telecommunications

Technocracy XIV: Psycho-Civilised

“Technological progress has merely provided us with more efficient means for going backwards”

Aldous Huxley


Note: A re-read of ‘Satan’s Little Helpers VII: Mind War’ is advised.

monitors1

The SMART-Surveillance Grid allows improvements in telecommunications, electricity provision and home functionality. It offers an exciting integration of eco-economics and energy saving technology along with the “Internet of Things” (IoT) and “Network of Things” (NoT) which is offering to revolutionise transport, communications and urban infrastructure as a whole. With embedded surveillance it permits advertisers, marketeers to access human minds as never before. Authorities can also tap in and use this consumerist techtopia to trap criminals and would-be “terrorists”. It requires that the State and Official Culture become so integrated through technology that the line will be blurred. Security and collectivism will be encouraged to a degree that compliance will be seen as good citizenship insofar as it maintains the urban environment and social provision. A new social contract will be loaded in favour of the State through a form of satiated servitude. (The Illuminist-Enlightenment thinkers would be well pleased).

So-called terrorists, dissidents/activists, protestors and ordinary citizens will need to be very concerned indeed on the road to SMART society as true individual thinking outside the box will slowly become frowned upon since it will not be conforming to the precept of a “psycho-civilised” society. The path of access to this dystopian view starts with ubiquitous surveillance.

As one short example illustrates, Britain’s Leeds-based Metropolitan Police Force is using a surveillance system procured from Datong plc., past customers of which have been the US Secret Service, the Ministry of Defence and unsavory regimes in the Middle East. The system is disguised as a mobile phone network which transmits a signal allowing the police or any other authority: “… to shut off phones remotely, intercept communications and gather data about thousands of users in a targeted area,” … “Strictly classified under government protocol as “Listed X”, it can emit a signal over an area of up to an estimated 10 sq.km, forcing hundreds of mobile phones per minute to release their unique IMSI and IMEI identity codes, which can be used to track a person’s movements in real time.” [1]

This is just one regional police force.

While the online company Amazon will track you via your Kindle reader for targeted advertising pathway prediction, the authorities will do the same based on the accumulated data to which it has access. It will not be for what you might buy, rather it will access what you may be thinking and your likely course of action on the “threat assessment” scale. There is precious little happening to prevent Google and other information technology companies from rolling out the SMART Internet of Things infrastructure which has enormous implications for a privacy and collective freedoms. Wi-Fi is destined to play a huge role.

militarysmartcityUrban law enforcement and Telephone towers with technology which allows multiple receive-transmit capability 

The social benefits of providing free access to Wi-Fi hot spots for those in low-income brackets and incentives for business travellers are shielding plans by the U.S. Department of Defence: “… to build robots that configure themselves into ad hoc wireless networks within urban areas” which were already well underway in 2007. Seizing control of internet communications and tracking individuals in urban areas is a necessary by-product of the technocratic SMART society. If that fails, the military are well placed to set up these Wi-Fi networks in a matter of hours or less. The Department of Defence (DOD) Homeland Security, Canadian, Israeli and NATO forces regularly conduct war-game exercises with Wi-Fi networks at the heart of operations. A DOD announcement for contractors as described by journalist Mark Baard discloses operations whereby:

“… soldiers will be able to drop robots, called LANdroids … when they arrive in a city. The robots will then scurry off to position themselves, becoming nodes for a wireless communications network…The Wi-Fi antennae dotting the urban landscape will serve not only as communications relays, but as transponders that can pinpoint the exact positions of individual computers and mobile phones…where GPS loses site of a device (and its owner), Wi-Fi will pick up the trail. The antennae will also relay orders to the brain-chipped masses, members of the British Ministry of Defense and the DOD believe.” [2]

As people become more accustomed to SMART technology and RFID tagging this will lead to the acceptance of our “need” to ensure greater technological “freedom.” As well as the technological capabilities of HAARP lying in the background in some form or another and married to these advances in technology, is it such a huge leap of imagination to think that once we are fully enmeshed in this SMART society where everything is habitually integrated that it would not be easy to begin directly assessing, monitoring and “downloading” material directly into the mass mind? Television has already served this purpose well, albeit in a more indirect fashion. With this in mind, though some have since expired and at least one is no longer listed (as of 1990) the US patent office listed the following successful registrations dating back to 1992:

U.S. Patent 5159703: Silent Subliminal Presentation System. (issued 1992) U.S. Patent 5507291: Method and an associated apparatus for remotely determining information as to a person’s emotional state. (issued 1996) U.S. Patent 5629678: Implantable transceiver – apparatus for Tracking and Recovering Humans. (issued 1997) U.S. Patent 6014080: Body worn active and passive tracking device (issued 2000) U.S. Patent 5868100: Fenceless Animal control system using GPS (Global Positioning Satellite) Location information. (issued 1999) [3]

US patent No. 5507291 filed on April 5, 1994 shows the level advancement at the public level. What goes on beyond top secret levels of the National Security State is anyone’s guess. The patent’s “abstract” is described as follows:

“In a method for remotely determining information relating to a person’s emotional state, an waveform energy having a predetermined frequency and a predetermined intensity is generated and wirelessly transmitted towards a remotely located subject. Waveform energy emitted from the subject is detected and automatically analyzed to derive information relating to the individual’s emotional state. Physiological or physical parameters of blood pressure, pulse rate, pupil size, respiration rate and perspiration level are measured and compared with reference values to provide information utilizable in evaluating interviewee’s responses or possibly criminal intent in security sensitive areas.” [4] [Emphasis mine]

And US patent No. 5159703, filed on December 28, 1989:

“A silent communications system in which nonaural carriers, in the very low or very high audio frequency range or in the adjacent ultrasonic frequency spectrum, are amplitude or frequency modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement into the brain, typically through the use of loudspeakers, earphones or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be conveniently recorded and stored on mechanical, magnetic or optical media for delayed or repeated transmission to the listener.” [5] [Emphasis mine]

In the late Lt. Colonel Michael Aquino’s book: Mind War he explores psychological operations in combination with emerging technologies such as EM waves, Silent Sound and ionospheric mind control. Let’s not underestimate the power inherent within the human body /mind complex. After all, the electrical energy that powers each cell in our bodies works out at 30 million volts per metre, the equivalent voltage of a bolt of lightning. [6]Power within can be, as it were, reverse-engineered. From a footnote in the same chapter if you didn’t catch the first time, read it again in this context:

“… the NSA’s electronic surveillance system can simultaneously follow and handle millions of people. Each of us has a unique bioelectrical resonance frequency in the brain, just like we have unique fingerprints. With electro-magnetic frequency (EMF) brain stimulation fully coded, pulsating electromagnetic signals can be sent to the brain, causing the desired voice and visual effects to be experienced by the target. This is a form of electronic warfare. U.S. astronauts were implanted before they were sent into space so their thoughts could be followed and all their emotions could be registered 24hrs a day. […]

“When a 5-micromillimeter microchip (the diameter of a strand of hair is 50 micromillometers) is placed into optical nerve of the eye, it draws neuroimpulses from the brain that embody the experiences, smells, sights and voice of the implanted person. Once transferred and stored in a computer, these neuroimpulses can be projected back to the person’s brain via the microchip to be re-experienced. Using a RMS, a land-based computer operator can send electromagnetic messages (encoded as signals) to the nervous system, affecting the target’s performance. With RMS, healthy persons can be induced to see hallucinations and to hear voices in their heads. Every thought, reaction, hearing and visual observation causes a certain neurological potential, spikes, and patterns in the brain and its electromagnetic fields, which can now be decoded into thoughts, pictures and voices. Electromagnetic stimulation can therefore change a person’s brainwaves and affect muscular activity, causing painful muscular cramps experienced as torture.”

Citizens Against Human Rights Abuse (CAHRA) supports many of the claims of systematic surveillance stalking and virtual torture from electromagnetic waves and interference. According to one researcher amongst many, Dr. Armen Victoria’s  1998 essay regarding ‘The Military Use of Electromagnetic Microwave and Mind Control Technologystates the capability of cloning human EEGs for targeted mind control purposes where a variety of emotional responses and instinctive reactions: “… have been identified and isolated from the EEG, as ’emotion signature clusters’. Their relevant frequencies and amplitudes have been measured, then the very frequency/amplitude cluster is synthesised and stored on another computer, each one of these negative emotions properly and separately tagged. ‘They are then placed on the Silent Sound carrier frequencies and will silently trigger the occurrence of the same basic emotion in another human being.” [7]

It appears that The Tri-Service Electromagnetic Advisory Panel (TERP) represents the interests of all three military services in the US. It is still conducting some of the most advanced research in the world which in turn, stems from the investigations made by the Russian pioneers in mind control technology during the early 1960s and 1970s. The U.S. Air Force has been researching ocular injury by exposure to millimetre wave system, bio-effects of High Power Microwave in low microwave regions (S band) and Radio Frequency Radiation (RFR). The use of High Power Microwave (HMP), by each of the military services seems to be commonplace. Judging by the wealth of research on the subject the US Navy is also getting extremely excited at the prospect of utilising electro-magnetic waves as a psychotronic weapon. We may then understand that the invasion of Iraq not only represented an opportunity to plunder a nation for resources and stake claim to a long held geopolitical prize, but to test out new developments in microwave weaponry and experiment with the latest PSYOPS.
As Guardian columnist John Sutherland put it: “The battlefield will be the testing ground for the US samurai. No more rhesus monkeys or pigs but real, live Iraqis.” [8]

According to Dr. Oliver Lowry who has had the dubious honour of working for the US military on several classified projects, Iraqi soldiers were the latest unwitting guinea pigs to further such advances, one of those being Silent Sound Spread Spectrum (SSSS), sometimes called SQUAD:

… According to statements made by captured and deserting Iraqi soldiers, however, the most devastating and demoralizing programming was the first known military use of the new, high-tech, type of subliminal messages referred to as ultra-high-frequency “Silent Sounds” or “Silent Subliminals”. Although completely silent to the human ear, the negative voice messages placed on the tapes alongside the audible programming by PSYOPS psychologists were clearly perceived by subconscious minds of the Iraqi soldiers and the silent messages completely demoralized them and instilled a perpetual feeling of fear and hopelessness in their minds. [9]

Humans are highly sensitive and susceptible to a variety of electromagnetic frequencies – natural or artificial. The human body is a highly sensitive package of water, bio-chemicals, and electromagnetic energies. The introduction and exposure to various kinds of external micro or EM waves of any kind whether from mobile phones RFIDs or even wind-farm infra-sound does and will have an effect on the human being in ways we do not understand. Consider also that the geo-magnetic sensitivity in animals and other living organisms concentrations of ferromagnetic material – most notably magnetite. The same levels of magnetite conductor / receptor bio-mineralization were discovered to exist in the human brain in the early 1990s. The authors of one paper say that the presence of the particles may account … for a variety of biological effects of low-frequency magnetic fields.” [10]

0117x

Electric field of the heart on the surface of the thorax, recorded by Augustus Waller (1887).

Weapons which target the mind and nervous system of selected individuals also has a long tradition. Reports of systematic mind stalking, harassment of individuals, testing and deployment of electronic and electromagentic devices (EMF) by government/outsourced agencies have been surfacing in the United States, North/South Korea and various countries in Europe. This has eroded human rights comprehensively with the added bonus for the persecutors that it is almost impossible to confirm and verify that which is literally “all in the mind”.

Though information in electronic/electromagentic or “non lethal Weaponry” is largely classified there is sufficient evidence from modern history and individual reports to reach the conclusion in a court of law that the targeted, micro-social use of behaviour modification technology is being used against individuals and activist groupings.

Interest in a variety of EMF weaponry had already begun at the beginning of the 20th Century with the genuis of Nikola Tesla and his experiments with radar and electrical energy. Concentrating and directing a beam of electromagnetic energy over a certain distance took hold of Tesla’s mind until his death in 1943. It seems the military-industrial complex heavily saturated in Nazi philosophy and science simply subverted Tesla’s genius and extended his advances in the field.

DARPA have been on the case since the Cold War with their 1958 research into combating Soviet advances in electromagnetic weapons and defenses. The capability to disrupt human emotions, inflict pain and fragment the personality was already well underway during pre and post-war experimentation under Operation MK-ULTRA, Project MONARCH, Project PANDORA and the development of PSYOPS and CoIntelpro emerging against the background of the civil rights movement of the 60s and 70s; behaviour modification had a new platform to play with.

