{"id":86703,"date":"2017-10-16T21:09:13","date_gmt":"2017-10-17T01:09:13","guid":{"rendered":"https:\/\/stateofthenation2012.com\/?p=86703"},"modified":"2017-10-16T21:09:13","modified_gmt":"2017-10-17T01:09:13","slug":"lock-down-on-prison-planet-almost-complete","status":"publish","type":"post","link":"https:\/\/stateofthenation2012.com\/?p=86703","title":{"rendered":"LOCK DOWN ON PRISON PLANET ALMOST COMPLETE"},"content":{"rendered":"<p><!--more--><a href=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2017\/10\/face-with-device.jpg\"><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-56135\" src=\"http:\/\/themillenniumreport.com\/wp-content\/uploads\/2017\/10\/face-with-device.jpg\" alt=\"\" width=\"600\" height=\"751\" \/><\/a><\/p>\n<h2><strong>HOW THE US MILITARY CONTROL OF SOCIAL MEDIA HAS ALREADY\u00a0<\/strong><strong>IMPRISONED YOU AND THROWN AWAY THE KEY<\/strong><strong>\u00a0<\/strong><\/h2>\n<p><a href=\"http:\/\/aim4truth.org\/category\/anonymous-patriots\/\" rel=\"category tag\">ANONYMOUS PATRIOTS<br \/>\n<\/a>Aim4Truth.org<\/p>\n<p>Long before we could imagine the evil of the elite pedophile globalists of the world, they had already started locking down planet earth. They knew that humanity\u2019s wakening consciousness would jeopardize their planetary reign so they had to find a way to imprison our minds, direct our thinking, and limit our expanding consciousness.<\/p>\n<p>They did it right under our noses.<\/p>\n<p>They did it with our own hard-earned money.<\/p>\n<p>While we were busy rearing our children and tending our families, they were quietly implementing Alinsky\u2019s rules and Soros\u2019 regimes. They are evil people who prey on our children, profit from our blood, rape our women and countries, and control us with their money illusions. They don\u2019t care about our national borders, cultural uniqueness, spiritual paths, or personal liberty. YOU are THEIRS to be \u201cfarmed\u201d any way that brings them greater wealth, longer life, and wicked pleasures.<\/p>\n<p>You have now awakened and realized that the nightmare was actually on the other side of your dreamy sleep. What do you do? First and foremost is to educate yourself on what has occurred since you stopped paying attention. The\u00a0<a href=\"http:\/\/www.aim4truth.org\/\">American Intelligence Media<\/a>\u00a0has been writing Citizens Intelligence Reports for several years now so that you can become highly informed patriots. Patriots need to know precisely who the enemy is, how they have weaponized the world, and what we can do to throw off our digital shackles.<\/p>\n<p><strong>The global elites know that education is the key to enlightenment.<\/strong>\u00a0For this reason, you will find more and more outlets for self-education becoming censored and shut down by the planetary rulers. They simply can\u2019t have us know what is going on as there are far too many of us and too few of them.<\/p>\n<p>In this Citizens Intelligence Report we want to alert you to the grave dangers of the weaponization of the internet and social media. A new technological revolution is taking place that will affect all of us. They make it sound so cool and fun \u2013 the Internet of Things\u2014but it is nothing more than a self-imposed prison that will eventually control you 24\/7 once you connect into the network.<\/p>\n<p>The more you participate in the automatic information fed directly to your devices that are personalizing your news, entertainment, business, and \u201clife-patterns\u201d, the more you will think you are free and fully informed. Actually, you will become more and more limited by what your pattern-of-life generates as your individualized algorithms. A mechanical virtual world will be created around you that becomes your personalized digital prison that, at first, may seem like digital heaven, but later rear its ugly head of control and enslavement. By then, it will be too late for any of us to break free.<\/p>\n<p>Your new digital prison is being created every time you do an internet search, click a \u2018like\u2019 button on Facebook, type a phrase into your computer, choose something to watch on television, or speak a word into your phone. Every speck of \u201cinformation\u201d that you participate in is used to make your personalized digital life-pattern profile.<\/p>\n<p>Even your bank account and everything you spend is being gathered in an<strong>\u00a0NSA program called Marina<\/strong>\u00a0<a href=\"http:\/\/aim4truth.org\/2017\/10\/16\/lock-down-on-prison-planet-almost-complete\/#_ftnref1\" name=\"_ftn1\">[1]<\/a>\u00a0that knows so much about you that when you get into your car on a day you have a weekly appointment, your phone automatically pings the route and distance to your destination.<\/p>\n<p>Your phone can also activate all your devices that are connected to the Internet of Things. As you approach your house with your phone, your garage door opens automatically as the lights in the house come on and the house alarm is turned off while your coffee maker starts and your TV comes on with your usual show as the heating pad in your easy chair turns on to your favorite setting.<\/p>\n<p>There is no end to the \u201cmachine intelligence\u201d support you can get from mechanically augmented reality. And now Facebook and its fake, phoney, stooge inventor Mark Zuckerberg wants you to put on a 3-D visor and enter a self-created virtual reality world where it feels you are free to do as you please.<\/p>\n<h1>\u00a0HOW DID WE GET INTO DIGITAL PRISON?<\/h1>\n<p>We have created this world by being lazy and not asking the hard questions\u2014who owns and controls this technology, what is the ultimate goal of the Internet of Things, does this technology serve or enslave humanity? Eric Schmidt, the CEO of Alphabet has bragged about this new system that claims it is \u2018ready to go\u2019.<\/p>\n<p>Google, somehow, morphed into a \u201cmother company\u201d that is named\u00a0<strong>Alphabet which owns all 26 subsidiaries of Google<\/strong>, including the only AI on the planet called\u00a0<strong>Google Deep Mind.<\/strong>\u00a0Alphabet seems to have unlimited money and unlimited technology patents that are supported wholesale by Wall Street and the U.S. military-industrial complex.<\/p>\n<p>Essentially, Google has always been owned and operated by the dark side of our military-industrial complex. Like Cisco Systems, Inc. before them, Google (Alphabet) was incubated through the U.S. Defense Advance Research Project Agency (DARPA) and the CIA\u2019s private corporate venture capital company called In-Q-Tel. (Ask yourself how it is that a government entity can hold private companies and enjoy private profits outside of Congressional oversight, but we digress.)<\/p>\n<p>Google, Cisco, Facebook, Twitter, and most other search engines and social networks all run on allegedly \u201copen source\u201d code given out by DARPA\/In-Q-Tel to universities and corporations to develop. Open source means free to the user without the need to pay royalties or fees to the inventor or creator. Basically, whoever is able to take this weaponized open source code (with encryption back door keys already built in) and develop it for the consumer wins the military contracts.<\/p>\n<p>Then Wall Street (Goldman Sachs and JPMorgan Chase usually) sweep in with venture capital, and within a few years values the new tech company in the tens and hundreds of billions. After that, the banks then loan whatever money these companies \u00a0need to buy out all their competition. These newly acquired \u00a0\u201cSilicon Valley corporate stooges\u201d then become even more front-men for even more weaponized military systems. This now includes Facebook, LinkedIn, Instagram, Pinterest, YouTube, Tumblr and Amazon.<\/p>\n<p>Whether you know it or not, what is described above is already happening on a commercial level and soon will escalate to an overt military level while the innocent internet user is lulled into believing that he is simply having fun. Since most American and global businesses have some component on the internet, the militarization of the internet can be as powerful as the threat of global nuclear annihilation. Just imagine if the internet was turned off tomorrow \u2013 permanently, never to return.<\/p>\n<p>Most of what we think of as modern life would end, and many people would never recover. Economies would collapse, wars would rage, and many of us wouldn\u2019t know what to do or what to think. Modern life would collapse because the weapon of the internet already controls modern life. The life of the pygmy in Indonesia would go on uninterrupted, but American life would screech to a halt. We might not be able to \u201creboot\u201d for years. This thought begs the question, \u201cHow did we let this happen?\u201d<\/p>\n<p>\u201cWe\u201d, the users of the Internet and all things digital, were happy to use the new technology without asking basic questions like: Who actually owns the cables the Internet travels through? Can \u201cthey\u201d turn it off? Why was so much power given over to the internet? At this point, is there an alternative or way out of this digital?<\/p>\n<p>The answers to the questions above can be given, and there is a solution to this looming problem. But first we must see the internet and all of its \u201cwonders\u201d for exactly what they are \u2013\u00a0<strong>weapons of mass social manipulation<\/strong>. When we can see the evil plans of those who have advanced this technology without the moral compass necessary to guide such powerful tools, then perhaps we can change these innovations from weapons into the information tools that they were intended to be. Information was supposed to free humanity, not imprison it in a virtual world where education is replaced by nonsensical entertainment, religion is replaced by consumerism, and the real world by virtual reality.<strong>\u00a0<\/strong><\/p>\n<h1>PATENT THEFT AND WEAPONIZATION OF THE INTERNET<\/h1>\n<p>Not counting the social networking technology that was stolen, taxpayers of the United States, through the CIA\u2019s private venture capital company In-Q-tel, largely funded the open source program that became Facebook, Google, Intel, Apple, and Microsoft. These companies have weaponized\u00a0these devices and systems against the citizens of the world.<\/p>\n<blockquote><p>\u2018WE THE PEOPLE\u2019 DEMAND THAT THESE COMPANIES, AND ANY OTHER LIKE THEM THAT HAVE BEEN FINANCIALLY SEEDED AND FUNDED BY U.S. TAXPAYERS, BE GIVEN TO THE PEOPLE AS A PUBLIC UTILITY AND THAT THE FICTITIOUS OWNERS OF THESE COMPANIES BE PROSECUTED FOR PATENT INFRINGEMENT AND\/OR THEFT.<\/p><\/blockquote>\n<p>In numerous articles from\u00a0<em>Americans for Innovation<\/em>, the Anonymous Patriots have found\u00a0unequivocal evidence that IBM\u2019s Eclipse Foundation stole the original ideas and source code for\u00a0Google and Facebook from Columbus, OH innovator Leader Technologies, Inc. through their\u00a0<strong>patent attorney James P. Chandler III. Chandler was mentor of Barack Obama, \u00a0Eric Holder, Robert Mueller, James Comey and John Podesta, to name but a few<\/strong>.