

Be well, be aware. But this tech stuff we do need to keep an eye on to see what these wackos are up to.

Keep on informing, helping others find out who they truly are, and keep the wake up rolling.

Love, Zen

 

Track Influence of Money by Bills, States or Congresspeople

Track Influence of Money by Bills, States or Congresspeople

Telling people that the men and women in Congress sometimes vote with special interests in mind is like telling people that pro wrestling is staged. We all know it happens but it’s just an inevitable part of the process. While there are sources to see who gives money to your representatives, there’s not an immediate and easy way to see which side they take with voting. A relatively new Web site aims to give you that power.

Sopatrack was started back in December of last year to let citizens know where their congressional representatives stood on SOPA. It also gave them a venue to contact their members of Congress through phone or social media. After SOPA was killed though, the creator of the site, Randy Meech, only had one thing left to do – apply his site to all bills currently going through Congress.

This is where the current Sopatrack comes in. It allows concerned citizens to see the bills that have recently been passed by Congress to see whether their members of Congress voted with or against the money for that bill. It also allows citizens to see the percentage of which their members of Congress vote with or against the money.

Sopatrack is built using the Maplight and SunlightLabs APIs. Both Web sites seek to make Congress more open by tracking the influence of money on politics or making government more transparent through technology.

To give an example, let’s take a lot at my home state of Kentucky. By clicking the red button on the top right corner, you can find your local congresspeople immediately. It then brings up a list of your local senators and representatives to see where they stand. Unsurprisingly, Senator Mitch McConnell and Senator Rand Paul both vote with the money most of the time at 75 and 91 percent respectively. Our single representative – Ben Chandler – votes with the money 53 percent of the time.

The home page is by far the most interesting though. It lists the top 10 states that vote with the money alongside the top 10 states voting against the money. It does the same thing with congresspeople. The top 10 congresspeople voting with the money are all Republican except for Senator Joseph Lieberman who is an Independent. The top 10 congresspeople voting against the money are Democrats but their lowest statistic is at voting with the money only 46 percent of the time. Take the information as you will, the point is that money still plays a major role in politics regardless of party affiliation.

The home page also lists the 10 most recent bills alongside the top fundraising bills. It then lists whether the bill’s passing or rejection was with or against the money. To use its namesake, the rejection of SOPA was voting against the money.

As a final note, the majority of Congress as of right now is voting with the money at 73 percent. That shouldn’t be too big of a surprise though. That number will be updated throughout the year as congresspeople vote for and against bills. If you want to keep tabs on your representatives,check out Sopatrack and become informed.

Source: http://www.webpronews.com/sopatrack-when-does-congress-vote-with-the-money-2012-04

Monsanto Plans Massive Biotech Experiment in US

Monsanto Plans Massive Biotech Experiment in US

The US government has for the first time signed off on a large-scale experiment involving genetically modified crops, which will lead to biotech big shot Monsanto introducing an engineered corn seed across America from South Dakota to Texas.

The Monsanto Corporation has been given the go-ahead to test out a man-made corn variant that they claim can thrive in dry, unfavorable conditions. With much of the American south and southwest experiencing abnormally arid conditions, the freak-seed could revitalize a chunk of the nation’s agriculture.

More likely, however, is that a success will mean revitalization in terms of Monsanto’s profits and not much more.

The government has agreed to let Monsanto test out the biotech crop on farms owned by the company from the state of South Dakota down through Texas to see if the seed stands to be commercially viable; if so, it is expected to be made available for purchase in 2013. With America’s small-time agriculturists in danger — and already largely threatened by industry giant Monsanto — a success for the seed could see yet more farmers finding themselves unable to compete and forced to throw in the towel.

Monsanto has in recent years attracted criticism for questionable legal practices after it has introduced lawsuits against small-time farmers for the unauthorized use of genetically-modified crops patented by the corporation. In many instances, it is believed that the smaller farms in question only ended up with Monsanto seeds due to wind, rodents and other forces of nature bringing the crops across corporate farms and onto their own terrain. Unable to compete against Monsanto in court, however, the company has time-and-time-again bought out its competition and, as a result, made great strides as of late in terms of monopolizing the seed biz.

Last month Jim Gerritsen, president of the Organic Seed Growers and Trade Association, issued a statement saying he and others were serious about saving farms from being forced to close due to corporate muscling. “Monsanto’s threats and abuse of family farmers stops here,” said Gerritsen. “Monsanto’s genetic contamination of organic seed and organic crops ends now. Americans have the right to choice in the marketplace — to decide what kind of food they will feed their families — and we are taking this action on their behalf to protect that right to choose.”

Around 300,000 organic farmers are currently awaiting a court decision to see if a US District Court will hear a lawsuit against Monsanto that, if successful, will keep the company from continuing to sue small-time agriculturists. Between 1997 and 2010, Monsanto tackled 144 organic farms with lawsuits and investigated roughly 500 plantations annually during that span with their so-called “seed police.” Gerritsen and others want to see to it that Monsanto can’t do that anymore, but if they are denied a day in court and the new corn crop prevails, it could soon be the final curtain call for many of America’s independent farmers.

Governmental approval of the modified crop marks the first time that the US Department of Agriculture’s Animal and Plant Health Inspection Service has okayed a product that has been genetically engineered to resist a weather condition such as a drought, rather than a pest or herbicide. Acting on concerns that Washington has been overly encouraging to Monsanto as they force farms into foreclosure, US-based non-profit group Public Employees for Environmental Responsibility went after the White House recently for ignoring Freedom of Information Act requests. Members of PEER suspect that if they can come into possession of certain correspondence, they can link the Obama administration to key lobbyists for Monsanto.

Protesters with the Occupy Wall Street movement in the region Monsanto plans to test its new seed are holding a conference this weekend in St. Louis, dubbed Occupy Midwest. Members of the group say they intend on waging a demonstration against Monsanto, which has offices in the area.

SOURCE:
http://rt.com/usa/news/monsanto-biotech-us-seed-683/

Black Ops and Blood Money – Raymond Davis, Agent In Pakistan

Black Ops and Blood Money – Raymond Davis, Agent In Pakistan

When a CIA operation in Pakistan went bad, leaving three men dead, the episode offered a rare glimpse inside a shadowy world of espionage. It also jeopardized America’s most critical outpost in the war against terrorism.

Raymond Davis’s car now sits inside a police compound in Lahore. But the five bullet holes in the windshield tell the tale of that day in January. Photograph by Matthew Teague

Hearing the American’s name whispered in his ear, the chief of police in Lahore, Pakistan, turns from his desk and nods toward a nondescript side door in his office. His desk sits surrounded by concentric rings of chairs, occupied by visitors hoping for a moment of Chief Aslam Tareen’s time. Lahore is a city of 10 million people, and justice demands constant attention. But before he’ll discuss the American — perhaps the most notorious American in Pakistan’s history — Tareen needs privacy. He leaves his desk and slips through the side door into a smaller, more secluded office. A bed is in the corner, along with a television, and an attendant brings a pair of slippers and sets them before the chief’s leather recliner. In Pakistan the truth is like a woman; it stays veiled in public, only fully revealing itself behind closed doors. And this particular subject is a treacherous one.

“Raymond Davis,” Tareen says, settling into his chair. “Spy.”

Davis, in Pakistan, being escorted to court. (“I don’t know who they were,” he says of the men who drew guns on him and whom he shot.) Photograph by Hamza Ahmed/AP Photo

 

Davis operated in the darkest shadows of the war against terrorism. He worked for the CIA as an independent contractor, gathering information on the jihadist group behind some of the most cruel and spectacular attacks in recent years. The intelligence operation collapsed violently in January when two Pakistani men accosted Davis on a crowded street and he shot them both dead with a skill rarely seen outside spy novels. A botched attempt to rescue him in the -aftermath left a third man dead and Davis under arrest.

The episode inflamed the Pakistani people and set up a tricky showdown between two governments. It also pierced the cloak covering a clandestine world, exposing a realm of surveillance and countersurveillance, suspicion and political exploitation. For the United States, the consequences were profound: Pakistan is the CIA’s most important arena, a hiding spot for Al Qaeda and home of a dangerous, rising terrorist militia called Lashkar-e-Taiba. But Davis’s eventual release cost America much more than the money that was paid to compensate victims’ families: Backroom deals have forced the withdrawal of CIA operatives from the heartland of terrorism.

In the days after the incident, Police Chief Tareen announced to an outraged public that the American had murdered young Pakistani men “in cold blood.” But now, in his private chamber, Tareen can’t disguise a tone of professional admiration.

He had questioned Davis himself, but “from day one to day 14, he would not talk,” he says. Two weeks of silence. And then?

“He was in solitary,” Tareen says. “He said he wanted something to read.” They gave him magazines.

“He was very well trained,” says the chief. “Very calm.”

But what about the incident, I ask — the one that brought on the greatest intelligence crisis in America’s history with Pakistan? What about the shooting?

Tareen smiles.

“The shooting was expert.”

Spying works like this: The CIA sets up an office within the American embassy in Paris, for instance, or Nairobi. An agency case officer works undercover as a passport-pushing, visa-stamping bureaucrat. Meanwhile, he or she runs agents — that is, finds and grooms local players to gather information for the case officer, who then sends it home for analysts to examine. These local agents are valuable because they have connections in a world where American officers don’t. They can look the part, speak the language, move freely, ask more questions.

The problem is that in a country like Pakistan — a fractured, duplicitous place that may be an ally or may be an enemy or both — the CIA can’t just set up shop in the embassy and let case officers work in the usual way. Places like Pakistan require a different sort of person altogether. A person like Raymond Davis.

Some particulars of the 36-year-old’s work remain cloaked in classification, but a search for answers in Pakistan and the U.S. — and eventually, a brief interview with Davis himself — give a good sense of who he is and what happened to him. He likely worked alongside the CIA’s Special Activities Division, the agency’s paramilitary wing. The SAD works in hostile environments — the ones where running agents is risky, if not impossible — gleaning intelligence through covert means. That can include anything from tapping wires to snatching suspects to influencing politicians through propaganda. Davis’s particular role focused on operational security. Whether it was a clandestine meeting between a case officer and a source or an eavesdropping or other black op, his job would be to work closely — but not too closely — with the case officer, in case the scene shifted in some perilous way. During a meeting in a hotel lobby, for instance, an operator like Davis would try to remain far enough away from the exchange to not draw attention, but near enough to watch for hostile movement. If someone were to attack, protocol calls for two essential actions: Shoot any attackers until they’re down for good, and clear out immediately, along with any other Americans and agents.

In Pakistan, Davis’s near-translucent official cover was as a “technical consultant” to the American consul general. But in reality he and his CIA team sought to do something difficult and dangerous: to surveil and report on the terrorist group Lashkar-e-Taiba.

Like so many extremist groups, Lashkar-e-Taiba, or LeT, first sprouted in the fertile soil of Afghanistan in the 1980s, planted and tended by the CIA and its Pakistani counterpart, the Directorate for Inter-Services Intelligence, or ISI. The two spy agencies fought together against the Soviet Union in Afghanistan’s mountains, and in the course of that fight, the Pakistani government quietly created a group of militant Islamists, radical jihadists fine-tuned to battle godless Communism. They called the group Lashkar-e-Taiba. The Army of the Pure.

Eventually, the Soviet Union crumbled and the spies of America and Pakistan parted ways, but Lashkar-e-Taiba carried on. The Pakistani government refocused on the highlands of Kashmir, where it wielded LeT as a low-profile proxy military against the nation’s old nemesis, India. With time Lashkar distinguished itself even among terrorist groups for the ruthlessness of its attacks; in 1998, LeT members killed 23 Kashmiri villagers in their homes, including four children, shooting a one-year-old 18 times.

Lashkar first caught the West’s full attention in November 2008, when 10 LeT operatives arrived on India’s coastline in rubber speedboats. They injected themselves periodically with a mix of cocaine and LSD calibrated to keep them energized and awake for what lay ahead: a three-day, nonstop stream of gunfire and explosions that shook Mumbai. The young men had trained for the operation months in advance in an LeT camp and had been supported, in part at least, by Pakistani authorities. They attacked, shot, blew up, burned, tortured, and finally killed almost 200 people of 10 nationalities.

At first Pakistan’s government denied any involvement by its citizens. But faced with a mass of evidence — phone calls, e-mails, the confession of the lone surviving attacker — Pakistan relented and made a few half-hearted arrests of low-level terrorist associates. Otherwise, LeT remained untouched and largely unknown. It hardly went underground, though; to this day, it maintains a massive headquarters in the Lahori suburbs with almost 200 acres that includes a mosque, a madrassa, and a farm.

In the days after the Mumbai bombings, investigators from the U.S. and India sprinted along the electronic trail left by the bombers and found LeT’s list of potential targets. Mumbai was one of more than 300, not just in India but scattered throughout the Western world. Authorities never released the target list, but arrests in Denmark and Spain appeared to be linked. The investigation illustrated how far apart the ideologies of America’s and Pakistan’s security services had drifted. Former allies against the Soviets had become something murkier. And now Lashkar-e-Taiba, it turned out, had global ambitions.

Raymond Davis first arrived in Pakistan, authorities believe, within a month of the Mumbai bombings. But his career had started far away, geographically and figuratively, from the intrigues and illusions of Central Asian spooks.

In the hills of southwest Virginia, the state cinches up like a topographical coin purse, with West Virginia, Kentucky, Tennessee, and North Carolina all drawing close. In the center stands a lump of rock called Stone Mountain, in which a small white-water river has cut a big stone gap. Where the river surges out of the gap, there’s a town: Big Stone Gap.

It’s a nice old town, built with long-vanished coal-mining money. On the road up and out of town, there’s a smaller place yet, called Strawberry Patch, which is a collection of farms on the mountainside, high enough that on most days the sheep disappear into the clouds. And higher yet there is what locals call Wampler Holler, a curving valley that features two homesteads. On one side is the relatively grand home of Mr. Wampler himself. On the other, there’s a bare spot where, years ago, a small clapboard house once stood. That’s where Raymond Allen Davis came of age.

David Wampler, a retired farmer, has spent his entire life in the hollow and says there’s little to do but hunt and shoot. “It’s what young people do. Heck, I reckon my daughter can outshoot most any man.”

Davis was the son of a bricklayer and a cook, and the family was poor. Raymond, like his older brother and sister, inherited broad shoulders and a bearish, shuffling gait. “They didn’t have much,” says Brian Collins, a childhood friend from Strawberry Patch. “God, was he nice, though.”

In school Davis dominated his weight class as a wrestler and played both offense and defense in football, as a guard and defensive tackle. He steadily grew thicker and stronger than his classmates, even while he developed a reputation for humble deference. Shawn Eldridge works for the Big Stone Gap fire department now, but in high school he weighed just 119 pounds. To this day, he remembers how Davis stood up to bullies on his behalf.

Davis’s own hardship at home kept him humble, friends say. Every year at school, for instance, the football coach would hand each player a sack containing a few T-shirts and sweatpants, to wear at practice through the season. “That largely made up Raymond’s wardrobe. He just didn’t have much else to wear,” Collins, his old friend, remembers. “But he never complained about it. He just kept his head down and kept working hard.”

Davis’s future, it seemed at the time, was in bricklaying. He made a small stir, locally, when he won a national bricklaying competition. “He wanted to follow his father in the mason work,” Collins says. He looks at his feet and fidgets with a piece of gravel. “Guess things don’t always work out.” Midway through high school, Raymond’s father died. All these years later, Collins remembers the blow his young friend sustained. “Hard, hard,” he says. “But Raymond was quiet. He kept his feelings to himself.”

Typical Raymond, he says. Always so calm.

I ask if he felt surprised to find out his friend from Wampler Holler, outside Strawberry Patch, outside Big Stone Gap, had gone on to work undercover for the CIA on the other side of the world.

“No,” he says.

Davis joined the Army after high school, did basic training in Georgia, then served six months in Macedonia with a United Nations peacekeeping force. Eventually, he joined the Army’s Special Forces, or Green Berets, based at Fort Bragg, North Carolina. Special Forces work in teams of a dozen or so elite soldiers, prepared to fight anywhere in the world on short notice. Davis was his team’s weapons specialist.

After 10 years in the Army, Davis formed his own company, Hyperion Protective Services, which offered “risk and loss management” services and through which he worked as a private-security contractor. For a short time he did jobs for the CIA through the now-infamous Blackwater Worldwide, but after abuses by the company surfaced in Iraq, Davis left it to contract directly with the CIA in Pakistan, making $200,000 per year.

He worked in some of the most difficult terrain in the world, stationed in Peshawar, near the Pakistan-Afghanistan border, where the countryside is largely controlled by various factions of the Taliban. Between his arrival in late 2008 and his eventual arrest, he traveled back to the United States — he had married and moved to Colorado by then — nine times.

Davis’s latest assignment found him stationed in Lahore, a city near the eastern border with India that’s often called the “heart of Pakistan.” It’s much different than the high country on the Afghan border and treacherous for any American working around the edges of the terrorism scene. There’s a rough east-west divide among Pakistan’s extremist groups: Western groups are often factions of the Taliban and to a large extent composed of foreign fighters hiding in the mountainous country on the Afghan border. For years the ISI — Pakistan’s security service — has tolerated the CIA’s unmanned Predator drone strikes on western extremists because those outfits are uncontrollable and, thus,  less useful to Pakistani state interests. To the east, though, extremist outfits tend to be more closely tied — or even fostered by — the Pakistani state and the ISI. Outfits like Lashkar-e-Taiba.

According to Pakistani authorities, Davis made his most recent return to Lahore on January 20. He flew into Allama Iqbal International Airport and went directly to the Scotch Corner neighborhood, to a safe house used by the U.S. consulate. Later that day, five more American civilians showed up at the same address.

The next day Davis made his way to the U.S. consulate, driving away in a black Land Cruiser. A few days later, on January 24, he returned and switched to a white, late-model Honda Civic. In the course of the week, he met with locals, switched safe houses, and exchanged about $300 for Pakistani rupees at a bank. He was likely preparing for a job — a meeting, a drop, a wiretap — with his team.

On January 27, Davis loaded his car with equipment — a ski mask, a GPS unit, a Glock handgun, ammunition, first aid supplies, a small telescope — and set to work. He carried a camera full of photographs he had taken of sensitive sites, including shots of several military installations on the Indian border, and a mobile phone that contained contacts for apparent sources within terrorist groups from across Pakistan.

About 2:15 that afternoon, he drove alone along a busy street, Jail Road, in a rough part of the city. Maybe he was running an operation; maybe he was simply getting to know the neighborhood. But at some point he realized he was being shadowed by two men on a black Honda motorcycle. Both young and both armed with pistols.

It’s impossible to know who employed Faizan Haider and Faheem Shamshad or what motivated them. The options were limited, though: religion, nationalism, money.

They lived near each other on the outskirts of Lahore, beyond the warren of streets and alleys, in a poor but placid cluster of houses surrounded by fields of green hay. They were both in their 20s, and both had a vague work history, as described by family and neighbors, that included selling mobile phones and vending fruit.

“They did nothing wrong,” says Ijaz Ahmed, Haider’s cousin. Ahmed is a weaver who lives in his shop and likes to sip tea while he thinks. “Never in trouble.”

What brought them alongside Raymond Davis’s car on January 27? Ahmed shrugs.

Were they robbers? “No, no, no.”

Later, Pakistani authorities would declare that Shamshad and Haider were employed in some capacity by the ISI. Then, in unison, those same authorities changed their story to describe the two men not as agents of any sort but as “youths” and “innocent boys.” But other than claiming they were “never in trouble,” no one seems able to say what exactly Shamshad and Haider did do for a living. So their purpose remains unclear. They could have been robbers. They could have been hired muscle for LeT. Or they could have been spies.

Ahmed takes another sip of tea and gives a beneficent smile. “They were illiterate,” he says. “How could they be ISI?”

Davis didn’t have time to ponder their motives. The intersection of Jail and Ferozepur roads was packed with cars, bicycles, rickshaws, and pedestrians; the motorcycle pulled around his car and stopped just ahead of it. Shamshad, on the back of the bike, turned. He raised his pistol. He cocked it.

There is a switch inside the minds of men who work as Special Forces soldiers. It toggles between the perception of another person as “friend” or “enemy.” In one setting, it inspires a fierce and even noble protectiveness. But the moment the switch is flipped to “enemy,” vision narrows and everything but the target fades away.

Shamshad’s gun cocked, and Davis’s switch flipped.