Since that time with the enormous advances in “new concept” warfare there is every likelihood that a fusion of this military-intel science is not only being used as form of macro-social engineering and a monopoly of media-led propaganda, but the use of mass mind, ionosphere technology (fomerly labelled HAARP) to influence whole regions, even countries. It is therefore not a huge leap of imagination to recognise that the precision use of psychotronic weaponry to target selected individuals by the National Security State apparatus is in existence and heavily funded by black budgets.

Well in advance of the war on terror hoopla, Neo-Conservative regime change and the sky-rocketing increase in human/drug trafficking, mind control technologies were telegraphed to the military-intelligence faithful as the tool of choice to keep the world in line. The Strategic Studies Institute of the U.S. Army War College, published in 1994: ‘The Revolution in Military Affairs and Conflict Short of War’ by LTC James Kievit, Dr. Steven Metz. In the paper, the authors state the following drawn from their “hypothetical future scenario”:

The president was thus amenable to the use of the sort of psychotechnology which formed the core of the RMA (revolution in military affairs)… it was necessary to rethink our ethical prohibitions on manipulating the minds of enemies (and potential enemies) both international and domestic… Through persistent efforts and very sophisticated domestic ”consciousness raising”, old-fashioned notions of personal privacy and national sovereignty changed. As technology changed the way force was applied, things such as personal courage, face-to-face leadership, and the ‘warfighter’ mentality became irrelevant. […] Potential or possible supporters of the insurgency around the world were identified using the comprehensive Interagency Integrated Database. These were categorized as ‘potential’ or ‘active’, with sophisticated personality simulations used to develop, tailor and focus psychological campaigns for each“. So the Institute of Strategic Studies supposed that in the year 2000 those technologies would be that advanced that it will be possible to deprive human being of his freedom and adjust his personality to the needs of ruling elite. Most probably those technologies were at this level already in 1994.

Put this together with Synthetic Environments for Analysis and Simulation (SEAS), the SMART grid, MAIN CORE, biological and PSYOPS warfare and you begin to get the idea that the technology of assymetric warfare isn’t just about geostrategy to dis-empower traditional enemies such as Iran, Russia and China. It is about war against domestic population by stealth and in plain sight. According to Project Censored’s 2006 paper titled: ‘US Electromagnetic Weapons and Human Rights’ offers a broad brush synthesis of the field and confirms the black budget capabilities available since the Zio-Conservative false-flag coup of 9/11:

“Michael Vickers, senior adviser to the Secretary of Defensefor the 2005 Quadrennial Defense Review and principal strategist for the largest covert action program in the CIA’s history, recently testified on the importance of black operations: “US Special Operations Command’s (SOCOM) emphasis after 9/11 has been to make white SpecialOperations Forces (SOF) more gray and black SOF more black. It is imperative, however, that white and black SOF be integrated fully from a strategic perspective.” [11]

CongnitiveMappingSource: Petri Ticklen at http://alicefish.net/MindAttack.htm Original source: Against Electronic Mind-Control International /http://againstmindcontrol.tripod.com/liber.html

Since the war on terror propaganda has now made sure that activists, dissidents and indeed anyone overtly successful in criticising government policy is shut down, detained or harassed it is hardly shocking to discover that some of these covert programs have been targeting people for experimentation in CIA rendition centres, prisons, psychiatric wards and across the general public with immunity. Project Censored authors state:

“…Hundreds of people continue to assert that a person or persons, whom they do not know,have been targeting them with electromagnetic weapons in a widespread campaign of either illegal experimentation or outright persecution. These experiences involved a number of discrete phenomena:

  • Hearing voices when no one was present.
  • Feeling sensations of burning, itching, tickling, or pressure with no apparent physical cause.
  • Sleeplessness and anxiety as a result of “humming” or “buzzing”.
  • Loss of bodily control, such as twitching or jerking of an arm or leg suddenly and without control.
  • Unexpected emotional states, such as a sudden overwhelming feeling of dread, rage, lust or sorrow that passes as quickly as it arises. [12]

And the industry of non-lethal weaponry (NLW) is steadily increasing playing a dominant role in asymmetric warfare abroad as well as crowd control closer to home. The market for NLW will apparently double by 2020. [13] That means big money. Almost ten years ago:

“…the Air Force issued $24 million in contracts for “Electro Magnetic Effects Research and Development” to Northrup Gruman, Voss Scientific, Lockheed Martin, ElectroMagnetic Applications, and SAIC among others. The DOD viewed electromagnetic research and development as a key component in future wars as early as the 1990s. Emmett Paige Jr., Assistant Secretary of Defense for Command, Control, Communications and Intelligence declared in 1996 that, ‘Well over a decade ago, a Soviet general reportedly said something like ‘to prevail in the next conflict, one must control the electromagnetic spectrum.’ That statement proved true in the Bacca Valley and on deserts in Iraq. The Department of Defense is committed to ensuring that ‘in the next conflict it is we who will control the spectrum. We know its value’. Increasingly, the value of non lethal weapons continues to rise as they produce fewer images of death in the media than traditional weapons.’

In addition to DOD contractors, the realm of non-lethal weapons extends into the universities with millions of dollars in scholarships and research fellowships. Pennsylvania State University, sponsors the Institute for Non-Lethal Defense Technologies (INLDT), the University of Medicine and Dentistry of New Jersey has the Stress and Motivated Behavior Institute, University of New Hampshire houses the Non-lethal Technology Innovation Center, and many US military schools have classes directly related to non-lethal weapons technology. There are also numerous conferences each year hosted by the Department of Defense, contractors and universities. The business of non-lethal weapons is expanding and will continue to grow. In 2006, the Joint Non-Lethal Weapons Directorate received $43.9 million compared to $25.8 million in 2000. [14]

By 2011, this had increased to $138 million, reaching $140 million in 2013. [15] If we read the US Department of Defence’s Annual Non-Lethal Weapons Program Annual reports, it would leave you feeling suitably humbled and sentimental, beaming with national pride that Uncle Sam and its numerous military bases are making the world a less lethal. Apart from such delusions, what is more interesting is how such NLW advances are leaking into law enforcement and perceived “National Security.” A passage from Project’s Censored’s report concerning one Eldon Byrd a medical engineer, underscores this point:

“After working on the Polaris submarine, which carried long-range nuclear weapons, Byrd developed non-lethal weapons with reversible effects. He regarded this as a humanitarian alternative to ‘punching holesin people and having their blood leak out’ in battle. His inventions used magnetic fields at biologically active wave frequencies to affect brain function. Byrd could put animals to sleep at a distance and influence their movements. When the success of his research became evident, suddenly he was pulled off the project and it went “black.” He believes the electromagnetic resonance weapons he developed have been used for psychological control of civilians rather than for exigencies in battle. That is, to ensure his participation, he was uninformed about the true nature of the project. Byrd’s case also illustrates how morally tolerable operations may transition to morally intolerable operations, or at least rise above the atrocity line.” [16]

It is this intentional compartmentalisation and factional nature of operations and directives within military and  intelligence agencies which allows pathological leadership to develop.

Back in 2006, Congress and George W. Bush signed the Military Commission Act of 2006. which allowed torture and suspension of due process as acceptable. Since that time, torture apologists from law, academia and the military have come out to justify such actions as necessary for the “greater good” once again, trashing the very concept of the Universal Declaration of Human Rights and basic notions of conscience. The Anglo-American-Zionist Establishment is perfectly happy to use all and everything in its means to achieve its ends including the use of technology that cannot be detected nor recognised by Official Culture.

The somewhat infamous Dr. José Delgado Director of Neuropsychiatry at Yale University Medical School in the 1960s and 70s, and later Professor of Neurobiology in Madrid, Spain, had gained quite an internet following of shock and revulsion based around his similar pathological view of the capabilities of psychosurgery. He urged the U.S. government to make “control of the mind” a national goal. [17] He cheerily – and perhaps ill-advisedly – voiced his opinion and those of his superiors regarding the future:

“We need a program of psychosurgery for political control of our society. The purpose is physical control of the mind. Everyone who deviates from the given norm can be surgically mutilated. The individual may think that the most important reality is his own existence, but this is only his personal point of view. This lacks historical perspective. Man does not have the right to develop his own mind. This kind of liberal orientation has great appeal. We must electrically control the brain. Someday, armies and generals will be controlled by electric stimulation of the brain”. [18]

Dr. José Delgado was nothing if not thorough in his research. In 1965, The New York Times reported on Delgado’s successful experiment in the use of electronic implants connected to the motor nervous system of a bull – the unfortunate animal was stopped from charging by remote radio-control. The bizarre capabilities of surveillance was demonstrated when he surgically implanted a cat with an electronic implant which transmitted everything the poor moggy was seeing and hearing to a TV monitor.

The Doctor’s foray into publishing produced Physical Control of the Mind: Toward a Psycho-civilized Society (1969) which helped to confirm his Dr. Evil status on the net – not without justification. The doc is messianic in his belief that humans will undergo “psycho-civilization” by uploading the contents of their brains directly to machines and vice versa. With statements like that it is unlikely that he limited his experiments to animals. According to a 2001 interview for Cabinet magazine conducted by artists and writers Magnus Bärtås and Fredrik Ekman there are still many of Delgado’s descriptions in his own articles and reports of how he moved from animals to humans in contemporary American medical libraries. The reporters relate how Delgado, Dr. Mark, and other colleagues: “describe what was the first clinical use of Intracerebral Radio Stimulation (IRS) on a human being. The stimoceiver itself only weighed 70 grams and was held fast by a bandage.”

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (1986)

Dr. Jose Delgado, deep brain stimulation (DBS) researcher at Yale University and author of the book, Physical Control of the Mind (Third Edition: 1986)

In an article called “Radio Control Behavior” in the February 1969 issue of The Journal of Nervous and Mental Disease there are descriptions of patients who had undergone procedures to attach the device to their brains.

Case studies include:

… A black fourteen-year-old girl on the border of developmental disability who grew up in a foster home suddenly goes into a fury that leads to the death of her two stepsisters. A thirty-five-year old white industrial designer who ends up killing his wife and children flies into a rage when other motorists try to overtake him and he chases them and tries to run them off the road. Their aggressive behavior is supposed to be registered by the stimoceiver in the way a seismograph registers the earth’s tremors and the same stimoceiver is then to “turn them off” via the FM transmitter. [19]

In the interview Delgado admits that as far as he was aware nothing came of the IRS device due to the complexity of the brain and the unreliability of the mapping: “We never knew which parts of the brain we were stimulating with the stimoceiver. We didn’t even manage to prevent epileptic attacks, which we thought would be the simplest of things. We never found the area where epilepsy attacks originate.” [20]

The authors reveal their surprise at his: “casual attitude towards the stimoceiver which was heralded as a great contribution to science.” Although Delgado’s attitude conforms to later developments regarding the brains plasticity and almost holographic nature, normal practice for radar experiments in psychological control were to appropriate and integrate into covert programs. After all, mind control operations were/are still continuing. It was at the congressional hearings on the CIA sponsored MK-ULTRA operations that Delgado made his famous declaration of psychosurgery. It seems highly improbable that such experiments were ignored especially when they often yielded startling results.

To illustrate the effectiveness of electro-stimulation Delgado and his colleagues: “… orchestrated violent scenes in the lab” descriptions of which were captured in the book: The Brain Changers: Scientists and the New Mind Control (1973) by Maya Pine who relates one incident typical of the research in question:

As the film opens, the patient, a rather attractive young woman, is seen playing the guitar and singing “Puff, the Magic Dragon.” A psychiatrist sits a few feet away. She seems undisturbed by the bandages that cover her head like a tight hood, from her forehead to the back of her neck. Then a mild electric current is sent from another room, stimulating one of the electrodes in her right amygdala. Immediately, she stops singing, the brainwave tracings from her amygdala begin to show spikes, a sign of seizure activity. She stares blankly ahead. Suddenly she grabs her guitar and smashes it against the wall, narrowly missing the psychiatrist’s head. [21]

As the authors delved deeper into the experiments on people Delgado became suspicious and tense. He terminated the interview not long after. Rather than regretting his time of psychosurgery innovation it is likely that Delgado was feeling petulant about being left out of the loop after his data was integrated into the continuing experimentation. He may have had considerable lack of success with the vagaries of brain plasticity but his work on animals was highly valued during the parallel mind control work of MK-ULTRA and other operations. Though unconfirmed, it is thought that Delgado worked on Project PANDORA as part of the CIA’s experiments into electromagnetic modulation with particular attention to scrambling the minds of soldiers on the battlefield. It was at exactly the same time that the CIA began to conduct radiation experiments on the US population, just prior to Delgado starting his research on electro-magnetic radiation and its capacity for influencing people’s consciousness.