<\/p>\n<p><img decoding=\"async\" class=\" size-full wp-image-42717 alignright\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/james-p-chandler.jpg?w=980\" sizes=\"(max-width: 193px) 100vw, 193px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/james-p-chandler.jpg 193w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/james-p-chandler.jpg?w=110 110w\" alt=\"james-p-chandler\" data-attachment-id=\"42717\" data-permalink=\"http:\/\/aim4truth.org\/james-p-chandler\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/james-p-chandler.jpg?w=980\" data-orig-size=\"193,264\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"james-p-chandler\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/james-p-chandler.jpg?w=980?w=193\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/james-p-chandler.jpg?w=980?w=193\" \/>Chandler represented Leader Technologies, Inc. from the moment Leader realized their innovations were patentable in early 2000. But rather than file the patents immediately, Chandler suspiciously advised Leader to \u201creduce to practice\u201d the invention before he would file them.<\/p>\n<p>Hindsight shows that Chandler gave that advice in order to steal the actual source code when it was ready. Chandler bamboozled Leader into taking custody of a copy of the source code in 2002 which he immediately gave to \u00a0the IBM Eclipse Foundation which then disseminated it to Zuckerberg\/Facebook and other companies.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42711 alignleft\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/david_kappos.jpg?w=172&amp;h=172\" sizes=\"auto, (max-width: 172px) 100vw, 172px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/david_kappos.jpg?w=172&amp;h=172 172w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/david_kappos.jpg?w=150&amp;h=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/david_kappos.jpg 200w\" alt=\"David_Kappos\" width=\"172\" height=\"172\" data-attachment-id=\"42711\" data-permalink=\"http:\/\/aim4truth.org\/david_kappos\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/david_kappos.jpg?w=172&amp;h=172\" data-orig-size=\"200,200\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"David_Kappos\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/david_kappos.jpg?w=172&amp;h=172?w=200\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/david_kappos.jpg?w=172&amp;h=172?w=200\" \/><\/p>\n<p><strong>David J. Kappos<\/strong>, IBM\u2019s attorney (who also served later as Obama\u2019s Under Secretary of Commerce for Intellectual Property\u00a0and Director of the\u00a0United States Patent and Trademark Office\u00a0from 2009 to 2013) was also a student of Chandler at the time of the theft. This theft is one of if not the largest theft of intellectual property and trade secrets in history. It was clearly part of the the weaponization of these digital platforms.<\/p>\n<p>For more information, please see our Citizens Intelligence Reports on these subjects:<\/p>\n<h3><a href=\"http:\/\/aim4truth.org\/2017\/03\/29\/weaponization-of-social-media-takeover-of-global-digital-infrastructure\/\"><strong><span class=\"aligncenter\"><span class=\"alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" size-medium wp-image-42721 alignnone aligncenter\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/weaponization-of-social-media.jpg?w=300&amp;h=128\" sizes=\"auto, (max-width: 300px) 100vw, 300px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/weaponization-of-social-media.jpg?w=300&amp;h=128 300w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/weaponization-of-social-media.jpg?w=600&amp;h=256 600w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/weaponization-of-social-media.jpg?w=150&amp;h=64 150w\" alt=\"Weaponization of Social Media\" width=\"300\" height=\"128\" data-attachment-id=\"42721\" data-permalink=\"http:\/\/aim4truth.org\/weaponization-of-social-media\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/weaponization-of-social-media.jpg\" data-orig-size=\"1739,743\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Weaponization of Social Media\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/weaponization-of-social-media.jpg?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/weaponization-of-social-media.jpg?w=980\" \/><\/span><\/span><\/strong><\/a><a href=\"http:\/\/aim4truth.org\/2017\/03\/29\/weaponization-of-social-media-takeover-of-global-digital-infrastructure\/\"><strong>Weaponization of Social Media<\/strong><\/a><\/h3>\n<p>.<\/p>\n<h3><span class=\"alignnone\"><a class=\"img-link\" href=\"http:\/\/aim4truth.org\/2017\/03\/27\/swamp-found\/\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42720 alignnone\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-theft-2.jpg?w=290&amp;h=141\" sizes=\"auto, (max-width: 290px) 100vw, 290px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-theft-2.jpg?w=290&amp;h=141 290w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-theft-2.jpg?w=580&amp;h=282 580w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-theft-2.jpg?w=150&amp;h=73 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-theft-2.jpg?w=300&amp;h=145 300w\" alt=\"Patent theft 2\" width=\"290\" height=\"141\" data-attachment-id=\"42720\" data-permalink=\"http:\/\/aim4truth.org\/patent-theft-2\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-theft-2.jpg\" data-orig-size=\"1920,931\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Patent theft 2\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-theft-2.jpg?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-theft-2.jpg?w=980\" \/><\/a><\/span>.<a href=\"http:\/\/aim4truth.org\/2017\/03\/27\/swamp-found\/\">Patent Theft by IBM<\/a><\/h3>\n<h1>HOW DOES PATENT THEFT WORK?<\/h1>\n<h3><strong>Digital Prison Mechanisms<\/strong><strong>\u00a0<\/strong><\/h3>\n<p>Once the Silicon Valley high-tech \u201cdummy\u201d companies are established by stooges who are pre-selected for their willingness to incorporate military \u201cback doors\u201d into all of their products, the NSA\/CIA\/FBI uses the information gleaned from those companies to surveil every American through every device that broadcasts a signal \u2013 phone, computer, or any device on the Internet of Things. Any intelligence agency can simply type in a query and access the metadata collected from every digital device on the internet or that uses Wi-Fi or cell phone towers.<\/p>\n<p>Among these spying tools is the RIOT (Rapid Information Overlay Technology]) program by Raytheon which leaked to the public on Nov. 16, 2010.[2]<\/p>\n<p>This information is used to target individuals for consumer behaviors as well as DoD intelligence collection. If an internet user is targeted, there are hundreds of ways to \u201cattack\u201d the user and manipulate his\/her buying habits, personal life-pattern choices, and even the way the user thinks.<\/p>\n<blockquote><p>THE OBJECT OF THE INTELLIGENCE IS SIMPLE:\u00a0<strong>CONTROL THE USER<\/strong>. SOCIAL NETWORKS ON THE INTERNET ARE MILITARY EXPERIMENTS IN SOCIAL MANIPULATION. THIS IS WHAT IS CALLED PSYOPS \u2013 OR PSYCHOLOGICAL OPERATIONS.\u00a0<strong>\u00a0<\/strong><\/p><\/blockquote>\n<p>Another program used to gather the Internet metadata is\u00a0<strong>XKeyscore<\/strong>, a secret computer system first used by the NSA\u00a0for searching and analyzing global Internet data, which it collects on a daily basis.\u00a0<strong>It enables almost unlimited\u00a0surveillance\u00a0of anyone anywhere in the world.<\/strong><\/p>\n<p>The NSA\u2019s databank of collected communications allows its analysts to listen to the calls or read the emails of everything that the NSA has stored. It can also access your browsing histories or Google search terms that you\u2019ve entered, and can alert them to any further activity that people connected to that email address or that IP address do in the future. XKeyscore consists of over 700 servers at approximately 150 sites where the NSA collects ALL data, on EVERYBODY, ALL THE TIME.[3]<strong><br \/>\n<\/strong><\/p>\n<p><strong>Another component of NSA data collection is a program called Marina,<\/strong>\u00a0a\u00a0database and analysis tool set for intercepted\u00a0internet\u00a0metadata. The database stores metadata up to a year. The Marina metadata application tracks a user\u2019s browser experience, gathers contact information\/content and develops summaries of the target. It also has the capability to look back on the last 365 days\u2019 worth of metadata seen by\u00a0the collection system,\u00a0whether or not the target was tasked for collection. The stored metadata is mainly used for\u00a0pattern-of-life analysis.<\/p>\n<blockquote>\n<h4>AMERICANS\u00a0ARE NOT EXEMPT BECAUSE METADATA IS NOT CONSIDERED DATA BY U.S. LAW. (SEE SECTION 702 OF THE\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Foreign_Intelligence_Surveillance_Act_of_1978_Amendments_Act_of_2008\">FISA AMENDMENTS ACT<\/a>).<\/h4>\n<\/blockquote>\n<p>Once the data is collected and can be queried and targeted, the data is then stored in an NSA program called\u00a0<strong>Sentient World Simulation (SWS)<\/strong>.\u00a0<strong>This program is developing a parallel to Planet Earth, with billions of individual nodes (prisons) to reflect every man, woman, and child<\/strong>.<\/p>\n<p>SWS will be a synthetic mirror of the real world with automated continuous calibration with respect to current real-world information. It provides an environment for testing psychological operations so that military leaders can develop and test multiple courses of action to anticipate and shape behaviors of adversaries, neutrals, and partners, including U.S. citizens. SWS also mimics financial institutions, utilities, media outlets, and street corner shops. By applying theories of economics and human psychology, its developers can predict how individuals and mobs will respond to various stressors.<\/p>\n<p>These four programs \u2013 XKeyscore, Marina, RIOT, and Sentient World Simulation \u2013 create some of the environments which intend to imprison and control those who willingly enter into the digital virtual reality of the internet. The internet is a WARZONE according to the people who created and weaponized it. Notice that the description of SWS says that even \u201cneutrals\u201d are the target of these systems.<\/p>\n<p><strong>No one is safe from the surveillance, monitoring, targeting, and attacks of Facebook, Twitter, Google and Alphabet.<\/strong>\u00a0Just look how President Donald Trump uses Twitter as a weapon against the corporate media. There is a battle for\u00a0<em>information<\/em>\u00a0and every person is in the middle of the battle whether they like it or not.