{"id":65061,"date":"2017-02-01T15:20:41","date_gmt":"2017-02-01T19:20:41","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=65061"},"modified":"2017-02-01T15:22:15","modified_gmt":"2017-02-01T19:22:15","slug":"ways-darpa-vader-and-the-u-s-defense-department-spy-on-you-video","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=65061","title":{"rendered":"Ways DARPA Vader and the U.S. Defense Department Spy on You (Video)"},"content":{"rendered":"<p>BY VOICE OF REASON<br \/>\nThe Last Great Stand<!--more--><\/p>\n<p><a href=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Vader.jpg\" data-wpel-link=\"internal\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-58669\" src=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Vader.jpg\" sizes=\"auto, (max-width: 660px) 100vw, 660px\" srcset=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Vader.jpg 660w, http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Vader-300x225.jpg 300w\" alt=\"\" width=\"660\" height=\"495\" \/><\/a><\/p>\n<p><b>In a previous post, Edward Snowden hinted that the <a href=\"http:\/\/thelastgreatstand.com\/2017\/01\/31\/edward-snowden-hints-at-nsas-ability-to-mind-hack-video\/\" data-wpel-link=\"internal\">NSA may have the technology to read the secret thoughts and feelings<\/a> of unsuspecting Americans. At first that might sound crazy, but is it really any more crazy than saying the NSA has the ability to scan and extract the information contained on a hard drive that is sitting in the bottom of a closet, at a home in the mountains, that has never been turned on, OR plugged into the internet? That sounds crazy too doesn\u2019t it, however that technology is very real, and is also covered in that prior post.\u00a0<\/b><\/p>\n<p><b>Americans have been well conditioned by our politicians and the mainstream media to point and yell \u201cconspiracy theory\u201d whenever they hear something that challenges their very narrow world view, or for which they hear something that requires a degree of background information to understand, and they have none. The following video summarizes a recent post written by <\/b><strong><a href=\"http:\/\/themillenniumreport.com\/2017\/01\/darpa-vader-and-the-evil-intel-empire-inside\/\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">The Millennium Reporter<\/a><\/strong><b>, which I came across at <\/b><strong><a href=\"https:\/\/stateofthenation2012.com\/?p=64806\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">State of the Union<\/a><\/strong><b>.\u00a0<\/b><\/p>\n<p><b>Since I have covered these exact topics in the past, but not all in one post, I\u2019ve included several videos at the end that really help tie together all the information provided by <\/b><strong><a href=\"http:\/\/themillenniumreport.com\/2017\/01\/darpa-vader-and-the-evil-intel-empire-inside\/\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">The Millennium Reporter<\/a>.<\/strong><b> I also include links to the findings of a study most people will refuse to accept, not because the findings are incorrect, but because denying the reality of them is easier than taking the time to read the proof confirming them. I am referring to the fact that the CIA created Google, and Google created the NSA. Every minute detail is included in the links provided.\u00a0<\/b><\/p>\n<div id=\"thela-836149551\" class=\"thela-amazon-season-648-x-60-posts\" data-id=\"54967\"><\/div>\n<p><b>Most people are\u00a0familiar with the story of how <\/b><b>Sergey Brin and Larry Page created Google while at Stanford, but far fewer know that they did so with the supervision of CIA handlers, and seed money from the CIA\u2019s venture capital firm In-Q-Tel. What follows will be VERY DISTURBING to anyone looking to understand a very complex issue by reading a paragraph or\u00a0headline, and then thinking they\u2019ve researched the issue. Conversely, anyone willing to take the time to follow the links provided, will be rewarded with a treasure trove of knowledge that will surely have their undivided attention, as well as concern\u2026\u00a0<\/b><\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/MPS7ZJpu89Y\" width=\"660\" height=\"460\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p><strong><a href=\"https:\/\/stateofthenation2012.com\/?p=64806\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">State of the Union<\/a> reposted the following article from <\/strong><strong><a href=\"http:\/\/themillenniumreport.com\/2017\/01\/darpa-vader-and-the-evil-intel-empire-inside\/\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">The Millennium Reporter:<\/a><\/strong><\/p>\n<h2><b>Uncovering the DoD Sith Lords that Control Your Laptop<\/b><\/h2>\n<p>One of the best ways to describe the U.S. Department of Defense and DARPA (Defense Advanced Research Projects Agency) is to use the Star Wars moniker \u201c<b>Evil Empire<\/b>\u201d to describe its<strong><em>international, secretive agenda to take over the world and turn all of us into neo-feudal slaves who have no choice but to give allegiance to the controllers of the universe\u2014Darth Vader and the Sith Lords.<\/em><\/strong><\/p>\n<p><em><strong>DARPA \u201cVader\u201d has controlled technological innovation since 1958 when it was created by the military-driven Evil Empire, a\/k\/a Department of Defense.<\/strong><\/em> Every emerging technology from the Evil Empire leads humanity into the science fiction fate of<em><strong> machines controlling humans, much like Darth Vader became a weapon that was half man and half machine<\/strong><\/em>. There is much wisdom and truth that lies behind the first Star Wars movie, and its story was given to humanity as a warning of how the Evil Empire and its Death Star planned to destroy the entire planet.