In an instant he raised his own pistol, a semiautomatic Glock, and fired a series of five rounds straight through his windshield. The bullets punched neat holes through it, leaving only a sprinkling of green glass cubes and trapezoids on Davis’s dashboard.

He shot Shamshad in the stomach, behind his right ear, in the back, in the left arm, and in the left thigh. Shamshad fell onto the motorcycle and dropped his weapon. Haider ran toward the intersection and made it about 50 feet to a brick-and-grass island in the road. Davis opened his door, stepped from his car, and shot him five times, including twice in the back, as Haider ran. It was an unbelievable feat of marksmanship.

Anwar Khan, the manager of a restaurant on the intersection, was washing his hands in the men’s room when he heard the first shots. They sounded strange. Muffled. “I thought it was a customer firing,” he says. He ran into the restaurant as more shots barked from the street. These sounded sharper. Khan watched, amazed, as Davis walked back to his car, retrieved a camera, and then walked to each of the bodies. He photographed them with the calm of a scholar documenting some historical artifact. No hurry. No tremor.

“He was so confident,” Khan says, shaking his head.

As a crowd formed, Davis radioed his team for backup. He waited for them in his car, but the crowd became a mob and smashed out his rear window, raining glass onto the backseat. Davis couldn’t wait any longer. He dropped the car into gear, cranked the steering wheel, and somehow maneuvered away from the crowd and the intersection.

Khan, the restaurateur, stood astonished as the white Honda revved, leaping and gunning its way through dense traffic. “It did not feel real,” he says. “It was like an American movie.”

He was still standing at his restaurant’s window a few minutes later when he heard the approach of a second hard-revving vehicle. A Land Cruiser charged into view, just a few feet in front of the restaurant, which meant it was on the wrong side of the road. And behind it came a wave of people on foot, running and shouting. Only later would he find out why.

A few minutes earlier and about a quarter mile down Jail Road, Zahid Chaudhry, a car salesman, had stepped outside his small dealership and noticed the Land Cruiser. Traffic was backed up, heading toward the big intersection to his right. The Land Cruiser, stuck in the unmoving mass, lurched sideways and climbed over the foot-tall cement traffic divider. The driver — a foreigner, he could see — then turned upstream against oncoming traffic, swerving and surging toward the intersection.

“Look at him!” Chaudhry told a colleague. “He must have killed someone.”

Then, as though to prove him right, the Land Cruiser smashed head-on into a motorcycle. In a sliver of a moment, its rider, a young man named Ibad-ur Rehman, hit head-first into the hood of the Land Cruiser, buckling it.

The Land Cruiser stopped, as everyone on the street watched. Its driver backed up but couldn’t dislodge the bike or its rider. They were both stuck to the grill. So, facing a sickening dilemma, the driver decided to continue forward, racing once more toward the intersection. After a hundred yards or so, Rehman and his motorcycle came loose, and when bystanders ran to his side, they found him dead. They turned — a hundred or more people now — and ran after the Land Cruiser, calling for police and memorizing its license plate number, which turned out to be counterfeit.

When the vehicle arrived at the intersection where Davis had fled minutes earlier, it stopped a moment as the driver and a passenger scanned the scene for Davis. A man approached the Land Cruiser and pulled open the driver’s door. The driver, according to people who witnessed it, swung up a weapon — some said a compact assault rifle of some sort, others said a large pistol — and pressed its muzzle to the man’s head. The man backed away, and the Land Cruiser tore ahead, swinging right at the intersection and toward the American consulate.

Along the way, police said, the vehicle’s occupants jettisoned a bizarre sort of litter: bullets, batteries, a pair of gloves, a baton, and a scrap of cloth bearing an American flag.

The Land Cruiser disappeared behind the walls of the consulate, and the two men inside were spirited back to the U.S. before Pakistani authorities could get their hands on them.

Davis fared worse. Peering around the cluster of bullet holes obscuring his view, he wove through more than a mile of heavy traffic, crunching broken glass and shell casings as he worked the pedals. He was, according to Police Chief Tareen, “a very good driver,” with keen evasive skills. But along the way, he overturned a rickshaw and knocked into a motorcyclist. In minutes the whole city seemed to converge on him; a traffic warden saw the chaos and, along with a gathering crowd on the street, blocked his escape. Police showed up before the crowd could tear Davis apart and took him to a nearby station and into a room for questioning. Someone — Davis or an arresting officer — turned on a camera and recorded part of his interrogation, which leaked to local media. In the video, the police question Davis while he shows them a series of identification cards on a lanyard around his neck. Davis remains outwardly calm, but there’s an undercurrent of desperation:

Davis: I need to tell the embassy where I’m at.
Police, examining Davis’s ID: You’re from America?
Davis: Yes.
Police: You belong to American embassy?
Davis: Yes, but my passport —
Police: Raymond?
Davis: — at the site, I showed the police officer. It’s somewhere. It’s lost.

The room erupts in Urdu, and there’s another round of examination of the laminated cards around his neck.

Police: You are now working at the consul general? In Lahore?
Davis: Yes.
Police: As a…?
Davis: I just work as a consultant there.

Then a senior officer walks in, and the whole discussion restarts with a renewed interest in Davis’s ID cards.

The haphazard interrogation started Davis’s sojourn in the Pakistani legal system. He was taken to a courtroom — a small cement room with fluorescent lights — where a judge handed him over to a prison called Kot Lakhpat. It’s a vast brick monolith outside the city, run by a warden named Malik Mushtaq. He sat in his office recently, looking swollen and sullen, a uniformed toad.

“I will not talk about Raymond Davis,” he says, toying with his oversize watch. Then he carries on talking about Raymond Davis. “We kept him in a place for terrorists.”

They placed him in a cell alone so that he couldn’t harm another prisoner and set video cameras to record him around the clock.

Then again, they thought, maybe it was Davis who was in the most danger. Thousands of people had taken to the streets of Lahore calling for his head, and also in Karachi, Islamabad, Hyderabad, and elsewhere. They printed posters of Davis wearing a noose and hung banners that demanded police turn him over to the public for execution. They hung him in effigy, burned him in effigy, and sometimes simultaneously hung and burned his effigy. The outrage only escalated when Shamshad’s widow, Shumaila, swallowed insecticides in protest. As she lay dying at the hospital, a television camera — there is nothing more lurid than Pakistani television news — zoomed in on her young face as she declared her reasoning shortly before her death: “The killer is being treated as a guest at the police station. I need justice and blood for the blood of my husband.”

Religious extremists seized the moment, preaching sermons about Davis’s role in a magnificent American-Indo-Zionist conspiracy. A conspiracy, they said, to steal Pakistan’s nuclear warheads and sneak them to Al Qaeda, then await the inevitable mushroom cloud. All this, they pronounced without irony, would be a pretext for the Americans to invade Pakistan.

Perhaps worse, the Pakistani public had long ago grown tired of the CIA drone strikes in the tribal areas to the west. The strikes had decimated villages there. Increasingly, the newspapers had covered their front pages with photos of the destruction. That wasn’t lost on the CIA; after a steady rate of three to four strikes per week, the drone attacks suddenly stopped as soon as Raymond Davis disappeared into the corridors of Kot Lakhpat. The CIA knew that Davis had come to embody the agency’s presence in the country and didn’t want to provoke the public any further.

So Davis’s jailers emptied a section of the prison and put him in it, where even his fellow prisoners could not reach him.

But what about the prison staff? On several occasions in the past, guards had killed prisoners at Kot Lakhpat. Now any man who murdered the American in his cell would be a civic and religious hero. So administrators took away the weapons of guards in Davis’s section as a precaution.

The CIA, of course, was also a concern. Who could be more eager than the agency to see Davis fall forever silent? Jailers worried the CIA might try to poison him in some stealthy way, so they prevented any personal contact with anyone who might potentially be a CIA officer. When U.S. officials arrived to see Davis, prison staff put up a special pane of glass to separate them. They formed a committee to oversee preparation of his meals.

Then again, committees can be infiltrated. So dogs tasted the American’s food first, to make sure.

When two men on a motorcycle — whether spies or robbers — accosted Raymond Davis on a Thursday afternoon, the encounter set in motion all of Pakistan’s many factions, all angling to use him as a lever for power or money or prestige. The ISI wanted to keep Davis as a bargaining chip with their U.S. counterparts. Religious extremists wanted the spectacle of an execution. The government’s opposition parties wanted to parade Davis as evidence of President Asif Ali Zardari’s acquiescence to CIA meddling. And the government itself needed to shuffle Davis back to his homeland without causing a popular uprising like the ones in Egypt, Libya, and elsewhere. No government official wanted to make that decision.

At first American authorities asserted that Davis was a diplomat and enjoyed immunity under the 1961 Vienna Convention on Diplomatic Relations. President Obama himself cited the convention in an address, calling Davis “our diplomat.” But the notion of Davis, who was clearly a spy, skipping away because of diplomatic niceties only further inflamed Pakistani anger. Back in Virginia, Davis’s sister, Michelle, watched the news unfold on television, and it looked bad. The Internet looked worse. “This is my little brother,” she told me. “I just had to turn it off and stop watching. I prayed instead.”

Negotiators from both sides faced what seemed to be an impossible set of requirements. They needed a solution that would simultaneously allow Davis to go free, preserve a sense of sovereignty for Pakistan, rescue politicians from any painful decisions, and undercut the mullahs’ ability to whip up anger in the streets. Little light shone through a forest of frightening potential outcomes. Then Husain Haqqani, Pakistan’s ambassador to the U.S. and an Islamic legal expert, offered U.S. politicians an idea so brilliantly counterintuitive that it just might solve all their problems at once: Invoke shari’a, he said. He suggested that the Americans appeal to Islamic law, which provides an opportunity for the accused to pay diyah, or blood money, to the families of his victims, who can in turn forgive the transgression in court.

Meanwhile, privately — in phone calls and in a meeting at a luxury hotel in Oman — the top soldiers and spies of each country hammered out a deal of their own. The CIA wanted its man back in America. The Pakistani military wanted him gone too. In fact, the Pakistanis wanted all CIA contractors back on American soil and for the CIA to sharply draw down its personnel and plans in Pakistan altogether. Pakistan said the CIA can simply route any future human intelligence gathering through the ISI, instead of acting on its own. The question, of course, is how much the CIA can trust the ISI. In the days following Davis’s arrest — and the confiscation of his mobile phone — Pakistani newspapers ran reports of militant groups rounding up and assassinating several locals for “cooperating with the CIA.”

On March 16 representatives from both countries, along with a judge and 18 relatives of Shamshad and Haider, as well as those of Rehman, met at Kot Lakhpat prison. The families told the judge that they had accepted diyah — about three quarters of a million dollars per family —and they forgave Davis. The judge fined him $235 for carrying an unregistered firearm, and called the case closed. Davis left the prison and went directly to the airport, where a jet waited to wing him to an American air base in Afghanistan, then on to the U.S.

“I’m just relieved,” his wife, Rebecca, told me over the phone from their home in Colorado. “I just kept telling myself it was like any other assignment and that he’d come home again. And he did.”

Initially family members felt that Davis wouldn’t want to talk to the media about the episode. Rebecca herself hadn’t asked him questions, because “he wants to put it behind him.” But eventually, after some time at home, Davis agreed to address a few critical points by phone, the first time he’d talked to the press.

A former CIA case officer had told me that the whole operation in Lahore fell apart — from a tactical perspective — when Davis failed to leave immediately after shooting the two men. If he had, everything that followed might have been averted. So I asked Davis why he spent so much time at the scene photographing, radioing, waiting, instead of fleeing right away into the embrace of the American consulate. The truth, Davis told me, had less to do with John le Carré than John Q. Public.

“Traffic,” Davis said. “I just couldn’t move. Traffic was packed into the intersection, and it took me forever to find my way out.”

The other question central to the affair: Who were the men Davis shot? Were they robbers? Spies? Something between? “I don’t know who they were,” he told me. “I just don’t know.”

The Pakistani press, police, and public based their case for murder largely on the claim that Davis shot Haider as he tried to run away. Why hadDavis done that?

“It didn’t happen that…” he started. He sighed. “It didn’t happen how they portrayed it. I want so badly to talk about this in detail.”

But he can’t, for now. During negotiations for his release, the U.S. Department of Justice vowed to the Pakistanis that it would open its own examination of the shooting. “Let’s wait until the investigation finishes,” Davis told me.

There is evidence in Haider’s autopsy report, though, that Haider wasn’t merely running away. It shows one shot entering his chest. Another grazed him on the front thigh.

As he waits for the results of the investigations, Davis has other concerns. “I just hope I can find work.”

Back in pakistan, the balance of influence between American spies and their targets — particularly the quasi-official Lashkar-e-Taiba — shifts every moment now further toward the terrorists.

According to the New York Times, the U.S. agreed to the demands of the ISI, packing up more than 330 CIA and Special Operations personnel in order to win back Davis. There’s no way to know what percentage of CIA staff that includes, but it does involve all contractors as well as case officers whose missions were unclear to the Pakistani government. It’s a crippling blow and leaves the agency dependent on intelligence gathered from drones and satellites. One former CIA case officer told me the entire Davis debacle — the posturing by the government, the outrage of the leading clerics, all of it — was simply a bit of opportunistic stagecraft by the ISI. “It was a pretext to shut down the CIA,” he said. The Pakistanis had grown weary of the drone attacks and now had a bit of leverage against the Americans.

And what did the terrorists make of the whole fiasco? Through an intermediary, I contacted Yahya Mujahid, one of the most vocal leaders of Lashkar-e-Taiba. He agreed to leave the group’s sprawling suburban acreage to meet at a Pakistani-owned hotel in the city.

He spoke with grand confidence about LeT’s charity through a front organization called Jamaat-ud-Dawa. It is building hospitals, schools, providing relief for Pakistani victims of last year’s horrific floods. It runs an enormous fleet of ambulances, he said. It develops programs for the country’s illiterate, often-jobless young men —young men like Shamshad and Haider.

All those efforts make the group palatable to a public that isn’t being adequately served by its government. I spoke with one middle-aged, middle-class Lahori who said he wouldn’t mind if the radical Islamists took over Pakistan if they could just stop the criminals.

Mujahid, the LeT man, held up dismissive hands when I asked about the American maneuvers to spring Davis from prison. “This is shari’a,” he said. One man’s release seemed trifling to him, unimportant compared with what it had cost the Americans. After all, he said, there was a new matter to protest that night. A new outrage to preach: A very important American figure in the state of Florida, he said, had burned a copy of the Koran.

In Pakistan, anger, like the sun, rises every day and fills the public square. And two days after Davis’s release, following six weeks of silence in the sky, the Predator drone strikes began again.

SOURCE:
http://www.mensjournal.com/black-ops-and-blood-money

By: Matthew Teague, June 1, 2011

Obama’s First Paper Airplane – No Casualties

Obama’s First Paper Airplane – No Casualties

Barack Obama at 6 Years Old after making his first paper airplane, flying it over a part of town where he’s never been before, and being disappointed that it didn’t kill a bunch of people he didn’t know.

 

#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog

#InfoSec: If it walks like th3j35t3r and talks like th3j35t3r, its probably TomRyanBlog

UPDATE: Our hero Jake Davis provided some interesting commentary on this subject recently:

I remember seeing IRC logs of you and LulzSec dissing The Jester and saying his tool “XerXeS” is just SlowLoris with Tor… but how did you guys come to this conclusion? How can this be mitigated if his attacks appear to come from so many exit nodes? Just block all Tor exit nodes? I dnt wanna to. :(
“I have no idea how XerXeS or any other DDoS tool actually works, all I know is that the person or people running the character known as The Jester have been doing it successfully for many years with absolutely zero discrepancies, arrests or suspensions. I think that’s it’s incredibly impressive that The Jester has stuck to the courage of his/her/their convictions for such a large period of time, even though I disagree with some of the political views expressed. I’m a big fan of facilitating alternative realities and The Jester brings us into another world with many sophisticated layers that often make us forget that it’s just a twitter account and a blog, which is a talent few people have. I find the construction of the persona at a granular level far more admirable than the hacking itself, which I obviously don’t approve of. ”    -via  http://ask.fm/DoubleJake

 

>DecryptedMatrix gives voice to PiraX

 

th3j35t3r_Tom_Ryan_BlogHello there, th3j35t3r.  We would also like to welcome our fellow Anons, bloggers, and those simply interested in a cyber-culture controversy spanning over two years. We are sure you know why we have called you here. Your recent online behavior has been rather strange, to say the least. We are here for one reason: We want to end you.

We would like to start first by making you comfortable. No more quasi-anonymous pseudonym mumbo-jumbo. Your name is Thomas so we will call you by the name you were given by your mother. We know your name because it was confirmed over a month ago with the following Pastebin paste:   http://pastebin.com/A5iiTAJS  (PiraX Dox continued after paste)
________________________________________________________________________

Q: Are Thomas Ryan and th3j35t3r one and the same person?

tl;dr: Yes. You fucking bet they are. In the words of Oscar Wilde, however, ‘The truth is rarely pure and never simple.’ Thus, if you want the full, uncensored dox on th3j35t3r, you’re going to have to bear with me for the next ten minutes as I tear apart his tissue of lies and disinformation.

Now concentrate, cos here comes the proof…

Warning: Long dox is looooooooong. I trust it will prove to be an enlightening read however, not least for Mr Thomas Ryan of 86 Amber Street, Staten Island NY.


SEE TOM RYAN AS JESTER at DEFCON 19

Filmed at Defcon after observing Tom Ryan post and photograph a note outside the vendor room signed “J.” This photo was tweeted from @th3j35t3r twitter within moments, as was the following: https://i.imgur.com/axth3.jpg
Note the “Black cell paintball” logo on the shirt. BCP is the name of Tom’s Paintball team. Tom hangs on PBnation.com with a kid called j35t3r, which is the likely source for the name, and the first of many plagiarisms.  NOT SUSPICIOUS AT ALL, folks. Nor is it suspicious that the ridiculous attempts to smear me as a secret blackhat/anon/whatever over the last year all come from the same group of six people connected to Tom. The other partner is tentatively identified, but that’s a story for later.

**********

Among the 9,000 names to have been linked with @th3j35t3r, one that keeps cropping up is that of @TomRyanBlog. The dox has been denied by th3j35t3r, but then Sabu repeatedly denied that he was Hector Monsegur, and we all know how that one ended up…

While many Anons have been focused on reverse DNS lookups, port scanning and conventional doxing methods to unmask Jester, no one seems to have tried a simpler technique: writing analysis.

If Tom Ryan (TR) and Jester (J) are one and the same person, it should be easy to tell. They’ve written 3,000 tweets between them. Even the l33t3st of the l33t would struggle to convincingly maintain two separate writing styles over the course of thousands of tweets and numerous blog posts.

For those who are new to the party, here’s an overview of what we know about TR and J:

Both are conservative, right-wing and love their precious military. Both hate #OWS, Wikileaks, Manning and are obsessed with unmasking Anons. Both are fixated with Sabu (still!), Team Pois0n and Cabin Cr3w. Both enjoy love-ins with @AsherahResearch, @AnonymousDown and all the usual trolls.  In short, they’re both neo-con faggots. But are they one and the same faggot, or are they separate fags who happen to be pursuing identical vendettas?

Before we get bogged down in analyzing their writing styles, here’s some lighter tit-bits to get things kick-started:

1. Last year, TR and J both attended Hacker Halted in Miami and DEFCON in Nevada. Based on what we know of the pair’s political leanings and infosec knowledge, that alone automatically narrows them down to less than 5,000 possible suspects.

2. TR and J both like sushi (a trifling detail, but one that helps build a picture of their personalities). TR: “@p0isAn0N not going to the right Pizzaria. If you are in Boston you should be going to BoLoCo for Burritos anyway. And Duozo for Sushi.”
J: “#hackerhalted delegates … Stay clear of Cafe Bastille. Great sushi at Bali Cafe though… Stayin frosty.”

3. Tom Ryan has form for assuming false identities – such as ‘Robin Sage’. See here for the full story:
http://www.darkreading.com/insider-threat/167801100/security/privacy/225702468/index.html

INTERESTING FACT: @RobinSage joined Twitter on 26th December 2009 – exactly one week after @th3j35t3r joined.

