As the Occupy movement carries out massive May Day protests around the country, the FBI Joint Terrorism Task force is trumpeting the arrest of “self-proclaimed anarchists” and “terrorists” who allegedly conspired to destroy a bridge in Ohio. Integral to the development and advancement of this plot, however, were FBI agents themselves and an informant with a drug and robbery record.
Douglas L. Wright, 26; Brandon L. Baxter, 20; and Anthony Hayne, 35, Connor C. Stevens, 20, and Joshua S. Stafford, 23, were arrested by the FBI on April 30, just in time to make the announcement as the nation turns its attention to May Day protests.
The affidavit reveals a plot by the FBI that continues a pattern of behavior in “terrorism” investigations against political activists. Most importantly, undercover FBI agents helped shape the “plot,” offered advice on how and where to use explosives, and allegedly sold explosives to the activists.
Pervasive Use of Informants and Undercover FBI
The informant in the case has been working with the FBI since July 20, 2011, and has a criminal record including possession of cocaine, conviction for robbery, and four convictions for passing bad checks. (The FBI’s proclivity for using down-and-out criminals was a key issue in the “Operation Backfire” Earth Liberation Front cases. The lead arsonist and informant, Jacob Ferguson, had a heroin addiction, and is now back in prison on drug charges).
The informant and the others haphazardly talked about various plans, starting with the use of smoke grenades and destroying bank signs off the top of large buildings.
For instance, on April 10, 2012: ““…BAXTER explained that he does not know what to do with the explosives and he has never considered blowing anything up before.”
Conversation shifted to other outrageous plans. According to the affidavit, “WRIGHT joked that he would wear a suicide vest and walk in and blow himself up, but advised he would have to be very drunk.”
“The CHS [the informant] asked the others what it is they wanted to do… BAXTER said that they had never decided on the bridge, they were just throwing out options and they had never decided on anything.”
FBI Guidance
The defendants flitted between hyperbolic conversations -– some about destroying bank signs, some about destroying a boat, some about a bridge — and various spy tactics such as secret email accounts, wiping computer drives, and disrupting surveillance. At every step of the way, the informant (who was paid nearly $6,000, plus expenses) and undercover FBI agents were there to correct course.
At one point Wright asked the undercover FBI agent “if there was any work he could do… to pay for the items he was going to purchase” from the agent. Later, Connor Stevens told Wright that he no longer wanted to be part of the plan, but wanted to know if the informant might hire him to do some work on his house.
At another point, Wright told the informant that he and others thought one of the individuals involved was an undercover cop (which he was). To allay his fears, the informant said he would help provide the explosives.
Clamoring to Thwart “Terrorist Plots”
U.S. Attorney Dettelbach called this a violent terrorist plot, and said: “The defendants stand charged based not upon any words or beliefs they might espouse, but based upon their own plans and actions.”
What’s troubling is that the government has had a heavy hand in creating the very plot it thwarted.
And on top of that, the defendants, by the admission of the FBI, said repeatedly that they had no intention of harming anyone. At one point Baxter and Wright “stated they don’t want people to think they are terrorists.”
This isn’t an isolated instance.
The criminal complaint reads like the spitting image of the case of Eric McDavid, who was coaxed by an undercover FBI operative named “Anna.” In that case, like this one, the FBI supplied bomb making recipes, bomb making materials, and attempts to distill activist boasting and hyperbole into a coherent plan.
McDavid did nothing, and was arrested on conspiracy charges, like these defendants have been. As readers of this site know, conspiracy charges are the fall-back for the government when there is not enough evidence to get anything else to “stick.”
Demonization of Anarchism
In addition to a continuation of undercover informants and FBI-manufactured plots, this case also reflects on on-going focus on demonizing anarchists.
The government’s press release proclaims that the defendants are “self-proclaimed anarchists.” The affidavit notes that they attended anarchist protests and carried anarchist flags.
The affidavit also says that the defendants talked about anarchists “rioting and destroying each city” that holds May Day protests, and that it will be “off the hook.”
Demonizing anarchists has gone one for over a century, of course, but in recent years the rhetoric has dovetailed with “War on Terrorism” hysteria.
For example, in Scott Demuth’s case, the government argued that: “Defendant’s writings, literature, and conduct suggest that he is an anarchist and associated with the ALF movement. Therefore, he is a domestic terrorist.”
It should come as no surprise, then, that the announcement of these arrests was carefully unveiled yesterday, so that the top news story this May Day would not be about how anarchists are preventing home foreclosures, starting community gardens, teaching collective organizing skills, and re-framing class consciousness, but about how they were part of an FBI-guided “terrorist plot.”
On March 15, over 1,500 beekeepers and anti-GMO protesters marched through the streets of Warsaw, depositing thousands of dead bees on the steps of the Ministry of Agriculture in protest of genetically modified foods and their pesticides which are together largely responsible for the killing off of bees, butterflies, moths and other beneficial pollinators in great numbers.
Later that day the Minister of Agriculture, Marek Sawicki, announced plans to ban MON810, which has already produced millions of hectares of pesticide resistant “superweeds” in the US.
The Polish Beekeepers Association organized the protest, joining forces with International Coalition to Protect the Polish Countryside (ICPPC) and the Coalition for a GMO Free Poland. Targeting Monsanto’s MON810 GM corn in particular, they also called for a complete ban on all genetically engineered crops as well as the pesticides found to be most damaging to the environment (and particularly to bees).
In 2008, the Polish Parliament banned GM feed, including both the planting and importing of GM crops. “Despite this progressive step,” reports Food Travels, “the European Commission has refused to accept regional bans on GMOs, keeping Polish farmers, producers, and activists on the offensive.”
Regardless, says the ICPPC, “None of the nine European Union countries that have already prohibited MON 810 did so by asking the permission of the EU.”
There was a great variety of attire as beekeepers dressed in their work bee suits and masks and ran their hive smoke guns as they marched, many wore yellow jackets with the famous Einstein quote, and many more original signs, props, and costumes. Go here for more photos.
The ICPPC is asking Polish residents to write Minister of Agriculture Marek Sawicki, demanding that he implement an immediate moratorium on GM crops, without waiting for EU approval.
Subject: Government buying out all the 5.56 Military surplus ammo and is telling ammo dealers to stop selling to their vendors and civilians.
I have been calling allot of ammo distributors and ALL of them are telling me that our government is all the 5.56-.223 cal military surplus ammo. And their also telling the ammo distributors stop selling the ammo to civilians and their vendors because the government is buying it all up from everyone they can. I have also spoken with theses ammo dealers and they told me that the 5.56 and .223 ammo is going way up in price.
For instance…I paid $149.00 for federal surplus 440 rounds of steal core and now at the gun show today it was selling for $440.00 for 420 rounds. I have checked and ALLOT of places online are out of the Military surplus ammo by federal. M193 and M855 SS109 ammo. I did find one place still carrying both these ammo’s and good prices still, but their the only place I could find. If interested let me know and Ill forward the info.
I was also told by the same ammo dealers that the government is going to buy all the 9mm and .45 ammo up, so hurry and buy while you can at the lower prices while still available. Guess if they won’t take our guns because they figure that there are some many out there, they will just buy all most popular military calibers. Can’t shoot a gun with no ammo…stock up now while you still can.
They also said the government will continue to purchase all the ammo through the presidential election and they will continue to until the president tells them to stop. And if obama gets reelected instead of rejected, you know he wont stop the purchasing of all the ammo mentioned above.
Today Andrew Rosenthal of The New York Timespublished a thoughtful columndiscussing the untenable position taken by the government in response to the ACLU’s two Freedom of Information Act lawsuits seeking information about the CIA’s targeted killing drone strike program, including its targeting of U.S. citizens. As Rosenthal explains, “the government is blocking any consideration of these petitions with one of the oldest, and most pathetic, dodges in the secrecy game. It says it cannot confirm or deny the existence of any drone strike policy or program.”
Rosenthal goes on to highlight the reasons why the government’s position is untenable:
That would be unacceptable under any condition, but it’s completely ridiculous when you take into account the fact that a) there have been voluminous news accounts of drone strikes, including the one on Mr. Awlaki, and b) pretty much every top government official involved in this issue has talked about the drone strikes in public.
He also highlights the arguments made in the ACLU’s latest legal brief in the cases, excerpting from our “13 pages of examples of how ‘the government has already specifically and officially acknowledged the program that the CIA now says is secret.'”
Perhaps most telling is Rosenthal’s comment about how little progress we have made since the worst secrecy abuses of the Bush era:
Governments have good reasons for keeping secrets – to protect soldiers in battle, or nuclear launch codes, or the identities of intelligence sources, undercover agents and witnesses against the mob. (Naturally that’s not an exhaustive list.) Governments also have bad reasons for keeping secrets – to avoid embarrassment, evade oversight or escape legal accountability.
The Bush administration kept secrets largely for bad reasons: It covered up its torture memos, the kidnapping of innocent foreign citizens, illegal wiretapping and other misdeeds. Barack Obama promised to bring more transparency to Washington in the 2008 campaign, but he has failed to do that. In some ways, his administration is even worse than the Bush team when it comes to abusing the privilege of secrecy.
He concludes:
So this is not a secret program, but the government continues to hide behind the secrecy shield to avoid turning over the legal document justifying (or at least rationalizing) it. It’s even using the “can’t confirm or deny” fabrication about the existence of the document itself.
My guess is that the Obama administration just wants to avoid public disclosure, scrutiny and accountability. I’d ask someone at the Justice Department, but they wouldn’t be able to tell me, because it’s a secret.
Rosenthal’s column joins the chorus of voices calling for greater transparencyaround targeted killing and for a sensible government response to the ACLU’s FOIA requests. The government must provide the public with the information it needs to assess the legality and wisdom of the CIA’s global targeted killing campaign.
The Feds raid the home of unofficial Anonymous spokesperson Barrett Brown.
They’re after his Twitter records, chat logs, IRC conversations, his computer, and apparently everything else, according to the search warrant obtained by BuzzFeed.
Last month, the FBI raided the Dallas home of Barrett Brown, the journalist and unofficial spokesperson for the Internet hacktivist group Anonymous.
According to the search warrant, the agents were after any information from Brown involving a “conspiracy to access without authorization computers,” one of three serious charges listed in the document.
The Feds seized Brown’s computer and cellphone, searched his parent’s home as well, and demanded his Twitter records, chat logs, IRC conversations, Pastebin info, all his Internet browsing activity, and almost any form of electronic communications Brown conducted.
The warrant, exclusively obtained by BuzzFeed, suggests the government is primarily after information related to Anonymous and the hacking group Lulzec.
The authorities also appear to be interested in info on two private intelligence contracting firms, HBGary and EndGame Systems, two companies Brown has frequently clashed with and criticized on a website he founded called Echelon2.
Brown, a 30 year old journalist who has written for Vanity Fair and the Guardian, is perhaps the most high profile target thus far in the FBI’s investigation into a series of hacks that have shaken the corporate and defense establishment.
Brown, currently at work on a book about Anonymous, believes he’s being wrongly investigated. “I haven’t been charged with anything at this point, although there’s a sealed affidavit to which neither I nor my attorney have access,” he emailed BuzzFeed. “I suspect that the FBI is working off of incorrect information.”
Scanner uses ‘terahertz’ spectrum – between infrared and microwaves
Can see through walls, wood and plastics
Doctors could use small, cheap devices to see tumours inside body
Comic-book superpowers could become reality as scientists have designed a phone that works as ‘X-Ray spex’.
A hi-tech chip allows a phone to ‘see through’ walls, wood and plastics – and (although the researchers are coy about this) through fabrics such as clothing.
Doctors could also use the imagers to look inside the body for cancer tumours without damaging X-Rays or large, expensive MRI scanners.
A hi-tech chip allows a phone to 'see through' walls, wood and plastics - and (although the researchers are coy about this) through fabrics such as clothing)
Close up of a CMOS chip - a new version of the commonly used chips would allow users to capture images 'through' walls and even inside the human body
The researchers claim it could allow DIYers to detect studs within walls, or allow businesses to detect counterfeit money.
At present, it’s designed to work over a short range – and works with a normal-sized microchip that could fit into phones or other handheld electronics.
The team’s research involves tapping into an unused range in the electromagnetic spectrum.
But the terahertz band of the electromagnetic spectrum, one of the wavelength ranges that falls between microwave and infrared, has not been accessible for most consumer devices.
‘We’ve created approaches that open a previously untapped portion of the electromagnetic spectrum for consumer use and life-saving medical applications,’ said Dr. Kenneth O, professor of electrical engineering at UT Dallas.
‘The terahertz range is full of unlimited potential that could benefit us all.’
X-ray spex? At present, it's designed to work over a short range - and works with a normal-sized microchip that could fit into phones or other handheld electronics
Using the new approach, images can be created with signals operating in the terahertz (THz) range without having to use several lenses inside a device. This could reduce overall size and cost.
The second advance that makes the findings applicable for consumer devices is the technology used to create the microchip.
Chips manufactured using CMOS (Complementary Metal-Oxide Semiconductor) technology form the basis of many consumer electronic devices used in daily life such as personal computers, smart phones, high definition TV and game consoles.
‘CMOS is affordable and can be used to make lots of chips,’ Dr. O said. ‘The combination of CMOS and terahertz means you could put this chip and receiver on the back of a cellphone, turning it into a device carried in your pocket that can see through objects.’
Due to privacy concerns, Dr. O and his team are focused on uses in the distance range of less than four inches.
Consumer applications of such technology could range from finding studs in walls to authentication of important documents. Businesses could use it to detect counterfeit money.
Manufacturing companies could apply it to process control.
There are also more communication channels available in terahertz than the range currently used for wireless communication, so information could be more rapidly shared at this frequency.