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42716 alignleft\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/jade-helm-master-the-human-domain.jpg?w=224&amp;h=182\" sizes=\"auto, (max-width: 224px) 100vw, 224px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/jade-helm-master-the-human-domain.jpg?w=224&amp;h=182 224w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/jade-helm-master-the-human-domain.jpg?w=448&amp;h=364 448w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/jade-helm-master-the-human-domain.jpg?w=150&amp;h=122 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/jade-helm-master-the-human-domain.jpg?w=300&amp;h=244 300w\" alt=\"jade-helm-master-the-human-domain\" width=\"224\" height=\"182\" data-attachment-id=\"42716\" data-permalink=\"http:\/\/aim4truth.org\/jade-helm-master-the-human-domain\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/jade-helm-master-the-human-domain.jpg\" data-orig-size=\"799,650\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"jade-helm-master-the-human-domain\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/jade-helm-master-the-human-domain.jpg?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/jade-helm-master-the-human-domain.jpg?w=799\" \/>The largest domestic military exercises in US history happened in 2015. They were entitled: \u201cJade Helm 2015 \u2013 Master the Human Domain.\u201d Just the very name of the exercise should show you where the U.S. military is focusing its time and energy\u2013 on U.S. citizens. It also clearly tells us the intent of the U.S. military is \u2013 to\u00a0<em>Master the Human Domain<\/em>. So much for America freedom and liberty.<\/p>\n<h2><strong>SOME HISTORY ABOUT DARPA\/IN-Q-TEL \u201cFRONT MEN\u201d<\/strong><\/h2>\n<p>The Defense Advanced Research Projects Agency (DARPA) has controlled technological innovation since 1958 when it was created by the military-driven Department of Defense. DARPA is the father of war-fighting, both conventional and digital. DARPA was controlled by a man they called \u201cYoda\u201d, who leads a group called the Highlands Forum that directs all military research and development \u2013 the weaponization of every U.S. patent, over 4,000 of which have been stolen.<strong><em>\u00a0<\/em><\/strong><\/p>\n<p>DARPA\u2019s history is littered with death and destruction. DARPA and In-Q-Tel, through the Highlands Forum, have driven research and development for the military that has cost American taxpayers trillions. This same technology is also shared with countries throughout the world through open source sharing.<\/p>\n<p>The U. S. military wants our enemies to have the technology so that it can spy upon them and keep up with them in weaponry. If both sides have the same technology and weapons, then more money needs to be spent on bigger and better weapons continually and the military industrial complex thrives and gets richer.<\/p>\n<blockquote><p>THEIR BUSINESS PLAN IS SIMPLE: MAKE SURE THE CUSTOMER HAS A NEED FOR MILITARY PRODUCTS AND SERVICES BY SUPPLYING THEIR ENEMIES WITH COMPETING PRODUCTS AND SERVICES, A BUSINESS CYCLE THAT NEVER STOPS AND GUARANTEES THAT THE MILITARY INDUSTRIAL COMPLEX WILL ALWAYS BE SELLING SOMETHING TO SOMEONE.<\/p><\/blockquote>\n<h3><strong>History of In-Q-Tel\u00a0\u2013 a CIA Venture Capital Investment Firm<\/strong><\/h3>\n<p>In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies. The inspiration for In-Q-Tel came earlier, when the Pentagon set up its own private sector outfit. Known as the \u2018Highlands Forum,\u2019 this private network has operated as a bridge between the Pentagon and powerful American elites outside the military since the mid-1990s. Despite changes in civilian administrations, the unregulated and unconstitutional private military-industry network around the Highlands Forum has become increasingly successful in dominating U.S. defense policy.<\/p>\n<p>Basically, the CIA needed to launder all of its stolen gold and set up many companies to wash its illegal money. Why do you think they call the CIA \u2018The Company\u2019?<\/p>\n<p>In-Q-Tel also uses a company called SAIC, the U.S. defense firm Science Applications International Corporation, which changed its name to Leidos in 2013, now operating SAIC as a subsidiary. SAIC\/Leidos is among the top 100 largest defense contractors in the U..S, and works closely with the U.S. intelligence community, especially the NSA. The agency is the company\u2019s largest single customer and SAIC is the NSA\u2019s largest contractor.<\/p>\n<h3><strong>The Highlands Forum (Group)<\/strong><\/h3>\n<p>Since 1973, Andrew Marshall has headed up one of the Pentagon\u2019s most powerful\u00a0<img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42722 alignright\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/andrew-marshall.jpg?w=200&amp;h=221\" sizes=\"auto, (max-width: 200px) 100vw, 200px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/andrew-marshall.jpg?w=200&amp;h=221 200w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/andrew-marshall.jpg?w=400&amp;h=442 400w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/andrew-marshall.jpg?w=136&amp;h=150 136w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/andrew-marshall.jpg?w=272&amp;h=300 272w\" alt=\"Andrew Marshall\" width=\"200\" height=\"221\" data-attachment-id=\"42722\" data-permalink=\"http:\/\/aim4truth.org\/andrew-marshall-2\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/andrew-marshall.jpg\" data-orig-size=\"1554,1714\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Andrew Marshall\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/andrew-marshall.jpg?w=272\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/andrew-marshall.jpg?w=928\" \/>agencies, the Office of Net Assessment (ONA), the U.S. defense secretary\u2019s internal \u2018think tank\u2019 which conducts highly classified research on future planning for defense policy across the U.S. military and intelligence community. Out of Marshall\u2019s work in the ONA came an independent group called the Highlands Forum.<\/p>\n<p>Marshall, now 93 years old, is the DoD\u2019s most elusive but one of its most influential officials. He created the Highlands Forum as a secret think tank for warfare innovation. All meetings are invitation-only, not open to the public, and no written records are kept, except for the snippets that participants reveal in their braggadocio and biographies, which are considerable.<\/p>\n<p>Marshall created this type of secret platform so that no one could prove the Highland Forum exists or that it has the greatest power over high-tech warfare on the planet. Vice President Dick Cheney, Defense Secretary Donald Rumsfeld, and Deputy Secretary Paul Wolfowitz, who are \u200awidely considered the hawks of the neoconservative movement in American politics,\u200awere among Marshall\u2019s star prot\u00e9g\u00e9s.<\/p>\n<p>The Highlands Forum\u2019s influence on US defense policy has operated through three main channels: its sponsorship by the Office of the Secretary of Defense; its direct link to Marshall\u2019s ONA; and its direct link to DARPA\/In-Q-Tel and the Highlands Forum.<\/p>\n<p><span class=\"alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42714 alignnone\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highlands-forum.png?w=505&amp;h=379\" sizes=\"auto, (max-width: 505px) 100vw, 505px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highlands-forum.png?w=505&amp;h=379 505w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highlands-forum.png?w=150&amp;h=113 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highlands-forum.png?w=300&amp;h=225 300w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highlands-forum.png 525w\" alt=\"Highlands Forum\" width=\"505\" height=\"379\" data-attachment-id=\"42714\" data-permalink=\"http:\/\/aim4truth.org\/highlands-forum\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highlands-forum.png?w=505&amp;h=379\" data-orig-size=\"525,394\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Highlands Forum\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highlands-forum.png?w=505&amp;h=379?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highlands-forum.png?w=505&amp;h=379?w=525\" \/><\/span>The Highlands Forum has served as a two-way \u2018influence bridge\u2019: on the one hand, for the shadow network of private contractors to influence the formulation of information operations policy across U.S. military intelligence; and on the other, for the Pentagon to influence what is going on in the private sector.<\/p>\n<p><strong>There is no clearer evidence of this than the instrumental role of the Forum in incubating the idea of mass surveillance as a mechanism to dominate information on a global scale.\u00a0<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42718 alignright\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/oneill.jpg?w=230&amp;h=229\" sizes=\"auto, (max-width: 230px) 100vw, 230px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/oneill.jpg?w=230&amp;h=229 230w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/oneill.jpg?w=150&amp;h=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/oneill.jpg?w=300&amp;h=300 300w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/oneill.jpg 400w\" alt=\"oNeill\" width=\"230\" height=\"229\" data-attachment-id=\"42718\" data-permalink=\"http:\/\/aim4truth.org\/oneill\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/oneill.jpg\" data-orig-size=\"400,398\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"oNeill\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/oneill.jpg?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/oneill.jpg?w=400\" \/>Around 1994, the Highlands Group was chaired by Richard O\u2019Neill as an official Pentagon project at the appointment of Bill Clinton\u2019s then defense secretary William Perry. In O\u2019Neill\u2019s own words, the group would function as the Pentagon\u2019s \u2018ideas lab.\u2019<\/p>\n<p>Total participants in the DoD\u2019s Highlands Forum number over a thousand; although meetings and sessions largely consist of small closed workshop style gatherings of maximum 25\u201330 people, bringing together experts and officials depending on the subject.<\/p>\n<p>The Forum has inside access to the chiefs of the main U.S. surveillance and reconnaissance agencies, as well as the directors and their assistants at DoD research agencies, from DARPA to the ONA, and is deeply plugged into the Pentagon\u2019s policy research task forces.\u00a0<strong>In 2001, under the Total Information Awareness Program, President Bush secretly authorized the NSA\u2019s domestic surveillance of Americans without court-approved warrants.<\/strong><\/p>\n<p>From then on, Highlands Forum partner SAIC played a key role in the NSA roll out from inception. SAIC was then among a consortium receiving a $280 million contract to develop one of the NSA\u2019s secret eavesdropping systems.<\/p>\n<p>This was also the year that the Bush administration drew up its\u00a0<strong>Information Operations Roadmap.