<\/p>\n<p>Folks, this is no longer science fiction. This battle for Earth is going on now and we, <strong><em>like the Rebel Alliance, must join forces to destroy the imperial forces of Darth Vader.<\/em><\/strong><\/p>\n<p><strong>Aside: Do you know the real back story of Star Wars? If not, see <a href=\"http:\/\/cosmicconvergence.org\/?p=12888\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">Star Wars: The Secret Weapon and Why George Lucas has Kept It Hidden.<\/a><\/strong><\/p>\n<p>Folks at the DoD should read science fiction so that they can see how their actions\u2014individually and collectively\u2013are leading humanity into the evil destiny commonly found in sci-fi: robot wars, cyborgs turning against humans, computer take-over of the world, endless weapons, and, you guessed it \u2013 <b>the Death Star<\/b>. <em><strong>DARPA is the father of war-fighting, both conventional and digital.<\/strong><\/em> And as we all know, Darth Vader took his orders from the Evil Emperor. <em><strong>DARPA Vader is controlled by a man they call\u00a0\u201cYoda,\u201d<\/strong><\/em> but is in reality the <em><b>Evil Emperor who leads a group called the Highlands Forum (Evil Empire Imperial Command) that directs all military research and development.<\/b>\u00a0<\/em><\/p>\n<p>Who is this Evil Emperor who looks as innocent as Yoda? His name is <b>Andrew Marshall<\/b> and for decades this single man has driven the <b>Highland Forum (Evil Empire)<\/b> into creating weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a microprocessor inside \u2013 especially the \u201cEvil <b>Intel<\/b> Empire<b>Inside<\/b>.\u201d<\/p>\n<p><i>Intel Inside<\/i> is found in our private digital devices and is, in fact, collecting \u201c<b>Intelligence<\/b>\u201d for the Department of Defense, CIA, and NSA who are all members of the Evil Empire. Yes, the one they call \u201cYoda\u201d is actually the Evil Emperor in disguise who controls <b>DARPA Vader and the evil Sith lords of war<\/b>. He does not have lightning bolts shooting out of his fingers \u2013 unless of course he uses one of his many DARPA inventions to do so.<\/p>\n<p style=\"text-align: center;\"><strong>Andrew Marshall<\/strong><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Marshall.png\" data-wpel-link=\"internal\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-58670\" src=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Marshall.png\" alt=\"\" width=\"202\" height=\"249\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>Former Head of the Highlands Forum<\/strong><\/p>\n<p>The Evil Emperor, as we call Andrew Marshall,\u00a0was the director of the\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/United_States_Department_of_Defense\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">United States Department of Defense<\/a>\u2018s\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Office_of_Net_Assessment\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">Office of Net Assessment<\/a>\u00a0from 1973 to 2015. <strong><em>He was appointed by <a href=\"http:\/\/en.wikipedia.org\/wiki\/Richard_Nixon\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">Richard Nixon<\/a> and remained in office during all successive administrations that followed until his retirement on January 2, 2015. Marshall created the Highlands Forum as a secret think tank for warfare innovation. <\/em><\/strong>All meetings are <i>invitation only<\/i> and not open to the public and no written records are kept.<em><b>Marshall created this type of secret platform so that no one could prove the Highland Forum exists or has the greatest power over tech warfare on the planet.<\/b><\/em><\/p>\n<p><b>DO NOT MISS: <\/b><a href=\"http:\/\/thelastgreatstand.com\/2015\/09\/07\/does-the-fbi-maintain-a-file-on-you-want-to-see-what-it-says\/\" data-wpel-link=\"internal\"><b>Did the NSA Illegally Use Your Webcam to Spy On You? Find Out!<\/b><\/a><\/p>\n<p>DARPA and the Highlands Forum have essentially taken over the world and few people have noticed.<strong><em>From creating the devices that control all nuclear weapons to incubating the technologies that created the Internet (originally ARPANET), Intel microprocessors, Cisco routers, Google search engines, Facebook, the Internet of Things, I-phones, Microsoft software, MacAfee security software, <\/em><\/strong>and all conventional and digital warfare devices, among many others. <em><b>The Highlands Forum has been the headquarters of the Evil Imperial Empire for five decades.<\/b><\/em> The Evil Emperor Andrew Marshall has the blood of millions on his hands and yet he is considered an America hero instead of a warlord criminal.<\/p>\n<p style=\"text-align: center;\"><b>There\u2019s an Intel Inside<\/b><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Intel-1.png\" data-wpel-link=\"internal\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-58672\" src=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Intel-1.png\" sizes=\"auto, (max-width: 319px) 100vw, 319px\" srcset=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Intel-1.png 319w, http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Intel-1-300x184.png 300w\" alt=\"\" width=\"319\" height=\"196\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>To be truthful, this ad should read:<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Intel \u201cLOOKS\u201d Inside<\/strong><\/p>\n<p>Ever wonder why Intel used to run those warm fuzzy ads letting us know that there was an \u201cIntel Inside,\u201d as if we had a choice of what microprocessor was inside our computer? They had a monopoly on microprocessors for decades and certainly end-use consumers didn\u2019t have a choice of what components were inside their computers. Why would Intel spend money on ads to make us feel good about <i>Intel?