CIA ‘torture’ Psychologists to On Trial Via ACLU

Two psychologists who helped design the CIA's post-9/11 detainee interrogation program will stand trial in September for promoting the use of torture methods like water-boarding, starvation and chaining prisoners in extreme stress positions

CIA ‘torture’ psychologists to stand trial

Two psychologists who helped design the CIA’s post-9/11 detainee interrogation program will stand trial in September for promoting the use of torture methods like water-boarding, starvation and chaining prisoners in extreme stress positions (AFP Photo/PAUL J. RICHARDS)

Washington (AFP) – Two psychologists who helped design the CIA’s post-9/11 detainee interrogation program will stand trial in September for promoting the use of torture methods like water-boarding, starvation and chaining prisoners in extreme stress positions.

Federal judges in Washington state late Monday ordered a lawsuit on behalf of three former detainees — one of whom died in a CIA prison following harsh interrogation — to go to a jury trial, rejecting efforts to force a settlement and prevent a full hearing of the case.

The lawsuit, filed by the American Civil Liberties Union on behalf of the ex-detainees, will be the first involving the torture program to go to trial.

Continue reading CIA ‘torture’ Psychologists to On Trial Via ACLU

CIA Agent Confesses On Deathbed: ‘We Blew Up WTC7 On 9/11’

CIA Agent Confesses On Deathbed: ‘We Blew Up WTC7 On 9/11’

CIA agent confesses to blowing up WTC7 on 9/11

79-year-old retired CIA agent, Malcom Howard, has made a series of astonishing claims since being released from hospital in New Jersey on Friday and told he has weeks to live. Mr. Howard claims he was involved in the “controlled demolition” of World Trade Center 7, the third building that was destroyed on 9/11.

Mr. Howard, who worked for the CIA for 36 years as an operative, claims he was tapped by senior CIA agents to work on the project due to his engineering background, and early career in the demolition business.

Trained as a civil engineer, Mr. Howard became an explosives expert after being headhunted by the CIA in early 1980s. Mr. Howard says has extensive experience in planting explosives in items as small as cigarette lighters and as large as “80 floor buildings.

Continue reading CIA Agent Confesses On Deathbed: ‘We Blew Up WTC7 On 9/11’

United States seeks to Criminalize Cash and Cryptocurrencies in New Bill; While Russia, India, Japan, China, Australia Legalize and Support

United States seeks to Criminalize Cash and Cryptocurrencies; While Russia, India, Japan, China, Australia Legalize and Support

The brazen move by the United States to legalize cryptocurrencies seem to be to control it, make it illegal, to stop the perception that Federal Reserve notes are both worthless and valueless, and to recapture its realizing value back into a dying debt-money system of injustice; particularly financial injustice.

DQmUYVGCQdz1ZGYksBgaefxshFQ6NJ2dgvsw4tDAzoktDYF_1680x8400.jpeg

(WASHINGTON, DC) The new Bill S.1241 titled *Combating Money Laundering, Terrorist Financing, and Counterfeiting Act* of 2017 makes it illegal to have and transact in cash and digital currencies/cryptocurriencies without registering the amounts and trades with a local bank.

The Money Laundering Act conceptually declares digital crytpo-currency mining, usage, and holding an act of money laundering and counterfeiting, particularly in regards to Federal Reserve Notes maintaining their fictitious Valueless Perception of Worth.

Meanwhile: Continue reading United States seeks to Criminalize Cash and Cryptocurrencies in New Bill; While Russia, India, Japan, China, Australia Legalize and Support

NSA Whistleblower William Binney Exposes “The Program” to Secretly Spy on All US Citizens -Stellar Wind

Secret program [Stellar Wind] gives NSA, FBI backdoor access to Apple, Google, Facebook, Microsoft data

Stellar Wind, Prism, EvilOlive, ShellTrumpet are the names of some of the US massive surveillance programs revealed recently by the press …

Declassified report points to flaws in post-9/11 NSA wiretapping


Entire Stellar Wind (CIA/NSA ‘president’s surveillance program’) from Wikileaks

A copy of the 400+ pages (700+ pdf) of the CIA/NSA ‘Stellar Wind’ (aka ‘President’s Surveillance’) Program is provided below. Recent commentaries are also included.  Stellar Wind was launched in 2001 and continued into the first two years of the Obama administration and in 2011 was ended. Stellar Wind was a creation of the NSA and CIA to track and store all domestic internet traffic. The program’s activities involved data mining of a large database of the communications of American citizens, including e-mail communications, telephone conversations, financial transactions, and Internet activity. Stellar Wind was replaced by a series of other programs, such as Boundless Informant, PRISM and XKeyscore (as exposed by Edward Snowden).

