Tag Archives: Forbidden technology

The Truth About Free Energy

Is it just a myth? You decide…

The Truth About Free Energy

Adam Trombly is one of the top scientists in the world in the development and creation of Zero Point Energy technology. Devices that he built are working today in other parts of the world. And yet, instead of using Zero Point Energy, Adam Trombly’s own house in Maui is being fitted with a bank of expensive solar panels.

Why can’t Trombly use his own expertise to fuel his own home? Trombly has spent most of his professional life under one gag order or another. But he decided, he told us, “that if I was going to give an interview for this particular publication, I wasn’t going to pull any punches.”

If much of this seems overly negative, keep reading. Trombly wants to wake us up, and to shine a light upon things that have been kept dark.

Adam Trombly’s revelations will shock you to the depths. But it is his hope, and ours, that it will help you to awaken, or to assist you in your task of awakening others.

Trombly’s ultimate vision is the “redreaming of the American Dream.”

Adams: How did you become interested in free energy?

Trombly: I was raised as a scientist and I have spoken the language of science all of my life. My mother was a blood specialist, my father was a biochemist, and my sister was at one time a biophysicist.

When my father had just gotten his Ph.D. in biochemistry from Purdue University – I was a young child – he was enlisted as a biochemist, by a fellow Purdue alumnus named Frank Olsen, into a U.S. Air Force/CIA joint project. He was stationed at the biological warfare laboratory in Fort Detrick, Maryland. This was in 1952 during the Korean Conflict. He had been a highly decorated U.S. Army Air Corp officer in World War II, but the government felt that he had a skill of strategic importance to the national security.

At Fort Detrick, he and Olsen, along with a couple of other scientists, were working on a very compartmentalized project. Since he died when I was in the eighth year of this body, I knew very, very little about what this project involved. On the seventh anniversary of his death (4/3/1967) I was in my mother’s attic, putting out mousetraps, when I discovered a couple of boxes that contained journals my father had kept during his time at Detrick. You weren’t supposed to keep journals, but he did.

One of the things he wrote about in his journals was his exposure to alien technology that totally defied what were considered, at that time and even still to this day, the laws of physics.

He wrote a letter to Dr. Quackenbush, who was on his dissertation board at Purdue, saying that what he had seen challenged even his “most vivid imagination.” This was right after he got there.

After he had been there about a year, the notes he wrote got really interesting. He specifically described various technologies which he stated plainly were of “alien origin.” He described not only flying disk-shaped craft and their related energy and propulsion systems, but Extraterrestrial Biological Entities. His work was actually concerned with them.

On November 19, 1953, my father (along with Dr. Frank Olson and a couple of other colleagues) was taken by Dr. Sidney Gottlieb to a summer camp near Baltimore. While there, he and his colleagues were involuntarily given large doses of LSD in their cocktails; doses on the order of 10,000 to 15,000 micrograms. Olsen knew about the experiment, and out of concern for my father told him, “Harvey you have been given a psychoactive drug and you are beginning to feel its effects. Don’t worry.”

Olsen had also taken a large dose of acid, and later freaked out because he said he had, “blown the experiment.” It was supposed to be a double-blind experiment for all of the participants other than Olsen. He was supposed to keep silent.

Frank Olsen continued to feel unsettled, and was rushed by CIA personnel to New York for psychiatric examination. Something terrible happened instead. Frank was bludgeoned in the head and then thrown from his hotel room window. He was murdered. This, at least, was the conclusion of forensic pathologists hired by Frank’s son Eric in 1994.

My father filed an internal protest demanding an investigation of his friend’s and colleague’s death, and that was what ultimately triggered the events that killed him.

In January of 1954, under the illusion that he was being immunized from a new retroviral biological warfare agent, he was injected instead with a live virus that he had discovered during his research. He became extremely ill. In his notes, he indicated that he immediately knew. “They killed Frank,” he said, “and now they have killed me. The difference is that I will die slowly, very slowly.”

He died in 1960, from a form of lymphoma as eleven government labs did morphological workups of his cells.

When I discovered that his death had not been an accident of nature, I was heartbroken. I despaired of life. I sat with a knife a quarter inch into my chest, with blood already trickling down, begging whoever was present at Infinity to reveal the truth of existence.

And in the next moment, I suddenly had no doubt of God or, if you prefer, the Buddha Nature, and I saw things with great clarity.

Adams: Do you believe that we’re in denial about the involvement of aliens in the affairs of this planet?

Trombly: The American public has been lied to for so long, they wouldn’t be able to recognize the truth if Jesus told them personally.

It’s very difficult for the American public to know what is going on. In many ways, we are a nation in denial, and all too often a nation of alcoholics and drug addicts. We are in incredible mass denial.

People see what are referred to as flying saucers and UFOs. Sometimes they are not saucers but triangles. Sometimes they’re small, and sometimes they’re huge and look like buildings.

It doesn’t matter how many people in remote places or in cities see them, or photograph or videotape them. The perceptions are simply shut out.

There are amazing mind-control projects going on. People literally cannot maintain their attention span. More than once I have stood and watched crafts 100 or 200 feet over my head and had people say things like, “Well that’s not an airplane,” or “Oh, my God, are we actually seeing this?” “Is that real?”

But by the next day, the whole chemistry of denial has set in and those same people say, “Wow, that was a strange airplane, it was going really slow, or really fast, and how did it make that right turn?”

This is what got me started in free energy technology – though I hate the term free energy, because it’s anything but free. Many have paid dearly for its advent. I don’t even know what term I like at this point. I use the term Zero Point Fluctuation Technology – ZP Technology.

I used to have a company called Zero Point Technology. As soon as you put something like that on your shingle, you discover just how unacceptable this concept is to those whose growth stopped so long ago.

People are being bombarded with subliminal messages that tell them that aliens don’t exist. Even The “X-Files,” which is a joke (thank God they’re canceling it), was originally intended, by Chris Carter, to be something more than just random amusement. It was intended to be groundbreaking. But there’s government interference. And this is a huge subject. People don’t understand that the “other U.S. government” has had contact for decades with cultures that aren’t from this planet.

We’re like the aboriginal people of New Zealand, or Papua, New Guinea, or any other remote tribe. When they see an airplane, they think that it is a God – or they at least, they used to. Of course, now they think that it’s just people who are more primitive than they are, but who have technology.

We are the same way with “alien” cultures. We are the same way with really clean and advanced electrical technologies that could begin to help us understand just how wonderful and abundant Being – simply being – is.

When I got involved in ZP in 1979, I was warned by Buckminster Fuller that if we were successful there’d be hell to pay. If we were actually successful, then it could develop into a real nightmare, because the humans we’re dealing with are a species that has been kept in the dark. We’ve been treated like mushrooms (which are kept in the dark and fed a lot of feces — there’s no nice way of putting this).

The extremes to which these people are willing to go to make your life miserable are phenomenal. They go out of their way to torment those who challenge their utter mediocrity.

Then there are certain people who hang around in the so-called free energy field, who speak at conferences and who have never discovered, engineered, or invented anything in their entire lives that is worthy of note. What they have done is mediocre at best. I won’t name them, but they just haven’t produced. These are the people who say, “No one has ever bothered me.”

These are the same people who – behind my back and behind the backs of those who have actually produced functional technologies – say, “Well I’ve never seen anything that he’s produced.”

Adams: Can you tell us more about this alien agenda?

Trombly: I know that there’s an alien agenda because my father wrote this in his journals. He said he had discovered that the U.S. government had become involved in its implementation. He went further to say that this alien agenda, in his opinion, was contrary to the good of the human species and the planet.

He believed that a sector of the military/industrial complex was involved in a program, basically, to transform our atmosphere, which is benign to our species and other Earth species, into one that is greatly reduced in terms of its oxygen content.

So this is a force which doesn’t have good intentions for us. It is a force that would gladly exterminate us. And yet human beings act as agents for this force. The “human” species is exterminating itself, by its own hands.

My father spoke of alien agendas in his most secret thoughts. This was not something he spoke of in public. He would never have given this interview, I’ll tell you that much.

Adams: What species is this alien force?

Trombly: I can’t say, but I can say that the species that are trying to harm us are a tiny minority of a vast host of alien species. My father knew of a couple. It wasn’t just one, even back then. This sounds very far fetched – I know it sounds nuts. But I decided if I was going to give an interview for this particular publication, I wasn’t going to pull any punches.

Adams: Many of the people who read this will share your belief system.

Trombly: Well, this is not about a belief system. I don’t like belief systems! This is about reality! We are the ones who are collectively destroying the womb of the Earth in which our species gestates, in which we evolve.

There are real terrorists in Washington, and even, I dare say, in the White House. And we are very rapidly approaching the time when that statement will be considered criminal. The incident we call 9-11 was a mockery. Now, every time someone dials 911 they’ll think of the evil demon Osama bin Laden who in fact is someone we helped to create.

Alkhaida was largely financed by the U.S. government. We gave the Taliban 128 million dollars last year to suppress the growth of opium in Afghanistan. Where do you think that money came from? Where do you think it went?

Everyone thinks the 9-11 was caused by Osama bin Laden and his cronies. There’s no doubt that some of his money comes from Saudi Arabia, but the fact is that the U.S. government is the primary source of funding for the Taliban. Why? Because Dick Cheney and his cohorts want to build an oil pipeline through Afghanistan.

Adams: What has happened to the free-energy technologies that you’ve produced?

Trombly: Every single technology that I have either invented or co-produced is no longer in my possession. There’s one in Arizona that has supposedly become a national security issue.

A former colleague of mine once went off on his own with a design that he and I had come up with. He built a device that was very successful – and is now in a can, and he is a shell of his former self.

Forget about whatever technologies I have had a hand in reducing to practice. We have heard from very credible sources that these are nothing compared to the technologies already being produced by certain prime contractors right here in the United States.

Why is it a national security issue? Why is a generator that generates several times more output than input a security issue? Why is it that the American people cannot enjoy what their tax dollars are paying for? Why is it that we have a government that is willing to deny the American people access to the very technologies they themselves are secretly producing?

It’s not a joke. Our government has produced technologies, with our tax dollars, that could immediately begin to reverse the damage done by the irresponsible use of fossil fuels, and they are not allowed to be used.

They continue to pollute this atmosphere, and they continue to reduce the amount of metabolically available oxygen. Who could possibly benefit from that? What species do you know of that is actually better off today than, say, fifty years ago?

What is it that we do when we burn these fuels? We make fire. What is fire? Fire is a rapid oxidation process that releases heat. The real destroyers of the equatorial rain forest are forest fires, because of the incredibly poor husbandry. There’s nothing good you can say about what’s being done to this planet!

There are far too many people in the U.S. government and other national governments who are acting in a way that is completely moronic and self-destructive. It is not a human agenda! This is what I’m trying to get you to see. There is this whole other thing happening.

We are exploited by a corporate structure – by the “military/industrial complex” Dwight Eisenhower warned us against in his farewell address to the nation. Eisenhower got the term “military/industrial complex” from Mussolini, who was describing Fascism. These are words you don’t want to use in our society.

At Project Earth we get mail from all over the world, and the one word that keeps coming up since [the 2000] so-called presidential election – about that debacle, that tragedy – is the word “coup.” From the perspective of the vast majority of the human species, it was a coup. They say this in India, Japan, South Korea, France, Holland, Spain – everywhere. In spite of the fact that we never posted an article on our website that said or even suggested that we had a coup, people write to us and say, “How come the American people don’t realize that they just had a coup?”

Then, following on that coup, we have 9-11. Everybody is terrified, but people don’t want to talk the way I’m talking now. They think it’s self-destructive.

I tell you truly, it is our collective silence that is truly destructive.

The United States of America is a sacred idea. It is a sacred thought-form. What was America to the people who risked and frequently lost their lives to create it? It was the New Jerusalem. The spiritual foundation of the United States of America is an absolute necessity of our spiritual dimension. It was founded on the basis of the absolute need of the human spirit for freedom.

But freedom brings with it great responsibility and demands great intelligence.

We do not want to live in hell, but we are creating hell for ourselves. We are tormenting each other and ourselves. We’re doing these things as if we have no choice. We are truly brainwashed.

The real ultimate cult that’s going on in America is this one of jingoistic, flag-waving, unquestioning patriotism. We can get ourselves all hyped up on Zoloft, and that still doesn’t change the fact that we as a nation have lost an incredible amount of prestige and trust because of what happened in 2000.

No matter how much money we put into the military budget, we will not be able to restore that trust in our own people or in the rest of the world until, through grace or the incarnation of the Divine Process, our democracy is resurrected from its present contrived state. It is a travesty.

When Dick Cheney refuses to turn over documents to investigators, he gives comfort to our enemies. Truly dangerous and deranged people in truly difficult countries like Pakistan cite the actions of our corrupt public officials as justification for their actions.

If we say to the world that we represent Freedom and Democracy, then by God we have an obligation to be Free and Democratic.

In the meantime, the world laughs, because perfectly capable intelligence officers in the United States are oppressed for the sake of short-term political agendas.

The Central Intelligence Agency attempted to warn the White House before September 11. The entire affair was handled with what can only be called incompetence. While three-letter agencies spent our tax dollars listening to my calls, true terrorists were going to flight. And in spite of over an 18-minute warning crash, a second full-size passenger jet went into the World Trade Center.

Even so, we are all supposed to fall into line and cheer.

Once, in 1986, I was introduced to a man in Toronto, Canada, who turned out to be a major Soviet technology spy. When he offered me a lot of money and a lot of benefits if I would turn over mechanical drawings for an electrical generating technology I had co-invented, I told that agent to go screw himself. I told him I was under a gag order, and that I would not violate that order.

He responded by saying, “What loyalty do you owe to your country? They have done nothing to help you or your work. If you cooperate with us we will appreciate you and take good care of you and your family. Three hundred million people will benefit from your technology. Who cares if a shaft is made in Leningrad or if assembly occurs near Moscow?”

Once again, I told him to go screw himself, to go back to the totalitarian hell that he came from – and then I got the hell out of his office.

In September of 1986, I turned this man in to the FBI – and as a consequence, I ended up under investigation myself!

In February of 1987, the counter-intelligence unit of the FBI contacted me. During my second so-called “interview,” one of the special agents who interviewed me was Robert Hanson, now known as a famous spy for the former Soviet Union.

Hanson interviewed me about whether or not I was a spy. But he knew I wasn’t a spy, because he was!

It’s not just the U.S. government that’s suppressing all this stuff, it’s the whole theater of this species. The “human” species has rarely demonstrated qualities that say that it should be maintained or can be sustained.

This species has never acted in a way that is consistently to its own benefit. For thousands of years, this species has acted in a manner that can only be described as both sadistic and masochistic, and on a planetary scale. It has not acted intelligently.

At the same time, there is no decision to change, because the vast majority of the human species don’t even realize that we have a choice to do that. They don’t realize that we have the choice live intelligently. They don’t even know or what that would entail.

My protests to the “powers above” are consistently related to this central fact: “I know there’s a choice, you know there’s a choice, but the general population on this planet has no clue that there’s a choice. We can choose to live in a completely abundant and pollution-free environment. We can make that choice and have more abundance, and not less abundance. We can stop spending money for fuel. The capital expenditure for fuel could be completely eliminated. That would free up trillions of dollars annually, globally, from the world budget, from the planetary budget.”

If you want to know why I got involved in this technology, it’s because we have a way to generate almost boundless levels of electrical power without any pollution or fuel, without even the need for solar panels or wind power.

It’s ridiculous that I am installing solar panels in my home, when I have spent the last 23 years of my life in the field of ZP Fluctuation Technology research and development and have one more than one occasion successfully demonstrated it along with colleagues who have also learned the same hard lessons that I have.

Adams: Can we still restore this planet?

Trombly: We can if we act with great clarity and great speed. No obstacle could stand in our path.

We could even reclaim the Sahara Desert. It didn’t used to be a desert. It was destroyed by people who cut down the forest and overgrazed the grasslands that were once there. Now the same thing is happening in Brazil, Indonesia, China and South East Asia.

These forests and grasslands are like your skin. What does the skin do? It keeps us from becoming dehydrated. When a person gets third-degree burns, one of the leading causes of death is dehydration. The same thing is true of the forests and grasslands.

It’s about maintaining that tissue and understanding that it is very vulnerable. These membranes are being taken away.

We can also reclaim the desert that is forming in the northeastern corner of Brazil, where there was rainforest a hundred years ago. The Brazilian desert exists because the Brazilian people won’t stop cutting down their own trees. I say this very bluntly. If the Brazilian people want to demonstrate that they have some intelligence, then they’ll stop cutting down the rainforest, which is the equatorial life support of our planet.

If the United Nations and if the American government want to demonstrate their intelligence, then they will suggest that we should give credits to these countries for their oxygen production.

We can reclaim the deserts by these new technologies, by taking the water out of the oceans and using it on the desert.

Where you run into the logjam, over and over with all these issues, is the question of energy.

How can we heal the ozone layer? It’s going to take a tremendous amount of energy to do that. We have to replenish the oxygen that’s not getting into the stratosphere.

One of the fundamental points that I try to make is about chlorine. It is a molecular demon once it gets into the ozone layer. One chlorine ion can interfere with the production of 100,000 molecules of ozone. So we have to eliminate as much free chlorine and bromine as possible.

But even if we entirely eliminated chlorine and bromine production, that would still not be enough to heal the stratospheric ozone layer.

Another significant cause of ozone depletion, one that is often overlooked, is the reduction in the amount of oxygen that should be transported into the stratosphere over the equatorial rainforests. Project Earth has been trying to educate people to this fact since the mid-eighties. The oxygen source has literally been cut off by deforestation. But we can heal that by reintroducing a tremendous amount of oxygen up there, and replanting the forest down here, on Earth.

It will take energy. Lots of it.

Adams: Can you describe how your life has been endangered because of your perspectives on free energy?

Trombly: If I had described my life to you since 1980, it would be a long, long story, and it would sound like a bad spy novel.

I’ve had a number of attempts on my life through really serious poisonings. My wife has had to revive me and give me CPR.

So we’ve had a whole nightmare component to our life. But we don’t live in a nightmare at all. It’s quite the opposite.

However, I must say that it has been almost unimaginable at times.

Once, in 1988, I was visited by a couple of scientists at my home in Colorado. One of them was Bob Dratch, a man who has done a lot of work in creating microwave detection equipment, which is widely used by the Department of Defense.

Basically, I was standing in my office, which was a large room, 27 feet long, and Bob Dratch was shaking change in his pocket, to demonstrate that his very sensitive microwave detector could pick up the signal this jingling generated. The signal would appear on the meter and the printout.

I pointed the horn of the device at Dratch to measure the effect. And then, as I pointed the horn away, I kept my finger on the trigger and happened to point it out the window of my office. To our surprise, the alarm went off on the machine! The red light went on, and the meter peaked.

My office was being microwaved!

We walked into my back yard and found the place where the signals were being broadcast. It was right behind my house, in a little forest, right next to an engineering company that is well known for making satellite antennas.

We clipped the cable to the antenna that was broadcasting microwaves at my house, and I called the FCC in Denver and I said told them that this was illegal and I wanted it stopped now. I said, “Stop microwaving me.” I already had cancer.

Within three weeks, this engineering company was totally gone. I assume they themselves had something to do with the broadcast, or they wouldn’t have left so suddenly.

So dozens of people had to relocate to Kansas, or whereever.

But why were they trying to kill this body? We are perplexed at times by the strange modus operandi of this group.

The world is not going around very well right now, because people aren’t loving. When people love, they become geniuses. Intelligence isn’t about thinking, it’s about feeling. I don’t care how many times the force of darkness, which resists love, has attacked you and made you feel separate.

I don’t care how difficult anyone’s life has been. I guarantee you, I can match it. But suffering is finite, it’s limited, it’s not eternal. You can transcend suffering through love.

The resurrection we are called to is our resurrection. Once Jesus stood in front of Lazarus’ tomb, and commanded, “Lazarus, come out.” And we are told that Lazarus came out.

That is similar to what is happening right now. Surrounding this planet, there is a gathering which is inviting the human species into a new dimension. They are saying, “Lazarus come out, come out of your subjective tomb and out of your corruption. Come out of your doubt of God and out of your doubt of Love. In the midst of Infinity and Eternity, We command you.”

Now, in this moment, we must come out and ask for help. When we can ask for help, we get it.

People don’t understand that you become realized by incarnating love. We live only as expressions of love, in eternity. The only thing that is eternal is Love. Love as the presence of consciousness is eternal and infinite.

Time and space are subsets of eternity and infinity. Space and time are subjective states, and they have nothing to do with limiting the ultimate reality of consciousness, not even a little bit. They have to do with the gnarled subjective states of the contracted world.

Scientists talk about the accelerating expansion of the universe, but it’s not that, it’s the unremitting transformation of the universe that’s happening, the inescapable transformation of the universe.

You don’t have a choice about it this time. It isn’t the same as it was two thousand years ago. We are in the midst of the time of the resurrection. It involves you and me and everyone on this planet, I don’t care who they are.

There will be miracles everywhere. The most powerful thing is love. The whole astrophysical community is now acknowledging this power, but they call it the “dark energy.” They give it this Darth Vader quality, because they don’t know how to relate to the Light. It is the contraction of form and the denial of the Infinite Divine that causes the appearance of darkness.

Adams: How long has there been a conspiracy to prevent the development of free energy?