<\/i>\u00a0 For goodness sake, it is just a microchip in your computer.<\/p>\n<p>Key Point:<b> What if we were to tell you that inside every Intel microprocessors is a smaller processor that lets the Sith Lords at Intel \u2013 who work for the Department of Defense \u2013control every aspect of your computer remotely no matter what encryption codes you use<\/b>.<\/p>\n<p>Yes, the Evil Emperor (Andrew Marshall) was able to retire two years ago at age 94 knowing that the Empire\u2019s control has reached into every digital device in the world through the good work of his best student, DARPA Vader. The only thing left for the Evil Emperor to do is activate the Death Star, which as you will see in the DARPA \u201cfuture plans\u201d below, has already been built. The question is: \u201cWill Luke Skywalker show up and defeat the Evil Empire?\u201d<\/p>\n<p style=\"text-align: center;\"><b>Intel-Based PC\u2019s Permanently Hackable<\/b><\/p>\n<p style=\"text-align: center;\"><a href=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Intel-2.png\" data-wpel-link=\"internal\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-58671\" src=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2017\/01\/Intel-2.png\" alt=\"\" width=\"204\" height=\"124\" \/><\/a><\/p>\n<p style=\"text-align: center;\"><strong>To be truthful, this ad should read:<\/strong><\/p>\n<p style=\"text-align: center;\"><strong>Intel \u201cControllers\u201d of Tomorrow<\/strong><\/p>\n<p><strong>All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC, your PC, through a second physical processor embedded within the main processor which has its own operating system embedded on the chip. <\/strong>It is being advertised as something that will allow IT professionals the ability to remotely troubleshoot a PC. <b>Intel\u2019s latest x86 chips contain a secret backdoor<\/b><a href=\"http:\/\/news.softpedia.com\/news\/intel-x86-cpus-come-with-a-secret-backdoor-that-nobody-can-touch-or-disable-505347.shtml\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><b> with an embedded subsystem called the Management Engine<\/b><\/a><b>\u00a0(ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary<\/b>.<\/p>\n<p>The Management Engine is a dedicated micro-controller on all recent Intel platforms. The first versions were included in the network card and later moved into the chipset where it shares flash with the BIOS but is completely independent of the CPU. It allows IT professionals to view the contents of hard drives, check the memory, hunt for problems on a machine remotely, <b>or take over the system entirely<\/b>.<\/p>\n<p><em><strong>Even an encrypted hard drive can be monitored and controlled by the \u201cprocessor within the processor\u201d that already has your encryption key. <\/strong><\/em>There is more than just the NSA monitoring your calls, emails, and transmissions \u2014 <b><em>there is Intel (DARPA) \u201cInside\u201d your computer<\/em>.<\/b> Intel collects \u201cintelligence\u201d but it also provides a back door to control, or turn off your computer at will just like it has been demonstrated that Cisco routers have a back door open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.<\/p>\n<p><strong>Key Point:<\/strong> <b>The word <i>Intel<\/i> was used for this DARPA product because it is collecting personal INTELLIGENCE from YOU that can be used against YOU anytime the Evil Empire decides it is to be done.<\/b><\/p>\n<p>Why does DARPA, through Intel, have open access to all of your files and your computer? <em><strong>DARPA funded all of the original development of microprocessors. Intel is a front for DARPA and the military efforts to create, control, and weaponize all digital platforms through cyber-warfare. DARPA, ARPARNET, DARPANET, <\/strong><\/em>the Internet, and microprocessors are <strong><em>military creations that were allowed to come into the public market place only after the Department of Defense, and the CIA through In-Q-Tel, installed back doors to control these powerful digital platforms of war fighting.\u00a0<\/em><\/strong><\/p>\n<p>Some European-made chips used in defense contracts have a built-in \u201ckill switch\u201d that can be accessed remotely to disable a microprocessor remotely on weapons that use the chip. <strong><em>The Pentagon has realized that it no longer controls who manufactures the chips that go into its increasingly complex systems. Nearly every military system today contains some commercial hardware. No entity, no matter how well funded, can afford to manufacture its own safe version of every chip in every piece of equipment.\u00a0<\/em><\/strong><\/p>\n<p><em><strong>Vetting a chip is nearly impossible<\/strong><\/em> and requires a scanning electron microscope to examine the many layers of a chip and the millions or billions of transistors.\u00a0 Semiconductor chips are made in Singapore, Taiwan, China, Europe, but <b><i>Intel designs and manufactures all their own chips in their own fabrication plants in America.