The connection between Tom Ryan, Robin Sage and Jester was first brought to my attention by this tweet from @LulzKitten on 29th March 2012:

“Okay, let’s cut the crap, hello @Th3J35t3r aka@TomRyanBlog aka robinsage. Game over. Was fun, at least sometimes. Next nemesis, plox!”
(Note: Direct links to all tweets quoted in this dox can be found cited in the conclusion.) After reading LulzKitten’s tweet, I cast a casual glance over the Twitter feeds of Tom Ryan and Jester, and instantly noticed some similarities between the pair.

The most damning evidence linking TR and J – the smoking gun – will be presented towards the end of this dox, if you can wait that long, but first, let’s perform some writing analysis. After all, if TR and J are the same person, there ought to be some similarities in their writing styles, surely? You betcha. Here we go then:

Anyone who’s followed J on Twitter and read his blog may have noticed that he has a very distinctive writing style. Let’s pick through some of Jester’s trademark phrases, and then see if we can spot them recurring in TR’s tweets:

4. ‘Hmmmm’. Jester likes to say ‘Hmmm’ ‘Errr’ and ‘Ahemmm’ a lot. In fact he likes to say them so much that he even uses these filler phrases in his blog titles, as well as littering his tweets with them. Here’s some examples:

5th April: “@deftpunkz – umm holy shit. I dont know what to say guys, errrr thanks, i think? -”

4th April: “Al-Qaida ‘blacked out’ on the internet (effectively switched off) >>>http://timesofindia.indiatimes.com/tech/news/internet/Al-Qaida-blacked-out-on-internet/articleshow/12529550.cms #infosec#saladin #ahemm”

3rd April: “Now…… imagine…… how many of those listed in my last, were ummmmmm – on the ‘shit list’ – just a thought??? #anonymous”

27th Feb: “#Wikileaks & #anonymous dump 5 million#strafor internal emails obtained by #anonymouslast Dec..umm this right here…”

21st March: “Anti-Anonymous hacker threatens to expose them (via MSNBC) http://www.msnbc.com/id/46716942<<< ummm too late. #military #cyber #security#infosec #DoD”

15th Nov, WordPress blog title: “Occupy Wall Street?? 99%?? Ummm.”

Hmmm, I wonder if Tom Ryan also likes to say ‘Hmmm’? Let’s take a look:

10th April: “How To Prevent Data Leaks From Happening To Your Organization http://zite.to/HCucc8hmmm…how do you prevent the carbon factor from leaking?”

6th April: “Hmmm So @AnonW0rmer is arrested at 10:30http://j.mp/HiAASP tweets till 3:32, @ItsKahunadisappears @AnonymousIRC disappears for 4 Day >>>”

15th March: “CSI tonight has a scent of Anonymous. Anthropology professor teaching about Hactivism. Hmmm who came it be?”

11th March: “@kennethlipp hhhmmmm do you think any anons donated money to his reelection campaign?”

7th March: “@CryptKper @v0ld4m0rt you are spot on! Who could that have been? Hmmmmm”

16th Feb: “@agentdarkapple Interesting! Hmmm! I can see why you think I would be L and you would be N. L doesn’t smile like me”

OK, that’s enough Hmming – on to point #5: ‘Tick tock’. Jester loves to say ‘Tick tock’ – it’s one of his favorite phrases. Look:

6th March: “From 3.5 months ago:https://th3j35t3r.wordpress.com/2011/11/19/if-i-am-wrong-ill-say-im-wrong-heres-my-apology/…… from 1 hour ago ….http://www.foxnews.com/scitech/2012/03/06/hacking-group-lulzsec-swept-up-by-law-enforcement/ tick tock toldya.”

3rd August: “’RT @anonymousabu: @hjjrc @SparkyBlaze Your problem is with a ghost. Someone you can neither find nor stop.’ << you have same problem. #tick”

27th July: “@anonymousabu tick tock.”

24th July: “TICK TOCK. #toldyac2dc37a7d9d3238877a127f2d5171c9d”

21st June: “Tickety Tock…..”

25th June blog entitled LulzSec’s Cloudflare Configuration: “Tickety Tock Tock.”

Why, isn’t that a quirky little phrase? I wonder if Captain Hook – sorry, Tom Ryan – also uses the same terminology. Oh, what’s this we have here from 27th Feb?

“#Anonymous I am working on my big release. Hmmmm who should it goto? Tick Tock”

There’s even a ‘Hmmmm’ thrown in for good measure. How Jester-esque!

With a nudge and a wink, we move onto #6: Jester loves nothing more than to sign off his tweets with a sly wink. Just like so:

28th March: “@wwpinc – just in case you were not aware: >>>https://th3j35t3r.wordpress.com/support/ <<< – keep up the great work ;-) Peace. #pgr #wwp#woundedwarrior”

26th March: “Al-Qaida forums crippled in suspected cyber intervention http://j.mp/GSd8ih << bad things happen to bad people, apparently ;-) #infosec”

11th March: “@RepDanGordon @FBIPressOffice I merely stated u were on the list, u seem awful jittery. U need to calm down >> ;-)”

2nd Oct: “RT: @mach2600 @th3j35t3r It’s wobbling … up, down, up, down… <<< gotta love NGINX – always somethin huh ;-)”

16th June: “standby for supporting clarification onhttp://th3j35t3r.wordpress.com/2011/06/16/quick-n-dirty-just-for-clarification/?utm_source=Jesters+Court+Blog&utm_medium=twitter – close ya eyes if ya already saw it yesterday. ;-)”

2nd June: “http://www.foxnews.com/scitech/2011/06/02/pentagon-has-secret-list-cyber-weapons/ – #justsayin;-) #oorah”

Now it’s TR’s turn to have a sly wink:

5th April: “The beauty of data-mining in a social world, I don’t need to be connected to you, so you can’t block me. You just need to be on my radar ;-)”

5th April: “@x_ryujin_x @render64 @bitchiest @kalyptonetthink of what full dox did for Sabu ;-)”

4th April: “@LauraWalkerKC @BobbyCarbon@NavySEALsORG @Packetknife @HonorThemYou should record it ;-)”

14th March: “To Geeks & Nerds 3/14 is known as Pi Dayhttp://www.youtube.com/watch?v=JTZtuMdkUksTo Horny Men it’s known as Steak & Blow Job Day! The GF reminded me ;-)”

13th March: “@JackalAnon warned #Anonymous 2 Days Ago about OAuth and Apps. We’ve warned you about TOR. ;-)”

14th Feb: “Why I’m Glad My Boyfriend Isn’t On Facebook – Forbes http://j.mp/z9XNrP by @kashhill | Leaving Facebook made me never want to go back ;-)”

Next up, it’s similarity #7 – ‘Stay Frosty’. This, Jester’s catchiest of catch-phrases, crops up all over his tweets:

2nd April: “http://www.cbsnews.com/2100-202_162-20075647.html <<< still going on about this? Stay frosty and have a Cupcake??”

10th Nov: “#stayfrosty -Word of advice 2 @barrettbrownlol: Just because you’re paranoid doesn’t mean they aren’t out to get you. >”

26th Oct: “#hackerhalted left a little something under the projector in Alhambra SCADA room. Tweet me a photo of what’s there. #stayfrosty”

25th Oct: “#hackerhalted delegates … Stay clear of Cafe Bastille. Great sushi at Bali Cafe though… Stayin frosty.”

Now let’s see what Monsieur Ryan has to say for himself:

10th April: “Iran plans to unplug the Internet, launch its own “clean” alternative http://zite.to/Iqm1Ba#anonymous @CabinCr3w Stay Frosty ;-)”

16th March: “@testeux1 Class on Strategy? I can teach one at The Spy Museum in DC @wikileaks @revmagdalen@AnonymousIRC @YourAnonNews Stay Frosty ;-)”

13th March: “#Anonymous in your time of fear those of you that have used delete.twitlan / tweeteraser / twitwipe A Special Thank You!!! Stay Frosty! ;-)”

13th March: “@jackie_singh @krypt3ia I was promoted today to Brigadier General Packet of The Cyber Brigade@th3j35t3r now reports to me! Stay Frosty ;-)”

12th March: “Finch + Reese = ;-) …. Stay Frosty & Watch Your 6!”

Hang on a sec, isn’t it a bit, well, *obvious* for Tom Ryan to be liberally dropping Jester’s favorite catchphrase into his tweets? Yep, you’re right – it’s very obvious. But here’s the thing: the AntiSec dox that named Jester as Tom Ryan landed in Pastebin on 11th March. Notice how TR deliberately goes out of his way to play up to the ‘Stay Frosty’ caricature in the ensuing days? That’s because he realizes that the more he pretends to be Jester, the more people will be inclined to write him off as just another Jester wannabe. For another example of this tactic, here’s how J tweets every time he downs a Muslim extremist website:

1st March: “http://www.rjfront.info – TANGO DOWN. Temporarily. For enabling recruitment, & co-ordination of jihadist terror cells via web.”

1st March: “http://www.atahadi.com – TANGO DOWN. Temporarily. For online incitement to cause young muslims to carry out acts of violent jihad.”

Exactly one month later, on 1st April, TR tweets the following:

“www.ic3 .gov – TANGO DOWN. Temporarily. For not doing your job, & not arresting #Anonymous”

And: “www.fbi .gov – TANGO DOWN. Temporarily. For enabling recruitment, & co-ordination of#Anonymous via web.”

At this point, obvious troll is obvious – within days of LulzKitten’s tweet linking Tom Ryan and Jester, TR goes out of his way to tweet ‘Stay Frostys’, Jester winks and ‘TANGO DOWN’s. To give him credit, it’s a pretty smart way to make people think you’re nothing more than a Jester fanboy. Sadly for Thomas, it’s too late; the evidence linking Tom Ryan to Jester began from the moment TR began tweeting in January 2012. Prior to AntiSec dropping Jester’s dox on 11th March, Tom Ryan had only tweeted ‘Stay Frosty’ twice in three months. Immediately afterward, he tweets it five times in four days – complete with the Jester’s trademark wink.

So does that mean that all of the foregoing information is is part of an elaborate ploy, cooked up by Tom Ryan and Jester, to obfuscate the identity of the real Jester? In the case of the ‘Stay Frostys’ and the ‘TANGO DOWN’s, yes, it probably is. Thankfully, there are dozens of other textual similarities between the pair – similarities that are too subtle to be part of a pre-planned disinformation campaign.

Which leads nicely on to point #8: ‘Much’. Note the phrase that appears in the following tweets from Jester:

18th June: “http://www.techhomethebacon.com/news/hacking-infosec/th3j35t3r-links-nakomis-to-lulzsec-group-cover-up-ensues.html – backpeddaling much? Hacked? lol. -”

18th June: “Back-pedalling much?https://twitter.com/#!/Anonakomis/status/81862870664609792 #js”

August 21st WordPress blog entitled If ya can’t beat em, make some shit up??? LMAO!: “coincidence much?” “projection much??”

I wonder if TR ever lets slip a similar phrase? Oh, what’s this?:
14th March: “@kaepora Nadim, delete much? You’re in the snitch crew ?https://twitter.com/#!/realytcracker/status/143411708369715201 of @Anonymousabu & @ioerror”

Coincidence much?

#9: Jester loves to leave trailing dots in his tweets:

9th April: “<<< drums fingers on desk….”

3rd April: “Now…… imagine…… how many of those listed in my last, were ummmmmm – on the ‘shit list’ – just a thought??? #anonymous”

22nd November: “AFK…….”

He also uses trailing dots when he’s typing live into Notepad in this YouTube video: http://www.youtube.com/watch?v=WeO44IWlkfU

More of Jester’s ‘trailing dots’ tweets are cited at the end of this dox. Now it’s TR’s turn to deploy this tactic:

6th April: “@kennethlipp that’s how it went down with Barrett Brown too. Remember they ended up going to every address for him….according to him”

5th April: “@Bitchiest @KalyptoNet @TomRyanBlog The Secretary disavows this tweet and everybody in it…”

4th April: “#Anonymous ever wonder why certain high ups in your collective are never V& …. Look at cases that never went to court & who has relocated”

Again, more examples of this idiosyncrasy can be found cited at the end of this dox, as well as liberally scattered throughout Tom Ryan’s Twitter feed.

#10: Arrows. Jester loves to use arrows to break up words in his tweets, <<just like this>>:

9th April: “”@VizFoSho: @th3j35t3r dun goofedhttp://www.picvalley.net/u/1980/407013641289457528133400533586itAR4VE93lm7DAkGd2.PNG@RepDan_Gordon” <<< Shit ya got me! What am I to do? Btw now I am near north pole.”

28th March: “@wwpinc – just in case you were not aware: >>>https://th3j35t3r.wordpress.com/support/ <<< – keep up the great work ;-) Peace. #pgr #wwp#woundedwarrior”

Now TR:

6th April: “Hmmm So @AnonW0rmer is arrested at 10:30http://j.mp/HiAASP tweets till 3:32, @ItsKahunadisappears @AnonymousIRC disappears for 4 Day >>>”

13th March: “Don’t know whether to laugh or feel bad but come on: (compatible;+MSIE+6.0;+Windows+98;+Win+9×4.90) << In This Day An Age??”

9th March: “conspiracy 1. a plan or agreement to carry out an illegal or harmful act 2. the act of making such plans >> aka #Anonymous Ops #justsayin<<”

Glance through their tweets and you’ll see that J and TR use <<arrows>> all the time.

#10: UPPER CASE. Compare the tweets of J and TR and you’ll notice that they both love to highlight single words in capitals. Jester first:

9th April: “WARNING: Tweeps in mirror are closer than they appear.”

18th March: “I’m still asked WHY I hit #wikileaks, skip to 28mins 12secs & Major TJ O’Connor abt sums it uphttp://www.youtube.com/watch?v=buY3I4PkK98<<worth watching it all.”

11th March: “@repdangordon be advised, when u file ur complaint to feds, they ARE going need ur cell for forensics to determine IF I hacked u at all ;-( ”

Tom Ryan’s turn:

5th April: “INTERESTING: What is this ugly brown stain on a Key Member of Anonymous’ back? I need to do my cropping for the new site launch. Peace!”

5th April: “#Anonymous why so many military and sovereign citizen connections? GOD I aam glad I took 2 weeks to lay low.”

4th April: “@MaxVenator Too cold and windy for the Hamptons BUT you gave me a good idea. Maybe we can turn Plum Island into a resort for#Anonymous”

Jester and Tom Ryan both use this technique DOZENS of times in their tweets.

#11 features a more subtle similarity between our Jester and our Clown:

Jester, 21st August: “If ya can’t beat em, make some shit up??? LMAO! -”

TR, 16th March: “@exiledsurfer ROFLMAO! Reminds me of being in Bahrain & Abu Dhabi hearing Garth Brooks “Friends in Low Places””

Jester and Thomas don’t always laugh their asses off, but when they do, you can bet it’s in upper case with an exclamation mark at the end. (More examples, as always, are cited in the conclusion of this dox.)

#12: J and TR aren’t very good at spelling. They struggle especially with words such as ‘its’ and ‘it’s’. Jester’s tweets aren’t usually too bad for typos, as he doesn’t rush them (because he knows they will be analyzed by a wide range of foes who might otherwise have cause to mock him for his poor grammar). He also has the autocorrect on his Android phone to help him. He still struggles with those pesky apostrophes that autocorrect can’t pick up however, especially when he tweets from his desktop:

6th March: “WTF is Wikileaks gonna do now it’s source of illegally obtained private info (anon/lulz) has had it’s head & skillset removed? #2birds1Stone”

21st June: “Seems almost as if ‘somebody’ doesn’t want you to see my last link – here’s a pastebin of it’s content.”

In his WordPress blog however, Jester often mixes up his apostrophes, especially in words such as ‘its’:

“With Netcat listening at the other end for incoming connections, you can configure it to execute it’s own script when it receives a connection for example to send a Message of the Day to the connecting device, you would run netcat like this on your server”

Watch his two YouTube videos (links cited at the end) in which he types directly into Notepad and you’ll see he also fails to put apostrophes into words such as  ‘lets’, ‘its’ and ‘Thats’. 2:20 into his XerXes DoS Attack video and you’ll see that the text displayed on Jester’s self-designed software also contains typos: ‘SUCCESFULLY’ should have two ‘s’ in the middle, while at 2:29, you’ll see that ‘Secured’ has also been spelt wrongly. At 6:52 he also makes the same error when typing into Notepad.

Does Tom Ryan fare any better in the spelling stakes? No. In fact he’s even worse when it comes to tweeting typos. That’s because Thomas tweets ten times as frequently as Jester, tweets more hastily (lots of rushed replies to his Twitter buddies) and because he writes the tweets on his Mac, which doesn’t autocorrect his mistakes. Look:

4th April: “@AdrianChen surprised your not all over the@Anonw0rmer arrest and shortly after the disappearance of @itskahuna”

5th April: “To those I owe something too, It’s on it’s way!”

30th March: “RED ALERT: tomorrow is #NoClick31 just as a precaution. Rumor has it #Anonymous is using it’s Porn Bots for #opBlackout click to DDOS attack”

Wanna see more? Just read his tweets.

OK, we’ve almost reached the really juicy stuff linking Jester and Thomas, but first there are a couple more writing similarities to rattle through:

#13: J and TR write numbers numerically rather than alphabetically – even when composing short tweets.

Jester, 28th Feb: “4 more Anons V&’ed http://tinyurl.com/8a2g5k5#anonymous”

10th Nov: “#stayfrosty -Word of advice 2 @barrettbrownlol: Just because you’re paranoid doesn’t mean they aren’t out to get you. >”

27th November: “#saladin (XerXes bro)- ‘the best weapon is the one u never have 2 fire…I prefer the weapon u only need 2 fire once.’”

20th July: “Never saw a wild thing sorry 4 itself. Small bird drop frozen dead from bough without ever having felt sorry 4 itself.”

TR – yep, you’ve guessed it – does exactly the same:

5th April: “@ohmylulz will with 2 False Positives.@missarahnicole @AsherahResearch”

4th April: “Ruh roh! A certain key #Anonymous member disappears for 4 days then reappears. We know what that means.”

3rd April: “@Ihazcandy I should start digging into them. Since I have 2 weeks of downtime.”

OK, moving on (we’re nearly done, I promise) to #14: Hashtags. If you go to tweetstats.com and enter TR and J’s twitter names into separate windows, a series of pretty graphs will be generated that will allow you to compare their tweeting patterns. You’ll notice that they tweet from separate devices, to eliminate the possibility of accidentally tweeting to the wrong account – Tom Ryan likes to keep his iPhone in one pocket and his Android in the other for when he’s playing Jester. Click on the Tweet Cloud tab at the top of the page and you’ll be able to view the most frequent hashtags used by both parties. Not too surprisingly, given their obsession with all things masked, it’s #anonymous. There are also three other hashtags that the pair use prominently however – #fail, #justsayin and #infosec. The latter one is understandable, but the other two? Interesting. Let’s see some #fail and #justsayin in action, starting with Jester:

3rd November: “#opcartel #anonymous You should really listen to what this man has to say. Remember your track record is full of #fail”

15th August: “@anonymousabu U R #fail. U hurt who u claim to fight for (lol), u have agenda < http://reg.cx/1Qps& the agenda is >”

14th August: “So @landrytom u finally got ur mention. Damn u zeroed my ‘xchat’? Please all check out his timeline. Then ask him where is the pwnage? #fail”

29th July: “1st up: My doxing. That’s a #fail. (again) I have never been Ryan Berg, John Willander, Robin Jackson, Anthony Freed, Beau Colvin. #opFrosty”

2nd June: “http://www.foxnews.com/scitech/2011/06/02/pentagon-has-secret-list-cyber-weapons/ – #justsayin;-) #oorah”

Now it’s Tom Ryan’s turn to #Fail (#Justsayin):

5th April: “@agentdarkapple @AsherahResearch she’s definitely is no @elizadushku , Mila Kunis or Megan Ackerman. So she’s a #Fail”

2nd April: “@subverzo TY for verifying 2 alternate personas yours & @CrappyTires . FYI, Everyone in the CT world knows Shumukh al-Islam Forum. #FAIL”

9th March: “@AnonymousIRC you do know they rig cases to#FAIL inorder to capture bigger FISH ….. Right?@atopiary @lolspoon @AnonymouSabu”

9th Feb: “Dangerous Tweets: Arrested, fined in 140 characters or less http://j.mp/yWAV4G << What ever happened to contextual analysis? another#Fail” (Note the classic Jester-style arrows used in this tweet as well.)”

