tag:blogger.com,1999:blog-87793972581692863352024-03-12T17:00:55.786-07:00HARVEST TRUSTThis blog is dedicated to the research of Milton William Cooper. It's aim is to restore his articles from his former website http://harvest-trust.org and to publish them as well as other information regarding William Cooper or his work for research purposes.for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.comBlogger11125tag:blogger.com,1999:blog-8779397258169286335.post-7971285988667534142011-05-07T04:12:00.000-07:002011-05-07T04:12:43.357-07:00Secret Societies<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKdFoGqeFvue5PXWiXqLRNLicHenS7igcDxqlJhbftmP6KSEnbX6lKdoMOUNGvHhJuylR2YWUNNn-V6wMAK2nraIU7LOpk_rrAYYVQjEYQ3pf50lo-8I6fJAwicwsiFueNAChmDuEx5y5E/s1600/brotherhood-of-snake.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjKdFoGqeFvue5PXWiXqLRNLicHenS7igcDxqlJhbftmP6KSEnbX6lKdoMOUNGvHhJuylR2YWUNNn-V6wMAK2nraIU7LOpk_rrAYYVQjEYQ3pf50lo-8I6fJAwicwsiFueNAChmDuEx5y5E/s320/brotherhood-of-snake.jpg" width="268" /></a></div><br />
<a href="http://www.thelema.org/aa/">A.'.A.'.</a><br />
<br />
<a href="http://www.soul.org/index.php/courses/the-aeth-priesthood">Æth Priesthood</a><br />
<br />
<a href="http://www.co-masonry.org/">American Federation of Human Rights</a><br />
<br />
<a href="http://www.amorc.org/">AMORC Links</a><br />
<br />
<a href="http://www.neue-rosenkreuzer.de/quellen/www.arcgl.org/index.html">Ancient Rosae Crucis, ARC</a><br />
<br />
<a href="http://priory-of-sion.com/">Antiquae ordo Mystiquae Prieure de Sion</a><br />
<br />
<a href="http://www.bnaibrith.org/">B'nai B'rith</a><br />
<br />
<a href="http://www.bota.org/">Builders of the Adytum</a><br />
<br />
<a href="http://freemasonrywatch.org/communism.html">Communist</a><br />
<a name='more'></a><br />
<a href="http://www.demolay.org/">DeMolay International</a><br />
<br />
<a href="http://www.easternstar.org/">Eastern Star Links</a><br />
<br />
<a href="http://www.oto-usa.org/egc.html">Ecclesia Gnostica Catholica</a><br />
<br />
<a href="http://www.biblebelievers.org.au/masonic.htm">Founding of the Knights Templar</a><br />
<br />
<a href="http://www.nafra-sfo.org/index.html">Franciscan Order of Céli Dé</a><br />
<br />
<a href="http://www.fop.net/">Fraternal Order of Police Grand Lodge</a><br />
<br />
<a href="http://www.franc-maconnerie.org/">Fraternelle des Internautes Francophones</a><br />
<br />
<a href="http://www.soul.org/">Fraternitas Rosae Crucis</a><br />
<br />
<a href="http://www.womenfreemasonsusa.com/">Freemasonry for Women</a><br />
<br />
<a href="http://www.yorkrite.org/">General Grand Chapter & Council York Rite Freemasonry</a><br />
<br />
<a href="http://www.freemasonry.org.il/">Grand Lodge of Israel</a><br />
<br />
<a href="http://www.mastermason.com/hempstead749/JapanMas.htm">Grand Lodge of Japan</a><br />
<br />
<a href="http://www.nymasons.org/">Grand Lodge of New York F&AM</a><br />
<br />
<a href="http://glmf.fr/">Grande Loge Mixte de France USA</a><br />
<br />
<a href="http://mb-soft.com/believe/txn/francisc.htm">Grayfriars</a><br />
<br />
<a href="http://www.aliabadgrotto.com/">Grotto Aliabad</a><br />
<br />
<a href="http://www.bellagrotto.com/">Grotto Bella</a><br />
<br />
<a href="http://www.achbargrotto.com/">Grotto Achbar</a><br />
<br />
<a href="http://www.charityblossom.org/nonprofit/mystic-order-of-veiled-prophets-of-enchanted-realm-kodak-tn-37764-alfred-hudgens-237535653/">Grotto Zelmar</a><br />
<br />
<a href="http://www.hermeticgoldendawn.org/">Hermetic Order of the Golden Dawn</a><br />
<br />
<a href="http://knighttemplarpriests.com/">High Royal Arch Knight Templar Priests</a><br />
<br />
Horridas Nostrae Mentis Purga Tenebras Lumen Sensibus<br />
<br />
<a href="http://www.jesus-is-savior.com/False%20Religions/Illuminati/illuminati_exposed.htm">Illuminati Exposed</a><br />
<br />
<a href="http://www.freemasons-freemasonry.com/preston_illustrations_masonry.html">Illustrations of Masonry</a><br />
<br />
<a href="http://www.shrinershq.org/">Imperial Council, Shrine of North America</a><br />
<br />
<a href="http://www.iojd.org/">Supreme Bethel International Order of Job's Daughters</a><br />
<br />
<a href="http://www.kofc.org/en//index.html">Knights of Columbus Supreme Council</a><br />
<br />
<a href="http://www.orderstjohn.org/">Knights of Malta Order of St. John of Jerusalem</a><br />
<br />
<a href="http://en.wikipedia.org/wiki/Knights_of_the_White_Camelia">Knights of the White Kamellia</a><br />
<br />
<a href="http://www.webpages.free-online.co.uk/portcull/portcull.htm">Knights Templar Preceptory</a><br />
<br />
<a href="http://www.knightstemplarusa.org/">Knights Templar USA</a><br />
<br />
<a href="http://www.kkk.com/">Ku Klux Klan (KKK)</a><br />
<br />
<a href="http://www.pagrandlodge.org/links/glusa.html">Links to Masonic Grand Lodges</a><br />
<br />
L'Ordre du Temple<br />
<br />
La Queste del Saint Graal<br />
<br />
<a href="http://www.rose-croix-veritas.com/martinist.htm">Martinist Order of the Knights of Christ</a><br />
<br />
<a href="http://www.hermetics.org/Martinism.html">Martinist Order of the Temple</a><br />
<br />
<a href="http://www.phoenixmasonry.org/masonic_homes.htm">Masonic Homes in the United States</a><br />
<br />
<a href="http://www.whirling-dervish.org/">Mevlevi Order (Dervishes)</a><br />
<br />
<a href="http://www.orderofstjohn.org/">Most Venerable Order of the Hospital of Saint John of Jerusalem</a><br />
<br />
Mysteries of the Templars<br />
<br />
Myths and Stories of the Knights Templar<br />
<br />
<a href="http://www.nimatullahi.org/">Nimatullah Order</a><br />
<br />
<a href="http://www.nimatullahi.org/nimatullahi">Nimatullahi Order</a><br />
<br />
<a href="http://www.thelema.ca/156/Equinox/eqi09000.html">Order of Oriental Templars O.T.O. M.'.M.'.M.'. (British Section)</a><br />
<br />
<a href="http://leilah.org/oai.htm">Order of the Antichristian Illuminati</a><br />
<br />
<a href="http://www.omcesite.org/">Ordo Miltia Crucifera Evangelica</a><br />
<br />
<a href="http://www.michaelines.net/">Order of St. Michael</a><br />
<br />
<a href="http://www.ica.org.au/page-omc.html">Order of the Mystic Christ</a><br />
<br />
<a href="http://oto-usa.org/">Ordo Templi Orientis U.S. Grand Lodge</a><br />
<br />
<a href="http://www.memphis-misraim-international.org/">Ordre Maconnque De Memphis - Misraim</a><br />
<br />
<a href="http://www.bessel.org/philal.htm">Philalethes Society</a><br />
<br />
<a href="http://www.thephylaxis.org/">Phylaxis Society - Prince Hall</a><br />
<br />
<a href="http://www.princehall.org/">Prince Hall</a><br />
<br />
<a href="http://www.redcrossconstantine.org/">Red Cross of Constantine</a><br />
<br />
<a href="http://www.chivalricorders.org/vatican/holysep.htm">Religious and Military Order of Knights of the Holy Sepulchre of Jerusalem</a><br />
<br />
<a href="http://www.rosicrucian.org/home.html">Rosicrucian Order, AMORC</a><br />
<br />
<a href="http://www.brotherhoodoftherosycross.org/">Rosy Cross</a><br />
<br />
<a href="http://www.grandlodgescotland.com/index.php?option=com_content&task=view&id=54&Itemid=109">Royal Order of Scotland</a><br />
<br />
<a href="http://www.servantsofthelight.org/">Servants of the Light</a><br />
<br />
Sisters of Brigid and Clare<br />
<br />
<a href="http://www.orderofmalta.org.uk/">Sovereign Military Hospitaller Order of Saint John of Jerusalem of Rhodes and of Malta</a><br />
<br />
<a href="http://www.orderofmalta-federal.org/">Sovereign Military Order of Malta, Federal Association, USA</a><br />
<br />
<a href="http://www.gorainbow.org/home/home.taf">Supreme Assembly International Order of the Rainbow for Girls</a><br />
<br />
<a href="http://www.supremecouncil.org/">Supreme Council 33º Ancient Accepted Scottish Rite Freemasonry Northern Jurisdiction</a><br />
<br />
<a href="http://scottishrite.org/">Supreme Council 33º Ancient Accepted Scottish Rite Freemasonry Sourthern Jurisdiction</a><br />
<br />
<a href="http://www.templars.org.uk/index-old.htm">Templar Knights</a><br />
<br />
<a href="http://www.hometemple.org/">Temple of the Holy Grail</a><br />
<br />
Templar Research Institute<br />
<br />
<a href="http://thelemicgoldendawn.net/">Thelemic Order of the Golden Dawn</a><br />
<br />
"The Orders"<br />
<br />
<a href="http://www.thule-society.com/">Thule Net</a><br />
<br />
<a href="http://www.illuminatiarchives.org/illuminati/the-knights-templars-friday-the-13th/">Templars and Friday the 13th</a><br />
<br />
<a href="http://www.ugle.org.uk/">United Grand Lodge of England</a>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com112tag:blogger.com,1999:blog-8779397258169286335.post-90283455169176518672011-05-06T16:03:00.000-07:002011-05-06T16:06:53.247-07:00Charters of Freedom<h5 align="center"><a href="http://archives.gov/"><span style="font-size: large;"><b><b>NationalArchives and Records Administration</b></b></span></a></h5><div align="center"><a href="http://archives.gov/exhibits/charters/"><span style="font-size: large;"><b><b>The Charters of Freedom</b></b></span></a></div><h5 align="center"><span style="font-size: large;"><a href="http://archives.gov/exhibits/charters/declaration.html"><b><b>Declaration of Independence </b></b><b><b>(txt)</b></b></a></span></h5><h5 align="center"><span style="font-size: large;"><a href="http://archives.gov/exhibits/charters/constitution.html">Constitution for the United States of America(txt)</a></span></h5><h5 align="center"><a href="http://archives.gov/exhibits/charters/bill_of_rights.html"><span style="font-size: large;"><b>The Bill of Rights (txt)</b></span></a></h5>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com2tag:blogger.com,1999:blog-8779397258169286335.post-2346673891505781882011-05-06T15:59:00.000-07:002011-05-06T15:59:16.234-07:00U.S. High Court Denies Strip - Search Appeal<h3><strong><strong>Children can be strip-searched by teachers -</strong></strong></h3><strong>Dateline -- Monday, November 10, 1997</strong><br />
<strong>U.S. High Court Denies Strip-Search Appeal</strong><br />
<strong><br />
</strong><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidcQu0s6P5NSR7P5sp5S3hy5A9Vj2h8A9UaP4jpnCn2jb9ja1N2lArpEfRXmZyp4cg_nZTF42uSFYX389ZvRYqTnwnOQZw6fuYfoh7OkjZr_C_9x1Qs8YJq3Eq2WY4mnXmRQMN9NBtm84f/s1600/vicini.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEidcQu0s6P5NSR7P5sp5S3hy5A9Vj2h8A9UaP4jpnCn2jb9ja1N2lArpEfRXmZyp4cg_nZTF42uSFYX389ZvRYqTnwnOQZw6fuYfoh7OkjZr_C_9x1Qs8YJq3Eq2WY4mnXmRQMN9NBtm84f/s1600/vicini.jpg" /></a></div><div style="text-align: center;"><div style="text-align: center;"><strong>By <a href="http://blogs.reuters.com/james-vicini/">James Vicini </a></strong></div><strong></strong></div><strong> <br />
The Supreme Court let stand Monday a ruling that public school officials did not violate clearly established constitutional privacy rights by twice strip-searching two girls in the second grade. <br />
<br />
The justices left intact a U.S. appeals court ruling that the officials may be guilty of "questionable judgment," but could not be held liable for money damages for an unconstitutional search of the 8-year-old girls. <br />
<br />
The case began May 1, 1992, when a teacher and a school counselor in Talladega, Ala., conducted the strip-searches after a classmate reported $7 missing from her purse. <br />