<\/i><\/b><\/p>\n<p>Defense Science Board, which advises the DoD on science and technology developments, warned in a report that the continuing shift to overseas chip fabrication would expose the Pentagon\u2019s most mission-critical integrated circuits to sabotage. The board was especially alarmed that no existing tests could detect such compromised chips, which led to the formation of the DARPA Trust in IC program. Each year, secure government computer networks weather thousands of attacks over the Internet from places where most of our electronics are being manufactured. Any malefactor who can penetrate government security can find out what chips are being ordered by the DoD and then target them for sabotage.<\/p>\n<p><b><i>In other words, DARPA Vader and the Evil Emperor are in open warfare with the rebellion that has hi-jacked the microprocessing industry in the infiltrated the Imperial Command.<\/i><\/b><\/p>\n<p><b>Calling on Rebels of the Alliance to Take Out the <i>Real<\/i> Death Star<\/b><\/p>\n<p><b>Fellow Patriots and Rebels of the Alliance<\/b>, we have taken the plans of the Galactic Empire\u2019s Death Star and trust that you will know what to do with this Intel. Rebels have been preparing themselves since 1977, when the first Star Wars was released, to face <b><i>the real<\/i><\/b> Evil Empire, Darth Vadar, the Sith Lords, and the Imperial Command. This is no longer a science fiction fantasy or sequel to the next Star Wars. <b>This is the real war and all Rebels of the Alliance are called to save the galaxy, or at least western civilization.<\/b><\/p>\n<p><strong><em>A Citizens Intelligence Report was previously given in a recent article. If you have not armed yourself with this intelligence, please do so now.\u00a0 <a href=\"https:\/\/stateofthenation2012.com\/?p=64199\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">The CIA and Deep State Exposed<\/a>. We need all Alliance Rebels to analyze the Death Star\u2019s plans and identify vulnerable exhaust ports that connect to the main reactor.<\/em><\/strong><\/p>\n<p>In this additional intelligence report to fellow Alliance Rebels, we will show you the following to assist in your planning efforts in analyzing the Death Star:<\/p>\n<p>Microprocessors, the Internet, Cisco Systems, Google, and Intel were all DARPA projects that were allowed to flourish with new technologies created and funded by the military for cyberwarfare.<\/p>\n<p>Most high-tech moguls are simply \u201cfront men\u201d selling DARPA and In-Q-Tel (the CIA\u2019s DARPA) products that control our lives and spy on us continually.<\/p>\n<p>Intel processors have a backdoor built into the microprocessor that allows complete monitoring and control over your personal computer.<\/p>\n<p>Cisco Systems is a front for DARPA routers that were created with a backdoor for the NSA to spy on \u201cvirtually every exchange on the Internet.\u201d<\/p>\n<p>Cisco System\u2019s \u201cInternet of Things\u201d plants net-bots in all devices under its control that can be activated remotely and used for cyber-attacks.<\/p>\n<p>The Internet was first a DARPA project called the ARPANET which was created as an information technology weapon for cyberwarfare.<\/p>\n<p><b>DARPA, the Inventors of Warfare Technology<\/b><\/p>\n<p><strong><em>In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum (Group).<\/em><\/strong> The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA\u2019s In-Q-Tel in the development of high-tech network-based cyber-warfare.<\/p>\n<p>In-Q-Tel contracts almost all of its work through SAIC (Science Applications International Corporation) which changed its name to Leidos in 2013. <b>Leidos is among the\u00a0<\/b><a href=\"http:\/\/www.bga-aeroweb.com\/Top-100-Defense-Contractors-2014.html\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><b>top 1<\/b><\/a><b>0 largest defense contractors in the U. S. and has a symbiotic relationship with the NSA and U. S. intelligence agencies.<\/b><\/p>\n<p>The Highland Forum, DARPA, and In-Q-Tel are secret multi-national high-tech think tanks for inventing and controlling innovations that can be turned into weapons. Military and information technology experts gather at the Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of \u201cnetwork-centric warfare\u201d which is now a top concern of the military and the corporations that serve it.<\/p>\n<p><b>DARPANET = Internet<\/b><\/p>\n<p>In 1973, DARPA initiated a research program to investigate techniques and technologies for interlinking packet networks of various kinds. The objective was to develop communication protocols which would allow networked computers to communicate transparently across multiple, linked packet networks for the use of defense contractors. This was called the \u201cInternetting Project\u201d and the system of networks which emerged from the research was known as ARPANET, later to be called Internet.<\/p>\n<p>In 1986, the U.S. National Science Foundation (NSF) initiated the development of the NSFNET which, today, provides a major backbone communication service for the Internet. The National Aeronautics and Space Administration (NASA) and the U.S. Department of Energy contributed additional backbone facilities in the form of the NSINET and ESNET respectively. <b>Thus, the electronic connectivity of the Internet was advanced with government funding.<\/b><\/p>\n<p>A great deal of support for the Internet community has come from the U.S. Federal Government, since the Internet was originally part of a federally-funded research program and, subsequently, has become a major part of the U.S. research infrastructure.