After the 1974 congressional hearings the Doctor continued his animal research managing to link his brain implants with computers. This was documented in “Two-Way Transdermal Communication with the Brain” published in 1975 where he stated:

“The most interesting aspect of the transdermal stimoceivers is the ability to perform simultaneous recording and stimulation of brain functions, thereby permitting the establishment of feedbacks and ‘on-demand’ programs of excitation with the aid of the computer. With the increasing sophistication and miniaturization of electronics, it may be possible to compress the necessary circuitry for a small computer into a chip that is implantable subcutaneously. In this way, a new self-contained instrument could be devised, capable of receiving, analyzing, and sending back information to the brain, establishing artificial links between unrelated cerebral areas, functional feedbacks, and programs of stimulation contingent on the appearance of pre-determined patterns” [22]

In true “mad professor” fashion, Delgado continued his experimentation  on an island in Bermuda, where a group of gibbons were placed at his disposal. Naturally, the doctor had them all fixed with electronic brain implants which led him to discover how to build and destroy social orders using electrical brain boosts. [23] This would have been right up the technocratic street that was emerging in the warfare-ridden 1970s. So, this begs the question: after over thirty years of electronic implant tinkering what has the Pentagon, DARPA, NSA and unknown agencies come up with besides the RFID tagging systems? Our old friend the Nazi-tainted IBM needs to be brought in here.

Reflect on this confidential memo covertly obtained all the way back from October, 1995 from INTELLI-CONNECTION, a Security Division of IBM. In the form of an office memo, it reveals some interesting information. An edited extract follows:


 THE I.B.M. 2020 NEURAL IMPLANT

CONFIDENTIAL, LIMITED DISTRIBUTION ONLY, LEVEL 9 COMMUNICATION, 2020 NEURAL CHIP IMPLANT

   “Federal regulations do not yet permit testing of implants on prisoners, but we have entered into contractual testing of our product. We have also had major successes in privately owned sanitariums with implant technology… In California, several prisoners were identified as members of a security threat group, EME, or Mexican Mafia.

   They were brought to the health services unit at Pelican Bay and tranquilized with advanced sedatives developed by our Cambridge, Massachusetts laboratories.

   The implant procedure takes about 60-90 minutes depending on the experience of the technician. We are working on a device that will reduce that time by as much as 60 per cent. The results of implants on 8 prisoners yielded the following:

   Implants served as surveillance monitoring devices for threat group activity. Implants disabled two subjects during an assault on correctional staff. Universal side effects in all 8 test subjects revealed that when the implant was set to 116 Mhz all subjects became lethargic and slept an average of 18-22 hours per day. All subjects refused recreation periods for 14 days during the 116 Mhz test evaluation…”

   Each subject was monitored for aggressive activity during the test period and the findings are conclusive that 7 out of 8 test subjects exhibited no aggression, even when provoked. Each subject experienced only minor bleeding from the nose and ears 48 hours after the implant due to initial adjustment.

   Each subject had no knowledge of the implant for the test period and each implant was retrieved under the guise of medical treatment. The security windfall from the brief test period was tremendous. Security officials now know several strategies employed by the EME that facilitate the transmission of illegal drugs and weapons into their correctional facilities … In Massachusetts, the Department of Corrections had already entered into high level discussions about releasing certain offenders to the community with the 2020 neural chip implants.” [24]


What is the probability that such technology has been way in advance of anything we see from outsourced DOD departments which are overt and relatively open to public discourse? What of deep black projects far away from any oversight? Might we assume that such R & D may be in development, the results of which could be used on the potential activist, dissident or “terrorist” when the SMART-Surveillance society (SSS) is fully integrated into a comfortable, consumerist paradise?

If we take the infestation of Satanic Ritual Abuse networks which appear to be seated in most centres of power and seeping into the waiting SSS managed by mind control technology both overt and covert, this is surely worse than any science-fiction novel we can imagine. If we are to give credence to Zbigniew Brzezinski’s visions, which in any case, may simply be explanatory notes to his fellow comrades signalling what will happen, the technology may already be in place and operational.

In his 1970 book Between Two Ages Brzezinski writes:

“… of a future at most only decades away,” upon which he related the opinion of an experimenter in intelligence control who asserted: ‘I foresee a time when we shall have the means and therefore, inevitably, the temptation to manipulate the behavior and intellectual functioning of all the people through environmental and biochemical manipulation of the brain.” [25]

This is the darker side of the transhumanism crowd and which permeates social network corporations, military-intelligence and the DARPA inspired National Surveillance state. The music emanating from SMART grid technology is that of the Pied Piper lulling his followers into a false dawn. Saturating ourselves in W-Fi and locking ourselves into a EMF grid; making our gadgets indispensable for our most basic daily needs is exactly what this mainframe seduction is all about.

Part of being psycho-civilised is that we become seduced by the promise of more and more access, increasing efficiency and the ever smaller distance between “want” and “have.” The problem is, it appears to be an illusion, engineered with great precision, doffing it’s hat to ecological principles and economic alternatives whilst retaining a core-machine centralisation.

If we do not see the Magician behind these pretty lights and virtual enticements, these amenities offering a New Order of efficiency and ease, we will end up exactly as Henry David Thoreau wrote about his fellow man whom he believed had become : “… as tools of their tools.” When that happens and in combination with our illustrious pathocratic leaders, there may be very few choices to think freely, let alone act. We will be quite literally lost in the “simulation and simulacra”.

That is the antithesis of SMART.

See also: Satan’s Little Helpers VI: Sleepers and Electro-Shocks

 


Notes

[1] ‘Met police using surveillance system to monitor mobile phones’ The Guardian October 3, 2011.
[2] ‘Urban Wireless to Serve Intel and PSYOP forces’ by Mark Baard parallelnormal.com, July 19, 2007.
[3] http://www.patft.uspto.gov/
[4] ‘Method and an associated apparatus for remotely determining information as to person’s emotional state’ Inventors: Stirbl; Robert C. (New York, NY), Wilk; Peter J. (New York, NY) Appl. No.: 08/222,835 Filed: April 5, 1994 / 5,507,291 Stirbl et al. April 16, 1996. www. patft.uspto.gov/
[5] ‘Silent subliminal presentation system’ Inventors: Lowery; Oliver M. (Norcross, GA) Appl. No.: 07/458,339 Filed: December 28, 1989, issued as United States Patent 5,159,703, October 27, 1992. www. patft.uspto.gov/
[6] Utility Services in India’ | http://www.indiaonline.in/About/utilities/index.html
[7] The Military Use of Electromagnetic Microwave and Mind Control Technology’ by Dr Armen Victorian Lobster Magazine 1998. [8] ‘Horrifying US Secret Weapon Unleashed In Baghdad’ By Bill Dash, rense.com August 25, 2003.
[9] .‘Ariel Mind Control’ by Judy Wall, Editor/Publisher Resonance Newsletter of the MENSA Bioelectromagnetics Special Interest Group http://www.raven1.net/commsolo.htm
[10] ‘Magnetite Biomineralization in the Human Brain’ by Joseph L. Kirschvink, Atsuko Kobayashi-Kirschvink and Barbara J. Woodford, National Academy of Sciences. | Vol. 89. Biophysics, 1992.
[11]’US Electromagnetic Weapons and Human Rights’ By Peter Phillips, Lew Brown and Bridget Thornton, As Study of the History of US In telligence Community Human Rights Violations and Continuing Research in Electromagnetic Weapons, Completed December 2006, Sonoma State University, Project Censored Media Freedom Foundation.http://www.projectcensored.org/wp-content/uploads/2010/05/ElectromegnaticWeapons.pdf
[12] Ibid.
[13] ‘Non-Lethal Weapons (NLW): Industry, Technologies & Global Market’ 2014-2020 Aug 19, 2014 |http://www.marketwatch.com/story/non-lethal-weapons-nlw-industry-technologies-global-market-2014-2020-2014-08-19
[14] Ibid.
[15] http://jnlwp.defense.gov/Portals/50/Documents/Press_Room/Annual_Reviews_Reports/2013/DoD_Non-Lethal_Weapons_Program_Annual_Review_11.19.2012_HTML_format_v1.pdf
[16] Many accounts on psychotronic abuse are available to read in books and online. Some links: http://mindjustice.org/ | http://freedomfightersforamerica.com/victims_statements_pg1 [16] op.cit Philips, Brown, Thornton.
[17]The People Shapers by Vance Packard, published by Little, Brown & Co., 1977, (p.4).
[18] Joseph Delgado February 24, 1974 edition of the CONGRESSIONAL RECORD (MKULTRA hearings) No. 26, Vol.118.
[19] ‘Psychocivilization and Its Discontents: An Interview with José Delgado’ by Magnus Bärtås and Fredrik Ekman, Cabinet magazine, Issue 2 Mapping Conversations Spring 2001.
[20] Ibid.
[21] Ibid.
[22] ‘Two-Way Transdermal Communication with the Brain,’ Delgado, Lipponen, Weiss, del Pozo, Monteagudo, and McMahon, a co-operative publication of the Medical University of Madrid, Spain, and Yale University Medical School, 1975.
[23] Mass Control: Engineering Human Consciousness Jim Keith, IllumiNet Press, 1999. (p.99)
[24] ‘The IBM 2020 Neural Implant’ The Phoenix Project, Dr. Al Overholt, quoting from The California Sun, by Herb Dorsey, Feb. 1997. See also: (http://www.trufax.org/reports/2020.html)
[25] op. cit. Brzezinski (p.15) (Between Two Ages)

Technocracy XII: Google’s World

 “It’s a future where you don’t forget anything…In this new future you’re never lost…We will know your position down to the foot and down to the inch over time…Your car will drive itself, it’s a bug that cars were invented before computers … you’re never lonely … you’re never bored … you’re never out of ideas … We can suggest where you go next, who to meet, what to read…What’s interesting about this future is that it’s for the average person, not just the elites.”

– Google CEO Eric Schmidt on his vision of the future


google-logoPerhaps the most iconic representation of the internet is the search engine and household name Google Inc. that now eclipses Microsoft Corp. for its sheer omnipresence.

Innovations in aerial mapping has taken the internet by storm over the last several years. This is, in part, thanks to the ease of access available on Google’s own websites as well as mobile phones, android phones, tablet PCs and most other devices. With Google Maps ™ and Google Earth ™ Incorporating aerial and satellite photography together with comprehensive street mapping, the company has created a user-friendly virtual world that is unquestionably fascinating and practical. At the same time, you will not get anything closer to a simplified template of mass surveillance already being used at a higher level by the intelligence apparatus.

Since Apple Inc. in 2012, had more cash in the bank than the US government, we can see why it is one of a number of companies at the cutting edge of so many SMART platforms currently manifesting out of the hovering Cloud Drive of new ideas. In combination with this rival company which employs the most invasive military grade monitoring technology on its own products, Google is still pushing ahead with the experimentation of new technology that will create a virtual 3D rendering of the planet. Apple meanwhile, has tested its own similar “spy technology” on scores of locations around the world. [1]

Google and Apple have been constantly battling petitions, complaints and protests around privacy and surveillance issues and it is easy to see why. CEO Larry Page and co-founder Sergey Brin are sitting at the top of a vast monopolistic leviathan which has begun to flex its corporate muscles in the last few years. According to The Wall Street Journal: “Google has ratcheted up competition with established websites by developing its own specialized services and often promoting them above regular search results in recent years.” All of Google’s products may appear randomly mixed in with other results but there is no indication that they are in actual fact, Google-sponsored content. [2] The European Union agrees and anti-trust investigations into Google’s treatment of search engine results continue. Yet these commercial manipulations are just part of a more worrying development.