<br />
Another classmate accused one of the girls, Cassandra Jenkins, of stealing the money and putting it in the backpack of the other girl, Oneika McKenzie. No money was found in the backpack. <br />
<br />
The two girls were taken to a restroom and told by music teacher Susannah Herring to remove their clothes. They were told to come out of the toilet stalls with their underpants down to their ankles, which they did. <br />
<br />
No money was found on the girls or in their clothing. After a trip to the principal's office, the girls were taken by Herring and guidance counselorMelba Simon back to the restroom for another, unsuccessful strip-search. <br />
<br />
The parents of the two girls sued for damages under the civil rights laws, alleging violations of their constitutional right to be free from unreasonable searches. <br />
<br />
A federal judge dismissed the lawsuit. A divided appeals court in June upheld the decision, ruling that the teacher and counselor enjoyed partial immunity from the constitutional claim. <br />
<br />
The appeals court said that in 1992 the law involving searches of students at school had not been sufficiently developed to place the educators on notice that their conduct was constitutionally impermissible. <br />
<br />
The Supreme Court in a 1985 ruling gave school administrators greater flexibility to search students, but said they still have a legitimate right to privacy and added that the seach cannot be "excessively intrusive." <br />
<br />
Attorneys for the two girls appealed to the Supreme Court, arguing that the appeals court decision conflicted with the 1985 precedent. They said the appeals court decision sent the wrong message to "school officials nationwide." <br />
<br />
They said school authorities may strip-search students to prevent imminent danger from the possession of weapons or illegal drugs, but they may not use intrusive searches for "the most minor suspected infractions." <br />
<br />
The attorneys said Supreme Court guidance was urgently needed on the extent of constitutional constraints on strip-searches in schools. <br />
<br />
Attorneys for the teacher and the counselor urged that the appeal be denied, saying the appeals court correctly decided the case. The Supreme Court turned down the appeal without any comment or dissent. </strong>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com2tag:blogger.com,1999:blog-8779397258169286335.post-50976479586164242152011-05-06T14:18:00.000-07:002011-05-06T15:54:53.195-07:00Civilian Internment Camps a REALITY<h3><span style="font-size: small;"><b><b>Camps up for review -</b></b></span></h3><h3><span style="font-size: small;"><b>Dateline -- September 23, 1997, The Winds today announced ...</b></span></h3><h1 align="center"><span style="font-size: small;"><b><span style="font-family: Arial;"><b>CIVILIAN INTERNMENT CAMPS UP FOR REVIEW</b></span></b></span></h1><span style="font-family: Arial; font-size: small;"><b>VERITAS News Service - In a revealing admission the Director of Resource Management for the U.S. Army confirmed the validity of a memorandum relating to the establishment of a civilian inmate labor program under development by the Department of the Army. The document states, "Enclosed for your review and comment is the draft Army regulation on civilian inmate labor utilization" and the procedure to "establish civilian prison camps on installations." Cherith Chronicle, June 1997.</b></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8grFIiFDy7njwGNQjX_meZd8f5vali4WkglJq9OQSy_in4SZWIRhWsBQtV1Tv-eHWgmV5qw7e9loiJQHeYmOeuRqMJqzQbPd3WjOHvttqUC8sRx1mA2h6gJlG2tCOJEhC1j6C2gbSUAif/s1600/FEMA+CAMPS.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh8grFIiFDy7njwGNQjX_meZd8f5vali4WkglJq9OQSy_in4SZWIRhWsBQtV1Tv-eHWgmV5qw7e9loiJQHeYmOeuRqMJqzQbPd3WjOHvttqUC8sRx1mA2h6gJlG2tCOJEhC1j6C2gbSUAif/s1600/FEMA+CAMPS.jpg" /></a></div><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><b>Civilian internment camps or prison camps, more commonly known as concentration camps, have been the subject of much rumor and speculation during the past few years in America. Several publications have devoted space to the topic and many talk radio programs have dealt with the issue.</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><b>However, Congressman Henry Gonzales (D, Texas) clarified the question of the existence of civilian detention camps. In an interview the congressman stated, "the truth is yes - you do have these stand by provisions, and the plans are here...whereby you could, in the name of stopping terrorism...evoke the military and arrest Americans and put them in detention camps."</b></span><br />
<span style="font-family: Arial; font-size: small;"><b></b></span><br />
<a name='more'></a><br />
<h1 align="center"><span style="font-size: small;"><b><span style="font-family: Arial;"><b>HISTORY OF CIVILIAN INTERNMENT CAMPS</b></span></b></span></h1><span style="font-family: Arial; font-size: small;"><b>The concept of mass internment camps was implemented during the decade of the 1930's when the idea was either integrated into national security planning or put to actual use in the world's three socialistic experiments - the Soviet Union, Nazi Germany and the United States under Roosevelt.</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><b>On March 9, 1933, Adolph Hitler put his Dachau detention center into operation where thousands of his own countrymen were sent. (Source: Martin Gilber,The Holocaust). Stalin exterminated 7 to 10 million in his rural collectivization program from 1931-1933 and another 10 million in the purges of 1934-1939. It was this decade that the Soviet Gulag proved its worth. On August 24, 1939, FBI Director J. Edgar Hoover met with FDR to develop a detention plan for the United States. Five months after this meeting, Hitler opened the Auschwitz detention center in Poland.</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><b>On August 3, 1948, J. Edgar Hoover met with Attorney General J. Howard McGrath to form a plan whereby President Truman could suspend constitutional liberties during a national emergency. The plan was code-named "Security Portfolio" and, when activated, it would authorize the FBI to summarily arrest up to 20,000 persons and place them in national security detention camps. Prisoners would not have the right to a court hearing or habeas corpus appeal. Meanwhile, "Security Portfolio" allowed the FBI to develop a watch list of those who would be detained, as well as detailed information on their physical appearance, family, place of work, etc. (David Burnham, Above the Law).</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><b>Two years later Congress approved the Internal Security Act of 1950 which contained a provision authorizing an emergency detention plan. Hoover was unhappy with this law because it did not suspend the constitution and it guaranteed the right to a court hearing (habeas corpus). "For two years, while the FBI continued to secretly establish the detention camps and work out detailed seizure plans for thousands of individuals, Hoover kept badgering...[Attorney General McGrath for] official permission to ignore the 1950 law and carry on with the more ferocious 1948 program. On November 25, 1952, the attorney general...caved in to Hoover." ibid.</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><b>Congress repealed the Emergency Detention Act of 1950 more than twenty years later in 1971. Seemingly the threat of civilian internment in the United States was over, but not in reality. The Senate held hearings in December, 1975, revealing the ongoing internment plan which had never been terminated. The report, entitled, "Intelligence Activities, Senate Resolution 21", disclosed the covert agenda. In a series of documents, memos and testimony by government informants, the picture emerged of the designs by the federal government to monitor, infiltrate, arrest and incarcerate a potentially large segment of American society.</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><b>The Senate report also revealed the existence of the Master Search Warrant MSW) and the Master Arrest Warrant (MAW) which are currently in force. The MAW document, authorized by the United States Attorney General, directs the head of the FBI to: "Arrest persons whom I deem dangerous to the public peace and safety. These persons are to be detained and confined until further order." The MSW also instructs the FBI Director to "search certain premises where it is believed that there may be found contraband, prohibited articles, or other materials in violation of the Proclamation of the President of the United States." It includes such items as firearms, shortwave radio receiving sets, cameras, propaganda materials, printing presses, mimeograph machines, membership and financial records of organizations or groups that have been declared subversive, or may be hereafter declared subversive by the Attorney General."</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><b>Since the Senate hearings in 1975, the steady development of highly specialized surveillance capabilities, combined with the exploding computerized information technologies, have enabled a massive data base of personal information to be developed on millions of unsuspecting American citizens. It is all in place awaiting only a presidential declaration to be enforced by both military and civilian police.</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><b>In 1982, President Ronald Reagan issued National Security Directive 58 which empowered Robert McFarlane and Oliver North to use the National Security Council to secretly retrofit FEMA (Federal Emergency Management Agency) to manage the country during a national crisis. The 1984 "REX exercises" simulated civil unrest culminating in a national emergency with a contingency plan for the imprisonment of 400,000 people. REX 84 was so secretive that special metal security doors were installed on the FEMA building's fifth floor, and even long-term officials of the Civil Defense Office were prohibited entry. The ostensible purpose of this exercise was to handle an influx of refugees created by a war in Central America, but a more realistic scenario was the detention of American citizens.</b></span><br />
<br />
<h1 align="center"><span style="font-size: small;"><strong><span style="font-family: Arial;"><strong>STATE OF EMERGENCY</strong></span></strong></span></h1><h1 align="center"><span style="font-size: small;"><strong><span style="font-family: Arial;"><strong></strong></span></strong></span></h1><span style="font-family: Arial; font-size: small;"><strong>Under "REX" the President could declare a state of emergency, empowering the head of FEMA to take control of the internal infrastructure of the United States and suspend the constitution. The President could invoke executive orders 11000 thru 11004 which would: </strong></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><strong>1- Draft all citizens into work forces under government supervision. </strong></span><br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><strong>2- Empower the postmaster to register all men, women and children. </strong></span><br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><strong>3- Seize all airports and aircraft. </strong></span><br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><strong>4- Seize all housing and establish forced relocation of citizens.</strong></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><strong>FEMA, whose black budget comes from the Department of Defense, has worked closely with the Pentagon in an effort to avoid the legal restrictions of Posse Comitatus. While FEMA may not have been directly responsible for these precedent-setting cases, the principle of federal control was seen during the Los Angeles riots in 1992 with the federalization of the National Guard and during the siege at Waco, where Army tanks equipped with flame throwers were involved in the final conflagration.</strong></span><br />