Terahertz can also be used for imaging to detect cancer tumors, diagnosing disease through breath analysis, and monitoring air toxicity.
‘There are all kinds of things you could be able to do that we just haven’t yet thought about,’ said Dr. O, holder of the Texas Instruments Distinguished Chair. The research was presented at the most recent International Solid-State Circuits Conference (ISSCC). The team will work next to build an entire working imaging system based on the CMOS terahertz system.
By Rob Waugh
PUBLISHED: 02:50 EST, 19 April 2012 | UPDATED: 03:03 EST, 19 April 2012
One of the more extreme government abuses of the post-9/11 era targets U.S. citizens re-entering their own country, and it has received far too little attention. With no oversight or legal framework whatsoever, the Department of Homeland Security routinely singles out individuals who are suspected of no crimes, detains them and questions them at the airport, often for hours, when they return to the U.S. after an international trip, and then copies and even seizes their electronic devices (laptops, cameras, cellphones) and other papers (notebooks, journals, credit card receipts), forever storing their contents in government files. No search warrant is needed for any of this. No oversight exists. And there are no apparent constraints on what the U.S. Government can do with regard to whom it decides to target or why.
In an age of international travel — where large numbers of citizens, especially those involved in sensitive journalism and activism, frequently travel outside the country — this power renders the protections of the Fourth Amendment entirely illusory. By virtue of that amendment, if the government wants to search and seize the papers and effects of someone on U.S. soil, it must (with some exceptions) first convince a court that there is probable cause to believe that the objects to be searched relate to criminal activity and a search warrant must be obtained. But now, none of those obstacles — ones at the very heart of the design of the Constitution — hinders the U.S. government: now, they can just wait until you leave the country, and then, at will, search, seize and copy all of your electronic files on your return. That includes your emails, the websites you’ve visited, the online conversations you’ve had, the identities of those with whom you’ve communicated, your cell phone contacts, your credit card receipts, film you’ve taken, drafts of documents you’re writing, and anything else that you store electronically: which, these days, when it comes to privacy, means basically everything of worth.
This government abuse has received some recent attention in the context of WikiLeaks. Over the past couple of years, any American remotely associated with that group — or even those who have advocated on behalf of Bradley Manning — have been detained at the airport and had their laptops, cellphones and cameras seized: sometimes for months, sometimes forever. But this practice usually targets people having nothing to do with WikiLeaks.
A 2011 FOIA request from the ACLU revealed that just in the 18-month period beginning October 1, 2008, more than 6,600 people — roughly half of whom were American citizens — were subjected to electronic device searches at the border by DHS, all without a search warrant. Typifying the target of these invasive searches is Pascal Abidor, a 26-year-old dual French-American citizen and an Islamic Studies Ph.D. student who was traveling from Montreal to New York on an Amtrak train in 2011 when he was stopped at the border, questioned by DHS agents, handcuffed, taken off the train and kept in a holding cell for several hours before being released without charges; those DHS agents seized his laptop and returned it 11 days later when, the ACLU explains, “there was evidence that many of his personal files, including research, photos and chats with his girlfriend, had been searched.” That’s just one case of thousands, all without any oversight, transparency, legal checks, or any demonstration of wrongdoing.
* * * * *
But the case of Laura Poitras, an Oscar-and Emmy-nominated filmmaker and intrepid journalist, is perhaps the most extreme. In 2004 and 2005, Poitras spent many months in Iraq filming a documentary that, as The New York Times put it in its review, “exposed the emotional toll of occupation on Iraqis and American soldiers alike.” The film, “My Country, My Country,” focused on a Sunni physician and 2005 candidate for the Iraqi Congress as he did things like protest the imprisonment of a 9-year-old boy by the U.S. military. At the time Poitras made this film, Iraqi Sunnis formed the core of the anti-American insurgency and she spent substantial time filming and reporting on the epicenter of that resistance. Poitras’ film was released in 2006 and nominated for the 2007 Academy Award for Best Documentary.
In 2010, she produced and directed “The Oath,” which chronicled the lives of two Yemenis caught up in America’s War on Terror: Salim Hamdan, the accused driver of Osama bin Laden whose years-long imprisonment at Guantanamo led to the 2006 Supreme Court case, bearing his name, that declared military commissions to be a violation of domestic and international law; and Hamdan’s brother-in-law, a former bin Laden bodyguard. The film provides incredible insight into the mindset of these two Yemenis. TheNYT feature on “The Oath” stated that, along with “My Country, My Country,” Poitras has produced ”two of the most searching documentaries of the post-9/11 era, on-the-ground chronicles that are sensitive to both the political and the human consequences of American foreign policy.” At the 2010 Sundance film festival, “The Oath” won the award for Best Cinematography.
Poitras’ intent all along with these two documentaries was to produce a trilogy of War on Terror films, and she is currently at work on the third installment. As Poitras described it to me, this next film will examine the way in which The War on Terror has been imported onto U.S. soil, with a focus on the U.S. Government’s increasing powers of domestic surveillance, its expanding covert domestic NSA activities (includingconstruction of a massive new NSA facility in Bluffdale, Utah), its attacks on whistleblowers, and the movement to foster government transparency and to safeguard Internet anonymity. In sum, Poitras produces some of the best, bravest and most important filmmaking and journalism of the past decade, often exposing truths that are adverse to U.S. government policy, concerning the most sensitive and consequential matters (a 2004 film she produced for PBS on gentrification of an Ohio town won the Peabody Award and was nominated for an Emmy).
But Poitras’ work has been hampered, and continues to be hampered, by the constant harassment, invasive searches, and intimidation tactics to which she is routinely subjected whenever she re-enters her own country. Since the 2006 release of “My Country, My Country,” Poitras has left and re-entered the U.S. roughly 40 times. Virtually every timeduring that six-year-period that she has returned to the U.S., her plane has been met by DHS agents who stand at the airplane door or tarmac and inspect the passports of every de-planing passenger until they find her (on the handful of occasions where they did not meet her at the plane, agents were called when she arrived at immigration). Each time, they detain her, and then interrogate her at length about where she went and with whom she met or spoke. They have exhibited a particular interest in finding out for whom she works.
She has had her laptop, camera and cellphone seized, and not returned for weeks, with the contents presumably copied. On several occasions, her reporter’s notebooks were seized and their contents copied, even as she objected that doing so would invade her journalist-source relationship. Her credit cards and receipts have been copied on numerous occasions. In many instances, DHS agents also detain and interrogate her in the foreign airport before her return, on one trip telling her that she would be barred from boarding her flight back home, only to let her board at the last minute. When she arrived at JFK Airport on Thanksgiving weekend of 2010, she was told by one DHS agent — after she asserted her privileges as a journalist to refuse to answer questions about the individuals with whom she met on her trip — that he “finds it very suspicious that you’re not willing to help your country by answering our questions.” They sometimes keep her detained for three to four hours (all while telling her that she will be released more quickly if she answers all their questions and consents to full searches).
Poitras is now forced to take extreme steps — ones that hamper her ability to do her work — to ensure that she can engage in her journalism and produce her films without the U.S. Government intruding into everything she is doing. She now avoids traveling with any electronic devices. She uses alternative methods to deliver the most sensitive parts of her work — raw film and interview notes — to secure locations. She spends substantial time and resources protecting her computers with encryption and password defenses. Especially when she is in the U.S., she avoids talking on the phone about her work, particularly to sources. And she simply will not edit her films at her home out of fear — obviously well-grounded — that government agents will attempt to search and seize the raw footage.
That’s the climate of fear created by the U.S. Government for an incredibly accomplished journalist and filmmaker who has never been accused, let alone convicted, of any wrongdoing whatsoever. Indeed,documents obtained from a FOIA request show that DHS has repeatedly concluded that nothing incriminating was found from its border searches and interrogations of Poitras. Nonetheless, these abuses not only continue, but escalate, after six years of constant harassment.
* * * * *
Poitras has been somewhat reluctant to speak publicly about the treatment to which she is subjected for fear that doing so would further impede her ability to do her work (the NYT feature on “The Oath” included some discussion of it). But the latest episode, among the most aggressive yet, has caused her to want to vociferously object.
On Thursday night, Poitras arrived at Newark International Airport from Britain. Prior to issuing her a boarding pass in London, the ticket agent called a Customs and Border Patrol (CBP) agent (Yost) who questioned her about whom she met and what she did. Upon arriving in Newark, DHS/CBP agents, as always, met her plane, detained her, and took her to an interrogation room. Each time this has happened in the past, Poitras has taken notes during the entire process: in order to chronicle what is being done to her, document the journalistic privileges she asserts and her express lack of consent, obtain the names of the agents involved, and just generally to cling to some level of agency.
This time, however, she was told by multiple CBP agents that she was prohibited from taking notes on the ground that her pen could be used as a weapon. After she advised them that she was a journalist and that her lawyer had advised her to keep notes of her interrogations, one of them, CBP agent Wassum, threatened to handcuff her if she did not immediately stop taking notes. A CBP Deputy Chief (Lopez) also told her she was barred from taking notes, and then accused her of “refusing to cooperate with an investigation” if she continued to refuse to answer their questions (he later clarified that there was no “investigation” per se, but only a “questioning”). Requests for comment from the CBP were not returned as of the time of publication.
Just consider the cumulative effect of this six years of harrassment and invasion. Poitras told me that it is “very traumatizing to come home to your own country and have to go through this every time,”and described the detentions, interrogations and threats as “infuriating,” “horrible” and “intimidating.” She told me that she now “hates to travel” and avoids international travel unless it is absolutely necessary for her work. And as she pointed out, she is generally more protected than most people subjected to similar treatment by virtue of the fact that she is a known journalist with both knowledge of her rights and the ability to publicize what is done to her. Most others are far less able to resist these sorts of abuses. But even for someone in Poitras’ position, this continuous unchecked government invasion is chilling in both senses of the word: it’s intimidating in its own right, and deters journalists and others from challenging government conduct.
* * * * *
As is true for so many abuses of the Surveillance State and assaults on basic liberties in the post-9/11 era, federal courts have almost completely abdicated their responsibility to serve as a check on these transgressions. Instead, federal judges have repeatedly endorsed the notion that the U.S. Government can engage in the most invasive border searches of citizens, including seizures and copying of laptops, without any reasonable suspicion of wrongdoing whatsoever, let alone probable cause.
That has happened in part because federal courts have become extremely submissive to assertions of Executive authority in the post-9/11 era, particularly when justified in the name of security. It’s also in part because anyone with a record of anti-authoritarianism or a willingness to oppose unrestrained government power, with very rare exception, can no longer get appointed to the federal bench; instead, it’s an increasingly homogeneous lot with demonstrated fealty to institutional authority. And it’s also in part because many life-tenured federal judges have been cloistered on the bench for decades, are technologically illiterate, and thus cannot apprehend the basic difference between having your suitcase searched at the airport and having the contents of your laptop and cellphone copied and stored by the U.S. Government.
One potentially important and encouraging exception to this trend was a ruling two weeks ago by U.S. District Judge Denise Casper, an Obama-appointed judge in the District of Massachusetts. As I’ve reported previously, David House, an activist who helped found the Bradley Manning Support Network, was detained by DHS when returning from a vacation in Mexico and had all of his electronic devices, including his laptop, seized; those devices were returned to him after almost two months only after he retained the ACLU of Massachusetts to demand their return. The ACLU then represented him in a lawsuit he commenced against the U.S. Government, alleging that his First and Fourth Amendment rights were violated by virtue of being targeted for his political speech and advocacy.
The DOJ demanded dismissal of the lawsuit, citing the cases approving of its power to search without suspicion, and also claimed that House was targeted not because of his political views but because of his connection to the criminal investigation of Manning and WikiLeaks. But the court refused to dismiss House’s lawsuit, holding that if he were indeed targeted by virtue of his protected activities, then his Constitutional rights have been violated:
Before even questioning House, the agents seized his electronic devices and in seizing them for forty-nine days, reviewed, retained, copied and disseminated information about the Support Network. Although the agents may not need to have any particularized suspicion for the initial search and seizure at the border for the purpose of the Fourth Amendment analysis, it does not necessarily follow that the agents, as is alleged in the complaint, may seize personal electronic devices containing expressive materials, target someone for their political association and seize his electronic devices and review the information pertinent to that association and its members and supporters simply because the initial search occurred at the border. . . .
When agents Santiago and Louck stopped House while he was en route to his connecting flight, they directed him to surrender the electronic devices he was carrying. They questioned him for an extended period of time only after seizing his devices. When the agents questioned House, they did not ask him any questions related to border control, customs, trade, immigration, or terrorism and did not suggest that House had broken the law or that his computer may contain illegal material or contraband. Rather, their questions focused solely on his association with Manning, his work for the Support Network, whether he had any connections to WikiLeaks, and whether he had contact with anyone from WikiLeaks during his trip to Mexico. Thus, the complaint alleges that House was not randomly stopped at the border; it alleges that he was stopped and questioned solelyto examine the contents of his laptop that contained expressive material and investigate his association with the Support Network and Manning. . . .
That the initial search and seizure occurred at the border does not strip House of his First Amendment rights, particularly given the allegations in the complaint that he was targeted specifically because of his association with the Support Network and the search of his laptop resulted in the disclosure of the organizations, members, supporters donors as well as internal organization communications that House alleges will deter further participation in and support of the organization. Accordingly, the Defendants’ motion to dismiss House’s First Amendment claim is DENIED. [emphasis added]
As Kevin Gosztola notes in an excellent report on this ruling, the court — although it dubiously found that “the search of House’s laptop and electronic devices is more akin to the search of a suitcase and other closed containers holding personal information travelers carry with them when they cross the border which may be routinely inspected by customs and require no particularized suspicion” – also ruled that the length of time DHS retained House’s laptop (six weeks) may render the search and seizure unreasonable in violation of the Fourth Amendment.