From January 2012, Google combined the privacy policies for all of its many applications into one Google umbrella. These  include “Google search,” “Gmail”, “Google Maps,” “Google+,” “YouTube,” and “Android mobile” as well as over 60 others. When you input information onto any of those sites then it becomes shared amongst them all. [3] Opting out? Not possible. Unless, that is, you never wish to use the internet again. An extremely complete picture of your online activity is now possible. However, bearing in mind what we have explored so far, Google has been doing this all along, it’s just decided to come clean as it will not be able to go to the next phase of snooping if it doesn’t. If you’re the owner of an Android phone then this is like having a permanent Google eye observing your actions wherever you are. Google’s insistence that this would make the user experience more beneficial is once again missing the point, notwithstanding its other research activities under Google X which is rivalling DARPA for its Big Brother applications.

Android is a Linux-based operating system for SMART phones, tablet computers and other similar mobile devices. Google’s Android mobile phone has been popular due to Android’s large community of developers writing applications (“apps”) offering 500,000 from the app store run by Google. As of December 2011, the estimated number of applications downloaded from the Android Market exceed 10 billion. [4]Yet, certain gifted techies from the public are keeping the search giant on its toes.  What the Federal Trade Commission failed to discover, twenty-five year-old computer scientist Jonathan Mayer did not. He found that Google was secretly planting cookies on millions of iPhone browsers. Mayer thinks iPhones were purposely targeted by Google. [5] Nor is it the first time that the public acted on their “hunches.”

According to ProPublica an investigative journalist organisation:

A privacy official in Germany forced Google to hand over the hard drives of cars equipped with 360-degree digital cameras that were taking pictures for its Street View program. The Germans discovered that Google wasn’t just shooting photos: The cars downloaded a panoply of sensitive data, including emails and passwords, from open Wi-Fi networks. Google had secretly done the same in the United States, but the FTC, as well as the Federal Communications Commission, which oversees broadcast issues, had no idea until the Germans figured it out. [6]

Similarly, the privacy watchdog in 2011 Greece banned Google Inc. from gathering detailed, street-level images for a planned expansion of its panoramic Street View mapping service.[7]

the-google-street-view-mapping-and-camer-1

Google Maps Street-view car Source: aol.com

At the end of 2011 Trevor Eckhart, a security researcher and Android operating system developer discovered something a little less celebratory running in the background of these Android devices. The culprit was ostensibly a diagnostic software tool called Carrier IQ or CIQ which was integrated deep within the device. It was able to monitor, record, and transmit private data and interactions. According to Eckhart this included the ability to “… monitor every single individual keystroke and every interaction with the screen for that matter, along with encrypted Internet browsing sessions and searches, GPS data, network data, battery data, among other pieces of information which many people would likely like to keep private.” [8]

Carrier IQ proceeded to sue Eckhart for copyright infringement, a groundless accusation which was immediately retracted when the Electronic Frontier Foundation (EFF) took on Ekhart’s case. Carrier IQ continues to claim innocence, disregarding Eckhart’s research claiming keystrokes are recorded.

Online journalist Maddison Ruppert takes up the story:

As a result of Eckhart’s findings, lawsuits have been filed against Carrier IQ, HTC, Samsung, Apple, AT&T, Sprint Nextel, T-Mobile, and Motorola, alleging that it breaches the Federal Wiretap Act, Stored Electronic Communications Act, and the Computer Fraud and Abuse Act.

Despite the company’s insistence to the contrary, the suit alleges that, “[i]n addition to collecting device and service-related data, Carrier IQ’s software can collect data about a user’s location, application use, Web browsing habits, videos watched, texts read and even the keys they press.” The establishment media has come to the aid of their corporate cronies, citing so-called experts who “debunked” Eckhart’s findings.[9]

Six big corporations with vested interests in profits and PR took on Eckhart’s research to ensure that Android had no publicity and reassured the public that it was all nonsense. However, their evidence for these assurances was less than convincing. If the key stroke accusation proved to be untrue, this still left the admitted ability of Android devices to collect data “… that would be able to determine the exact person who is using the phone, what programs they are running, when they charge the battery, what calls they make and where…”

After Vice President Andrew Coward of Carrier IQ software made conciliatory remarks to the computer news outlet CNET he also offered the following howler which tells us a lot about either the ignorance of the man or his capacity for disingenuous statements: “… we did not expect that we would need to be so open and transparent about everything … We recognized as the crisis kind of developed that that was required for us to clear our name. That was a huge learning process …”

God forbid in the age of surveillance and data mining that a software company or any other business swiping the public’s data without telling them should be “open and transparent.” The opposite was perhaps the general idea and he never imagined such a carrier would be discovered. This is especially curious when Coward himself admitted to CNET that: “…the Carrier IQ software is embedded into the device to make it not only hard to detect, but nearly impossible for any regular user to remove or control.” [10]

As of December 2011, Apple’s iPhone also had the Carrier IQ software but with minor adjustments. They have since removed it from future models. (However, Apple’s has assisted the push to get the populace accustomed to biometric ID usage with its 2013 iPhone 5s which includes a “Touch ID” sensor, or fingerprint sensor. If it’s on my iPhone then all is well…). According to United States Patent 8,254,902 Apple has yet again proved its cozy relationship to law enforcement by helpfully providing a “Kill Switch” for its mobile devices because: “covert police or government operations may require complete ‘blackout’ conditions.”

Ask yourself what conditions would require such a move where all devices are summarily turned off? Public interest or private need?

Google Inc. has another contribution to the SMART Grid in the form of the Google Wallet application for Android and iPhones. The app. offers wireless payment capabilities by using a sensor located on a designated ticket vending machine. Train and bus tickets are accessed from what appears to be a similar process to bar-code scanning but with the extra method of “near field communication,” where data transmission can take place when phone and sensor are about a one or two feet away from each other. The transaction is completed when the user receives confirmation on his phone. Google Wallet is currently compatible with prepaid Google cards and Mastercards.

google_cards

Scanning via your i-phone

It does sound very convenient doesn’t it?

And it probably is if you don’t think about the fact that it takes us one step closer to a chip in the arm and a cashless society, something which is embedded in the SMART Grid design itself. However, its actual arrival may be longer than we think. This is partly to do with the global nature of drug smuggling and money laundering where cash is king. (Just ask HSBC). But to be sure, a global electronic currency is coming and from which it will be near impossible to opt out. [11] That may not necessarily be a bad thing, it all depends if it is a truly transparent and open source. Who lies behind the formation and organisation of the world of cyber currency is key. For example, so far, the rise of Bitcoin seems a much better bet than anything Google could provide since the parameters of Bitcoin appear to be truly emancipatory, with encryption and transparency operating in the hands of people and none of the official culture middle men, i.e. lawyers, brokers and speculators. The proof will be in the pudding.

Google’s Android and Apple’s i-Phone both have voice recognition apps. Speak into your phone in a normal voice and it will answer any number of queries such as maths problems, directions – complete with a map popping up, showing your route – as well instantaneous translations form one language to another and the dictation of email and text messages. So how does it do it? Well, it is but one result of Google’s artificial intelligence programs and as Slate.com’s delighted online techie enthuses, the apps obtain their power: “… by analysing impossibly huge troves of information. For the speech system, the data are a large number of voice recordings. If you’ve used Android’s speech recognition system, Google Voice’s e-mail transcription service … or some other Google speech-related service, there’s a good chance that the company has your voice somewhere on its servers. And it’s only because Google has your voice—and millions of others—that it can recognize mine.” [12]

ANew York Times’ article of 2013 reported on the Department of Homeland Security (DHS) testing of its Biometric Optical Surveillance System, or BOSS that: “… pair[s] computers with video cameras to scan crowds and automatically identify people by their faces.” They have also been busy creating a system of voice recognition software that can analyse and determine whether or not a person is drunk, angry, or lying. A Homeland Security News Wire article called “Voice biometrics: the next generation lie detectors” published in December 2011 describes how several research teams are working away across the United States on various programs one of which can “deconstruct an individual’s speech pattern to see if they are being honest by searching for cues like volume, changes in pitch, pauses between words, and other verbal signs.” Another system is under development whereby an individual’s emotions can be analysed “… by using mathematical algorithms that scan hundreds of vocal cues like pitch, timing, and intensity.” Funding has come from the US Air Force. [13]

Of course, voice recognition and many other so called “innovations” which have been perfected and adapted to the SMART public have been considered obsolete by the private military-corporate complex for quite some time. The technology is being allowed into the public arena alongside developments in governmental sponsored and outsourced changes in infrastructure designed to revolutionise the nature of society.

Not wanting to left out of the silicon rush Microsoft demonstrated in early 2013 how webs surfers could get a feeling for a bar or restaurant by using a smartphone microphone app 6 to 10 second audio samples are taken, extracted data processed so that: “… the size of the crowd, the level of chatter, and the music volume can then be classified as “‘low,’ ‘normal,’ or ‘high.’ As MIT Tech Review’s Jessica Leber reported on March 11, 2013: “The app could even tell a searcher what song is playing.” Later in the year to complement this, Microsoft researchers came up with a system which can predict your physical location up to three weeks in the future. They did so by creating new techniques which made use of volunteers going about their daily lives and who each carried a GPS device much the same way they carried a cell phone. Neither of these two advances is in the public domain but given the pace of change it shouldn’t be too long.

Meanwhile, British scientists have used the social networking website Twitter to create a computer program called “Emotive” to “map the mood of the nation.” The software works by: “accessing the emotional content of postings on the social networking site.” According to the Loughborough University research team it works by scanning up to 2,000 tweets a second which the program rates for expressions from a list of eight human emotions drawn from each tweet. These are: anger, disgust, fear, happiness, sadness, surprise, shame and confusion. The grandiose and simplistic claim on a par with Pre-Crime technology of Homeland Security is that: “Emotive could help calm civil unrest and identify early threats to public safety” by tracking “criminal behaviour or threats to public safety.” Since over “500 million people across the world use Twitter, and more than 340 million tweets are posted daily,” then, that’s quite a demographic. Academics involved with the program then made the gargantuan leap that this technology: “may be able to guide national policy on the best way to react to major incidents…”

socialemotions1Social networking represent fertile for mining emotions tailored to predesigned outcomes. “The Proceedings of the National Academy of Sciences (PNAS), found that people mirror the positive or negative emotions that their friends express in their posts—all without the aid of nonverbal cues like body language or tone of voice. Image credit: from his article: The Emotions of Social Sharing

Google was recently granted permission and issued a patent under the title of “Advertising based on environmental conditions” to maximize its profits and snooping ability to unheard of levels. Software collates and analyses background noises during your online phone call to effectively take an auditory snapshot of your environment and use the data to create a tailor-made advert for you that comes that bit closer to the ad man’s idea of perfection and our idea of a commercial dystopia. Here’s the patent description:

A computer-implemented method comprising: receiving, from a computing device, a search request comprising (i) information about a first environmental condition of the computing device, and (ii) one or more search terms; parsing the search request; selecting, from the search request based on parsing, the information about the first environmental condition; identifying an advertisement based on the first environmental condition and at least one of the one or more search terms; providing the advertisement to the computing device; receiving one or more of an audio signal, an image signal, or a video signal from a sensor of the computing device; and determining a second environmental condition based on the one or more of the audio signal, the image signal, or the video signal. [14]

John Simpson, the spokesman for Consumer Watchdog observes: “What these unilateral decisions by Google and Facebook demonstrate [referring to the forced usage of the timeline feature] is a complete disregard for their users’ interests and concerns,” continuing: “It’s an uncommonly arrogant approach not usually seen in business, where these companies believe they can do whatever they want with our data, whenever and however they want to do it,” he said. [15]

Not content with prising open our private lives on the internet, Google intends to virtually sit on our face and look through our eyes. Google X has come up with “Project Glass” and its “augmented reality” glasses (or headsets) still at the prototype stage; the next step up from your Smartphone, becoming as close to a natty cyborg as it is possible to be. The glasses will allow you to instantly read text messages, pull up maps, emails and all manner of useful and potentially accident inducing possibilities. More functions will be added over time. With live streams put through the glasses they could revolutionise media, communications, business and – amateur porn… Or stall at the first hurdle.

Controlled by voice or via a small touch-pad on the right arm of the device it can be connected to the internet via a phone cable and lasts for several hours, which will eventually be extended to a day, according to the developers. Prices start from $1500. What is more, Google will have it all stored and ready for multiple purposes.