<\/strong>\u00a0Describing the internet as a \u201cvulnerable weapons system,\u201d Donald Rumsfeld\u2019s IO roadmap had advocated that Pentagon strategy \u201cshould be based on the premise that the Department of Defense will \u2018fight the net\u2019 as it would an enemy weapons system.\u201d The U.S. should seek \u201cmaximum control\u201d of the \u201cfull spectrum of globally emerging communications systems, sensors, and weapons systems,\u201d advocated the document.<\/p>\n<p>As of 2006, SAIC had been awarded a multi-million dollar NSA contract to develop a big data-mining project called\u00a0<strong>ExecuteLocus<\/strong>, despite the colossal $1 billion failure of its preceding contract, known as\u00a0<strong>Trailblazer<\/strong>. Core components of\u00a0<strong>Total Information Awareness<\/strong>\u00a0were being quietly continued under new code names. The new surveillance program was then fully transitioned from DARPA\u2019s jurisdiction to the NSA.<\/p>\n<p>O\u2019Neill said his job as Forum chairman was to scope case studies from real companies across the private sector, such as eBay and Human Genome Sciences, to figure out the basis of U.S. Information Superiority\u200a\u2014\u200ahow to dominate the information market\u200a\u2014\u200aand leverage this for what the president and the secretary of defense wanted to do with regard to transformation of the Department of Defense.<\/p>\n<p><strong><span class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42713 aligncenter\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highland-group-exposed.jpg?w=439&amp;h=247\" sizes=\"auto, (max-width: 439px) 100vw, 439px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highland-group-exposed.jpg?w=439&amp;h=247 439w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highland-group-exposed.jpg?w=878&amp;h=494 878w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highland-group-exposed.jpg?w=150&amp;h=84 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highland-group-exposed.jpg?w=300&amp;h=169 300w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highland-group-exposed.jpg?w=768&amp;h=432 768w\" alt=\"Highland Group Exposed\" width=\"439\" height=\"247\" data-attachment-id=\"42713\" data-permalink=\"http:\/\/aim4truth.org\/highland-group-exposed\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highland-group-exposed.jpg?w=439&amp;h=247\" data-orig-size=\"1920,1080\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Highland Group Exposed\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highland-group-exposed.jpg?w=439&amp;h=247?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/highland-group-exposed.jpg?w=439&amp;h=247?w=980\" \/><\/span><\/strong><\/p>\n<p><strong>Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the \u201cfront\u201d for a DARPA sponsored company.<\/strong>\u00a0DARPA and In-Q-Tel keep the encryption codes and build in backdoor keys so that they can always control the military weapons that have been released into the corporate world for public use. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers \u2013 the military.<\/p>\n<p>The Highland Forum directed the creation of weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a \u201cbugged\u201d microprocessor inside. Intel microprocessors are found in most of our \u201cprivate\u201d digital devices and are, in fact, collecting \u201cintelligence\u201d for the Department of Defense, CIA, and NSA.<\/p>\n<h4>FOR MORE INFORMATION ON THIS TOPIC, SEE OUR CITIZENS INTELLIGENCE REPORT ENTITLED\u00a0<a href=\"http:\/\/aim4truth.org\/2017\/02\/18\/who-really-owns-the-military-industrial-complex-the-highland-forum-exposed\/\">WHO REALLY OWNS THE MILITARY INDUSTRIAL COMPLEX: THE HIGHLANDS FORUM EXPOSED<\/a>.<\/h4>\n<p>DARPA\/In-Q-Tel and the Highlands Forum drive the process of continuous war from creating the devices that control all nuclear weapons to incubating the technologies that created the Internet, Intel microprocessers, Cisco routers, Google search engines, Facebook social networks, the IBM Internet of Things, cellphones, Microsoft software, MacAfee security software, and all other commercial and military warfare devices using their source code.<\/p>\n<p>The Highlands Forum has been the headquarters of weaponizing military patents, intellectual property and trade secrets for five decades. Andrew Marshall has the blood of millions on his hands, yet he is considered an America hero instead of a warlord criminal.<\/p>\n<h2>INTEL (IN-Q-TEL) INSIDE\u00a0\u00a0<strong><em><br \/>\n<\/em><\/strong><\/h2>\n<p><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42723 alignright\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/intel-1.jpg?w=257&amp;h=153\" sizes=\"auto, (max-width: 257px) 100vw, 257px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/intel-1.jpg?w=257&amp;h=153 257w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/intel-1.jpg?w=150&amp;h=89 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/intel-1.jpg?w=300&amp;h=179 300w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/intel-1.jpg 329w\" alt=\"Intel 1\" width=\"257\" height=\"153\" data-attachment-id=\"42723\" data-permalink=\"http:\/\/aim4truth.org\/intel-1-2\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/intel-1.jpg?w=257&amp;h=153\" data-orig-size=\"329,196\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Intel 1\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/intel-1.jpg?w=257&amp;h=153?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/intel-1.jpg?w=257&amp;h=153?w=329\" \/>Inside every Intel microprocessor is a smaller processor that lets Intel \u2013 who works for the Department of Defense \u2013 control every aspect of your computer remotely\u00a0<strong>no matter what encryption codes or firewalls you use<\/strong>. All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC through a second physical processor embedded within the main processor which has its own operating system embedded on the chip.<\/p>\n<p>It is advertised as something that will allow IT professionals to remotely troubleshoot a PC. According to WikiLeaks, there is even secret diskless memory embedded on each chip that spies can use to store and retrieve data and instructions on each chip that is inaccessible to the user and supposedly only used for internal operations and maintenance. Intel\u2019s latest x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine\u00a0(ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary.<\/p>\n<p>Even an encrypted hard drive can be monitored and controlled by the \u201cprocessor within the processor\u201d that already has your encryption key. There is more than just the NSA monitoring your calls, emails, and transmissions \u2014 there is Intel \u201cInside\u201d your computer. Intel collects \u201cintelligence\u201d but it also provides a \u201cback door\u201d to control, or \u201cturn off\u201d your computer at will just like it has been demonstrated that Cisco routers have a \u201cback door\u201d open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.<\/p>\n<p>Samsung calls the on\/off feature \u201cFake Off\u201d meaning the TV looks like it is off, but is merely pretending to be off.<\/p>\n<blockquote><p><strong>\u201cI DON\u2019T HAVE ANYTHING TO HIDE\u201d<\/strong><\/p><\/blockquote>\n<p>But why shouldn\u2019t DARPA, through Intel, have open access to all your files and your computer? DARPA funded all the original development of microprocessors.\u00a0<strong>Intel is a front for DARPA and the military efforts to create, control, and weaponize all digital platforms through cyber-warfare.<\/strong><\/p>\n<p>Just as the Internet was originally named after its founding group, DARPA, ARPARNET, microprocessors also were military creations that were permitted into the public market place only after the Department of Defense, and the CIA through In-Q-Tel, installed backdoors to control these powerful digital platforms of cyber warfighting.<\/p>\n<p>Most semiconductor chips are made in Singapore, Taiwan, China, or Europe, but Intel designs and manufactures all their own chips in their own fabrication plants in America.<\/p>\n<h3><strong><span class=\"aligncenter\"><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42715 aligncenter\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/internet-warzone.jpg?w=491&amp;h=275\" sizes=\"auto, (max-width: 491px) 100vw, 491px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/internet-warzone.jpg?w=491&amp;h=275 491w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/internet-warzone.jpg?w=982&amp;h=550 982w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/internet-warzone.jpg?w=150&amp;h=84 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/internet-warzone.jpg?w=300&amp;h=168 300w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/internet-warzone.jpg?w=768&amp;h=431 768w\" alt=\"Internet Warzone\" width=\"491\" height=\"275\" data-attachment-id=\"42715\" data-permalink=\"http:\/\/aim4truth.org\/internet-warzone\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/internet-warzone.jpg\" data-orig-size=\"1519,852\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Internet Warzone\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/internet-warzone.jpg?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/internet-warzone.jpg?w=980\" \/><\/span><\/strong><\/h3>\n<h2><strong>IN-Q-TEL IS WARFARE TECHNOLOGY \u2013 W<\/strong><strong>EAPONIZED VENTURE CAPITAL &amp; BANKING<\/strong><\/h2>\n<p>Since Bill Clinton in 1999,<strong>\u00a0<\/strong>In-Q-Tel funds promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum. The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA\u2019s In-Q-Tel in the development of high-tech network-based cyber-warfare.<\/p>\n<p><strong>The Highland Forum, DARPA, and In-Q-Tel are a secret multi-national high-tech think tank for inventing and controlling innovations that can be turned into weapons.<\/strong>\u00a0<strong>In-Q-Tel is a bottomless source of funding for the CIA provided without any Congressional oversight.<\/strong><\/p>\n<p>Military and information technology experts gather at the Highlands Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of \u201cnetwork-centric warfare\u201d which is now a top concern of the military and the corporations that serve it.<\/p>\n<p>Since 1999, there efforts have been supplemented by other quasi-secret organizations including The IBM Eclipse Foundation and the National Infrastructure Advisory Council.<\/p>\n<h4>FOR MORE INFORMATION ON THIS TOPIC, SEE OUR CITIZENS INTELLIGENCE REPORT ENTITLED\u00a0<a href=\"http:\/\/aim4truth.org\/2017\/02\/19\/darpa-vader-and-the-evil-intel-empire-inside-uncovering-the-dod-sith-lords-that-control-your-laptop\/\" rel=\"bookmark\">DARPA VADER AND THE EVIL INTEL EMPIRE INSIDE UNCOVERING THE DOD SITH LORDS THAT CONTROL YOUR LAPTOP<\/a><\/h4>\n<h2>CISCO SYSTEMS MONOPOLY<\/h2>\n<p>Once the ARPANET proved to be effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allowed a hacker to use a backdoor that was supposed to be available only to law enforcement agencies.