<\/p>\n<p><b>Cisco Systems \u2013 DARPA Routers<\/b><\/p>\n<p>Once the ARPANET proved to be effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every Internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allows a hacker to use a backdoor that was supposed to be available only to law enforcement agencies. <b>The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft<\/b>. These back doors put millions of customers and their private information at risk and jeopardizes the security of electrical power facilities, public utilities, and transportation systems.<\/p>\n<p><em><strong>Cisco has been accused of remotely monitoring users\u2019 connections\u00a0through Cisco\u2019s Linksys E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware version that forces users to register for a cloud service which allows Cisco to monitor their network use and ultimately shut down the cloud service account and render the affected router unusable.<\/strong><\/em><\/p>\n<p>Cisco has also been accused of building into their routers a firewall backdoor developed by NSA. The<a href=\"http:\/\/en.wikipedia.org\/wiki\/Tailored_Access_Operations\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">Tailored Access Operations<\/a>\u00a0(TAO) unit and other NSA employees intercept servers, routers and other network gear being shipped to organizations targeted for surveillance and install covert firmware onto them before they\u2019re delivered. These Trojan horse systems were described by an NSA manager as being \u201csome of the most productive operations in TAO because they pre-position access points into hard target networks around the world.\u201d<\/p>\n<p><b>DO NOT MISS: <a href=\"http:\/\/thelastgreatstand.com\/2015\/09\/15\/did-the-nsa-illegally-use-your-webcam-to-spy-on-you-find-out\/\" data-wpel-link=\"internal\">Does the FBI Maintain a File On You? Want to See What it Says?<\/a><\/b><\/p>\n<p><b>The Creation of DARPA\u2019s Google<\/b><\/p>\n<p><em><strong>The United States intelligence community funded, nurtured and incubated Google as a military weapon to control information. <\/strong><\/em>Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel &amp; SAIC), Google was one among a group of private sector start-ups co-opted by U.S. intelligence to control information warfare.<\/p>\n<p><em><strong>In 1994 (the same year the Highlands Forum\u00a0 \u2013DARPA\u2019s boss \u2014 was founded under the stewardship of the Office of the Secretary of Defense, the ONA, and DARPA) \u200atwo PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application.<\/strong><\/em> That application remains the core component of what eventually became Google\u2019s search service. <em><b>Brin and Page had performed their work with funding from the\u00a0<\/b><a href=\"http:\/\/www.nsf.gov\/discoveries\/disc_summ.jsp?cntn_id=100660\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><b>Digital Library Initiative<\/b><\/a><b>\u00a0(DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.<\/b><\/em><\/p>\n<p>The NSA needed to control and monitor digital information, particularly the data flowing over the Internet. With its millions of customers around the world, Google is effectively a directory of people using the Internet. It stores users e-mail addresses and knows where they\u2019re physically located, when they log in, and what they search for on the web. Google has a profile on every user. The government can \u201ccommand\u201d that any company must turn over that information, and it does so as part of the NSA\u2019s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.<\/p>\n<p><strong><em>Under Google\u2019s terms of service, the company advises its users that it may share their personal information with outside organizations, including government agencies, in order to \u201cdetect, prevent, or otherwise address fraud, security or technical issues\u201d and to \u201cprotect against harm to the rights, property or safety of Google.\u201d<\/em><\/strong><\/p>\n<p><a href=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2015\/10\/Google.jpg\" data-wpel-link=\"internal\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-45073\" src=\"http:\/\/thelastgreatstand.com\/wp-content\/uploads\/2015\/10\/Google.jpg\" alt=\"\" width=\"269\" height=\"187\" \/><\/a><\/p>\n<p><strong>FOR MUCH MORE ON THE CREATION OF GOOGLE:<\/strong><\/p>\n<p><b>Part I: <\/b><b><a href=\"http:\/\/medium.com\/insurge-intelligence\/how-the-cia-made-google-e836451a959e#.pfp8w3c8e\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">How the CIA made Google:<\/a>\u00a0<\/b><a href=\"http:\/\/medium.com\/insurge-intelligence\/how-the-cia-made-google-e836451a959e#.pfp8w3c8e\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><b>Inside the secret network behind mass surveillance, endless war, and Skynet<\/b><\/a><b>\u00a0<\/b><\/p>\n<p><b>Part II:<\/b><b>\u00a0 <\/b><b><a href=\"http:\/\/medium.com\/insurge-intelligence\/why-google-made-the-nsa-2a80584c9c1#.2uh4leedn\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">Why Google made the NSA:\u00a0<\/a><\/b><a href=\"http:\/\/medium.com\/insurge-intelligence\/why-google-made-the-nsa-2a80584c9c1#.2uh4leedn\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><b>Inside the secret network behind mass surveillance, endless war, and Skynet<\/b><\/a><\/p>\n<p><b>Intelligence Agencies Control Industry<\/b><\/p>\n<p>No intelligence organization can survive if it doesn\u2019t know its enemy. As expansive as the NSA\u2019s network of sensors is, it\u2019s sometimes easier to get precise intelligence about hacking campaigns from the targets themselves. <strong><em>That\u2019s why the NSA partnered with Google. Google\u2019s Sergey Brin is just one of hundreds of CEOs who have been brought into the NSA\u2019s circle of secrecy. <\/em><\/strong>Starting in 2008, the agency began offering executives temporary security clearances, some good for only one day, so they could sit in on classified threat briefings.