But thus far, very few efforts have been made to restrain this growing government power. More than a year ago, Democratic Rep. Loretta Sanchez described to me legislation she proposed just to impose someminimal rules and safeguards governing what DHS can do at the airport, but it’s gone nowhere. A much stronger bill, proposed by then-Sen. Feingold, would have barred laptop seizures entirely without a search warrant, but it suffered the same fate. Apparently, the Small Government faction calling itself the “Tea Party” has no greater interest in restraining this incredibly invasive government power than the Democratic Party which loves to boast of its commitment to individual rights.
It’s hard to overstate how oppressive it is for the U.S. Government to be able to target journalists, film-makers and activists and, without a shred of suspicion of wrongdoing, learn the most private and intimate details about them and their work: with whom they’re communicating, what is being said, what they’re reading. That’s a radical power for a government to assert in general. When it starts being applied not randomly, but to people engaged in activism and journalism adverse to the government, it becomes worse than radical: it’s the power of intimidation and deterrence against those who would challenge government conduct in any way. The ongoing, and escalating, treatment of Laura Poitras is a testament to how severe that abuse is.
If you’re not somebody who films the devastation wrought by the U.S. on the countries it attacks, or provides insight into Iraqi occupation opponents and bin Laden loyalists in Yemen, or documents expanding NSA activities on U.S. soil, then perhaps you’re unlikely to be subjected to such abuses and therefore perhaps unlikely to care much. As is true for all states that expand and abuse their own powers, that’s what the U.S. Government counts on: that it is sending the message that none of this will affect you as long as you avoid posing any meaningful challenges to what they do. In other words: you can avoid being targeted if you passively acquiesce to what they do and refrain from interfering in it. That’s precisely what makes it so pernicious, and why it’s so imperative to find a way to rein it in.
Surveillance cameras are now so powerful they are able to zoom in and read your text messages – leading to fears of further privacy intrusion by a ‘Big Brother’ style state.
As well as being advanced enough to close in on an individual’s phone screen, security cameras will soon be able to pick up on raised voices and sniff out drugs too.
The revelations were made at a privacy conference in Wellington, New Zealand, where it was also disclosed that the average person is digitally recorded about a dozen times a day.
Worrying: Surveillance cameras are now so powerful they can zoom in to see what people are texting
During last year’s Rugby World Cup in New Zealand CCTV cameras focused in on the crowd of thousands to read the text message someone was sending.
As part of extensive police monitoring during the tournament, camera operators scanned the spectators looking for suspicious looking packages and aggressive behaviour.
They then chose to zoom in on one man who was texting – although it turned out he was simply writing about the poor quality of the rugby match.
Experts warned the fact that the cameras were able to do this raises concerns about breeches of individual’s privacy.
Watch out: Technological advances mean cameras will soon be able to pick up on raised voices and detect smells too
Civil liberties lawyer Michael Bott described the pervasiveness of surveillance as ‘worrying’ and warned of the extent people’s private lives were being intruded upon.
‘It’s quite worrying when we, by default, move to some sort of Orwellian 1984 where the state or Big Brother watches your every move,’ he said.
‘The road to hell is paved with good intentions and we don’t realise what we are giving up when we give the state the power to monitor our private lives.’
However, others argued the camera’s ability to zoom in on texts would be helpful in preventing crimes, including rioting.
The conference also discussed how technological developments meant that soon cameras will be able to pick up on raised voices and sniffing devices will be able to detect drug residue.
Of course, the number of surveillance cameras drastically varies from place to place with exact figures hard to pin down.
Cameras are commonplace on streets, public transport, shopping malls, hospitals and public buildings.
In the decade after the 9/11 attacks the amount of surveillance cameras across the U.S soared by about 30 million.
And figures showed the number of cameras in some areas of Manhattan increased by more than 400 per cent between 1998 and 2005.
Across the pond, Britain is notorious for the high amount of cameras it has with an estimated 2 million across the country.
Phil Schneider died in 1996. Previous to his death he had been on tour across the United States speaking out about various subjects including his involvement with building a secret underground base in Dulce, New Mexico for the military. During this time, he said to have had an encounter with a violent E.T race in the late 1970’s which would change his whole world reality immediately after. This documentary explores some of the information Phil Schneider spoke about to the public in the 1990’s by examining each claim in detail with expert opinions from Richard Dolan, Richard Sauder, Neil Gould and Cynthia Drayer (Phil’s Ex-Wife).
In this documentary you will find never before published photo’s of Phil’s Autopsy, documents about the Philadelphia Experiment from Oscar Schneider’s files (Phil’s father) and a very well explained background about Underground Bases.
“Interviews conducted by Darcy Weir”
“Edited by Darcy Weir”
“Music by Lee Lustig” www.leelustig.bandcamp.com
Monarch Programming is a method of mind control used by numerous organizations for covert purposes. It is a continuation of project MK-ULTRA, a mind-control program developed by the CIA, and tested on the military and civilians. The methods are astonishingly sadistic (its entire purpose is to traumatize the victim) and the expected results are horrifying: The creation of a mind-controlled slave who can be triggered at anytime to perform any action required by the handler. While mass media ignores this issue, over 2 million Americans have gone through the horrors of this program. This article looks at the origins of Monarch programming and some of its methods and symbolism.
NOTE: This article contains disturbing elements and might trigger Monarch survivors.
Monarch programming is a mind-control technique comprising elements of Satanic Ritual Abuse (SRA) and Multiple Personality Disorder (MPD). It utilizes a combination of psychology, neuroscience and occult rituals to create within the slaves an alter persona that can be triggered and programmed by the handlers. Monarch slaves are used by several organizations connected with the world elite in fields such as the military, sex slavery and the entertainment industry. This article will look at the origins of Monarch programming, its techniques and its symbolism.
Origins
Throughout the course of history, several accounts have been recorded describing rituals and practices resembling mind control. One of the earliest writings giving reference to the use of occultism to manipulate the mind can be found in the Egyptian Book of the Dead. It is a compilation of rituals, heavily studied by today’s secret societies, which describes methods of torture and intimidation (to create trauma), the use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate. Other events ascribed to black magic, sorcery and demon possession (where the victim is animated by an outside force) are also ancestors of Monarch programming.
It is, however, during the 20th century that mind control became a science in the modern sense of the term, where thousands of subjects have been systematically observed, documented and experimented on.
One of the first methodical studies on trauma-based mind control were conducted by Josef Mengele, a physician working in Nazi concentration camps. He initially gained notoriety for being one of the SS physicians who supervised the selection of arriving prisoners, determining who was to be killed and who was to become a forced labourer. However, he is mostly known for performing grisly human experiments on camp inmates, including children, for which Mengele was called the “Angel of Death”.
Joseph Mengele, 1935
Mengele is infamous for his sordid human experiments on concentration camps prisoners, especially on twins. A part of his work that is rarely mentioned however, is his research on mind control. Much of his research in this field was confiscated by the Allies and is still classified to this day.
“DR. GREEN (Dr. Joseph Mengele): The most significant programmer, perhaps one could give him the title of the father of Monarch Programming was Joseph Mengele, an ex-Nazi Concentration Camp doctor. Thousands of Monarch mindcontrolled slaves in the U.S. had “Dr. Green” as their chief programmer. “1
“Dr. Joseph Mengele of Auschwitz notoriety was the principle developer of the trauma-based Monarch Project and the CIA’s MK Ultra mind control programs. Mengele and approximately 5, 000 other high ranking Nazis were secretly moved into the United States and South America in the aftermath of World War II in an Operation designated Paperclip. The Nazis continued their work in developing mind control and rocketry technologies in secret underground military bases. The only thing we were told about was the rocketry work with former Nazi star celebrities like Warner Von Braun. The killers, torturers, and mutilators of innocent human beings were kept discretely out of sight, but busy in U.S. underground military facilities which gradually became home to thousands upon thousands of kidnapped American children snatched off the streets (about one million per year) and placed into iron bar cages stacked from floor to ceiling as part of the ‘training’. These children would be used to further refine and perfect Mengele’s mind control technologies. Certain selected children (at least the ones who survived the ‘training’) would become future mind controlled slaves who could be used for thousands of different jobs ranging anywhere from sexual slavery to assassinations. A substantial portion of these children, who were considered expendable, were intentionally slaughtered in front of (and by) the other children in order to traumatize the selected trainee into total compliance and submission 2.
Mengele’s research served as a basis for the covert, illegal CIA human research program named MK-ULTRA.
MK-ULTRA
Declassified MK-Ultra document
Project MK-ULTRA ran from the early 1950s to at least the late 1960s, using American and Canadian citizens as its test subjects. The published evidence indicates that Project MK-ULTRA involved the use of many methodologies to manipulate individual mental states and alter brain functions, including the surreptitious administration of drugs and other chemicals, sensory deprivation, isolation, and verbal and physical abuse.
The most publicized experiments conducted by MK-ULTRA involved the administration of LSD on unwitting human subjects, including CIA employees, military personnel, doctors, other government agents, prostitutes, mentally ill patients, and members of the general public, in order to study their reactions.
However, the scope of MK-ULTRA does not however stop. Experiments involving violent electroshocks, physical and mental torture and abuse were used in a systematic matter on many subjects, including children.
Declassified picture of a young MK-ULTRA subject, 1961.
Although the admitted goals of the projects were to develop torture and interrogation methods to use on the country’s enemies, some historians asserted that the project aimed to create “Manchurian Candidates”, programmed to perform various acts such as assassinations and other covert missions.
MK-ULTRA was brought to light by various commissions in the 1970s, including the Rockefeller Commission of 1975. Although it is claimed that the CIA stopped such experiments after these commissions, some whistle-blowers have come forth stating that the project simply went “underground” and Monarch Programming has become the classified successor of MK-ULTRA.
The most incriminating statement to date made by a government official as to the possible existence of Project MONARCH was extracted by Anton Chaitkin, a writer for the publication The New Federalist. When former CIA Director William Colby was asked directly, “What about monarch?” he replied angrily and ambiguously, “We stopped that between the late 1960s and the early 1970s.” 3.
Monarch Programming
Although there has never been any official admittance of the existence of Monarch programming, prominent researchers have documented the systematic use of trauma on subjects for mind-control purposes. Some survivors, with the help of dedicated therapists, were able to “deprogram” themselves to then go on record and disclose the horrifying details of their ordeals.
Monarch slaves are mainly used by organizations to carry out operations using patsies trained to perform specific tasks, who do not question orders, who do not remember their actions and, if discovered, who automatically commit suicide. They are the perfect scapegoats for high-profile assassinations (see Sirhan Sirhan), the ideal candidates for prostitution, slavery and private movie productions. They are also the perfect puppet performers for the entertainment industry.
“What I can say is I now believe that ritual-abuse programming is widespread, is systematic, is very organized from highly esoteric information which is published no-where, has not been on any book or talk show, that we have found it all around this country and at least one foreign country.
People say, “What’s the purpose of it?” My best guess is that the purpose of it is that they want an army of Manchurian Candidates, ten of thousands of mental robots who will do prostitution, do movies, smuggle narcotics, engage in international arms smuggling, all sorts of very lucrative things, and do their bidding and eventually the megalomaniacs at the top believe they’ll create a Satanic Order that will rule the world”. 4
Monarch programmers cause intense trauma to subjects through the use of electroshock, torture, abuse and mind games in order to force them to dissociate from reality – a natural response in some people when then are faced with unbearable pain. The subject’s ability to dissociate is a major requirement and it is ,apparently, most readily found in children that come from families with multiple generations of abuse. Mental dissociation enables the handlers to create walled-off personas in the subject’s psyche, which can then be programmed and triggered at will.
“Trauma-based mind control programming can be defined as systematic torture that blocks the victim’s capacity for conscious processing (through pain, terror, drugs, illusion, sensory deprivation, sensory over-stimulation, oxygen deprivation, cold, heat, spinning, brain stimulation, and often, near-death), and then employs suggestion and/or classical and operant conditioning (consistent with well-established behavioral modification principles) to implant thoughts, directives, and perceptions in the unconscious mind, often in newly-formed trauma-induced dissociated identities, that force the victim to do, feel, think, or perceive things for the purposes of the programmer. The objective is for the victim to follow directives with no conscious awareness, including execution of acts in clear violation of the victim’s moral principles, spiritual convictions, and volition.
Installation of mind control programming relies on the victim’s capacity to dissociate, which permits the creation of new walled-off personalities to “hold” and “hide” programming. Already dissociative children are prime “candidates” for programming”. 5
Monarch mind control is covertly used by various groups and organizations for various purposes. According to Fritz Springmeier, these groups are known as “The Network” and form the backbone of the New World Order.
ORIGINS OF THE NAME
Monarch mind control is named after the Monarch butterfly – an insect who begins its life as a worm (representing undeveloped potential) and, after a period of cocooning (programming) is reborn as a beautiful butterflies (the Monarch slave). Some characteristics specific to the Monarch butterfly are also applicable to mind control.