<\/p>\n<p>The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft. This backdoor put millions of customers and their private information at risk and jeopardized the security of electrical power facilities, public utilities, and transportation systems.<\/p>\n<p><strong>Publicly, Cisco blamed the government for not telling them about this vulnerability, but that was simply the pot calling the kettle black \u2013 the government was blaming itself for the vulnerability, thus manipulating public opinion with a boldfaced deception<\/strong>.<\/p>\n<p>Cisco has been accused of remotely monitoring users\u2019 connections\u00a0through Cisco\u2019s Linksys E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware version that forces users to register for a cloud service which allows Cisco to monitor their network use and ultimately shut down the cloud service account and render the affected router unusable.<\/p>\n<p>Cisco has also been accused of building a firewall backdoor developed by NSA into its routers. The\u00a0<strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Tailored_Access_Operations\">Tailored Access Operations<\/a><\/strong>\u00a0(TAO) unit and other NSA employees intercept servers, routers and other network gear being shipped to organizations targeted for surveillance and install covert firmware onto them before they\u2019re delivered. These Trojan horse systems were described by an NSA manager as being \u201csome of the most productive operations in TAO because they pre-position access points into hard target networks around the world.\u201d<\/p>\n<p>In fact, hiding in plain sight, Cisco registers the Dual_EC_DRBG NSA encryption back door key with NIST (National Institute of Standards and Technology on all products for export.) This key relies on an inbuilt flaw in the encryption standard which only the NSA knows and can\u00a0<em>exploit at will<\/em>\u00a0to break in to any hardware, software or firmware.<\/p>\n<h2>DARPA\u2019S GOOGLE<\/h2>\n<p>The U.S. intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel &amp; SAIC), Google was one among a group of private sector start-ups co-opted by U.S. intelligence to control information warfare.<\/p>\n<p>In 1994 \u200atwo PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application built upon the source code given to them by DARPA\/In-Q-Tel. That application remains the core component of what eventually became Google\u2019s search service. Brin and Page had performed their work with funding from the\u00a0Digital Library Initiative\u00a0(DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.<\/p>\n<p>The NSA wanted to control and monitor digital information, particularly the data flowing over the internet. With its millions of customers around the world, Google is effectively a directory of people using the Internet. It has users\u2019 e-mail addresses and knows where they are physically located, and what they are searching for on the web. Google has a \u201cprofile\u201d on every user.<\/p>\n<p>The government can \u201ccommand\u201d that any company, including Google, to turn over that information, and it does so as part of the NSA\u2019s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.<\/p>\n<p><strong>Under Google\u2019s terms of service, the company advises its users that it may share its \u201cpersonal information\u201d with outside organizations, including government agencies, in order to \u201cdetect, prevent, or otherwise address fraud, security or technical issues\u201d and to \u201cprotect against harm to the rights, property or safety of Google.\u201d<\/strong><\/p>\n<p><strong>Google\u2019s terms of service go further, they actually assume control of all user information with clever sleight of legal hand: \u201c<\/strong>When you upload, submit, store, send or receive content to or through our Services, you give Google (and those we work with) a worldwide license to use, host, store, reproduce, modify, create derivative works (such as those resulting from translations, adaptations or other changes we make so that your content works better with our Services), communicate, publish, publicly perform, publicly display and distribute such content.\u201d<\/p>\n<p>The NSA partnered with Google, just one of hundreds of companies who have been brought into the NSA\u2019s circle of secrecy. Starting in 2008, the agency began offering executives temporary security clearances, some good for only one day, so they could sit in on classified threat briefings. Several classified programs allow companies to share the designs of their products with the agency so it can inspect them for flaws and, in some instances, install backdoors or other forms of privileged access.<\/p>\n<p><strong>The NSA helps the companies find weaknesses in their products.<\/strong>\u00a0<strong>But it also pays the companies not to fix some of them.<\/strong>\u00a0Those weaknesses\u00a0 give the agency an entry point for spying or attacking foreign governments that install the products in their intelligence agencies, their militaries, and their critical infrastructure.<\/p>\n<p>Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information. Seed-funded by the NSA and CIA, Google was merely the first among a plethora of private sector start-ups co-opted by U.S. intelligence to retain \u2018information superiority.\u2019<\/p>\n<p>The origins of this strategy trace back to Bill Clinton and the Highlands Forum which has functioned as a bridge between the U.S. government and elites across the business, industry, finance, corporate, and media sectors.\u00a0<strong>The group has allowed some of the most powerful special interests in corporate America to systematically circumvent democratic accountability and the rule of law to influence government policies, as well as public opinion in the U.S. and around the world.<\/strong>\u00a0The results have been catastrophic: mass surveillance and perception management amidst a permanent state of global war.<\/p>\n<p>The U.S. intelligence community is implicated in nurturing today\u2019s web platforms for the precise purpose of utilizing the technology as a mechanism to fight the global \u2018information war\u2019\u200a- \u200aa war to legitimize the power of the few over the many. In reality, Google is a smokescreen behind which lurks the U.S. military-industrial complex.<\/p>\n<h2>NSA\u2019S MICROSOFT<\/h2>\n<p>Microsoft shares zero day vulnerabilities in its products with the NSA before releasing a public alert or a software patch. McAfee, the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with network traffic flows, analysis of malware, and information about hacking trends.<\/p>\n<p>Companies that promise to disclose holes in their products only to the spy agencies are paid for their silence. To an extent, these openings for government surveillance are required by law. Telecommunications companies in particular must build their equipment in such a way that it can be tapped by a law enforcement agency presenting a court order.<\/p>\n<h1>WHAT WE HAVE LEARNED SO FAR<\/h1>\n<ul>\n<li>Microprocessors, the Internet, Cisco Systems, Google, and Intel were all DARPA\/In-Q-Tel projects that flourished with new technologies created and funded by the military for cyberwarfare.<\/li>\n<li><strong>Most high-tech moguls are simply \u201cfront men\u201d<\/strong>\u00a0selling DARPA and In-Q-Tel (the CIA\u2019s DARPA) products that control our lives and spy on us continually.<\/li>\n<li>Intel processors have a backdoor built into the microprocessor that allows complete monitoring and control over your personal computer.<\/li>\n<li>Cisco Systems is a front for DARPA routers that were created with a backdoor for the NSA to spy on \u201cvirtually every exchange on the Internet.\u201d<\/li>\n<li>IBM hired many of Germany\u2019s mind control scientists from WWII and carried on those experiments through the CIA that formed in 1947; those experiments took on many different names including MKUltra. Those German scientists had used IBM computers during the war to catalogue \u201cundersirables\u201d like Jews, gypsies, homosexuals, Poles and Russians and it organized the trains to the death camps for individuals marked for extermination and hideous experimentation.<\/li>\n<li>IBM\/Cisco System\u2019s \u201cInternet of Things\u201d plants net-bots in all devices under its control that can be activated remotely and used for cyber-attacks.<\/li>\n<li>The internet was first a DARPA project called the ARPANET which was created as an information technology weapon for cyberwarfare.<\/li>\n<li>The U. S. government has helped build, monitor, regulate, and control all physical aspects of Internet transmissions and broadcasts through the U. S. Board of Broadcasting Governors, which is a part of the Department of Defense. Every transmission through the internet or through cellphone towers is completely controlled by the U. S. government.<\/li>\n<li>The U. S. government can \u201cturn off\u201d, filter, manipulate, and control the Internet through the federally controlled transmission cables that span the world. If the U. S. wanted to turn off North Korea\u2019s internet access, it is as simple as a keystroke. Thus, the U. S. government has been boldly lying about the Internet since its inception.<\/li>\n<\/ul>\n<h1>WHAT EVIL IS THE HIGHLANDS FORUM UP TO NOW?<\/h1>\n<p>By 2008, the NSA effectively resurrected the Total Information Awareness project with a focus on Internet data-mining via comprehensive monitoring of e-mails, text messages, and Web browsing. We also now know that the NSA\u2019s XKeyscore \u2018Digital Network Intelligence\u2019 exploitation system was designed to allow analysts to search not just internet databases like emails, online chats and browsing history, but also telephone services, mobile phone audio, financial transactions and global air transport communications\u200a\u2014\u200aessentially the entire global telecommunications grid. Highlands Forum partner SAIC played a key role, among other contractors, in producing and administering the NSA\u2019s XKeyscore.<\/p>\n<h3><strong>Goldman Sachs is CIA<\/strong><\/h3>\n<p>Goldman Sachs (with JPMorgan in tow) is the investment firm responsible for creating the billion dollar fortunes of the tech sensations of the 21st century, from Google to Facebook, is intimately linked to the U.S. military intelligence community.<\/p>\n<p>The convergence of these powerful financial and military interests around the Highlands Forum\u2013through George Lee\u2019s sponsorship of the Forum\u2019s new partner, the MIIS Cybersec initiative\u2013is revealing in itself. MIIS Cybersec\u2019s director, Dr, Itamara Lochard, has long been embedded in Highlands.