10th March: “#anonymous remember threatening people or family members can lead to several crimes. If they are harmed it becomes much worse. #justsayin”

9th March: “conspiracy 1. a plan or agreement to carry out an illegal or harmful act 2. the act of making such plans >> aka #Anonymous Ops #justsayin<<”

Plenty more examples, as always, can be found cited in the footnotes at the end of this dox.

OK, here endeth the writing analysis lesson. Thank you for your patience :) It would be fair to say we’ve established that Jester and Tom Ryan tweet in an uncannily similar manner, but that’s not all. Now we get on to the really good shit…

#15: Tweet times. Using tweetstats.com, it’s possible to compare the times at which J and TR tweet. A quick glance at their respective Tweet Density graphs reveals a similar pattern:  neither of them tweets between 3am and 7am EST: they’re both East coast bitches. Interesting.

#16: A few days ago, @VizFoSho tweeted the following image:

http://www.picvalley.net/u/1980/407013641289457528133400533586itAR4VE93lm7DAkGd2.PNG

It depicts two Jester tweets from 7th April, both geo-stamped with Atlantic City, NJ on them. Atlantic city is within 150 miles of NY, where Tom Ryan lives. On 26th March, Jester also posted a single tweet from New York: https://twitter.com/#!/th3j35t3r/status/184333789697282048

Normally, Jester’s tweets don’t reveal his location. Up until April 2012, there had only been four instances in which Jester’s tweets revealed his location – and two of those occurred when he was at DEFCON Nevada and Hacker Halted in Miami, occasions when he was undoubtedly eager to reveal his location in order to prove he was in attendance. Were the New York and Atlantic City revelations accidental (Tor for Android not working properly perhaps?) or was Jester trying to provide more misinformation?

After @VizFoSho pointed out the NJ link (the NY slip-up had gone unnoticed), Jester went out of his way to post two tweets from ridiculously exotic locations – Cape Town on 9th April and then Hawaii on 10th April:

https://twitter.com/#!/th3j35t3r/status/189464600318722049
https://twitter.com/#!/th3j35t3r/status/189464600318722049 “The octopus here is amazing. Dontcha think :-)”

Jester has never previously switched his location to a far-flung location purely for the lulz. Why should he suddenly be trying so hard now that he’s been identified as an East coast slacker? If he’s not Tom Ryan, why should be bothered if people think he’s from NJ or NY?

On 4th April, Jester made the second of his two Atlantic City tweets at 4:03pm. 11 minutes earlier, Tom Ryan had also posted a tweet. For the next 48 hours, neither account tweeted – a rare occurrence, especially for TR who averages over 30 tweets a day. Enjoying a couple of days in Atlantic City playing the slots, perhaps?

Here are the 4th April tweets from both parties:

https://twitter.com/#!/th3j35t3r/status/187610604314431488

https://twitter.com/#!/th3j35t3r/status/187616455762784257

https://twitter.com/#!/TomRyanBlog/status/187612824187584512

Curiouser and curiouser. But that’s not all. On 23rd March, TR tweets:

“Headed to South Beach to enjoy this great weather! Later Tweeps!”

https://twitter.com/#!/TomRyanBlog/status/183199880922148864

For the next 48 hours, Jester and Tom Ryan are both absent from Twitter.

A month earlier, on 17th February, the same thing happens after TR tweets:

“Off the Grid for a few days ! Have a great 3 day weekend!”

https://twitter.com/#%21/TomRyanBlog/status/170321854723129344

For the next four days, neither party tweets. The first person to break the Twitter silence is Jester, and it’s another rare instance of him revealing his location – Arlington VA.
https://twitter.com/#!/th3j35t3r/status/172077181051219968
Enjoy your three-day weekend, Thomas?

I stated earlier that until April Jester had never previously switched his location to a far-flung country, but I lied – there IS actually one occasion when Jester appeared to be out of the country. On 25th January, he posted the following tweet:

“To all who have DM’ed asking after my whereabouts & welfare…am safe & limbering up. It’s a brave new year. TY 4 support. Stay Frosty.”
https://twitter.com/#!/th3j35t3r/status/162261098035298304

His alleged location? Brescia, Italy. What about Thomas Ryan – what was he up to around this time? Well here’s the thing: between 23rd and 26th January, TR (a man who likes to tweet all day, erryday) doesn’t post a single tweet. Too busy enjoying the bruschetta, washed down with a bottle of Barolo perhaps?

A final word on correlating Twitter times before we move onto our final two points: take a look at the timeline for Jester and Tom Ryan’s tweets. Notice how they often tweet at almost exactly the same time as one another? For example, take Tuesday 10th April. After two hours without activity from either account, Thomas posts the following at 15:30pm:
“Now I feel really special. Someone created a hidden stream about me and monitors it.”
One minute later, at 15:31, Jester tweets “@alemarahweb‏ – ‎http://www.alemara1.com‏ – TANGO DOWN – أنا كنت”
Observe any two Twitter accounts for long enough and you’ll find timing coincidences of course. However, compare Jester and Tom Ryan’s accounts on any given day and you’ll spot a predictable pattern: they always broadly correlate i.e. there is a short burst of tweets, followed by a 45 minute break while Jester/Ryan goes for a wank or to chow down some beef jerky.

Right, two more points to raise and then I’ll leave you in peace:

#17: When LulzKitten tweeted Jester’s dox on 29th March, how did Tom Ryan – the man with the military wallpaper on his Twitter page – respond? “@J_P_Holloway @lulzkitten @YourAnonNewsyou guys really suck at DOXing thinking I am@th3j35t3r everyone knows I was never in the Army #fail”
https://twitter.com/#!/TomRyanBlog/status/185189598677319680

Two things stand out here: firstly, we have no way of knowing that Jester was in the army. Yes, he has an interest in all things military, but the rumor that he actively served in the army is widely believed to be false.

On 13th March however, TR tweeted the following: “When I was in the military, Greenpeace would try to board Aircraft Carriers. Some things aren’t smart & never thought of till it’s too late.”
https://twitter.com/#!/TomRyanBlog/status/179637065154170880

Military, shmilitary; does anyone see a connection here? Thought so. Without further ado, let’s proceed to our final, fateful tweet of interest. On 10th February, Thomas Ryan tweeted the following:

“I wonder if operating Multiple Personas has ever given anyone Multiple Personality Disorder.”

I don’t know Jester, you tell me ;) Tick tock. No response? Oh well, Stay Frosty…

**********

POSTSCRIPT: Could it be that Tom Ryan is such an attention-whore that he’s trolling us all in the hope of being mistaken for the Jester? I guess it’s technically possible, but if so, it’s the most elaborate and painstaking trolling campaign ever conceived – and one that would have to involve the collusion of both parties. If, by some miracle, Thomas Ryan is not Jester, he knows exactly who Jester is – to the extent where he probably even vacations with him. When you review all the evidence however, there can only be one logical conclusion to draw: they are one and the same person.

On 13th March, Tom Ryan posted the following poignant message: “@ArtByAlida although Anonymous doesn’t like@th3j35t3r I do. It’s safer that certain people are never doxed.”
https://twitter.com/#!/TomRyanBlog/status/179636120710152192

You’re right Tom – it would be safer, but the truth always comes out in the wash, don’t you find? I hope you’ve got a few passports lying around, cos you’re gonna need them. Remember those Muslim extremists whose websites you downed and whose threats you retweeted? Oh, they mad. They real mad.

One last thought before I shovel the dirt over Jester’s shriveled corpse: I notice that your Twitter nick is Boondock Saint, in tribute to The Boondock Saints, a movie about two Irish vigilantes. Just out of interest, I wonder what The Internet Surname Database would make of Thomas Ryan’s moniker?

http://www.surnamedb.com/Surname/Ryan

Why, they appear to believe that Ryan is an Irish surname. To quote from my favorite hacktivist for good, ‘Coincidence much?’

Congratulations Thomas; you just got pwned by an amateur who doesn’t even have the skills to label himself a skid, never mind a hacker. Butthurt much?

In the words of your nemesis, @anonymouSabu, “Nigga, troll harder.”

pwned by @spoolfiend

**********

Citations:

LulzKitten tweet linking TR and J: https://twitter.com/?utm_medium=twitter&utm_source=twitterfeed#!/YourAnonNews/statuses/185150794079809536

Check when th3j35t3r and RobinSage joined Twitter: http://www.whendidyoujointwitter.com/

TR’s LinkedIn (where you’ll see proof that he attended Hacker Halted and DEFCON last year): http://www.linkedin.com/in/tommyryan

TR and J professing their love of sushi:
https://twitter.com/#!/TomRyanBlog/status/178202424056610817
https://twitter.com/#!/th3j35t3r/status/128849629939892224

Tom Ryan dox by AntiSec: http://pastebin.com/ZAxBWKi8

J likes to say ‘Hmmm’ a lot:

https://twitter.com/#!/th3j35t3r/status/187996120180457472

Occupy Wall Street?? 99%?? Ummm.

https://twitter.com/#!/th3j35t3r/status/186958030791905282

https://twitter.com/#!/th3j35t3r/status/174163673940631552

https://twitter.com/#!/th3j35t3r/status/182268058168082432

https://twitter.com/#!/th3j35t3r/status/187535767843778560

TR also likes to say ‘Hmmm’:

https://twitter.com/#!/TomRyanBlog/status/188096685250068480

https://twitter.com/#!/TomRyanBlog/status/180117386291195906

https://twitter.com/#!/TomRyanBlog/status/178896960546287617

https://twitter.com/#!/TomRyanBlog/status/177482894443417600

https://twitter.com/#!/TomRyanBlog/status/170195932388925441

https://twitter.com/#!/TomRyanBlog/status/189680060863754241

J goes ‘Tick tock’:

https://twitter.com/#!/th3j35t3r/status/96268183723450369

https://twitter.com/#!/th3j35t3r/status/177033974324002816

https://twitter.com/#!/th3j35t3r/status/83145887307677696

https://twitter.com/#!/th3j35t3r/status/95195869921554433

https://twitter.com/#!/th3j35t3r/status/98828156663889920

Lulzsec’s CloudFlare Configuration

TR goes ‘Tick tock’:

https://twitter.com/#!/TomRyanBlog/status/174132025215811585

J ‘Stay frosty’:

https://twitter.com/#!/th3j35t3r/status/186923663734489088

https://twitter.com/#!/th3j35t3r/status/134434056925483008

https://twitter.com/#!/th3j35t3r/status/129246959021203456

https://twitter.com/#!/th3j35t3r/status/128849629939892224

https://twitter.com/#!/th3j35t3r/status/81862725638160385

https://twitter.com/#!/th3j35t3r/status/76373640832225282

TR ‘Stay frosty’:

https://twitter.com/#!/TomRyanBlog/status/189679107347460097

https://twitter.com/#!/TomRyanBlog/status/180689040385900544

https://twitter.com/#!/TomRyanBlog/status/179655809280655361

https://twitter.com/#!/TomRyanBlog/status/179298552680415232

https://twitter.com/#!/TomRyanBlog/status/178571536691765249

https://twitter.com/#!/TomRyanBlog/status/178529239052730368

https://twitter.com/#!/TomRyanBlog/status/178336251240382464

https://twitter.com/#!/TomRyanBlog/status/179622057305317376

https://twitter.com/#!/TomRyanBlog/status/179802508372344832

J likes to wink:

https://twitter.com/#!/th3j35t3r/status/184373769958211584

https://twitter.com/#!/th3j35t3r/status/120271829377097728

https://twitter.com/#!/th3j35t3r/status/76373640832225282

https://twitter.com/#!/th3j35t3r/status/185019516793786370

https://twitter.com/#!/th3j35t3r/status/81477469135319040

https://twitter.com/#!/th3j35t3r/status/178878010961833986

TR likes to wink:

https://twitter.com/#!/TomRyanBlog/status/187885131976024064

https://twitter.com/#!/TomRyanBlog/status/187372927946211328

https://twitter.com/#!/TomRyanBlog/status/179932280809197568

https://twitter.com/#!/TomRyanBlog/status/180689040385900544

https://twitter.com/#!/TomRyanBlog/status/189679107347460097

https://twitter.com/#!/TomRyanBlog/status/169492746871119873

https://twitter.com/#!/TomRyanBlog/status/179655809280655361

https://twitter.com/#!/TomRyanBlog/status/179802508372344832

https://twitter.com/#!/TomRyanBlog/status/179669923163938816

https://twitter.com/#!/TomRyanBlog/status/187914228810784769

J ‘much?’:

https://twitter.com/#!/th3j35t3r/status/82200919365787648

https://twitter.com/#!/th3j35t3r/status/81871769832665088

If ya can’t beat em, make some shit up??? LMAO!

TR ‘much?’:

https://twitter.com/#!/TomRyanBlog/status/179927195022659584

J ‘…’:

https://twitter.com/#!/th3j35t3r/status/189139338796351492

https://twitter.com/#!/th3j35t3r/status/186958030791905282

https://twitter.com/#!/th3j35t3r/status/186749312166932483

https://twitter.com/#!/th3j35t3r/status/128849629939892224

https://twitter.com/#!/th3j35t3r/status/138951576789331968

https://twitter.com/#!/th3j35t3r/status/168769540598145025

https://twitter.com/#!/th3j35t3r/status/179233292682407937

https://twitter.com/#!/th3j35t3r/status/184321677092597760

TR ‘…’:

https://twitter.com/#!/TomRyanBlog/status/188088227704487936

https://twitter.com/#!/TomRyanBlog/status/187342615648272384

https://twitter.com/#!/TomRyanBlog/status/188829946439929856

https://twitter.com/#!/TomRyanBlog/status/189449964219400194

https://twitter.com/#!/providesecurity/status/187253830315016192

https://twitter.com/#!/TomRyanBlog/status/189757038778269696

https://twitter.com/#!/Render64/status/187912159655772161

J ‘<<arrows>>’:

https://twitter.com/#!/th3j35t3r/status/189463655811780609

https://twitter.com/#!/th3j35t3r/status/185019516793786370

TR ‘<<arrows>>’:

https://twitter.com/#!/TomRyanBlog/status/179683104972210176

https://twitter.com/#!/TomRyanBlog/status/188096685250068480

https://twitter.com/#!/TomRyanBlog/status/177907983227949056

https://twitter.com/#!/TomRyanBlog/status/178555495806803968

https://twitter.com/#!/TomRyanBlog/status/179321093897723904

J using UPPER case:

https://twitter.com/#!/th3j35t3r/status/189165520556277761

https://twitter.com/#!/th3j35t3r/status/178895612723478531

https://twitter.com/#!/th3j35t3r/status/181438361511280640

https://twitter.com/#!/th3j35t3r/status/82538803188862976

https://twitter.com/#!/th3j35t3r/status/98386681836736512

https://twitter.com/#!/th3j35t3r/status/177544329458491392

https://twitter.com/#!/th3j35t3r/status/135438221483048960

https://twitter.com/#!/th3j35t3r/status/177568887334903808

https://twitter.com/#!/th3j35t3r/status/110676313366462464

https://twitter.com/#!/th3j35t3r/status/127396730621788160

https://twitter.com/#!/th3j35t3r/status/100282273072549890

https://twitter.com/#!/th3j35t3r/status/178566407909412866

https://twitter.com/#!/th3j35t3r/status/132173511874711552

https://twitter.com/#!/th3j35t3r/status/94485325744848896

https://twitter.com/#!/th3j35t3r/status/97333572955947008

https://twitter.com/#!/th3j35t3r/status/91970882095943680

https://twitter.com/#!/th3j35t3r/status/141002481260961792

TR using UPPER case:

https://twitter.com/#!/TomRyanBlog/status/187908914417893379

https://twitter.com/#!/TomRyanBlog/status/188461215348031489

https://twitter.com/#!/TomRyanBlog/status/187018163567853568

https://twitter.com/#!/TomRyanBlog/status/185423913197637633

https://twitter.com/#!/TomRyanBlog/status/187240901574266881

https://twitter.com/#!/TomRyanBlog/status/180380942614016001

https://twitter.com/#!/TomRyanBlog/status/187903623693467648

https://twitter.com/#!/TomRyanBlog/status/187361681452699649

https://twitter.com/#!/TomRyanBlog/status/187541167972417536

https://twitter.com/#!/TomRyanBlog/status/187322975383588864

https://twitter.com/#!/TomRyanBlog/status/187309018623127552

https://twitter.com/#!/TomRyanBlog/status/187558445036216320

https://twitter.com/#!/TomRyanBlog/status/187541167972417536

https://twitter.com/#!/TomRyanBlog/status/187656738818899968

https://twitter.com/#!/TomRyanBlog/status/187261297669308416

https://twitter.com/#!/TomRyanBlog/status/187530160134828032

https://twitter.com/#!/TomRyanBlog/status/184620737821286402

Jester ‘LMAO!’:

https://twitter.com/#!/th3j35t3r/status/105305979733815296

TR ‘ROFLMAO!’:

https://twitter.com/#!/TomRyanBlog/status/180709354624925696

https://twitter.com/#!/TomRyanBlog/status/179773457943371776

https://twitter.com/#!/TomRyanBlog/status/187709243087003650

https://twitter.com/#!/TomRyanBlog/status/186965988082843648

https://twitter.com/#!/TomRyanBlog/status/187272732147322880

https://twitter.com/#!/TomRyanBlog/status/187583747154132992

J struggles with apostrophes:

https://twitter.com/#!/th3j35t3r/status/83239272504770560

https://twitter.com/#!/th3j35t3r/status/177080046597578752

https://twitter.com/#!/th3j35t3r/status/186749312166932483

(See his blog for heaps more examples.)

http://www.youtube.com/watch?v=WeO44IWlkfU (Skip to 5:07); ‘lets’, ‘its’ and ‘Thats’ should all have apostrophes.

http://www.youtube.com/watch?v=yJTvzErKHWE Look at the Notepad he’s typing into: ‘lets’ should have an apostrophe and ‘peak’ should have two ‘e’s in it. Skip to 2:20: the text on Jester’s self-designed Xerxes machine also contains typos: ‘SUCCESFULLY’ should have two ‘s’ in the middle. At 2:29, you’ll see that ‘Secured’ has also been spelt wrongly. At 6:52 he also types the same misspelt word into Notepad.

TR also struggles with apostrophes:

https://twitter.com/#!/TomRyanBlog/status/187920367845781504

https://twitter.com/#!/TomRyanBlog/status/187710784690855936

https://twitter.com/#!/TomRyanBlog/status/180432605680902144

https://twitter.com/#!/TomRyanBlog/status/187645320442822656

https://twitter.com/#!/TomRyanBlog/status/187531807598714880

https://twitter.com/#!/TomRyanBlog/status/187917710498336769

https://twitter.com/#!/TomRyanBlog/status/185737304290234368

https://twitter.com/#!/TomRyanBlog/status/178485680899502081

J tweets ‘TANGO DOWN’:

https://twitter.com/#!/th3j35t3r/status/175040242477318144

https://twitter.com/#!/th3j35t3r/status/175029005718794240

TR tweets ‘TANGO DOWN’:

https://twitter.com/#!/TomRyanBlog/status/186482996352778240

https://twitter.com/#!/TomRyanBlog/status/186482690797744128

J always writes numbers numerically:

https://twitter.com/#!/th3j35t3r/status/174540542724669441

https://twitter.com/#!/th3j35t3r/status/93771304607563776

https://twitter.com/#!/th3j35t3r/status/114830590452310016

https://twitter.com/#!/th3j35t3r/status/134434056925483008

https://twitter.com/#!/th3j35t3r/status/140925221090758656

https://twitter.com/#!/TomRyanBlog/status/185576329712910336

TRB always writes numbers numerically:

https://twitter.com/#!/TomRyanBlog/status/187211721365139456

https://twitter.com/#!/TomRyanBlog/status/187712594373648384

https://twitter.com/#!/TomRyanBlog/status/178965908696481793

https://twitter.com/#!/TomRyanBlog/status/187680293984022529

https://twitter.com/#!/TomRyanBlog/status/187539614876176384

Compare TR and J’s tweet patterns, in particular the time of day they tweet at and the hashtags they use: http://tweetstats.com (Open two separate windows and enter their Twitter names).