<br />
<h1 align="center"><span style="font-size: small;"><strong><span style="font-family: Arial;"><strong>GOVERNMENT VIOLENCE IS "LEGITIMATE"?</strong></span></strong></span></h1><h1 align="center"><span style="font-size: small;"><strong><span style="font-family: Arial;"><strong></strong></span></strong></span></h1><span style="font-family: Arial; font-size: small;"><strong>The Deputy Attorney General of California commented at a conference that anyone who attacks the State, even verbally, becomes a revolutionary and an enemy by definition. Louis Guiffreda, who was head of FEMA, stated that "legitimate violence is integral to our form of government, for it is from this source that we can continue to purge our weaknesses."</strong></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><strong>It is significant to note that the dictionary definition of terrorism - "the calculated use of violence" - corresponds precisely to the government's stated policy of "the use of legitimate violence." One might ask, who are the real terrorists? Guiffreda's remark gives a revealing insight into the thinking of those who have been charged with oversight of the welfare of the citizens in this country. If one's convictions or philosophy does not correspond with the government's agenda, that individual may find himself on</strong></span><br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: x-small;"><strong><span style="font-size: small;">the government's enemy list. This makes him a "target" to be "purged" by the use of "legitimate violence." If one forgets the past, he will not be prepared for the future.</span> </strong></span><strong>http://www.thewinds.org/archive/government/fema7-97.html</strong><br />
<br />
<strong>The Winds is The World Internet News Distributary Source of information of interest to Americans interested in truth.</strong><strong> </strong><br />
<b></b><b><b></b></b>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com2tag:blogger.com,1999:blog-8779397258169286335.post-58416218124245655992011-05-06T14:11:00.000-07:002011-05-06T14:11:16.805-07:00Turner Donates $1 Billion to UN<h3><span style="font-size: small;"><strong><strong>over the next 10 years...</strong></strong></span></h3><h3><span style="font-size: small;"><strong>Dateline -- September 22, 1997 CNN Today Announced...</strong></span><strong><strong><span style="font-size: small;"> </span></strong></strong></h3><table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkg5jxjZLPjImMWwQYBgOTiPxpWc8iS9DiB9gn_HTztTtFEIvKvJ-_cfODGI-ZqKk38E6QVIFzokAZKyz-stsTMX_qSzQoyoGkEsC5tYx_ZdRM4BF_cafErKlVt0GvlwIyYxkyBUzQZ44D/s1600/ted_turner.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhkg5jxjZLPjImMWwQYBgOTiPxpWc8iS9DiB9gn_HTztTtFEIvKvJ-_cfODGI-ZqKk38E6QVIFzokAZKyz-stsTMX_qSzQoyoGkEsC5tYx_ZdRM4BF_cafErKlVt0GvlwIyYxkyBUzQZ44D/s1600/ted_turner.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Ted Turner</td></tr>
</tbody></table><h3><strong><strong></strong></strong></h3><span style="font-family: Arial; font-size: x-small;"><strong><span style="font-size: small;">VE</span><span style="font-size: small;">RITAS News Service - <a href="http://en.wikipedia.org/wiki/Ted_Turner">Ted Turner</a>, the founder of Cable News Network, told interviewer Larry King Thursday that he will donate $1 billion to the United Nations over the next 10 years. Turner said he will earmark the money for humanitarian agencies. He made a personal appeal for other wealthy people to also donate money to UN causes. He said a billion is a nice round number.</span></strong></span><br />
<span style="font-family: Arial; font-size: small;"><strong></strong></span><br />
<a name='more'></a><br />
<span style="font-size: small;"> </span><br />
<span style="font-family: Arial; font-size: small;"><strong>Turner, a vice chairman of Time Warner Inc., has long criticized the US government for failing to pay its $1.5 billion debt to the UN. He made the incredible announcement Thursday evening at the annual dinner in New York for the United Nations Association of the United States.</strong></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><strong>Turner said the money will go to a foundation that will support UN programs that aid refugees, children, the environment, mine clearance, health and ``the poorest people in the world, the ones who need the help the most.'' He will spread the $1 billion over 10 years in $100 million payments each year. Turner quipped, ``I always liked the idea, one for all, all for one. I kind of like that idea.''</strong></span><br />
<br />
<span style="font-size: small;"> </span><span style="font-family: Arial; font-size: small;"><strong>Ted Turner has a long history of supporting liberal and socialist causes. He is married to Jane Fonda, referred to by many as Commie Hanoi Jane in remembrance of her aid to communist North Vietnam while our boys were being killed in the Vietnam war. </strong></span><br />
<br />
<strong>VERITAS News Service is the world's largest and most successful volunteer news service.</strong><br />
<br />
<span style="color: red; font-size: medium;"><strong>Warning</strong></span><span style="color: red;"><strong> - Listen to everyone, read everything, believe nothing unless you can prove it in your own research.</strong></span>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com1tag:blogger.com,1999:blog-8779397258169286335.post-37621084270085453862011-05-06T14:02:00.000-07:002011-05-06T14:02:58.380-07:00Exposing the Global Surveillance System<span style="font-size: small;">IN THE LATE 1980S, IN A DECISION IT PROBABLY REGRETS, THE US PROMPTED NEW ZEALAND TO JOIN A NEW AND HIGHLY SECRET GLOBAL INTELLIGENCE SYSTEM. HAGER'S INVESTIGATION INTO IT AND HIS DISCOVERY OF THE ECHELON DICTIONARY HAS REVEALED ONE OF THE WORLD'S BIGGEST, MOST CLOSELY HELD INTELLIGENCE PROJECTS. THE SYSTEM ALLOWS SPY AGENCIES TO MONITOR MOST OF THE WORLD'S TELEPHONE, E-MAIL, AND TELEX COMMUNICATIONS.</span><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_hwjP3TErVQtCt8SrnTse7PYmF7QfpVQzM95mZmnV8sDl04cWzLAzjBcf8syFmv5ULAidhDAHiC7TaeH0OcQsuMfWxFcYpkJXZcbc48UKbBBYfn1Cn-Gla0utCkewhrcU4n1l1RilhjSv/s1600/250px-Nicky_Hager_July_2008b.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi_hwjP3TErVQtCt8SrnTse7PYmF7QfpVQzM95mZmnV8sDl04cWzLAzjBcf8syFmv5ULAidhDAHiC7TaeH0OcQsuMfWxFcYpkJXZcbc48UKbBBYfn1Cn-Gla0utCkewhrcU4n1l1RilhjSv/s1600/250px-Nicky_Hager_July_2008b.jpg" /></a></div><div style="text-align: center;"><b>by <a href="http://en.wikipedia.org/wiki/Nicky_Hager">Nicky Hager</a></b></div><br />
<span style="font-size: x-small;">F</span>or 40 years, New Zealand's largest intelligence agency, the Government Communications Security Bureau (GCSB) the nation's equivalent of the US National Security Agency (NSA) had been helping its Western allies to spy on countries throughout the Pacific region, without the knowledge of the New Zealand public or many of its highest elected officials. What the NSA did not know is that by the late 1980s, various intelligence staff had decided these activities had been too secret for too long, and were providing me with interviews and documents exposing New Zealand's intelligence activities. Eventually, more than 50 people who work or have worked in intelligence and related fields agreed to be interviewed.<br />
<br />
The activities they described made it possible to document, from the South Pacific, some alliance-wide systems and projects which have been kept secret elsewhere. Of these, by far the most important is <a href="http://en.wikipedia.org/wiki/Echelon_%28signals_intelligence%29">ECHELON</a>.<br />
<br />
<br />
<a name='more'></a><br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWE2OuHQHOr_tw24FiFglScUorJFqGrFkFRGZw8Pvpfa4GY2_dwCe_WdG8Bfpxtonn-PvxZm_-vDZhkFBAIH2a2ZI9YWFvs4VOClRJfAZBg5KgzOPzGtfl2zuajdF08d8Hq-na43yYMwxu/s1600/echelon.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="200" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiWE2OuHQHOr_tw24FiFglScUorJFqGrFkFRGZw8Pvpfa4GY2_dwCe_WdG8Bfpxtonn-PvxZm_-vDZhkFBAIH2a2ZI9YWFvs4VOClRJfAZBg5KgzOPzGtfl2zuajdF08d8Hq-na43yYMwxu/s320/echelon.jpg" width="320" /></a></div><br />
Designed and coordinated by NSA, the ECHELON system is used to intercept ordinary e-mail, fax, telex, and telephone communications carried over the world's telecommunications networks. Unlike many of the electronic spy systems developed during the Cold War, ECHELON is designed primarily for non-military targets: governments, organizations, businesses, and individuals in virtually every country. It potentially affects every person communicating between (and sometimes within) countries anywhere in the world. <br />
<br />
It is, of course, not a new idea that intelligence organizations tap into e-mail and other public telecommunications networks. What was new in the material leaked by the New Zealand intelligence staff was precise information on where the spying is done, how the system works, its capabilities and shortcomings, and many details such as the codenames<br />
<br />
The ECHELON system is not designed to eavesdrop on a particular individual's e-mail or fax link. Rather, the system works by indiscriminately intercepting very large quantities of communications and using computers to identify and extract messages of interest from the mass of unwanted ones. A chain of secret interception facilities has been established around the world to tap into all the major components of the international telecommunications networks. Some monitor communications satellites, others land-based communications networks, and others radio communications. ECHELON links together all these facilities, providing the US and its allies with the ability to intercept a large proportion of the communications on the planet. <br />
<br />
The computers at each station in the ECHELON network automatically search through the millions of messages intercepted for ones containing pre-programmed keywords. Keywords include all the names, localities, subjects, and so on that might be mentioned. Every word of every message intercepted at each station gets automatically searched whether or not a specific telephone number or e-mail address is on the list. <br />
<br />
The thousands of simultaneous messages are read in "real time" as they pour into the station, hour after hour, day after day, as the computer finds intelligence needles in telecommunications haystacks. <br />
<br />
<b>SOMEONE IS LISTENING</b><br />