Trombly: Well, if you are referring to the technological side of things, I guess you could say it started with Nikola Tesla. (Although the crucifixion was really an attempt to stop Free energy as well.)

Nikola Tesla was given the vision of infinite electrical power, without fuel, in the 1880s. He demonstrated it in 1886 and 1889, and then throughout the 1890s. He tried to give this gift, but the fossil fuel boys decided he couldn’t give it. The fossil fuel boys decided that maybe they could make use of him, so they didn’t kill him right away. They killed Tesla in 1943.

One of the detectives approached me in 1981, at a conference. This man told me that Tesla had been murdered. So I guess you could say that it all began right there. When I was a kid in school, nobody knew about Tesla. Tesla was the father of alternating current electricity. Tesla said he was inspired by aliens, beings from other dimensions. He was anathematized because he refused to kowtow; he refused to attend the same temple that the others worshipped in.

Adams: How can we make free energy available to the planet?

Trombly: There is no such thing as free energy without enlightenment and liberation. The technologies point to free energy. We are the technology. We are the free energy.

Great yogis like Sri Babaji demonstrate this. Yogananda talked about him. He was the physical demonstration of free energy. He was the physical demonstration of what the Tibetans called the Rainbow Body. He was transparent and transfigured in God realization, the realization of the Buddha Nature.

There are alien cultures and cultures in other universes who happen to be attentive to the events on this planet because this is one of the last archetypal moments. This will not continue anymore. This entire kind of universe is obsolete and will not occur again, because it would be masochism and sadism to allow it to be perpetuated.

There’s a transformation that is occurring. It is about the liberation of all the energy that has been bound up in all of these worlds that are subject to corruption. That is the real physics. This is what is really important.

In the meantime, by understanding that this is true, we can tap into a field that we call Zero Point Vacuum Fluctuation or the quantum ether, and we can generate electrical power. Electrical power exists in complete abundance, without any capital cost for fuel.

Solar technology is so very expensive. We have 108 solar panels in our two facilities on Maui and it takes up a great deal of space. I would love to have ZP Technology here, but the fact of the matter is, if I had that working right now, this place would become a target.

The other side of this story is always the same thing. Just when Light appears on this planet, the subjective forces of darkness manifest with great tenacity. This government was overthrown and nobody knows anything about it. People are silent about it.

On the cover of Newsweek, on September 11, was an article about the secret vote that made Bush president. The article was about a conspiracy in the Supreme Court. Newsweek at that time was willing to challenge the Supreme Court. The Executive Branch of the United States government was about to fall, because it was going to be exposed.

But then the planes hit the World Trade Center.

If Al Gore had been elected, I know the man well enough to know that we would have been in a different economy after four years. We would’ve begun to implement these technologies.

The United States government has, right now, the technology to eliminate the energy crisis. This consoling gesture that George Bush made the other day, about developing hydrogen fuel-cell technology, is just a carrot that he’s dangling before the American people.

Now there are military people who have come forward and are talking about the presence of aliens and alien technology on this planet. They are even talking about the fact that we are making our own flying saucers. This Disclosure Project is extremely important for people to know about (see Secrets from the Stars elsewhere in this issue).

We could be having the greatest economic boom in the history of history. We could actually do that. The technology exists. As early as the 1970s, Henry Kissinger, George Bush, Richard Nixon – all kinds of these guys – knew about this physics. But the downside is that we are on the brink of oblivion.

Parents are paying all this money to educate their children into the lie of physics instead of the truth of physics. Meanwhile, they are taking Prozac. We have legalized the anesthetization of our species. Depression is appropriate.

Adams: What is the purpose of your organization, Project Earth.

Trombly: The original foundation of Project Earth was to reveal to the human species the actual condition of our planet. We’re not being told the truth about it. For the most part, the scientific community doesn’t know the truth and has been so disempowered by their so-called education that they’ve lost vision.

Vision is the only thing that will save us. You have to be able to see where you’re going.

The agreement that I made with the Divine is one that Bucky and I talked about. We would never just illuminate the problem, we would always offer a solution. If we talked about an energy crisis, we would talk about only it in the context of the fact that there is no energy crisis.

Electrical power is already abundantly available, pollution free. We like electricity. We can power our cars and flying saucers with infinite electrical power. We could have so much fun that living on earth wouldn’t be a drag, but would be really great.

Your eyes would be so open that you would walk out the door and you wouldn’t see the smog in Los Angeles, but you’d see the clear, sacred air.

Project Earth is not just about communicating the problems. It’s about the transformation of humanity.

Adam Trombly, Director of Project Earth, is an internationally acknowledged expert in the fields of Physics, Atmospheric Dynamics, Geophysics, Rotating and Resonating Electromagnetic Systems, and Environmental Global Modeling.

Taking the advice of his friend and mentor R. Buckminster Fuller, Adam has maintained a “synergistic, global view” within a multi-disciplinary scientific background. From this perspective, Adam offers unique insights into the changes humankind has effected on our environment, and the adjustments our future requires of us.

>> Video

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

The Internet Is Now Weaponized, And You Are The Target

Inter is a weapon, which is used against you. Sadly a great thing has turned out to be a spying machine that is leading us towards NWO:

Zero Hedge
November 17, 2013

By now, thanks to Edward Snowden, it is common knowledge and not just conspiracy theory, that every bit of information sent out into the wired or wireless ether is scanned, probed, intercepted and ultimately recorded by the NSA and subsequently all such information is and can be used against any US citizen without a court of law (because the president’s pet secret NISA “court” is anything but). Sadly, in a country in which courtesy of peak social networking, exhibitionism has become an art form, the vast majority of Americans not only could not care less about Snowden’s sacrificial revelations, but in fact are delighted the at least someone, somewhere cares about that photo of last night’s dinner. However, it turns out that far from being a passive listener and recorder, the NSA is quite an active participant in using the internet. The weaponized internet.

Because as Wired reports, “The internet backbone — the infrastructure of networks upon which internet traffic travels — went from being a passive infrastructure for communication to an active weapon for attacks.” And the primary benefactor: the NSA – General Keith Alexander massive secret army – which has now been unleashed against enemies foreign, but mostly domestic.

Enter the QUANTUM program….

According to revelations about the QUANTUM program, the NSA can “shoot” (their words) an exploit at any target it desires as his or her traffic passes across the backbone. It appears that the NSA and GCHQ were the first to turn the internet backbone into a weapon; absent Snowdens of their own, other countries may do the same and then say, “It wasn’t us. And even if it was, you started it.”

If the NSA can hack Petrobras, the Russians can justify attacking Exxon/Mobil. If GCHQ can hack Belgacom to enable covert wiretaps, France can do the same to AT&T. If the Canadians target the Brazilian Ministry of Mines and Energy, the Chinese can target the U.S. Department of the Interior. We now live in a world where, if we are lucky, our attackers may be every country our traffic passes through except our own.

Which means the rest of us — and especially any company or individual whose operations are economically or politically significant — are now targets. All cleartext traffic is not just information being sent from sender to receiver, but is a possible attack vector.

… which is basically packet injection:

The QUANTUM codename is deliciously apt for a technique known as “packet injection,” which spoofs or forges packets to intercept them. The NSA’s wiretaps don’t even need to be silent; they just need to send a message that arrives at the target first. It works by examining requests and injecting a forged reply that appears to come from the real recipient so the victim acts on it.

The technology itself is actually pretty basic. And the same techniques that work on on a Wi-Fi network can work on a backbone wiretap. I personally coded up a packet-injector from scratch in a matter of hours five years ago, and it’s long been a staple of DefCon pranks.

Traditionally, packet injections has been used mostly for censorship purposes:

The most infamous use of packet injection prior to the Snowden leaks was censorship, where both internet service providers (ISPs) and the Great Firewall of China injected TCP reset packets (RST) to block undesired traffic. When a computer receives one of these injected RST packets, it closes the connection, believing that all communication is complete.

Although public disclosure forced ISPs to stop this behavior, China continues to censor with injected resets. It also injects the Domain Name System (DNS) — the system all computers use to turn names such as “www.facebook.com” into IP addresses — by inserting a fake reply whenever it sees a forbidden name. (It’s a process that has caused collateral damage by censoring non-Chinese internet traffic).

And user identification, especially in making Tor obsolete. That’s right: all users of Tor believing they hide behind the veil of anonymity – you aren’t.

User cookies, those inserted by both advertising networks and services, also serve as great identifiers for NSA targeting. Yet a web browser only reveals these cookies when communicating with such sites. A solution lies in the NSA’s QUANTUMCOOKIE attack, which they’ve utilized to de-anonymize Tor users.

A packet injector can reveal these cookies by replying to an unnoticed web fetch (such as a small image) with a HTTP 302 redirect pointing to the target site (such as Hotmail). The browser now thinks “hey, should really go visit Hotmail and ask it for this image”. In connecting to Hotmail, it reveals all non-secure cookies to the wiretap. This both identifies the user to the wiretap, and also allows the wiretap to use these cookies.

So for any webmail service that doesn’t require HTTPS encryption, QUANTUMCOOKIE also allows the wiretap to log in as the target and read the target’s mail. QUANTUMCOOKIE could also tag users, as the same redirection that extracts a cookie could also set or modify a cookie, enabling the NSA to actively track users of interest as they move across the network — although there is no indication yet that the NSA utilizes this technique.

But all of the above are largely passive interception and surveillance strategies. Where it gets interesting is when the NSA’s mission is…

User Attack

The NSA has a collection of FOXACID servers, designed to exploit visitors. Conceptually similar to Metasploit’s WebServer browser autopwn mode, these FOXACID servers probe any visiting browser for weaknesses to exploit.

All it takes is a single request from a victim passing a wiretap for exploitation to occur. Once the QUANTUM wiretap identifies the victim, it simply packet injects a 302 redirect to a FOXACID server. Now the victim’s browser starts talking to the FOXACID server, which quickly takes over the victim’s computer. The NSA calls this QUANTUMINSERT.

The NSA and GCHQ used this technique not only to target Tor users who read Inspire (reported to be an Al-Qaeda propaganda magazine in the English language) but also to gain a foothold within the Belgium telecommunication firm Belgacom, as a prelude to wiretapping Belgium phones.

One particular trick involved identifying the LinkedIn or Slashdot account of an intended target. Then when the QUANTUM system observed individuals visiting LinkedIn or Slashdot, it would examine the HTML returned to identify the user before shooting an exploit at the victim. Any page that identifies the users over HTTP would work equally well, as long as the NSA is willing to write a parser to extract user information from the contents of the page.

Other possible QUANTUM use cases include the following. These are speculative, as we have no evidence that the NSA, GCHQ, or others are utilizing these opportunities. Yet to security experts they are obvious extensions of the logic above.

HTTP cache poisoning. Web browsers often cache critical scripts, such as the ubiquitous Google Analytics script ‘ga.js’. The packet injector can see a request for one of these scripts and instead respond with a malicious version, which will now run on numerous web pages. Since such scripts rarely change, the victim will continue to use the attacker’s script until either the server changes the original script or the browser clears its cache.

Zero-Exploit Exploitation. The FinFly “remote monitoring” hacking tool sold to governments includes exploit-free exploitation, where it modifies software downloads and updates to contain a copy of the FinFisher Spyware. Although Gamma International’s tool operates as a full man-in-the-middle, packet injection can reproduce the effect. The injector simply waits for the victim to attempt a file download, and replies with a 302 redirect to a new server. This new server fetches the original file, modifies it, and passes it on to the victim. When the victim runs the executable, they are now exploited — without the need for any actual exploits.

 

Mobile Phone Applications. Numerous Android and iOS applications fetch data through simple HTTP. In particular, the “Vulna” Android advertisement library was an easy target,  simply waiting for a request from the library and responding with an attack that can effectively completely control the victim’s phone. Although Google removed applications using this particular library, other advertisement libraries and applications can present similar vulnerabilities.

 

DNS-Derived Man-in-the-Middle. Some attacks, such as intercepting HTTPS traffic with a forged certificate, require a full man in the middle rather than a simple eavesdropper. Since every communication starts with a DNS request, and it is only a rare DNS resolver that cryptographically validates the reply with DNSSEC, a packet injector can simply see the DNS request and inject its own reply. This represents a capability upgrade, turning a man-on-the-side into a man-in-the-middle.

 

One possible use is to intercept HTTPS connections if the attacker has a certificate that the victim will accept, by simply redirecting the victim to the attacker’s server. Now the attacker’s server can complete the HTTPS connection. Another potential use involves intercepting and modifying email. The attacker simply packet-injects replies for the MX (Mailserver) entries corresponding to the target’s email. Now the target’s email will first pass through the attacker’s email server. This server could do more than just read the target’s incoming mail, it could also modify it to contain exploits.

 

Amplifying Reach. Large countries don’t need to worry about seeing an individual victim: odds are that a victim’s traffic will pass one wiretap in a short period of time. But smaller countries that wish to utilize the QUANTUMINSERT technique need to force victims traffic past their wiretaps. It’s simply a matter of buying the traffic: Simply ensure that local companies (such as the national airline) both advertise heavily and utilize in-country servers for hosting their ads. Then when a desired target views the advertisement, use packet injection to redirect them to the exploit server; just observe which IP a potential victim arrived from before deciding whether to attack. It’s like a watering hole attack where the attacker doesn’t need to corrupt the watering hole.

Can anything be done to prevent the NSA’s internet army from running over a world that spends the bulk of its time in its reaches? Not much:

The only self defense from all of the above is universal encryption. Universal encryption is difficult and expensive, but unfortunately necessary. Encryption doesn’t just keep our traffic safe from eavesdroppers, it protects us from attack. DNSSEC validation protects DNS from tampering, while SSL armors both email and web traffic.

There are many engineering and logistic difficulties involved in encrypting all traffic on the internet, but its one we must overcome if we are to defend ourselves from the entities that have weaponized the backbone.

Alas, in the battle against the NSA, the biggest enemy is not the authoritarian state’s Super Big Brother, but apathy itself. It is that war that is by far the most important one, and which America has already lost.

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

Military Reverses Alien Technology

Sometimes there are floating interesting documents about how military possesses alien technology and here is something interesting:

Drones:

Military Reverses Alien Technology

© 2007 by “Isaac.”

Aliens use symbols to control their technology

Drone-BigBasinCAcu7x

Note: This technology was reverse engineered over 30 years ago. Of course, you are not permitted to know about or utilize this technology. In fact, should you somehow invent or discover this technology and should it become known, your technology will be confiscated for “national security” purposes and you will be told to maintain silence. Should you disobey, you will be dealt with.


Here is the brief introduction. I’m using the alias Isaac, and used to work in what was called the CARET program in the 80’s. During my time there, I worked with a lot of the technology that is clearly at work in the recent drone/strange craft sightings, most notably the “language” and diagrams seen on the underside of each craft. What follows is a lengthy letter about who I am, what I know, and what these sightings are (probably) all about.

The appearance of these photos has convinced me to release at least some of the numerous photographs and photocopied documents I still possess some 20 years later that can explain a great deal about these sightings. On this site you will find some of these. They are available as high resolution scans that I am giving away free, PROVIDED THEY ARE NOT MODIFIED IN ANY WAY AND ARE KEPT TOGETHER ALONG WITH THIS WRITTEN MATERIAL.

Drone-CentralCalifRear

I am also trying to get in touch with the witnesses so far, such as Chad, Rajman, Jenna, Ty, and the Lake Tahoe witness (especially Chad). I have advice for them that may be somewhat helpful in dealing with what they’ve seen and what I would recommend they do with what they know. If you are one of these witnesses, or can put me in touch with them, please contact Coast to Coast AM and let them know.

My Experience with the CARET Program and Extra-terrestrial Technology

Isaac, June 2007

Drone-ChadYellowFlowers

This letter is part of a package I’ve assembled for Coast to Coast AM to distribute to its audience. It is a companion to numerous document and photo scans and should not be separated from them.

You can call me Isaac, an alias I’ve chosen as a simple measure of protection while I release what would be called tremendously sensitive information even by today’s standards. “Sensitive” is not necessarily synonymous with “dangerous”, though, which is why my conscience is clear as I offer this material up for the public. My government has its reasons for its continual secrecy, and I sympathize with many of them, but the truth is that I’m getting old and I’m not interested in meeting my maker one day with any more baggage than necessary! Furthermore, I put a little more faith in humanity than my former bosses do, and I think that a release of at least some of this info could help a lot more than it could hurt, especially in today’s world.

drone-spf33_observationsufo-casebook-forum-650

I should be clear before I begin, as a final note: I am not interested in making myself vulnerable to the consequences of betraying the trust of my superiors and will not divulge any personal information that could determine my identity. However my intent is not to deceive, so information that I think is too risky to share will be simply left out rather than obfuscated in some way (aside from my alias, which I freely admit is not my real name). I would estimate that with the information contained in this letter, I could be narrowed down to one of maybe 30-50 people at best, so I feel reasonably secure.

Some Explanation for the Recent Sightings

For many years I’ve occasionally considered the release of at least some of the material I possess, but the recent wave of photos and sightings has prompted me to cut to the chase and do so now.

drone-pacl-q486-report-cover-halfsize-650B

I should first be clear that I’m not directly familiar with any of the crafts seen in the photos in their entirety. I’ve never seen them in a hangar or worked on them myself or seen aliens zipping around in them. However, I have worked with and seen many of the parts visible in these crafts, some of which can be seen in the Q3-85 Inventory Review scan found at the top of this page. More importantly though, I’m very familiar with the “language” on their undersides seen clearly in photos by Chad and Rajman, and in another form in the Big Basin photos.

One question I can answer for sure is why they’re suddenly here. These crafts have probably existed in their current form for decades, and I can say for sure that the technology behind them has existed for decades before that. The “language”, in fact, (I’ll explain shortly why I keep putting that in quotes) was the subject of my work in years past. I’ll cover that as well.

drone-pacl-q486-report-p2-halfsize-650B

The reason they’re suddenly visible, however, is another matter entirely. These crafts, assuming they’re anything like the hardware I worked with in the 80’s (assuming they’re better, in fact), are equipped with technology that enables invisibility. That ability can be controlled both on board the craft, and remotely. However, what’s important in this case is that this invisibility can also be disrupted by other technology. Think of it like radar jamming.

I would bet my life savings (since I know this has happened before) that these craft are becoming visible and then returning to invisibility arbitrarily, probably unintentionally, and undoubtedly for only short periods, due to the activity of a kind of disrupting technology being set off elsewhere, but nearby. I’m especially sure of this in the case of the Big Basin sightings, were the witnesses themselves reported seeing the craft just appear and disappear. This is especially likely because of the way the witness described one of the appearances being only a momentary flicker, which is consistent with the unintentional, intermittent triggering of such a device.

drone-pacl-q486-report-p3-halfsize-650B

It’s no surprise that these sightings are all taking place in California, and especially the Saratoga/South Bay area. Not far from Saratoga is Mountain View/Sunnyvale, home to Moffett Field and the NASA Ames Research center. Again, I’d be willing to bet just about anything that the device capable of hijacking the cloaking of these nearby craft was inadvertently triggered, probably during some kind of experiment, at the exact moment they were being seen.

Miles away, in Big Basin, the witnesses were in the right place at the right time and saw the results of this disruption with their own eyes. God knows what else was suddenly appearing in the skies at that moment, and who else may have seen it. I’ve had some direct contact with this device, or at least a device capable of the same thing, and this kind of mistake is not unprecedented. I am personally aware of at least one other incident in which this kind of technology was accidentally set off, resulting in the sudden visibility of normally invisible things. The only difference is that these days, cameras are a lot more common!

drone-pacl-q486-report-p4-halfsize-650B

The technology itself isn’t ours, or at least it wasn’t in the 80’s. Much like the technology in these crafts themselves, the device capable of remotely hijacking a vehicle’s clacking comes from a non-human source too. Why we were given this technology has never been clear to me, but it’s responsible for a lot. Our having access to this kind of device, along with our occasionally haphazard experimentation on them, has lead to everything from cloaking malfunctions like this to full-blown crashes. I can assure you that most (and in my opinion all) incidents of UFO crashes or that kind of thing had more to do with our meddling with extremely powerful technology at an inopportune time than it did mechanical failure on their part. Trust me, those things don’t fail unless something even more powerful than them makes them fail (intentionally or not).

Think of it like a stray bullet. You can be hit by one at any time, without warning, and even the shooter didn’t intent to hit you. I can assure you heads are rolling over this as well. If anyone notices a brilliant but sloppy physicist patrolling the streets of Baghdad in the next couple weeks, I’d be willing to guess how he got there. (I kid, of course, as I certainly hope that hasn’t actually happened in this case)

drone-pacl-q486-report-p5-halfsize-650B

I’d now like to explain how it is that I know this.

The CARET Program

drone-pacl-q486-report-p6-halfsize-650B

My story begins the same as it did for many of my co workers, with graduate and post-graduate work at university in electrical engineering. And I had always been interested in computer science, which was a very new field at the time, and my interest piqued with my first exposure to a Tixo during grad school. In the years following school I took a scenic route through the tech industry and worked for the kinds of companies you would expect, until I was offered a job at the Department of Defense and things took a very different turn.

drone-pacl-q486-report-p7-halfsize-650B

My time at the DoD was mostly uneventful but I was there for quite a while. I apparently proved myself to be reasonably intelligent and loyal. By 1984 these qualities along with my technical background made me a likely candidate for a new program they were recruiting for called “CARET”.