J using #Fail:

https://twitter.com/#!/th3j35t3r/status/132152349639720960

https://twitter.com/#!/th3j35t3r/status/103200916156588032

https://twitter.com/#!/th3j35t3r/status/102784136015646722

https://twitter.com/#!/th3j35t3r/status/97030633330716674

https://twitter.com/#!/th3j35t3r/status/178966110694150144

J using #Fail:

https://twitter.com/#!/TomRyanBlog/status/187708057344671744

https://twitter.com/#!/TomRyanBlog/status/167697098047889411

https://twitter.com/#!/TomRyanBlog/status/177978089203175424

https://twitter.com/#!/TomRyanBlog/status/178269119316107264

https://twitter.com/#!/TomRyanBlog/status/186927307544477697

https://twitter.com/#!/TomRyanBlog/status/178573080438898689

https://twitter.com/#!/TomRyanBlog/status/178982123959619585

https://twitter.com/#!/TomRyanBlog/status/185189598677319680

https://twitter.com/#!/TomRyanBlog/status/186930868273676288

https://twitter.com/#!/TomRyanBlog/status/186965988082843648

J using #Justsayin:

https://twitter.com/#!/th3j35t3r/status/76373640832225282

TRB using #Justsayin:
https://twitter.com/#!/TomRyanBlog/status/177907983227949056

https://twitter.com/#!/TomRyanBlog/status/179578215411630080

https://twitter.com/#!/TomRyanBlog/status/178518183525888000

https://twitter.com/#!/TomRyanBlog/status/184620737821286402

https://twitter.com/#!/TomRyanBlog/status/184270112361168898

_________________________________________________________________________

PIRAX DOXING CONTINUED…  (The ‘smedley manning’ debacle)
You took this DOX’ing really well, to be honest. You shook it off as a mere fancification numerous times, and continued forward head-strong, apparently unmoved by those watching from the outside. But you knew deep-down that you had to eradicate this DOX from the minds of the enemies you have procured over the years. You know that a lot of people would like to see you gone. So, you came up with a plan.

The plan went something like this:
On May 10th, you registered the Twitter account @cubespherical and labeled it as “Smedley Manning”, as an obvious satirical homage to the now imprisoned Bradley Manning, a REAL soldier who fought for truth. You then exchanged a few messages with @th3j35t3r to make it look like a legitimate conversation, and began to “leak” information about yourself. We both know that this information is false, and was only created to distract others from the real DOX, located above. We know you are somewhat intelligent. However, there will always be those who will outsmart you. Consider yourself outsmarted.

Here is the analysis, broken down:
After you took down both your Twitter and WordPress blog, the mainstream blogosphere was certain you had finally been figured out. They assumed this was your acknowledgement of your own defeat and were positive you had been successfully DOX’d by @cubespherical. You were finally giving up. You knew they would react this way… It was all a part of your master plan. But, in reality, you ARE @cubespherical. Yes, @th3j35t3r and @cubespherical are the same person. Nicely done, Tom. You fooled almost everyone. But, like all good things (“good” meaning something along the lines of “idiotic” in this case), you must come to an end.

So how can we justify this claim? Where is our proof? Simple: You gave us everything.

Red-Flag #1: You have been a pretty regular user of Twitter until very recently, after the above DOX was published.

Red-Flag #2: An entirely new DOX is now being teased, even while the above DOX is as sure-fire as they come. Who would believe that a DOX coming from @cubespherical, an entirely new one at that, would be legitimate?

Red-Flag #3: You sat idle on Twitter while @cubespherical AKA Smedley Manning openly talked shit about you, only responding once things became heated on InfoSecIsland. This will take some psychological investigation, but it is damning nonetheless. Your article here is the most revealing bit of all:

http://www.infosecisland.com/blogview/21348-Not-Totally-Sure-What-Just-Happened.html

You started off with the following line, paraphrased: “I thought Smedley was my friend at first [you used the word ‘supporter’] hurr durr, but he then started threatening me hurr durr.” That doesn’t even sound realistic. But it *is* a subtle way to garner sympathy. I applaud you for you effort.

Red-Flag #4: Next up is your subtle jab at Anonymous. You changed @cubespherical’s avatar to a picture of a Guy Fawkes mask and deleted the Bitcoin address in exchange for the “We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.” motto.

In your article, you say “Even if this was a common troll, he just demonstrated that any fool can speak for and ‘as’ Anonymous.”

It is clear that you did this for one reason: to throw spears at Anonymous while appearing to be a victim of cyber-bullying on a much grander scale.

Red-Flag #5: You are subconsciously promoting @cubespherical’s efforts for Bitcoin donations.
While appearing to mock @cubespherical, while still somehow conveying him as a threat, you still manage to forget to *NOT* post his Bitcoin address. Our thoughts: You WANT @cubespherical to make some money off of some Bitcoin donations. You yourself use Bitcoin pretty regularly and accept it for donations on your blog. How do we know you aren’t just promoting @cubspherical’s Bitcoin address so that YOU can profit? Here are your words, directly lifted form your blog post:

“So here’s the throwdown. ‘Smeddles’ drop my dox. Do it. You have proved and shown nothing. Only that you are completely failing. You have no bitcoins donated, you have shown 2 things to me, Anonymous have too many chiefs and not enough indians, and that your numbers, at least 9000 allegedly, combined have  0.00000001 bitcoins between them. Here is what you have so far. lol.

https://blockexplorer.com/address/15JDgkwFVXvuxCt66eUQ434ty3jrvwPfGe

Either that or they were clever enough to realize you were full of it from the get go. As I have demonstrated and stated many times before, I will never ask the public for any money.”

WHY WOULD YOU EVEN NEED TO REMIND PEOPLE THAT YOU DON’T ASK FOR DONATIONS IF THIS ISN’T EVEN YOUR BITCOIN ADDRESS? Simple. Because it actually is.

It is also worth noting that both Smedley Manning and th3j35t3r favor Ubuntu 11.xx releases. They like using GNOME, too:
http://3.bp.blogspot.com/-9LpW_-t2lkU/TpmnnnPHn6I/AAAAAAAABMA/AKBOIZUm4sM/s1600/Opera-Next-Ubuntu-Oneric.png
http://4.bp.blogspot.com/_FJH0hYZmVtc/TF59PLnLUJI/AAAAAAAAJNE/IoVU8sTFyUo/s1600/Opera+Mobile+for+Linux+(1440×797)_023.png

To conclude this talk, Tom, we would like to take this privilege to give to you a formal FUCK YOU. You have been DOX’d and your master plan to avoid the inevitable by creating a new nemesis and a new DOX while asking fools to send you money for this bogus DOX has been foiled. You are over. No one cares about the small sites you take down with your shitty XerXes tool and everyone knows you didn’t actually DDoS WikiLeaks, or even have the ability to do so. You are a fame-whoring idiot that has finally been pulled so low, you serve no purpose for ever standing up again. Goodbye.

XOXO,
PiraX <3

@TheRealPiraX
http://pirax.de
Donate Bitcoin: 17gMaYgUsx7dj532s3ezXmfMrVhJ1BfRC1
We would also like to give a shout-out to our home on VoxAnon IRC. Much love to #voxanon _________________________________________________________________________

 

BUT THATS NOT IT – DON’T FORGET THIS LITTLE GEM…

 

Thomas Ryan: The Guy Who Snitched on Occupy Wall Street to the FBI and NYPD

The Occupy Wall Street protests have been going on for a month. And it seems the FBI and NYPD have had help tracking protesters’ moves thanks to a conservative computer security expert who gained access to one of the group’s internal mailing lists,and then handed over information on the group’s plans to authorities and corporations targeted by protesters.

Since the Occupy Wall Street protest began on September 17, New York security consultant Thomas Ryan has been waging a campaign to infiltrate and discredit the movement. Ryan says he’s done contract work for the U.S. Army and he brags on his blog that he leads “a team called Black Cell, a team of the most-highly trained and capable physical, threat and cyber security professionals in the world.” But over the past few weeks, he and his computer security buddies have been spending time covertly attending Occupy Wall Street meetings, monitoring organizers’ social media accounts, and hanging out with protesters in Lower Manhattan.

Meet the Guy Who Snitched on Occupy Wall Street to the FBI and NYPDAs part of their intelligence-gathering operation, the group gained access to a listserv used by Occupy Wall Street organizers called September17discuss. On September17discuss, organizers hash out tactics and plan events, conduct post-mortems of media appearances, and trade the latest protest gossip. On Friday, Ryan leaked thousands of September17discuss emails to conservative blogger Andrew Breitbart, who is now using them to try to smear Occupy Wall Street as an anarchist conspiracy to disrupt global markets.

What may much more alarming to Occupy Wall Street organizers is that while Ryan was monitoring September17discuss, he was forwarding interesting email threads to contacts at the NYPD and FBI, including special agent Jordan T. Loyd, a member of the FBI’s New York-based cyber security team.

 

Oh, and what do real PATRIOT VETERANS think … ?


VETERAN: We didn’t “serve our country”; We serve the interests of Capital

“I’ve seen a ton on the facebooks about “thanking veterans for their service.” As a veteran let me just be very straightforward and honest with you. We didn’t “serve our country”; we don’t actually serve our brothers/sisters or our neighbors. We serve the interests of Capital. We never risked our lives or spent months on deployment away from our family and friends so they can have this abstract concept called “freedom”. We served big oil; big coal; Coca-Cola; Kellogg, Brown, and Root and all the other big Capital interests who don’t know a fucking thing about sacrifice. These people will never have to deal with the loss of a loved one or the physical and/or psychological scars that those who “serve”, and their families, have to deal with for the rest of their lives. The most patriotic thing someone can do is to tell truth to power and dedicate yourself to building power to overthrow these sociopathic assholes. I served with some of the most real and genuine people I’ve ever met. You’ll never see solidarity like the kind of solidarity you experience when your life depends on the person next to you. But most of us didn’t join for that; we joined because we were fucking poor and didn’t have many other options.”       -Anonymous

 

IN CONCLUSION:  An obvious desperate grab to stay relevant – Does anyone care?

 

ANSWER: jester who?  Now back projects that create positive change in the world, instead of discussing individuals who support & enable the Military Industrial Complex of death, destruction, and global enslavement of Humanity.

 

OH AND FOR THOSE WHO FORGOT, A REMINDER:

cia-owns-al-qaeda

 

How NSA access was built into Windows

How NSA access was built into Windows

Careless mistake reveals subversion of Windows by NSA?

A CARELESS mistake by Microsoft programmers has revealed that special access codes prepared by the US National Security Agency have been secretly built into Windows. The NSA access system is built into every version of the Windows operating system now in use, except early releases of Windows 95 (and its predecessors). The discovery comes close on the heels of the revelations earlier this year that another US software giant, Lotus, had built an NSA “help information” trapdoor into its Notes system, and that security functions on other software systems had been deliberately crippled.

The first discovery of the new NSA access system was made two years ago by British researcher Dr Nicko van Someren. But it was only a few weeks ago when a second researcher rediscovered the access system. With it, he found the evidence linking it to NSA.

(more…)

JFK Assassination Linked to Bush Crime Family

JFK Assassination Linked to Bush Crime Family

Short Version: For those too busy to follow this all the way through….  George HW Bush is ultimately responsible for the planning & execution of JFK, as sanctioned by his masters – The Federal Reserve families.  This explains his subsequent rise in power, from novice CIA spook, to CIA Director, Presidential Cabinet, Vice President, President…. to 33 Degree Iluminati Freemason..? Details to prove this conclusively are best conveyed by John Hankey. The connections back to GW Bush are absolutely astounding, and numerous enough for one to lose count.      -DCMX

ABOUT THIS DOCUMENTARY

Relying exclusively on government documents, statements from the best witnesses available, and the words from the mouths of the killers themselves, Dark Legacy produces a thoroughly substantiated criminal indictment of George Herbert Walker Bush, establishing beyond a reasonable doubt his guilt as a CIA supervisor in the conspiracy to assassinate John F. Kennedy. If we could present this evidence to a jury in Texas, he would pay with his life.

Part one presents the overwhelming mountain of evidence that President Kennedy was hit by bullets from the front and rear. Every witness in the Dallas emergency room attests, on camera, to the fact that a bullet from the right front blew a fist-sized whole in the back of the President’s head. The New York Times carried these statements on the day of the murder; and has covered them up ever since.

*************

Part two presents the on-camera testimony of the witnesses who actually handled the President’s body, the FBI report, and the photographic evidence all proving unequivocally that the President’s body was stolen from the Secret Service and the wounds altered, before the body was delivered to Bethesda Naval hospital for the autopsy. Jackie Kennedy accompanied an empty casket on the plane flight home. Who had the power to do all this without attracting public attention? It’s a short list.

************

Part three presents the Nazi-connections of the Bush family, which prompted the FBI to seize their assets during WW II, as Nazi assets. It presents the suppressed fact that Watergate burglar and CIA operative E. Howard Hunt was found by a jury to have been in Dallas and involved in the conspiracy to kill Kennedy. Hunt was a supervisor of the misguided CIA-led anti-Castro Cubans who broke into the Watergate. He is not only connected to Bush through Watergate; and through Bush’s father, Prescott; but five days after the assassination, the head of the FBI, J. Edgar Hoover, wrote a memo, titled “Assassination of President John Fitzgerald Kennedy” in which he named “George Bush of the Central Intelligence Agency” as the supervisor of what Hoover himself called the “misguided anti-Castro Cuban” killers of the President. Bush has said he doesn’t remember the events of that day, but FBI documents place him in Dallas.

 

It is difficult to assess the stature and significance of someone who has been dead as long as John Kennedy. His killers have also been his detractors, actively desecrating his memory, as they did his body. The movie begins with a short presentation of some of his most powerful and important speeches; including a stunning speech to the UN in which Kennedy calls for the complete abolition of the military industrial complex. These same men the military industrial complex, ripped him from us, and the darkest features of our history since that time are all directly the result of his murder.

 

 

*******  JFK ASSASSINATION EXPLAINED *******

I don’t think we are much encouraged to see History as science. Quite the opposite, actually. And of course, that’s all politics. The winners write history, and the truth be damned. Even science can have trouble trying to act like science when political issues are involved, as we see with evolution, tobacco-and-cancer, and global warming. But I think History does have a lot in common with physical science. For example, I can remember when “Continental Drift”, the idea that Africa and America were once stuck together, was very much considered “just a theory”; ridiculed by some, and regarded with amusement by many, and promulgated as likely by a tiny minority. But as time goes by, the evidence accumulates; and the meaning of old evidence begins to settle in; and ideas that were once considered outrageous gradually get worn in and start to be regarded as obvious common sense. Part of this process is the continual accumulation of new evidence. New pieces are added to the puzzle and the picture becomes more clear. And sometimes the hidden meaning of old evidence, that has been lying around for years, suddenly jumps out. Evidence of the fossils and minerals that can be found on the east coast of Africa, and on the west coast of Brazil, may have been lying around for years, before someone decided to look and see if they matched, and found that they did; and proved conclusively that west Africa and Brazil were once attached.

With regard to George HW Bush and the murder of John Kennedy, Joseph McBride found this memo in 1988.

FBI director J. Edgar Hoover wrote this memo 5 days after the assassination, naming George Bush as a CIA officer.

The last, and most crucial paragraph, is very hard to read. The following is a transcription:

“The substance of the forgoing information was orally furnished to Mr. George Bush of the Central Intelligence Agency and Captain William Edwards of the Defense Intelligence Agency on November 23, 1963, by Mr. V.T. Forsyth of this Bureau.”

When it was first released in 1978, George Bush was an obscure bureaucrat, a virtual unknown. So when the best researchers on the planet saw this memo in 1978, they didn’t pay much attention to it. When Bush became vice president two years later, no one was able to connect his now well-known name to this obscure memo. But when Joseph McBride was messing around in 1988, Bush was running for president; and when McBride saw the memo, he jumped up and shouted “Hey, this memo is about Bush! It says he was in the CIA, way back in 1963!”

And for the longest time, the focus was on this simple isolated fact: that Hoover said Bush was in the CIA in ’63. Bush said the memo must be referring to another “George Bush,” because he wasn’t in the CIA at that time. But over the years, people were able to assemble the facts from Bush’s personal life, showing his deep involvement with the CIA at that time, and with the CIA’s anti-Castro Cubans (in the memo, Hoover calls them “misguided anti-Castro Cubans”). And over time, it has become undeniable; that Hoover was referring, in his memo, to none other than George Herbert Walker Bush. And for a while, that was it. End of story.

But the title of this Hoover memo is, “Assassination of President John Fitzgerald Kennedy”. Isn’t that important? Well, you’d think so. But for the longest time, no one made much out it. Besides, Hoover scarcely mentions the assassination in the memo, instead focusing on these “misguided anti-Castro Cubans.” The body of the memo does not appear, at first, to be in any way related to the title of the memo “the assassination of President John F Kennedy”. But then Mark Lane, in his book Rush to Judgment, did the fabulous work of demonstrating, and in fact persuading a jury, that E. Howard Hunt, a major lieutenant in the CIA’s “misguided anti-Castro Cuban” program, was in Dallas and involved in the assassination. With this background, with this framework to guide the researcher, it was then possible to assemble the considerable evidence linking Bush to Hunt.

People might have taken some notice before that Bush made the unusual request, as Nixon’s ambassador to the UN, to be given an office in the White House. They may have noticed that Hunt, although he was not being paid by anyone in the White House, or answering to anyone that we know of in the White House, also had a White House office. But with the Hoover memo in hand, establishing Bush as a supervisor of the CIA’s “misguided anti-Castro Cuban” operation, it is possible to connect Bush to Hunt at the Bay of Pigs. With this memo in hand, it is possible to connect Bush and Hunt as two CIA operatives with offices inside the White House. With this memo in hand, it is possible to answer who it was that Hunt answered to inside the White House; and how he got the office in the first place. And with all that, it is possible to connect Bush to Hunt, and therefore to Dallas, to Hunt in Dallas, and to the “misguided anti-Castro Cuban” assassins of John Kennedy. Which is what Hoover did for us when he wrote the title of the memo. Little by little, the pieces start to fall into place. And pieces that in isolation meant nothing, become key parts of a whole picture.

But even so, this is not a rock-solid connection: Hunt was directly involved in the murder of JFK. And Bush supervised Hunt. But Bush probably supervised a lot of CIA people, not all of whom were directly involved in the assassination. A high-ranking officer may be connected to all of the acts of all of his troops, by reason of his being their commander. But it’s not a direct connection. It doesn’t establish that the officer knew about, or approved of, or was involved in, all the actions of those troops.

Enter FBI memo # 2:

It will come up again in a minute, so please read the first line carefully. Bush identifies himself to the FBI as an independent oil man from Houston.

This memo establishes that sort of direct connection between Bush and Hunt, in Dallas, on the day of the assassination. This memo records Bush’s phone call to the FBI, precisely an hour and fifteen minutes after the assassination. When I first encountered this memo, and when I first put it into my movie, JFK II, I simply called it “weird”. I saw it only in isolation, a weird, isolated connection between Bush and the assassination. It took me years to see it in context. That is, to see that this phone call demonstrates, clearly, that George Bush, was on duty that day.

He was staying at the Dallas Sheraton because his duty assignment was in Dallas. His phone call to the FBI cannot have been random. This James Parrott worked for Bush as a sign-painter; he was not an assassin; this phone call is not what it purports to be; Bush was fulfilling some obscure under-cover function in making this call. So the phone call has to be seen as part of his CIA assignment; which was clearly connected to the assassination. This memo then establishes that Bush was in the Dallas area, and on duty; and that his duty assignment was connected to the assassination. And if his men were in Dallas shooting the President, as they were, he was certainly on duty supervising them. If he were not supposed to be supervising them, his bosses would have assigned him to be at his home office in Houston, Texas; or on his oil rigs in the Caribbean.

But, even in context, this memo and the phone call it describes is still weird, no? I mean, how could Bush have been so stupid as to make this insanely incriminating phone call? Without this FBI memo, recording this phone call, we don’t know, or even have a good clue as to where Bush was, or what he was doing the day of the assassination. Do we? Bush has, until recently, simply said that he did not remember what he was doing the day of the assassination. But with this memo, Bush tells us where he was and what he was doing — he hands us his head on a silver platter. What could possibly have motivated him to make such a stupid error as making this phone call to the FBI? It’s a valid question. It’s not an essential question. We can still value this memo, and extract a great deal of important content from it without answering the question of why, but the question remains.

And we can make a stab at answering it. Russ Baker in his fine book, Family of Secrets suggests that Bush was attempting to establish an alibi. Now, by making this phone call, he, in fact, establishes that he was in the Dallas area, and that he was on duty, related to the assassination. So if he’s trying to establish an alibi to cover-up where he actually was and what he was actually doing, what he is trying to cover up must be some pretty bad stuff, some pretty incriminating stuff, if it’s worse than what he gives us with this alibi.