The computers in stations around the globe are known, within the network, as the ECHELON Dictionaries. Computers that can automatically search through traffic for keywords have existed since at least the 1970s, but the ECHELON system was designed by NSA to interconnect all these computers and allow the stations to function as components of an integrated whole. The NSA and GCSB are bound together under the five-nation UKUSA signals intelligence agreement. The other three partners all with equally obscure names are the Government Communications Headquarters (GCHQ) in Britain, the Communications Security Establishment (CSE) in Canada, and the Defense Signals Directorate (DSD) in Australia. <br />
<br />
The alliance, which grew from cooperative efforts during World War II to intercept radio transmissions, was formalized into the UKUSA agreement in 1948 and aimed primarily against the USSR. The five UKUSA agencies are today the largest intelligence organizations in their respective countries. With much of the world's business occurring by fax, e-mail, and phone, spying on these communications receives the bulk of intelligence resources. For decades before the introduction of the ECHELON system, the UKUSA allies did intelligence collection operations for each other, but each agency usually processed and analyzed the intercept from its own stations. <br />
<br />
Under ECHELON, a particular station's Dictionary computer contains not only its parent agency's chosen keywords, but also has lists entered in for other agencies. In New Zealand's satellite interception station at Waihopai (in the South Island), for example, the computer has separate search lists for the NSA, GCHQ, DSD, and CSE in addition to its own. Whenever the Dictionary encounters a message containing one of the agencies' keywords, it automatically picks it and sends it directly to the headquarters of the agency concerned. No one in New Zealand screens, or even sees, the intelligence collected by the New Zealand station for the foreign agencies. Thus, the stations of the junior UKUSA allies function for the NSA no differently than if they were overtly NSA-run bases located on their soil<br />
<br />
The first component of the ECHELON network are stations specifically targeted on the international telecommunications satellites (Intelsats) used by the telephone companies of most countries. A ring of Intelsats is positioned around the world, stationary above the equator, each serving as a relay station for tens of thousands of simultaneous phone calls, fax, and e-mail. Five UKUSA stations have been established to intercept the communications carried by the Intelsats. <br />
<br />
The British GCHQ station is located at the top of high cliffs above the sea at Morwenstow in Cornwall. Satellite dishes beside sprawling operations buildings point toward Intelsats above the Atlantic, Europe, and, inclined almost to the horizon, the Indian Ocean. An NSA station at Sugar Grove, located 250 kilometers southwest of Washington, DC, in the mountains of West Virginia, covers Atlantic Intelsats transmitting down toward North and South America. Another NSA station is in Washington State, 200 kilometers southwest of Seattle, inside the Army's Yakima Firing Center. Its satellite dishes point out toward the Pacific Intelsats and to the east.<br />
<br />
The job of intercepting Pacific Intelsat communications that cannot be intercepted at Yakima went to New Zealand and Australia. Their South Pacific location helps to ensure global interception. New Zealand provides the station at Waihopai and Australia supplies the Geraldton station in West Australia (which targets both Pacific and Indian Ocean Intelsats). <br />
<br />
Each of the five stations' Dictionary computers has a codename to distinguish it from others in the network. The Yakima station, for instance, located in desert country between the Saddle Mountains and Rattlesnake Hills, has the COWBOY Dictionary, while the Waihopai station has the FLINTLOCK Dictionary. These codenames are recorded at the beginning of every intercepted message, before it is transmitted around the ECHELON network, allowing analysts to recognize at which station the interception occurred.<br />
<br />
New Zealand intelligence staff has been closely involved with the NSA's Yakima station since 1981, when NSA pushed the GCSB to contribute to a project targeting Japanese embassy communications. Since then, all five UKUSA agencies have been responsible for monitoring diplomatic cables from all Japanese posts within the same segments of the globe they are assigned for general UKUSA monitoring. Until New Zealand's integration into ECHELON with the opening of the Waihopai station in 1989, its share of the Japanese communications was intercepted at Yakima and sent unprocessed to the GCSB headquarters in Wellington for decryption, translation, and writing into UKUSA-format intelligence reports (the NSA provides the codebreaking programs).<br />
<br />
<span style="font-size: small;"><b>"COMMUNICATION" THROUGH SATELLITES</b><br />
The next component of the ECHELON system intercepts a range of satellite communications not carried by Intelsat.In addition to the UKUSA stations targeting Intelsat satellites, there are another five or more stations homing in on Russian and other regional communications satellites. These stations are Menwith Hill in northern England; Shoal Bay, outside Darwin in northern Australia (which targets Indonesian </span><span style="font-size: x-small;"><span style="font-size: small;">satellites); Leitrim, just south of Ottawa in Canada (which appears to intercept Latin American satellites); Bad Aibling in Germany; and Misawa in northern Japan. </span></span><br />
<br />
<span style="font-size: x-small;"><span style="font-size: small;"> A group of facilities that tap directly into land-based telecommunications systems is the final element of the ECHELON system. Besides satellite and radio, the other main method of transmitting large quantities of public, business, and government communications is a combination of water cables </span><span style="font-size: small;">under the oceans and microwave networks over land. Heavy cables, laid across seabeds between countries, account for much of the world's international communications. After they come out of the water and join land-based microwave networks they are very vulnerable to interception. The microwave networks are made up of chains of microwave towers relaying messages from hilltop to hilltop (always in line of sight) across the countryside. These networks shunt large quantities of communications across a country. Interception of them gives </span><span style="font-size: small;">access to international undersea communications (once they surface) </span><span style="font-size: small;"><b> </b>and to international communication trunk lines across continents. They are<b> </b></span><span style="font-size: x-small;"><span style="font-size: small;">also an obvious target for large-scale interception of domestic communications. </span></span></span><br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> Because the facilities required to intercept radio and satellite communications use large aerials and dishes that are difficult to hide for too long, that network is reasonably well documented. But all that is required to intercept land-based communication networks is a building situated along the microwave route or a hidden cable running underground from the legitimate network into some anonymous building, </span><span style="font-size: x-small;"><span style="font-size: small;">possibly far removed. Although it sounds technically very difficult, microwave interception from space by United States spy satellites also occurs. The worldwide network of facilities to intercept these communications is largely undocumented, and because New Zealand's GCSB does not participate in this type of interception, my inside sources could not help either. </span></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"> <span style="font-size: small;"><b> </b></span></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"><b>NO ONE IS SAFE FROM A MICROWAVE</b><br />
A 1994 expos of the Canadian UKUSA agency, Spyworld, co-authored by one of </span><span style="font-size: x-small;"><span style="font-size: small;">its former staff, Mike Frost, gave the first insights into how a lot of foreign microwave interception is done (see p. 18). It described UKUSA "embassy collection" operations, where sophisticated receivers and processors are secretly transported to their countries' overseas embassies in diplomatic bags and used to monitor various communications in foreign capitals. </span></span></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> Since most countries' microwave networks </span><span style="font-size: small;">converge on the capital city, embassy buildings can be an ideal site. Protected by diplomatic privilege, they allow interception in the heart of the target country.The Canadian embassy collection was requested by the NSA to fill gaps in the American and British embassy collection operations, which were still occurring in many capitals around the world when Frost left the CSE in 1990. Separate sources in Australia have revealed that the DSD also engages in embassy collection. On the territory of UKUSA nations, the interception of </span><span style="font-size: x-small;"><span style="font-size: small;">land-based telecommunications appears to be done at special secret intelligence facilities. The US, UK, and Canada are geographically well placed to intercept the large amounts of the world's communications that cross their territories. </span></span></span></span></span><br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;">The only public reference to the Dictionary system anywhere in the world was in relation to one of these facilities, run by the GCHQ in central London. In 1991, a former British GCHQ official spoke anonymously to Granada Television's World </span><span style="font-size: small;">in Action about the agency's abuses of power. He told the program about an anonymous red brick building at 8 Palmer Street where GCHQ secretly intercepts every telex which passes into, out of, or through London, feeding them into powerful computers with a program known as "Dictionary." The operation, he explained, is staffed by carefully vetted British Telecom people: "It's nothing to do with national security. It's because it's not legal to take every single telex.And they take everything: the embassies, all the </span><span style="font-size: x-small;"><span style="font-size: small;">business deals, even the birthday greetings, they take everything. They feed it into the Dictionary." What the documentary did not reveal is that Dictionary is not just a British system; it is UKUSA-wide. </span></span></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> Similarly, British researcher Duncan Campbell has described how the US Menwith Hill station in Britain taps directly into the British Telecom microwave network, which has actually been designed with several major </span><span style="font-size: x-small;"><span style="font-size: small;">microwave links converging on an isolated tower connected underground into the station. </span></span></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"> <span style="font-size: small;"> </span></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;">The NSA Menwith Hill station, with 22 satellite terminals and more than 4.9 acres of buildings, is undoubtedly the largest and most powerful in the UKUSA network. Located in northern England, several thousand kilometers from the Persian Gulf, it was awarded the NSA's "Station of the Year" prize for 1991 after its role in the Gulf War. Menwith Hill assists in the interception of microwave communications in another way as well, by </span><span style="font-size: small;">serving as a ground station for US electronic spy satellites. These intercept microwave trunk lines and short range communications such as military radios and walkie talkies. Other ground stations where the satellites' information is fed into the global network are Pine Gap, run by the CIA near Alice Springs in central Australia and the Bad Aibling station in Germany. Among them, the various stations and operations making up the ECHELON network tap into all the main components of the world's telecommunications networks.</span></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: x-small;"><br />