Regardless of whether Project Glass gets off the ground or is just another gimmick, it heralds a significant change in the way we interface with the material world. Myk Willis Computer consultant who attended the June 2012 Google’s I/O developers’ conference had this to say about the product and the more probable future of what is dubbed “wearable computing”:

When we look back 10 years or so in the future, it’s going to be so cheap to integrate computing and communication into everything that it’s going to stop being about gadgets. The real impacts of wearable computing are most likely to come in things that don’t look like computers at all. […]

Computing is infusing every physical object that we interact with, so I think that’s going to end up being the more important angle. It’s not that we’re inventing new gadgets that people can wear. We are taking things that people wear or can carry with them and infusing them with intelligence, computing and connectivity. [16]

The problem is, Google will be gathering real-time information about your every move, something intelligence agencies will be falling over themselves to mine. That is, like Facebook and most social networking platforms, they aren’t in bed with Google from the outset, which seems like a certainty to me. Privacy? Nice idea. What else are we going to be “infusing” into our neural networks which will have the ability to make life easier, faster and accessible?

Darkly comical in the context of Google is the company’s co-founder and CEO Larry Page who refutes the charge by Edward Snowden and many other whistleblowers that they have been inside the CIA and NSA’s pocket for some time. Indeed, since Google is accepted as the leading search and internet tech-company in the world, accounting for 90 per cent of search engine traffic in the UK alone and is the user application of choice for virtually everyone it is simply inconceivable that Google has somehow kept itself immune from the intelligence apparatus. Without them, corporations of that size and magnitude wouldn’t be able to exist in their present form. This is especially true with their dominance in the surveillance and telecommunications game.

Scott Huffman, Google’s engineering director, says the company’s intention is to: “… transform the ways people interact with Google”. And that largely benign wish for many of Google’s employees happens to fit into the “transformation” that is very much part of the social engineering discussed on this blog. Google’s intention is to recalibrate all devices so that they exist not just in our pockets “… but all around us in every room” then it behooves the relevant agencies to get on aboard such an enthusiastic vision early on – which is probably exactly what they did. [17]

circleeggers

The Circle By Dave Eggers (2013)

How does the All Seeing Eye of Google, SMART devices, the Internet of things integrated with our social networks change our daily lives? Author David Eggers has more than a good idea as to how it could morph into something less than convenient. Eggers’ book The Circle paints a truly Orwellian picture of a surveillance state welcomed with open arms by the global population. Privacy is jettisoned and their lives directed and managed by a single corporation: the Circle, a mutant blend of Google, Facebook and Twitter. Since the idea of hiding any information from another is abhorrent and against the whole concept of naturally free world of sharing then to delete any information is deemed a crime. With a direct homage to George Orwell’s 1984 and its paramoralism, the Circle employs the absolute mantras of: “SECRETS ARE LIES,” “SHARING IS CARING,” and “PRIVACY IS THEFT.”

Seen as a Dystopian satire by reviewers it is much more than that, since it perfectly describes aspects of our present let alone our future. Eggers provides a mirror for how technology provides accelerated communication, entertainmen and seeming efficiency while at the same time ensuring compliance and a sickly positive affirmation hardwired into the user experience. Health monitoring of bio-signatures linked to records and location support the contouring of the correct existential meaning mixed together in the blender of the social networking matrix. Nano-cameras placed in every nook and cranny of the world ensure that an optimal mood is maintained along with access to every product you desire. In the end, products determine sense of self and purpose. As everyone is a user it is impossible to opt out of what is essentially a vast system of mind control through homogenisation and uniformity by sensation and instant gratification. Vacuous and empty lives are propagated so that the line between the user and the used becomes impossible to find. A reduction of crime – even its disappearance – Yes. But the cost would be of what it means to be human: creativity, spontaneity, originality and innovation would be crushed under a technopoly of plenty inhabited by “followers” “likes” and “friends” who are merely numbers in a programming matrix and a peripheral relation to objective reality. Eggers book asks the question how much are we prepared to sacrifice? And in doing so, is this ultimate transparency really what it purports to be?

Despite these CEO protestations that public “trust” is essential to the success of Google it becomes rather insulting when we know that Google headquarters and their advancing technology is monitored and directed both inside the corporation and outside by the NSA. As discussed, the mainstream media has been suspiciously hysterical about Snowden and the NSA and happily ignoring AT&T whistleblower Mark Klein and others who have been warning us since 2005 about the fact that the NSA has been wired into top internet companies’ servers, Including Google and Facebook.

With Google co-founder and Chairman Eric Schimdt willing to swallow nanobots to spring-clean his inner workings and uber-geeks like the Vice President of GoogleSearch Ben Gomes welcoming the company as a utilitarian presence in every aspect of our bodies and minds, it begs the question of whether there will be a choice.

Google-GlassGoogle promotion for “Project Glass”

In an interview with The Independent newspaper in July, 2013 Gomes gives us some idea what he thinks about our future. Presently residing at the Google HQ, Building 43 or the “Googleplex” he is an example of a techie genius who sees the unstoppable wave of innovation in this sphere as a wholly positive outcome for all concerned. Ben Gomes talks with barely concealed excitement about a “new epoch”. Waxing lyrical about Google’s new vast information resource Knowledge Graph he exclaims “It’s a meld of all the world’s interests and information needs,” which will accessed by voice commands anywhere you find yourself. The ultimate pot of gold for Gomes is a chip embedded in the brain which he believes is “far from a sci-fantasy.” Indeed, the employment of transhumanist guru Ray Kurzweil believes that in under twenty years “… the size of blood cells … we’ll be able to send them inside our brain through the capillaries, and basically connect up brain to the cloud.” The “cloud” meaning a vast virtual storage system which is already a reality. [18]

As director of engineering, Kurzweil’s Singularity University – of which Google is a partner –  feeds into the worrying trajectory that Google is inside the Elite’s obsession with transhumanism. DARPA is merging with Google innovation and thus pulling the internet under its influence where robotics, surveillance and human augmentation do indeed merge on behalf of those forces which care nothing for visions for human betterment.

Radical life extension has made transhumanist eyes bulge with anticipation, a belief which seems thick on the ground at Google HQ. The corporation recently launched a new company called “Calico” aimed at human lifespan and solving aging-related diseases. Like Bill and Melinda Gates, Google founders Larry Page and Sergey Brin have a keen interest in genetics and life extension. As explained in the 2005 book: The Google Story by David A. Vise, Google geeks have been put to work to assist the revolution by generating: “… a gene catalogue to characterize all the genes on the planet and understand their evolutionary development. Geneticists have wanted to do this for generations … Google will build up a genetic database, analyze it, and find meaningful correlations for individuals and populations.” [19]

And it is here where we see a mind meld of transhumanist exuberance, technical genius and wilful blindness as to the nature of who is guiding who. Clearly, when such a concept is embraced by people at the frontline of such advances which has already taken on a life of its own, they are likely to be assisting in much more than simply technical innovation for its own sake. Every action has a moral and ethical dimension which is smoothed over with lullabies of technocratic peace and harmony. Google, along with the Information Age, is in danger of becoming just another arm of Pathocracy as complete as media, television, industry and agribusiness. If we want to opt out of this integration into the SMART-grid will we be able to do so if our very lives are dependent on its functionality? Moreover, would such rogue thinking be allowed to threaten the infrastructure in this singular future?

Neural networks are not the only bio-real estate available for redesigning. Locator information can be purloined from nearby phones to ping back-and-forth to gain the most accurate coordinates of the person being tracked. Not exactly heart-warming when genetically modified food and gene-twisting technology meets in a grim embrace inside the human body.

So, what’s so special about DNA? We’ll have a look-see in the next post.

 

Update: See also: Data is the New Oil

 


Notes

[1] ‘Apple has more cash in the bank than the U.S. Treasury has left to spend’ By Matthew Humphries http://www.geek.com Jul. 29, 2011|‘Apple ‘spy planes’ to film homes from the air’ “Apple has recruited a private fleet of aeroplanes equipped with military standard cameras to produce 3D maps so accurate they could film people in their homes through skylights, according to reports.” By Nick Collins, Telegraph, 11 Jun 2012.
[2] ‘Rivals Say Google Plays Favorites’ by Amir Efrati, The Wall Street Journal, December 12, 2010.
[3] ‘Google will know more about you than your partner’: Uproar as search giant reveals privacy policy that will allow them to track you on all their products’ by The Daily Mail by Ted Thornhill, 3 March 2012.
[4] ‘Google’s 10 Billion Android App Downloads: By the Numbers’. By Christina Bonnington, Wired December 2011.
[5] ‘How a Lone Grad Student Scooped the Government and What It Means for Your Online Privacy’by Peter Maass, ProPublica, June 28, 2012.
[6] Ibid.
[7] ‘Google’s Street View rejected in Greece over privacy’RINF http://www.rinf.com.
[8] ‘The Carrier IQ Conspiracy’ by Madison Ruppert, December 16, 2011 Activist Post, http://www.activistpost.com.
[9] Ibid.
[10] ‘What does Carrier IQ do on my phone–and should I care?’ by Elinor Mills, CNET, http://www.cnet.com December 1, 2011.
[11] ‘The Cashless Society is Almost Here – And With Some Very Sinister Implications’ By Patrick Henningsen 21st Century Wire: […] It’s arguable that we approaching the cusp of that US Dollar collapse, and perhaps a Euro implosion on the back end of it. Risks of hyper inflation are very real here, but if you control the money supply might already have a ready-made solution waiting in the wings, you will not be worrying about the rift, only waiting for the chaos to ensue so as to maximise your own booty from the crisis.
Many believed that the global currency would be the SDR unit, aka Special Drawing Rights, implemented in 2001 as a supplementary foreign exchange reserve asset maintained by the International Monetary Fund (IMF). SDRs were not considered a full-fledged currency, but rather a claim to currency held by IMF member countries for which they may be exchanged for dollars, euros, yen or other central bankers’ fiat notes.
With the SDR confined to the upper tier of the international money launderette, a new product is still needed to dovetail with designs of a global cashless society.
Two new parallel currencies are currently being used exclusively within the electronic, or cashless domain – Bitcoin and Ven.
Among the many worries Ben Bernanke listed in his speech at the New York Economic Club last week was the emergence of Bitcoin. But don’t believe for a second that these digital parallel currencies are not being watched over and even steered by the money masters. Couple this latest trend with done deals by most of the world’s largest mobile networks this month to allow people to pay via a mobile ‘wallet’, and you now have the initial enabler for a new global electronic currency.
These new parallel cashless currencies could very quickly end up in pole position for supremacy when the old fiat notes fade away as a result of the next planned economic dollar and euro crisis.
Both Bitcoin and Ven appear on their surface to be independent parallel digital money systems, but the reality is much different. In April 2011, Ven announced the first commodity trade priced in Ven for gold production between Europe and South America. Both of these so-called ‘digital alternatives’ are being backed and promoted through some of the world’s biggest and most long-standing corporate dynasties, including Rothschild owned Reuters as an example, which should be of interest to any activist who believes that a digitally controlled global currency is a dangerous path to tread down.  (Read more at http://www.21stcenturywire.com/2012/11/29/the-cashless-society-is-almost-here-and-with-some-very-sinister-implications/)
[12] ‘Google has developed speech-recognition technology that actually works.’ By Farhad Manjoo, April 6, 2011,www.slate.com.
[13] ‘Facial Scanning Is Making Gains in Surveillance’, Charlie Savage New York Times, August 21, 2013.
[14] ‘Advertising based on environmental conditions’ Inventors: Heath; Taliver Brooks (Mountain View, CA) Assignee: Google Inc. (Mountain View, CA) Appl. No.: 12/017,613 Filed: January 22, 2008 / Issued March 20 2012, US patent number: 8,138,930.
[15] Quotation from ‘Big Brother Google just got bigger’ By Madison Ruppert Editor of endthelie.com, January 24 2012.
[16]  ‘U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program’ Wall Street Journal, June 6 2013.
[17] ‘Project Glass: Developers’ verdicts on Google’s headset’ By Laura Locke, BBC News, June 28, 2012.
[18] ‘Inside Google HQ: What does the future hold for the company whose visionary plans include implanting a chip in our brains?’ Ian Burrell, The Independent July 20, 2013.
[19] p.285; Vise, David A.;The Google Story (2008) Published by Pan.

The Z Factor III: The (Welfare) State and Surveillance

Israel is the country that has received more cumulative American aid than any other country since the end of World War II.”