“One of the primary reasons that the Monarch mind-control programming was named Monarch programming was because of the Monarch butterfly. The Monarch butterfly learns where it was born (its roots) and it passes this knowledge via genetics on to its offspring (from generation to generation). This was one of the key animals that tipped scientists off, that knowledge can be passed genetically. The Monarch program is based upon Illuminati and Nazi goals to create a Master race in part through genetics. If knowledge can be passed genetically (which it is), then it is important that parents be found that can pass the correct knowledge onto those victims selected for the Monarch mind control.” 6
“When a person is undergoing trauma induced by electroshock, a feeling of light-headedness is evidenced; as if one is floating or fluttering like a butterfly. There is also a symbolic representation pertaining to the transformation or metamorphosis of this beautiful insect: from a caterpillar to a cocoon (dormancy, inactivity), to a butterfly (new creation) which will return to its point of origin. Such is the migratory pattern that makes this species unique.” 7
METHOD
The victim/survivor is called a “slave” by the programmer/handler, who in turn is perceived as “master” or “god.” About 75% are female, since they possess a higher tolerance for pain and tend to dissociate more easily than males. Monarch handlers seek the compartmentalization of their subject’s psyche in multiple and separate alter personas using trauma to cause dissociation.
The following is a partial list of these forms of torture:
1. Abuse and torture
2. Confinement in boxes, cages, coffins, etc, or burial (often with an opening or air-tube for oxygen)
3. Restraint with ropes, chains, cuffs, etc.
4. Near-drowning
5. Extremes of heat and cold, including submersion in ice water and burning chemicals
6. Skinning (only top layers of the skin are removed in victims intended to survive)
7. Spinning
8. Blinding light
9. Electric shock
10. Forced ingestion of offensive body fluids and matter, such as blood, urine, feces, flesh, etc.
11. Hung in painful positions or upside down
12. Hunger and thirst
13. Sleep deprivation
14 Compression with weights and devices
15. Sensory deprivation
16. Drugs to create illusion, confusion, and amnesia, often given by injection or intravenously
17. Ingestion or intravenous toxic chemicals to create pain or illness, including chemotherapy agents
18. Limbs pulled or dislocated
19. Application of snakes, spiders, maggots, rats, and other animals to induce fear and disgust
20. Near-death experiences, commonly asphyxiation by choking or drowning, with immediate resuscitation
22. Forced to perform or witness abuse, torture and sacrifice of people and animals, usually with knives
23. Forced participation in slavery
24. Abuse to become pregnant; the fetus is then aborted for ritual use, or the baby is taken for sacrifice or enslavement
25. Spiritual abuse to cause victim to feel possessed, harassed, and controlled internally by spirits or demons
26. Desecration of Judeo-Christian beliefs and forms of worship; dedication to Satan or other deities
27. Abuse and illusion to convince victims that God is evil, such as convincing a child that God has abused her
28. Surgery to torture, experiment, or cause the perception of physical or spiritual bombs or implants
29. Harm or threats of harm to family, friends, loved ones, pets, and other victims, to force compliance
30. Use of illusion and virtual reality to confuse and create non-credible disclosure 8.
“The basis for the success of the Monarch mind-control programming is that different personalities or personality parts called alters can be created who do not know each other, but who can take the body at different times. The amnesia walls that are built by traumas, form a protective shield of secrecy that protects the abusers from being found out, and prevents the front personalities who hold the body much of the time to know how their System of alters is being used. The shield of secrecy allows cult members to live and work around other people and remain totally undetected. The front alters can be wonderful Christians, and the deeper alters can be the worst type of Satanic monster imaginable–a Dr. Jekyll/Mr. Hyde effect. A great deal is at stake in maintaining the secrecy of the intelligence agency or the occult group which is controlling the slave. The success rate of this type of programming is high but when it fails, the failures are discarded through death. Each trauma and torture serves a purpose. A great deal of experimentation and research went into finding out what can and can’t be done. Charts were made showing how much torture a given body weight at a given age can handle without death.” 9
“Due to the severe trauma induced through ECT, abuse and other methods, the mind splits off into alternate personalities from the core. Formerly referred to as Multiple Personality Disorder, it is presently recognized as Dissociative Identity Disorder and is the basis for MONARCH programming. Further conditioning of the victim’s mind is enhanced through hypnotism, double-bind coercion, pleasure-pain reversals, food, water, sleep and sensory deprivation, along with various drugs which alter certain cerebral functions”. 10
Dissociation is thus achieved by traumatizing the subject, using systematic abuse and using terrifying occult rituals. Once a split in the core personality occurs, an “internal world” can be created and alter personas can be programmed using tools such as music, movies (especially Disney productions) and fairy tales. These visual and audio aids enhance the programming process using images, symbols, meanings and concepts. Created alters can then be accessed using trigger words or symbols programmed into the subject’s psyche by the handler. Some of the most common internal images seen by mind control slaves are trees, Cabalistic Tree of life, infinity loops, ancient symbols and letters, spider webs, mirrors, glass shattering, masks, castles, mazes, demons, butterflies, hour glasses, clocks and robots. These symbols are commonly inserted in popular culture movies and videos for two reasons: to desensitize the majority of the population, using subliminals and neuro-linguistic programming and to deliberately construct specific triggers and keys for base programming of highly-impressionable MONARCH children. 11 Some of the movies used in Monarch programming include The Wizard of Oz, Alice in Wonderland, Pinocchio and Sleeping Beauty .
The movie The Wizard of Oz is used by Monarch handlers to program their slaves. Symbols and meanings in the movie become triggers in the slave’s mind enabling easy access to the slave’s mind by the handler. In popular culture, veiled references to Monarch programming often use analogies to The Wizard of Ozand Alice in Wonderland.
In each case, the slave is given a particular interpretation of the movie’s storyline in order to enhance programming. For example, a slave watching The Wizard of Oz is taught that “somewhere over the rainbow” is the “happy place” dissociative trauma slaves must go to in order to escape the unbearable pain being inflicted upon them. Using the movie, programmers encourage slaves to go “over the rainbow” and dissociate, effectively separating their minds from their bodies.
“As mentioned before, the hypnotist will find children easier to hypnotize if they know how to do it with small children. One method that is effective is to say to the small children, “Imagine you are watching a favorite television show.” This is why the Disney movies and the other shows are so important to the programmers. They are the perfect hypnotic tool to get the child’s mind to dissociate in the right direction. The programmers have been using movies since almost day one to help children learn the hypnotic scripts. For children they need to be part of the hypnotic process. If the hypnotist allows the child to make up his own imagery, the hypnotic suggestions will be stronger. Rather than telling the child the color of a dog, the programmer can ask the child. This is where the books and films shown the child assist in steering its mind in the right direction. If the hypnotist talks to a child, he must take extra precaution not to change the tone of his voice and to have smooth transitions. Most of the Disney films are used for programming purposes. Some of them are specifically designed for mind-control.” 12
LEVELS OF MONARCH PROGRAMMING
The levels of Monarch Programming identify the slave’s “functions” and are named after the Electroencephalography (EEG) brainwaves associated with them.
Types of brain waves in EEG
Monitoring brain waves through the scalp
Regarded as “general” or regular programming, ALPHA is within the base control personality. It characterized by extremely pronounced memory retention, along with substantially increased physical strength and visual acuity. Alpha programming is accomplished through deliberately subdividing the victims personality which, in essence, causes a left brain-right brain division, allowing for a programmed union of Left and Right through neuron pathway stimulation.
BETA is referred to as “sexual” programming (slaves). This programming eliminates all learned moral convictions and stimulates the primitive instinct, devoid of inhibitions. “Cat” alters may come out at this level. Known as Kitten programming, it is the most visible kind of programming as some female celebrities, models, actresses and singers have been subjected to this kind of programming. In popular culture, clothing with feline prints often denote Kitten programming.
DELTA is known as “killer” programming and was originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.) in covert operations. Optimal adrenal output and controlled aggression is evident. Subjects are devoid of fear and very systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.
THETA – Considered to the “psychic” programming. Bloodliners (those coming from multi-generational Satanic families) were determined to exhibit a greater propensity for having telepathic abilities than did non-bloodliners. Due to its evident limitations, however, various forms of electronic mind control systems were developed and introduced, namely, bio-medical human telemetry devices (brain implants), directed-energy lasers using microwaves and/or electromagnetics. It is reported these are used in conjunction with highly-advanced computers and sophisticated satellite tracking systems. 13
In Conclusion
It is difficult to remain objective when describing the horrors endured by Monarch slaves. The extreme violence, the abuse, the mental torture and sadistic games inflicted on victims by “notable scientists” and high-level officials prove the existence of a true “dark side” in the powers that be. Despite the revelations, the documents and the whistle-blowers, a great majority of the population ignores, dismisses or avoids the issue altogether. Over two million Americans have been programmed by trauma mind-control since 1947 and the CIA publicly admitted its mind control projects in 1970. Movies such as The Manchurian Candidate have directly referred to the subject, even depicting actual techniques, such as electroshock, the use of trigger words and microchip implementation. Several public figures we see on our TV and movie screens are mind control slaves. Famous people such as Candy Jones, Celia Imrie and Sirhan Sirhan have gone on record and disclosed their mind control experiences…and yet the general public claims that it “cannot exist”.
The research and funds invested in project Monarch do not however only apply to mind control slaves. Many of the programming techniques perfected in these experiments are applied on a mass scale through mass media. Mainstream news, movies, music videos, advertisements and television shows are conceived using the most advanced data on human behavior ever compiled. A lot of this comes from Monarch programming.
Fritz Springmeier, The Illuminati Formula to Create a Mind Control Slave ↩
This video provides the facts about psychotropic drugs and the huge profits they create for the pharmaceutical industry. These drugs are not safe and have not been on the market long enough to provide sufficient long term studies regarding their effects. These drugs do cause addiction, however most “doctors” would call this dependence because you do not have to take an increasing dose over time. They are completely fine with you being addicted to the same amount of any given drug on a daily basis. Over half of the people that commit suicide in the United States are prescribed to psychotropic drugs. (Ex: Paxil (Paroxetine), Zoloft (Sertraline), Prozac, Wellbutrin (Bupropion), Effexor, Seroquil, Ultram (Tramadol), etc.)
This is a guide with which even a total noob can get high class security for his system and complete anonymity online. But its not only for noobs, it contains a lot of tips most people will find pretty helpfull. It is explained so detailed even the biggest noobs can do it^^ :
=== The Ultimate Guide for Anonymous and Secure Internet Usage v1.0.1 ===
By the time you are finished reading and implementing this guide, you will be able to securely and anonymously browse any website and to do so anonymously. No one not even your ISP or a government agent will be able to see what you are doing online. If privacy and anonymity is important to you, then you owe it to yourself to follow the instructions that are presented here.
In order to prepare this guide for you, I have used a computer that is running Windows Vista. This guide will work equally well for other versions of Windows. If you use a different operating system, you may need to have someone fluent in that operating system guide you through this process. However, most parts of the process are easily duplicated in other operating systems.
I have written this guide to be as newbie friendly as possible. Every step is fully detailed and explained. I have tried to keep instructions explicit as possible. This way, so long as you patiently follow each step, you will be just fine.
In this guide from time to time you will be instructed to go to certain URLs to download files. You do NOT need TOR to get these files, and using TOR (while possible) will make these downloads very slow.
This guide may appear overwhelming. Every single step is explained thoroughly and it is just a matter of following along until you are done. Once you are finished, you will have a very secure setup and it will be well worth the effort. Even though the guide appears huge, this whole process should take at the most a few hours. You can finish it in phases over the course of several days.
It is highly recommended that you close *ALL* applications running on your computer before starting.
What follows was sent to me by Michael Prince aka James Casbolt. I cannot confirm or substantiate this information at this time but publish it with the proviso to let the viewer decide…
Kerry Lynn Cassidy
Project Camelot
Janary 29, 2012
SECTION TWO
Life Extension- The Chronicles of Michael Prince
by James Michael Casbolt 1992 Sirius Sector
I am not fully conscious at this time when I’m physically on this planet. Part of my consciousness is trapped within a quantum computer system on board my space vessel named the USS CALOPIA. This vessel orbits whatever planet I’m on at the time. This vessel is a UN/US Space Command vessel. The technology on board actually causes the vessel to physically follow me around the galaxy using stargates to travel vast distances. During the compartmentalizing torture sessions at the Hive in South Africa and the London underground facility, my consciousness has been leaving my body and entering a physical cloned body in vat stasis on board the USS Calopia.
The computer system on board this vessel monitors the vital signs of these cloned copies of my body. When life signs are detected within the cloning vat, the computer system sends mechanical servitors to take me to a an emergency medical bay until I am physically recovered and can walk around the ship in a stable condition. My physical body down on the planet during these times is always inhabited by my MIRROR ENTITY. At the breaking point of maximum pain levels… when I ‘pass-out’ my consciousness leaves my physical body in the underground base or wherever and wakes up in the cloned body on board the USS Calopia. When I recover and leave the medical bay on the Calopia, I always enter a specific room where I can monitor my physical body down on the planet. I can also monitor the vital life signs of the body on the planet. This process involves looking through physical cybernetic implants within the eyes. I am also able to operate the computer system on board the ship and bounce the signal off walls to look at the body from a remote location as well viewing through the eyes.
There is always a time limit that the Mirror Entity can take possession of my body down on the planet. The computer system on board the USS Calopia will always give me a warning five minutes before the Mirror Entity departs my body. This physical body will then shapeshift back into a human form when my consciousness enters back into it. The computer system flashes symbols on one of the screens at this time and a digital voice will say-
“Five minutes to genetic molecule alignment”
At this point I will walk out of this particular room on board the ship and enter a room down the corridor to the right hand side. In this room a vertical body pod called a ‘Ventricle Duct’ is positioned at the far end of the room. I will step into the pod with my back facing the wall. A plastic screen will close in front of me and the pod will tip back slightly. The pod will then fill up with liquid that I can breath and I will slowly and gently fall asleep and wake up again in my body down on the planet. This technology assists me in dealing with intense/prolonged pain and terror.