Before I explain what CARET was I should back up a little. By 1984, Silicon Valley had been a juggernaut of technology for decades. In the less than 40 years since the appearance of Shockley’s transistor this part of the world had already produced a multi billion dollar computer industry and made technological strides that were unprecedented in other fields, from hypertext and online collaboration in ’68 to the Alto in ’73.

drone-pacl-q486-report-p8-halfsize-650B

Private industry in Silicon Valley was responsible for some of the most incredible technological leaps in history and this fact did not go unnoticed by the US government and military. I don’t claim to have any special knowledge about Roswell or any of the other alleged early UFO events, but I do know that whatever the exact origin, the military was hard at work trying to understand and use the extra-terrestrial artifacts it had in its possession. While there had been a great deal of progress overall, things were not moving as quickly as some would have liked. So, in 1984, the CARET program was created with the aim of harnessing the abilities of private industry in silicon valley and applying it to the ongoing task of understanding extra-terrestrial technology.

drone-pacl-q486-report-p9-halfsize-650B

One of the best examples of the power of the tech sector was Xerox PARC, a research center in Palo Alto, CA. XPARC was responsible for some of the major milestones in the history of computing. While I never had the privilege of working there myself I did know many of the people who did and I can say that they were among the brightest engineers I ever knew.

drone-pacl-q486-photo-1-fullsize-650B

XPARC served as one of the models for the CARET program’s first incarnation, a facility called the Palo Alto CARET Laboratory (PACL, lovingly pronounced “packle” during my time there). This was where I worked, along with numerous other civilians, under the auspices of military brass who were eager to find out how the tech sector made so much progress so quickly. My time at the DoD was a major factor behind why I was chosen, and in fact about 30+ others who were hired around the same time had also been at the Department about as long, but this was not the case for everyone. A couple of my co-workers were plucked right from places like IBM and, at least two of them came from XPARC itself. My DoD experience did make me more eligible for positions of management, however, which is how I have so much of this material in my possession to begin with.

drone-pacl-q486-photo-3-fullsize-650B

So in other words, civilians like myself who had at–at most–some decent experience working for the DoD but no actual military training or involvement, were suddenly finding ourselves in the same room as highly classified extra-terrestrial technology. Of course they spent about 2 months briefing us all before we saw or did anything, and did their best to convince us that if we ever leaked a single detail about what we were being told, they’d do everything short of digging up our ancestors and putting a few slugs in them too just for good measure. It seemed like there was an armed guard in every corner of every room. I’d worked under some pretty hefty NDAs in my time but this was so far out of my depth I didn’t think I was going to last 2 weeks in an environment like that.

But amazingly things got off to a good start. They wanted us, plain and simple, and our industry had shown itself to be so good at what it did that they were just about ready to give us carte blanche.

drone-pacl-q486-photo-4-fullsize-650B

Of course, nothing with the military is ever that simple, and as is often the case they wanted to have their cake and eat it too. What I mean by this is that despite their interest in picking our brains and learning whatever they could from our way of doing things, they still wanted to do it their way often enough to frustrate us.

drone-pacl-lang-analysis-p119-fullsize-650B

At this point I’m going to gloss over the emotional side of this experience, because this letter isn’t intended to be a memoir, but I will say that there’s almost no way to describe the impact this kind of revelation has on your mind. There are very few moments in life in which your entire world view is turned forever upside down, but this was one of them.

I still remember that turning point during the briefing when I realized what he’d just told us, and that I hadn’t heard him wrong, and that it wasn’t some kind of joke. In retrospect the whole thing feels like it was in slow motion, from that slight pause he took just before the term “extra-terrestrial” came out for the first time, to the way the room itself seemed to go off kilter as we collectively tried to grasp what was being said. My reflex kept jumping back and forth between trying to look at the speaker, to understand him better, and looking at everyone else around me, to make sure I wasn’t the only one that was hearing this.

At the risk of sounding melodramatic, it’s a lot like a child learning his parents are divorcing. I never experienced that myself, but a very close friend of mine did when were boys, and he confided in me a great deal about what the experience felt like. A lot of what he said would aptly describe what I was feeling in that room. Here was a trusted authority figure telling you something that you just don’t feel ready for, and putting a burden on your mind that you don’t necessarily want to carry. The moment that first word comes out, all you can think about it is what it was like only seconds ago, and knowing that life is never going to be as simple as it was then. After all that time at the DoD, I thought I at least had some idea of what was going on in the world, but I’d never heard so much as a peep about this. Maybe one day I’ll write more on this aspect, because it’s the kind of thing I really would like to get off my chest, but for now I’ll digress.

drone-pacl-lang-analysis-p120-fullsize-650

Unlike traditional research in this area, we weren’t working on new toys for the air force. For numerous reasons, the CARET people decided to aim its efforts at commercial applications rather than military ones. They basically wanted us to turn these artifacts into something they could patent and sell. One of CARET’s most appealing promises was the revenue generated by these product-ready technologies, which could be funneled right back into black projects. Working with a commercial application in mind was also yet another way to keep us in a familiar mind state. Developing technology for the military is very different than doing so for the commercial sector, and not having to worry about the difference was another way that CARET was very much like private industry.

drone-pacl-lang-analysis-p121-fullsize-650B

CARET shined in the way it let us work the way we were used to working. They wanted to recreate as much of the environment we were used to as they could without compromising issues like security. That meant we got free reign to set up our own workflow, internal management structure, style manuals, documentation, and the like. They wanted this to look and feel like private industry, not the military. They knew that was how to get the best work out of us, and they were right.

But things didn’t go as smoothly when it came to matters like access to classified information. They were exposing what is probably their single biggest secret to a group of people who had never even been through basic training and it was obvious that the gravity of this decision was never far from their minds. We started the program with a small set of extra-terrestrial artifacts along with fairly elaborate briefings on each as well as access to a modest amount of what research had already been completed.

It wasn’t long before we realized we needed more though, and getting them to provide even the smallest amount of new material was like pulling teeth. CARET stood for “Commercial Applications Research for Extra-terrestrial Technology”, but we often joked that it should have stood for “Civilians Are Rarely Ever Trusted.”

drone-pacl-lang-analysis-p122-fullsize-650B

PACL was located in Palo Alto, but unlike XPARC, it wasn’t at the end of a long road in the middle of a big complex surrounded by rolling hills and trees. PACL was hidden in an office complex owned entirely by the military but made to look like an unassuming tech company.

From the street, all you could see was what appeared to be a normal parking lot with a gate and a guard booth, and a 1-story building inside with a fictitious name and logo. What wasn’t visible from the street was that behind the very first set of doors was enough armed guards to invade Poland, and 5 additional underground stories. They wanted to be as close as possible to the kinds of people they were looking to hire and be able to bring them in with a minimum of fuss.

Inside, we had everything we needed. State of the art hardware and a staff of over 200 computer scientists, electrical engineers, mechanical engineers, physicists and mathematicians. Most of us were civilians, as I’ve said, but some were military, and a few of them had been working on this technology already. Of course, you were never far from the barrel of a machine gun, even inside the labs themselves (something many of us never got used to), and bi-weekly tours were made by military brass to ensure that not a single detail was out of line. Most of us underwent extensive searches on our way into and out of the building. There it was, probably the biggest secret in the world, in a bunch of parts spread out on laboratory tables in the middle of Palo Alto so you can imagine their concern.

drone-pacl-lang-analysis-p123-fullsize-650B

One downside to CARET was that it wasn’t as well-connected as other operations undoubtedly were. I never got to see any actual extra-terrestrials (not even photos), and in fact never even saw one of their complete vehicles. 99% of what I saw was related to the work at hand, all of which was conducted within a very narrow context on individual artifacts only. The remaining 1% came from people I met through the program, many of which working more closely with “the good stuff” or had in the past.

In fact, what was especially amusing about the whole affair was the way that our military management almost tried to act as if the technology we were essentially reverse engineering wasn’t extra-terrestrial at all. Aside from the word “extra-terrestrial” itself, we rarely heard any other terms like “alien” or “UFO” or “outer space” or anything. Those aspects were only mentioned briefly when absolutely necessary to explain something. In many cases it was necessary to differentiate between the different races and their respective technology, and they didn’t even use the word “races”. They were referred to simply as different “sources”.

Drone-CUWritingCentralCalif2

 

The Technology

A lot of the technology we worked on was what you would expect, namely antigravity. Most of the researchers on the staff with backgrounds in propulsion and rocketry were military men, but the technology we were dealing with was so out of this world that it didn’t really matter all that much what your background was because none of it applied.

All we could hope to do was use the vocabulary of our respective fields as a way to model the extremely bizarre new concepts we were very slowly beginning to understand as best we could. A rocket engineer doesn’t usually rub elbows much with a computer scientist, but inside PACL, we were all equally mystified and were ready to entertain any and all ideas.

Drone-ChadCUWriting

The physicists made the most headway initially because out of all of our skills, theirs overlapped the most with the concepts behind this technology (although that isn’t saying much!) Once they got the ball rolling though, we began to find that many of the concepts found in computer science were applicable as well, albeit in very vague ways. While I didn’t do a lot of work with the antigrav hardware myself, I was occasionally involved in the assessment of how that technology was meant to interface with its user.

The antigrav was amazing, of course, as were the advances we were making with materials engineering and so on. But what interested me most then, and still amazes me most to this day, was something completely unrelated. In fact, it was this technology that immediately jumped out at me when I saw the Chad and Rajman photos, and even more so in the Big Basin photos.

The “Language” 

I put the word Language in quotes because calling what I am about to describe a “language” is a misnomer, although it is an easy mistake to make.

Their hardware wasn’t operated in quite the same way as ours. In our technology, even today, we have a combination of hardware and software running almost everything on the planet. Software is more abstract than hardware, but ultimately it needs hardware to run it. In other words, there’s no way to write a computer program on a piece of paper, set that piece of paper on a table or something, and expect it to actually do something. The most powerful code in the world still doesn’t actually do anything until a piece of hardware interprets it and translates its commands into actions.

But their technology is different. It really did operate like the magical piece of paper sitting on a table, in a manner of speaking. They had something akin to a language, that could quite literally execute itself, at least in the presence of a very specific type of field. The language, a term I am still using very loosely, is a system of symbols (which does admittedly very much resemble a written language) along with geometric forms and patterns that fit together to form diagrams that are themselves functional. Once they are drawn, so to speak, on a suitable surface made of a suitable material and in the presence of a certain type of field, they immediately begin performing the desired tasks. It really did seem like magic to us, even after we began to understand the principles behind it.

I worked with these symbols more than anything during my time at PACL, and recognized them the moment I saw them in the photos. They appear in a very simple form on Chad’s craft, but appear in the more complex diagram form on the underside of the Big Basin craft as well. Both are unmistakable, even at the small size of the Big Basin photos. An example of a diagram in the style of the Big Basin craft is included with this in a series of scanned pages from the [mistitled] “Linguistic Analysis Primer”. We needed a copy of that diagram to be utterly precise, and it took about a month for a team of six to copy that diagram into our drafting program!

Explaining everything I learned about this technology would fill up several volumes, but I will do my best to explain at least some of the concepts as long as I am taking the time to write all this down.

First of all, you wouldn’t open up their hardware to find a CPU here, and a data bus there, and some kind of memory over there. Their hardware appeared to be perfectly solid and consistent in terms of material from one side to the other. Like a rock or a hunk of metal.

But upon [much] closer inspection, we began to learn that it was actually one big holographic computational substrate – each “computational element” (essentially individual particles) can function independently, but are designed to function together in tremendously large clusters. I say its holographic because you can divide it up into the smallest chunks you want and still find a scaled-down but complete representation of the whole system. They produce a nonlinear computational output when grouped.

So 4 elements working together is actually more than 4 times more powerful than 1. Most of the internal “matter” in their crafts (usually everything but the outermost housing) is actually this substrate and can contribute to computation at any time and in any state. The shape of these “chunks” of substrate also had a profound effect on its functionality, and often served as a “shortcut” to achieve a goal that might otherwise be more complex.

So back to the language. The language is actually a “functional blueprint”. The forms of the shapes, symbols and arrangements thereof is itself functional. What makes it all especially difficult to grasp is that every element of each “diagram” is dependant on and related to every other element, which means no single detail can be created, removed or modified independently. Humans like written language because each element of the language can be understood on its own, and from this, complex expressions can be built. However, their “language” is entirely context-sensitive, which means that a given symbol could mean as little as a 1-bit flag in one context, or, quite literally, contain the entire human genome or a galaxy star map in another.
The ability for a single, small symbol to contain, not just represent, tremendous amounts of data is another counter-intuitive aspect of this concept.

We quickly realized that even working in groups of 10 or more on the simplest of diagrams, we found it virtually impossible to get anything done. As each new feature was added, the complexity of the diagram exponentially grew to unmanageable proportions. For this reason we began to develop computer-based systems to manage these details and achieved some success, although again we found that a threshold was quickly reached beyond which even the supercomputers of the day were unable to keep up. Word was that the extra-terrestrials could design these diagrams as quickly and easily as a human programmer could write a Fortran program. It’s humbling to think that even a network of supercomputers wasn’t able to duplicate what they could do in their own heads. Our entire system of language is based on the idea of assigning meaning to symbols. Their technology, however, somehow merges the symbol and the meaning, so a subjective audience is not needed. You can put whatever meaning you want on the symbols, but their behavior and functionality will not change, any more than a transistor will function differently if you give it another name.

Here’s an example of how complex the process is. Imagine I ask you to incrementally add random words to a list such that no two words use any of the same letters, and you must perform this exercise entirely in your head, so you can’t rely on a computer or even a pen and paper. If the first in the list was, say, “fox”, the second item excludes all words with the letters F, O and X. If the next word you choose is “tree”, then the third word in the list can’t have the letters F, O, X, T, R, or E in it.

As you can imagine, coming up with even a third word might start to get just a bit tricky, especially since you can’t easily visualize the excluded letters by writing down the words. By the time you get to the fourth, fifth and sixth words, the problem has spiraled out of control. Now imagine trying to add the billionth word to the list (imagine also that we’re working with an infinite alphabet so you don’t run out of letters) and you can imagine how difficult it is for even a computer to keep up. Needless to say, writing this kind of thing “by hand” is orders of magnitude beyond the capabilities of the brain.

My background lent itself well to this kind of work though. I’d spent years writing code and designing both analog and digital circuits, a process that at least visually resembled these diagrams in some way. I also had a personal affinity for combinatorics, which served me well as I helped with the design of software running on supercomputers that could juggle the often trillions of rules necessary to create a valid diagram of any reasonable complexity. This overlapped quite a bit with compiler theory as well, a subject I always found fascinating, and in particular compiler optimization, a field that wasn’t half of what it is today back then. A running joke among the linguistics team was that Big-O notation couldn’t adequately describe the scale of the task, so we’d substitute other words for “big”. By the time I left I remember the consensus was “Astronomical-O” finally did it justice.

Like I said, I could go on for hours about this subject, and would love to write at least an introductory book on the subject if it wasn’t still completely classified, but that’s not the point of this letter so I’ll try to get back on track.

The last thing I’d like to discuss is how I got copies of this material, what else I have in my possession, and what I plan to do with it in the future.

My Collection 

I worked at PACL from 1984 to 1987, by which time I was utterly burned out. The sheer volume of details to keep in mind while working with the diagrams was enough to challenge anyone’s sanity, and I was really at the end of my rope with the military’s attitude towards our “need to know”. Our ability to get work done was constantly hampered by their reluctance to provide us with the necessary information, and I was tired of bureaucracy getting in the way of research and development. I left somewhere in the middle of a 3-month bell curve in which about a quarter of the entire PACL staff left for similar reasons.

I was also starting to disagree with the direction the leadership wanted to take as far as the subject of extra-terrestrials went. I always felt that at least some form of disclosure would be beneficial, but as a lowly CARET engineer I wasn’t exactly in the position to call shots. The truth is, our management didn’t even want us discussing non-technical aspects of this subject (such as ethical or philosophical issues), even among ourselves, as they felt it was enough of a breach of security to let civilians like us anywhere near this kind of thing in the first place.

So, about 3 months before I resigned (which was about 8 months before I was really out, since you don’t just walk out of a job like that with a 2 week notice), I decided to start taking advantage of my position. As I mentioned earlier, my DoD experience got me into an internal management role sooner than some of my colleagues, and after about a year of that kind of status, the outgoing searches each night became slightly less rigorous. Normally, we were to empty out any containers, bags or briefcases, then remove our shirt and shoes and submit to a kind of frisking. Work was never allowed to go home with you, no matter who you were. For me, though, the briefcase search was eventually enough.

Even before I actually decided to do it, I was sure that I would be able to sneak certain materials out with me. I wanted to do this because I knew the day would come when I would want to write something like this, and I knew I’d regret it until the day I died if I didn’t at least leave the possibility open to do so.

So I started photocopying documents and reports by the dozen. I’d then put the papers under my shirt around my lower back, tucked enough into my belt to ensure they wouldn’t fall out. I could do this in any one of a few short, windowless hallways on some of the lower floors, which were among the few places that didn’t have an armed guard watching my every move. I’d walk in one end with a stack of papers large enough that when I came out the other end with some of them in my shirt, there wouldn’t be a visible difference in what I was holding. You absolutely cannot be too careful if you’re going to pull a stunt like this. As long as I walked carefully they wouldn’t make a crinkling noise. In fact, the more papers I took, the less noise they made, since they weren’t as flimsy that way. I’d often take upwards of 10-20 pages at once. By the time I was done, I’d made out with hundreds of photocopies, as well as a few originals and a large collection of original photographs.

With this initial letter I have attached high resolution scans of the following:

A page from an inventory review with a photo that appears to depict one of the parts found in the Rajman sighting and parts very similar to the Big Basin craft.

The first 9 pages of one of our quarterly research reports.

Scans of the original photographs used in that report, since the photocopies obscure most of the details.

5 pages from a report on our ongoing analysis of the “language” (inappropriately titled “linguistic analysis”), depicting the kind of diagram just barely visible on the underside of the Big Basin craft.

This material is the most relevant and explanatory I could find on short notice. Now that these are up, IF I decide to release more in the future, I’ll be able to take my time and better search this rather large collection of mine that I’ve sadly never organized. I’m not sure what I’ll be doing with the rest of the collection in the future. I suppose I’ll wait and see how this all plays out, and then play it by ear. There are certainly risks involved in what I’m doing, and if I were to actually be identified and caught, there could be rather serious consequences. However, I’ve taken the proper steps to ensure a reasonable level of anonymity and am quite secure in the fact that the information I’ve so far provided is by no means unique among many of the CARET participants.

Besides, part of me has always suspected that the government relies on the occasional leak like this, and actually wants them to happen, because it contributes to a steady, slow-paced path towards revealing the truth of this matter.

Since Leaving CARET 

Like I said, I left PACL in ’87, but have kept in touch with a great many of my friends and coworkers from those days. Most of us are retired by now, except of course for those of us that went on to get teaching jobs, but a few of us still hear things through the grapevine.

As for CARET itself, I’m not sure what’s become of it. Whether it’s still known by the same name, I’m quite sure it’s still active in some capacity, although who knows where. I heard from a number of people that PACL closed up shop a few years after I left, but I’ve still yet to get a clear answer on why exactly that happened. But I’m sure the kind of work we did there is still going strong. I’ve heard from a lot of friends that there are multiple sites like PACL in Sunnyvale and Mountain View, also disguised to look like unremarkable office space. But this is all second-hand information so you can make of it what you will.

Around 2002 or so I came across Coast to Coast AM and have been hooked ever since. I admit, I don’t take most of the show’s content as anything more than entertainment, but there have been occasions when I could be sure a guest was clearly speaking from experience or a well-informed source. For me, there’s just something very surreal about hearing all this speculation and so-called inside information about UFOs and the like, but being personally able to verify at least some of it as being true or false. It’s also a nightly reminder of how hectic things were in those days, which helps me enjoy my retirement all the more. Knowing I’m not part of that crazy world anymore really is something I enjoy on a daily basis, as much as I miss some of it.

Conclusion 

What I’ve shared so far is only a very small portion of what I have, and what I know. Despite the very sheltered and insulated atmosphere within CARET, I did ultimately learn a great deal from various colleagues, and some of what I learned is truly incredible. I’d also like to say that for what it’s worth, during my time there I never heard anything about invasions, or abductions, or many of the more frightening topics that often pop up on Coast to Coast AM. That’s not to say that none of it is true, but in my time working alongside some of the most well-connected people in this field, it never came up. So at the very least I can say my intent is not to scare anyone. My view on the extra-terrestrial situation is very much a positive, albeit still highly secretive one.

One thing I can definitely say is that if they wanted us gone, we would have been gone a very, very long time ago, and we wouldn’t even have seen it coming. Throw out your ideas about a space war or anything silly like that. We’d be capable of fighting back against them about as much as ants could fight back against a stampede of buffalo. But that’s OK. We’re the primitive race, they’re the advanced races, and that’s just the way it is. The other advanced races let them live through their primitive years back in their day, and there’s no reason to think it will be any different for us. They aren’t in the market for a new planet, and even if they were, there are way too many planets out there for them to care about ours enough to take it by force.

To reiterate my take on the recent sightings, I’d guess that experimentation done in the last couple months on a device that, among other things, is capable of interfering with various crafts onboard invisibility has resulted in a sudden wave of sightings. It may not explain all of the recent events, but like I said, I’d bet my life that’s exactly what happened at Big Basin at least, and it’s probably related in some way to the Chad, Rajman and Tahoe sightings. So, despite all the recent fanfare over this, I’d say this doesn’t mean much. Most importantly, they aren’t suddenly “here”. They’ve been here for a long time, but just happened to turn unintentionally visible for brief periods recently.