And what could be worse than what he gives us? Well, obviously, he must have actually been in Dallas. In fact, I think, this situation suggests he must have actually been in Dealey Plaza. I mean seriously. Think about it. He’s so panicked about the truth coming out, that he puts his head in a noose and hands it to us. It makes me think he must have been in Dealey Plaza, he must have been in the company of the shooters, and he must have felt that there would be evidence to prove that.

We’re just speculating at the moment. We’ll get to the evidence right now, but I’m trying to set the scene. If a guilty party is in a panic, trying to cover evidence connecting them to a crime, they may invent an explanation, or an alibi, that seems like a good idea at the time; but that in fact constitutes a very damaging admission. Anyway, stew on that while you consider this photo:

You see this tall thin man in a suit, with a receding hair line. Many people claim this is Bush, standing in front of the Texas School Book Depository. And it might be. It might be a lot of people. And perhaps, when he called the FBI and incriminated himself, Bush was concerned that he might show up in a better picture than this, where he was positively recognizable, looking towards the camera.

Personally, I don’t think this photo looks much like Bush; and in fact, I didn’t think he’d be stupid enough to just be hanging around the murder scene. I thought he was sufficiently high ranking that he’d leave such on-scene stuff to his underlings. Right? At least in my mind, if you’re an officer like Bush, you’re the coach. You plan, you train and prepare your people, and then you stand back and watch it happen. Or so I thought. Fletcher Prouty was certain that he saw pictures of Ed Lansdale, a military operative of the highest rank, signaling to the “tramps” arrested behind the grassy knoll to “be cool,” that everything was alright. Hunt was a high-ranking CIA officer, chief of the CIA’s Mexico station; and his son says he is one of the “tramps” who show up in several photos of men who were arrested behind the grassy knoll. So, some of the highest ranking members of the killers’ operation were apparently there, on the front line, to make sure that when things went wrong, as they inevitably do, these high ranking officers could be there to fix whatever the problem was. So, given that high- and low- ranking CIA officers were present, this photo of this thin man in a suit might, indeed, be Bush. It’s possible.

And now, look at this picture of the Dal-Tex building. The Dal-Tex building is across the street from the Book Depository, and many leading researchers into the assassination, including Jim Garrison, say there was certainly a team of shooters in this building:


[click for larger]

And as you can see, some imaginative individual has added some color to indicate three men in this window. Very creative, very imaginative; and at least plausible. Still, it takes way too much imagination and effort, to see Bush’s face. But now observe this link: http://www.ratical.com/ratville/JFK/WTKaP.html

 

Actually, You don’t have to stop and read it, because I’ll quote the relevant part. It’s a statement from Roger Craig, winner of the deputy of the year award for Dallas in 1960, and one of the most honest men working that day in Dallas. He’s an amazing and heroic fellow, worthy of all the time you could take looking into his background and character. And here, in the following passage, he is describing a conversation he had with Jim Garrison, and he says,

 

“Jim also asked me about the arrests made in Dealey Plaza that day. I told him I knew of twelve arrests, one in particular made by R. E. Vaughn of the Dallas Police Department. The man Vaughn arrested was coming from the Dal-Tex Building across from the Texas School Book Depository. The only thing which Vaughn knew about him was that he was an independent oil operator from Houston, Texas. The prisoner was taken from Vaughn by Dallas Police detectives and that was the last that he saw or heard of the suspect.” (emphasis added)

 

Holy Moe Lee! Please notice that, in speaking to Jim Garrison, Craig says “in particular”. Apparently he and Vaughn thought this was the most significant arrest made that day; pretty amazing given that E.Howard Hunt was arrested in the rail yard behind the grassy knoll. And the only thing Craig knew about this “particular” arrestee was that he had exactly the same singular CIA-cover, “an independent oil operator from Houston, Texas”, that George Bush had used that same day in his contact with the FBI.

 

Now. There are a very limited number of possible explanations for who this “independent oil operator” was. Let’s look at them.

 

It is conceivable that the CIA had two men in Dallas area that day, supervising the shooters, who both had the designated cover of being an “independent oil operator from Houston.” Bush was one, as the evidence above clearly shows; and perhaps there was another who was with the shooters in the Dal-Tex building, supervising them directly. But unless the CIA overlords were trying to set Bush up, they would not have told anyone else to use Bush’s CIA cover to identify themselves to the police. If another man was involved in the crime, and was arrested for it, and he told the cops he was an “independent oil operator from Houston,” this would tend to throw suspicion in Bush’s direction. Bush’s association with the CIA’s Cubans was already widely known. Fletcher Prouty knew and wrote of it. Fabian Escalante, the head of Cuban counter intelligence, knew and has written about it. James Files, who claims very credibly, to have been a driver for the Mafia shooters in Dallas, has spoken on-camera about it. And FBI director J. Edgar Hoover, knew about it and wrote about it in his memo. So Bush was already a suspect in Hoover’s eyes. The CIA planners, then, would not have told anyone else, “in case you get arrested, tell the cops you’re an independent oil man from Houston”. Right? They would not have done this, since it would tend to incriminate Bush, who was already in a highly visible, highly suspicious position.

 

Another unlikely possibility is that this “independent oil operator from Houston” was just some innocent oil operator, who somehow managed to attract suspicion, and was arrested. Do you think it’s possible that another oil man from Houston just happened to be in that corner of Dealey Plaza? I hope you think it’s possible. Because, as unlikely as it seems, if you think it was possible, then certainly Bush would have been reasonable in thinking that, as he was being arrested, there were other independent oil operators in the crowd who witnessed his arrest. You see, Bush spoke to a group of oil men in Dallas the night before the assassination*2. If it were possible that some of them were in Dealey Plaza, he would need to be terrified of the possibility that some of them might actually have seen the arrest, and would have been able to identify him as the object of that arrest.

 

No wonder, then, that Bush freaked out, and made this stupid incriminating phone call to the FBI. Even if it showed that he was not in Houston, or in the Caribbean, but in Dallas, at least it suggested that he was not in police custody for the murder of the President, in Dealey Plaza.

 

But now stop and think a minute: why was he arrested? What was he doing that drew this cop’s attention at all? What could he possibly have been doing to make this cop think that he needed to arrest Bush? Perhaps walking out of a building without attracting attention is harder than it sounds; and it reasonable to suppose that the crowd outside the Dal-Tex building had heard the shots, had heard that the President had been wounded, and they were carefully scrutinizing anyone who came out of the building. But this story shows clearly that Bush was not the sort of cold-blooded killer who could take part in the murder of a man, and then act and look like nothing was going on as he tried to leave the scene of the crime. And it turns out that as an old man, Bush continues to suffer from this character trait, of being unable to hide feelings that need to be kept secret. As you can see in this link, http://www.youtube.com/watch?v=ft3eGWZd7LE , at Gerry Ford’s funeral, Bush suddenly breaks into a wide grin while speaking of the Kennedy assassination. This is not a Mona Lisa smile. This is face-wrenching spasm of glee.

 

In a minute we’ll take up the question of why Bush would grin at his recollection of watching John Kennedy’s brains splatter; the point for us now is that he apparently had a similarly inappropriate, show-stopping expression on his face as he attempted to exit the Dal-Tex building; he had the look of a murderer in his eye, so clearly that it could not be missed; as this funereal-grin could not be missed. And the guilt plastered all over Bush’s face drew people’s attention. And this cop, Vaughn, arrested him.

 

Now remember, Roger Craig tells this story in the context of his discussions with New Orleans District Attorney Jim Garrison about the suspects who were arrested that day and who then evaporated without leaving a mugshot, interview, fingerprint, or name. Garrison spoke not only to Roger Craig, but he no-doubt spoke to Vaughn, who made the arrest. And Garrison adds the following:

 

“At least one man arrested immediately after the shooting had come running out of the Dal-Tex Building and offered no explanation for his presence there. Local authorities hardly could avoid arresting him because of the clamor of the onlookers. He was taken to the Sheriff’s office, where he was held for questioning. However, the Sheriff’s office made no record of the questions asked this suspect, if any were asked; nor did it have a record of his name. Later two uniformed police officers escorted him out of the building to the jeers of the waiting crowd. They put him in a police car, and he was driven away. Apparently this was his farewell to Dallas, for he simply disappeared forever.”

— On the Trail of the Assassins, p. 238 —

 

This vision of the panicked Bush being arrested, no-doubt terrified as he was taken to the police station, and possibly even booked (though the record of any such booking has been destroyed) provides a context that explains a number of Bush’s otherwise-mysterious actions. Certainly Bush was freaked out and panic-stricken! An angry crowd clamored for his arrest, and jeered his release.

 

Being a newbie in these dark affairs, Bush didn’t have confidence in the ability of the old devils at CIA to make water run uphill, to make time run backwards, to silence the witnesses, to destroy the records, and make it all go away. And so he panicked; he acted on his own, stupidly; he called the FBI, thinking that he was “cleverly” providing evidence that it wasn’t him who was arrested in front of the Dal-Tex building that day. In his panic-stricken state, this seemed like a good idea. He was unable to see that he was actually creating a permanent absolutely-positive record of his involvement.

 

We can now also explain the grin. He grins ridiculously at Gerry Ford’s funeral, at the mention of John Kennedy’s murder, not because he is such a ghoul that he thinks splattering the contents of Kenney’s head all over Jackie Kennedy was funny; but because mentioning the assassination causes him to recall the comedy of errors that produced his own ridiculous panic, arrest, more panic, and so on.

 

Garrison wrote his paragraph about Bush’s arrest in 1988. Deputy Craig’s article was written in 1971 and posted in 1992. But the significance of these paragraphs was discovered last week. There hardly was an internet in 1992 when Craig’s article was posted. And for 19 years, no one noticed that this phrase, “independent oil man from Houston”, is a very unique description of Bush. No one noticed until last month, when one of the moderators of JFKMurderSolved showed it to me. And I wrote about it to some friends, and one of them suggested I read what Jim Garrison had to say.

 

So the pieces continue to fall into place. Little by little, the picture is filled in, the questions get answered. And the conclusions become more incontrovertible. This is just the sort thing that happened with the theory of Evolution and the Big Bang theory; and the theory of continental drift. And someday they may start to teach history, as a science, based on evidence, in the universities. Really! It could happen! At which point, Bush’s involvement in JFK’s murder will be taught, like evolution, as the only plausible explanation of the available reliable evidence.

 

Final note: Until recently, Bush had nothing more to say about his whereabouts the day of the assassination than that he doesn’t remember where he was. That in itself is extraordinarily incriminating. Everyone who was alive at the time remembers where they were on 9-11, and on the day Kennedy was murdered. But, saying that he doesn’t remember, however improbable, is at least consistent with Bush’s autobiography, which mentions nothing.

 

Lately, however, perhaps at least partly in response to my work, Bush and Co. have concocted a story that he was speaking in Tyler, Texas to the Rotary Club. The vice-president of the Rotary Club, Aubrey Irby, says that Bush was speaking when the bellhop came over and told him, that Kennedy was dead*1. Mr. Irby passed the information on to Mr. Wendell Cherry, who passed it on to Bush; who stopped his speech. Irby says that Bush explained that he thought a political speech, under the circumstances, was inappropriate; and then he sat down. As a would-be alibi proving Bush’s innocence, there are at least three huge problems with this story.

 

The first is that it is inconceivable that Bush would not have remembered such an event; or that he would have left it out of his autobiography, since it shows what a fine and respectful fellow he is. If he didn’t remember it sooner, or include it in his autobiography, it’s clearly because it never happened.

 

The second huge problem with this story is that it couldn’t possibly have happened; that is, it is made impossible by Bush’s original alibi, his phone call to the FBI, as you’ll see:

The witness who tells this story, Aubrey Irby, says that Bush excused himself and sat down. It doesn’t say that he rushed out of the room in a frantic search for a phone. The problem is that Walter Cronkite’s announcement to the world that Kennedy was dead came at 1:38 (http://www.youtube.com/watch?v=76gl3NZAdxo). Certainly, no one was listening to Walter Cronkite in the same room in which Bush was speaking. Therefore we can be sure that this bellhop, who told Irby that Kennedy was dead, was in another room. The bellhop had to make the decision that he had heard enough of the news to leave off listening to the news. This is no small point. Texas governor Connally was severely wounded. Lyndon Johnson was reportedly wounded. There was much other news to be confirmed. At some point, then, the bellhop decided to stop listening and go make an announcement. There’s no reason to think Irby would be the first person he would tell. But at some point he went to the room where Bush was speaking and informed Mr. Irby that the president was dead. This walk to find Irby took time, of course. Mr. Irby had to receive the information, and then he had to decide to inform Mr. Wendell Cherry, the president of the Kiwanis. Mr. Cherry had to decide that he should interrupt Bush’s speech; Mr. Cherry had to then walk over to Bush and tell him the news.

 

Bush had to decide what to say; and he had to say it. And, according to the only witness, Mr. Irby, Bush “then sat down”. Somehow, when he was finished sitting, without attracting Mr. Irby’s attention, Bush had to seek and find a phone. This would have been a hotel phone, so he would likely have had to go through the hotel switchboard to get an outside line. Do you suppose the switchboard was busy after the announcement of the President’s death? It’s a good guess. In Washington D.C. so many people rushed to make a phone call that the phone system went down. In any case, once he got through to the hotel operator and got an outside line, Bush then had to call information and get the number of the FBI. After getting through to information, and getting the number, he then had to call the FBI; and penetrate their switchboard, which was, no doubt, very busy; and he had to locate an agent, on what must have been the busiest day in the history of the Dallas bureau. How many minutes do you suppose that would take? Twenty seems a fair guess, though it seems implausible that a civilian could even get through, given all the official police business going on at the time. We know that the Dallas FBI was all over the murder scene, confiscating camera film and intimidating witnesses; so it’s hard to imagine how Bush, an hour after the shooting, was able to reach an agent at all. Given the “sitting” that Mr. Irby observed Bush doing, for all this to have transpired in 45 minutes would be tidy work. But Bush had to do all of this, as the FBI memo states, by 1:45, seven minutes after the news of Kennedy’s death first went out; which is blatantly impossible.

 

The third problem is this question of why Bush would feel that it was necessary to concoct such a story at all? Why does he have to tell us this lie? Why does he have to get others, like Irby, to lie for him? The irony is that the harder he tries to make himself appear innocent, by lying, the more evidence he gives us of his guilt.

 

*1 Kitty Kelley, The Family: the Real Story of the Bush Dynasty, p.213; cited by Russ Baker in Family of Secrets, p.54

*2

There are some people who manage to point to this and say “ahah! That’s why Bush was in Dallas! Not to kill the President, but to speak to the other oilmen!” But as the Hoover memo shows, being an oilman was just a cover for Bush’s real occupation as a CIA supervisor of trained killers. He needed an excuse for being in Dallas. This speaking engagement provided him with one.

———————-

FROM THE DIRECTOR

George Bush killed Kennedy. Or was it the Mafia? Maybe Castro did it. Who cares? It was 40 years ago. What difference does it make?

It matters.

The day he died we lost an invaluable treasure. This video documents that we lost a man of peace, who tried to cool off the cold war, and to get the American people to see their Russian enemies, not as despicable inhuman monsters, but as people like us.

On November 22, 1963, you lost the man who saved your life on October 17, 1962. At the height of the missile crisis, Kennedy’s generals and advisors were urging him to launch a first strike attack against Cuba. They assured Kennedy that the Russian missiles in Cuba were not nuclear and were not ready; but that he and they should quietly slip away to the safety of bomb shelters anyway, just to be safe; and then launch an attack, leaving the rest of us out to die. Kennedy thought about it. And then he told them that nobody was going anywhere. If anyone died, they would be the first to go, sitting as they were in the Whitehouse, the prime target of those Russian missiles. Together they then figured out a safer plan. Robert McNamara, Secretary of Defense at the time, recently learned from the Russians that the missiles were armed, were ready, were nuclear, and that their commanders were authorized to use them in case of an attack. If you live in the northern hemisphere, the lives of your parents, and your future, were certainly saved by John Kennedy on that day. It matters that his killers be exposed.

In his farewell address, President Eisenhower had warned Kennedy, and the rest of us, of the threat posed to democracy by what Eisenhower called “the military industrial complex.” And while Kennedy famously went after the CIA, and refused to commit troops to Vietnam, I always wondered why he didn’t more openly attack this military industrial complex. And then I stumbled upon a speech he gave at the United Nations. As you will see in the video, he called upon the Russians, and United Nations, to help him to take on this military industrial complex, in order to “abolish all armies and all weapons.” But he was swept away. And in the years since, millions have died in needless wars, trillions of dollars have been wasted on “defense”, and millions more people have lived and died needlessly in poverty. It matters that we lost him.

In 2007, Bruce Willis told Vanity Fair magazine, “They still haven’t caught the guy that killed Kennedy. I’ll get killed for saying this, but I’m pretty sure those guys are still in power, in some form. The entire government of the United States was co-opted.”

Now Willis probably would not mind my suggesting that he’s no genius. At best, his observation is common sense. 80% of the American people agree with him. Indeed, this video, proving that Kennedy was brought down by the most powerful men in the world and their hired thugs, is not based on secret documents. It is all information that has merely been suppressed. Oswald allegedly shot Kennedy from behind. But the day he died, the NY Times carried the story, told by the doctors in Dallas, that Kennedy had an entrance wound in his throat, another in his right temple, and a large gaping exit wound in the back of his head. After talking to the emergency room doctors, Kennedy’s press secretary described, to the assembled press, a shot to the right temple from the right front that went “right through the head.” All of the witnesses near the right front, the grassy knoll, described hearing shots from that direction, and dozens of witnesses raced up the knoll in pursuit of the shooters. These witnesses talked to the press. But all of this information has been suppressed for the last 50 years. By whom? Who could?

You will also see in this video the overwhelming best evidence, from the best witnesses, proving beyond a reasonable dispute, that Kennedy’s body was stolen from Air Force One, and the wound to his right temple was mutilated, before the autopsy. Jackie Kennedy kept watch over an empty casket on the flight from Dallas to Bethesda Naval Hospital. Then the body was quietly taken to Bethesda for the autopsy, arriving 20 minutes before Jackie and the empty casket. Who had the power to arrange this? Who HAS the power today to suppress all this evidence?, and to continue to bombard us with ridiculous lies about a lone gunman? It’s a short list, isn’t it? It doesn’t include the mafia, or the Russians, or Castro. It does include the Bush family – or rather their masters in Big Oil; the banking elite; the backbone of the military industrial complex. These men, and their successors, carried out the attacks of 9-11. It matters.

 

 

NEW DOWNLOADABLE EXTRAS!

To compliment the DVD, here are four audio extras with increased appreciation for the events described in the film:

An In-Depth Look at Oswald

LBJ Part One – Hunt’s Deathbed Confession

LBJ Part Two – Evidence of Innocence

LBJ part Three – More Evidence of Innocence

It Never Ends – More Evidence of Bush in Dallas

 

How the CIA Operates the International Drug Trade and keeps Drugs Illegal in the US

How the CIA Operates the International Drug Trade and keeps Drugs Illegal in the US

What keeps the drug industry going is its huge profit margins. Processed cocaine is available in Colombia for $1500 dollars per kilo and sold on the streets of America for as much as $66,000 a kilo (retail). Heroin costs $2,600/kilo in Pakistan, but can be sold on the streets of America for $130,000/kilo (retail).

 

Drugs and Guns are the two most profitable industries in the world, so as long as we operate under the same rules of capitalism and materialism like we have been for so many years, nothing can or will ever change the status quo.

 

If the Illicit Drug Industry is the second largest industry in the world, the Anti-Drug Industry, or DEA, is the next largest. It is sometimes difficult to distinguish where one ends and the other begins.

“In my 30 year history in DEA, the major targets of my investigations almost invariably turned out to be working for the CIA.” – Dennis Dayle, Chief of an elite DEA unit in Central America.

The CIA has control of the global drug trade. Just as the British Empire was in part financed by their control of the opium trade through the British East India Company, so too has the CIA been found time after time to be at the heart of the modern international drug trade. From its very inception, the CIA has been embroiled in the murky underworld of drug trafficking.

 

There are billions of dollars per year to be made in keeping the drug trade going, and it has long been established that Wall Street and the major American banks rely on drug money as a ready source of liquid capital. With those kinds of funds at stake, it is unsurprising to see a media-government-banking nexus develop around the status quo of a never-ending war on drugs – aided, abetted and facilitated by the modern-day British East India Company, the CIA.