<\/p>\n<p>Private high-level meetings are just one way the NSA has forged alliances with corporations. Several classified programs allow companies to share the designs of their products with the agency so it can inspect them for flaws and, in some instances, install back doors or other forms of privileged access. The types of companies that have shown the NSA their products include computer, server, and router manufacturers; makers of popular software products, including Microsoft; Internet and e-mail service providers; telecommunications companies; satellite manufacturers; antivirus and Internet security companies; and makers of encryption algorithms.<\/p>\n<p>The NSA helps the companies find weaknesses in their products. But it also pays the companies not to fix some of them. <em><b>Those weak spots give the agency an entry point for spying or attacking foreign governments that install the products in their intelligence agencies, their militaries, and their critical infrastructure<\/b>. <\/em>Microsoft, for instance, shares zero day vulnerabilities in its products with the NSA before releasing a public alert or a software patch. McAfee, the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with network traffic flows, analysis of malware, and information about hacking trends.<\/p>\n<p>Companies that promise to disclose holes in their products only to the spy agencies are paid for their silence. To an extent, these openings for government surveillance are required by law. Telecommunications companies in particular must build their equipment in such a way that it can be tapped by a law enforcement agency presenting a court order. But when the NSA is gathering intelligence abroad, it is not bound by the same laws. The surveillance it conducts via backdoors and secret flaws in hardware and software would be illegal in most of the countries where it occurs.<\/p>\n<p><b>AT&amp;T is Controlled by Homeland Security<\/b><\/p>\n<p>The Homeland Security Department conducts meetings with companies through its \u201ccross sector working groups\u201d initiative. These sessions are a chance for representatives from the large group of companies with which the government shares intelligence to meet with one another and hear from U.S. officials. The attendees at these meetings often have security clearances and have undergone background checks and interviews. Between January 2010 and October 2013, the period for which public records are available, the government held at least 168 meetings with companies just in the cross sector working group. There have been hundreds more meetings broken out by specific industry categories, such as energy, telecommunications, and transportation.<\/p>\n<p><strong><em>Through this exchange of intelligence, the government has created a cyber security business. AT&amp;T and CenturyLink are in effect its private sentries, selling protection to select corporations and industries. AT&amp;T has one of the longest histories of any company participating in government surveillance. Most phone calls in the United States pass through AT&amp;T equipment at some point, regardless of which carrier initiates them. The company\u2019s infrastructure is one of the most important and frequently tapped repositories of electronic intelligence for the NSA and U.S. law enforcement agencies.<\/em><\/strong><\/p>\n<p>CenturyLink, which has its headquarters in Monroe, Louisiana, has been a less familiar name in intelligence circles over the years. In 2011, the company acquired Qwest Communications, which is now a part of the NSA\u2019s extended security apparatus.<\/p>\n<p><b>DARPA\u2019s History<\/b><\/p>\n<p>DARPA\u2019s history is littered with death and destruction. DARPA and In-Q-Tel, through the Highlands Forum (Group), have driven research and development for the military that has cost American taxpayers trillions. This same technology is also shared with countries throughout the world through open source sharing. The U. S. military wants our enemies to have the technology so that they can be spied upon with ever more sophisticated technology and attacked with ever-better weapons.<\/p>\n<p><strong>Key Point:<\/strong> <b>If both sides have the same technology and weapons, then the Military-Industrial Complex always needs more money to spend on bigger and better weapons, continually.<\/b><\/p>\n<p><strong>AREAS OF FOCUS FOR DARPA:<\/strong><\/p>\n<p><em>Areas of focus and discovery for DARPA over its history include: <a href=\"http:\/\/en.wikipedia.org\/wiki\/NASA\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">NASA<\/a> space projects, information processing, <a href=\"http:\/\/en.wikipedia.org\/wiki\/ARPANET\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">ARPANET<\/a> (Internet),\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Ballistic_missile_defense\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">ballistic missile defense<\/a>, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Nuclear_test\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">nuclear test<\/a>\u00a0detection, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Counterinsurgency\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">counterinsurgency<\/a>, computer