Lastly, there are so many people selling books, and DVDs, and doing lectures, and all that, that I would like to reiterate the fact that I am not here to sell anything. The material I’m sharing is free to distribute provided it’s all kept intact and unmodified, and this letter is included. I tend to question the motives of anyone charging money for their information, and will assure you that I will never do such a thing. And in the future, just to cover all the bases, anyone claiming to be me who’s selling a DVD or book is most certainly not going to be me.

Any future releases from me will come from the email address I’ve used to contact Coast to Coast AM, and will be sent to them only. I’d like to make this clear as well to ensure that people can be sure that any future information comes from the same source, although I must be clear: at this time I do not have any future plans for additional information. Time will tell how long I will maintain this policy, but do not expect anything soon. I’d really like to let this information “settle” for a while and see how it goes. If I find out I’m getting an IRS audit tomorrow, then maybe this wasn’t too smart. Until then, I’m going to take it slow. I hope this information has been helpful.

 

 

FURTHER INFORMATION

Editor’s Note: The following important information was sent to me by a reader of this site. Her information rings true to me:

“The drone articles was reeeaally interesting!

Two thoughts on Isaac from a personal perspective. First, The power described in language: I’ve read many of his comments before, but in a book written about five thousand years ago. This caught my interest. This man struggles to describe concepts echoed in an ancient hebrew manuscript about the power in the hebrew language that God used to create the earth. (The Book of Creation, Sefer Yetzirah).

These are the quotes that I found most startling:

A language, that could quite literally execute itself, at least in the presence of a very specific type of field.

Geometric forms and patterns that fit together to form diagrams that are themselves functional.

Holographic because you can divide it up into the smallest chunks you want and still find a scaled-down but complete representation of the whole system.

Every element of each “diagram” is dependent on and related to every other element, which means no single detail can be created, removed or modified independently.

“Language” is entirely context-sensitive, which means that a given symbol could mean as little as a 1-bit flag in one context, or, quite literally, contain the entire human genome or a galaxy star map in another.

The ability for a single, small symbol to contain, not just represent, tremendous amounts of data.

Their technology, however, somehow merges the symbol and the meaning, so a subjective audience is not needed. You can put whatever meaning you want on the symbols, but their behavior and functionality will not change, any more than a transistor will function differently if you give it another name.

Anyone who has studied the mysterious side of Hebrew or Sanskrit would recognize this. I’ve also read accounts of the first ten commandments–that Moses broke–being described as holographic and fractal, yet in language terms that struggle to portray this long before these ideas existed commonly.

The letters rose up and rotated, and within each letter were reams of other information that could apparently be accessed. Like a compact computer. (The second set, however, was not. Just stone). So Isaac describes an anomalous language and yet he does not know he is describing something that has been precisely written about long before, as well as after, Noah’s flood. Pretty amazing. Watcher technology.

Second thought: regarding THAT technology. Isaac’s material reminds me of a quote from a second ancient manuscript. This is what God said to the fallen Watchers (advanced non human beings) who were charged with looking after mankind but blew it because of lust, selfishness, and rebellion.

1 Enoch, Chapter 16;2-3

  1. 2 And now as to the watchers who have sent thee to intercede for them, who had been aforetime in heaven,

vs.3 (say to them): “You have been in heaven, but all the mysteries had not yet been revealed to you, and you knew worthless ones, and these in the hardness of your hearts you have made known to the women, and through these mysteries women and men work much evil on earth.” 4 Say to them therefore: ” You have no peace.”‘

http://wesley.nnu.edu/biblical_studies/noncanon/ot/pseudo/enoch.htm

(End Quote)

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

Could this be the greatest mind control project ever?

I have some older postings about project Blue Beam, but now I found some new information, what ties it to the NWO and Illuminati cover-up.  It also is connected to fake rapture they are pushing to convince, that aliens or different kind of messiahs have arrived. Here are the articles made before:

>> http://www.auricmedia.net/project-blue-beamalien-technology-2014/

>> http://www.auricmedia.net/silenced-people-serge-monast-project-blue-beam-murdered/

And here is the new info:

Could this be the greatest mind control project ever?

The NASA Blue Beam Project is the prime directive for the new world order’s absolute control over the populations of the entire earth. I would suggest you investigate this information carefully before dismissing it as fanatic lunacy. If we go further in the different reports we have presented, we find that the mind-control operations and technology include a transmitter that broadcasts at the same frequency as the human nervous-system, which transmitter is manufactured by the Loral Electro-Optical System in Pasadena, California.

Loral, a major defense contractor, has previously conducted research on directed energy weapons for Lt. Gen. Leonard Perez of the U. S. Air Force who was searching for a weapon that could implant messages into the minds of the enemy while urging his own troops on to superhuman deeds of valor! The device employs electromagnetic radiation of gigahertz frequencies [microwaves] pulsed at extremely low frequencies (ELF). It is used to torture people both physically and mentally from a distance.

Weapons of this type are thought to have been used against a British woman protesting the presence of American Cruise Missiles at Greenham Common Airbase during the 1970s. This weapon can be used to induce total sensory deprivation by broadcasting signals into the auditory nerve at such high power that it blocks the ability of the individual to hear themselves think!

The process employed by such ELF technology are described in various U. S. Defense Department publications, including one entitled, ‘ The Electromagnetic Spectrum and Low Intensity Conflict,‘ by Captain Paul E. Tyler, Medical Commandant, U. S. Navy, which is included in a collection entitled, ‘Low Intensity Conflict and Modern Technology Edict,’ by Lt. Col David G. Dean, USAF.

The paper was delivered in 1984 and the collection published 1986 by Air University Press, Maxwell Airforce Base, Alabama. Another pulse microwave device can deliver audible signals directly to an individual while remaining undetectable to anyone else. The technology is very simple and can be built by using an ordinary police radar gun. The microwave beam generated by the device is modulated at audio frequencies and can broadcast messages directly into the brain. Now here we come to the NASA Blue Beam Project. The broadcasting of subliminal two-way communication and images from the depths of space correspond directly to that kind of technology.

In his book, ‘The Body Electric,’ Nobel Prize nominee Dr. Robert O. Becker describes a series of experiments conducted in the early 1960s by Allen Frie where this phenomena was demonstrated as well as later experiments conducted in 1973 at the Walter Reed Army Institute of Research by Dr. Joseph C. Sharp who personally underwent tests in which he proved he could hear and understand messages delivered to him in an echo-free isolation chamber via a pulsed microwave audiogram which is an analog of the word’s sound vibration beamed into his brain.

Becker then goes on to state, ‘Such a device has obvious application for covert operations designed to drive a target crazy with unknown voices or deliver undetectable instructions to a programmed assassin.”

Now figure out when we hear that voice from the new world messiah who would be speaking from space to all of the sane (?) people of the earth who might give instructions to zealots and religious fanatics, we would see hysteria and social mayhem on a scale never witnessed before on this planet. No police forces in the world, even as a combined front, could deal with the disorder that will follow!

A 1978 book entitled, ‘Microwave Auditory Effect and Application,’ by James C. Lynn describes how audible voices can be broadcast directly into the brain. This technology could actually allow the blind to see and the deaf to hear. Instead, it has been turned into a weapon to enslave the world.

Allen Frie also reports that he could speed up, slow down or stop the hearts of isolated frogs by synchronizing the pulsed rate of a microwave beam with the heart itself. According to Dr. Robert Becker, similar results have been obtained using live frogs, which shows that it is technically feasible to produce heart attacks with rays designed to penetrate the human chest.

[EDITOR’S NOTE: Both the author of this report and his colleague died of ‘heart attacks’ only days apart. I should mention also that Dr. Becker does NOT participate in such research.]

It has been demonstrated that focused ultra high frequency UHF electromagnetic energy beams can be used to induce considerable agitation and muscular activity or induce muscular weakness and lethargy. Microwaves can also be used to burn human skin and aid the effect of drugs, bacteria and poisons or affect the function of the entire brain. These effects were all revealed at length by the CIA on September 21, 1977 in testimony before the Subcommittee on Health and Scientific Research.

Dr. Sidney Gottlieb who directed the MK-Ultra program at that time was forced to discuss the scope of the CIA’s research to find techniques of activation of the human organism by remote electronic means. So this is something that exists right now, that has been pursued to its highest degree, that can be used from space to reach any person, anyplace on the face of the earth.

If we go deeper in that process of mind control over the people we find that the equipment and technology has been used to influence politics in a much more direct fashion. Michael Dukakis, the Democrat candidate running against George Bush in the 1988 election was targeted with microwave technology in order to impede his public speaking performance once the public opinion polls showed he posed a serious threat to Bush’s election prospects.

He also claims that the equipment was used against Kitty Dukakis and drove her to the brink of suicide. In the Disneyland world of U. S. politics, a presidential candidate with problems such as these, would obviously lose their race to the White House. In the December 1980 edition of the U. S. Army Journal, called the Military Review, a column by Lt. Col John B. Alexander, entitled, ‘The New Mental Battlefield: Beam Me Up, Spock,’ provides further insight into the technical capabilities at the disposal of the comptroller. He writes:

“Several examples will demonstrate areas in which progress have been made. The transference of energy from one organism to another; the ability to heal or cause disease to be transmitted over a distance, thus inducing illness or death from no apparent cause; telepathic behavior modification which includes the ability to induce hypnotic states up to a distance of 1,000 kilometers have been reported.

The use of telepathic hypnosis also holds great potential. This capability could allow agents to be deeply planted with no conscious knowledge of their programming. In movie terms, the Manchurian Candidate lives, and does not even require a telephone call. ‘Other mind-to-mind induction techniques are being considered.

If perfected this capability could allow the direct transference of thought via telepathy from one mind or group of minds to a select target audience. The unique factor is that the recipient will not be aware that thought has been implanted from an external source. He or she will believe the thoughts are original.”

This is exactly what we were talking about.

The third step in the NASA Blue Beam Project is called the Telepathic Electronic Two-Way Communication. Lt. Col John Alexander’s article continues:

“If it is possible to feed artificial thought into the multigenic field via satellite, the mind control of the entire planet is now possible. An individual’s only resistance would be to constantly question the motivation behind their thoughts and not act upon thoughts which they consider to be outside their own ideological, religious and moral boundaries.'”

Once again, it is wise to consider how television, advertising, modern education and various types of social pressure are used to manipulate those boundaries. It has been reported by Lt. Col Alexander who said, in the summary of his Military Review article,

‘The information on those kinds of technologies presented here would be considered by some to be ridiculous since it does not conform to their view of reality. But some people still believe the world is flat.’

Now, this means a lot, because if people do not believe this kind of technology is possible, or that it is science fiction, those people put themselves in great jeopardy, because on the night when those thousand stars will shine from space, during the night when the new messiah will be presented to the world, they will not be prepared and will have no time to prepare to save themselves against that kind of technology. They don’t believe and they won’t take time to prepare.

(This is exactly what happens to people who are convinced by Satan into believing that he doesn’t exist, so they have no defense against him. – JAH.)

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

Superstructure Vehicles

Hello! We were on vacation, but now we are back in the game and postings continue so keep on reading www.auricmedia.net. I stumbled this article about odd behemoth space vehicle and as always you decide is it true or just a hoax:

superstructure-vehicle-hokaido-japan-dry-dock-2

(click to enlarge)

[ IMAGE ( above ) Earth Escape Ship for Living With A Star ( LWS ) Program involving Exoplanetary Colonization utilizing a Superstructure Vehicle designed for Biological Life Support ( Courtesy: Kentron Intellect Research ). Click on Image to Enlarge ]
Superstructure Vehicles
by, Concept Activity Research Vault ( CARV )
April 16, 2009
CALIFORNIA, Los Angeles – April 16, 2009 – The United States Department of Defense Emerging Special Projects new superwarfighter ( larger than an aircraft carrier ) appears to be a strategic tactical multi-environmental ( aerial-apace and ocean-going ) craft employing a combination of 21st Century warfighter technologies ( e.g. advanced stealth applications and advanced high-energy weapon delivery systems ) rather than legacy – landing crafts laden with tube and ammunition weapon systems.
Pre-Legacy Battlestar Gallactica Clunker
The long-range submersible space vehicle [ click to enlarge photo ( above ) ] is obviously designed for strategic advanced stealth pursuits where it will encounter ‘extreme heat’ as a factor [ NOTE: evidenced from craft surface heat shield tiles, capable of space re-entry or traversing Earth’s inner space near the core with ultra deep sea re-surfacing ]. The craft size appears suitable for many passengers. Undoubtedly large power generation systems perhaps, capable of hosting a new type of Directed High-Energy Weapon ( DEW ) or something more advanced when in a salt water environment as a laser would be suicidal but maybe not a high-energy Sonic Flocculator ( not using laser light heat to burn or melt ) but ‘ultra low frequency sound’ to shatter molecular structures of objects it may encounter.
The behemoth vessel / craft was believed secretly dry docked [ click to enlarge photo ( above ) ] inside a shuddered offshore facility near Hokaido, Japan.
A close-up view [ click to enlarge photo ( above ) ] of this superstructure submarine space vehicle reveals several small-framed ‘asian men’ – wearing ‘white laboratory coats’ and hard-hat helmuts – whom are positioned directly beneath this large craft that appears in-size somewhat like the ‘mother ship’ publicly seen in the film and television series “BattleStar Gallactica.”
Coupling its ‘heatshield tiles’ and sheer ‘behemoth size’, could this particular submarine space vehicle have been purposely designed to exodus Earth carrying onboard a great number of passengers? Very large ‘observation windows’ [ click to enlarge photo ( above ) ] are seen at the design juncture where the craft’s ‘forward wings’ – at the ‘leading-edge’ portion – meets the ‘fuselage’.
The superstructure submarine space vehicle must have remained secret – for a period of many years – with its development having been derived from a multi-national source of private placement project ( PPP ) funding that could only have been sourced from such outside the purview of any government budget oversight.
Perhaps, a contingent of multi-national joint venture capitalists funded this superstructure submarine space vehicle, much in the same fashion as only a few saw something similar along the lines of the Bill Gates entrepeneur inspired “Eye-In-The-Sky” ’52 satellite constellation’ PPP investment program found accepted by high-net worth Arab businessmen investors and a few others in the secret program project to ‘obtain superiority over internet broadband delivery’ utilizing the U.S. National Security Agency ( NSA ) firm TELEDESIC HOLDINGS LIMITED ( UK ) that coordinate investments in such.
Who or what other entity could otherwise fund and at the same time technologically engineer development of such a behemoth vehicle?
For years speculation ( e.g. resembling computer graphic interface art from some video game craft ) has arisen about the superstructure vessel ( above ) photo validity, but nothing could be further from that wild speculation than the truth that came from a source ( extremely close to the photo ) informing Unwanted Publicity Intelligence the superstructure vehicle is ‘not from any video game’ and ‘not a hoax’ but ‘was passed to someone who was asked to pass it on as such. Is the general public ( gamers included ) undergoing an ‘advanced public indoctrination’ or ‘advanced public acceptance test’?
There is no shortage of new advanced concept designs for various crafts, especially for a lighter-than-air dirigible (aka) airship (aka) blimp ( see below ):

 

[ PHOTOS ( immediately above ): WhiteCloud Airship II; believed-designed by Jean-Marie Massaud for the Office National d’Etudes et de Recherche Aérospatiale ( click image to enlarge ) ]

Submitted for review and commentary by,

Kentron Intellect Research Vault ( KIRV )
E-MAIL: KentronIntellectResearchVault@Gmail.Com
WWW: http://KentronIntellectResearchVault.WordPress.Com

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

ECHELON – America’s Secret Global Surveillance Network

I’m pretty fed up with all this spying. Governments, corporations individuals, every day gadgets are just spying and spying us 24/7. And this is their mother, Skynet aka ECHELON:

Executive Summary

In the greatest surveillance effort ever established, the US National Security Agency (NSA) has created a global spy system, codename ECHELON, which captures and analyzes virtually every phone call, fax, email and telex message sent anywhere in the world.

ECHELON is controlled by the NSA and is operated in conjunction with,

  • the Government Communications Head Quarters (GCHQ) of England
  • the Communications Security Establishment (CSE) of Canada
  • the Australian Defense Security Directorate (DSD)
  • the General Communications Security Bureau (GCSB) of New Zealand

These organizations are bound together under a secret 1948 agreement, UKUSA, whose terms and text remain under wraps even today.

The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELONDictionary”) that will prompt the computers to flag the message for recording and transcribing for future analysis.

Intelligence analysts at each of the respective “listening stations” maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept.

But apart from directing their ears towards terrorists and rogue states, ECHELON is also being used for purposes well outside its original mission.

The regular discovery of domestic surveillance targeted at American civilians for reasons of “unpopular” political affiliation or for no probable cause at all in violation of the First, Fourth and Fifth Amendments of the Constitution – are consistently impeded by very elaborate and complex legal arguments and privilege claims by the intelligence agencies and the US government.

The guardians and caretakers of our liberties, our duly elected political representatives, give scarce attention to these activities, let alone the abuses that occur under their watch.

Among the activities that the ECHELON targets are:

Political spying:

Since the close of World War II, the US intelligence agencies have developed a consistent record of trampling the rights and liberties of the American people.

Even after the investigations into the domestic and political surveillance activities of the agencies that followed in the wake of the Watergate fiasco, the NSA continues to target the political activity of “unpopular” political groups and our duly elected representatives. One whistleblower charged in a 1988 Cleveland Plain Dealer interview that, while she was stationed at the Menwith Hill facility in the 1980s, she heard real-time intercepts of South Carolina Senator Strom Thurmond.

A former Maryland Congressman, Michael Barnes, claimed in a 1995 Baltimore Sun article that under the Reagan Administration his phone calls were regularly intercepted, which he discovered only after reporters had been passed transcripts of his conversations by the White House. One of the most shocking revelations came to light after several GCHQ officials became concerned about the targeting of peaceful political groups and told the London Observer in 1992 that the ECHELON dictionaries targeted Amnesty International, Greenpeace, and even Christian ministries

Commercial espionage:

Since the demise of Communism in Eastern Europe, the intelligence agencies have searched for a new justification for their surveillance capability in order to protect their prominence and their bloated budgets.

Their solution was to redefine the notion of national security to include economic, commercial and corporate concerns. An office was created within the Department of Commerce, the Office of Intelligence Liaison, to forward intercepted materials to major US corporations.

In many cases, the beneficiaries of this commercial espionage effort are the very companies that helped the NSA develop the systems that power the ECHELON network.

This incestuous relationship is so strong that sometimes this intelligence information is used to push other American manufacturers out of deals in favor of these mammoth US defense and intelligence contractors, who frequently are the source of major cash contributions to both political parties.

While signals intelligence technology was helpful in containing and eventually defeating the Soviet Empire during the Cold War, what was once designed to target a select list of communist countries and terrorist states is now indiscriminately directed against virtually every citizen in the world.

The European Parliament is now asking whether the ECHELON communications interceptions violate the sovereignty and privacy of citizens in other countries. In some cases, such as the NSA’s Menwith Hill station in England, surveillance is conducted against citizens on their own soil and with the full knowledge and cooperation of their government.

This report suggests that Congress pick up its long-neglected role as watchdog of the Constitutional rights and liberties of the American people, instead of its current role as lap dog to the US intelligence agencies.

Congressional hearings ought to be held, similar to the Church and Rockefeller Committee hearings held in the mid-1970s, to find out to what extent the ECHELON system targets the personal, political, religious, and commercial communications of American citizens. The late Senator Frank Church warned that the technology and capability embodied in the ECHELON system represented a direct threat to the liberties of the American people.

Left unchecked, ECHELON could be used by either the political elite or the intelligence agencies themselves as a tool to subvert the civil protections of Constitution and to destroy representative government in the United States.


Introduction

The culmination of the Cold War conflict brought home hard realities for many military and intelligence agencies who were dependent upon the confrontation for massive budgets and little civilian oversight.

World War II Allied political and military alliances had quickly become intelligence alliances in the shadow of the Iron Curtain that descended upon Eastern Europe after the war.

But for some intelligence agencies the end of the Cold War just meant a shift in mission and focus, not a loss of manpower or financial resources. One such US governmental organization is the National Security Agency (NSA).

Despite the disintegration of Communism in the former Soviet Union and throughout Eastern Europe, the secretive NSA continues to grow at an exponential rate in terms of budget, manpower and spying abilities.

Other countries have noticed the rapid growth of NSA resources and facilities around the world, and have decried the extensive spying upon their citizens by the US.

A preliminary report released by the European Parliament in January 1998 detailed research conducted by independent researchers that uncovered a massive US spy technology network that routinely monitors telephone, fax and email information on citizens all over the world, but particularly in the European Union (EU) and Japan.

Titled “An Appraisal of Technologies of Political Control,” <1> this report, issued by the Scientific and Technological Options Assessment (STOA) committee of the European Parliament, caused a tremendous stir in the establishment press in Europe.

At least one major US media outlet, The New York Times,<2> covered the issuance of the report as well.

The STOA report also exposed a festering sore spot between the US and our EU allies. The widespread surveillance of citizens in EU countries by the NSA has been known and discussed by European journalists since 1981. The name of the system in question is ECHELON, and it is one of the most secretive spy systems in existence.