The CIA has been involved in drug trafficking long before former President George H.W. Bush served as the CIA Director, but it was while he was in charge that CIA drug trafficking was first exposed and 47 members the Reagan Staff were convicted and imprisoned.

This is our EyeOpener Report by James Corbett presenting the history, documented facts, and cases on the CIA’s involvement and operations in the underworld of drug trafficking, from the Corsican Mafia in the 1940s through the 1980s Contras to the recent Zambada Niebla Case today.

 

Now it’s not just the United States being bombarded with drugs. Today Russia, the CIS Countries (the Commonwealth of Independent States is a regional organization whose participating countries are former Soviet Republics, formed during the breakup of the Soviet Union) and all of Europe are under covert assault by the CIA, Mossad, and Drugs Inc.

 

It appears that the cold war has gone into a new and deadly direction. Currently Russia, the CIS countries as well as the rest of Europe are suffering from a new drug epidemic from the vast quantities of cheap, high quality heroin from Afghanistan. Since the US occupation, the Opium production in Afghanistan has increased one hundred thousand fold.

 

It is well documented that US soldiers and private contractors are both protecting the poppy fields and safeguarding the cultivation. And with the occupation of Afghanistan, the US controls the source of this cheap high quality heroin, managed by the CIA, being is responsible for this plague upon the people of the Eastern Asia and Europe, not to mention the vast quantities of the drug which make it back to the United States.

 

To see how the CIA organizes the international drug trade, we must only look as far as former CIA officer, John Millis, who served for thirteen years as a case officer supplying covert CIA aid to the heroin-trafficking guerrillas in AfghanistanÑan analogous and contemporary alliance between the CIA and known drug-traffickers (New York Times, 6/6/00). At least one of the airlines involved in the Afghan support operation, Global International Airways, was also named in connection with the Iran-Contra scandal (Los Angeles Times, 2/20/97).

 

During the same time as the Contras, the CIA was arming and advising heroin-trafficking guerrillas in Afghanistan. Its leader, Gulbuddin Hekmatyar, became one of the leading heroin suppliers of the world. During the last few years, the CIA has helped promote the KLA (Kosovo Liberation Army), whose leaders and arms had been financed by Kosovar drug-traffickers. Indeed, the CIA’s practice of recruiting drug-financed armies is an on-going, never-ending affair. Using Laotians, whose sole cash crop was opium, the CIA recruited an army numbering in the tens of thousands.

 

It is easy to see how these practices by the CIA have greatly contributed to the drug crisis worldwide, including the United States. When the first established contact was made with heroin-trafficking Afghan guerrillas in 1979, no Afghan-Pakistan heroin was known to have ever reached the United States. By 1984, according to the Reagan Administration, 54 percent of the heroin reaching this country came from the Afghan-Pakistan border. Today, it is estimated that well over 90% of the world’s heroin comes from Afghanistan!

 

In a typical year, Afghan farmers sell around 7,000 tons of opium, which converts into around 1,000 tons of heroin. That comes out to roughly $900 million in annual revenues for the farmers, $1.6 billion for the local traffickers within Afghanistan, and another $1.5 billion for those who smuggle heroin out of the country. You do the math.

 

The CIA is more or less responsible for providing the contacts, protection, transportation and required chemicals to process raw opium into heroin. Without these elements the whole multi-billion dollar operation would not be possible. Again, you do the math.

 

The United States Department of Agriculture is even providing agricultural advice (at US taxpayer expense), to increase the yield per acre of opium poppies. The USA is sponsoring this chemical attack upon the Russian people and their allies.

 

Of course, the Afghanistan heroin operation is just one of many CIA dug trafficking fronts. The same thing they are doing there with heroin they are doing in Columbia, Chile and Peru with cocaine and in Mexico, Central and South America with Marijuana (read my article, The Great American Marijuana Conspiracy and/or get The Emperor Wears no Clothes FREE marijuana conspiracy ebook, just for signing up for the FREE Conspiracy Watch Newsletter).
The proceeds of CIA drug sales now buys elected officials, judges and entire police departments and law enforcement agencies around the globe. The corruption goes from the US and Mexico, to Europe, Eurasia and even Southeast Asia. Wherever people have power, the CIA will buy them and their influence.
The US government has no desire to stop the drug epidemic in America, much less anywhere else, as too many American politicians and businessmen are getting very wealthy from both domestic and international illegal drug problems.
I will be bringing you more on the phony War on Drugs, here on Conspiracy Watch, as I continue to track government conspirators across the globe.

 

For now, I would appreciate your feedback, as you let Conspiracy Watch readers know how you feel about The War on Drugs and our government official’s involvement in keeping millions of people addicted or locked up for their own profit.

Written By: Tom Retterbuh

 

Pope’s butler arrested over Vatican documents leak

Pope’s butler arrested over Vatican documents leak

Rome (CNN) — Pope Benedict’s butler has been arrested on suspicion of leaking confidential documents to an Italian journalist, the Vatican said Saturday.

Paolo Gabriele, 46, was arrested Wednesday for illegal possession of confidential documents, found in his apartment in Vatican territory, the Vatican said in a statement issued three days later.

Gabriele, who has worked as the papal butler since 2006, is one of only a handful of people with access to the pontiff’s private desk.

His job included handing out rosaries to dignitaries and riding in the front seat of the “Popemobile,” a vehicle used for public papal appearances, as seen in many photographs showing Gabriele with the pope.

Last month, the Vatican gave Cardinal Julian Herranz a “pontifical mandate” to uncover the source of hundreds of personal letters and confidential documents that have been released to Gianluigi Nuzzi, an Italian journalist and author of “Sua Santita,” a book that translates to “His Holiness” and includes the documents.

Nuzzi would not confirm the identity of his sources, but he told CNN that his primary source — who he referred to as “Maria” in his book — “risked life and limb” if ever found out.

The source worked inside the Vatican, according to Nuzzi, who refused to give other details such as the source’s gender, age and if he or she was clergy or not.

Nuzzi told CNN that he has not been questioned in connection with the arrest. The Vatican called the publication of his book “criminal” when it was released last Saturday in Italian.

Feltrenelli and Mondadori booksellers both rank the book No. 1 in sales within Italy.

Nuzzi’s book highlights an internal power struggle within the Vatican through numerous documents including faxes, personal letters and inter-Vatican memos. He told CNN that he received the documents during a year of private meetings in secret locations.

The documents show that the allegations of corruption and money laundering were a concern for a number of high ranking prelates, including Carlo Maria Vigano, who is now the Papal Nuncio in Washington, DC.

Vigano wrote in a series of letters to the pope that he was concerned about the spread of corruption and that his move to Washington would stir speculation.

“Holy Father, my transfer at this time would provoke much disorientation and discouragement in those who have believed it was possible to clean up so many situations of corruption and abuse of power that have been rooted in the management of so many departments,” according to his letter which was published in the book.

The Vatican has not denied the authenticity of the documents, but instead says the breach of privacy is a criminal act.

The 108-acre city-state has its own judicial system, distinct from the Italian judicial system. CNN senior Vatican analyst John Allen pointed out that its courts normally prosecute the likes of pickpockets, “not alleged moles.”

Thus, the Vatican doesn’t have facilities to incarcerate anyone on a long-term basis and the civil and criminal penalties it typically metes out are limited, Allen said Saturday. He speculated that, for these and other reasons, the Vatican may ask — assuming that it determines there is enough evidence against Gabriele — that any such trial occur within the Italian judicial system.

“The question then would become: Does the Italian government want to pick that (trial) up?” said Allen, a senior correspondent for the National Catholic Reporter. “In addition to being an embarrassing scandal for the Vatican on its own terms, this also has the potential to become … a diplomatic contretemps.”

For now, Gabriele is being held in a special cell within the Vatican City, a walled enclave within Rome, according to Vatican spokesman Federico Lombardi.

Lombardi said the pope was “saddened and shocked” at the arrest.

The Vatican said the first phase of its preliminary investigation, under chief prosecutor Nicola Picardi, had now ended. An investigating judge, Piero Antonio Bonnet, is leading the next stage of the investigation, which could lead to a trial or acquittal.

Gabriele has appointed two lawyers of his choice to act at the Vatican Tribunal, and has had a chance to meet them, the Vatican statement said.

“He enjoys all the legal guarantees provided by the criminal code and criminal procedure in force in the State of Vatican City,” it added.

The ‘New Berlin’ base: Nazis in the Antarctic

The ‘New Berlin’ base: Nazis in the Antarctic

Update from E.S, a German-speaking researcher, who has been in direct touch with Barabou Vedu, and who has done some excellent work.

Click here

The large document which can be downloaded here (a book of 400 pages, with maps, diagrams, equations, and hand drawings) was sent anonymously, on two disks, to a well-known UFO organization. There is little information about the author, and the material has not been seen before.

The disks were then passed on to a respected German investigator. This person, whom we know well, passed them on to Project Camelot for publication stating that the material might be highly significant.

We do not read German, so we do not know the precise content. But it’s clear that this is extraordinary material. It appears to document extensive, detailed information about a base in Antarctica originally established by the Nazis, advanced physics, mind control, something apparently resembling the ‘Montauk chair’, and alien involvement in the affairs of the human race.

Included in the document are dozens of pages of higher mathematics, apparently detailing the physical theory of interdimensional travel. Whoever assembled this did so with a very great deal of time, trouble and technical knowledge.

The author states he has been a victim of mind control and/or mental illness, and appears to document a bizarre personal journey. But he also certain of what he is reporting. He recounts a large number of very peculiar dreams, but also describes the Antarctic base in detail. Most compelling are the many pages of mathematical physics, which of course cannot be hoaxed.

Strangely, a number of pages which contain the physics have a commentary in imperfect English, as if they have been partially autotranslated. We don’t yet know how this has come about, or if the text was written that way in the original.

Many questions are raised, of course – none the least being how one escapes from Antarctica. But the answers may present themselves to those with the resources to study the document thoroughly.

We intend to get it all translated, which may take time and require professional involvement. We are publishing this immediately because our experience suggests that it is an effective insurance policy not to sit on potentially explosive material privately for too long.

We welcome all and any responses to this, and invite German-speaking researchers and anyone with a knowledge of advanced mathematical physics to contact us privately to discuss the contents. Project Camelot makes no claims for this document, but is publishing it simply because of its potential importance for others to investigate thoroughly.

Click here to download (PDF 18.6 Mb)

_____________________________

German Researcher’s summary

We asked the German researcher to write a summary of the book for the benefit of English-speaking readers:

About the book

I obtained the book from a German UFO society. They had received the book itself (around 400 pages) and two CDs containing the text and several drawings. The envelope had no address on it. However, the postmark reveals that it had been sent from Berlin.

The book was written by “Barabou Vedu in cooperation with R. Eckelt” (both anonymous). The author, Barabou Vedu, claims that his writings are an actual report from his experiences on an old alien base, where he was being kept “somewhere in the eternal ice” until he was 15 years old. He claims that people on the base spoke English and “Indian” language.

About the base

The author says that the base is no longer under extraterrestrial but under human control. He says the reason why there are so many human scientists on the base is because this is a place where many exotic phenomena can be observed, like “vectorial viewing into the future”, “soul travel via machine”, “technical telepathy” or what he calls “eye-movies” (living another’s experiences by proxy).

The author says that the base where he lived it is located not far from another alien base which bears the name “New Berlin”. He suspects that the base where he lived was part of the “New Berlin” base. He describes it as a huge building of glass and plastic, several square kilometers in area. During his stay, he says never left the base physically.

How he left the base

Around the year 1996, the author says that he left the base due to the first signs of schizophrenia; however, he has no conscious memory of how exactly he was “thrown out”. He woke up outside the base in a mountainous area “somewhere in Tajikistan”, where he was welcomed by four Turkish people that he later identified as “one of their criminal mind-control-gangs”. He stayed with them for a while, but then fled and traveled to Germany by train, a trip which took about three weeks. He says that after his arrival in Germany, he was officially accepted as a refugee.

Why he wrote the book

Because of recurring flashbacks, nightmares and “apparent signs of post-traumatic stress”, he was assigned to a psychiatric hospital in May 1998. He says that no-one there would believe any of the stories he had to tell which is why he decided to start lying to the doctors. He eventually managed to discharge himself and decided to confide in a person he trusts, whom he told about his past in order to cope with his fears and nightmares.

It seems that the book is a direct result of these conversations. The author says that it was a good idea to write everything down because it was an effective way to “get rid of everything”. One may suspect that the aforementioned person “R. Eckelt” is the one who gained Barabou’s trust and helped him to write down his memories.

His memories

The author says that he and the other humans on the base followed a schedule. They received their food from a tube which came out of the wall. He describes it as a kind of “brown paste”, which tasted like fruit. In order to receive food, they were obliged to follow certain tasks for which they received “bonus points”. Not fulfilling a task resulted in receiving no points, and therefore no food.

One of the main tasks that he and the other humans had was to “follow the thought structures of humans outside the base”, using a technology he calls the “Bereschewan-seat”. The seat itself is described as far too small for a human being – it seems to have been created for beings with another anatomy.

In order to use the seat, the author says they had to put on a specific suit with a cable which ended in a machine. Using the seat, it was apparently possible to see and feel the world outside as if one would experience it with one’s own senses (sight, smell, sound, touch etc). The author says that he was eventually obliged to draw what he saw. Sometimes he was ordered to distract people outside the base from their original thoughts and to “implant” different, more violent thoughts. The author furthermore suggests that this manipulation has been going on for a long time – and probably from the future.

The author says that among the humans, there were also other beings present on the base. He refers to them as “Lemurs” – reddish, greenish robots which he suspects are inhabited by human souls who failed to accomplish their tasks. Another type of being mentioned is described as small and humanoid in appearance with brown, hairless skin. Humans living on the base worshipped them, considering them to be “Gods”. In one part of the book, the author describes how he once saw one of these brown beings sitting perfectly at ease on the Bereschewan seat, a detail which suggests that the seat was their technology.

I have only read, in detail, a quarter of the book so far. There are many more things in the book which are not described in this summary.

A glance at the text

The book is almost entirely written in German, although some paragraphs are written in bad English and seem to have been translated either by a German-speaking person or by an automatic translator. As for consistency of the content, no apparent contradictions can be observed. On the contrary, throughout the book, the author keeps relating again and again to details he has already mentioned before.

There is one chapter which contains numerous formulae and diagrams about what the author describes as “Our theory of everything”. This complex mathematical physics seems to describe an advanced model of a multidimensional universe, and how to travel through it. He states that investigating these formulas might prove the authenticity of his claims, but possibly only “in 20 or 30 years from now”.

First steps undertaken so far

A very experienced remote viewer has been asked to assist to give an opinion on the book’s authenticity. One initial session has been done so far and more are planned.

Recommendations

A complete translation into English would be advisable so that researchers from around the world can investigate this independently. The book is obviously linked to the persistent reports that Hitler discovered an alien base in Antarctica and went there before the end of World War II. Therefore a thorough investigation of parallels between the book and existing Alien-Nazi-Antarctica research seems to be a good idea.

_____________________________

Theoretical physicist’s summary

We asked a theoretical physicist if he would comment on the mathematical physics section of the book. He is a respected academic with a Ph.D. in Theoretical Physics (quantum mechanics, electrodynamics and relativity) and over 200 international scientific publications in journals from several countries. His first language is not English, but his English is nonetheless excellent.

1. The mathematics is genuine. The education level of the author would have to be Ph.D.

2. It is a model. In Physics we have many models, and we must consider them all with respect if they don’t lead to experimental contradictions.

3. For example, String Theory is a model. Some people accept it, and others (such as Roger Penrose) do not believe in Strings. But the final word is in the experiment.

4. This presents a Photon Model which reproduces known results in Physics, but it also admits (which is important) the involvement of the Ether. In my personal opinion: Current Physics will advance if it accepts the existence of the Ether.

5. This is an innovative model… and in a few aspects it reminds me of extensions from other models (for example, Tewari’s model for the electron).

6. The ‘Ghost-balls’ remind me of some of Tesla’s experiments.

7. It employs 5 and/or 6 dimensions, which is normal in Physics. For example, the Kaluza-Klein Theory uses a 5-dimensional space.

In summary: the model presented in this material has genuine ideas and mathematics. Separately from that, it may or may not be successful in describing Nature. If this material is rejected, then one must reject many, many similar scientific papers that each day are published in the Journals of Physics.

_____________________________

David Wilcock’s Analysis

January 22, 2008

Hey guys,

You can publish this if you like.

I took a VERY detailed line-by-line look at this PDF. You didn’t mention the fact that almost all the illustrations are captioned in English, not in German. We need to get this text translated into English as soon as possible.

In my professional estimation this is a very substantial move forward in disclosure. There’s no telling whether the author’s dreams have any impact other than for his own subconscious symbol set – and it does appear that at least a third of the book’s content goes into various pieces of dream data.

Nonetheless, there are MANY correlations with other pieces of data. You look at the testimony in the black-ops marked-up version of Morris Jessup’s “Case for the UFO” – from Carlos Allende and two other insiders – and you see this ongoing discussion of the “S-M”, which apparently are the “Space Men,” and the “L-M,” which apparently are the Little Men / Lemurian-Men. I’ve already started writing about this on my website.

Here is Part Three of the article series where I began tackling this:

New Philadelphia Experiment Revelations, Part III

Here is Part One if you want to read it sequentially, as it goes into the Rainbow Project (Philadelphia Ex) and the new things I’ve learned about it recently… followed by a link to the marked-up version of the Case book:

New Philadelphia Experiment, Part I

You will notice that the physics model I begin outlining in Part One of this article series, New Philadelphia Experiment Revelations, is very, very similar to what we hear at the end of this book from an alleged German insider witness.

The data about “Lemurs” in this German witness’ book has many strong correlations with the data I’ve been gathering about the alleged Lemurians… enough so that they appear to be one and the same thing.

The excerpts from Allende et al’s liner notes of Case for the UFO appear to be describing, in part, a war that occurred between a terrestrial ET species centered in the Pacific – i.e. the Lemurians – and a non-terrestrial invading species which is very likely the Anunnaki, or what they refer to in code as only the S-M, or “Space-Men.”

It is entirely likely that while most of humanity was in a primitive state, at least one ET race was able to colonize the planet, and may also have interbred with native humans to some degree. It is also possible that evolution proceeded along parallel tracks on Earth, and the “Lemurians” are a particular strain of human being that advanced far more quickly and was driven into hiding due to a still-ongoing war with the so-called Anunnaki.

It seems clear from the testimony in Case for the UFO that there were wars where the Anunnaki harvested asteroids, using powerful gravity-control technologies, and fired them at Lemurian cities with devastating effects. This is apparently what forced them to take refuge into undersea bases, where they still reside to this day.

It is likely that a more informed review of the Sumerian texts would tease out the details of this war, since someone like Sitchin might not understand all of it without the proper context.

It is also quite possible, given Burisch’s testimony, that the “Lemurians” are actually travelers from one aspect of humanity’s future, as he has repeatedly described – and attempted to colonize the Earth at a time when humans of the era posed no threat, only to find themselves embroiled in a major war with an opposing ET faction.

Allende et al’s testimony in “Case” further correlates a variety of UFO sightings with an apparently well-known body of data about these Lemurian craft – including the fact that a form of slag builds up on the exterior of the craft as a result of their encounters with earth materials as they travel, and they have a function where they can slough off this material, which then pours off the craft as a molten liquid. Deacon’s recent testimony also indicates the Anunnaki as an active influence, offhandedly mentioning an “Enki ship.”

I also have a mysterious testimony that came in, via a colleague, from a Russian scientist who quoted a series of books that he claims all have bits and pieces of this story. The basis of the Russian’s story is that a major Lemurian base existed in Antarctica, with the species still living and working there, and the Nazis formed a pact with them during World War II. This completely correlates with what I heard. I have been sitting on this and haven’t even told you about it before, and now we see the same thing in an entirely different form.

I actually bought every book the Russian scientist referred to in his letter but have not yet had the time to study all the references. There are an astonishing number of pieces he brought together in this one letter and I have confirmed that each book has the contents he speaks of – I just haven’t had the time to read them all in total.

I’ve long suspected that more of this Anunnaki-Lemurian war story would come out as new whistleblower testimony came to the fore, and that appears to be what is happening here.