</span></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;">All of them, including a separate network of stations that intercepts long distance radio communications, have their own Dictionary computers connected into ECHELON. </span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> In the early 1990s, opponents of the Menwith Hill station obtained large quantities of internal documents from the facility. Among the papers was a reference to an NSA computer system called Platform. The integration of all the UKUSA station computers into ECHELON probably occurred with the introduction of this system in the early 1980s. James Bamford wrote at that time about a new worldwide NSA computer network codenamed Platform "which will tie together 52 separate computer systems used throughout the world. Focal point, or `host environment,' for the massive network will be the NSA headquarters at Fort Meade. Among those included in Platform will be the British SIGINT organization, GCHQ."</span></span></span><br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> <b> </b></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"><b>LOOKING IN THE DICTIONARY</b><br />
The Dictionary computers are connected via highly encrypted UKUSA communications that link back to computer data bases in the five agency headquarters. This is where all the intercepted messages selected by the Dictionaries end up. Each morning the specially "indoctrinated" signals intelligence analysts in Washington, Ottawa,Cheltenham, Canberra, and Wellington log on at their computer terminals and enter the Dictionary system. After keying in their security passwords, they reach a directory that lists the different categories of intercept available in the data bases, each with a four-digit code. For instance, 1911 might be Japanese diplomatic cables from Latin America (handled by the Canadian CSE), 3848 might be political communications from and about Nigeria, and 8182 might be any messages about distribution of encryption technology. </span></span></span><br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;">They select their subject category, get a "search result" showing how many messages have been caught in the ECHELON net on that subject, and then the day's work begins. Analysts scroll through screen after screen of intercepted faxes, e-mail messages, etc. and, whenever a message appears worth reporting on, they select it from the rest to work on. If it is not in English, it is translated and then written into the standard format of intelligence reports produced anywhere within the UKUSA network either in entirety as a "report," or as a summary or "gist." </span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> <b> </b></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"><b>INFORMATION CONTROL </b><br />
A highly organized system has been developed to control what is being searched for by each station and who can have access to it. This is at the heart of ECHELON operations and works as follows. </span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> The individual station's Dictionary computers do not simply have a long list of keywords to search for. And they do not send all the information into some huge database that participating agencies can dip into as they wish. It is much more controlled. </span></span></span><br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;">The search lists are organized into the same categories, referred to by the four digit numbers. Each agency decides its own categories according to its responsibilities for producing intelligence for the network. For GCSB, this means South Pacific governments, Japanese diplomatic, Russian Antarctic activities, and so on.</span></span></span><br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> </span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> The agency then works out about 10 to 50 keywords for selection in each category. The keywords include such things as names of people, ships, organizations, country names, and subject names. They also include the known telex and fax numbers and Internet addresses of any individuals, businesses, organizations, and government offices that are targets. These are generally written as part of the message text and so are easily recognized by the Dictionary computers.</span></span></span><br />
<br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> The agencies also specify combinations of keywords to help sift out communications of interest. For example, they might search for diplomatic cables containing both the words "Santiago" and "aid," or cables containing the word "Santiago" but not "consul" (to avoid the masses of routine consular communications). It is these sets of words and numbers (and combinations), under a particular category, that get placed in the Dictionary computers. (Staff in the five agencies called Dictionary Managers enter and update the keyword search lists for each agency.)</span></span></span><br />
<br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> The whole system, devised by the NSA, has been adopted completely by the other agencies. The Dictionary computers search through all the incoming messages and, whenever they encounter one with any of the agencies' keywords, they select it. At the same time, the computer automatically notes technical details such as the time and place of interception on the piece of intercept so that analysts reading it, in whichever agency it is going to, know where it came from, and what it is. Finally, the computer writes the four-digit code (for the category with the keywords in that message) at the bottom of the message's text. This is important. It means that when all the intercepted messages end up together in the database at one of the agency headquarters, the messages on a particular subject can be located again. Later, when the analyst using the Dictionary system selects the four- digit code for the category he or she wants, the computer simply searches through all the messages in the database for the ones which have been tagged with that number. </span></span></span><br />
<br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> This system is very effective for controlling which agencies can get what from the global network because each agency only gets the intelligence out of the ECHELON system from its own numbers. It does not have any access to the raw intelligence coming out of the system to the other agencies. For example, although most of the GCSB's intelligence production is primarily to serve the UKUSA alliance, New Zealand does not have access to the whole ECHELON network. The access it does have is strictly controlled. A New Zealand intelligence officer explained: "The agencies can all apply for numbers on each other's Dictionaries. The hardest to deal with are the Americans. ... [There are] more hoops to jump through, unless it is in their interest, in which case they'll do it for you." </span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> There is only one agency which, by virtue of its size and role within the alliance, will have access to the full potential of the ECHELON system the agency that set it up. What is the system used for? Anyone listening to official "discussion" of be forgiven for thinking that, since the end of the Cold War, the key targets of the massive UKUSA intelligence machine are terrorism, weapons proliferation, and economic intelligence. The idea that economic intelligence has become very important, in particular, has been carefully cultivated by intelligence agencies intent on preserving their post-Cold War budgets. It has become an article of faith in much discussion of intelligence. However, I have found no evidence that these are now the primary intelligence could concerns of organizations such as NSA. </span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> <b> </b></span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"><b>QUICKER INTELLIGENCE,SAME MISSION</b><br />
A different story emerges after examining very detailed information I have been given about the intelligence New Zealand collects for the UKUSA allies and detailed descriptions of what is in the yards-deep intelligence reports New Zealand receives from its four allies each week. There is quite a lot of intelligence collected about potential terrorists, and there is quite a lot of economic intelligence, notably intensive monitoring of all the countries participating in GATT negotiations. But by far, the main priorities of the intelligence alliance continue to be political and military intelligence to assist the larger allies to pursue their interests around the world. Anyone and anything the particular governments are concerned about can become a target. </span></span></span><br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> With capabilities so secret and so powerful, almost anything goes. For example, in June 1992, a group of current "highly placed intelligence operatives" from the British GCHQ spoke to the London Observer: "We feel we can no longer remain silent regarding that which we regard to be gross malpractice and negligence within the establishment in which we operate." They gave as examples GCHQ interception of three charitable organizations, including Amnesty International and Christian Aid. As the Observer reported: "At any time GCHQ is able to home in on their communications for a routine target request," the GCHQ source said. In the case of phone taps the procedure is known as Mantis. With telexes it is called Mayfly. By keying in a code relating to Third World aid, the source was able to demonstrate telex "fixes" on the three organizations. "It is then possible to key in a trigger word which enables us to home in on the telex communications whenever that word appears," he said. "And we can read a pre-determined number of characters either side of the keyword." Without actually naming it, this was a fairly precise description of how the ECHELON Dictionary system works. Again, what was not revealed in the publicity was that this is a UKUSA-wide system. The design of ECHELON means that the interception of these organizations could have occurred anywhere in the network, at any station where the GCHQ had requested that the four-digit code covering Third World aid be placed. </span></span></span><br />