<\/p>\n<p><span class=\"alignnone\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone wp-image-42724\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/itamara-lochard.jpg?w=378&amp;h=213\" sizes=\"auto, (max-width: 378px) 100vw, 378px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/itamara-lochard.jpg?w=378&amp;h=213 378w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/itamara-lochard.jpg?w=756&amp;h=426 756w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/itamara-lochard.jpg?w=150&amp;h=84 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/itamara-lochard.jpg?w=300&amp;h=169 300w\" alt=\"Itamara-Lochard\" width=\"378\" height=\"213\" data-attachment-id=\"42724\" data-permalink=\"http:\/\/aim4truth.org\/itamara-lochard\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/itamara-lochard.jpg\" data-orig-size=\"2560,1440\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"Itamara-Lochard\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/itamara-lochard.jpg?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/itamara-lochard.jpg?w=980\" \/><\/span><\/p>\n<p>Dr. Itamara Lochard is a senior Highlands Forum member and Pentagon information operations expert. She directs the MIIS CyberSec initiative that now supports the Pentagon Highlands Forum with funding from Goldman Sachs partner George Lee, who led the valuations of Facebook and Google.<\/p>\n<p>Dr. Lochard maintains a comprehensive database of 1,700 non-state groups including insurgents, militias, terrorists, complex criminal organizations, organized gangs, malicious cyber actors and strategic non-violent actors, to analyze their organizational patterns, areas of cooperation, strategies and tactics.<\/p>\n<p>Her views disclose much about what the Highlands Forum has been advocating all these years. In 2004, Lochard was co-author of a study for the U.S. Air Force\u2019s Institute for National Security Studies on US strategy toward \u2018non-state armed groups.\u2019 The study on the one hand argued that non-state armed groups should be urgently recognized as a \u2018tier one security priority,\u2019 and on the other that the proliferation of armed groups provide strategic opportunities that can be exploited to help achieve policy goals.<\/p>\n<p>There have and will be instances where the United States may find collaborating with armed group is in its strategic interests. But sophisticated tools must be developed to differentiate between different groups and understand their dynamics, to determine which groups should be countered, and which could be exploited for US interests.<\/p>\n<p><strong>In 2009, it also emerged from a Google patent application that the company had deliberately been collecting \u2018payload\u2019 data from private wi-fi networks that would enable the identification of \u201cgeolocations.\u201d<\/strong>\u00a0In the same year, Google had signed an agreement with the NSA giving the agency open-ended access to the personal information of its users, and its hardware and software, in the name of cyber security.<\/p>\n<p>It is not just Google that is a key contributor and foundation of the US military-industrial complex. It is the entire Internet, and the wide range of private sector companies\u200a\u2014\u200amany nurtured and funded under the mantle of the U.S. intelligence community (or powerful financiers embedded in that community)\u200a\u2014\u200awhich sustain the internet and the telecoms infrastructure. It is also the myriad of start-ups selling cutting edge technologies to the CIA\u2019s venture firm In-Q-Tel, where they can then be adapted and advanced for applications across the military intelligence community.<\/p>\n<p>Ultimately, the global surveillance apparatus and the classified tools used by agencies like the NSA to administer it, have been almost entirely made by external researchers and private contractors like Google, which operate outside the Pentagon.<\/p>\n<h3><strong>Brainwashing 3.0<\/strong><\/h3>\n<p>In 2011, the Forum hosted two DARPA-funded scientists, Antonio and Hanna Damasio,\u00a0<img decoding=\"async\" class=\" size-full wp-image-42725 alignright\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/damasio.jpg?w=980\" sizes=\"(max-width: 350px) 100vw, 350px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/damasio.jpg 350w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/damasio.jpg?w=150 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/damasio.jpg?w=300 300w\" alt=\"damasio\" data-attachment-id=\"42725\" data-permalink=\"http:\/\/aim4truth.org\/damasio\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/damasio.jpg?w=980\" data-orig-size=\"350,225\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;0&quot;}\" data-image-title=\"damasio\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/damasio.jpg?w=980?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/damasio.jpg?w=980?w=350\" \/>who are principal investigators in the \u2018Neurobiology of Narrative Framing\u2019 project at the University of Southern California. Evoking Zalman\u2019s emphasis on the need for Pentagon\u00a0<em>psychological operations<\/em>\u00a0to deploy \u201cempathetic influence,\u201d the new DARPA-backed project aims to investigate how narratives often appeal \u201cto strong, sacred values in order to evoke an emotional response,\u201d but in different ways across different cultures.<\/p>\n<p>The most disturbing element of the research is its focus on trying to understand how to increase the Pentagon\u2019s capacity to deploy narratives that influence listeners in a way that overrides conventional reasoning in the context of morally-questionable actions.<\/p>\n<p>The research is based on extracting narratives from millions of American, Iranian, and Chinese weblogs, and subjecting them to automated discourse analysis to compare them quantitatively across the three languages. The investigators then follow up using behavioral experiments with readers\/listeners from different cultures to gauge their reaction different narratives \u201cwhere each story makes an appeal to a sacred value to explain or justify a morally-questionable behavior of the author.\u201d Finally, the scientists apply neurobiological fMRI scanning to correlate the reactions and personal characteristics of subjects with their brain responses.<\/p>\n<p>DARPA\u2019s goal is to mine millions of American weblogs as part of its \u2018neurobiology of narrative framing\u2019 research. As the Pentagon\u2019s extensive funding of propaganda on Iraq and Afghanistan demonstrates, population influence and propaganda is critical not just in far-flung theatres abroad in strategic regions, but also at home, to quell the risk of domestic public opinion undermining the legitimacy of Pentagon policy.<\/p>\n<h1>U.S. PATENT OFFICE WORKS FOR DARPA\/IN-Q-TEL<\/h1>\n<blockquote><p>JUST AS LEADER TECHNOLOGIES WAS RIPPED OFF BY NSA\/FBI\/CIA ATTORNEY JAMES CHANDLER AND THE IBM ECLIPSE FOUNDATION FOR THEIR PATENTS THAT ARE ESSENTIAL TO FACEBOOK FOR SCALABILITY, SO TOO MANY INVENTORS HAVE HAD THEIR PATENTS STOLEN BY THE U.S. PATENT OFFICE.<\/p><\/blockquote>\n<p>This rip-off and theft is rationalized as legal once the patent committee determines that a patent may have some impact upon U.S. \u201cnational security.\u201d\u00a0 Over five thousand patents have been legally confiscated (stolen) by the U. S. Patent Office,\u00a0<em>including many free energy patents that directly compete with oil and gas<\/em>, and given to DARPA\/In-Q-Tel for further development and weaponization. Once the patent is used to create a prototype, it has encrypted back-doors installed then it is given out as open source material for corporations and individuals to bring to the market place.<\/p>\n<p>This national security rationalization for the theft of intellectual property fundamentally violates the Fifth Amendment Takings Clause which states that \u201cprivate property [shall not] be taken for public use, without just compensation.\u201d<\/p>\n<p>If an inventor of a patent that is confiscated by the U. S. Patent Office tries to continue work on the patent, that inventor may end up in jail. The rules of this patent confiscation are located in\u00a0<em>35 U.S. Code \u00a7 181 \u2013 Secrecy of certain inventions and withholding of patent,\u00a0<\/em>which provides that the government can take any patent and make it secret and use it at their discretion, or just make sure that it never gets developed.<\/p>\n<blockquote><p><strong>THERE ARE STRICT PENALTIES IF THE INVENTOR EVEN SPEAKS OF THE PATENT AFTER IT HAS BEEN \u201cCONFISCATED.\u201d<\/strong><\/p><\/blockquote>\n<p>Members of DARPA and In-Q-Tel provide the Defense Department and the CIA with these \u201csecret\u201d patents so that they might first be weaponized for military purposes. Often, patents are then given to fake companies, supported with U.S. tax dollars, who bring the patent to market.<\/p>\n<p>This is what happened with the patent theft of Leader Technologies that was then used by the front companies Goggle and Facebook, which are actually directed by the Department of Defense and the CIA. Clearly the law the dark state chooses to ignore is Leader\u2019s overarching property rights in the Fifth Amendment Takings Clause, which takes precedent.<\/p>\n<p>The Patent Office did not withhold Leader\u2019s patents, and therefore cannot rely on its confiscation six years earlier when Leader\u2019s intellectual property was a trade secret disclose only to its duplicitous attorney James P. Chandler.<\/p>\n<p><strong>Patent theft is only the tip of the iceberg<\/strong>. Industrial espionage is common in all industries. Alphabet\/Google and Facebook have seemingly endless money to \u201cabsorb\u201d any competition through buying them and keeping competition at abeyance. There are many other ways to \u201csuppress\u201d technologies that threaten the \u201cbig\u201d companies, whether oil, tech, pharmaceuticals, agriculture\/food, energy production. Big corporations use governments, especially multi-national organizations, to do their bidding. Big corporations spend huge amounts of money on lobbying governments to \u201cpay to play.\u201d<\/p>\n<blockquote><p>AND WHEN MONEY CAN\u2019T ACCOMPLISH THE GOALS, THEY RESORT TO STEALING PATENTS AND KILLING INVENTORS.<\/p><\/blockquote>\n<p>Suppression and sabotage of technologies has been the norm since the dawn of the twentieth century when fossil fuels and the petrodollar came to rule world economics. Over 5000 new patents have been \u201cdeemed\u201d secret and have been suppressed by existing patent laws. There are U. S. patent laws permitting the government to steal and suppress any new technology (and imprison the inventor) which threatens \u201cnational security.\u201d<\/p>\n<p>Under Vice President Nixon, in the early 1950s, illegal, secret patent legislation was written, permitting the U.S. government to steal technology from inventors and\/or suppress it should a case be made the technology might threaten the status quo.