ECHELON is actually a vast network of electronic spy stations located around the world and maintained by five countries: the US, England, Canada, Australia, and New Zealand. These countries, bound together in a still-secret agreement called UKUSA, spy on each other’s citizens by intercepting and gathering electronic signals of almost every telephone call, fax transmission and email message transmitted around the world daily.

These signals are fed through the massive supercomputers of the NSA to look for certain keywords called the ECHELON “dictionaries.”

Most of the details of this mammoth spy system and the UKUSA agreement that supports it remain a mystery. What is known of ECHELON is the result of the efforts of journalists and researchers around the world who have labored for decades to uncover the operations of our government’s most secret systems.

The 1996 publication of New Zealand journalist Nicky Hager’s book, Secret Power: New Zealand’s Role in the International Spy Network,<3> provided the most detailed look at the system and inflamed interest in ECHELON as well as the debate regarding its propriety.

This paper examines the expanse of the ECHELON system along with the intelligence agreements and exchanges that support it. The operation of ECHELON serves the NSA’s goal of spying on the citizens of other countries while also allowing them to circumvent the prohibition on spying on US citizens. ECHELON is not only a gross violation of our Constitution, but it violates the good will of our European allies and threatens the privacy of innocent civilians around the world.

The existence and expansion of ECHELON is a foreboding omen regarding the future of our Constitutional liberties.

If a government agency can willingly violate the most basic components of the Bill of Rights without so much as Congressional oversight and approval, we have reverted from a republican form of government to tyranny.


The Parties

The success of the Allied military effort in World War II was due in no small part to successes in gathering enemy intelligence information and cracking those military and diplomatic messages.

In addition, the Allied forces were able to create codes and encryption devices that effectively concealed sensitive information from prying Axis Power eyes. These coordinated signal intelligence (SIGINT) programs kept Allied information secure and left the enemies vulnerable.

But at the close of the conflict, a new threatening power – the Soviet Union – was beginning to provoke the Cold War by enslaving Eastern Europe. These signal intelligence agencies now had a new enemy toward which to turn their electronic eyes and ears to ensure that the balance of power could be maintained. The volleys of electronic hardware and espionage that would follow for forty years would be the breeding ground of the ECHELON spy system.

The diplomatic foundation that was the genesis of ECHELON is the UKUSA agreement. The agreement has its roots in the BRUSA COMINT (communications intelligence) alliance formed in the early days of World War II and ratified on May 17, 1943 by the United Kingdom and the United States.<4>

The Commonwealth SIGINT Organization formed in 1946-47 brought together the UK, Canada, Australia and New Zealand post-war intelligence agencies.<5>

Forged in 1947 between the US and UK, the still-secret UKUSA agreement defined the relations between the SIGINT departments of those various governments. Direct agreements between the US and these agencies also define the intricate relationship that these organizations engage in.

Foremost among those agencies is the US National Security Agency (NSA), which represents the American interest. The NSA is designated as the “First Party to the Treaty.”

The Government Communications Headquarters (GCHQ) signed the UKUSA agreement on behalf of the UK and its Commonwealth SIGINT partners.

This brought Australia’s Defense Signals Directorate (DSD), the Canadian Communications Security Establishment (CSE) and New Zealand’s Government Communications Security Bureau (GCSB) into the arrangement. While these agencies are bound by additional direct agreements with the US and each other, these four countries are considered the “Second Parties to the (UKUSA) Treaty.”

Third Party members include Germany, Japan, Norway, South Korea and Turkey. There are sources that indicate China may be included in this group on a limited basis as well.<6>


National Security Agency (US)

The prime mover in the UKUSA arrangement is undeniably the National Security Agency (NSA).

The majority of funds for joint projects and facilities (discussed below) as well as the direction for intelligence gathering operations are issued primarily through the NSA.

The participating agencies frequently exchange personnel, divide up intelligence collection tasks and establish common guidelines for classifying and protecting shared information. However, the NSA utilizes its role as the largest spy agency in the world to have its international intelligence partners do its bidding.

President Harry Truman established the NSA in 1952 with a presidential directive that remains classified to this day. The US government did not acknowledge the existence of the NSA until 1957. Its original mission was to conduct the signal intelligence (SIGINT) and communications security (COMSEC) for the US.

President Ronald Reagan added the tasks of information systems security and operations security training in 1984 and 1988 respectively. A 1986 law charged the NSA with supporting combat operations for the Department of Defense.<7>

Headquartered at Fort George Meade, located between Washington D.C. and Baltimore, Maryland, the NSA boasts the most enviable array of intelligence equipment and personnel in the world. The NSA is the largest global employer of mathematicians, featuring the best teams of code-makers and code-breakers ever assembled.

The latter’s job is to crack the encryption codes of foreign and domestic electronic communications, forwarding the revealed messages to their enormous team of skilled linguists to review and analyze the messages in over 100 languages. The NSA is also responsible for creating the encryption codes that protect the US government’s communications.

In its role as gang leader for UKUSA, the NSA is primarily involved with creating new surveillance and codebreaking technology, directing the other cooperating agencies to their targets, and providing them with training and tools to intercept, process and analyze enormous amounts of signals intelligence.

By possessing what is arguably the most technologically advanced communications, computer and codebreaking equipment of any government agency in the world, the NSA serves as a competent and capable taskmaster for UKUSA.


The ECHELON Network

The vast network created by the UKUSA community stretches across the globe and into the reaches of space.

Land-based intercept stations, intelligence ships sailing the seven seas and top-secret satellites whirling twenty thousand miles overhead all combine to empower the NSA and its UKUSA allies with access to the entire global communications network. Very few signals escape its electronic grasp.

Having divided the world up among the UKUSA parties, each agency directs its electronic “vacuum-cleaner” equipment towards the heavens and the ground to search for the most minute communications signals that traverse the system’s immense path.

  • the NSA facilities in the US cover the communications signals of both American continents
  • the GCHQ in Britain is responsible for Europe, Africa and Russia west of the Ural Mountains
  • the DSD in Australia assists in SIGINT collection in Southeastern Asia and the Southwest Pacific and Eastern Indian Ocean areas
  • the GSCB in New Zealand is responsible for Southern Pacific Ocean collections, particularly the South Pacific island nations group
  • the CSE in Canada handles interception of additional northern Russian, northern European and American communications.<8>


The Facilities

The backbone of the ECHELON network is the massive listening and reception stations directed at the Intelsat and Inmarsat satellites that are responsible for the vast majority of phone and fax communications traffic within and between countries and continents.

The twenty Intelsat satellites follow a geo-stationary orbit locked onto a particular point on the Equator.<9>

These satellites carry primarily civilian traffic, but they do additionally carry diplomatic and governmental communications that are of particular interest to the UKUSA parties.

Originally, only two stations were responsible for Intelsat intercepts: Morwenstow in England and Yakima in the state of Washington. However, when the Intelsat 5 series was replaced with the Intelsat 701 and 703 satellites, which had much more precise transmission beams that prohibited reception of Southern Hemisphere signals from the Yakima base in the Northern Hemisphere, additional facilities were constructed in Australia and New Zealand.<10>

Today, the Morwenstow station directs its ears towards the Intelsats traversing the atmosphere above the Atlantic and Indian Oceans and transmitting to Europe, Africa and western parts of Asia. The Yakima station, located on the grounds of the Yakima Firing Station, targets Pacific Ocean communications in the Northern Hemisphere as well as the Far East.

Another NSA facility at Sugar Grove, West Virginia, covers traffic for the whole of North and South America.

A DSD station at Geraldton, Australia, and the Waihopai, New Zealand GCSB facility cover Asia, the South Pacific countries and the Pacific Ocean. An additional station on Ascension Island in the Atlantic Ocean between Brazil and Angola is suspected of covering the Atlantic Intelsat’s Southern Hemisphere communications.<11>

Non-Intelsat satellites are monitored from these same stations, as well as from bases in Menwith Hill, England; Shoal Bay, Australia; Leitrim, Canada; Bad Aibling, Germany, and Misawa, Japan. These satellites typically carry Russian and regional communications.<12>

It is known that the Shoal Bay facility targets a series of Indonesian satellites and that the Leitrim station intercepts communications from Latin American satellites, including the Mexican telephone company’s Morelos satellite.<13>

Several dozen other radio listening posts operated by the UKUSA allies dot the globe as well, located at military bases on foreign soil and remote spy posts. These stations played a critical role in the time prior to the development of satellite communications because much of the world’s communications traffic was transmitted on radio frequency bands.

Particularly in the high-frequency (HF) range, radio communications continue to serve an important purpose despite the widespread use of satellite technology because their signals can be transmitted to military ships and aircraft across the globe. Shorter range very high-frequencies (VHF) and ultra high-frequencies (UHF) are also used for tactical military communications within national borders.

Major radio facilities in the UKUSA network include,

  • Tangimoana, New Zealand
  • Bamaga, Australia
  • the joint NSA/GCHQ facility at the Indian Ocean atoll of Diego Garcia <14>

 

UK facilities

 A separate high frequency direction finding (HFDF) network intercepts communications signals for the unique purpose of locating the position of ships and aircraft. While these stations are not actually involved in the analysis of messages, they play a critical role in monitoring the movements of mobile military targets.

The Canadian CSE figures prominently in the HFDF UKUSA network, codenamed CLASSIC BULLSEYE and hosting a major portion of the Atlantic and Pacific stations that monitored Soviet ship and submarine movements during the Cold War.

Stations from Kingston and Leitrim (Ontario) to Gander (Newfoundland) on the Atlantic side, to Alert (Northwest Territories) located at the northernmost tip of Canada on the Arctic Ocean that listens to the Russian submarine bases at Petropavlovsk and Vladivostok, and finally to Masset (British Columbia) in the Pacific – monitor shipping and flight lanes under the direction of the NSA.<15>

The CSE also maintains a small contingent at Lackland Air Force Base in San Antonio, Texas, which probably monitors Latin American communications targets.

Another major support for the ECHELON system is the US spy satellite network and its corresponding reception bases scattered about the UKUSA empire. These space-based electronic communications “vacuum cleaners” pick up radio, microwave and cell phone traffic on the ground.

They were launched by the NSA in cooperation with its sister spy agencies, the National Reconnaissance Office (NRO) and the Central Intelligence Agency (CIA).

  • The Ferret series of satellites in the 1960s
  • The Canyon, Rhyolite and Aquacade satellites in the 1970s
  • The Chalet, Vortex, Magnum, Orion, and Jumpseat series of satellites in the 1980s,

…have given way to the new and improved Mercury, Mentor and Trumpet satellites during the 1990s.
 

Table I. US Spy Satellites in Current Use

Satellite
No.
Orbit
Manufacturer
Purpose
Advanced KH-11
3
200 miles
Lockheed Martin
5-inch resolution spy photographs
LaCrosse Radar Imaging
2
200-400 miles
Lockheed Martin
3 to 10-foot resolution spy photographs
Orion/Vortex
3
22,300 miles
TRW
Telecom surveillance
Trumpet
2
200-22,300 miles
Boeing
Surveillance of cellular phones
Parsae
3
600 miles
TRW
Ocean surveillance
Satellite Data Systems
2
200-22,300 miles
Hughes
Data Relay
Defense Support Program
4+
22,300 miles
TRW/Aerojet
Missile early warning
Defense Meteorological Support Program
2
500 miles
Lockheed Martin
Meteorology, nuclear blast detection

 

Source: MSNBC<16>

 These surveillance satellites act as giant scoops picking up electronic communications, cell phone conversations and various radio transmissions.

The downlink stations that control the operations and targeting of these satellites are under the exclusive control of the United States, despite their location on foreign military bases.

The two primary downlink facilities are at Menwith Hill, England, and Pine Gap, Australia.


Inside Menwith Hill

The Menwith Hill facility is located in North Yorkshire near Harrogate, England.

The important role that Menwith Hill plays in the ECHELON system was recognized by the recent European Parliament STOA report:

Within Europe, all email, telephone and fax communications are routinely intercepted by the United States National Security Agency, transferring all target information from the European mainland via the strategic hub of London then by satellite to Fort Meade in Maryland via the crucial hub at Menwith Hill in the North York Moors of the UK.<17>

The existence and importance of the facility was first brought to light by British journalist and researcher Duncan Campbell in 1980.<18>

Today, it is the largest spy station in the world, with over twenty-five satellite receiving stations and 1,400 American NSA personnel working with 350 UK Ministry of Defense staff on site.

After revelations that the facility was coordinating surveillance for the vast majority of the European continent, the base has become a target for regular protests organized by local peace activists. It has also become the target of intense criticism by European government officials who are concerned about the vast network of civilian surveillance and economic espionage conducted from the station by the US.<19>

The beginnings of Menwith Hill go back to December 1951, when the US Air Force and British War Office signed a lease for land that had been purchased by the British government.

The NSA took over the lease of the base in 1966, and they have continued to build up the facility ever since. Up until the mid-1970s, Menwith Hill was used for intercepting International Leased Carrier (ILC) and Non-Diplomatic Communications (NDC).

Having received one of the first sophisticated IBM computers in the early 1960s, Menwith Hill was also used to sort through the voluminous unenciphered telex communications, which consisted of international messages, telegrams and telephone calls from the government, business and civilian sectors looking for anything of political, military or economic value.<20>

The addition of the first satellite intercept station at Menwith Hill in 1974 raised the base’s prominence in intelligence gathering. Eight large satellite communications dishes were installed during that phase of construction.

Several satellite-gathering systems now dot the facility:<21>

  • STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability and mission of the spy station beyond the bounds of the installation that began in 1974.
  • RUNWAY – Running east and west across the facility, this system receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing. RUNWAY may have recently been replaced or complemented by another system, RUTLEY.
  • PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main target of PUSHER.
  • MOONPENNY – Uncovered by British journalist Duncan Campbell in the 1980s, this system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.
  • KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.
  • GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.
  • STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.
  • SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.

One shocking revelation about Menwith Hill came to light in 1997 during the trial of two women peace campaigners appealing their convictions for trespassing at the facility.

In documents and testimony submitted by British Telecomm in the case, R.G. Morris, head of Emergency Planning for British Telecomm, revealed that at least three major domestic fiber-optic telephone trunk lines – each capable of carrying 100,000 calls simultaneously – were wired through Menwith Hill.<22>

This allows the NSA to tap into the very heart of the British Telecomm network.

Judge Jonathan Crabtree rebuked British Telecomm for his revelations and prohibited Mr. Morris from giving any further testimony in the case for “national security” reasons.

According to Duncan Campbell, the secret spying alliance between Menwith Hill and British Telecomm began in 1975 with a coaxial connection to the British Telecomm microwave facility at Hunter’s Stone, four miles away from Menwith Hill – a connection maintained even today.<23>

Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill.

Directing its electronic vacuum cleaners towards unsuspecting communications satellites in the skies, receiving signals gathered by satellites that scoop up the most minute signals on the ground, listening in on the radio communications throughout the air, or plugging into the ground-based telecommunications network, Menwith Hill, alongside its sister stations at Pine Gap, Australia, and Bad Aibling, Germany, represents the comprehensive effort of the NSA and its UKUSA allies to make sure that no communications signal escapes its electronic net.


The ECHELON Dictionaries

The extraordinary ability of ECHELON to intercept most of the communications traffic in the world is breathtaking in its scope.

And yet the power of ECHELON resides in its ability to decrypt, filter, examine and codify these messages into selective categories for further analysis by intelligence agents from the various UKUSA agencies.

As the electronic signals are brought into the station, they are fed through the massive computer systems, such as Menwith Hill’s SILKWORTH, where voice recognition, optical character recognition (OCR) and data information engines get to work on the messages.

These programs and computers transcend state-of-the-art; in many cases, they are well into the future. MAGISTRAND is part of the Menwith Hill SILKWORTH super-computer system that drives the powerful keyword search programs.<24>

One tool used to sort through the text of messages, PATHFINDER (manufactured by the UK company, Memex),<** Be sure to read footnote for update 25 **> sifts through large databases of text-based documents and messages looking for keywords and phrases based on complex algorithmic criteria. Voice recognition programs convert conversations into text messages for further analysis.

One highly advanced system, VOICECAST, can target an individual’s voice pattern, so that every call that person makes is transcribed for future analysis.

Processing millions of messages every hour, the ECHELON systems churn away 24 hours a day, 7 days a week, looking for targeted keyword series, phone and fax numbers, and specified voiceprints. It is important to note that very few messages and phone calls are actually transcribed and recorded by the system.

The vast majority are filtered out after they are read or listened to by the system. Only those messages that produce keyword “hits” are tagged for future analysis. Again, it is not just the ability to collect the electronic signals that gives ECHELON its power; it is the tools and technology that are able to whittle down the messages to only those that are important to the intelligence agencies.

Each station maintains a list of keywords (the “Dictionary”) designated by each of the participating intelligence agencies. A Dictionary Manager from each of the respective agencies is responsible for adding, deleting or changing the keyword search criteria for their dictionaries at each of the stations.<26>

Each of these station dictionaries are given codewords, such as COWBOY for the Yakima facility and FLINTLOCK for the Waihopai facility.<27> These codewords play a crucial identification role for the analysts who eventually look at the intercepted messages.

Each message flagged by the ECHELON dictionaries as meeting the specified criteria is sorted by a four-digit code representing the source or subject of the message (such as 5535 for Japanese diplomatic traffic, or 8182 for communications about distribution of encryption technology,) <28> as well as the date, time and station codeword.

Also included in the message headers are the codenames for the intended agency: ALPHA-ALPHA (GCHQ), ECHO-ECHO (DSD), INDIA-INDIA (GCSB), UNIFORM-UNIFORM (CSE), and OSCAR-OSCAR (NSA).

These messages are then transmitted to each agency’s headquarters via a global computer system, PLATFORM,<29> that acts as the information nervous system for the UKUSA stations and agencies.

Every day, analysts located at the various intelligence agencies review the previous day’s product. As it is analyzed, decrypted and translated, it can be compiled into the different types of analysis: reports, which are direct and complete translations of intercepted messages; “gists,” which give basic information on a series of messages within a given category; and summaries, which are compilations from both reports and gists.<30>

These are then given classifications: MORAY (secret), SPOKE (more secret than MORAY), UMBRA (top secret), GAMMA (Russian intercepts) and DRUID (intelligence forwarded to non-UKUSA parties).

This analysis product is the raison d’être of the entire ECHELON system. It is also the lifeblood of the UKUSA alliance.


The Problem

The ECHELON system is the product of the Cold War conflict, an extended battle replete with heightened tensions that teetered on the brink of annihilation and the diminished hostilities of détente and glasnost.

Vicious cycles of mistrust and paranoia between the United States and the Soviet Empire fed the intelligence agencies to the point that, with the fall of communism throughout Eastern Europe, the intelligence establishment began to grasp for a mission that justified its bloated existence.

But the rise of post-modern warfare – terrorism – gave the establishment all the justification it needed to develop even greater ability to spy on our enemies, our allies and our own citizens. ECHELON is the result of those efforts. The satellites that fly thousands of miles overhead and yet can spy out the most minute details on the ground; the secret submarines that troll the ocean floors that are able to tap into undersea communications cables;<31> and all power the efficient UKUSA signals intelligence machine.

There is a concerted effort by the heads of intelligence agencies, federal law enforcement officials and congressional representatives to defend the capabilities of ECHELON. Their persuasive arguments point to the tragedies seen in the bombings in Oklahoma City and the World Trade Center in New York City.

The vulnerability of Americans abroad, as recently seen in the bombing of the American embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya, emphasizes the necessity of monitoring those forces around the world that would use senseless violence and terror as political weapons against the US and its allies.

Intelligence victories add credibility to the arguments that defend such a pervasive surveillance system.

The discovery of missile sites in Cuba in 1962, the capture of the Achille Lauro terrorists in 1995, the discovery of Libyan involvement in the bombing of a Berlin discotheque that killed one American (resulting in the 1996 bombing of Tripoli) and countless other incidents that have been averted (which are now covered by the silence of indoctrination vows and top-secret classifications) all point to the need for comprehensive signals intelligence gathering for the national security of the United States.

But despite the real threats and dangers to the peace and protection of American citizens at home and abroad, our Constitution is quite explicit in limiting the scope and powers of government.

A fundamental foundation of free societies is that when controversies arise over the assumption of power by the state, power never defaults to the government, nor are powers granted without an extraordinary, explicit and compelling public interest.

As the late Supreme Court Justice William Brennan pointed out:

The concept of military necessity is seductively broad, and has a dangerous plasticity. Because they invariably have the visage of overriding importance, there is always a temptation to invoke security “necessities” to justify an encroachment upon civil liberties.

For that reason, the military-security argument must be approached with a healthy skepticism: Its very gravity counsels that courts be cautious when military necessity is invoked by the Government to justify a trespass on [Constitutional] rights.<32>

Despite the necessity of confronting terrorism and the many benefits that are provided by the massive surveillance efforts embodied by ECHELON, there is a dark and dangerous side of these activities that is concealed by the cloak of secrecy surrounding the intelligence operations of the United States.

The discovery of domestic surveillance targeting American civilians for reasons of “unpopular” political affiliation – or for no probable cause at all – in violation of the First, Fourth and Fifth Amendments of the Constitution is regularly impeded by very elaborate and complex legal arguments and privilege claims by the intelligence agencies and the US government.