<br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> Note that these GCHQ officers mentioned that the system was being used for telephone calls. In New Zealand, ECHELON is used only to intercept written communications: fax, e-mail, and telex. The reason, according to intelligence staff, is that the agency does not have the staff to analyze large quantities of telephone conversations. </span></span></span><br />
<br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> Mike Frost's expos of Canadian "embassy collection" operations described the NSA computers they used, called Oratory, that can "listen" to telephone calls and recognize when keywords are spoken. Just as we can recognize words spoken in all the different tones and accents we encounter, so too, according to Frost, can these computers. Telephone calls containing keywords are automatically extracted from the masses of other calls and recorded digitally on magnetic tapes for analysts back at agency headquarters. However, high volume voice recognition computers will be technically difficult to perfect, and my New Zealand-based sources could not confirm that this capability exists. But, if or when it is perfected, the implications would be immense. It would mean that the UKUSA agencies could use machines to search through all the international telephone calls in the world, in the same way that they do written messages. If this equipment exists for use in embassy collection, it will presumably be used in all the stations throughout the ECHELON network. It is yet to be confirmed how extensively telephone communications are being targeted by the ECHELON stations for the other agencies. </span></span></span><br />
<br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> The easiest pickings for the ECHELON system are the individuals, organizations,and governments that do not use encryption. In New Zealand's area, for example, it has proved especially useful against already vulnerable South Pacific nations which do not use any coding, even for government communications (all these communications of New Zealand's neighbors are supplied, unscreened, to its UKUSA allies). As a result of the revelations in my book, there is currently a project under way in the Pacific to promote and supply publicly available encryption software to vulnerable organizations such as democracy movements in countries with repressive governments. This is one practical way of curbing illegitimate uses of the ECHELON capabilities. </span></span></span><br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> One final comment. All the newspapers, commentators, and "well placed sources" told the public that New Zealand was cut off from US intelligence in the mid-1980s. That was entirely untrue. The intelligence supply to New Zealand did not stop, and instead, the decade since has been a period of increased integration of New Zealand into the US system. Virtually everything the equipment, manuals, ways of operating, jargon, codes, and so on, used in the GCSB continues to be imported entirely from the larger allies (in practice, usually the NSA). As with the Australian and Canadian agencies, most of the priorities continue to come from the US, too. </span></span></span><br />
<br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;">The main thing that protects these agencies from change is their secrecy. On the day my book arrived in the book shops, without prior publicity, there was an all-day meeting of the intelligence bureaucrats in the prime minister's department trying to decide if they could prevent it from being distributed. They eventually concluded, sensibly, that the political costs were too high. It is understandable that they were so agitated. </span></span></span><br />
<br />
<br />
<span style="font-size: x-small;"><span style="font-size: x-small;"><span style="font-size: small;"> Throughout my research, I have faced official denials or governments refusing to comment on publicity about intelligence activities. Given the pervasive atmosphere of secrecy and stonewalling, it is always hard for the public to judge what is fact, what is speculation, and what is paranoia. Thus, in uncovering New Zealand's role in the NSA-led alliance, my aim was to provide so much detail about the operations the technical systems, the daily work of individual staff members, and even the rooms in which they work inside intelligence facilities that readers could feel confident that they were getting close to the truth. I hope the information leaked by intelligence staff in New Zealand about UKUSA and its systems such as ECHELON will help lead to change.</span></span></span>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com3tag:blogger.com,1999:blog-8779397258169286335.post-67971679243988939542011-05-06T13:18:00.000-07:002011-05-06T13:26:35.459-07:00Satanism in Vatican?<h3 style="font-weight: normal;"><b><span style="color: red;"><b>Two eminent Churchmen Declare: "Satanism IS practiced in the Vatican."</b></span></b></h3><h3><b><span style="color: red;"><b></b></span></b></h3><span style="color: navy;"><b>Dateline -- The <span style="font-size: small;">Fatima</span> Network today announced ...</b></span><br />
<span style="color: navy;"><b>For Immediate Release September 15, 1997</b></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjva5-rma3Ank7oPkIDLmc57kfQHmYQ7SnTkUm3emhZMSJ3Y2JffDCkGlWHJwOQUaA8kCW4-hdpc_NBk21zDtOX6M7bkCwoJECVSSj9PuwY4H_nCo6xQ72Yc17D4vmzdWzBm-VRIc0Pv4JW/s1600/fatima.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="97" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjva5-rma3Ank7oPkIDLmc57kfQHmYQ7SnTkUm3emhZMSJ3Y2JffDCkGlWHJwOQUaA8kCW4-hdpc_NBk21zDtOX6M7bkCwoJECVSSj9PuwY4H_nCo6xQ72Yc17D4vmzdWzBm-VRIc0Pv4JW/s320/fatima.gif" width="320" /></a></div><br />
<span style="color: navy; font-family: Arial; font-size: small;"><b>In recent weeks, a firestorm has been raging in Italy. The controversy revolves around the statements Archbishop <a href="http://en.wikipedia.org/wiki/Emmanuel_Milingo">Emmanuel Milingo</a>, who made formal allegations that satanic activity is taking place inside the Vatican. When questioned by the Italian press about the allegations, he said that he stood by them. The Archbishop chose the Fatima 2000 International Congress on World Peace held in Rome in November 1996 hosted by the Fatima Crusader magazine as a platform to first make these allegations public. </b></span><br />
<span style="color: navy; font-family: Arial; font-size: small;"><b></b></span><br />
<a name='more'></a><span style="color: navy; font-family: Arial; font-size: small;"><b><br />
</b></span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXZxqRPOyg4htHHvTp5Io3ccIp-j0soe0V5J_-ByjrzcP61RsaumvGS_HIxcakJHwGh2pgpC9QThyTm9KcPt7vQSr9t0v96ZhYyW1Xe-sIMAMqzmXVF9-Eqd7hHVT2fqLabShMnzq0LztA/s1600/milingo.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgXZxqRPOyg4htHHvTp5Io3ccIp-j0soe0V5J_-ByjrzcP61RsaumvGS_HIxcakJHwGh2pgpC9QThyTm9KcPt7vQSr9t0v96ZhYyW1Xe-sIMAMqzmXVF9-Eqd7hHVT2fqLabShMnzq0LztA/s1600/milingo.jpg" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Emmanuel Milingo</td></tr>
</tbody></table><span style="color: navy; font-family: Arial; font-size: small;"><b></b></span><br />
<span style="font-size: small;"></span><span style="color: navy; font-family: Arial; font-size: small;"><b>The Fatima 2000 Congress was sponsored by publisher Father <a href="http://en.wikipedia.org/wiki/Nicholas_Gruner">Nicholas Gruner</a>, who has spent the past 18 years attempting to persuade the Vatican to consecrate Russia to the Immaculate Heart of Mary as She requested in apparitions to three shepherd children at Fatima, Portugal, in 1917. Father Gruner has also sought disclosure of the Third Secret, which has been kept under lock and key in the Vatican since it was delivered there in 1957 and read by Pope John XXIII in private.</b></span><br />
<span style="color: navy; font-family: Arial; font-size: small;"><b><br />
</b></span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN9OjWVE7CcSh6f-kBOmf0PoB1KBta6tD-W-H8ZIuD-6vIJItpK4t3JtJv9itPFN8f9Fmpz48dvTXdmAXg14jRtngwGivbKRgE6FoF_vn__emG6xA7w7CwhtnmNhhzsesT-2hzD1q7FyNN/s1600/Gruner+Photo0001.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgN9OjWVE7CcSh6f-kBOmf0PoB1KBta6tD-W-H8ZIuD-6vIJItpK4t3JtJv9itPFN8f9Fmpz48dvTXdmAXg14jRtngwGivbKRgE6FoF_vn__emG6xA7w7CwhtnmNhhzsesT-2hzD1q7FyNN/s320/Gruner+Photo0001.jpg" width="251" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Nicholas Gruner</td></tr>
</tbody></table><span style="color: navy; font-family: Arial; font-size: small;"><b></b></span><br />
<span style="font-size: small;"></span><span style="color: navy; font-family: Arial; font-size: small;"><b>Archbishop Milingo, who works inside the Vatican, as the Special Delegate to The Pontifical Council for the Pastoral Care of Immigrants and Itinerants, is uniquely qualified to speak on the issue of satanism. Besides his responsibilities in the Vatican, the Archbishop is a world renowned veteran exorcist. </b></span><br />
<br />
<span style="font-size: small;"> </span><span style="color: navy; font-family: Arial; font-size: small;"><b>These allegations by Milingo are particularly interesting to informed Catholics because the statements that the Archbishop is making are very similar to the recent book written by the well respected Catholic writer, <a href="http://en.wikipedia.org/wiki/Malachi_Martin">Dr. Malachi Martin</a>. Dr. Martin s new book, Windswept House, which was published in 1996, was written as fiction, but renown author and editor Father Charles Fiore, FSSP, claims in his review of the book, which was printed in the Catholic Family News, July 1996, that it is "a novel in which actual persons and events are disguised as fiction."</b></span><br />
<span style="color: navy; font-family: Arial; font-size: small;"><b><br />
</b></span><br />
<table align="center" cellpadding="0" cellspacing="0" class="tr-caption-container" style="margin-left: auto; margin-right: auto; text-align: center;"><tbody>
<tr><td style="text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEe9Kj6BjRhtgGiGX2RzXshYgrbd9PNG58XmRhkze8keVx_suDTJdg4pv0N51G06vjmcCTMALaUPRiKMYVFYqEADBs7PJa7X_S60LFMAAONtHJvpNBH6UO2mZcS6O91k5-Ml6ZdPjDPmqI/s1600/MalachiMartin.jpg" imageanchor="1" style="margin-left: auto; margin-right: auto;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhEe9Kj6BjRhtgGiGX2RzXshYgrbd9PNG58XmRhkze8keVx_suDTJdg4pv0N51G06vjmcCTMALaUPRiKMYVFYqEADBs7PJa7X_S60LFMAAONtHJvpNBH6UO2mZcS6O91k5-Ml6ZdPjDPmqI/s320/MalachiMartin.jpg" width="244" /></a></td></tr>
<tr><td class="tr-caption" style="text-align: center;">Malachi Martin</td></tr>
</tbody></table><span style="color: navy; font-family: Arial; font-size: small;"><b></b></span><br />
<span style="color: navy; font-family: Arial; font-size: small;"><b></b></span><br />