Daniel also said there were Atlantean ruins under the ice in Antarctica, and that the Third Reich migrated to South America after World War II – specifically the southern tip of Brazil. He saw artifacts they gathered from there, implying there must be a base of at least some capacity in Antarctica that we are not normally privy to.

There are a variety of other correlations with things I heard from Daniel’s testimony that are specific and unpublished, things I’ve never gone public with and have not seen elsewhere. These alone would be sufficient to warrant a deeper investigation.

Furthermore, I studied the physics model the German author is giving, since most of it is in English. Again, there are a great deal of correlations with what I’ve heard from Daniel and from another key witness I will call Clark, who I haven’t had reason to discuss before.

These physics correlations are far too specific to be simply a product of chance – including the six-dimensional frame, the toroidal model where our 3D is but the exterior of a “hollow sphere,” and the idea (only implied here) that time-space is the region on the interior of the hollow sphere – the mirror-opposite of our own reference frame.

There is also material in the German text about the interchange of space and time causing volumetric contractions and expansions of time. This is not that far from existing relativity models, but nonetheless the specifics of how he articulates it are very similar to things I’ve heard from Daniel in the past. From what I know of physics equations I’ve seen when studying these alternative models, it does appear to be very well thought out and sound.

There should be utilities out there allowing you to do a fairly decent translation automatically within a PDF file. It’s all the better that the vast majority of the illustrations are already in English. I would consider it highly likely that a substantial percentage of the non-dream portions of this witness’ testimony will turn out to be accurate.

I think it is wise to hold back on the Russian testimony for now until we see if anyone else has correlative data to support this. The inevitable challenge we face is of people who take existing pieces and want to fabricate a story. While this may seem a great way to get your 15 minutes, I consider these hoaxes a spiritual crime, and most of them never make it through the gate anyway.

– David

_____________________________

Preface
Preliminary translation by anonymous translator

Here is the translation. I know that some sentences sound wrong… but they also do in German. This is his style.

I tried to keep the translation as original as possible. [Some notes have been added within the text.]

Regards,
[ ____ ]

Preface (Vorwort)

Hello, my name is Barabou Vedu. I was born in 1983, and until I was 15, I was trapped inside an alien base somewhere in the eternal ice. Beside English, we also spoke Indian in this base. I think in Indian my name means: “May you be his firstborn son of the Moon!” Strange name, isn’t it? Seriously, who would name his son like this? Having such a name, you might as well let yourself be lined up against a wall to be shot. Was this name supposed to just make me furious, or did it have another reason as well? In addition, my father in our base [translator’s note: later he talks about another father who also gives him a Turkish passport] had a similar idiotic name. His name was Hohunarao Vedu. I think this means in Indian: “May you be someone who will be bathed (man of) Moon.” In the world of the symbols in our base, this meant as much as: “Though you are not of pure clear spirit, you deserve to be washed clean with clear pure spirit.” This ritual of the washing clean of one’s own dirty spirit with clean clear spirit could be connected to the common baptism ritual here in the world outside.

My mother in our base also had a very strange name. Her name was Wara, which means in Indian “Swan”, I think. In the world of the symbols in our base, this meant that you belonged to the light blue-green side of the spirit on which all divine entities are at home as well. Alone, my elder brother, eight years older, had a name without a religious background. His name was simply Magba, which means in Indian as much as tenth Moonhouse. I can’t say why they spared him all this religious stuff in his name.

At the start, I spoke about our alien base being a former alien base. By this, I wanted to state that in present time our alien base is not any more under extraterrestrial control, but probably under terrestrial control. The reasons for this are obvious. For example, there were scientists in our base who spend nearly each whole day developing new physical theories. Well, which alien lets his own technologies be examined by terrestrial scientists, so that they can tell him how that works what one has carried around the whole time with oneself? One can be sure that everywhere, where scientists walk around, terrestrial powers have taken the power. So, probably, also in our base.

But in this connection I’d like to mention that the scientists of our base kept the same demonic dressing protocol concerning the choice of their clothes as we did. This protocol stated that the color of one’s clothes must match one’s current emotional state. You wore red in anger, orange in pain, yellow in fear, green in kindness, blue in love and violet in grease [translator’s note: ‘grease’ in German also means to make sure someone else doesn’t get caught while doing something]. The color white could be combined with the colors green and blue, and black with the colors orange and red. The choice of these colors for the corresponding human emotions corresponded to the coloring of their spirit, which changed colors depending on one’s state of mind.

Why so many scientists took care of our base isn’t difficult to guess. A place in which so many exotic phenomena like vector viewing into the future, “soul travel” by machines, technical telepathy, or eye-movies of people could be watched, shouts for a scientific examination. The interesting things the scientists of our base discovered during their examinations, one can readily read in the chapter “Appendix of our physical theories of tomorrow”.

This chapter about our physical theories might be a real treasure trove to physicists with an interest in the Nobel Prize. Those who think highly of themselves, and would like to prove to all of us that alien bases really exist, are free to earn their Nobel Prize at my expense. I think that’s only fair. Because I don’t own these ideas either. And I don’t see why I should take these theories with me to my grave, just because it isn’t yet the right time for these theories.

The ether-theorists of the 19th century were not that wrong in their ideas about the world. But I’m afraid they should have experimented with 4 to 5 dimensional ethers instead of three-dimensional. Because then their physics would have been perhaps a little more successful, and Einstein wouldn’t have blocked the further development of ether-physics by his SRT [Special Relativity Theory]. But that’s a completely different problem.

So what to do to prove that their ether-physics is more correct than our ether-less physics of today? The way it looks, first SRT must go before one can continue with classic ether-physics – the physics of the extraterrestrial? But this is easier said than done. Einstein is an acknowledged expert in physics. To attack him and to claim new experiments about the topic of SRT, is a hard nut to crack for modern physicists. Especially as the disproof of SRT in favor of our 4-dimensional ether-physics indeed needs very demanding experiments for light propagation.

For example, one would have to measure the linear speed of light between two places, without using reflected light. A measurement which unfortunately currently still involves high measuring-errors. But a change from the physics of relativity to the physics of ether-theory includes, as I will show in my report “Their Theories”, great physical discoveries.

Among other things, one can for example prove that the Theory Of All could be a fractal hollow-sphere-model in a 6-fold or 6-dimensional space. In such a fractal hollow-sphere-model of All, the world repeats itself in the micro as well as in the macro, again and again at each level/plane of size. No matter where and no matter in which of these level-sizes one is currently situated, the world always looks the same.

Funnily enough, one can at the same time take this Theory Of All also totally informally to a string theory. Because if the world repeats itself on the level of a universe or of a photon again and again in the micro, then one has automatically contracting since produced by gravitation, fields in a space. Combined with a 4-5 dimensional hollow-sphere form of these fields, the result in a 6-dimensional space with a shifting of space dimensions 1 — 3 to 4 — 6 are contracting strings to expanses in space.

And so we get from the original hollow-sphere-theory an incomplete string theory!

_____________________________

From Thomas Kirschner, editor of the German NEXUS Magazine:

Dear Bill,

Our team here spent a few hours analyzing the document, and I made a few calls to other “well-connected” friends.

It’s probably too early to make a definite assessment, but my general impression is to be careful.

This document consists of two parts: 95% of it is a fantastic story, and my own judgment is that it isn’t more than that. I could be wrong, of course, and some of my friends disagreed with me. Still, I would advise everybody to be extremely cautious. Besides that, this part of the book doesn’t really contain much useful information (in the sense that the material could be related to anything in the “real” world).

It does make claims that bear similarity to certain Montauk-concepts (the author talks of a certain chair that can be used for remote viewing etc.) – but anybody could come up with such a story, having read the Montauk books and other far out material.

The physics section is something else, and it seems to me rather unrelated to the rest of the book, which makes it seem to me as if the author just copied it into his own story to gain credibility. But coming back to the physics:

One of my friends is a really, really well informed scientist, who is familiar with the work of Dr. Burkhard Heim. He told me that the material seems to be definitely based on Burkhard Heim’s work, and he had the impression that it even goes beyond that – like a practical application. If that’s true, then it would be really something.

I asked for my friend’s opinion about the rest of the book, but he did not want to go into detail. However, he assured me that it is indeed “something”. He also assured me that the Russian video documentary, which I have not seen yet, would be “very revealing”.

So, that’s really all I can tell you at the moment about this book. But I learned some other interesting things in that phone conversation:

My friend assured me that the information from Henry Deacon and Dan Burisch is absolutely head on, especially the claims regarding T1 and T2 [timeline 1 and timeline 2]. He said that there are two calculations regarding that fork-point: One says that it might come already this year. The other says that it will come right at the end of 2012.

I asked him: “Why do you think that it would come now? Do you think the Mayans made a mistake?” His answer was that the Mayans were surely right, but that our calendar system could be wrong, i.e. the “real” 2012 might be earlier than we think.

Then I asked him for the physical, scientific evidence for this [the timeline split], and he said that it would come from Burkhard Heim and from physicist Kip Thorne. He urged me to Google for “Thorne” and for “Vega”.

He also said that for top-ranking scientists who work for the (shadow-) Government, Montauk is absolutely standard knowledge. Whether it happened exactly as in the famous Montauk books would be another question, but T1 and T2, as Dan Burisch describes them, are current topics of discussion.

I asked him about Planet X and if he thought that was a real danger. His comment was that it might only be for those who stayed on T2. Then I asked him how he imagined the transition from our time into T1 or T2, and he said that he imagined that we will go into some kind of tunnel, or enter a short sleep, that might only take seconds, and then we’re in the new time.

To conclude: these are all exciting topics. But let’s try to not get carried away. Remember, everything that I’ve just written is just human opinion, and each of us could be wrong.

The only “hard” evidence that can be checked out is that last section of the book, which contains scientific material. Whether that is real has still to be researched. And whether that author came up with it by himself or whether he just copied it from some book, is another unanswered question. I myself would tend to the second conclusion.

_____________________________

From E.S., German-speaking researcher :

E-mail exchange with Barabou Vedu – a Summary

After finding out his email address in late January 2008, I contacted Barabou Vedu with a couple of questions.

He replied with the following : The base New Berlin was most likely NOT founded by the Nazis: he himself was shown inside the base several “eye-movies” dating back to the 17th century. He concludes that the base must therefore be much older. As for a possible Nazi- Alien connection, he says that he does not know anything about that. He mentions that were many tall, blond and blue-eyed people present. As for the “Indian” languages spoken in the base, he says that he was often addressed in an unknown language that was called Indian. However, he only remembers a handful of words from that language.

As for the advanced physics in the last part of the book, he explains that modern physics can not progress without integrating the idea of the “Ether” into their models. He lists a number of possibilities that should result, albeit with different probabilities, from the advanced physics in the book: among these are, Space Travel at any desired speed (even greater than C), leaving our 3-dimensional space in the 4th or 5th spatial direction, use of Ether as an information storage medium, with advanced Mind Control technology as a consequence.

****************

In my next email, I asked about his personal life and circumstances. BV replied that is was rather tough going and he mentions for the first time “terrible traumatizing events” which he would rather forget forever.

He says that he finished school and then did not do anything for years as he did not comprehend that someone who wants to have a job must go out and find a job. In 2004, he finally decided to try and learn a craft. He mentions that he even dreamed of studying math and physics, but this came to nothing as he realized that intellectual work was not for him.

Being asked whether he had approached publishers with his book, he said that he had not- but that he would not mind someone doing this, so long as he could remain anonymous.

****************

I decided to challenge him on several points that I found hard to believe when I read his report.

To give just two examples, I asked where the Coca-Cola cans in the secret base came from: Barabou Vedu says he does not know, but they may have been received in exchange for Advanced Technology.

In another surreal bit of that email string, I remarked that a film about the great famine in America can hardly have been called A Film about the Great Hungary. I explained to him that Hungary is a country in central Europe. He replied, perplexed, that those films he saw about “Hungary” talked about hunger and poverty in the 30s in the USA.

I also asked him why he says that the base was in Antarctica, when on the cover page of his printed edition there is a poem that reads “The future has already begun here, under the ice of an Arctic glacier” ? I asked, which one is it now?

He replied, that while writing the report he had become more and more convinced that the base was actually NOT located in Antarctica but near the North Pole.

****************

After several more email exchanges with BV, I suggested that we finally meet in person. BV declined, but he agreed to participate in a conference call that (as Bill had suggested) I set up with BV and another German-speaking researcher.
During our phone call, we put forward the following to BV:

Q : Do you have a visual memory of your father?
BV: No, all I remember is that he used to sit in a corner and cry when I was in the (bereschewan) seat.
Q: What is your mother tongue?
BV: My mother tongue is English. I only started learning German once I got out of the base
Q: Do you have any “missing time” in your life ?
BV: Yes, between the autumn of 1996 and around March 1997, I cannot remember a single thing.
Q: Give us an example of those “terrible, traumatizing things” that you witnessed at the base ?
BV: One day my friend and mentor, Walter Pfeffer went up to the glass roof of the base, and he looked through the glass and said “Well, spring is here finally !”

We also asked BV what exactly the purpose of the base and its operations was: he said one purpose was to go into people’s minds, to read their thoughts, and influence them.

Another purpose of the Chair was to share new ideas with scientists. It was also used for telling bad people to better themselves and for making warlike people more peaceful.

As for the science, BV adamantly insists that he saw pictures (not formulas) in the “eye-movies” inside the base and that he wrote down the formulas and equations years later.

===============

I discussed the above exchanges with Bill and Kerry on several occasions: we all agree that Barabou Vedu must have gone through some very traumatizing experiences, very likely involving advanced Mind Control technology.

===============

After the phone call, we sent to BV a link to an important, leaked NSA document that summarizes in detail the different Mind Control techniques developed in the US over the last 40 years.

BV replied, commenting that the technology that was used on him must have been much more advanced than that. He suspects that the NSA scientists must have come across something very advanced in a strange place and must have been trying to replicate it ever since. With limited success, he says.

He finds interesting that the NSA’s MC masters ask their victims to write diaries.. much as he himself was encouraged to paint whatever he had seen in the eye-movies inside the base. He concludes, there are striking parallels between the NSA experiments and his own experiences, but that in his case the transmission of pictures directly into the brain was far advanced.

Lastly, and this is the last we heard from BV: He categorically refuses to consider any kind of regression or hypnosis therapy in order to come to the bottom of his strange tale.

He insists that his personal “therapy” has been the writing of the report, and the “case is closed” for him.

****************

The fact that BV lives de facto in hiding – and yet he made a great effort writing, printing and distributing his work is another, fascinating contradiction in this whole story. It is one of many, we feel. With so many fundamental questions unanswered, it is hard to believe that the “Base New Berlin” story is really to be taken at face value.

On the other hand, we clearly feel that BV is a troubled man who has suffered greatly through something that is shrouded from his conscious memory at the moment. His decision to call the case closed is understandable and we respect it. Although it may only be temporary .. as we hope.

_____________________________

Click here to download (PDF 18.6 Mb).
Click here to download as a torrent.

Click here to view the May 2006 Russian TV documentary NAZI BASES IN ANTARCTICA, which contains some extraordinary and apparently authentic images.

Click here for the Jim Marrs article ANTARCTICA: A NAZI BASE?

Click here for the NEXUS article BRITAIN’S SECRET WAR IN ANTARCTICA.

Click here for the article EXPLORING THE ANTARCTIC REICH.

Click here for the article EXPLORING THE ANTARCTIC REICH – Part 2

Click here for the excellent summary article THE NAZIS AND THE ALDEBARAN MYSTERY.

In three of the above five articles, ‘Neu Berlin’ or ‘Neuberlin’ is referenced as a Nazi base in Antarctica. The source of this in each case is a 2003 report by Russian researcher Dr Konstantin Ivanenko.

SOURCE: http://projectcamelot.org/base_new_berlin.html

Zombies Leak: Camelot Insider Leaks Chemtrail Connection to Zombie Outbreaks

Zombies Leak: Camelot Insider Leaks Chemtrail Connection to Zombie Outbreaks

I received the following input from an undisclosed source… with regard to the truth of what is going on with chem trails and what may be contributing to this growing proclivity for zombi-izm in America if not the rest of the world.  Suffice to say that this information came to this person from channels within EUCOM.  Food (!) for thought.

Chemtrails have been employed for numerous desired effects. These include ‘sickening’ the general populous and lowering the soul vibration/hindering the consciousness of the populous. This is coupled with contamination of the water/food supply to achieve the same things. 

People know this is happening, they only have to look into the sky to see it.

In recent years we are now seeing, what I call the second phase. The introduction of designer drugs that contain chemical compounds that either ‘activate’ or act as a catalyst for the chemicals dispersed over us in the form of chemtrails. 

The active chemicals or molecular structures in these so called ‘Bath salts’ or whatever other synonym you know them by, could also be implemented in regular pharmaceuticals. Drugs, lotions, moisturisers, make up etc. 

Nevertheless, no matter how you receive the ‘active agent’, the outcome will be the same. Psychosis, insanity, mental breakdowns. Whatever. The behaviour that has been experienced in Florida recently, I fear is going to become commonplace as the frequency and intensity of both ingredients increase. 

This is how I feel they are trying to cause mass hysteria and panic, all within a comfortable time frame of the 2012 Olympics and the upcoming December events (whatever they may be.)

My reply which should at least ease the minds of some… was as follows:

I agree that it certainly looks very plausible that whatever is in the chemtrails contains a number of actionable agents that could increase receptivity to outside electromagnetic or other affects and also lowering immunity etc.

The good news is that if you raise your frequency they can’t get at you in any case.  Of course that doesn’t help that those around you may be vulnerable and losing their minds or whatever the case may be.

-Kerry Cassidy, Project Camelot

 

SOURCE

VETERAN: We didn’t “serve our country”; We serve the interests of Capital

VETERAN: We didn’t “serve our country”; We serve the interests of Capital

“I’ve seen a ton on the facebooks about “thanking veterans for their service.” As a veteran let me just be very straightforward and honest with you. We didn’t “serve our country”; we don’t actually serve our brothers/sisters or our neighbors. We serve the interests of Capital. We never risked our lives or spent months on deployment away from our family and friends so they can have this abstract concept called “freedom”. We served big oil; big coal; Coca-Cola; Kellogg, Brown, and Root and all the other big Capital interests who don’t know a fucking thing about sacrifice. These people will never have to deal with the loss of a loved one or the physical and/or psychological scars that those who “serve”, and their families, have to deal with for the rest of their lives. The most patriotic thing someone can do is to tell truth to power and dedicate yourself to building power to overthrow these sociopathic assholes. I served with some of the most real and genuine people I’ve ever met. You’ll never see solidarity like the kind of solidarity you experience when your life depends on the person next to you. But most of us didn’t join for that; we joined because we were fucking poor and didn’t have many other options.” -Anonymous

TOP SECRET AEROSPACE TECHNOLOGY: Michael Schratt – Beyond Blue

TOP SECRET AEROSPACE TECHNOLOGY: Michael Schratt – Beyond Blue

http://youtu.be/woMtIHwRL2w

Michael Schratt is an aviation historian. As a cutting-edge researcher into classified projects and unidentified craft he has met with and interviewed numerous scientists and aerospace engineers, pilots and executives from NASA and the defense industry. He investigates clues to planes that have been documented as having been flown by military from within both secret and top secret programs… He firmly believes that American tax-payers have every right to know where our money is being spent. Many of the craft he has documented are being funded within black projects… And he states that billions are being spent today on these craft. Some will only be flown once.

In this fascinating interview shot on the fly, during an impromptu meeting, Michael talks about many of the more prominent cases of classified and unclassified but often mysterious planes and aircraft that have graced our skies but remain elusive from history and the public record.

http://youtu.be/OcGJpd2aW_c

Michael Schratt | Code Blue

This is the second part of the interview with Michael Schratt. I apologize for the long delay in getting this out there. I brought on board a new editor to help give this a more professional look, Ben Northenor. I think you will notice the difference!

This interview is a great overview of the UFO, above top secret, black aircraft being developed by our secret government for use in a variety of scenarios. Not the least of which is potentially Project Blue Beam. As an in depth researcher, a self-labeled aerospace historian and someone who has secret sources within the aerospace industry, Michael is a dynamite guy to have on ones team.

Note: If you enjoy this interview please consider making a donation.

Special thanks to Ben Northenor for donating his time and editing skills to Project Camelot. And to Michael Schratt for supplying the stills.

Kerry Lynn Cassidy
Project Camelot
January 2011
Los Angeles, CA

 

SOURCE: http://projectcamelotproductions.com/interviews/michael_schratt/michael_schratt.html