The guardians and caretakers of our liberties – our duly elected political representatives – give scarce attention to the activities, let alone the abuses, that occur under their watch. As pointed out below, our elected officials frequently become targets of ECHELON themselves, chilling any effort to check this unbridled power.

In addition, the shift in priorities resulting from the demise of the Soviet Empire and the necessity to justify intelligence capabilities resulted in a redefinition of “national security interests” to include espionage committed on behalf of powerful American companies.

This quiet collusion between political and private interests typically involves the very same companies that are involved in developing the technology that empowers ECHELON and the intelligence agencies.


Domestic and Political Spying

When considering the use of ECHELON on American soil, the pathetic historical record of NSA and CIA domestic activities in regards to the Constitutional liberties and privacy rights of American citizens provides an excellent guidepost for what may occur now with the ECHELON system.

Since the creation of the NSA by President Truman, its spying capability has frequently been used to monitor the activities of an unsuspecting public.


Project SHAMROCK

In 1945 Project SHAMROCK was initiated to obtain copies of all telegraphic information exiting or entering the United States.

With the full cooperation of RCA, ITT and Western Union (representing almost all of the telegraphic traffic in the US at the time), the NSA’s predecessor and later the NSA itself were provided with daily microfilm copies of all incoming, outgoing and transiting telegraphs.

This system changed dramatically when the cable companies began providing magnetic computer tapes to the agency that enabled the agency to run all the messages through its HARVEST computer to look for particular keywords, locations, senders or addressees.

Project SHAMROCK became so successful that the in 1966 NSA and CIA set up a front company in lower Manhattan (where the offices of the telegraph companies were located) under the codename LPMEDLEY.

At the height of Project SHAMROCK, 150,000 messages a month were printed and analyzed by NSA agents.<33>

NSA Director Lew Allen brought Project SHAMROCK to a crashing halt in May 1975 as congressional critics began to rip open the program’s shroud of secrecy.

The testimony of both the representatives from the cable companies and of Director Allen at the hearings prompted Senate Intelligence Committee chairman Sen. Frank Church to conclude that Project SHAMROCK was,

“probably the largest government interception program affecting Americans ever undertaken.”<34>


Project MINARET

A sister project to Project SHAMROCK, Project MINARET involved the creation of “watch lists” by each of the intelligence agencies and the FBI of those accused of “subversive” domestic activities.

The watch lists included such notables as Martin Luther King, Malcolm X, Jane Fonda, Joan Baez and Dr. Benjamin Spock.

After the Supreme Court handed down its 1972 Keith decision,<35> which held that – while the President could act to protect the country from unlawful and subversive activity designed to overthrow the government – that same power did not extend to include warrantless electronic surveillance of domestic organizations, pressure came to bear on Project MINARET.<36>

Attorney General Elliot Petersen shut down Project MINARET as soon as its activities were revealed to the Justice Department, despite the fact that the FBI (an agency under the Justice Department’s authority) was actively involved with the NSA and other intelligence agencies in creating the watch lists.

Operating between 1967 and 1973, over 5,925 foreigners and 1,690 organizations and US citizens were included on the Project MINARET watch lists.

Despite extensive efforts to conceal the NSA’s involvement in Project MINARET, NSA Director Lew Allen testified before the Senate Intelligence Committee in 1975 that the NSA had issued over 3,900 reports on the watch-listed Americans.<37>

Additionally, the NSA Office of Security Services maintained reports on at least 75,000 Americans between 1952 and 1974.

This list included the names of anyone that was mentioned in a NSA message intercept.


Operation CHAOS

While the NSA was busy snooping on US citizens through Projects SHAMROCK and MINARET, the CIA got into the domestic spying act by initiating Operation CHAOS.

President Lyndon Johnson authorized the creation of the CIA’s Domestic Operations Division (DOD), whose purpose was to,

“exercise centralized responsibility for direction, support, and coordination of clandestine operations activities within the United States….”

When Johnson ordered CIA Director John McCone to use the DOD to analyze the growing college student protests of the Administration’s policy towards Vietnam, two new units were set up to target anti-war protestors and organizations:

  • Project RESISTANCE, which worked with college administrators, campus security and local police to identify anti-war activists and political dissidents
  • Project MERRIMAC, which monitored any demonstrations being conducted in the Washington D.C. area

The CIA then began monitoring student activists and infiltrating anti-war organizations by working with local police departments to pull off burglaries, illegal entries (black bag jobs), interrogations and electronic surveillance.<38>

After President Nixon came to office in 1969, all of these domestic surveillance activities were consolidated into Operation CHAOS.

After the revelation of two former CIA agents’ involvement in the Watergate break-in, the publication of an article about CHAOS in the New York Times<39> and the growing concern about distancing itself from illegal domestic spying activities, the CIA shut down Operation CHAOS.

But during the life of the project, the Church Committee and the Commission on CIA Activities Within the United States (the Rockefeller Commission) revealed that the CIA had compiled files on over 13,000 individuals, including 7,000 US citizens and 1,000 domestic organizations.<40>


The Foreign Intelligence Surveillance Court (FISC)

In response to the discovery of such a comprehensive effort by previous administrations and the intelligence agencies, Congress passed legislation (the Foreign Intelligence Surveillance Act of 1978) <41> that created a top-secret court to hear applications for electronic surveillance from the FBI and NSA to provide some check on the domestic activities of the agencies.

In 1995, Congress granted the court additional power to authorize surreptitious entries. In all of these actions, Congressional intent was to provide a check on the domestic surveillance abuses mentioned above.

The seven-member court, comprised of federal District Court judges appointed by the Supreme Court Chief Justice, sits in secret in a sealed room on the top floor of the Department of Justice building. Public information about the court’s hearings is scarce; each year the Attorney General is required by law to transmit to Congress a report detailing the number of applications each year and the number granted.

With over 10,000 applications submitted to the FISC during the past twenty years, the court has only rejected one application (and that rejection was at the request of the Reagan Administration, which had submitted the application).

While the FISC was established to be the watchdog for the Constitutional rights of the American people against domestic surveillance, it quickly became the lap dog of the intelligence agencies.

Surveillance requests that would never receive a hearing in a state or federal court are routinely approved by the FISC. This has allowed the FBI to use the process to conduct surveillance to obtain evidence in circumvention of the US Constitution, and the evidence is then used in subsequent criminal trials.

But the process established by Congress and the courts ensures that information regarding the cause or extent of the surveillance order is withheld from defense attorneys because of the classified nature of the court.<42>

Despite Congress’s initial intent for the FISC, it is doubtful that domestic surveillance by means of ECHELON comes under any scrutiny by the court.


Political Uses of ECHELON and UKUSA

Several incidents of domestic spying involving ECHELON have emerged from the secrecy of the UKUSA relationship.

What these brief glimpses inside the intelligence world reveal is that, despite the best of intentions by elected representatives, presidents and prime ministers, the temptation to use ECHELON as a tool of political advancement and repression proves too strong.

Former Canadian spy Mike Frost recounts how former British Prime Minister Margaret Thatcher made a request in February 1983 to have two ministers from her own government monitored when she suspected them of disloyalty.

In an effort to avoid the legal difficulties involved with domestic spying on high governmental officials, the GCHQ liaison in Ottawa made a request to CSE for them to conduct the three-week-long surveillance mission at British taxpayer expense. Frost’s CSE boss, Frank Bowman, traveled to London to do the job himself.

After the mission was over, Bowman was instructed to hand over the tapes to a GCHQ official at their headquarters.<43>  Using the UKUSA alliance as legal cover is seductively easy.

As Spyworld co-author Michel Gratton puts it,

The Thatcher episode certainly shows that GCHQ, like NSA, found ways to put itself above the law and did not hesitate to get directly involved in helping a specific politician for her personal political benefit…

[T]he decision to proceed with the London caper was probably not put forward for approval to many people up the bureaucratic ladder. It was something CSE figured they would get away with easily, so checking with the higher-ups would only complicate things unnecessarily.<44>

Frost also told of how he was asked in 1975 to spy on an unlikely target – Prime Minister Pierre Trudeau’s wife, Margaret Trudeau.

The Royal Canadian Mounted Police’s (RCMP) Security Service division was concerned that the Prime Minister’s wife was buying and using marijuana, so they contacted the CSE to do the dirty work. Months of surveillance in cooperation with the Security Service turned up nothing of note.

Frost was concerned that there were political motivations behind the RCMP’s request:

“She was in no way suspected of espionage. Why was the RCMP so adamant about this? Were they trying to get at Pierre Trudeau for some reason or just protect him? Or were they working under orders from their political masters?”<45>

The NSA frequently gets into the political spying act as well.

Nixon presidential aide John Ehrlichman revealed in his published memoirs, Witness to Power: The Nixon Years, that Henry Kissinger used the NSA to intercept the messages of then-Secretary of State William P. Rogers, which Kissinger used to convince President Nixon of Rogers’ incompetence.

Kissinger also found himself on the receiving end of the NSA’s global net. Word of Kissinger’s secret diplomatic dealings with foreign governments would reach the ears of other Nixon administration officials, incensing Kissinger.

As former NSA Deputy Director William Colby pointed out,

“Kissinger would get sore as hell…because he wanted to keep it politically secret until it was ready to launch.”<46>

However, elected representatives have also become targets of spying by the intelligence agencies.

In 1988, a former Lockheed software manager who was responsible for a dozen VAX computers that powered the ECHELON computers at Menwith Hill, Margaret Newsham, came forth with the stunning revelation that she had actually heard the NSA’s real time interception of phone conversations involving South Carolina Senator Strom Thurmond.

Newsham was fired from Lockheed after she filed a whistleblower lawsuit alleging that the company was engaged in flagrant waste and abuse. After a top secret meeting in April 1988 with then-chairman of the House Permanent Select Committee on Intelligence, Rep. Louis Stokes, Capitol Hill staffers familiar with the meeting leaked the story to the Cleveland Plain Dealer.<47>

While Sen. Thurmond was reluctant to pressure for a thorough investigation into the matter, his office revealed at the time that the office had previously received reports that the Senator was a target of the NSA.<48>

After the news reports an investigation into the matter discovered that there were no controls or questioning over who could enter target names into the Menwith Hill system.<49>

The NSA, under orders from the Reagan administration, also targeted Maryland Congressman Michael Barnes. Phone calls he placed to Nicaraguan officials were intercepted and recorded, including a conversation he had with the Foreign Minister of Nicaragua protesting the implementation of martial law in that country.

Barnes found out about the NSA’s spying after White House officials leaked transcripts of his conversations to reporters.

CIA Director William Casey, later implicated in the Iran-Contra affair, showed Barnes a Nicaraguan embassy cable that reported a meeting between embassy staff and one of Barnes’ aides.

The aide had been there on a professional call regarding an international affairs issue, and Casey asked for Barnes to fire the aide. Barnes replied that it was perfectly legal and legitimate for his staff to meet with foreign diplomats.

Says Barnes,

“I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.”<50>

Another former chairman of the Senate Intelligence Committee has also expressed his concerns about the NSA’s domestic targeting.

“It has always worried me. What if that is used on American citizens?” queried former Arizona Senator Dennis DeConcini. “It is chilling. Are they listening to my private conversations on my telephone?”<51>

Seemingly non-controversial organizations have ended up in the fixed gaze of ECHELON, as several former GCHQ officials confidentially told the London Observer in June 1992.

Among the targeted organizations they named were Amnesty International, Greenpeace and Christian Aid, an American missions organization that works with indigenous pastors engaged in ministry work in countries closed to Western, Christian workers.<52>

In another story published by the London Observer, a former employee of the British Joint Intelligence Committee, Robin Robison, admitted that Margaret Thatcher had personally ordered the communications interception of the parent company of the Observer, Lonrho, after the Observer had published a 1989 expose charging bribes had been paid to Thatcher’s son, Mark, in a multi-billion dollar British arms deal with Saudi Arabia.

Despite facing severe penalties for violating his indoctrination vows, Robison admitted that he had personally delivered intercepted Lonrho messages to Mrs. Thatcher’s office.<53>

It should hardly be surprising that ECHELON ends up being used by elected and bureaucratic officials to their political advantage or by the intelligence agencies themselves for the purpose of sustaining their privileged surveillance powers and bloated budgets. The availability of such invasive technology practically begs for abuse, although it does not justify its use to those ends.

But what is most frightening is the targeting of such “subversives” as those who expose corrupt government activity, protect human rights from government encroachments, challenge corporate polluters, or promote the gospel of Christ.

That the vast intelligence powers of the United States should be arrayed against legitimate and peaceful organizations is demonstrative not of the desire to monitor, but of the desire to control.


Commercial spying

With the rapid erosion of the Soviet Empire in the early 1990s, Western intelligence agencies were anxious to redefine their mission to justify the scope of their global surveillance system.

Some of the agencies’ closest corporate friends quickly gave them an option – commercial espionage.

By redefining the term “national security” to include spying on foreign competitors of prominent US corporations, the signals intelligence game has gotten ugly. And it very well may have prompted the recent scrutiny by the European Union that ECHELON has endured.

While UKUSA agencies have pursued economic and commercial information on behalf of their countries with renewed vigor after the passing of communism in Eastern Europe, the NSA practice of spying on behalf of US companies has a long history.

Gerald Burke, who served as Executive Director of President Nixon’s Foreign Intelligence Advisory Board, notes commercial espionage was endorsed by the US government as early as 1970:

“By and large, we recommended that henceforth economic intelligence be considered a function of the national security, enjoying a priority equivalent to diplomatic, military, and technological intelligence.”<54>

To accommodate the need for information regarding international commercial deals, the intelligence agencies set up a small, unpublicized department within the Department of Commerce, the Office of Intelligence Liaison.

This office receives intelligence reports from the US intelligence agencies about pending international deals that it discreetly forwards to companies that request it or may have an interest in the information. Immediately after coming to office in January 1993, President Clinton added to the corporate espionage machine by creating the National Economic Council, which feeds intelligence to “select” companies to enhance US competitiveness.

The capabilities of ECHELON to spy on foreign companies is nothing new, but the Clinton administration has raised its use to an art:

In 1990 the German magazine Der Speigel revealed that the NSA had intercepted messages about an impending $200 million deal between Indonesia and the Japanese satellite manufacturer NEC Corp. After President Bush intervened in the negotiations on behalf of American manufacturers, the contract was split between NEC and AT&T.


In 1994, the CIA and NSA intercepted phone calls between Brazilian officials and the French firm Thomson-CSF about a radar system that the Brazilians wanted to purchase. A US firm, Raytheon, was a competitor as well, and reports prepared from intercepts were forwarded to Raytheon.<55>

In September 1993, President Clinton asked the CIA to spy on Japanese auto manufacturers that were designing zero-emission cars and to forward that information to the Big Three US car manufacturers: Ford, General Motors and Chrysler.<56>

In 1995, the New York Times reported that the NSA and the CIA’s Tokyo station were involved in providing detailed information to US Trade Representative Mickey Kantor’s team of negotiators in Geneva facing Japanese car companies in a trade dispute.<57>

Recently, a Japanese newspaper, Mainichi, accused the NSA of continuing to monitor the communications of Japanese companies on behalf of American companies.<58>

Insight Magazine reported in a series of articles in 1997 that President Clinton ordered the NSA and FBI to mount a massive surveillance operation at the 1993 Asian/Pacific Economic Conference (APEC) hosted in Seattle.

One intelligence source for the story related that over 300 hotel rooms had been bugged for the event, which was designed to obtain information regarding oil and hydro-electric deals pending in Vietnam that were passed on to high level Democratic Party contributors competing for the contracts.<59>

But foreign companies were not the only losers: when Vietnam expressed interest in purchasing two used 737 freighter aircraft from an American businessman, the deal was scuttled after Commerce Secretary Ron Brown arranged favorable financing for two new 737s from Boeing.<60>

But the US is not the only partner of the UKUSA relationship that engages in such activity. British Prime Minister Margaret Thatcher ordered the GCHQ to monitor the activities of international media mogul Robert Maxwell on behalf of the Bank of England.<61>

Former CSE linguist and analyst Jane Shorten claimed that she had seen intercepts from Mexican trade representatives during the 1992-1993 NAFTA trade negotiations, as well as 1991 South Korean Foreign Ministry intercepts dealing with the construction of three Canadian CANDU nuclear reactors for the Koreans in a $6 billion deal.<62>

Shorten’s revelation prompted Canadian Deputy Prime Minister Sheila Copps to launch a probe into the allegations after the Mexicans lodged a protest.

But every spy agency eventually gets beat at their own game. Mike Frost relates in Spyworld how an accidental cell phone intercept in 1981 of the American Ambassador to Canada discussing a pending grain deal that the US was about to sign with China provided Canada with the American negotiating strategy for the deal.

The information was used to outbid the US, resulting in a three year, $2.5 billion contract for the Canadian Wheat Board. CSE out-spooked the NSA again a year later when Canada snagged a $50 million wheat sale to Mexico.<63>

Another disturbing trend regarding the present commercial use of ECHELON is the incestuous relationship that exists between the intelligence agencies and the US corporations that develop the technology that fuels their spy systems.

Many of the companies that receive the most important commercial intercepts – Lockheed, Boeing, Loral, TRW and Raytheon – are actively involved in the manufacturing and operation of many of the spy systems that comprise ECHELON.

The collusion between intelligence agencies and their contractors is frightening in the chilling effect it has on creating any foreign or even domestic competition.

But just as important is that it is a gross misuse of taxpayer-financed resources and an abuse of the intelligence agencies’ capabilities.


The Warning

While the UKUSA relationship is a product of Cold War political and military tensions, ECHELON is purely a product of the 20th Century – the century of statism.

The modern drive toward the assumption of state power has turned legitimate national security agencies and apparati into pawns in a manipulative game where the stakes are no less than the survival of the Constitution. The systems developed prior to ECHELON were designed to confront the expansionist goals of the Soviet Empire – something the West was forced out of necessity to do.

But as Glyn Ford, European Parliament representative for Manchester, England, and the driving force behind the European investigation of ECHELON, has pointed out:

“The difficulty is that the technology has now become so elaborate that what was originally a small client list has become the whole world.”<64>

What began as a noble alliance to contain and defeat the forces of communism has turned into a carte blanche to disregard the rights and liberties of the American people and the population of the free world.

As has been demonstrated time and again, the NSA has been persistent in subverting not just the intent of the law in regards to the prohibition of domestic spying, but the letter as well. The laws that were created to constrain the intelligence agencies from infringing on our liberties are frequently flaunted, re-interpreted and revised according to the bidding and wishes of political spymasters in Washington D.C. Old habits die hard, it seems.

As stated above, there is a need for such sophisticated surveillance technology. Unfortunately, the world is filled with criminals, drug lords, terrorists and dictators that threaten the peace and security of many nations. The thought that ECHELON can be used to eliminate or control these international thugs is heartening.

But defenders of ECHELON argue that the rare intelligence victories over these forces of darkness and death give wholesale justification to indiscriminate surveillance of the entire world and every member of it. But more complicated issues than that remain.

The shameless and illegal targeting of political opponents, business competitors, dissidents and even Christian ministries stands as a testament that if America is to remain free, we must bind these intelligence systems and those that operate them with the heavy chains of transparency and accountability to our elected officials.

But the fact that the ECHELON apparatus can be quickly turned around on those same officials in order to maintain some advantage for the intelligence agencies indicates that these agencies are not presently under the control of our elected representatives.

That Congress is not aware of or able to curtail these abuses of power is a frightening harbinger of what may come here in the United States.

The European Parliament has begun the debate over what ECHELON is, how it is being used and how free countries should use such a system. Congress should join that same debate with the understanding that consequences of ignoring or failing to address these issues could foster the demise of our republican form of government.

Such is the threat, as Senator Frank Church warned the American people over twenty years ago.

At the same time, that capability at any time could be turned around on the American people and no American would have any privacy left, such [is] the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter.

There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know.

Such is the capability of this technology…

I don’t want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss.

That is the abyss from which there is no return.<65>

Source

Read more from Auricmedia:

[carousel-horizontal-posts-content-slider]

The Hutchison Effect

Always fascinating John Hutchison is an Canadian scientist who do some remarkable things in his lab.

Long before John Hutchison began his pioneering experiments into electromagnetism and alternative energy, travelers in the Bermuda Triangle had reported odd occurrences involving electromagnetism:

their ships or planes would be seized by a strange vapor, then all equipment would go haywire; unexplained fogs would sit over the ocean, yet in all cases the weather was not right for creating fogs, and there was certainly no reason for electromagnetic aberrations such as they reported.

These were, in due course, put down in the category of “sea lore,” sensationalism, or attributed to occultists trying to push their supernatural views of nature. It didn’t seem to matter that most of those reporting them were veteran pilots, shipmasters, and even Coast Guard officers.

Working on alternative energy sources in his lab.

These unusual phenomena quickly formed the backbone of the “mythos” of the Bermuda Triangle, the enigma of unexplained “forces,” hints of the laws of nature running wild, of possible time warps, interdimensional transition, wormholes, and invisibility. To speak about them is to speak about the “supernatural,” the impossible, and the occult… until now.

Though they remain unexplained, there is no longer the lack of a cross reference for them – and this has to do with electromagnetism.

And that’s where Vancouver scientist John Hutchison comes into play.

His experiments into electromagnetism has unintentionally produced every phenomena reported in the Triangle. The term “Hutchison Effect” has become a moniker applied to all the peculiar and startling effects his plethora of machinery can produce.