–  ‘U.S. military aid to Israel exceeds $100 billion.’ Haaretz, 2014.


The financial ties between the U.S. and Israel represent an extraordinary long term policy in double standards and favouritism which has extended across successive administrations and stretched the idea of aid to its limits. For most members of Congress, let alone for most Americans, the sheer scale of this monetary support is not known, nor is the MSM keen to trumpet this caricature of expenditure.

Israel has been the beneficiary of aid totalling more than $84,854,827,200 from 1949–1997. This little state still receives $3 billion of US aid each year which is a truly staggering sum of money. Not bad for a country which comprises only 0.001 per cent of the world’s population and boasts a GNP higher than Egypt, Lebanon, Syria, Jordan and the West Bank and Gaza. The majority of this money has come from loan guarantees converted to grants with any outstanding loans “forgiven” by Congress, which is not a little insulting to Latin American and African countries still pounded by debt repayments keeping them in a state of perpetual economic subservience. [1]

Israel is a very special case, it seems. Other countries receive aid in quarterly instalments whereas Israel is fed its substantial booty at the beginning of the fiscal year. We must also include the annual $1.5 billion banquet from private U.S. funds in the form of tax deductible donations and Israeli bonds under the umbrella protection of a considerable number of powerful Jewish charities, a well-oiled process that once again sets an international precedent.

According to Richard Curtiss of the Washington Report on Middle East Affairs the total cost to the U.S. taxpayer has reached an astonishing 134.8 billion since 1949 not adjusted for inflation. Put another way, the 5.8 million Israelis received nearly $14,630 from the U.S. government by Oct. 31, 1997 which “… cost American taxpayers $23,240 per Israeli.” [2] Though Israel is one of the world’s smallest nations it is one of the richest. The latest figures show that American taxpayers are handing over away over $8 million per day into Israel’s coffers costing average Americans over $15 million per day. [3]

Economic researcher and teacher Thomas R. Stauffer produced an extensive June 2003 report entitled: “The Costs to American Taxpayers of the Israeli-Palestinian Conflict: $3 Trillion” published by The Washington Report on Middle East Affairs. Having taught at Harvard University and Georgetown University’s School of Foreign Service Stauffer is highly experienced in his field. His findings found that: “Total identifiable costs come to almost $3 trillion,” Stauffer says. “About 60 per cent, well over half, of those costs – about $1.7 trillion – arose from the U.S. defence of Israel, where most of that amount has been incurred since 1973.” Stauffer also stated that the support for Israel: “… comes to $1.8 trillion, including special trade advantages, preferential contracts, or aid buried in other accounts. In addition to the financial outlay, U.S. aid to Israel costs some 275,000 American jobs each year.” [4]


 The U.S. provides Israel $8.5 million* in military aid each day, while it gives the Palestinians $0** in military aid.

isrealaidgraph“Since the October War in 1973, Washington has provided Israel with a level of support dwarfing the amounts provided to any other state. It has been the largest annual recipient of direct U.S. economic and military assistance since 1976 and the largest total recipient since World War ll. Total direct U.S. aid to Israel amounts to well over $140 billion in 2003 dollars. Israel receives about $3 billion in direct foreign assistance each year, which is roughly one-fifth of America’s entire foreign aid budget. In per capita terms, the United States gives each Israeli a direct subsidy worth about $500 per year. This largesse is especially striking when one realizes that Israel is now a wealthy industrial state with a per capita income roughly equal to South Korea or Spain.”

— John J. Mearsheimer and Stephen M. Walt,“The Israel Lobby and U.S. Foreign Policy”– From: www.ifamericansknew.org


It is the powerful leverage of Jewish lobby organizations operating on behalf of Israel which command enormous funds which Congress meekly approves and never cuts. American Israel Public Affairs Committee (AIPAC) coordinates the campaigns for donations and has over a $15 million dollar budget and some 52 national Jewish charities from which to rally to the cause, some of whom appear to be adopting nothing more than a platform for denigration of all things Arabic spun at the edges with conciliatory platitudes. While a registered lobby for Israel, it does not have to register as a foreign lobby. Moreover, they can sit on every hearing in the US Congress that involves Middle Eastern issues which gives it a unique and exceptional advantage. As Jewish-American and anti-Zionist journalist Jeffrey Blankfort reminds us: “… they also write the legislation that Congress passes regarding the Middle East. For example, the recent ‘Syrian Accountability and Lebanese Sovereignty Restoration Act,’ which was passed a couple of years ago, and which lead to what we see in Lebanon and Syria today, was written by AIPAC which later bragged about it. It is not a secret. The only people that pretend they don’t know it is the Left.” [5]

Although Palestinians have received humanitarian and development assistance it has never received military aid unlike Israel which uses its enormous financial and military support to further undermine and erode the civil, cultural and human rights of Palestine people. The result is a perpetual human rights disaster in the in the occupied territories, though you would never believe it if you paid attention to the MSM in US and most of Europe which is generally heavily biased in favour of Israel.

American businessmen and Zionists also grabbed a slice of the neo-colonial pie under the shroud of “reconstruction” still taking place within the open wound of Iraq. One example comes from The Iraqi International Law Group (IILG) which was set up last July by Salem “Sam” Chalabi the nephew of the head of the Iraqi National Congress Ahmad Chalabi a Pentagon favourite and leading member of Iraq’s (read U.S.) governing council. Mr Marc Zell, who was a one time member of the Likud party and campaigned for Prime Minister Benjamin Netanyahu, has the onerous responsibility of finding Israeli/American companies to do business in Iraq. Zell, who has offices in Jerusalem and Washington ran a law practice with none other than Zio-Con Douglas Feith who was assigned the task of “reconstruction” in Iraq, a euphemism for assigning no-bid contracts to Anglo-American-Israeli corporations such as Halliburton and KBR Company. [6]

Zell has outspoken  views on the rights of settlers to occupy Palestinian land as well as promoting the idea of supplying Iraqi oil to Israel via a pipeline, something which the late Ariel Sharon was enthusiastically pursuing while visiting Iraq in 2005. Having extremely strong ties to the Pentagon before and after the invasion it comes as no surprise that Zell and others of his ilk represent a piece in an overall strategy of Israel to drain Iraq if its life-blood in more ways than one.

Biased business opportunities have nothing to do with establishing a cohesive and sustainable infra-structure, rather, this represents the future “glories” of capitalism and an open door to the basic ingredients of this form of extreme consumerism and MTV culture. A black market, mafia driven exploitation is thriving in Iraq. It was in 2005 that the new market for pornography really took off supplying the demand in some hastily revamped cinemas and living rooms of Iraqi citizens as one indication of Western alliance influences.  [7]

Big money pouring into Israel – particularly after the ransacking of Iraq – has meant Israel’s military capability has been enhanced to a significant degree, due in part, to illicit arms technology transfers and the sharing of weapons systems software technology. What is more economically incestuous is that much of the military aid to Israel is used to buy weapons from the U.S. and heavily subsidized by the same, thus furthering the demand for more weaponry in the Arab states. 80 per cent of arms to Arab countries is sourced from the U.S. (It is also true that many European arms manufacturers have been keen to provide weapons for Israeli, most notably the United Kingdom).

A prime example of stunning hypocrisy is evident from the U.S. Foreign Assistance Act which prohibits military assistance to any country “which engages in a consistent pattern of gross violations of internationally recognized human rights.” We can also include the Proxmire Amendment which bans military assistance to any government that refuses to sign the Nuclear Non-Proliferation Treaty and to allow inspections of its nuclear facilities. And here we have the U.S. happily flouting such laws with Israel continuing its own nuclear capability while crying foul against any other nation attempting to do the same.

Reports of the Israeli’s developing ethnic specific weaponry becomes less of a rumour and more of reality when we cast an eye over the 200 companies and corporations listed as “recipients for grants from U.S./Israel binominal foundations” at the Jewish Virtual Library (a division of American Israeli cooperative Enterprise). The text goes into a romantic, hand in hand explanation of the two countries with “shared value initiatives” and as “partners for change.” One may take a shrewd guess that the kind of “change” and “initiatives” are very different to the flowery image of participation and renewal depicted here.

The Israeli network within the US Government would suggest that American/Jewish interests are so intertwined that is hard to know just where America ends and Israel begins. Most of the American public are not remotely aware of how Zionist influence has infiltrated the American Establishment largely due to preferential immigration and the consequent embedded intelligence assets of varying degrees of importance. The Israel lobby now effectively directs American foreign policy via Zio-Conservatives and religious extremism. Its origin is in Revisionist Zionism whose principles were to take by force not only Palestine but to maintain political control by co-opting the politics of the Anglo-American Establishment and their media outlets.

Another less well known building block in the formation of political Zionist control in Britain and America was the Parushim (Hebrew word for ‘Pharisees’ and ‘separate,’) a secret fraternity founded around 1912 which grew out of the University of Harvard’s Menorah Society. “As the Harvard men spread out across the land in their professional pursuits, their interests in Zionism were kept alive by secretive exchanges and the trappings of a fraternal order. Each invited initiate underwent a solemn ceremony, swearing the oath ‘to guard and to obey and to keep secret the laws and the labor of the fellowship, its existence and its aims.’” [8]

The creator of the Parushim was Jewish American attorney Louis Brandeis, who was a close, personal friend of British Prime Minister Woodrow Wilson who became an ardent Zionist for the cause: “The members set about meeting people of influence here and there, casually, on a friendly basis. They planted suggestions for action to further the Zionist cause long before official government planners had come up with anything. For example, as early as November 1915, a leader of the Parushim went around suggesting that the British might gain some benefit from a former declaration in support of a Jewish national homeland in Palestine.”  [9]

From then on, the branches of influences have extended into the heart of the US administration federal agencies, media and “info-tainment” industries, exerting often obvious intimidation in the press and subtle control over content and narrative in the fields of entertainment. Academia often serves as gate-keepers for Zionist and Jewish interests. Psychologist and historian Kevin MacDonald commented on this point in his 2005 book The Culture of Critique where he states: “… ethnic Jews have a powerful influence in the American media-far larger than any other identifiable group. The extent of Jewish ownership and influence on the popular media in the United States is remarkable given the relatively small proportion of the population that is Jewish.” It would be a grave mistake to underestimate the slice of the social engineering pie that Zionists have carved out for their aggressive interests.  [10]

***

There appears to be an historical sharing of intelligence between the CIA and MOSSAD, from bio warfare to surveillance technology, though this alliance may be somewhat factional and very far from “cosy.” One category of this shared intelligence came under the little known name of PROMIS (Prosecutor’s Management Information System) developed by former employees of the National Security Agency (NSA) and now used by everyone (with suitable 21st Century enhancements). Its purpose was to track individuals pursued or prosecuted by the U.S. Justice Department by interfacing with other databases. Further modifications took place over the years via stolen copies and a complex web of interested parties with heavy links to chemical and bio weaponry production.

According to an Israeli operative Ari Ben-Menashe of the Israeli Defence Force (IDF) he had been personally involved in a multi-billion dollar arms deal between Iraq/Iran the purpose of which was to exacerbate tensions between the two countries. In 1987 Ben-Menashe claims to have attended a meeting in Tel Aviv where the CIA, NSA and the Defence Intelligence Agency (DIA) all used PROMIS and gave it to Israeli Intelligence. He further described that American operators had the key to back door access modifications carried out on now expanding bootleg versions of PROMIS. However, the most intriguing sign of “shared value interests” comes from Ben Menashe’s insistence that during the Reagan administration some officials had hoped to use Israelis to sell PROMIS to police and intelligence agencies globally.

In Ari Ben-Menashe’s memoir Profits of War (1992) he quotes Rafi Eitan the anti-terrorist advisor to Israel’s Prime minister during the eighties: “We can use this program to stamp out terrorism by keeping track of everyone. But not only that we can find out what our enemies know too.” This allowed Israelis to enter via a “back door” into any other intelligence agency network birthed initially by the NSA and no doubt being perfected still further within its catacombs.

In December 2001 Executive Intelligence Review reported on the suspicion that then Prime Minister Ariel Sharon had: “… dispatched special operations teams into North America…Portions of the funds garnered from the illegal operations according to sources, are funnelled to offshore bank accounts of the late Ariel Sharon. Some of these dirty funds were reportedly diverted to Sharon’s election campaigns. This Israeli mafia apparatus receives technical support with major American telephone companies and government law enforcement agencies.”  [11]

It is evident that telecommunications technology is part and parcel of Israeli business and covert operations which has been grafted onto a fertile ground for socio-cultural programming where Israel’s Statehood and Jewish victimisation have become an industry in its own right. This acts as a shield to applying any kind of objectivity and critical analysis to Israel’s role in global terrorism.