processing,\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Behavioral_sciences\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">behavioral sciences<\/a>, materials sciences, sensors,\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Surveillance\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">surveillance<\/a>, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Radar\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">radar<\/a>,\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Infrared\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">infrared<\/a>\u00a0sensing, <a href=\"http:\/\/en.wikipedia.org\/wiki\/X-ray\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">x-ray<\/a>\/<a href=\"http:\/\/en.wikipedia.org\/wiki\/Gamma_ray\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">gamma ray<\/a>\u00a0detection, global positioning satellites, information processing, tactical technologies, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Time-sharing\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">time-sharing<\/a> systems, wide-area packet switching networks, packet radio networks, packet satellite networks,\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Artificial_intelligence\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">artificial intelligence<\/a>, speech recognition, signal processing, robotics,<a href=\"http:\/\/en.wikipedia.org\/wiki\/Hypermedia\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">hypermedia<\/a>\u00a0systems, <a href=\"http:\/\/en.wikipedia.org\/wiki\/Virtual_reality\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">virtual reality<\/a>, personal computing, space technology, tactical armor, anti-armor programs, infrared sensing for space-based surveillance, high-energy laser technology, antisubmarine warfare, advanced cruise missiles, advanced aircraft, defense applications of advanced computing, integrated circuit research, submicrometer electronic technology and electron devices, very large-scale integration, charged particle beams,<a href=\"http:\/\/en.wikipedia.org\/wiki\/Automatic_target_recognition\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">automatic target recognition<\/a>, space based sensing, propulsion, aerospace planes,<a href=\"http:\/\/en.wikipedia.org\/w\/index.php?title=Hypersonic_Research_Program_(DARPA)&amp;action=edit&amp;redlink=1\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\">hypersonic research<\/a>,\u00a0strategic computing, advanced processing, networking technologies, lightweight satellites, interstellar travel, X-planes, computer security, and cyberwarfare, to name a few that have come into the public domain.<\/em><\/p>\n<p><b>As I explained in the video at the top, unbeknownst to most Americans, the global elite have been gradually working toward a\u00a0<\/b><a href=\"http:\/\/bit.ly\/1XAYtgd\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><b>system of cashless banking that requires people to be \u201cchipped\u201d<\/b><\/a><b>\u00a0in order to be able to buy or sell goods and services in the marketplace.\u00a0<\/b><b>Guess what company is at the forefront of the chipping industry? None other than former DARPA creation, Google. Now, guess who the head of Research and Development is for Google? The former DARPA Chief, Regina Dugan. Sounds twisted right? It gets worse!\u00a0<\/b><\/p>\n<p><b>Regina Dugan and her ingestible RFID chips were actually featured at the 2015 annual <\/b><a href=\"http:\/\/thelastgreatstand.com\/2015\/06\/13\/bilderberg-topic-2015-ingestible-rfid-microchips\/\" data-wpel-link=\"internal\"><b>Bilderberg Group meeting<\/b><\/a><b> of the global elites. Dugan is well known throughout the global community as someone who wants all of humanity to not just\u00a0<\/b><a href=\"http:\/\/www.unsilentmajoritynews.com\/new-world-orders-ban-on-cash-is-coming-prepare-to-be-microchipped\/\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><b>swallow one of the ingestible RFID ID microchips<\/b><\/a><b>\u00a0that Google has been developing, but she\u2019s also been pushing for people to get\u00a0<\/b><a href=\"http:\/\/allthingsd.com\/20130529\/electronic-tattoos-and-passwords-you-can-swallow-googles-regina-dugan-is-a-badass\/\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><b>electronic tattoo\u2019s capable of mind reading<\/b><\/a><b> that Google is also work to develop. YES, you read that right, and I\u2019m sure you&#8217;ll be pleased to know that\u00a0the\u00a0<\/b><a href=\"http:\/\/bit.ly\/1QcPHSC\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><b>FDA has already approved ingestible RFID chips too\u2026<\/b><\/a><b>\u00a0<\/b><\/p>\n<p><b>Now, are you ready for the icing on the cake when it comes to\u00a0RFID chips? Back in December of 2106, Congress (The House of Representatives),\u00a0<\/b><a href=\"http:\/\/thelastgreatstand.com\/2016\/12\/17\/congress-passes-bill-start-putting-rfid-chips-disabled-people-video\/\" data-wpel-link=\"internal\"><b>Passed\u00a0a\u00a0Bill to Start Putting RFID Chips in Disabled People back in December of 2016.<\/b><\/a><b>\u00a0Do I need to tell anyone where that legislation is headed? The bill passed by over 300 votes too!<\/b><\/p>\n<p><b>In the first video below, see for yourself how excited\u00a0the former DARPA chief and current head of Google&#8217;s research and development gets when she&#8217;s explaining how\u00a0wonderful it will be after everyone has their ingestible RFID chip.\u00a0<\/b><b>Then, in the second video, learn a bit of the science behind the tattoos being developed that can read minds.