<span style="font-size: small;"></span><span style="color: navy; font-family: Arial; font-size: small;"><b>Dr. Martin s book is shocking because in it he describes a satanic ritual which took place at Saint Paul s Chapel inside Vatican City, on June 29, 1963. Windswept House gives a scary depiction of high ranking Churchmen taking oaths signed with their own blood, who plot to destroy the Church from within and participate in meticulously enacted rituals that blaspheme and devilishly mimic the Holy Sacrifice of the Mass.</b></span><br />
<span style="color: navy; font-family: Arial; font-size: small;"></span><br />
<span style="color: navy; font-family: Arial; font-size: small;"></span><br />
<span style="color: navy; font-family: Arial; font-size: small;"><b></b></span><br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/yrp42zq69nI?feature=player_embedded' frameborder='0'></iframe></div><br />
<span style="color: navy; font-family: Arial; font-size: small;"><b>When Malachi Martin was questioned in Fatima shortly after the Archbishop's speech, he said, "Archbishop Milingo is a good Bishop and his contention that there are satanists in Rome is completely correct. Anybody who is acquainted with the state of affairs in the Vatican in the last 35 years is well aware that the prince of darkness has had and still has his surrogates in the court of St. Peter in Rome."</b></span><br />
<br />
<span style="color: navy; font-family: Arial; font-size: small;"><b> </b></span><br />
<span style="font-size: small;"> </span><span style="color: navy; font-family: Arial; font-size: small;"><b>Dr. Martin concluded his statement by discussing the importance of the work of Father Nicholas Gruner, by saying "Father Gruner is fulfilling a desperately needed function in the ongoing perception of Mary's role in the salvation of our imperilled world. Father Gruner is absolutely correct that the consecration of Russia as Our Lady desired, has not been executed. It may not be too late if Father Gruner's plea is heeded in time."</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="color: navy; font-family: Arial; font-size: small;"><b>Dr. Martin was Secretary to Cardinal Bea in the Vatican. Dr. Martin says that Cardinal Bea was shown the Third Secret by Pope John XXIII, and came out of the meeting visibly shaken, expressing his distress to Dr. Martin that the Pope was not going to reveal the Third Secret to the world. Dr. Martin also confirms that the content of the Third Secret is the unprecedented crisis in contemporary Catholicism and the failure of the Hierarchy to adequately address it.</b></span><br />
<br />
<span style="font-size: small;"> </span><span style="color: navy; font-family: Arial; font-size: small;"><b>In conclusion, it appears obvious that satanism is now, and has been, existing inside the walls of the Vatican itself. Through the courageous and reputable testimony of Archbishop Milingo and Dr. Malachi Martin, this deeply buried Vatican secret is surfacing at long last.</b></span><br />
<span style="color: navy;"><b><br />
</b></span><br />
<span style="color: green;"><b>The Fatima Network is opposed to the abandonment of traditional Catholic worship and the new ecumenical New World Order direction being taken by the Vatican. The Fatima Network is headed by Father Nicholas Gruner. Father Gruner believes the third secret of Fatima must be revealed to the world as "Mary" dictated.</b></span><br />
<br />
<span style="color: red; font-size: large;"><b>Warning</b></span><span style="color: red;"><b>... </b></span><span style="color: red; font-size: medium;"><b>"Listen to everyone, read everything, believe nothing unless you can prove it in your own research." William Cooper, Trustee, Harvest Trust</b></span>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com2tag:blogger.com,1999:blog-8779397258169286335.post-73916919871557974812011-05-06T12:28:00.000-07:002011-05-06T13:27:24.699-07:00Whitley Strieber - Mind Control Victim<a href="http://en.wikipedia.org/wiki/Whitley_Strieber">Whitley Strieber</a> - Mind Control Victim <br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwRFvOyIgIf-btbMGDS-0cNw8DJaYhA8J6J5oE717xDcxrUQG8SBI5BKESOXzXMlXbP6uLgGCxzw8n1dX5dxwjFIBAQ14XZ5912_x5aNWi2cF00TS93DKey38ovEDgTYpGLkp3pMWnqrzM/s1600/strieber.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiwRFvOyIgIf-btbMGDS-0cNw8DJaYhA8J6J5oE717xDcxrUQG8SBI5BKESOXzXMlXbP6uLgGCxzw8n1dX5dxwjFIBAQ14XZ5912_x5aNWi2cF00TS93DKey38ovEDgTYpGLkp3pMWnqrzM/s1600/strieber.jpg" /></a></div><br />
<br />
I hate to tell you that I told you so, but, "I told you so." The following article is from UFO Conspiracies & Cover-Ups; Special Issue, No. 1, 1998 Edited by Timothy Beckley. - William Cooper <br />
<span style="font-size: large;"><br />
</span><br />
<div style="text-align: center;"><span style="font-size: large;">"The Secret Government" <br />
or <br />
"The perplexing puzzle of Whitley Streiber's Secret School" <br />
<br />
by John Chambers </span></div><br />
<a name='more'></a><br />
<br />
Mr. Chambers interviewed Whitley Streiber in March of 1996 at the Gulf Breeze UFO Conference at the Clarion Resort Hotel in Pensacola, Florida. <br />
<br />
"The goal of this telepathic rape by disinformation, according to many in the UFO community, is to draw public attention away from what is really taking place: The unbridled use of vastly superior, other-worldly power by a group that has steadily become answerable to no one." <br />
<br />
(Quoting Chambers from his article.) <br />
<br />
"Ironically, while Strieber himself did not seem to be suggesting - or even thinking, at least consciously - that his own writings could be understood in terms of this conspiracy, his speculations made some who found his latest revelations in 'The Secret School' too extraordinary to be believed, wonder whether the Secret School was really a set of memories implanted by the Secret Government." <br />
<br />
". . . . learning to live outside time . . . I'm hoping the Secret School will be a mnemonic device and enable a lot of people to remember their own childhood experiences. I think every encounter starts in the Secret School", stated Streiber. <br />
<br />
Quoting Chambers: (referring to his travel back to lost civilizations)Strieber seemed from time to time to back away from a literal interpretation of these experiences. <br />
<br />
Again, from Chambers: Later in the conference was when the astute researcher hinted at this 'other meaning to this reality altogether' in statements the implications of which he did not seem to be fully aware of himself. At this session, Strieber spoke extensively of the Secret Government within our government. He began by chronicling his personal experience of the CIA. It was an organization that he hated. <br />
<br />
"I know a lot about the CIA," he declared. I know a lot of people in the CIA and I've been very close to the CIA at certain times in my life." But, he went on, "I don't like the CIA. I think it's a disaster, a national catastrophe of the first order, a satanic monstrosity." <br />
<br />
(KK's comments: I guess Whit is not ready to reveal his knowledge of satanic activities within the CIA.) <br />
<br />
Continuing: <br />
<br />
Then Strieber made the startling statement that, for some at the conference, seemed to undermine the authenticity of the 'Secret School' and open the discussion out to very different vistas. <br />
<br />
"In my childhood," he said quietly, " I was tested at a university in San Antonio, in about 1954-55, for a long time, with a lot of tests - this was the same time I was having my encounters as a child. Intelligence tests, I guess they were; I don't remember them very clearly. My brother was subjected when he was the same age to the same tests at the same place by the same doctor. We were never told what these tests were about. We were never told by our parents why it was done." <br />
<br />
"One of the things that I have been quietly researching over the past few years is CIA mind control activities that took place back in the 50s, using drugs, hypnosis, and involving children - especially bright kids. Because I fear that I may have been part of that. I may have been simply passed over; I hope I was. But I want to find out all about it. I want to understand it more." <br />
<br />
(KK's comments: Come on, Whit. We will understand the abuse that happened to you. You know, the events you talked about; the cruel stupid things that were done to you.) <br />
<br />
Quoting from Chambers: <br />
<br />
"he even-almost compulsively-returned once more to the subject of implants, alien or otherwise, and spoke of their capability to interact with the brain and to cause hallucinations. He had recently had a particularly powerful experience with the visitors, he said-and, just before that experience, he had smelled a strong, tangy odor that frequently introduced his encounters. 'They've started waking me up with smells,' he explained, ‘in order to make this harder for me. In any case, there is a particular odor that's sort of a combination of cigarette smoke and burning cardboard, I would say. It wakes me up." <br />
<br />
"And," he concluded-and to what extent was he aware of what he was implying-, "And, I know that temporal lobe epilepsy is associated with odors." <br />
<br />
But nothing he would say now will be as inherently mind blowing as what he had-almost unwittingly, it seemed!-already intimated: That his own Secret School might have been a product of the Secret Government. <br />
<br />
Really, all that there was left for him to do now was to rhapsodize about what all this had done for him, those years of recalling these soul-shaking events that seemed to have dominated his entire early inner life, and perhaps, just perhaps-might have been hallucinations so incredibly real as to seem to be as real as life itself, because they were fashioned out of a technology that came from a technologically higher life form than our own. <br />
<br />
(KK's comments: or a very low form of human who is very willing to utilized their fellow humans in any way shape or form for the "fatherland.") <br />
<br />
(John Chambers has an M.A. in English from the University of Toronto; was full-time instructor in English at Dawson College, Montreal, Quebec, and a senior editor at McGraw-Hill; publishing & managing editor with International Thomson Transport Press, both in New York; now an adjunct professor at Florida Atlantic University - KK: is this a viable, accredited academic institution?)for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com7tag:blogger.com,1999:blog-8779397258169286335.post-84786727881961966152011-05-06T12:15:00.000-07:002011-05-06T13:27:57.237-07:00Project Redlight & Project Redlight 2<h3><span style="color: red; font-size: large;"><b></b></span><b></b></h3><h3><b>Dateline -- October 1, 1997 Harvest Trust announced...</b></h3><br />
<span style="font-family: Arial; font-size: small;"><b>VERITAS News Service - Harvest Trust announced today that the classic videos Project Redlight and Project Redlight 2 produced by William Cooper in 1991 and 1992 will again be offered to the public for a limited time. The videos are the first that revealed the location of Area-51 and some of the secret black budget technology that is flown and tested at the super secret site. The tapes have been unavailable for the last 5 years.</b></span><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/pnpr4SH4lUY?feature=player_embedded' frameborder='0'></iframe></div><br />