John might be likened to many of the fictional characters of movies who stumbled onto fantastic inventions – Flubber, The Shaggy Dog, and the many other Disney movies of Kurt Russell being transformed by his madcap experiments at Medfield College.

The great exception is that John is not fictional, nor are his experiments. They have penetrated the very building blocks of matter and looked squarely into the labyrinth of time and space. . . .and they are all created by electromagnetism and its effects on various wavelengths!

It all began back in 1979.

While studying the longitudinal wavelengths of Tesla (Nikola Tesla, a radio pioneer), Hutchison, limited by space in his small apartment, crammed into one room various devices that emit electromagnetic fields and wavelengths, like Tesla coils, RF generators, van De Graaf generators, etc.

He turned them on and went about his work. In some unexpected way, the wavelengths these machines created interplayed to create astonishing effects. John first noticed this when an object touched his shoulder… one he wasn’t expecting because it was levitating!

Repeated tests have produced a number of astounding effects.

These include the continued levitation of objects: wood, styrofoam, plastic, copper, zinc –  they hovered and moved about, swirl around and ascend, or shoot off at fantastic speeds.

With further experimentation:

  • fires started around the building out of non flammable materials, like cement and rock
  • a mirror smashed (80 feet away!), metal warped and bent and even broke, (separating by sliding in a sideways fashion), in some instances crumbling like “cookies”
  • some metal became white hot but did not burn surrounding flammable material
  • lights appeared in the air, along with numerous other corona manifestations
  • water spontaneously swirled in containers,

…to name only a few.

 

  An aluminum bar, ABOVE, and LEFT, shredded and split by the Hutchison Effect. The metal turned wobbly like jelly before coming apart. This is called “cold melting” because no heat is involved. RIGHT: metal cylinder crumbled apart. Photos Courtesy of John Hutchison  

 

More than one observer of Hutchison’s experiments and demonstrations (he has given over 750), have not only been amazed at the results but uniformly express astonishment at the weak electrical power which seems to be sufficient to empower very stupefying results.

Since basic outlets in the house supply sufficient power to operate his many machines, the power which unleashes all these incredible effects is believed to lie elsewhere, such as where these various fields interplay, since on their own the wavelengths or fields these machines create have never been noted to do this.

It is at this point – call is a warp or vortex, whatever you like –  where things begin to happen.

But how they interact is still largely a mystery. Even where they interact can be perplexing. Sometimes one must wait for days for something to happen, and 99 per cent of the time nothing happens at all. To draw an analogy, it is like trying to boil water without being able to determine the strength of the heat –  in such a scenario it is not surprising it may take different amounts of time to produce the boiling effect.

Photos of his equipment and lab

Over the last 22 years, Hutchison’s work has been subject to broad though varying interest and approval.

His laboratory was ransacked by Canadian officials who seized his equipment under the pretense of confiscating his antique gun collection which was, however, subsequently returned with no explanations or charges.

  • Three nations have aired his work
  • He was courted by scientists in Japan, accused of treason in Canada when he went to Germany for funds to continue
  • Los Alamos Lab has done research on his Effect
  • The Canadian government seized his lab equipment once again while crated and in transit to Germany in 1990 (and never returned it despite a court order), when he was seeking financial aid to continue his studies.
  • The military of Canada and the US has expressed a covert interest
  • He has been arrested by the Canadian government and placed in cuffs on his doorstep while his lab was ransacked and investigated (under the excuse of checking on his antique gun collection again)
  • This last incident was on March 17, 2000, and may have been initiated by a neighbor who experienced an unexpected levitation in their house and then complained to the police.

Because of all this, which has been ongoing for over 22 years, his lab has undergone numerous changes, from completely disappearing into government hands, to vital pieces having been sold off to pay for subsequent financial problems.

Nevertheless, John Hutchison has continued with his work.

He has “tinkered” and adjusted his equipment and continues to get varying and remarkable results, many of which have been documented and photographed by McDonnell Douglas Aerospace and the Max Planck Institute in Germany.

 

“Tinkering” in his lab. Hutchison has developed extensive forms of free energy, including fuel cells and the Hutchison Converter, which apparently can run forever. It was first displayed in Japan in 1996 and is still running. A scientist sees fact, but a philosopher sees potential. John is both.

The Hutchison Effect’s connection with the Triangle comes in many forms. Many of the effects he has created mimic those reported out there: strangely swirling clouds and lights, green glows and phosphorescence, and electromagnetic anomalies.

 

But one discovery in John’s experiments clearly underlines the connection of the Bermuda Triangle with electromagnetism. During one experiment, John produced something undeniably “Triangle-esque.”

I have personally experienced the grayish-type mist when I was doing my high voltage research; and this mist would appear and disappear. To look at it, it looks like metallic. I couldn’t see through it.

 

So it exists… it exists.

 

In other tests, objects have appeared that “had a cling of gray fog” moving about the room, all of which were clearly filmed on 8 mm film.

One is reminded of Bruce Gernon’s feeling that the “electronic fog” traveled with his plane, or Don Henry’s encounter where the fog formed around the metal barge and caused it to vanish while at the same time effecting all of his electronic equipment.

 

 

While our first instinct is to believe that these forces can only be engineered in a laboratory, a disturbing thought comes from an observation made by electromagnetic researcher, Albert Budden.

“The original way that Hutchison set out his range of apparatus was, by industrial standards, primitive and crowded, with poor connections and hand-wound coils.

 

But it was with this layout with its erratic standards that he obtained most of the best examples of objects levitating, despite the fact that the maximum power drawn was 1.5 kilowatts, and this from the ordinary power sockets of the house mains.”

These crude ways seemed better adept at tapping into the vast power all around us.

The watts produced in a lab, however, would be infinitesimal compared to the potential in the atmosphere. The estimated power in the atmosphere is best demonstrated during a thunderstorm in which lightning streaks across the sky with infinitely more watts of electricity –  enough to scramble radios and other equipment dozens of miles away, enough to destroy trees and houses and melt sand into glass.

But can electromagnetism cause a plane or ship to disappear? John has kept abreast of the unexplained in the world and is well aware of the effects reported in the Bermuda Triangle.

In commenting on the applied ramifications, he has observed:

It is highly probable that nature can form these fields on her own and create the right situation for the ship or aircraft to either totally disintegrate or disappear into another dimension or domain.

What should we make of such radio reports like Jenson’s, in which he says he is lost in clouds at 150 feet elevation?

Remember, he vanished thereafter, but 11 hours later, long after fuel starvation, he reemerges in time briefly, to make one last call 600 miles from where he was lost, only to vanish again without trace.

  • What about the other maydays picked up hours after fuel starvation?
  • What about the radio and compass quirks so often reported?
  • Is nature telling us something?
  • Or is it guiding us to the potential in natural energy?
  • Is the Hutchison Effect merely a small example of the greater machines in nature?

However esoteric some of this may sound, we may well inject here Time’s association with gravity and magnetism.

Atomic clocks record time passing slightly faster in orbit than at sea level, the difference being that gravity is weaker higher up. An electrical current will produce a magnetic field at right angles to it, but since there are three planes of space, where is the gravitational plane? No one, including Einstein, could ever find it. What forces are really out there? Electromagnetism may also be a gateway to something far more startling.

Mark Solis writes:

“It is surmised by some researchers that what Hutchison has done is tap into the Zero Point Energy. This energy gets its name from the fact that it is evidenced by oscillations at zero degrees Kelvin, where supposedly all activity in an atom ceases. The energy is associated with the spontaneous emission and annihilation of electrons and positrons coming from what is called the ‘quantum vacuum.’

 

The density contained in the quantum vacuum is estimated by some at 1013 joules per cubic centimeter, which is reportedly sufficient to boil off the Earth’s oceans in a matter of moments.”

… A disappearance, a disintegration seems mild by comparison.

A long time ago, biologist Ivan Sanderson noted that the greatest number of disappearances in the world occurred in specific locales, “vortices,” he called them, which,

“lie on the right or east sides of the continents, and all precisely in curious areas where hot surface currents stream out of the tropical latitudes toward the colder waters of the temperate. . .”

An example of Sanderson’s 12 vortices set at regular intervals around the earth, brought to his attention by the higher incidence of unexplained disappearances therein. The North ands south Pole account for the 11th and 12th vortices.

 

He explains this is of “enormous significance” because,

“these are the areas of extreme temperature variabilities which alone would predicate a very high incidence of violent marine and aerial disturbances. What more likely areas,” he continues, “for storms and wrecks and founderings, and even magnetic anomalies?”

He went on to ask,

“Whether these vast [natural] ‘machines’ generate still another kind of anomaly that might cause something to ‘go wrong’ . . .in our space-time continuum. In other words, could they create. . . ‘vortices’ into and out of which material objects can drop into or out of other space-time continua?”

Hutchison’s studies may not prove this, of course, but continuing results prove the unlimited potential of electromagnetism on matter.

Fusion dissimilar of materials.

One of the most remarkable effects is the fusion of dissimilar materials. In describing this, Mark Solis makes note that “dissimilar substances can simply ‘come together’ yet the individual substances do not disassociate.

A block of wood can ‘simply sink’ into a metal bar, yet neither the block of wood nor metal bar come apart.” Moreover, he adds “there is no evidence of displacement, such as would occur if, for example, one were to sink a stone in a bowl of water.”

But perhaps one of the most remarkable aspects of his Effect is,

spontaneous invisibility of materials in the ‘active zone’ of a Pharos-type Hutchison apparatus…

A phenomenon which Richard Hull uncovered in historical investigations took place in the Farnsworth Fusion Machine in the 1930s, where solid metal portions of the apparatus became transport during a number of tests. (Philo T. Farnsworth was the inventor of the electronic TV).

Hutchison has added that invisibly surrounds metallic objects.

Properly adjusting his equipment, he adds, the “cronons” and “gravitons” generated by his technology could cause entire buildings to disappear. The propulsive part of the Effect could get us into space faster and cheaper than any conventional fuel.

 

Since the effects and the materials vary exceedingly, it seems logical to assume there is some form of disruption of the basic atomic structure, considering that fusion of non identical materials, fires, levitating objects, invisibility, etc., have nothing else in common but these building blocks of matter.

 

Electromagnetism is a doorway into a world of which we are all made. As such, its potential seems unlimited.


Since the Earth is itself an object generating electromagnetic fields, are there areas where some of these fields will intermittently interplay and cause aberrations?

 

To be more explicit, is the Bermuda Triangle properly situated on the Earth, in the areas of correct temperatures and weather volatility, in areas of electromagnetic stresses, to create effects as Hutchison has done in his lab?

We can no longer say “impossible” to anything once the doors to the very building blocks of the universe are unlocked. The dreams and even wistful fancies of past philosophers and scientists are daily becoming reality in our modern world.

It is time we as a species woke up to them. For too long we called them “supernatural” when they were not “above nature,” they were merely above our understanding of it. It is also time that science looks beyond a mere fact.

We must start looking at potential whether it has immediate profitability or not.

The greatest contribution in the Hutchison Effect is that it shows us the great potential in nature all around us.

Source

Biochip implants

Couple of articles about biochip implants:

16-1

Image Source

Big Brother Gets Under Your Skin

By Julie Foster

© 2000 WorldNetDaily.com

Source: WorldNet Daily

http://www.wnd.com/news/article.asp?ARTICLE_ID=17834

Big Brother Gets Under Your Skin: Ultimate ID Badge, Transceiver Implanted In Human

New implant technology currently used to locate lost pets has been adapted for use in humans, allowing implant wearers to emit a homing beacon, have vital bodily functions monitored and confirm identity when making e-commerce transactions.

Applied Digital Solutions, an e-business to business solutions provider, acquired the patent rights to the miniature digital transceiver it has named “Digital Angel®.” The company plans to market the device for a number of uses, including as a “tamper-proof means of identification for enhanced e-business security.”

Digital Angel® sends and receives data and can be continuously tracked by global positioning satellite technology. When implanted within a body, the device is powered electromechanically through the movement of muscles and can be activated either by the “wearer” or by a monitoring facility.

“We believe its potential for improving individual and e-business security and enhancing the quality of life for millions of people is virtually limitless,” said ADS Chairman and Chief Executive Officer Richard Sullivan. “Although we’re in the early developmental phase, we expect to come forward with applications in many different areas, from medical monitoring to law enforcement. However, in keeping with our core strengths in the e-business to business arena, we plan to focus our initial development efforts on the growing field of e-commerce security and user ID verification.”

Dr. Peter Zhou, chief scientist for development of the implant and president of DigitalAngel.net, Inc, a subsidiary of ADS, told WorldNetDaily the device will send a signal from the person wearing Digital Angel® to either his computer or the e-merchant with whom he is doing business in order to verify his identity.

In the future, said Zhou, computers may be programmed not to operate without such user identification. As previously reported in WND, user verification devices requiring a live fingerprint scan are already being sold by computer manufacturers. Digital Angel® takes such biometric technology a giant step further by physically joining human and machine.

But e-commerce is only one field to which Digital Angel® applies. The device’s patent describes it as a rescue beacon for kidnapped children and missing persons. According to Zhou, the implant will save money by reducing resources used in rescue operations for athletes, including mountain climbers and skiers.

Law enforcement may employ the implant to keep track of criminals under house arrest, as well as reduce emergency response time by immediately locating individuals in distress.

The device also has the ability to monitor the user’s heart rate, blood pressure and other vital functions.

“Your doctor will know the problem before you do,” said Zhou, noting peace of mind is possible for at-risk patients who can rest in the knowledge that help will be on the way should anything go wrong.

Indeed, peace of mind is Digital Angel®’s main selling point.

“Ideally,” the patent states, “the device will bring peace of mind and an increased quality of life for those who use it, and for their families, loved ones, and associates who depend on them critically.”

Referring to the threat of kidnapping, the patent goes on to say, “Adults who are at risk due to their economic or political status, as well as their children who may be at risk of being kidnapped, will reap new freedoms in their everyday lives by employing the device.”

Digital Angel®’s developer told WND demand for the implant has been tremendous since ADS announced its acquisition of the patent in December.

“We have received requests daily from around the world for the product,” Zhou said, mentioning South America, Mexico and Spain as examples.

One inquirer was the U.S. Department of Defense, through a contractor, according to Zhou. American soldiers may be required to wear the implant so their whereabouts and health conditions can be accessed at all times, said the scientist.

Illustration of application of Digital Angel(R) from DigitalAngel.net website.

As of yet, there is no central DigitalAngel.net facility that would do the job of monitoring users — the task will most likely fall to the entities marketing the device, said Zhou. For example, if a medical group decides to market Digital Angel® to its patients, that group would set up its own monitoring station to check on its device-users.

Likewise, militaries employing the implant will want to maintain their own monitoring stations for security purposes.

But for critics, military use of the implant is not at the top of their list of objections to the new technology. ADS has received complaints from Christians and others who believe the implant could be the fulfillment of Biblical prophecy.

The Book of Revelation states all people will be required to “receive a mark in their right hand, or in their foreheads: And that no man might buy or sell, save he that had the mark.” (Rev. 13: 16-17)

In an increasingly cashless society where identity verification is essential for financial transactions, some Christians view Digital Angel®’s ID and e-commerce applications as a form of the biblical “mark of the beast.”

But Zhou dismisses such objections to the implant.

“I am a Christian, but I don’t think [that argument] makes sense,” he told WND. “The purpose of the device is to save your life and improve the quality of life. There’s no connection to the Bible. There are different interpretations of the Bible. My interpretation is, anything to improve the quality of life is from God. The Bible says, ‘I am the God of living people.’ We not only live, we live well.”

Sullivan, responding to religious objections to his product, told WorldNetDaily no one will be forced to wear Digital Angel®.

“We live in a voluntary society,” he said. According to the CEO, individuals may choose not to take advantage of the technology.

Zhou alluded to some Christians’ objection to medicine per se, adding such opposition wanes when the life-saving, life-improving benefits of technology are realized.

“A few years ago there may have been resistance, but not anymore,” he continued. “People are getting used to having implants. New century, new trend.”

Zhou compared Digital Angel® to pacemakers, which regulate a user’s heart rate. Pacemakers used to be seen as bizarre, said Zhou, but now they are part of everyday life. Digital Angel® will be received the same way, he added.

Vaccines are another good comparison, said the scientist, who noted,

“Both save your life. When vaccines came out, people were against them. But now we don’t even think about it.”

Digital Angel®, Zhou believes, could become as prevalent as a vaccine.

“Fifty years from now this will be very, very popular. Fifty years ago the thought of a cell phone, where you could walk around talking on the phone, was unimaginable. Now they are everywhere,” Zhou explained.

Just like the cell phone, Digital Angel® “will be a connection from yourself to the electronic world. It will be your guardian, protector. It will bring good things to you.”

“We will be a hybrid of electronic intelligence and our own soul,” Zhou concluded.

In the process of merging with Destron Fearing Corp., a manufacturer and marketer of electronic and visual identification devices for animals, DigitalAngel.net is scheduled to complete a prototype of the dime-sized implant by year’s end. Company executives hope to make the device affordable for individuals, though no cost projections have been made.

ADS, DigitalAngel.net’s parent company, received a special “Technology Pioneers” award from the World Economic Forum for its contributions to “worldwide economic development and social progress through technology advancements.”

The World Economic Forum, incorporated in 1971 with headquarters in Geneva, is an independent, not-for-profit organization “committed to improving the state of the world.” WEF is currently preparing for its “China Business Summit” in Beijing next month for the purpose of forging new economic alliances with the communist nation.

Source

 

A Chip for Your Thoughts

by John Hanchette

Gannett News Service © copyright 2000

Second of three parts

Source: Asbury Park Press

http://www.app.com/news/app/story/0,2110,273813,00.html

May 15, 2000

Privacy advocates fear that as rapid advances are made in technology, the personal lives of Americans may be shadowed by a cloud no bigger than a computer chip.

MicroStrategy founder Michael Saylor proposes uploading information direct to people’s brains via computer chip. One proposal, drawn from a recent science fiction film, is close to reality.

Michael Saylor the 35-year-old founder of MicroStrategy, who perhaps is most famous for watching his personal net stock worth drop $6 billion in a single morning without whimpering is involved with the concept.

Saylor wants to beam information directly into your mind; he calls it “telepathic intelligence.”

Saylor would do it by having a tiny transmitter surgically implanted in your skull or by sewing a computer chip into your wrist and having it transmit to an embedded radiolike device near your ear bones.

His computers already process a mammoth amount of data; pertinent portions would be tailored to your life and interests, then transmitted to brain or ear instantaneously 24 hours a day, seven days a week.

Your stock is tanking sell. You’re on the wrong street turn here. Your spouse wrecked the other car call the insurance company. Your house is being burglarized call the cops. The doctor called in your prescription visit the pharmacy.

“I don’t know who in their right mind would let somebody implant this in their head,” says Fordham University Law School professor Joel Reidenberg, an expert on information privacy. “To the extent that we begin to create a system of automatons responding to chip implants in people’s brains, we will be destroying the foundations of a democratic society.

“Without question, there would be a great opportunity for mischief here.”

MicroStrategy spokesmen confirm that Saylor “sees potential in the future of such a chip” and that the firm’s Strategy.com subsidiary a network of “customer intelligence channels” that sends 300,000 people some 2 million personalized messages a week is working long term on the idea.

But MicroStrategy spokesman Michael Quint said this would be what computer business calls “opt-in”: “”It’s all permission marketing. If you’re talking about the privacy thing, we’d need to get the permission of the customer or the consumer.”

Reidenberg is not impressed: “The notion that it’s “permission marketing only’ is a hoax. There’s no way a citizen in our society can make an intelligent, informed decision about the risks of these implants, which

would be sold through very sophisticated marketing by organizations with large economic interests whose goals are not to promote the public interest. That’s a very scary vision for a democratic society.

“Forget the health and safety issues. Assume they figure out how not to kill people when they put it in. The information-control aspects are beyond what George Orwell could have dreamed about.”

Not everyone is upset by this techno-vision.

When online prankster Bill Cross a few months ago put up a hoax Web site that offered $250 for letting surgeons insert an electronic chip under the right palm for cashless purchases, he was stunned at the response. People signed up for the nonexistent implant “in droves,” he says.

And the techno-vision is reality.

Three months ago Applied Digital Solutions a publicly traded firm based in Palm Beach announced it had developed a high-tech transceiver chip, thinner than a dime, that could be implanted in flesh and used as a tracking device by transmitting the person’s whereabouts to a global positioning satellite.

Trademarked as the “Digital Angel,” the chip could be inserted in children at the behest of parents who fear kidnappers or in elderly parents at the behest of children who fear those afflicted with Alzheimer’s will wander off. The chip can hold medical and financial information.

Applied Digital says the implant would be voluntary, making the privacy issue moot.

But David Sobel, general counsel for the Electronic Privacy Information Center in Washington, D.C., worries the device could evolve into a workplace requirement one that “would dwarf polygraphs and drug testing.”

And more than 500,000 pets now carry between their shoulder blades an implanted, scannable computer chip carrying owner and vaccination data.

“The technology is there to implant chips allowing programming of devices, like in your pacemaker,” says Washington privacy consultant Robert Gellman, who calls Saylor’s idea “Big Brother on steroids.”

Says Gellman: “I keep thinking one day soon they’ll be able to beam commercials into your pacemaker that warn, “Buy our product, or we’re going to skip a couple of heartbeats.’ Think of all the people who believe the CIA is beaming rays into their heads already.”

Saylor bothers privacy advocates in another way.