If we keep in mind the details of PROMIS and other hybrid spy systems of monitoring surveillance currently used by Israel it comes as no surprise that that corporate America and its media is effectively controlled from top to bottom by Zionist influences heavily populated with MOSSAD agents in every sector of American life. The advanced PROMIS system and others since developed which are more sophisticated (you only have to remember the Edward Snowden revelations) are being used to eavesdrop on ordinary Americans and those who have in the merest whisper of a “terrorist” connection as part of the “above board” U.S./Israeli joint intelligence venture.

Returning to the Israeli company Amdocs Inc., presently headed by Eli Gelman, it has rapidly evolved into the leading market provider for sub-contracted billing and directory services straddling 90 per cent of American phone companies. In 1997, Amdocs was implicated in the leaking of police phone data which in turn led to the collapse of an investigation into drug and credit card fraud – also with Israeli mob connections, a pattern which has occurred many times since with various Israeli-owned telecommunications and software companies firmly integrated into the US communications infrastructure. [12]It just so happens that Amdocs has “won” major deals over the years with American communications giants such as AT&T, one of the world leaders in data and voice communications with an annual turnover of $41 billion and serving over 40 million private clients. Additional deals followed. [12]

Israeli owned Comverse Infosystems was also had a cloud of suspicion hanging over its business dealings where versions of PROMIS may have surfaced within its applications but these companies have nonetheless surged ahead with lucrative trade deals and major investments from U.S. companies. According to the American-Israeli Chamber of Commerce South region E-newsletter: “… there has been a surge in demand for Israeli security products and expertise since the September 11th attacks. From gas masks to anthrax drugs to security training centers and information security, Israeli companies are taking advantage of the expertise they’ve developed over the years to respond to this world-wide crisis.” Since evidence has been found that Israel may have managed to slip agents into the telephone systems at the highest levels of U.S. Government, it is hardly surprising that US intelligence agents are becoming uneasy about the sanctioned presence of MOSSAD. [13]

For Spanish version: See La Verdad Nos Espera


Notes

[1] ‘A Conservative Estimate of Total Direct U.S. Aid to Israel: Almost $114 Billion’ By Shirl McArthur (It does not include money from the DOD and other agencies. Nor does it include estimated interest on the early disbursement of aid).
[2] By Richard H. Curtiss Former U.S. Foreign Service Officer Speech at the Al Hewar Center for Arab Culture and Dialogue May 20, 1998.
[3] Ibid.
[4] ‘The Costs to American Taxpayers of the Israeli-Palestinian Conflict: $3 Trillion’ By Thomas R. Stauffer, Ph.D. Washington Report on Middle East Affairs, June 2003. | http://www.ifamericansknew.org/stats/stauffer.html
[5] The Chomsky/Blankfort Polemic: ‘The anti-war movement has failed’ Interview with Jeffrey Blankfort by Silvia Cattori, Febuary 17, 2006.
[6] ‘Corporate oil giants scramble to plunder Iraq’s energy reserves’ By James Cogan. WSWS, 18 December 2007. / ‘They plundered Iraq for fun and profit’by Froma Harrop, The Seattle Times, July 26, 2006. See also “Iraq for Sale: The War Profiteers” by Robert Greenwald (2005). “Acclaimed director Robert Greenwald (Wal-Mart: The High Cost of Low Price, Outfoxed and Uncovered) takes you inside the lives of soldiers, truck drivers, widows and children who have been changed forever as a result of profiteering in the reconstruction of Iraq. Iraq for Sale uncovers the connections between private corporations making a killing in Iraq and the decision makers who allow them to do so.”
[7] ‘American freedoms bring porn to Baghdad’ AP, August 23, 2010.
[8] p.53; Israel in the Mind of America, by Peter Grose, New York: Knopf, 1984.
[9] Op. cit. Grose, (p. 54).
[10] The Culture of Critique: An Evolutionary Analysis of Jewish Involvement in Twentieth Century Intellectual and Political Movements, by Kevin MacDonald, Dept.of Psychology, California State University 1998, 2002 | ISBN: 0-7596-7221-0.
[11] ‘A Sharon spy network in the Americas?’ Executive Intelligence Review, December 13, 2001.
[12] ‘Is Israel Blackmailing America?’ By Mike Rivero | http://www.whatreallyhappened.com/
[13] ‘AT&T’ Market Watch |ww.marketwatch.com/investing/stock/t/financials | ‘U.S. Police and Intelligence Hit by Spy Network’ Charles R. Smith, Dec. 19, 2001, News Max.

The Z Factor II: Sexpionage

“If it is necessary to use a married woman, it would be best [for] her husband to divorce her. … After the [sex] act, he would be entitled to bring her back,” … “Naturally, a job of that sort could be given to a woman who in any event is licentious in her ways.”

– Rabbi Ari Shvat, on ‘Illicit sex for the sake of national security’ published by the Tzomet Institute: Israeli rabbi: Honey-pot sex is kosher for female Mossad agents


Back in the world of the British bobby it seems policing has changed out of all recognition. Police have used sexpionage as a tool in undercover operations for many years targeting anarchist, left-wing and environmental groups in order to gather intelligence, all sanctioned by senior commanders, despite protestations to the contrary. [1]If blackmail is a primary tool of intelligence agencies with many of our politicians and officials as paedophiles and sexual predators, then it is only logical that such people are purposely being groomed for placements within the military and political Establishment, with or without their knowledge. A review of the MOSSAD’s operations in recent years suggests that they are way ahead of the game regarding such tactics.

Israel welcomed into their clandestine operations a number of former Eastern bloc intelligence agents during and after the Cold War, which led to the use of both female and male sex agents or “Ravens” and “swallows.” Successful intelligence ploys used by the former KGB and East German Stasi have mutated into a potent form of “sexpionage” or the use of sex by foreign spies to obtain information or concessions from government. Even Palestinian collaborators in occupied territories have been recruited by Israeli security forces by using the same seduction tactics which have proved essential in infiltrating Palestinian groups and setting up targets for arrests and assassinations [2]

The MOSSAD keeps thousands of “dossiers” on many US politicians which become targets for information gathering including blackmail opportunities. This means that extensive profiling takes place so that the prospective patsy can be comprehensively trapped. That means getting to know his sexual preferences and character traits.

The James McGreevey and Golan Cipel affair is a case in point, which involved a high level governor with Homeland Security clearance posting and an unorthodox employee. On closer inspection some of the details are just a little too convenient and rather too pat to be mere chance. This was not a “gay sex scandal” but an Israeli intelligence operation which had to be hastily aborted. It was to be turned into a sexual scandal to draw interest away from the nature of the operation: sex for secrets. It seems Mr. Cipel was a junior MOSSAD case officer, originally posted to New York under official cover. McGreevey was lured into the relationship that was intended to breach New Jersey’s so called homeland defences.

Foreign intelligence expert Andy Martin from Out2.com newspaper syndicate offered the following analysis:

‘Since 9/11 there has been barely suppressed anger at the fact Israeli intelligence knew about the hijackers and said nothing. Israelis have found themselves under suspicion and restricted by some intelligence channels. The state homeland security position was seen as a back door way of spying on anti-terror preparations in the New York-New Jersey area, and possibly nationally.’

‘The media have focused on the wrong blackmail scheme. This was not a sexual blackmail situation, although threats and demands have been made.’

‘Gay sex’ is being used to conceal the real nature of the betrayal. This was a blackmail scheme intended to place Golan Cipel in a position of intense interest to Israeli intelligence.’

‘I am asking the U.S. Attorney for New Jersey to refocus his investigation into a breach-of-security investigation instead of a sex scandal. ‘Based on my extensive experience with foreign intelligence agencies, I think you will see Mr. Cipel, who is now exposed by his non-official cover, on a plane back to Israel very soon.’ .[3]

And Indeed he was.

A married man concealing his homosexuality and very likely having the odd extramarital affair which MOSSAD would have been monitoring was enough to mark McGreevey out for a MOSSAD operation. His post as Governor of New Jersey meant that he was privy to some very interesting Homeland Security strategies.

In March 2000, McGreevey contacted Golan Cipel while in Rishon Letzion, home of the first Zionist settlement, Israel’s fourth-largest city, where the young Israeli worked for the Mayor Meir Nitzan. It was back in 1995 while Cipel was working at the public information office at the Israeli consulate in New York that he began working for McGreevey when he was mayor of Woodbridge. Cipel was studying communications at the New York Institute of Technology, though he received a Fine Arts degree. Art, spying and Israel pop up yet again. (We may remember the story broken by Carl Cameron for Fox News which was later hastily buried bringing to light the existence of an Israeli spy ring which consisted of over 180 cases of young agents posing as art students).[4]

Israeli embassies have been centres of MOSSAD operatives for decades along with a widely held belief that Israeli espionage training operations are primarily carried out through the telecommunications industry within the US. This serves as another warning sign that Cipel was most likely a “Raven.” The fact that he was a former Israeli Naval Officer only confirms the suspicion.

On Jan. 24, 2002, with great fanfare, Mr. McGreevey announced the creation of an office of counterterrorism and appointed Kathryn Flicker, a respected assistant attorney general, to the post. But Cipel was already there and was appointed his lead advisor for homeland security the following month. When the scandal broke he fanned the fire still further by assigning him to a job as “counselor to the governor.” Obviously the Israeli was doing his job very well, as he was clearly enamoured of Cipel.

>Mexican journalist Ernesto Cienfuegos had this to say about the case:

During the period between meeting James McGreevey and the revelation of the scandal, Golan Cipel moved from assignment to assignment with the ease that only an Israeli sexpionage operative could have. According to official documents, Cipel worked for the Israeli Parliament, the Israeli Embassy in New York, the Simon Wiesenthal Center, and ultimately as Chief of Homeland Security for the US State of New Jersey at a salary of $110,000 per year, even though he was an Israeli illegal alien.

The allegations by Cipel of ‘sexual harassment’ by Governor McGreevey are only a ruse to cover up the real purpose of the operation. The allegation by Cipel that he was sexually assaulted by the governor “twenty times” is preposterous and only the dumbest Americans will believe it. In fact, Golan Cipel allowed the governor to buy him an apartment a mere few blocks from the condominium where McGreevey lived with his so called wife. The scandal involves much more than just the outing of a ‘queer governor’! [5]

Gary Condit, as a senior member of the House Permanent Select Committee on Intelligence was privy to high level classified documents that Israel would have been happy to get their hands on. Chandra Levy, a 24 year old government intern, a sleeper agent and “swallow” was activated for this purpose and a meeting set up. Married Condit soon came under Levy’s spell and an affair ensued. However, it seems US intelligence was tipped off and Levy was murdered, her remains being discovered more than a year later. No one has been charged for the murder, nor are they likely to be.

Bill Clinton’s sexual escapades were no less prominent than J.F. Kennedy or indeed, most members of Congress, through successive administrations. What was more unusual was that it represented one of the MOSSAD’s most successful operations leading to Clinton’s impeachment by the U.S. House of Representatives and acquittal by the Senate. They did it through the “swallow” Monica Lewinsky.

 lsky-horz
Monica Lewinsky (left) Chandra Levy, John McGreevey and Golan Cipel (right)

There are conflicting reports as to the reasons why such an operation was undertaken. One suggestion is Lewinsky’s primary mission was to blackmail Clinton in order that he released the Israeli spy Jonathan Pollard. Another believes that the MOSSAD were bugging the Watergate apartment telephone of their agent Lewinsky who had fostered the affair with Clinton as ordered. They were then able to obtain material used to blackmail the Clinton administration into shutting down a probe of widespread Israeli espionage in Washington.