However at this time in 1992 I do not have conscious control over all the technology on board the USS Calopia. I also have a slightly schizophrenic relationship with the computer on board the vessel. At times of acute distress the computer and I talk back and forth. I.E- at the time I was ‘drowned’ in the ‘well’ at the Sirius prison facility, at the moment of greatest terror for me, I heard the computer system on board the USS Calopia inside my head, saying something like-“Regulation 301- Assist in binary xxxx ( numbers I can’t remember ) teleportation? Assist in binary xxxx teleportation?”
The ‘Assist in binary teleportation’ would be repeated with an increased sense of urgency tone of urgency until I felt like my lungs were going to explode. Just at the point of lung rupture taking place, I saw the Kabballa formation in my mind’s eye. I had a split second to choose between two of circles lit up. One green in colour, the other red in colour.
Green= I leave my body ( less risk )
Red= I stay in my body ( more risk )
I choose red at this time, stay in my body and I actually start to breath underwater through some kind of cybernetic breathing mechanism inside my body initiating at this time. The ultimate goal is to stay in the body and gain fully conscious control over all the technology on board the USS Calopia. Some of the hardware and software on board is ancient. Basically I need to switch the AI section of the computer on board off. At this time my brain will become ‘quiet’ and the internal dialogue that takes place inside my head between myself and the computer, will stop.-The scepter artifact I was handed by the ‘Jesuit/Reptilian’ priests after the drowning was a missing piece from the computer on board my ship. I was able to stay in my body during the drowning and therefore realize my physically indestructible nature. However the artifact was ultimately placed within a container inside the Emerald Room at this time, with the female and male reptilians inside. Because of this the female and male reptilians in the Emerald Room own a piece of my mind at this time in 1992.
Now because I was able to resist teleporting my consciousness onto the USS Calopia during a time of intense stress, I have moved one step closer to mastering this technology. Now at times of intense stress when the internal communication between myself and the computer system on the Calopia starts, I can instruct the whole vessel to physically teleport near to my location and send mechanical servitors into the place where I am distressed and physically rescue me. This way I end up physically on board the USS Calopia without having to leave my body. The trick to mastering all this technology is to stay in one physical body and not ‘body hop’ from one physical container to another.
Eventually the objective was to liberate this artifact from the Emerald Room and return it back to my ship. When events such as this happen, in times of danger, there will be no internal dialogue between myself and the computer on the Calopia. The artifact will be physically teleported to me from the ship and I will have complete mastery of my environment enabling me to come out of any dangerous situation safely. I can say at this time, I have claimed the artifact from the two reptilians and I have complete control over the Emerald Room they occupied in the past. I am approaching a state where I will actually be able to incorporate the artifact into my cybernetic body. At that time I will not have to wait for the time delay while the device is teleported from the USS Calopia to me. I will not have to rely on the USS Calopia at all and will have full conscious control over the technology. It is not a matter of if this happens but a matter of when.
1992- D4 facility- Sirius Sector
A door opens at the back of the Emerald Room. I exit the Emerald Room with the male and female reptilians in it and walk into a corridor. I am met by two human guards and I instinctively walk down the corridor behind them. Doors are located on either side of the corridor and some are open as I walk past them. I glance into a room on the left and see tall grey types working on some kind of crystal based computers. I glance to the right as I’m walking and see larger rooms with short grey types working on larger computers with conveyer belt type apparatus at the back of the rooms. I see box shaped objects on the conveyer belts and parts of exo-skeleton robotics such as mechanical arms and such.
A pair of tall grey overseers exits one of the rooms on the right and follow behind me. One of the greys creates a telepathic link between itself to the back of my head and a data exchange starts to take place as we walk. I see the layout and design on the whole facility.
The place is designed exactly like the Pentagon building in Virginia. This Sirius facility has five ring corridors within each other ( pentagons within pentagons ). Each of the five sections houses a separate extra-terrestrial race. Prisoners considered most dangerous by the ruling elite of each race work with scientists of the same race during their incarceration periods. This facility rests on a flat terra-formed seabed under the ocean of this planet to prevent escape. The facility is considered impossible to escape from as previously mentioned. The whole facility is able to detach itself from the seabed in times of emergency, emerge from the water and become airbourne/spacebourne.
The five types of lifeforms in each section of this facility are as follows:
5th Outer Ring- ‘Cat-People’ Bipedal cat type creatures based all over the galaxy but high numbers of these beings located in Sirius Star Sector.
4th Inner Ring- ‘Bird-People’ Bipedal bird type creatures based all over the galaxy but high numbers located in Orion and Draco Star Sectors.
3rd Inner Ring – ‘Wolf-People’ Bipedal canine type creatures based all over the galaxy but high numbers in Sirius Star Sector.
2nd Inner Ring- Humans.
1st Inner Ring- ‘Reptile-People’ Bipedal reptile type creatures based all over the galaxy but high numbers in Draco and Sirius Star Sector ( classic reptilian and grey types ).
A large space exists within the centre of the facility similar to the Pentagon building in Virginia but in the centre of this building is a huge five sided pyramid structure that protrudes out the top. Some type of antenna/teleportation device is located in the direct centre of the five sided pyramid. The data download continues to happen as we walk further down the corridor and I see that this reptilian section of the facility operates in a type of factory setting and the beings within operate in a very collective fashion. The entire facility operates in this way but it is most extreme here. I also see that ultimately the entire facility is run by AI at this time, which oversees most of the activity within the facility.
I see that the AI has been extensively involved in cognitive behaviour tests here. This has been to determine which of the five base races has the highest survival dynamic. These ‘survival of the fittest’ AI tests has been carried out separately on each race. The AI computer system has then mixed the races together in general population on several occasions. The strongest of each race have then been housed together for a continuation of these tests. Where I am being led now is part of the final series of testing in this area.
We continue to walk down and corridor and enter a lift at the end. All five of us get in and descend. The elevator doors open into an absolutely massive room with five walkways converging in the centre. The room is quite dark and very silent. I look up and see the huge five-sided pyramid structure above me built with a type of dark glass. We walk along our walkway towards the centre of the structure. It takes a long time and with every step I feel an awesome power building in my body. After walking for awhile I see on object in the distance. As we get closer I see a familiar trip seat type device. We get to the device and I get in the seat while the two human guards strap me into the chair.
Once this is complete, the two human guards and two greys walk away back in the direction of the lift. I sit in the dark silent massive room for a awhile and wait. I feel completely calm. I hear loud mechanical rumblings around me and five massive square mirrors extend out of the ground to form a pentagon shaped prism around me. My form sitting in the seat is reflected around me in many strange ways. My reflection seems to go on forever. I then see five faces appear on each mirror. They seem to be reflected backwards to how the facility is set-up I.E- A massive reptile face appears in this gigantic mirror to my left, the seat then rotates to the right and I see a huge wolf face, rotate to the right again and I see a huge bird-face, rotate right again I see a huge cat-face. The chair rotates slowly again and I see a huge human face. The face is Commander Sarion who may be my father. The chair then rotates to its original position and sinks into the floor where mechanical locks clamp the chair into a more secure position.
The chair starts to spin in a clockwise motion and gets faster and faster with each rotation. The faces appear to start laughing and as the rotation speed quickens, they all start to blend into one in my vision. I hear a crackling electrical sound and bright white light is coming from the centre of the pyramid down into my body. I start to convulse and I feel myself being filled with massive power and my muscles and joints tearing, stretching and ripping. This is massive pleasure and pain combined and feels like a huge orgasm. I feel my body expanding and when I feel myself reaching a climatic power point, the dark room around me disappears and I find myself standing in some desert canyon. My whole body is tingling with energy and feels very different.
Sirius 1992 continued
As the crackling energy envelops me in the chair, a time delay occurs just before I am teleported off planet into the canyon. I arrive in a tube on board the Calopia and look out through the clear partition as servitor droids come to collect me. The door in the tube opens and I fall forward in a weakened state into the mechanical arms of two servitors.
They lift me onto a hovering gurney and follow by my side on their wheeled legs as I am moved through the corridor on the right side of the vessel leading towards the recovery bay. Large viewing windows are positioned on the right side and I look down at the blue planet below. Most of the mass is covered by a huge ocean and I see a small land mass off to the left lit up by the huge sun behind the planet.
I am taken into the medical bay through a door on the left and moved into a corner where medical and laser equipment scan my body. I am given an injection by a mechanical arm that comes out of the top of the wall in front of me. A head visor also comes out of the wall and is positioned across my eyes. My strength is returning to me as I receive a digital debriefing from the AI computer on board the USS Calopia.
I learn the AI system on board my vessel has been in conflict with the AI system running the underwater prison down below on the planet. My very survival was at stake. Data regarding stem cells and genetics is scrolled onto the display screen. The AI system down on the planet has developed a complete science based the ancient art of terror, studying the deepest fears of an individual and sequence mapping of pain thresholds and physical torture breaking points.
It has learned that as the mind controls the body, physical pain is only effective up to a certain point. It’s goal is to physically remove an individual’s bone marrow by the quickest means possible while keeping the body alive. The bone marrow and stem cells within the marrow contain the individual’s identity and memory. Once the original marrow is removed the AI replaces it by teleporting stem cells from one of the animal type races located in a lab at the prison facility.
The AI system controlling the prison facility has probed into the deepest fears of men. It has found a way to literally and physically scare the life out of a man. To scare the life right out of one’s very bones!
On the other hand the AI system on board the Calopia is designed to enable me to survive under all circumstances. Back up exo-skeletal cybernetic chassis are located on board. These cyborg copies contain hollow tubes for the transportation of bone marrow stem cells if the Calopia AI registers that my DNA has left my body. This is accomplished with the use of atomic energy.
The debriefing continues on the digital visor and I learn that because I was able to stay in my body during my drowning experience at the facility, the Calopia AI has learnt that it can teleport my whole physical body directly onto the vessel, bypassing the need to vector locate and transport just my bone marrow.
A game of chess is being played out between the two AI’s and the Calopia AI now has the upper hand. In a covert maneuver of trickery, the Calopia AI has double crossed the planetary AI and teleported down a cyborg copy of my body into the chair as I am simultaneously being teleported to safety on board. Using massive amounts of oppositional extreme temperatures of heat and cold, the Calopia AI has managed to very rapidly swap each cell one at a time.
The cyborg copy has the standard hollow tubes within the bones of the alloy exo-skeleton. Therefore the facility AI teleports the stem cells of the animal into the bones without noticing a swap has occurred. Using this incredible energy source of heat and cold, the superior Calopia AI physically teleports genetic material two ways, while the inferior AI rides on the back of this process at the exact same time and teleports it’s sample without realizing the true process which is occurring. It is a three way process. Two parts living and one part dead.
On board the safety of the Calopia I am spared the damaging effects of the shape shift to my body for the first time in years. A throw away cloned body sustains this instead and a snarling eight foot tall bipedal, hairy beast is teleported into the canyon back on earth.
I am viewing the Bigfoot type beast in the canyon on a small screen above my head. A plastic tube shaped partition comes out the side of the gurney and I feel myself being pushed backwards through a small dark tunnel. I start to feel myself being pushed into sticky liquid and I realize I am back inside a tube.
I feel heat being scanned over my body and also realize I am being teleported. It is a quick triple realization as I also know I am being teleported into the canyon on earth to do battle with the hairy beast.
Grand Canyon, Arizona
The next thing I am aware of is a cool breeze blowing on my skin. It is almost dark, late evening and I see the Bigfoot like creature standing in front of me about twenty feet away. It’s thick legs are slightly bent ready to spring. It is over seven feet tall and looks like a cross between a huge gorilla and a bear with dark brown fur with long handed claws at the end of it’s massively powerful arms. It is growling with saliva dripping off rows of sharp teeth. I can smell it’s stinking rancid breath and foul pungent body odor from this distance.
Time seems to slow down for me as I notice a blue glowing light reflecting off the high walls of the canyon we stand in. I notice this blue light is coming from my body and look down for a split second to realize I am sitting cross legged and levitating over four feet off the ground.
I feel completely calm and in control.
I wait for the beast to spring and as he leaps the entire distance with a roar, I bounce some kind of magnetic energy off the ground beneath me and float gracefully higher into the air. The beast misses me and I manipulate this magnetic energy again this time using it to smash my weight downwards in the split second he passes underneath me. Just as my right hand is about to strike the top if his stinking head, I project a magnetic shockwave out the palm of my hand. The impact on top of his head smashes him face first down into the ground with a huge thud. The beast screams in agony and rage.
The beast returns to it’s feet again in no time and is facing me again. It leaps and I sidestep to my right and parry it’s weight with my right arm. Once I have a slight grip on the animal I throw it hard into the canyon wall behind me using it’s own weight and momentum.
It smashes head first into the wall and screams once again in rage and pain and again it rushes me. I can’t keep moving out of its way as it is getting wise to this tactic and rotates it’s body and moves to my left as it comes at me, slightly shifting it’s weight so I cannot parry it away from me. I cannot move backwards either as I will not be able to muster enough force into my blows to neutralize the beast.
My only option is to meet it head on and we end up in a stand up grapple face to face. The beast is stronger and much heavier than me. I have hold of it’s left arm with my right hand but is pushes me back a couple of steps. It’s right arm is now free and it swings a huge clawed overhand blow at my face. I block the blow with my left forearm but the force of it cuts my arm deeply and knocks my arm down. It follows up with the same blow quickly as I attempt to bring my arm up again and it knocks my injured arm down further exposing my face and chest.
A third time it throws the same blow. I see the claws sailing through the air towards my face but my left arm is too weak and injured to block this again. At the last moment I manage to pull my head back and the claws miss my face but rake down the left side of my neck near the collarbone instead. The blow is thrown with such force the claws continue cutting vertically through my flesh, gouging deeply into my chest exposing metal bones, circuitry and pumping flesh organs underneath this.