<\/p>\n<p><strong>The shocked inventors also were informed that they could be jailed up to 20 years if they made the theft of their technology known to the public.<\/strong><\/p>\n<h4>35 U.S. CODE \u00a7 186 \u2013 PENALTY<\/h4>\n<p><em>Whoever, during the period or periods of time an invention has been ordered to be kept secret and the grant of a patent thereon withheld pursuant to section 181, shall, with knowledge of such order and without due authorization, willfully publish or disclose or authorize or cause to be published or disclosed the invention, or material information with respect thereto, or whoever willfully, in violation of the provisions of section 184, shall file or cause or authorize to be filed in any foreign country an application for patent or for the registration of a utility model, industrial design, or model in respect of any invention made in the United States, shall, upon conviction, be fined not more than $10,000 or imprisoned for not more than two years, or both.<\/em><\/p>\n<p>(July 19, 1952, ch. 950,\u00a0<a href=\"http:\/\/uscode.house.gov\/statviewer.htm?volume=66&amp;page=807\">66 Stat. 807<\/a>;\u00a0<a href=\"http:\/\/thomas.loc.gov\/cgi-bin\/bdquery\/L?d100:.\/list\/bd\/d100pl.lst:418(Public_Laws)\">Pub. L. 100\u2013418, title IX<\/a>, \u00a7\u202f9101(b)(3),\u00a0Aug. 23, 1988,\u00a0<a href=\"http:\/\/uscode.house.gov\/statviewer.htm?volume=102&amp;page=1568\">102 Stat. 1568<\/a>;\u00a0<a href=\"http:\/\/www.gpo.gov\/fdsys\/pkg\/PLAW-112publ29\/html\/PLAW-112publ29.htm\">Pub. L. 112\u201329<\/a>, \u00a7\u202f20(j),\u00a0Sept. 16, 2011,\u00a0<a href=\"http:\/\/uscode.house.gov\/statviewer.htm?volume=125&amp;page=335\">125 Stat. 335<\/a>.)<\/p>\n<h4><img loading=\"lazy\" decoding=\"async\" class=\" wp-image-42719 alignleft\" src=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-corruption.jpg?w=374&amp;h=155\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" srcset=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-corruption.jpg?w=374&amp;h=155 374w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-corruption.jpg?w=748&amp;h=310 748w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-corruption.jpg?w=150&amp;h=62 150w, http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-corruption.jpg?w=300&amp;h=124 300w\" alt=\"Patent Corruption\" width=\"374\" height=\"155\" data-attachment-id=\"42719\" data-permalink=\"http:\/\/aim4truth.org\/patent-corruption\/\" data-orig-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-corruption.jpg\" data-orig-size=\"1566,648\" data-comments-opened=\"1\" data-image-meta=\"{&quot;aperture&quot;:&quot;0&quot;,&quot;credit&quot;:&quot;&quot;,&quot;camera&quot;:&quot;&quot;,&quot;caption&quot;:&quot;&quot;,&quot;created_timestamp&quot;:&quot;0&quot;,&quot;copyright&quot;:&quot;&quot;,&quot;focal_length&quot;:&quot;0&quot;,&quot;iso&quot;:&quot;0&quot;,&quot;shutter_speed&quot;:&quot;0&quot;,&quot;title&quot;:&quot;&quot;,&quot;orientation&quot;:&quot;1&quot;}\" data-image-title=\"Patent Corruption\" data-image-description=\"\" data-medium-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-corruption.jpg?w=300\" data-large-file=\"http:\/\/aim4truthblog.files.wordpress.com\/2017\/10\/patent-corruption.jpg?w=980\" \/><\/h4>\n<h3>Very clearly, the patent system is merely a lure for unsuspecting innovators to share their ideas so that the military-industrial complex can steal them at will.<\/h3>\n<h4>WANT TO KNOW ABOUT THE FREE ENERGY DEVICES THAT THIS CORRUPT PATENT SYSTEM IS SUPPRESSING FROM THE PEOPLE? SEE OUR CITIZENS INTELLIGENCE REPORT ENTITLED<\/h4>\n<h4 class=\"entry-title\"><a href=\"http:\/\/aim4truth.org\/2017\/04\/24\/the-real-energy-revolution-has-begun\/\" rel=\"bookmark\">THE FREE ENERGY REVOLUTION HAS BEGUN<\/a><strong>\u00a0<\/strong><\/h4>\n<p>..<\/p>\n<h2>OTHER DARPA\/IN-Q-TEL PROGRAMS<\/h2>\n<p>We have discussed the companies that you may already know have control over your life, but there are many, many more that we don\u2019t know about. Many of us are reliant, even addicted, to these the internet, cellphones, and Facebook pages and groups. It has been shown that the internet creates different illnesses and some researchers say the internet is more addictive than drugs.<\/p>\n<p>But what is worse is that DARPA\/In-Q-Tel already has many programs that are not publicly known about and are being used right now to control U. S. citizens with cyberwarfare technologies. Let\u2019s take a look at some of those other programs described by whistleblowers, like the Vault 7 Wiki-leaks, and see what those programs are intending to do for the U. S. military.<strong>\u00a0<\/strong><\/p>\n<p><strong>Total Information Awareness<\/strong>\u00a0\u2013 Under the umbrella of a system known as Total Information Awareness, DARPA spearheaded many of the surveillance programs abused by the NSA. DARPA\u2019s Total Information Awareness concept created a veritable buffet of advanced surveillance and data mining programs, many of which ultimately were folded into NSA\u2019s PRISM. PRISM culled citizens\u2019 personal data from companies like Microsoft, Google, and Facebook.<\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/PRISM_(surveillance_program)\">PRISM<\/a><\/strong>\u00a0\u2013 A clandestine national security electronic surveillance program operated by the United States National Security Agency which can target customers of participating corporations outside or inside the United States.<\/p>\n<p><strong>Sounds of Silence<\/strong>\u00a0\u2013 The Silent Subliminal Presentation System was developed for commercial use in 1992. A silent communications system in which non-aural carriers, in the very low (ELF) or very high audio-frequency (VHF) range or in the adjacent ultrasonic frequency spectrum are amplitude \u2013 or frequency- modulated with the desired intelligence and propagated acoustically or vibrationally, for inducement in to the brain, typically through the use of loudspeakers, earphones, or piezoelectric transducers. The modulated carriers may be transmitted directly in real time or may be recorded and stored on mechanical, magnetic, or optical media for delayed or repeated transmission to the listener. US Patent #5,159,703.<\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/ThinThread\">ThinThread<\/a>\u00a0<\/strong>\u2013 A U.S. National Security Agency program involved wiretapping and sophisticated analysis of the resulting data.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Trailblazer_Project\">Trailblazer Project<\/a><\/strong>\u00a0\u2013 U.S. National Security Agency program intended to develop a capability to analyze data carried on communications networks including cell phone networks and the Internet.<\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Turbulence\">Turbulence<\/a><\/strong>\u00a0\u2013 Turbulence is a National Security Agency information-technology project started circa 2005. It was developed in small, inexpensive \u201ctest\u201d pieces rather than one grand plan like its failed predecessor, the Trailblazer Project. It also includes offensive cyberwarfare capabilities, like injecting malware into remote computers.<\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Tailored_Access_Operations\">Tailored Access Operations<\/a><\/strong>\u00a0\u2013 Intelligence-gathering unit of the NSA that is capable of harvesting approximately two\u00a0petabytes\u00a0of data per hour.\u00a0<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Boundless_Informant\">Boundless Informant<\/a>\u00a0<\/strong>\u2013 A system deployed by the NSA to analyze global electronic information. In March 2013, Boundless Informant gathered 14 billion data reports from\u00a0Iran, 6.3 billion from\u00a0India, and 2.8 billion from the\u00a0United States.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Bullrun_(code_name)\">Bullrun<\/a>\u00a0<\/strong>\u2013 A highly classified NSA program to preserve its ability to eavesdrop on encrypted communications by influencing and weakening encryption standards, by obtaining master encryption keys, and by gaining access to data before or after it is encrypted either by agreement, by force of law, or by computer network exploitation (hacking).<\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Stuxnet\">Stuxnet<\/a><\/strong>\u00a0\u2013 Is the first discovered\u00a0malware\u00a0that spies on industrial systems, and it was used to attack\u00a0Iran\u2019s nuclear facilities.\u00a0It is believed to have originated from the\u00a0United States\u00a0under the\u00a0Bush administration.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Carnivore_(software)\">Carnivore<\/a>\u00a0<\/strong>\u2013 A system implemented by the Federal Bureau of Investigation that was designed to monitor email and electronic communications.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/DCSNet\">DCSNet<\/a><\/strong>\u00a0\u2013 The\u00a0Federal Bureau of Investigation\u2019s\u00a0point-and-click\u00a0surveillance system that can perform instant wiretaps on any telecommunications device located in the\u00a0United States.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Fairview_(surveillance_program)\">Fairview<\/a><\/strong>\u00a0\u2013 A\u00a0mass surveillance\u00a0program directed at foreign mobile phone users.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/ICREACH\">ICREACH<\/a><\/strong>\u00a0\u2013 Surveillance\u00a0front-end\u00a0<a href=\"http:\/\/en.wikipedia.org\/wiki\/Graphical_user_interface\">GUI<\/a>\u00a0that is shared with 23 government agencies, including the\u00a0CIA,\u00a0DEA, and\u00a0FBI, to search illegally collected personal records.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Magic_Lantern_(software)\">Magic Lantern<\/a><\/strong>\u00a0\u2013 A\u00a0keystroke logging\u00a0software\u00a0deployed by the FBI in the form of an\u00a0e-mail attachment. When activated, it acts as a\u00a0trojan horse\u00a0and allows the FBI to decrypt user communications.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Main_Core\">Main Core<\/a><\/strong>\u00a0\u2013 A personal and financial database storing information of millions of U. S. citizens believed to be threats to\u00a0national security.\u00a0The data mostly comes from the\u00a0NSA,\u00a0FBI,\u00a0CIA, as well as other government sources.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/MAINWAY\">MAINWAY<\/a><\/strong>\u00a0\u2013 A NSA database containing\u00a0metadata\u00a0for hundreds of billions of\u00a0telephone calls\u00a0made through the four largest\u00a0telephone carriers\u00a0in the United States.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Muscular_(surveillance_program)\">MUSCULAR<\/a><\/strong>\u00a0\u2013 Overseas wiretapping of\u00a0Google\u2019s and\u00a0Yahoo\u2019s internal networks by the NSA.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/MYSTIC_(surveillance_program)\">MYSTIC<\/a><\/strong>\u00a0\u2013\u00a0Is a voice interception program used by the National Security Agency.