<br />
<a name='more'></a><br />
<br />
<span style="font-family: Arial; font-size: small;"><b>If you have an insatiable curiosity about ufos, black budget projects, Area-51, advanced technology, or just love to watch rare and unusuall videos you will truly enjoy Project Redlight and Project Redlight 2. Redlight is the name of the Top Secret project that develops and tests anti-gravity and other far out aviation and space technology in the barren desert of nevada at a facility known as Area-51, Groom Dry Lake, about 135 miles north north west of Las Vegas.</b></span><br />
<span style="font-family: Arial; font-size: x-small;"><b><br />
</b></span><br />
<div class="separator" style="clear: both; text-align: center;"><iframe allowfullscreen='allowfullscreen' webkitallowfullscreen='webkitallowfullscreen' mozallowfullscreen='mozallowfullscreen' width='320' height='266' src='https://www.youtube.com/embed/JVdBfIVq06M?feature=player_embedded' frameborder='0'></iframe></div><span style="font-family: Arial; font-size: x-small;"><b><br />
</b></span><br />
<span style="font-family: Arial; font-size: x-small;"><b><br />
</b></span><br />
<span style="font-family: Arial; font-size: small;"><b>Despite what you might have heard from the many fakes, frauds, and disinformation agents, it was William Cooper who disclosed the existence of Area-51, its location, and the true nature of the testing that is conducted at the site. Cooper discovered this information in the early 70s while a member ot the Intelligence Briefing Team of Admiral Bernard Clarey CINCPACFLT and made many trips to the area over the years to watch the flight of the most advanced aircraft in the world. In 1988 William Cooper went public with his knowledge of what was really going on behind the veil of "National Security." He told the world about "Area-51," or "Dreamland", its radio call sign, on the Billy Goodman Happening, KVEG, Las Vegas, in early 1989. In January 1990, over 3,000 people gathered at the Show Boat Hotel in Las Vegas to hear William Cooper and see his slide photographs of the super secret site. It was the first time the public had ever seen photographs that proved there actually was a Top Secret government test site at the location known as Groom Dry Lake.</b></span><br />
<br />
<span style="font-family: Arial; font-size: small;"><b>William Cooper made his first video covering these subjects called Project Redlight in 1991. Project Redlight 2 was produced in 1992. The videos include footage never seen by anyone prior to its release. The shots of the secret technology in flight are actually a composite of footage taken over several years. The videos include tips on how to get there, what to wear, where to stay, and interviews with several visitors and local residents.</b></span><br />
<br />
<span style="font-family: Arial; font-size: small;"><b>The videos are not professional productions but are more than adequate considering the amateur status of the producer and the information that the videos contain. Both are close to 2 hours in length and must absolutely be viewed only in a completely dark room during the night shots of the technology in flight. The night footage was taped with a .5 lux rated camera and is astounding, to say the least. </b></span><br />
<br />
<span style="font-size: large;"><b>VERITAS News Service is the world's largest and most successful volunteer news service.</b></span><br />
<br />
<span style="color: red; font-size: large;"><b>Warning</b></span><span style="color: red; font-size: large;"><b> - Listen to everyone, read everything, believe nothing unless you can prove it in your own research.</b></span>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com1tag:blogger.com,1999:blog-8779397258169286335.post-60723027217125156832011-05-06T11:56:00.000-07:002011-05-06T13:28:26.943-07:00Area-51 still active...<h3><b><span style="color: purple;"><b>Popular Mechanics article was government propaganda.</b></span></b></h3><b>Dateline -- VERITAS News Service - by William Cooper</b><br />
<div align="left"><b>For Immediate Release September 1, 1997</b></div><div align="left"><br />
</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFFHqD9SsaPN2ExNUuYoThBOXBXDyUMMoZEpcvqJn27rRe5RaDhD0YxftfRda8PGoipsTEBnuSteS84ZBhAOd4uKKCHP_SVmJYenffOGudNlbuVIc4yLBht_a_ERAzqE7qTM3sJ4-hacCj/s1600/1_a51view.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="132" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEgFFHqD9SsaPN2ExNUuYoThBOXBXDyUMMoZEpcvqJn27rRe5RaDhD0YxftfRda8PGoipsTEBnuSteS84ZBhAOd4uKKCHP_SVmJYenffOGudNlbuVIc4yLBht_a_ERAzqE7qTM3sJ4-hacCj/s320/1_a51view.jpg" width="320" /></a></div><span style="color: purple;"><b>Photo of Area-51 from Freedom Ridge before the Air Force grabbed the land from BLM.</b></span><br />
<br />
<b>The Harvest Trust expedition to the Tickaboo Valley over the Labor Day weekend witnessed the testing of super-secret technology over Area-51 . The base has not moved nor has testing been shifted to any other site. The Popular Mechanics article written by Jim Wilson, Science/Technology Editor, seems to have been an intentional act of propaganda designed to stem the flow of the curious adventure seekers who hope to get a glimpse of the advanced aviation technology being tested at this top-secret remote desert site. </b><br />
<br />
<a name='more'></a><br />
<br />
<b>Observation of the 2 known entrances to Groom Dry Lake demonstrated no reduction of traffic from previous years. The Tickaboo Valley entrance was busy with the normal bus load of workers entering the site in the morning and leaving in the late afternoon. Automobile and security vehicles drove in and out on a regular basis. The camo-clad security details in their 4-wheel drive blazers blanketed the area. A couple of large 18 wheeler trucks were observed entering via the entrance south of Rachel in Sand Springs Valley. Both entrances were open... there are no gates or chains on either entrance. Jim Wilson's photo of the chained and locked gate to "Area-51" that appeared in Popular Mechanics magazine is an intentional deception.</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8nEBdgKWrijIAD6xCDOEhHaT8zIo1JhmyC4NSegmwPra4R7xpj370dJABcsL6lExUlpO60Sestd9wPp_kv-PgoHp1bGGHgihfQSxcnnrAiJnu8Twzmm7hlUQoCsdzcAv9d28Dp06RI3xj/s1600/2_a51sign.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi8nEBdgKWrijIAD6xCDOEhHaT8zIo1JhmyC4NSegmwPra4R7xpj370dJABcsL6lExUlpO60Sestd9wPp_kv-PgoHp1bGGHgihfQSxcnnrAiJnu8Twzmm7hlUQoCsdzcAv9d28Dp06RI3xj/s1600/2_a51sign.jpg" /></a></div><b></b><span style="color: purple;"><b>There is no fence, gate, or chain at the Tickaboo Valley entrance to the test site. These are the signs on the left side of the road at the entrance. There is another set on the right.</b></span><br />
<br />
<b>We observed aircraft and helecoptors flying in and out of the site as well as above the site on numerous occasions over the weekend. We observed testing of the saucer only on Sunday night August 31st. The craft ascended over a high mountain peak just north of the Groom Lake facility at approximately 11 PM PDT. The testing is now apparently being conducted in the valley between the highest mountain peaks to the north of the dry lake bed in an effort to escape detection by those watching outside the boundary of Area-51. On 4 occasions the craft rose far enough above the peak for us to get a good view of the machine and its unconventional maneuvers.</b><br />
<b> </b><br />
<b>The vehicle being tested was a huge orange glowing saucer shaped machine that hovered, ascended, descended and made sharp right angle turns as well as very fast circular spinning maneuvers that are impossible utilizing conventional aircraft. All those in our party were able to make very good observations using binoculars and spotting scopes. Some photographs were taken.</b><br />
<br />
<b>The technology is not "alien" except in the sense that the prototype may have been developed by the Germans during WW-II.. The technology that flys above Area-51 belongs to the United States of America. It is operated either from remote control or is piloted by humans. It is far superior to anything the public has ever known. </b><br />
<br />
<b>We were constantly watched by the armed security patrols in 4-wheel drive vehicles. We were always covered by at least 3 and a maximum of 5 security teams at all times day and night. When we went to the entrance to the test site in the Tickaboo Valley a security team observed us from the top of the hill directly south of the entrance. Six ominous signs lined the sides of the road. The most chilling stated, "Use of Deadly Force Authorized".</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjecn7OkVMcscdS0cmEy-oNvSOv4m0ME4_jw1TA-2VUJMm_TqyMTSKEd5cKFMsm8bMTA8ig-sd56WBvKyhUZ56n1Mp-YN67cmReyRjh8IWL8JK04S2DnGnA7Zx1eG77g7zuHF-x5gL0HmdD/s1600/3_notresps.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEjecn7OkVMcscdS0cmEy-oNvSOv4m0ME4_jw1TA-2VUJMm_TqyMTSKEd5cKFMsm8bMTA8ig-sd56WBvKyhUZ56n1Mp-YN67cmReyRjh8IWL8JK04S2DnGnA7Zx1eG77g7zuHF-x5gL0HmdD/s1600/3_notresps.jpg" /></a></div><b><br />
</b><br />
<b>One of the expedition members will be the guest on 'The Hour of The Time' Friday night, "space night", on September 5, 1997. The broadcast may be heard on Satellite GE-1, Channel 7, Audio 7.56, on over 700 low power FM stations across the country, and on ShortWave 9.955 MHz at 8 PM pacific and 11 PM eastern time.</b><br />
<br />
<b>You can order a studio quality stereo cassette tape of the radio broadcast by by specifying "Area-51 September 5, 1997" and sending check or money order made payable to HARVEST for $10 members, $12 non- members, postpaid to:</b><br />
<br />
<b>Harvest Trust, P.O. Box 2470, Pinetop, Arizona 85935, Phone/Fax (520) 333-4578</b><br />
<br />
<b>The VERITAS News Service is the largest and most successful organization of volunteer reporters and photographers in the world who furnish an alternative source of news. </b><br />
<br />
<span style="color: red;"><b>Warning - Listen to everyone... read everything... believe absolutely nothing unless you can prove it in your own research. - William Cooper, Trustee, Harvest Trust</b></span><b><br />
</b>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com2tag:blogger.com,1999:blog-8779397258169286335.post-14060427533602338852011-05-06T11:32:00.000-07:002011-05-06T11:32:51.827-07:00Happy Birthday, Mr. Cooper!<div style="text-align: center;">Happy Birthday, Bill!</div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5xf3U3r2rvKTegs0aBJefOldz6oYWYbmUnoBuxjjKWeRy1Y4Putc4Zqy_UGLUn_txniAKLGFNwgnDR9jyHN9St7jJJSwJOvQzZbgngRY9gR1WVouuQufc_R2Ws38SJbmENiN6o-jXnqJz/s1600/milton_william_cooper.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEi5xf3U3r2rvKTegs0aBJefOldz6oYWYbmUnoBuxjjKWeRy1Y4Putc4Zqy_UGLUn_txniAKLGFNwgnDR9jyHN9St7jJJSwJOvQzZbgngRY9gR1WVouuQufc_R2Ws38SJbmENiN6o-jXnqJz/s1600/milton_william_cooper.jpg" /></a></div><br />
<div style="text-align: center;">Today you would have become 68. We will never forget you! This blog is dedicated to you, your research and everybody who loves freedom in this world!</div><br />
<div style="text-align: center;">R.I.P.</div>for MWChttp://www.blogger.com/profile/13785162980363696176noreply@blogger.com2