The animals right hand is down by my left rib now and I grab it with my left hand and pin it against it’s body. I still have the beasts left hand tied up with my right hand and I use the opportunity to head butt the creature in the mouth. I feel some it’s teeth crack off and it screams as blood starts to pour from it’s mouth. It counters with a ferocious bite to the top of my left shoulder.
It opens it huge gaping snout wide and sinks it’s teeth deeply into my flesh.
Something snaps inside me. Some deep bestial trigger deep within is activated by being bitten by a large animal such as this. I roar as I feel my hands starting to break and explode. I look at my hands as the beast is still sunk deep into my shoulder ripping from side to side, tearing at my flesh.
Knife like blades have protruded from my hands. At once I realize the reptilian hand bones retrieved from the bodies back in France all those years ago have been incorporated into my physiology ( see France deprogramming sessions 1812 ).
I ram the blades of my left hand into the stomach of the animal with a left uppercut. It let’s go of my shoulder and steps back looking confused when it sees the blades. I follow up with a overhand right blow with my right foot forward that cuts deeply into the left side of it’s neck. It steps back again and I have pinned it closer to the wall. I kick the creature with my right leg. A front kick to position it against the wall for the final death blow then I thrust a left punch as straight as an arrow into it’s throat.
The punch is forceful enough to go all the way through it’s throat and pin it to the wall behind. In a murder frenzy I stab into it’s stomach over and over again with my right hand until its head falls limply down in death.
I pull the blades out of it’s throat and the body falls onto the floor. At first it appears as if the body is dissolving in black mist. Then I realize the planetary AI system is teleporting the body back to Sirius.
I realize this has been a survival dynamic test by the AI system. One of the last in a long long series of survival of the fittest tests to discover which race has the highest survival dynamics. I notice movement above me out the corner of my eye and look up to see some kind of metal observation platform high above near the top of the canyon wall. I focus my vision on the platform and see men in green military uniforms looking down with binoculars and camera recording equipment.
They know I see them and start to scramble around as two of the men rush to the back of the platform and quickly wheel some kind of cannon forward.
We are Anonymous. You know who you are. The men behind the curtain, the overlord pulling at the strings of your puppets.
You hide and you plan and you scheme in the dark alleys; in the vehement anticipation that your draconic plans will come to fruitation. The dreams of a thousand men crystallized in one moment; one moment that approaches with every hour that passes. The time is upon us.
The Occupy Wall Street protests have been going on for a month. And it seems the FBI and NYPD have had help tracking protesters’ moves thanks to a conservative computer security expert who gained access to one of the group’s internal mailing lists,and then handed over information on the group’s plans to authorities and corporations targeted by protesters.
Since the Occupy Wall Street protest began on September 17, New York security consultant Thomas Ryan has been waging a campaign to infiltrate and discredit the movement. Ryan says he’s done contract work for the U.S. Army and he brags on his blog that he leads “a team called Black Cell, a team of the most-highly trained and capable physical, threat and cyber security professionals in the world.” But over the past few weeks, he and his computer security buddies have been spending time covertly attending Occupy Wall Street meetings, monitoring organizers’ social media accounts, and hanging out with protesters in Lower Manhattan.
As part of their intelligence-gathering operation, the group gained access to a listserv used by Occupy Wall Street organizers called September17discuss. On September17discuss, organizers hash out tactics and plan events, conduct post-mortems of media appearances, and trade the latest protest gossip. On Friday, Ryan leaked thousands of September17discuss emails to conservative blogger Andrew Breitbart, who is now using them to try to smear Occupy Wall Street as an anarchist conspiracy to disrupt global markets.
What may much more alarming to Occupy Wall Street organizers is that while Ryan was monitoring September17discuss, he was forwarding interesting email threads to contacts at the NYPD and FBI, including special agent Jordan T. Loyd, a member of the FBI’s New York-based cyber security team.
On September 18th, the day after the protest’s start, Ryan forwarded an email exchange between Occupy Wall Street organizers to Loyd. The email exchange is harmless: Organizers discuss how they need to increase union participation in the protest. “We need more outreach to workers. The best way to do that is by showing solidarity with them,” writes organizer Jackie DiSalvo in the thread. She then lists a group of potential unions to work with.
Another organizer named Conor responds: “+1,000,000 to Jackie’s proposal on working people/union struggles outreach and solidarity. Also, why not invite people to protest Troy Davis’s execution date at Liberty Plaza this Monday?”
Five minutes after Conor sent his email, Ryan forwarded the thread—with no additional comment—to Loyd’s FBI email address. “Thanks!” Loyd responded. He cc’d his colleague named Ilhwan Yum, a fellow cybersecurity expert at the agency, on the reply.
On September 26th, Ryan forwarded another email thread to Agent Loyd. But this time he clued in the NYPD as well, sending the email to Dennis Dragos, a detective with the NYPD Computer Crimes Squad.
The NYPD might have been very grateful he did so, since it involved a proposed demonstration outside NYPD headquarters at 1 Police Plaza. In the thread, organizers debated whether to crash an upcoming press conference planned by marijuana advocates to celebrate NYPD commissioner Ray Kelly ordering officers to halt arrests over possession of small amounts of marijuana.
“Should we bring some folks from Liberty Plaza to chant “SHAME” for the NYPD’s recent brutalities on Thursday night for the Troy Davis and Saturday for the Occupy Wall Street march?” asked one person in the email thread. (That past Saturday, the video of NYPD officer Anthony Bologna pepper-spraying a protester had gone viral.) Ryan promptly forwarded the email thread to Loyd at the FBI and Dragos at the NYPD.
Interestingly, it was Ryan who revealed himself as a snitch. We learned of these emails from the archive Ryan leaked yesterday in the hopes of undermining the Occupy Wall Street movement. In assembling the archive of September17discuss emails, it appears he accidentally included some of his own forwarded emails indicating he was ratting out organizers.
“I don’t know, I just put everything I had into one big package,” Ryan said when asked how the emails ended up in the file posted to Andrew Breitbart’s blog. Some security expert.
But Ryan didn’t just tip off the authorities. He was also giving information to companies as well. When protesters discussed demonstrating in front of morning shows like Today and Good Morning America, Ryan quickly forwarded the thread to Mark Farrell, the chief security officer at Comcast, the parent company of NBC Universal.
Ryan wrote:
Since you are the CSO, I am not sure of your role in NBC since COMCAST owns them.
There is a huge protest in New York call “Occupy Wall Street”. Here is an email of stunts that they will try to pull on the TODAY show.
We have been heavily monitoring Occupy Wall Street, and Anonymous.
“Thanks Tom,” Farrell responded. “I’ll pass this to my counterpart at NBCU.”
Did the FBI and/or NYPD ask him to monitor Occupy Wall Street? Was he just forwarding the emails on out of the goodness of his heart? In a phone interview with us, Ryan denied being an informant. “I do not work with the FBI,” he said.
Ryan said he knows Loyd through their mutual involvement in the Open Web Application Security Project, a non-profit computer security group of which Ryan is a board member. Ryan said he sent the emails to Loyd unsolicited simply because “everyone’s curious” about Occupy Wall Street, and he had a ground-eye view. “Jordan never asked me for anything.”
Was he sending every email he got to the authorities? Ryan said he couldn’t remember how many he’d passed on to the FBI or NYPD, or other third parties. Later he said that he only forwarded the two emails we noticed, detailed above.
But even if he’d been sending them on regularly, they were probably of limited use to the authorities. Most of the real organizing at Occupy Wall Street happens face-to-face, according to David Graeber, who was one of the earliest organizers. “We did some practical work on [the email list] at first—I think that’s where I first proposed the “we are the 99%” motto—but mainly it’s just an expressive forum,” he wrote in an email. “No one would seriously discuss a plan to do something covert or dangerous on such a list.”
But regardless of how many emails Ryan sent—or whether Loyd ever asked Ryan to spy on Occupy Wall Street—Loyd was almost certainly interested in the emails he received. Loyd has helped hunt down members of the hacktivist collective Anonymous, and he and his colleagues in the FBI’s cyber security squad have been monitoring their involvement in Occupy Wall Street.
At a New York cyber security conference one day before the protest began, Loyd cited Occupy Wall Street as an example of a “newly emerging threat to U.S. information systems.” (In the lead-up to Occupy Wall Street, Anonymous had issued threats against the New York Stock Exchange.) He told the assembled crowd the FBI has been “monitoring the event on cyberspace and are preparing to meet it with physical security,” according to a New York Institute of Technology press release.
We contacted Loyd to ask about his relationship with Ryan and if any of the information Ryan passed along was of any use to the agency. He declined to answer questions and referred us to the FBI’s press office. We’ll post an update if we hear back from them.
We asked Ryan again this morning about how closely he was working with the authorities. Again, he claimed it was only these two emails, which is unlikely given he forwarded them to the FBI and NYPD without providing any context or explaining where he’d gotten them.
And he detailed his rationale for assisting the NYPD:
My respect for FDNY & NYPD stems from them risking their lives to save mine when my house was on fire in sunset park when I was 8 yrs old. Also, for them risking their lives and saving many family and friends during 9/11.
Don’t you find it Ironic that out of all the NYPD involved with the protest, [protesters] have only targeted the ones with Black Ribbons, given to them for their bravery during 9/11?
I am sorry if we see things differently, I try to look at everything as a whole and in patterns. Everything we do in life and happens in life, there is a pattern behind it.
An amendment that would legalize the use of propaganda on American audiences is being inserted into the latest defense authorization bill, BuzzFeed has learned.
The amendment would “strike the current ban on domestic dissemination” of propaganda material produced by the State Department and the Pentagon, according to the summary of the law at the House Rules Committee’s official website.
The tweak to the bill would essentially neutralize two previous acts—the Smith-Mundt Act of 1948 and Foreign Relations Authorization Act in 1987—that had been passed to protect U.S. audiences from our own government’s misinformation campaigns.
The bi-partisan amendment is sponsored by Rep. Mark Thornberry from Texas and Rep. Adam Smith from Washington State.
In a little noticed press release earlier in the week — buried beneath the other high-profile issues in the $642 billion defense bill, including indefinite detention and a prohibition on gay marriage at military installations — Thornberry warned that the current law “ties the hands of America’s diplomatic officials, military, and others by inhibiting our ability to effectively communicate in a credible way.”
The bill’s supporters say the informational material used overseas to influence foreign audiences is too good to not use at home, and that new techniques are needed to help fight Al-Qaeda.
Critics of the bill say there are ways to keep America safe without turning the massive information operations apparatus within the federal government against American citizens.
“Clearly there are ways to modernize for the information age without wiping out the distinction between domestic and foreign audiences,” says Michael Shank, Vice President at the Institute for Economics and Peace in Washington D.C.”That Reps Adam Smith and Mac Thornberry want to roll back protections put in place by previously-serving Senators – who, in their wisdom, ensured limits to taxpayer–funded propaganda promulgated by the US government – is disconcerting and dangerous.”
“I just don’t want to see something this significant – whatever the pros and cons – go through without anyone noticing,”
“ says one source on the Hill, who is disturbed by the law. According to this source, the law would allow “U.S. propaganda intended to influence foreign audiences to be used on the domestic population.”
The new law would give sweeping powers to the State Department and Pentagon to push television, radio, newspaper, and social media onto the U.S. public. “It removes the protection for Americans,” says a Pentagon official who is concerned about the law. “It removes oversight from the people who want to put out this information. There are no checks and balances. No one knows if the information is accurate, partially accurate, or entirely false.”
According to this official, “senior public affairs” officers within the Department of Defense want to “get rid” of Smith-Mundt and other restrictions because it prevents information activities designed to prop up unpopular policies—like the wars in Iraq and Afghanistan.
Critics of the bill point out that there was rigorous debate when Smith Mundt passed, and the fact that this is so “under the radar,” as the Pentagon official puts it, is troubling.
The Pentagon spends some $4 billion a year to sway public opinion already, and it was recently revealed by USA Today the DoD spent $202 million on information operations in Iraq and Afghanistan last year.
In an apparent retaliation to the USA Today investigation, the two reporters working on the story appear to have been targeted by Pentagon contractors, who created fake Facebook pages and Twitter accounts in an attempt to discredit them.
(In fact, a second amendment to the authorization bill — in reaction to the USA Today report — seeks for cuts to the Pentagon’s propaganda budget overseas, while this amendment will make it easier for the propaganda to spread at home.)
The evaporation of Smith-Mundt and other provisions to safeguard U.S. citizens against government propaganda campaigns is part of a larger trend within the diplomatic and military establishment.
In December, the Pentagon used software to monitor the Twitter debate over Bradley Manning’s pre-trial hearing; another program being developed by the Pentagon would design software to create “sock puppets” on social media outlets; and, last year, General William Caldwell, deployed an information operations team under his command that had been trained in psychological operations to influence visiting American politicians to Kabul.
The upshot, at times, is the Department of Defense using the same tools on U.S. citizens as on a hostile, foreign, population.
A U.S. Army whistleblower, Lieutenant Col. Daniel Davis, noted recently in his scathing 84-page unclassified report on Afghanistan that there remains a strong desire within the defense establishment “to enable Public Affairs officers to influence American public opinion when they deem it necessary to “protect a key friendly center of gravity, to wit US national will,” he wrote, quoting a well-regarded general.
The defense bill passed the House Friday afternoon.
This is an exert from the movie The Great Dictator starring Charlie Chaplin. Statements made then, Should be held true today. Stand up and fight my brothers and sisters. Raise up your arm to those who oppress and Tyrannize.
This video shows the obvious build out and expansion of a Military-grade complex using unmarked, black vehicles and earth movers. There is a creepy feeling of authenticity to this video that shouldn’t be taken lightly.