In June 2013 the Washington Post and the Guardian published an OIG draft report, dated March 2009, leaked by Edward Snowden detailing the Stellar Wind program. In June 2013 the Guardian also published the Inspector General’s report on Stellar Wind as well as correspondence involving attorney general Michael Mukasey in 2007 requesting permission for the NSA to expand its ‘contact chains’ deeper into Americans’ email records.

In 2012 the New York Times published a video interview with NSA whistleblower William Binney, who helped design Stellar Wind. NSA whistleblower Thomas Drake also commented on SW.

Here, courtesy of Cryptome, is a copy of a document that examines the legality of the program.

To see the entire ‘Stellar Wind’ (aka ‘President’s Surveillance’) Program document, click here.

A General History of Secret Societies 2017- The Role of Colleges and Universities

“In the Light, we pass on the light”
                                 – University Latin Moto

Pope Francis is the First Jesuit Pope.

This is a part of the Jesuit Oath that Pope Francis had to perform to be a Jesuit:

Continue reading A General History of Secret Societies 2017- The Role of Colleges and Universities

Wikileaks Julian Assange – ‘Google is Not What it Seems’ – They ‘Do Things the CIA Cannot’ – and State Department, CFR, NSA

Rather than using “GOOGLE.COM” there are many safe private secure alternatives:

Note: Google is blocking what it deems to be FAKE NEWS, which apparently this website is a part of.  Despite what Donald Trump Says:

By translation: Google.com Is The Enemy.  NSA is the enemy.  CIA is the enemy; for their conspiring with Google and Alphabet, Inc (Google’s parent company).

Julian Assange — ‘Google is Not What it Seems’ — They ‘Do Things the CIA Cannot’

Julian Assange cautioned all of us a while back, in the vein of revelations similar to those provided by Edward Snowden, that Google — the insidious search engine with a reputation for powering humanity’s research — plays the dark hand role in furthering U.S. imperialism and foreign policy agendas.

Now, as the Wikileaks founder faces days of questioning by a Swedish special prosecutor over rape allegations inside his Ecuadorian Embassy haven in London today — and particularly in wake of the presidential election — Assange’s warning Google “is not what it seems” must be revisited.

Continue reading Wikileaks Julian Assange – ‘Google is Not What it Seems’ – They ‘Do Things the CIA Cannot’ – and State Department, CFR, NSA

Ancestry.com Terms and Conditions gives All Corporations Perpetual Royalty Free World-Wide License to our DNA

Specifically, by submitting DNA to AncestryDNA, you agree to “grant AncestryDNA and the Ancestry Group Companies a perpetual, royalty-free, world-wide, transferable license to use your DNA, and any DNA you submit for any person from whom you obtained legal authorization as described in this Agreement, and to use, host, sublicense and distribute the resulting analysis to the extent and in the form or context we deem appropriate on or through any media or medium and with any technology or devices now known or hereafter developed or discovered.”

DNA is private property and is/was being abused without just compensation in a great many places particularly policy enforcers who just steal the DNA without just compensation in violation of the Constitutions Amendment 5.

The issue with Ancestry.com having such “royalty free perpetual licenses” to our private property DNA is that it is a SHARED CORPORATE License.  The F.B.I, C.I.A. I.R.S. etc are corporations that have greater authority to operate the legal artificial person trade-name bank-account insurance franchises corporations [e.g. called “PERSONS” and “INDIVIDUALS”]- as their parent governmental corporation created these “corporate persons.” These “legal fictional authorities” share these royalty free perpetual licenses with Ancestry.com.

Continue reading Ancestry.com Terms and Conditions gives All Corporations Perpetual Royalty Free World-Wide License to our DNA

Iris Biometric “Security” is Totally Ineffective- Theft of Private Property

In the Act- US, Inc committing iris private property theft of foreigners for the creation of more debt “SECURITIES.” [aka. Border “SECURITY”]

Using a camera, a printer, and a contact lens, hackers managed to bypass the S8’s iris scanner.  

Finger Prints are NOT effective tools in security as seen here.  Biometric security is NOT effective as -once taken and replicated- it cannot be changed!  If hackers are doing this with off the shelf components, what tools do the FBI, CIA, NSA, IRS, etc have?  FYI: These agencies and banks seem to all be spying on and collecting the data of the digital currencies such as Bitcoin, etc.  They likely pass these transactions through their Artificial Intelligence Banking System “BIG DATA” algorithms.

Indeed, Fingerprints, palm prints, iris prints, image-likeness, and DNA are all private property and require just compensation for public use of such private property.  However, the legal fictitious governmental service corporations steal these properties without any compensation as if that is the norm with the PRESUMPTION that such theft and property violations are somehow NOT terminating basic human rights.

Do NOT give up any biometric private property!  Biometric data is ineffective as security.  If a corporation wants your biometric data, we need to SELL it to them and define the terms and conditions of its use.