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Room_641A\">Room 641A<\/a><\/strong>\u00a0\u2013 A telecommunication interception facility operated by\u00a0AT&amp;T\u00a0for the U.S. National Security Agency.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Sentry_Eagle\">Sentry Eagle<\/a><\/strong>\u00a0\u2013 It monitors and attacks an adversary\u2019s cyberspace through capabilities include SIGINT, Computer Network Exploitation, Information Assurance, Computer Network Defense, Network Warfare, and Computer Network Attack. The efforts included weakening U. S. commercial encryption systems.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Special_Collection_Service\">Special Collection Service<\/a><\/strong>\u00a0\u2013 A\u00a0black budget\u00a0program that is responsible for \u201cclose surveillance, burglary, wiretapping, breaking and entering.\u201d It employs\u00a0covert listening device technologies to bug foreign embassies, communications centers, computer facilities, fiber-optic networks, and government installations.<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Terrorist_Finance_Tracking_Program\">Terrorist Finance Tracking Program<\/a><\/strong>\u00a0\u2013 A joint initiative run by the\u00a0CIA\u00a0and the\u00a0Department of the Treasury\u00a0to access the SWIFT (<a href=\"http:\/\/en.wikipedia.org\/wiki\/Society_for_Worldwide_Interbank_Financial_Telecommunication\">Society for Worldwide Interbank Financial Telecommunication<\/a>) transaction database as part of the\u00a0Bush administration\u2019s \u201cGlobal\u00a0War on Terrorism.\u201d<strong>\u00a0<\/strong><\/p>\n<p><strong><a href=\"http:\/\/en.wikipedia.org\/wiki\/Multistate_Anti-Terrorism_Information_Exchange\">Multi-state Anti-Terrorism Information Exchange<\/a>\u00a0(MATRIX)<\/strong>\u00a0\u2013 A\u00a0data mining system\u00a0originally developed for the\u00a0Florida Department of Law Enforcement.<br \/>\n<strong>Insight Program<\/strong>\u00a0\u2013 It detects threat networks, irregular warfare, and terrorist operations by combining intelligence information from imaging sensors, crowd-source and other social network or text-based sensors, as well as from other sources for further analysis. Develops integrated human\/machine reasoning into intelligence equipment to encompass operator knowledge and reasoning when dealing quickly with complex data from many different sensors.<strong>\u00a0<\/strong><\/p>\n<p><strong>EM Fields and Hidden Symbols<\/strong>\u00a0\u2013 Uses techniques to incept thoughts and ideas into the mind. Once a mind has been programed with the memory patterns, words and symbols can trigger the programing without the need of the original device.\u00a0<strong>\u00a0<\/strong><\/p>\n<p><strong>Nervous System Manipulation by Electromagnetic Fields from Monitors<\/strong>\u00a0\u2013 US Patent and Trade Office, Patent\u00a0#6,506,148 on subliminal behavior modification, 1\/14\/2003, United States Patent 6,506,148, Loos, January 14, 2003. Abstract: It is possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set. For the latter, the image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream.\u00a0Many computer monitors and TV tubes, when displaying pulsed images, emit pulsed electromagnetic fields of sufficient amplitudes to cause such excitation. It is therefore possible to manipulate the nervous system of a subject by pulsing images displayed on a nearby computer monitor or TV set.\u00a0The image pulsing may be imbedded in the program material, or it may be overlaid by modulating a video stream, either as an RF signal or as a video signal. The image displayed on a computer monitor may be pulsed effectively by a simple computer program. For certain monitors, pulsed electromagnetic fields capable of exciting sensory resonances in nearby subjects may be generated even as the displayed images are pulsed with subliminal intensity. Inventors: Loos; Hendricus G. (3019 Cresta Way, Laguna Beach, CA 92651), Appl. No.: 872528 Filed: June 1, 2001<\/p>\n<p><strong>Narrative Networks Program<\/strong>\u00a0\u2013 Developed classified techniques used to manipulate trust in humans. For its Narrative Networks program, DARPA collaborated with a CIA agency called the Intelligence Advanced Research Projects Agency (IARPA) to develop methods of overwriting messages in the human mind.<\/p>\n<p><strong>Mind Control Project<\/strong>\u00a0\u2013 Remotely disrupts political dissent and extremism by employing \u201cTranscranial Magnetic Stimulation\u201d (TMS) in tandem with sophisticated propaganda based on this technology. TMS stimulates the temporal lobe of the brain with electromagnetic fields. This research aims to stop individuals from thinking certain thoughts and make others believe things they normally would not believe. This research is being conducted by The Center for Strategic Communication at ASU and is entitled \u201cToward Narrative Disruptors and Inductors: Mapping the Narrative Comprehension Network and its Persuasive Effects.\u201d\u00a0Mechanical disruptions of narrative processing may be, ultimately, replicated through targeted strategic communication campaigns that approximate the narrative disruptions induced via magnetic stimulation.\u00a0MIT neuroscientists have shown that they can plant false memories. Most of the research in this area currently revolves around how to induce and eliminate fear.<\/p>\n<h1><strong>CONTROLLING AMERICANS THROUGH THE INTERNET<\/strong><strong>\u00a0<\/strong><\/h1>\n<p>It is important to remember that since Barrack Obama added new language in the National Defense Authorization Act of 2012, Americans are now seen as possible terrorists and are military targets and enemies of the state, unless proven otherwise.\u00a0 In essence, all of the above cyberwarfare programs are being used on Americans indiscriminately and with ill intent.<\/p>\n<p>The Patriot Act, later called the U. S. Freedom Act is the exact opposite of its name \u2013 it takes away freedom from patriots and lets multi-national corporations and the \u201crun-away military\u201d use the American people as a cyberwarfare testing grounds.<\/p>\n<p><strong>This fact is little known: the U. S. military is now allowed to act within the borders of America and target Americans as hostile war-actors<\/strong>\u00a0(as the military calls us). We are in an information war and the stacks are high \u2013 American freedom or military\/corporate control. This battle wages while many people are complacent and perfectly happy with their digital experiences.<\/p>\n<p>The internet is a weapon and it is our job to find out what the battle is all about and make sure that we retain our U. S. Civil Rights and American freedom and liberty. We must call out DARPA, In-Q-Tel, Highland Forum, and the U.S. Patent Office for their patent thefts, continuous lies, and cyberwarfare manipulations and demand that U. S. taxpayer dollars that funded these evil weaponized tools be acknowledged and that all cyber-tools be turned over to Americans without the spy systems and information control systems attached.<\/p>\n<blockquote><p><strong>HUMAN BEINGS MUST NOW FIGHT TO RESTORE FREEDOM AND PRIVACY BEFORE IT IS LOST FOREVER<\/strong>.<\/p><\/blockquote>\n<p>To evolve as human beings into the next century, we need a free and private internet and social networks that are not manipulated as tools to lock us inside the prison of our minds and our geography. Remember that the intent is to \u201cmaster the human domain\u201d via the mechanical domain controlled by ahrimanic warlords who wish to take our freedoms away.<\/p>\n<hr \/>\n<p><a href=\"http:\/\/aim4truth.org\/2017\/10\/16\/lock-down-on-prison-planet-almost-complete\/#_ftn1\" name=\"_ftnref1\">[1]<\/a>\u00a0Katherine Losse, Mark Zuckerberg\u2019s anathemized former speechwriter, revealed in her book\u00a0<em>The Boy Kings<\/em>\u00a0(2012) that the term at Facebook for Marina was \u201cdark profiles.\u201d<\/p>\n<p><a href=\"http:\/\/aim4truth.org\/2017\/10\/16\/lock-down-on-prison-planet-almost-complete\/#_ftnref1\" name=\"_ftn1\"><\/a><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#katherine-losse\">http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#katherine-losse<\/a><\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/congress\/2012-11-27-Briefing-for-Representative-Jim-Jordan-FACEBOOK-NOUVEAU-TOTALITARIANISM-AND-USE-OF-TARP-FUNDS-Nov-27-2012.pdf\">http:\/\/www.fbcoverup.com\/docs\/congress\/2012-11-27-Briefing-for-Representative-Jim-Jordan-FACEBOOK-NOUVEAU-TOTALITARIANISM-AND-USE-OF-TARP-FUNDS-Nov-27-2012.pdf<\/a><\/p>\n<p>Losse, Katherine. The Boy Kings. New York: Simon &amp; Schuster, 2012, p. 201- 202. Print, eBook.<\/p>\n<p><a href=\"http:\/\/aim4truth.org\/2017\/10\/16\/lock-down-on-prison-planet-almost-complete\/#_ftnref1\" name=\"_ftn1\">[2]<\/a>\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2010-11-16-Raytheon-s-Riot-Rapid-Information-Overlay-Technology-Program-Mines-Social-Network-Data-Like-a-Google-for-Spies-Whistleblower-The-Guardian-Raytheon-Nov-16-2010.mp4\">Urch, Brian. (Nov. 16, 2010)<\/a>. Raytheon\u2019s Riot [Rapid Information Overlay Technology] Program Mines Social Network Data Like a Google for Spies. Raytheon.\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/library\/2010-11-16-Raytheon-s-Riot-Rapid-Information-Overlay-Technology-Program-Mines-Social-Network-Data-Like-a-Google-for-Spies-Whistleblower-The-Guardian-Raytheon-Nov-16-2010.mp4\">http:\/\/www.fbcoverup.com\/docs\/library\/2010-11-16-Raytheon-s-Riot-Rapid-Information-Overlay-Technology-Program-Mines-Social-Network-Data-Like-a-Google-for-Spies-Whistleblower-The-Guardian-Raytheon-Nov-16-2010.mp4<\/a><\/p>\n<p><a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#raytheon-riot\">http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#raytheon-riot<\/a><\/p>\n<p>[3]\u00a0<a href=\"http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#nsa-sniff-it-all\" rel=\"nofollow\">http:\/\/www.fbcoverup.com\/docs\/cyberhijack\/cyber-hijack-findings.html#nsa-sniff-it-all<\/a><\/p>\n<p>___<br \/>\n<a href=\"http:\/\/aim4truth.org\/2017\/10\/16\/lock-down-on-prison-planet-almost-complete\/\">http:\/\/aim4truth.org\/2017\/10\/16\/lock-down-on-prison-planet-almost-complete\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"class_list":["post-86703","post","type-post","status-publish","format-standard","hentry","category-uncategorized"],"_links":{"self":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/86703","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=86703"}],"version-history":[{"count":0,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=\/wp\/v2\/posts\/86703\/revisions"}],"wp:attachment":[{"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=86703"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=86703"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/stateofthenation2012.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=86703"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}