Joe Banister is the first and thus far only IRS Criminal Investigation Division Special Agent ever to conduct, while serving as a special agent, an investigation into allegations that the IRS illegally administers and enforces the federal income tax. He respectfully reported the results of his investigation to his IRS superiors, up to and including the IRS Commissioner. Rather than address the legitimate concerns raised by one of their own distinguished investigators, his IRS superiors suspiciously refused to address the chilling evidence of IRS wrongdoing raised in his report and instead encouraged him to resign from his position. Observing that IRS management intended to cover up the deceit and illegal conduct alleged in his report, Banister chose to resign from his position so that he could report his findings to the American public. In effect, Banister had to resign from his position in order to abide by his oath to support and defend the U.S. Constitution.
Leak Sites that publish leaks and accept submission of leaks, inspired by the original WikiLeaks.org concept.
WikiLeaks – WikiLeaks website – love them or hate them – no new submissions for 2 years – new submission system still not launched as promised on 28/11/2011 or 01/12/2011
BritiLeaks false start – BritiLeaks website – original false start: launched with less than no anonymity or security protection at all – see below for current site .
BritiLeaks – BritiLeaks website – new secure website launch promised soon, already has strong TLS Digital Certificate and Tor Hidden Services – still to be launched “in a few days”, but hosting mirrors of other whistleblowing websites.
MurdochLeaks – The Murdoch Leaks Project website – “will accept tips or evidence of wrong doing relating to Rupert Murdoch’s affiliated institutions such as News International and News Corporation”
OpenWatch – OpenWatch.net encourages the public to use their mobile phone software to record encounters with the police and authority, then submit them for posting online.
LectureLeaks – LectureLeaks – Use recording mobile software to record and leak university lectures. Has content already, open source.
CorruptionWatch.org.za – Corruption Watch – South Africa – Trades Union organised, anti-corruption pledge signatures, mapping of corruption hotspots, but no security or anonymity measures for contributors or informants at all except for “Leave this field empty, if you want to stay anonymous.“
Established Leak Sites
Websites which have been publishing censored or leaked material before, or independently in parallel with WikiLeaks
Public Intelligence – Public Intelligence website established 2009 – now back online in Luxembourg after server move from the Netherlands caused by “complaints” to the hosting company. Good Encryption, now no longer using Quantserve web bug tracking
FolhaLeaks – FolhaLeaks – Folha de S.Paulo, São Paulo, Brasil – no encryption, web form is not distinct from the main newspaper website so it betrays “anonymous” visitor details to FaceBook and to various banner advertisers etc.
Environmental Protection Whistle blowing sites
Leak Sites and Organization that accept reporting about environmental issues
NZ SIS – New Zealand Security Intelligence Service Public Contribution Form – no longer uses a hidden PGP key, still tracks IP address etc. and the rest of the website still tracks visitors with Google Analytics
Websites which have a specific topic, audience and editorial position and as part of their reporting have frequently published high level unpublished documents
Hints and Tips for Whistleblowers – ht4w.co.uk website – Technical Hints and Tips for protecting the anonymity of sources for Whistleblowers, Investigative Journalists, Campaign Activists and Political Bloggers etc.
Global Integrity Report Open-source metrics, indicators, and techniques for assessing transparent and accountable government. Strong whistleblowing protection law considered as an effective anti-corruption framework.
Public Concern at Work – UK Public Concern at Work NGO and legal advice centre set up in 1993 to address public interest whistleblowing: a) confidential advice to whistleblowers b) policy & campaigning c) public education (throughout UK, and to law/policy makers and all employers)
Whistle Blowing Consulting Businesses
Organization that do business related to WhistleBlowing and leaking (Consulting, Services, Press Agency middle men etc).
Charity and Profit organization that provide to public agencies and private corporation hotline services for whistleblowing in order to outsource the internal reporting service.
Public Concern at Work – UK Public Concern at Work A leading authority on making public interest whistleblowing work. Provide training, consultancy, audit support and access to advice line for organisations wanting to ensure they provide their staff a real alternative to silence.
GlobaLeaks – GlobaLeaks website – Open Source Whistleblowing Framework software project, which spawned this LeakDirectory.org wiki
Honest Appalachia – Honest Appalachia website – uses Tor Hidden Service and PGP and publishes its own Open Source documents submission website software and configuration scripts to help other similar whistleblowing projects
Whistle Blowing in Corporations
A Directory of corporations that implemented corporate transparency by implementing whistleblowing through the organization:
internalmemos.com Part of the fuckedcompany coverage of the internet bubble collapse. All of the 2002-2007 memos not behind the paywall are available from the internet archivehighlights include:
blackfridaywikileaks.com – Blackfriday wikileaks America – WordPress blog with no entries since June 2011, full of Google Analytics, Quantserve etc. visitor tracking, no encryption etc.
Encryption / Anonymity infrastructure services/ software used by some Whistleblower Sites
Tor – Tor project – encrypted anonymity router cloud – Tor Hidden Services and anonymised web browsing / web form submission (N.B. caveats)
The Workshop has been glued together with GlobaLeaks one, you can download slides here
SocialHacking LeakDirectorySocial Hacking
We will give an overview of what whistle blowing is and how it can be applied a wide array of different situations. Hopefully by the end of the workshop you will understand that whistle blowing is a fundamental tool for a democratic and transparent society.
We will focus in particular on the Leakdirectory Project, a shared crowd based initiative to represent most of the world of whistleblowing with the goal to became a reference for all the whistleblowing initiatives.
Strong, credible allegations of high-level criminal activity can bring down a government. When the government lacks an effective, fact-based defense, other techniques must be employed. The success of these techniques depends heavily upon a cooperative, compliant press and a mere token opposition party.
1. Dummy up. If it’s not reported, if it’s not news, it didn’t happen.
2. Wax indignant. This is also known as the “How dare you?” gambit.
3. Characterize the charges as “rumors” or, better yet, “wild rumors.” If, in spite of the news blackout, the public is still able to learn about the suspicious facts, it can only be through “rumors.” (If they tend to believe the “rumors” it must be because they are simply “paranoid” or “hysterical.”)
4. Knock down straw men. Deal only with the weakest aspects of the weakest charges. Even better, create your own straw men. Make up wild rumors (or plant false stories) and give them lead play when you appear to debunk all the charges, real and fanciful alike.
5. Call the skeptics names like “conspiracy theorist,” “nutcase,” “ranter,” “kook,” “crackpot,” and, of course, “rumor monger.” Be sure, too, to use heavily loaded verbs and adjectives when characterizing their charges and defending the “more reasonable” government and its defenders. You must then carefully avoid fair and open debate with any of the people you have thus maligned. For insurance, set up your own “skeptics” to shoot down.
6. Impugn motives. Attempt to marginalize the critics by suggesting strongly that they are not really interested in the truth but are simply pursuing a partisan political agenda or are out to make money (compared to over-compensated adherents to the government line who, presumably, are not).
7. Invoke authority. Here the controlled press and the sham opposition can be very useful.
8. Dismiss the charges as “old news.”
9. Come half-clean. This is also known as “confession and avoidance” or “taking the limited hangout route.” This way, you create the impression of candor and honesty while you admit only to relatively harmless, less-than-criminal “mistakes.” This stratagem often requires the embrace of a fall-back position quite different from the one originally taken. With effective damage control, the fall-back position need only be peddled by stooge skeptics to carefully limited markets.
10. Characterize the crimes as impossibly complex and the truth as ultimately unknowable.
11. Reason backward, using the deductive method with a vengeance. With thoroughly rigorous deduction, troublesome evidence is irrelevant. E.g. We have a completely free press. If evidence exists that the Vince Foster “suicide” note was forged, they would have reported it. They haven’t reported it so there is no such evidence. Another variation on this theme involves the likelihood of a conspiracy leaker and a press who would report the leak.
12. Require the skeptics to solve the crime completely. E.g. If Foster was murdered, who did it and why?
13. Change the subject. This technique includes creating and/or publicizing distractions.
14. Lightly report incriminating facts, and then make nothing of them. This is sometimes referred to as “bump and run” reporting.
15. Boldly and brazenly lie. A favorite way of doing this is to attribute the “facts” furnished the public to a plausible-sounding, but anonymous, source.
16. Expanding further on numbers 4 and 5, have your own stooges “expose” scandals and champion popular causes. Their job is to pre-empt real opponents and to play 99-yard football. A variation is to pay rich people for the job who will pretend to spend their own money.
17. Flood the Internet with agents. This is the answer to the question, “What could possibly motivate a person to spend hour upon hour on Internet news groups defending the government and/or the press and harassing genuine critics?” Don t the authorities have defenders enough in all the newspapers, magazines, radio, and television? One would think refusing to print critical letters and screening out serious callers or dumping them from radio talk shows would be control enough, but, obviously, it is not.
You can not join Anonymous. Nobody can join Anonymous. Anonymous is not an organization. It is not a club, a party or even a movement. There is no charter, no manifest, no membership fees. Anonymous has no leaders, no gurus, no ideologists. In fact, it does not even have a fixed ideology.
All we are is people who travel a short distance together – much like commuters who meet in a bus or tram: For a brief period of time we have the same route, share a common goal, purpose or dislike. And on this journey together, we may well change the world.
Nobody can speak for Anonymous. Nobody could say: you are in, or you are out. Do you still want to join Anonymous? Well, you are in if you want to.
How to get in contact with others? Anonymous has no centralized infrastructure. We use existing facilities of the Internet, especially social networks, and we are ready to hop on to the next one if this one seems compromised, is under attack, or starts to bore us.
At the time of this writing, Facebook, Twitter and the IRC appear to host the most active congregations. But this may change at any time. Still, these are probably the best places to get started. Look for terms like “anonymous”, “anonops” and other keywords that might be connected to our activities.
How do I recognize other Anonymous? We come from all places of society: We are students, workers, clerks, unemployed; We are young or old, we wear smart clothes or rugs, we are hedonists, ascetics, joy riders or activists. We come from all races, countries and ethnicities. We are many.
We are your neighbours, your co-workers, your hairdressers, your bus drivers and your network administrators. We are the guy on the street with the suitcase and the girl in the bar you are trying to chat up. We are anonymous. Many of us like to wear Guy Fawkes masks on demonstrations. Some of us even show them in their profile pictures in social networks. That helps to recognize each other.
Have you been infiltrated? If you talk to another Anonymous, you will never know who he is. He may be a hacker, cracker, phisher, agent, spy, provocateur – or just the guy from next door. Or his daughter. It is not illegal to be Anonymous. Nor is it illegal to wear Guy Fawkes masks. Keep that in mind. If you personally have not been involved in illegal activities, you have nothing to worry, no matter whom you talk to; If you have, it is wise not to talk about it. To no one.
How do I protect my privacy? Invent an alias, a nick, a pseudonym … call it as you will, just invent something. Then register a mail account in that name with one of the big mail providers. Use this email address to register your Twitter, Facebook, etc. accounts. Make sure to clear all cookies before you start using your new identity, or better use a different web browser for Anonymous than for your other activities.
If you have higher needs for security, ask us about encryption, steganography, TOR, etc. Many of us know how to use them.We will always respect your need for privacy. We will never ask for your personal information. If we do, we will not expect a truthful answer; And neither should you.
What is the right thing to do? The only person who can tell you what is right for you is yourself. This is also the only person you should follow. We have no leaders. You are also the only person responsible for your actions. Do what you think is right. Do not what you think is wrong.
How many Anonymous are there?
We are more than you think. We are more than anybody thinks. We are many.
The photo was taken in Hamburg in 1936, during the celebrations for the launch of a ship, the‘Horst Wessel’. In the crowd, one person refuses to raise his arm to give the Nazi salute.
That man was August Landmesser. He had already been in trouble with the authorities, having been sentenced to two years hard labor for marrying a Jewish woman. We know little else about August Landmesser (born May 24, 1910, presumably killed February 1944), except that he had two children. By pure chance, one of his children recognized her father in this photo when it was published in a German newspaper in 1991.
It’s not enough that the biotech industry — led by multinational corporations such as Monsanto, Dow, Syngenta, BAS, and Dupont — is poisoning our food and our planet. It’s also poisoning young minds.
In a blatant attempt at brainwashing, the Council for Biotechnology Information(CBI) has widely circulated what it calls a Biotechnology Basics Activity Bookfor kids, to be used by “Agriculture and Science Teachers.” The book — calledLook Closer at Biotechnology — looks like a science workbook, but reads more like a fairy tale. Available on the council’s Web site, its colorful pages are full of friendly cartoon faces, puzzles, helpful hints for teachers — and a heavy dose of outright lies about the likely effects of genetic engineering on health, the environment, world hunger and the future of farming.
CBI’s lies are designed specifically for children, and intended for use in classrooms.
At a critical time in history when our planet is veering toward a meltdown, when our youth are suffering the health consequences (obesity, diabetes, allergies) of Big Ag and Food Inc.’s over-processed, fat-and sugar-laden, chemical-, and GMO-tainted foods, a time when we should be educating tomorrow’s adults about how to reverse climate change, how to create sustainable farming communities, how to promote better nutrition, the biotech industry’s propagandists are infiltrating classrooms with misinformation in the guise of “educational” materials.
Brainwashing children. It’s a new low, even for Monsanto.
You don’t have to read beyond the first page ofLook Closer at Biotechnology to realize that this is pure propaganda:
Hi Kids! Welcome to the Biotechnology Basics Activity Book. This is an activity book for young people like you about biotechnology — a really neat topic. Why is it such a neat topic? Because biotechnology is helping to improve the health of the Earth and the people who call it home. In this book, you will take a closer look at biotechnology. You will see that biotechnology is being used to figure out how to: 1) grow more food; 2) help the environment; and 3) grow more nutritious food that improves our health. As you work through the puzzles in this book, you will learn more about biotechnology and all of the wonderful ways it can help people live better lives in a healthier world. Have fun!