Continue reading Iris Biometric “Security” is Totally Ineffective- Theft of Private Property

Latest CIA Hacking Tools Used to Propagate XMR Monero Digital Currency Mining – XMR Rises 50%

“It’s Much Bigger Than WannaCry”: New Stealthy Cyberattack Could Dwarf Last Week’s Global Worm Epidemic

Another large-scale, stealthy cyberattack is underway on a scale that could dwarf last week’s assault on computers worldwide, a global cybersecurity firm told AFP on Wednesday.

Meet Adylkuzz – the new cyberattack that “is much bigger than WannaCry.”

Continue reading Latest CIA Hacking Tools Used to Propagate XMR Monero Digital Currency Mining – XMR Rises 50%

Most Advanced Government Computer Spying Tools Weaponized by Hacker Groups to Attack 74 Nations

Governmental Service Corporations -like the UNITED STATES INC, CHINA INC, and RUSSIA INC- all have developed the most advanced computer spying tools.  They have spend their “artificial person CITIZEN” funds to create these spying tools.

Wikileaks exposes many of these tools.  These include Vault 7: spying on chat, phones, Skype, WIFI networks, hacking PDF documents, and abusing the anti-virus software designed to stop these “infections” of corporate legalese BS.  Other CIA programs are: Eternal Blue, CrunchyLimeSkies, ElderPiggy, AngerQuake and McNugget.

Governments MUST use these tools in the “wild” where other people can take them and reverse engineer them.  If governments developed these tools but never used them, they can’t rationalize having built these spy softwares in the first place.

Thus, the most advance governmental service corporation Software spyware is used in the wild…  where actual Blackhat hackers operate.  These hackers now have access to these programs.  And they have got the codes…

Continue reading Most Advanced Government Computer Spying Tools Weaponized by Hacker Groups to Attack 74 Nations

Weaponized A.I. to Used to Prevent Exposure of Main Stream Mind Control Program

“AI APOCALYPSE: Trump Issues Fresh Threats to Enslave Planet with Weaponized AI to Prevent Exposure of Mind Control Program – Intel Sources” – Journalist John Nagel & Vincent Brannigan

“AI APOCALYPSE: Trump Issues Fresh Threats to Enslave Planet with Weaponized AI to Prevent Exposure of Mind Control Program – Intel Sources” – Journalist John Nagel & Vincent Brannigan

Part I of a multi-part series on weaponized AI Artificial Intelligence & the Future of the World Mind

Next: Part II: AI Apocalypse & The Future of the World Mind – Magnus Olsson, John M. Nagel, Vincent Brannigan

Continue reading Weaponized A.I. to Used to Prevent Exposure of Main Stream Mind Control Program

CEO Obama Illegally Robbed Fannie, Freddie To Fund ObamaCare

Let us not forget that ObamaCare was originally MittRomneyCare!

THE AMERICAN GOVERNMENT IS AT IT AGAIN WITH THEIR FRAUDULENT ACTIVITIES

KD: I wrote to David because on Fox News it was said recently that Freddie Mac and Fannie Mae were used by method of THEFT to Fund Obama Care. This was 6 days ago as I wrote him immediately before I forgot.

Continue reading CEO Obama Illegally Robbed Fannie, Freddie To Fund ObamaCare

Ron Paul Interviews Julian Assange: “Going After Wikileaks Because They Humiliated the CIA”

Wikileaks is being called a NON-STATE Intelligence Service.  Investigative Journalists investigating Human Right Crimes and analyzing it is called JOURNALISM.

By this new definition of “INTELLIGENCE SERVICES” as meaning “FREEDOM OF SPEECH,”  all news -e.g. Huffington Post, New York Times, Washington Post, L.A. Times, FOX News, CNN, RT, BBC, Al-Jeezira, etc- are Intelligence Services.

Investigative Journalists publish news publicly and use it for exposing criminal governmental service corporations.

INTELLIGENCE SERVICES keep the news private and use it for their own advantages.

Continue reading Ron Paul Interviews Julian Assange: “Going After Wikileaks Because They Humiliated the CIA”

Mainstream Media Finally Exposes CIA Drug Trafficking Conspiracy In Explosive History Channel Series

Mainstream Media Finally Exposes CIA Drug Trafficking Conspiracy In Explosive History Channel Series

By Matt Agorist

Richard Nixon, in his effort to silence black people and antiwar activists, brought the War on Drugs into full force in 1973. He then signed Reorganization Plan No. 2, which established the Drug Enforcement Administration (DEA). Over the course of five decades, this senseless war has waged on. At a cost of over $1 trillion — ruining and ending countless lives in the process — America’s drug war has created a drug problem that is worse now than ever before.

This is no coincidence.

For years, those of us who’ve been paying attention have seen who profits from this inhumane war — the police state and cartels.

Continue reading Mainstream Media Finally Exposes CIA Drug Trafficking Conspiracy In Explosive History Channel Series