Investigative journalist Kevin Dowling reported that his sources in Tel Aviv told him that “full transcripts of more than 30 sexually explicit conversations between Clinton and Lewinsky are held by the Israeli foreign intelligence service, the MOSSAD.” By “coincidence” the Likud Prime Minister and ardent Zionist Benjamin Netanyahu met President Clinton at the White House while the scandal was in full swing. [6]

As a backdrop to Clinton’s entrapment we had:

“… the assassination of President Clinton’s partner in the Middle East peace process, Israeli Prime Minister Yitzak Rabin, on Nov. 4, 1995, which open[ed] the path for Netanyahu becoming Prime Minister in May 1996; and Netanyahu’s visit to Washington in mid-January 1998 – just as the Lewinsky affair was breaking in the U.S. news media. On this visit, Netanyahu publicly insulted the President by meeting with Bill Clinton’s worst enemies, televangelists Jerry Falwell and Pat Robertson.” [7]

However, in a piece from Jeffrey Steinberg of Executive Intelligence Review, he draws our attention to the interception of a phone conversation in January 1997 between an Israeli official at the embassy in Washington, and Danny Yatom, the head of the MOSSAD, Israel’s foreign intelligence service. Permission was sought from the head: ‘… to Mega’ in order to a copy of a confidential letter that had been sent by then-U.S. Secretary of State Warren Christopher to Palestinian Authority President Yasser Arafat, concerning U.S. assurances about a recently negotiated agreement for an Israeli military withdrawal from the Hebron area in the West Bank. Yatom, according to the NSA intercept, rejected the request, admonishing his agent, ‘This is not something we use Mega for.’ ” [8]

Why it was so shocking that another spy-ring within the Clinton Administration might be operating when Israeli-Jewish influence had been saturating the social, cultural and political landscape for several decades remains a mystery. One possibility is that blackmailing the Clinton Administration with the taped conversations between the President and Monica Lewinsky was a way to force Washington to abandon the Mega hunt and get Clinton back in Israel’s court.

The telecommunications network in the United States had already been subverted by Israeli agents for some years and which, during the early Clinton era was extended right up to the White House itself. The outside contractor involved in the modernizing of the administration communications systems was (surprise, surprise) an Israeli company Amdocs which had “…unfettered access to White House telephone lines and other super-sensitive communications equipment. However, the nature of the request from the Mossad man in Washington to Yatom—to obtain a confidential State Department document—rules out the possibility that Mega was an electronic eavesdropping source.” [9]

Consequently, the hunt for the Israeli “Mega” mole began in earnest with two candidates flagged as probable.

Martin Indyk is a British-born Australian citizen, who held a post in Australia’s top Mideast security official in the late 1970s, as deputy director of current Mideast intelligence at the Australian Office of National Assessments. He was also a media consultant to Israel’s Likud Prime Ministers, Menachem Begin and Yitzhak Shamir. In 1993 his circuitous path found him in the Clinton Administration’s National Security Council (NSC) staff as Senior Director for Near East and South Asian Affairs.

Next were Likud and Neo-Conservative Leon Fuerth and none other than Vice-President Al Gore’s National Security Adviser. Suspicions were raised by 1998 when it was reported that he had been suspected of: “…passing sensitive U.S. policy information to Israeli Prime Minister Benjamin Netanyahu (Likud), a passionate, personal enemy of President Clinton, who was suspected of activating the Mega spy operation.” According to Steinberg, while blackmail was certainly a possibility: “Mega was not a deep mole inside the White House. Mega was a far more visible, far more powerful entity, known among its several dozen members as ‘the Mega Group.’” [10]

The Mega Group was made up of 20 top level banking and corporate CEOs, and directors worth billions of dollars who ostensibly wished to create a Jewish philanthropic enterprise. Hedge-fund manager Michael Steinhardt Edgar Bronfman, then chairman of the World Jewish Congress; Charles Bronfman, Edgar’s brother and a top executive of the family’s flagship Seagrams Corp.; Laurence Tisch, chairman of Loews Corp.; Leslie Wexler of Limited, Inc.; Leonard Abramson, the founder of U.S. Healthcare; bagel magnate Max Lender; Charles Schusterman, chairman of Samson Investment Co; Harvey Meyerhoff, real estate magnate and Max Fisher, the Detroit oil magnate and Republican Party donator.

In fact, the Mega Group’s raison d’être was to bolster the power of the Israeli lobby and channel “charitable funds” for influencing policy toward Israel at the behest of the then Likud government of the late Ariel Sharon. Three of the leading Mega Group members, Leonard Abramson, Edgar Bronfman, and Michael Steinhardt had been reported as founding a new think tank named Emet (Hebrew for “truth”) in order “…to generate long-term strategies for presenting Israel in a favorable light.” The ADL’s then director Abe Foxman was an enthusiastic supporter as were other far right Zionist interests who were intent on taking a hard-line approach to the peace process.

So, rather than a single “mole” in the government, this is a Zionist fifth column spread across many US departments fully embedded in the National Security State infrastructure. There no sign that it has been removed.

***

As mentioned previously, Israeli embassies have been at the forefront MOSSAD’s international operations. Asia pacific has been in the news recently where agents have been popping up on various occasions with yet another spy theory circulated in 2006 involving an expulsion of a diplomat in Canberra, Australia.

Israeli consul Amir Lati, 2nd Secretary at the Israeli Embassy in Canberra was secretly expelled after the Howard Government threatened to declare him persona non grata. He was said to be a MOSSAD operator and seeking military and technology secrets, passed to Australia by the US. Suggestions there were connections to the detention and subsequent brief imprisonment in New Zealand of two MOSSAD agents Uriel Zoshe Kelman and Eli Cara were consistently denied. However, New Zealand Prime Minister, Helen Clark had no hesitation in imposing diplomatic sanctions on Israel from her conviction that the men were spies. After being sentenced to six months in jail the men were out in three and on a plane back to their homeland.

Due to the heightened vigilance from the arrest of these spies, the Australian Secret Intelligence Organisation (ASIO) was ready for Mr Lati. His reputation as a sexual predator (as well as a sexpionage agent) was well known, having most recently seduced a senior official at the Australian Defence Department who had access to classified material. His expulsion revealed further details in February that Lati had a close friendship with the daughter of Attorney-General Philip Ruddock who was responsible for the ASIO. Minister Alexander Downer and Mr. Ruddock strongly denied there was a link, though they would not elaborate on the reason.

Ms. Ruddock may have been targeted by Lati whom he met while they were studying in Beijing over six years before. It may well be that their meeting may have been innocent enough at that stage but once Lati’s assignment had been activated, it is likely that links were re-established due to the information possibilities Ruddock’s daughter presented. Such coincidences are highly unlikely in the fields of counter-intelligence and sexpionage.

Amir Lati’s replacement was Ari Scher, a known paedophile, who was forced to flee from Brazil and return to his native to Israel after a rather lacklustre investigation into his alleged involvement in a child pornography ring. Brazilian authorities declared him a fugitive after searching his apartment and finding technology used to manufacture pornographic material, some of which involved underage girls. More importantly, two juveniles reported to police that they were forced by Scher to have sexual intercourse with various Israeli and other foreign “guests and tourists.” Brazilian authorities said “he had left the country via ‘legal diplomatic channels.’” It appears that it was indeed a rather panic-stricken departure.

When a 17 year-old girl accused 40-year-old Hebrew teacher Georges Schteinberg of using her as a model in pornographic pictures and of distributing them on the Internet, the investigation culminated in a search of Scher’s apartment where: “ … Photographs of nude minors posed on a car with diplomatic plates were discovered in a search of Schteinberg’s residence earlier in the week, in addition to massive quantities of pornographic material. Police then traced the car in the pictures back to Scher. The search of Scher’s apartment confirmed that some of the photographs found at Schteinberg’s residence had been taken in the vice-consul’s penthouse.” [11]

In other words, Scher was tipped off by the Israeli consulate headed by Eitan Surkis and spirited away before the Brazilian police could capture him. They had even staked out the Israeli embassy in Rio de Janerio only to be told he “…had been en route to Israel for the past two days.” [12]

According to Agent Icaro Silva of the Brazilian Police Commission in Copacabana, nine complete pornographic web sites were found on the hard drive of Schteinberg’s computer, all in Hebrew, the language that Schteinberg taught. A retired professor by the name of Ablio Nogueira de Faria, age 78, who was in jail for producing child pornography was also found to have connections to Scher. Essentially, vice consul Scher in concert with Georges Schteinberg were running an Internet service that brought Israeli tourists to Brazil to have sex with the children. Later, it was found that his computer had disappeared. (Schteinberg has since been charged with sexual exploitation of minors).

Sex tourism and paedophilia for embassy staff seems to be an extracurricular activity that is far from uncommon. Such “hobbies” did not seem to deter the Israel government from putting forward Ari Scher as a possible replacement which, given his history, is either a very careless oversight or a purposeful placement to move an operative onto pastures new. Brazil, having formerly asked Scher to be extradited is still waiting for an answer and not likely to receive one anytime soon. Israel’s Civil Service Commission banned him from foreign diplomatic missions for five years but did not believe he acted criminally, which should say something about the agenda of Israeli institutions.

Some reports cite sexpionage as so important to Israeli intelligence that an office located in Washington D.C and set up as a post 9/11 anti-terrorism Institute, is in fact a front for the purpose of continuing such operations. The office can be found at 3811 N. Fairfax Drive, Suite 720 Arlington, VA 22203. The Chief of the office is none other than the former Director of the Israeli MOSSAD, Shabtai Shavit.

See Spanish version at Los Verdad Nos Espera

Notes

[1] ‘Sex ‘part of undercover policing’’ UKPA January 24, 2011: “Police used sex as a tool during undercover operations – and tactical “promiscuity”, sanctioned by senior commanders, was viewed as “part of the job”, a former agent revealed. The officer, who worked in a secretive unit of the Metropolitan Police for four years, said sexual relationships with activists were common among those gathering intelligence from anarchist, left-wing and environmental groups. His claims, made to The Observer, contradict comments made last week by the Association of Chief Police Officers (Acpo) which insisted the practise was forbidden.
But the former officer, once a member the Special Demonstration Squad (SDS), a covert unit formed to prevent violent disorder on the streets of London, said sex helped to maintain cover. The man, who was not named, admitted to sleeping with at least two of his female targets for information.
“Everybody knew it was a very promiscuous lifestyle,” he told the paper. “You cannot be promiscuous in those groups. Otherwise you’ll stand out straight away.”
Meanwhile, there was also no set of instructions dictating whether officers could or could not have sex with activists, he claimed.
“Among fellow undercover officers, there is not really any kudos in the fact that you are shagging other people while deployed,” he added.
“Basically it’s just regarded as part of the job. It’d be highly unlikely that you were not (having sex). When you are using the tool of sex to maintain your cover or maybe to glean more intelligence – because they certainly talk a lot more, pillow talk – you would be ready to move on if you felt an attachment growing.”
However, the officer, who infiltrated anti-racist groups between 1993 and 1997, said falling in love could jeopardise an investigation and was regarded as unprofessional. His revelations follow the controversy surrounding former Met officer Pc Mark Kennedy who monitored the actions of protesters across Europe under the guise of a long-haired, drop-out climber called Mark Stone.”
[2] ‘How Israel builds its fifth column’ Palestinian collaborators face mob justice, and fuel a culture of suspicion’ By Catherine Taylor, Special to The Christian Science Monitor / May 22, 2002.
[3] ‘Foreign Policy/Intelligence Columnist Andy Martin Says McGreevey Sex Scandal was Israeli Intelligence Operation,’ US Newswire, August 16, 2004.
[4] Unusually for a propaganda station like Fox news, it aired a programme on December 12 2001 called ‘Israel Is Spying In And On The U.S.?’ by Carl Cameron: “Now Fox News has learned some U.S. investigators believe that there are Israelis again very much engaged in spying in and on the U.S., who may have known things they didn’t tell us before September 11. Fox News correspondent Carl Cameron has details in the first of a four-part series.”
[5] ‘Israeli Sexpionage: The McGreevy, Condit and Clinton Affairs’ by Ernesto Cienfuegos, La Vow de Aztlan, August 17, 2004.
[6] What Was the Mossad Role in the Lewinsky Affair? by Edward Spannaus, The New Federalist, 1998.
[7] Ibid.
[8] ‘Israeli Spies: ‘Mega Was Not An Agent; Mega Was the Boss’ by Jeffrey Steinberg Aug. 31, 2001 issue of Executive Intelligence Review.
[9] Ibid.
[10] Ibid.
[11] ‘Brazilian police stake out diplomat accused of running kiddie-porn ring’ By Eli Muller and News Agencies Jerusalem Post, July 6, 2000.
[12] Ibid.