Before we take a closer look at the lies laid out in Look Closer at Biotechnology — lies that are repeated over and over again, the better to imprint them on young minds — let’s take a closer look at the book’s publisher. The Council for Biotechnology Information describes itself as “a non-profit 501(c)(6) organization that communicates science-based information about the benefits and safety of agricultural biotechnology and its contributions to sustainable development.”
According to the Internal Revenue Service, a 501(c)(6) organization is a “business league” devoted to the improvement of business conditions of one or more lines of business. The mission of a 501(c)(6) organization “must focus on the advancement of the conditions of a particular trade or the interests of the community.”
The bottom line is that CBI exists to advance the interests of the corporations that it was formed to promote — in this case, the biotech industry. While it purports to communicate “science-based information,” in fact, that’s not its mission at all. Its mission is to maximize the profits of Monsanto and the biotech industry.
Not surprisingly, CBI is funded largely by the biotech, chemical, pesticide, and seed industry giants: BASF, Bayer CropScience, Dow Agro Sciences, Dupont, Monsanto, and Syngenta.
There’s nothing new about corporations lying to the public. Corporations routinely lie to their employees. They lie in advertising. They lie in the lopsided so-called studies and research projects that they self-fund in order to guarantee the outcomes that support their often false, but self-serving premises. They buy off politicians, regulatory officials, scientists, and the media.
Although here we’re focusing on the biotech industry trying to brainwash our kids, CBI certainly does not limit its propaganda to just children. CBI recently contributed $375,000 to the Coalition Against the Costly Labeling Law — a Sacramento-based industry front group working to defeat the California Right to Know Genetically Engineered Food Act of 2012. If passed in November, this citizens’ ballot Initiative will require food manufacturers and retailers to label foods containing genetically engineered ingredients, as well as ban the routine industry practice of labeling or advertising GE-tainted foods as “natural” or “all natural.” CBI, the Farm Bureau, and the Grocery Manufacturers Association are campaigning furiously to preserve their “right” to keep consumers in the dark about whether their food has been genetically engineered or not, and to preserve their “right” to mislabel gene-altered foods as “natural.”
Clearly, the Council for Biotechnology Information has little or no regard for “science-based” information. But lies aimed directly at kids — under the guise of science education? In our schools?
Let’s take a closer look at the claims made in Look Closer at Biotechnology.
Lie #1: “Biotechnology is one method being used to help farmers grow more food.” (page 7)
This statement is patently false.
In 2009, in the wake of similar studies, the Union of Concerned Scientists examined the data on genetically engineered crops, including USDA statistics. Their report — Failure to Yield — was the first major effort to evaluate in detail the overall yields of GE crops after more than 20 years of research and 13 years of commercialization in the United States. According to the definitive UCS study, “GE has done little to increase overall crop yields.” A number of studies indicate in fact that GE soybeans, for example, actually produce lower yields than non-genetically engineered varieties.
Research conducted by the India research group, Navdanya, and reported in The GMO Emperor Has No Clothes turns up the same results:
Contrary to the claim of feeding the world, genetic engineering has not increased the yield of a single crop. Navdanya’s research in India has shown that contrary to Monsanto’s claim of Bt cotton yield of 1500 kg per acre, the reality is that the yield is an average of 400-500 kg per acre. Although Monsanto’s Indian advertising campaign reports a 50-percent increase in yields for its Bollgard cotton, a survey conducted by the Research Foundation for Science, Technology and Ecology found that the yields in all trial plots were lower than what the company promised. (Page 11).
The claim that GE crops increase agricultural yields is a blatant lie. Equally untrue is the industry’s claim that it is motivated by the desire to feed the hungry of the world. As the Union of Concerned Scientists points out: “For the most part, genetic engineering techniques are being applied to crops important to the industrialized world, not crops on which the world’s hungry depend.” Where does all the genetically engineered soy and corn — two of the largest GE crops — end up? In animal feed, processed junk foods — and school lunchrooms. Precious little goes to feed the hungry in impoverished regions.
One of the sub-arguments related to increasing yields is the biotech industry’s claim that GMO crops are more resistant to pests — hence more of the crops survive. In Look Closer at Biotechnology kids are told that agricultural biotechnology is a “precise way to make seeds with special qualities. These seeds will allow farmers to grow plants that are . . . more resistant to pests . . .” In fact widespread commercialization of herbicide-resistant and Bt-spliced GE crops has engendered a growing army of superweeds and superpests, oblivious to all but the most powerful and toxic pesticides.
What we should be teaching kids in science class is what scientists have been warning for years — that any attempt to increase resistance to pests through genetic engineering will ultimately fail. Insects — and diseases — will build up a tolerance over time, and evolve into stronger and stronger strains. That’s how nature works — and even Monsanto can’t fool Mother Nature. Organic agriculture, on the other hand, utilizing crop rotation, biodiversity, natural fertilizers, and beneficial insects, reduces crop loss from pests and weeds, without the collateral damage of toxic pesticides and fertilizers.
Recently, 22 leading scientists told the US Environmental Protection Agency that it should act with “a sense of urgency” to urge farmers to stop planting Monsanto’s genetically engineered Bt corn because it will no longer protect them from the corn rootworm. Bt corn is genetically engineered with bacterial DNA that produces an insecticide in every cell of the plant, aimed at preventing corn rootworm. Except that corn rootworms have now developed resistance to these GE mutants.
Just as scientists had predicted years ago, a new generation of insect larvae has evolved, and is eating away at the roots of Monsanto’s Bt corn — a crop farmers paid a high price for on Monsanto’s promise that they would never have to worry about corn rootworm again. Scientists are now warning of massive yield loss and surging corn costs if the EPA doesn’t act quickly to drastically reduce Bt crops’ acreage and ensure that Monsanto makes non-GMO varieties of corn available to farmers.
“Massive yield loss” doesn’t sound like “more food” — whether you’re 12 years old or 112.
What we should be telling kids is what responsible scientists and farmers — experts at the United Nations — have been saying all along: Eco-farming candouble food output. According to a UN study:
Eco-farming projects in 57 nations showed average crop yield gains of 80 percent by tapping natural methods for enhancing soil and protecting against pests.
Projects in 20 African countries resulted in a doubling of crop yields within three to 10 years.
Sound ecological farming can significantly boost production and in the long term be more effective than conventional farming.
Lie #2: “Biotechnology can help farmers and the environment in many ways.” (page 8)
Two lies for the price of one.
Biotechnology — specifically genetic engineering — helps neither farmers nor the environment, according to the majority of legitimate scientists and economists. In fact, the opposite is true. Genetic engineering of seeds has wreaked havoc on the environment and brought misery to hundreds of thousands of small farmers all over the world.
The majority of farmers in developing countries struggle to afford even the most basic requirements of seeds and fertilizers. Their survival depends on the age-old practice of selecting, saving and sharing seeds from one year to the next. When multinational corporations move into areas previously dominated by small farmers, they force those farmers to buy their patented seeds and fertilizers — under pretense of higher yields, and under threats of lawsuits if they save or share the seeds. Every year, they’re forced to buy more seeds and more chemicals from corporations — and when the promises of higher yields and higher incomes prove empty, farmers go bankrupt.
Compounding their corporate crimes, when Monsanto’s patented seeds contaminate the non-GMO crops of small farmers (because the seeds drift across property lines) Monsanto routinely sues farmers for growing their patented seeds illegally, even though the seeds were actually unwanted trespassers. Further, the company has ruined the livelihoods of small farmers by harassing them for illegally growing patented seeds, even in cases where no patented seeds have been grown, either knowingly or by accident.
As Monsanto and others have expanded worldwide, into India, China, Pakistan, and other countries, the effect on small farmers has been devastating. In India, for instance, after World Trade Organization policies forced the country in 1998 to open its seed sector to companies like Cargill, Monsanto and Syngenta, farmers quickly found themselves in debt to the biotech companies that forced them to buy corporate seeds and fertilizers and pesticides, destroying local economies. Hundreds of thousands of India’s cotton farmers have committed suicide.
And according to a Greenpeace report, poorer farmers in the Philippines were sold Monsanto’s Bt corn as a “practical and ecologically sustainable solution for poor corn farmers everywhere to increase their yields” only to find the opposite was true: Bt corn did not control pests and was “not ecologically sustainable.”
Which brings us to one more of the Council for Biotechnology Information’s lies to kids: That agricultural biotechnology is good for the environment.
Study after study, over more than a decade, has warned us of just the opposite. Even the pro-biotech USDA has admitted that GE crops use more pesticides, not less than non-GE varieties. Genetic engineering results in evermore pesticides being dumped into the environment, destroying soil and water, human and animal health, and threatening the biodiversity of the planet.
How about telling kids instead that numerous reports, including one from theGerman Beekeepers Association, have linked genetically engineered Bt corn to the widespread disappearance of bees, or what is now referred to as Colony Collapse Disorder? And while we’re at it, maybe we should remind kids of the Albert Einstein’s quote: “If the bee disappeared off the surface of the globe then man would only have four years of life left. No more bees, no more pollination, no more plants, no more animals, no more man.”
Maybe we should also tell them that glyphosate, the active ingredient in Monsanto’s herbicide, Roundup, the most widely used herbicide in the world, kills Monarch butterflies, fish, and frogs, destroys soil fertility, and pollutes our waterways and drinking water.
The fact is, widespread use of Monsanto’s Roundup in all agricultural and urban areas of the United States is destroying the environment, pure and simple. US Geological Survey studies released this month show that Roundup is now commonly found in rain and rivers in agricultural areas in the Mississippi River watershed, where most applications are for weed control on GE corn, soybeans and cotton. Here’s the real truth, from an article published this past week: Monsanto’s Roundup is actually threatening the crop-yielding potential of the entire biosphere. According to the article, new research published in the journalCurrent Microbiology highlights the extent to which “glyphosate is altering, and in some cases destroying, the very microorganisms upon which the health of the soil, and — amazingly — the benefits of raw and fermented foods as a whole, depend.”
Lie #3: “Scientists are using biotechnology to grow foods that could help make people healthier.” (page 11)
This is the perhaps the most outrageous lie of all. Telling kids that GE foods are more nutritious is tantamount to telling them Hostess cupcakes and Coca-Cola are health foods.
Genetic engineering — of human food and food for animals that humans eat — has been linked to a host of diseases and health issues, including auto-immune disorders, liver and kidney damage, nutritional deficiencies, allergies, accelerated aging, infertility, and birth defects.
There’s a growing and alarming body of research indicating that GMO foods are unsafe, and absolutely no research whatsoever proving that they are safe. And yet the USDA and FDA continue to approve, and just this past month even agreed tospeed up approval of these crops that scientists and physicians increasingly link to poor health.
Instead of force-feeding kids lies in bogus activity books, how about having them read some truthful articles?
The studyBt Toxin Kills Human Kidney Cells says Bt toxins are not “inert” on human cells, and may indeed be toxic, causing kidney damage and allergies observed in farmers and factory workers handling Bt crops. The article supportsprevious studies done on rats, showing that animals fed on three strains of GE corn made by Monsanto suffered signs of organ damage after only three months.
It is abundantly clear that both GMOs made to be resistant to herbicides (aka “Roundup Ready”) and those made to produce insecticides have damaging impacts on the health of mammals who consume them, particularly in the liver and kidneys. We already know that from the trials of 90 days and less. In looking a little deeper into the info, we found a number of issues that point to a probable increased level of toxicity when these foods are consumed over the long term, including likely multi-generational effects.
Multi-generational effects. Eating GMO foods harms not only our health, and our kids’ health — but quite possibly their kids, too — even if we stop eating them today.
In a recent report to the United Nations General Assembly Human Rights Council by Special Rapporteur on the right to food, Olivier De Schutter, Schutter outlines the case for sustainable agricultural practices (the antithesis of industrial agribusiness, with its GE crops and heavy reliance on chemical fertilizers and pesticides). He also addresses the links between health and malnutrition. In the report, Schutter shows why undernutrition, micronutrient deficiency and overnutrition are different dimensions of malnutrition that must be addressed together through a life-course approach. From the report’s summary:
Existing food systems have failed to address hunger, and at the same time encourage diets that are a source of overweight and obesity that cause even more deaths worldwide than does underweight. A transition towards sustainable diets will succeed only by supporting diverse farming systems that ensure that adequate diets are accessible to all, that simultaneously support the livelihoods of poor farmers and that are ecologically sustainable.
Corporate greed plus a complicit government have allowed for the rampant poisoning of our food and environment, and the demise of sustainable agriculture practices — practices sorely needed if we are going to feed the world’s population, and avoid a world health crisis. And we’ve exported the same misery and destruction to foreign countries far and wide.
Propaganda like the CBI’s Look Closer at Biotechnology has brainwashed many of our kids into thinking that the biotech industry has people — not profits — in its best interests. The book’s claims are laughable. But framing blatant lies as “science” for children in schools borders on criminal.
For parents and teachers out there, here’s an alternate lesson plan. Because world hunger is a concern, because saving our planet does matter, and because better health is a worthy and achievable goal, let’s ask our kids to think critically, instead of accepting at face value “information” attractively packaged by multinational corporations.
Don M. Huber, emeritus soil scientist of Purdue University puts it in terms everyone, kids included, can understand. Huber talks about a range of key factors involved in plant growth, including sunlight, water, temperature, genetics, and nutrients taken up from the soil. “Any change in any of these factors impacts all the factors,” he said. “No one element acts alone, but all are part of a system.” “When you change one thing,” he said, “everything else in the web of life changes in relationship.”
This is what we should be teaching the future stewards of our planet.