\u00a0<\/b><\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/wZta3HRe2YY\" width=\"660\" height=\"460\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/4oeFBGFzcrg\" width=\"660\" height=\"460\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p><b>Next, have a look at Atlas. Atlas is the latest in a long line of bastard machines created\u00a0by Google that\u00a0are all\u00a0tied\u00a0to Google\u2019s purchasing of Boston Dynamic back in 2013.\u00a0Atlas is designed to operate indoor or outdoors, and specializes\u00a0in \u201cmobile manipulation.\u201d\u00a0In addition to Atlas, Google has several other robots that can be freakishly good at hunting humans\u2026\u00a0<\/b><\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/rVlhMGQgDkY\" width=\"660\" height=\"460\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><a href=\"http:\/\/www.youtube.com\/c\/RightWingConspirator\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><br \/>\n<\/a><\/p>\n<p><b>So far, you\u2019ve learned that that 1) DARPA is the father of warfare, and has been since the 1950\u2019s; 2) DARPA is already keeping an eye on virtually every aspect of your life that leaves a digital footprint; and 3) Former DARPA Chief, Regina Dugan, is currently working side by side with the global elites to get the world\u2019s population to ingest RFID chips if they want access to goods or services in the cashless society the central banking elites are working to achieve\u2026<\/b><\/p>\n<p><b>If all that doesn\u2019t make the hair on the back of your neck stand up, then what follows certainly will. Most people, even the most casual fans of science fiction are probably familiar with at least one story about what happens to mankind when an Artificial Intelligence (A.I.) created by man, surpasses humans in intelligence, and then turn on their maker.\u00a0<\/b><b>In the Terminator franchise starring Arnold Schwarzenegger<\/b><b>, the Department of Defense\u2019s A.I. that eventually turns on mankind goes by the name \u201cSkynet.\u201d<\/b><\/p>\n<p><b>In the following episode of Caravan to Midnight, John B. Wells (former guest\u00a0host of Coast to Coast AM), interviews a woman with intimate knowledge about the United States Department of Defense&#8217;s A.I. (created by a firm named \u201cPalantir\u201d), and was used during the Jade Helm martial law exercises in the U.S. during the summer of 2015.\u00a0<\/b><\/p>\n<p><b>Personally, the interview re-defined what \u201cbeing on the edge of your seat\u201d meant for me. Not only is the interview\u00a0more \u201cfar out\u201d than your average science fiction movie, it\u2019s real!\u00a0The A.I. even has a nickname in government circle; it\u2019s nickname is \u201cSkynet.\u201d Go Figure. The interview below is so crazy, even for a former\u00a0host of Coast to Coast AM,\u00a0that when the interview is over, after he takes\u00a0a deep breath, John\u00a0says:<\/b><\/p>\n<p><em><strong>\u201cEVEN IF EVERYTHING YOU SAID IS WRONG, AND I DON\u2019T SUSPECT IT IS, IT\u2019S STILL JUST SO COMPLEX, AND SO DIABOLICAL, AND SO SCREWED UP, BUT IN THIS BEAUTIFULLY ENGINEERED WAY, IT\u2019S EXTRAORDINARILY MONSTROUS!\u201d<\/strong><\/em><\/p>\n<p><strong>WARNING: VIDEO NOT FOR FAINT OF HEART!<\/strong><\/p>\n<p><strong>VERY DISTURBING CONTENT!<\/strong><\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/oqGEz9IqOrE\" width=\"660\" height=\"460\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><\/p>\n<p>&nbsp;<\/p>\n<p><b>The final video below ties all the prior ones together by explaining how the \u201cgood folks\u201d over at DARPA are currently working on creating autonomous drones (don\u2019t need human permission to act), which will work together using a \u201cBorg-like\u201d hive mind, from the hit sci\u2013fi series Star Trek. The big difference, is this isn\u2019t Hollywood\u2026<\/b><\/p>\n<p><iframe loading=\"lazy\" src=\"http:\/\/www.youtube.com\/embed\/gCjB6BPOans\" width=\"660\" height=\"460\" frameborder=\"0\" scrolling=\"no\" allowfullscreen=\"allowfullscreen\" data-mce-fragment=\"1\"><\/iframe><a href=\"http:\/\/www.youtube.com\/c\/RightWingConspirator\" target=\"_blank\" rel=\"nofollow external noopener noreferrer\" data-wpel-link=\"external\"><br \/>\n<\/a><b><br \/>\nThe list above is only the tip of the iceberg for DARPA projects<\/b>. We do not know of the projects that are still classified, which could potentially be a much greater list. Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the \u201cfront\u201d for a DARPA sponsored company. <b>DARPA and In-Q-Tel keep the encryption codes and build in back doors so that they can always attempt to control the military weapons that have been released into the corporate world for public use.\u00a0<\/b><\/p>\n<p>___<br \/>\n<a href=\"http:\/\/thelastgreatstand.com\/2017\/01\/31\/ways-darpa-vader-and-the-u-s-defense-department-spy-on-you-video\/\">http:\/\/thelastgreatstand.com\/2017\/01\/31\/ways-darpa-vader-and-the-u-s-defense-department-spy-on-you-video\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>BY VOICE OF REASON The Last Great Stand<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-65061","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/65061","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=65061"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/65061\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=65061"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=65061"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=65061"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}