He wants the government to make the huge Medicare database available online so it easily could be compiled and searched by his firm to discover dangerous medications and unsafe physicians, about whom you would be warned.

“Give me your medical records, and I will give you more life,” Saylor says.

“Privacy advocates should take him seriously,” said Evan Hendricks, publisher of the watchdog Privacy Times. “He’s putting out his own version of “Mein Kampf.’ Saylor is very genuine, I think. The more data they have, the more strategic decisions they can make.”

Source

The technology of the Gods

It may be, that everything we consider as high tech has been developed thousands of years ago, but it has been vanished and now we are discovering it again:

The Gods and Their Flying Machines

The major attribute of the gods is that they could fly. Here are a few clues:

– When flying Quetzalcoatl appeared to the ancient Mexicans as a feathered serpent: “…first it flies, quite high up, well up it goes, and it just descends…”. And when it flies or descends a great wind blows. Wherever it goes, it flies” (Baldwin, 1998).

Don’t you wonder what kind of aircraft might appear to the natives as a “plumed serpent” accompanied by a “great wind”?

– “…there appeared a chariot of fire, and horses of fire, and parted them both asunder; and Elijah went up by a whirlwind into heaven.” (2 Kings 2:11).

– “And Jehovah was going before them by day in a pillar of cloud, to lead them in the way, and by night in a pillar of fire, to give light to them, to go by day and by night…” (Exo 13:21).

– Yahweh lands on Mt Sinai. “…And on the third day, it being morning, it happened. There were thunders and lightning, and a heavy cloud upon the mountain, and the sound of a ram’s horn, very strong! And all the people of the camp trembled… And mountain of Sinai was smoking, all of it, because Jehovah came down on it in fire. And it’s smoke went up like the smoke of a furnace; and the mountain quaked exceedingly…” (Exodus 19:16-18).

– “…And the spirit lifted me up, and I heard behind me the sound of a great tumult, saying, Blessed be the glory of Jehovah from his place; and the sound of the wings of the living creatures touching each other to the other; and the sound of the wheels along with them; and the sound of a great tumult…” (Ezekiel 3:12).

– Jehovah comes down on the high places with a great heat: “For behold, Jehovah is coming out of his place, and will come down and walk on the high places of the earth. And the mountains shall melt under him, and the valleys shall cleave themselves as wax before the fire, as waters poured out on a steep place…” (Micah 1:3-4).

– A reference to flying gods in the Mahabharata:

“The gods, in cloud-borne chariots… bright celestial cars in concourse sailed upon the cloudless sky.” (Sitchin, 1985).

– Sitchin (1985) also mentions the flying Maruts:

“…loud roaring as the winds make the mountains rock and reel…(as they) lift themselves aloft…these verily wondrous, red of hue, speed on their course with a roar over the ridges of the sky…and spread themselves with beams of light…bright, celestial, with lightning in their hands and helmets of gold upon their heads.”

– Egyptian King Pepi ascends:

“As an imperishable star; Flies who flies! He flies away from you, O men! He is no longer upon earth; he is in the sky! He rushes at the sky like a heron. He has kissed the sky like a falcon. He has leapt skyward like a grasshopper.” (Frankfort, 1948).

– An angelic messenger announces to Manoah about the birth of Samson to his wife, and who, after telling Manoah that his name is secret,

“…ascends in a flame of fire from the altar.” (Judges 13:2-15).

– Naymlap, the leading god of the Indians of Ecuador, was

“taken heavenward by the god of the speaking stone” (Sitchin, 1990).

– Von Daniken (1982) states that the “fiery heavenly chariots”, described by Enoch and Elijah are also found in Buddhist (Padmasambhava) and Hindu (Ardjuna) mythology. Apparently every child in India is well aware of ancient flying gods and their aircraft, which they called Vimanas.

– In the Sumerian tale of Nergal and Ereshkigal (Pritchard, 1975), there are hints that there were periods when the gods were not able to travel from one location to another, perhaps because their orbital positions or the planetary alignments were not favorable:

Anu opened his mouth to say to Kaka:

I will send thee, Kaka, to the Land of no Return,

To Ereshkigal…thou shalt say: “‘Thou art not able to come up,

In thy year thou canst not ascend to our presence, And we cannot go down,

In our month we cannot descend to thy presence…”

Probably the most familiar description of the AA’s aircraft (possibly spacecraft) is in the biblical book of Ezekiel. It is a very convincing description by a very astute observer. From this description former NASA engineer J. F. Blumrich designed and patented his impression of the vehicle (Blumrich, 1974) (Fig 7-1). A small cockpit, where Ezekiel observed the “Lord”, rested atop the body of the vehicle.

Fig 7-1.

The body, which Ezekiel called the “fiery firmament”, terminated in a single main engine. Attached to the body were four helicopter engines and blades, which enabled the vehicle to land vertically without using the main engine, which would have either covered poor Ezekiel with rubble or blown him away!

Not so well known, and more interesting in my opinion, is the tale of the “Divine Throne-Chariot” from the Dead Sea Scrolls (Vermes, 1962). The introduction to the piece reads:

“The Divine Throne-Chariot draws its inspiration from Ezekiel (1:10) and is related to the Book of Revelation. It depicts the appearance and movement of the Merkabah, the divine Chariot supported and drawn by the cherubim, which is at the same time a throne and a vehicle. The ‘small voice’ of blessing is drawn from 1 Kings 19:112: it was in a ‘small still voice’ that God manifested himself to Elijah. In our Qumran text this voice is uttered by the cherubim and it is interesting to note that although the Bible does not define the source of the voice, the ancient Aramaic translation of 12 Kings (Targum of Jonathan) ascribes it to angelic beings called ‘they who bless silently.’”

“The Throne-Chariot was a central subject of meditation in ancient as well as in medieval Jewish esotericism and mysticism, but the guardians of Rabbinic orthodoxy tended to discourage such speculation. The liturgical use of Ezekiel’s chapter on the Chariot is expressly forbidden in the Misnah; it even lays down that no wise man is to share his understanding of the Merkabah with a person less enlightened than himself…”

Not being a “wise man” I guess I’m free to share my speculation regarding the Merkabah. Of course the ancient Hebrews did not have the words to describe the technology which they were observing; regardless Ezekiel did quite an impressive job with the words available to him.

The description of the vehicle in operation, excerpted from Vermes by Barnstone (1984) reads:

“…and the cherubim utter blessings. And as they rise up, there is a divine small voice and loud praise; there is a divine small voice as they fold their wings.

“The cherubim bless the image of the Throne-Chariot above the firmament, and they praise the majesty of the fiery firmament beneath the seat of his glory. And between the turning wheels angels of holiness come and go, as it were a fiery vision of most holy spirits; and about them flow seeming rivulets of fire, like gleaming bronze, a radiance of many gorgeous colors, of marvelous pigments magnificently mingled. The spirits of the Living God move perpetually with the glory of the wonderful Chariot.

“The small voice of the blessing accompanies the tumult as they depart, and on the path of their return they worship the Holy One. Ascending, they rise marvelously; settling, they stay still. The sound of joyful praise is silenced and there is a small voice of blessing in all the camp of God.”

Here it is again with my “interpretations” in parenthesis:

“…and the cherubim (and the objects with wings – the helicopters) utter blessings (make a soft sound resembling prayer). And as they rise up (as the helicopter blades rise into place), there is a divine small voice (the blades make a swishing sound in the air) and loud praise (along with the loud noise of the engine); there is a divine small voice as they fold their wings (when the main engine is stopped only the swishing sound of the blades is heard as they drop down and stop).

“The cherubim (The helicopters) bless the image of the Throne-Chariot above the firmament (make a soft sound like prayer), and they praise the majesty (and they speak louder, and in amazement, about the brightness) of the fiery firmament beneath the seat of his glory (of the glowing, idling engine under the main body of the aircraft). And between the turning wheels (between the helicopter’s blades), angels of holiness come and go (wispy changing patterns), as it were a fiery vision of most holy spirits (of flames and vapors from the main engine); and about them flow seeming rivulets of fire, like gleaming bronze, a radiance of many gorgeous colors, of marvelous pigments magnificently mingled (the exhaust from the helicopter engines mingled with the multi-colored exhaust from the main engine). The spirits (the helicopters) of the Living God move perpetually with the glory (always move with the flaming exhaust) of the wonderful Chariot (of the wonderful vehicle).

“The small voice of the blessing (the soft sound of the blades) accompanies the tumult (accompanies the roar of the main engine) as they depart, and on the path of their return they worship (they make a loud noise) the Holy One (the god-pilot). Ascending, they rise marvelously (the blades ascend quickly); settling, they stay still (the blades drop down and stop,). The sound of joyful praise is silenced (the loud noise of the main engine ceases) and there is a small voice of blessing (the helicopter blades slow and drop down) in all the camp of God.”

I do not think there is a better description of Ezekiel’s “spaceship”!

Another interesting tale is that of Elijah meeting the Lord. In I Kings 19:11-12, Yahweh makes himself known to Elijah (Eli-yahu):

“And, behold, the Lord passed by, and a great and strong wind rent the mountains, and brake in pieces the rocks before the earthquake; but the Lord was not in the wind: and after the wind an earthquake; but the Lord was not in the earthquake; and after the earthquake a fire; but the Lord was not in the fire; and after the fire a still small voice.”

My translation: As the spacecraft approaches the exhaust was first perceived as a powerful wind; as it descended on the mountain the engine caused the earth under it to vibrate; the engine’s fiery exhaust then came into Elijah’s view; finally, the main engines are stopped and only the sound of the helicopter blades is heard as they slow and stop.

Zecharia Sitchin (1998) gives an interesting description of Elijah’s ascent to heaven. This apparently was also the time when Ezekiel wrote of his experiences with the Lord’s aircraft – about 592 bc:

“…a chariot of fire, and horses of fire, came. And they separated between them both (Elijah and Elisha), and Elijah went up in a tempest to Heaven. And Elisha was watching, and he was crying ‘My father, my father! the chariot of Israel and its Horsemen!’ And he did not see him again…”

(2 Kings 2:11).

If your language did not include the words aircraft, or rocket, or spaceship, or any other thing that could carry men through the air, what could you possibly call it but a “chariot”? And it seems clear that some of them were what we now call VTOL (vertical take-off and landing) aircraft.

So I am left with no doubt that the AAs possessed the technology to come to Earth in spacecraft, and to move about the Earth in various kinds of aircraft which did not require runways.

 

Ancient Nuclear Warfare

“We turned the switch, saw the flashes, watched for ten minutes, then turned everything off and went home. That night I knew the world was headed for sorrow”

– Physicist Leo Szilard, atomic bomb builder

“(It was) a single projectile, charged with all the power of the Universe. An incandescent column of smoke and flame, as bright as the thousand suns, rose in all its splendor… it was an unknown weapon… which reduced to ashes the entire race of the Vrishnis and the Andhakas… the corpses were so burned as to be unrecognizable. The hair and nails fellout; pottery broke without apparent cause, and the birds turned white… after a few hours all foodstuffs were infected…”

– The Mahabharata.

During the first Egyptian “pyramid war”, between Horus and Seth, Horus strikes:

“…(and he) let loose against them a storm which they could neither see with their eyes, nor hear with their ears. It brought death to all of them in a single moment…” (Sitchin, 1985)

 

This sounds to me like the gamma-ray and neutron pulse from a sub-kiloton nuclear weapon, which has no fireball and the nuclear radiation extends far beyond the blast wave.

Zeus battles the Titans:

“The hot vapor lapped around the Titans, of Gaea born, flame unspeakable rose bright to the upper air. The Flashing glare of the Thunder-Stone, its lightning, blinded their eyes-so strong it was. Astounding heat seized Chaos… It seemed as if Earth and wide Heaven above had come together, a mighty crash, as though Earth was hurled to ruin. Also were the winds brought rumbling, earthquake and dust storm, thunder and lightning.” (Sitchin, 1985).

I would guess that this was a large nuclear weapon which was detonated on or close to the ground, thus producing a large mushroom cloud.

Zeus conquering Thyphon:

“A flame shot forth from the stricken lord in the dim, rugged, secluded valley of the Mount, when he was smitten. A great part of huge earth was scorched by the terrible vapor, melting as tin melts when heated by man’s art…in the glow of a blazing fire did the earth melt down.” (Sitchin, 1985).

Biblical references to nuclear warfare:

– The destruction of Sodom and Gomorrah:

“…(Abraham) looked toward Sodom and Gomorrah…and he beheld and saw a smoke rising from the earth, as the smoke of a furnace.”

(Gen 18:27).

– “…and the Lord sent thunder and hail, and the fire ran along upon the ground; and the Lord rained hail upon the land of Egypt.”

– Exodus 9:23

“And it came to pass, as they fled from before Israel, and were in the going down to Bethhoron, that the Lord cast down great stones from heaven upon them unto Azekah, and they died: they were more which died with hailstones than they whom the children of Israel slew with the sword.”

– Joshua 10:11

“And the fire of God came down from heaven, and consumed him and his fifty.”

– 2 Kings 1:12

-“Thou shalt make them as a fiery oven in the time of thine anger: the Lord shall swallow them up in his wrath, and the fire shall devour them.”

– Psalms 21:9

“A fire goeth before him, and burneth up his enemies round about.”

– Psalms 97:3

“Thou shalt be visited of the Lord of hosts with thunder, and with earthquake, and great noise, with storm and tempest, and the flame of devouring fire.”

– Isaiah 29:6

There are many other clues regarding nuclear warfare. Childress (2000) discusses ancient atomic warfare, first Hattusas (Bogazkoy) in Turkey where “parts of the city are vitrified, and the walls of rock are partly melted.” He then discusses Sodom and Gomorrah and compares them with Hiroshima and Nagasaki.

He thinks Sodom, Gomorrah, Zoar, Admah and Zeboiim (Gen. 14:2) were destroyed, creating the Dead Sea. He quotes L.M.Lewis, “Footprints on the Sands of Time”, who argues for atomic explosions. And he quotes from the Mahabharata an excellent description of an atomic battle in which Arjuna is given a “celestial weapon” which he cannot use against humans “for it might destroy the world”, but he could use it against “any foe who is not human.”

From the Mahabharata, as quoted by Charles Berlitz (1972), is probably the best description of ancient atomic warfare one can find:

“…(it was) a single projectile, charged with all the power of the Universe. An incandescent column of smoke and flame, as bright as the thousand suns, rose in all its splendor… it was an unknown weapon, and iron thunderbolt, a gigantic messenger of death, which reduced to ashes the entire race of the Vrishnis and the Andhakas… the corpses were so burned as to be unrecognizable. The hair and nails fell out; pottery broke without apparent cause, and the birds turned white… after a few hours all foodstuffs were infected… to escape from this fire the soldiers threw themselves in streams to wash themselves and their equipment.”

Steinhauser (1975) relates a story from the Ramayana:

“…when the god Rama was threatened by a ‘army of monkeys’ (men or robots?) he put a ‘magic arrow’ into action. This produces a flash of lighting ‘stronger than the heat from a hundred thousand suns’, turning everything to dust. The hair of survivors falls out, their nails disintegrate. We know of such magic weapons from Sodom and Gomorrah, and from Hiroshima and Nagasaki.”

Mohenjo-Daro and Harappa, Pakistan: David Davenport (1996), who spent 12 years studying ancient Hindu scripts and evidence at the ancient site of Mohenjo-Daro, declared in 1996 that the city was instantly destroyed 2,000 years bc. The city ruins reveal the explosion’s epicenter which measures 50 yards wide. At that location everything was crystallized, fused or melted. Sixty yards from the center the bricks were melted on one side indicating a blast… the horrible mysterious event of 4000 years ago was recorded in the Mahabharata.

According to that text,

“white hot smoke that was a thousand times brighter than the sun rose in infinite brilliance and reduced the city to ashes. Water boiled… horses and war chariots were burned by the thousands… the corpses of the fallen were mutilated by the terrible heat so that they no longer looked like human beings…”

From one of the oldest chronicles of India… the Book of Dzyan:

“Separation did not bring peace to these people and finally their anger reached a point where the ruler of the original city took with him a small number of his warriors and they rose into the air in a huge shining metal vessel. While they were many leagues from the city of their enemies, they launched a great shining lance that rode on a beam of light. It burst apart in the city of their enemies with a great ball of flame that shot up to the heavens, almost to the stars. All those who were in the city were horribly burned and even those who were not in the city – but nearby – were burned also.

Those who looked upon the lance and the ball of fire were blinded forever afterward. Those who entered the city on foot became ill and died. Even the dust of the city was poisoned, as were the rivers that flowed through it. Men dared not go near it, and it gradually crumbled into dust and was forgotten by men. When the leader saw what he had done to his own people he retired to his palace and refused to see anyone. Then he gathered about him those warriors who remained, and their wives and children, and they entered their vessels and rose one by one into the sky and sailed away. Nor did they return.”

Childress (1999) also presents sketches of the Citadel of Mohenjo-Daro and a discussion of its destruction by nuclear explosion. Harappa and Mohenjo-Daro were the main cites of the “Harappa Culture” of the Indus Valley, an amazingly uniform and advanced urban civilization existing between 2500 and 1500 bc, the beginnings of which remain obscure.

About Parshaspur near Srinagar, Kashmir, David Childress (2000) states,

“It is a scene of total destruction; huge blocks of stone are scattered about a wide area giving the impression of explosive annihilation.”

Zecharia Sitchin (1985) devotes an entire chapter to a discussion of nuclear warfare in ancient times in Mesopotamia and the Sinai peninsula. In this book he also suggests the destruction of the Sinai “space facilities” by nuclear weapons. He offers as evidence

“…the immense cavity in the center of the Sinai and the resulting fracture lines (see figure), the vast surrounding flat area covered with blackened stones, traces of radiation south of the Dead Sea, the new extent and shape of the Dead Sea – is still there, four thousand years later”.

He maintains that the radioactive fallout from this operation wiped out the area around Sumer for a period of 70 years, until 1953 bc.

So did the gods use nuclear weapons in their struggles with each other and with mankind? You be the judge!

 

The Biotechnology of the Gods

“There are 193 species of monkeys and apes, 192 of them are covered with hair. The exception is a naked ape self-named Homo Sapiens”

– Desmond Morris

“It is difficult to say what is impossible – for the dream of yesterday is the hope of today and the reality of tomorrow”

– Robert Goddard

Tales from various sources suggest that the gods possessed an advanced knowledge of biology many millennia ago:

– The Egyptian god Thoth helped Isis, the wife of Osiris, to extract from the dismembered Osiris the semen with which Isis was impregnated to bear Horus.

– “The Telleriano-Remensis and Florentine codices declare that Quetzalcoatl, as great artificer, ‘formed’ and ‘molded’ the first human beings in his image, and that only he – and no other god – ‘had a human body’.” (Baldwin, 1998).

– “Before I (the Lord) formed you (Jeremiah) in the belly I knew you; and before you came out of the womb I set you apart…” (Green, Jay, 1986, Jeremiah 1:5).

– “…‘though it is said that in truth Zeus, King of the Gods, whom you call Amen-Ra, was her father’. Seti nodded when he heard this and murmured, ‘Even as Amen-Ra was the father of Hatshepsut. Yes, the gods can indeed be the fathers of the spirits that dwell in the bodies of kings and queens’.” (Green, Roger, 1967).

– In the tale of the birth of Samson, Manoah’s wife, who was barren, was visited by “the Angel of Jehovah” who said,

“Behold now you are barren and have not borne. But you shall conceive and bear a son…(who shall be)…a Nazirite to God from the womb” (Green, Jay, 1986, Judges 13:2-14)

(Nazirite: Endowed with special psychic or physical qualities to be used in God’s service).

– “The god Citlaltonac sent an ambassador to see the virgin Chimalma…The god told her that she was to conceive a son, which she did soon after…” (Fernandez, 1982).

– Concerning the birth of the Toltec god Huitzilopochtli: “…a woman called Coatlicue, who was charged with keeping clean a temple on the Cerro de Coatepec, near Tula, was sweeping the building when she saw a beautiful ball of feathers drop from the sky, and put it away in her bosom. When she had finished her work, and tried to find the feather ball, it was no longer there, it had disappeared. At that same moment she became pregnant, although she had been a widow for many years.” (Demetrio, 1983).

– In his discussion of the Sumerian story of the creation of The Adam (” the earthling”) from Mesopotamian texts (clay tablets), Zecharia Sitchin (1985) writes,

“…to achieve the feat Enki suggested that a ‘being that already exists’, Ape woman, be used to create the Lulu Amelu (‘the mixed worker’) by ‘binding’ upon the less evolved beings ‘the mold of the gods’. The goddess Sud purified the ‘essence’ of a young male Anunnaki; she mixed it into the egg of an Ape woman. The fertilized egg was then implanted in the womb of a female Anunnaki, for the required period of pregnancy. When the ‘mixed creature’ was born, Sud lifted him up and shouted: ‘I have created! My hands have made it!’”

These stories raise several interesting questions:

In prehistoric times how in fact did the gods incorporate their ‘essence’ into ape females, a different species (but possibly the same genus), to create modern humans, as ancient texts have suggested?

How could gods and humans, of different but possibly similar species, marry and reproduce as suggested in Genesis?

Within historical times how did the AAs incorporate their ‘spirit’ into the prophets, humans again of a different but probably similar species?

How could the ancient ‘god-kings’ of Mesopotamia and Egypt marry their immediate family members, as custom required, and reproduce without apparent damage to the family gene pool?

Before speculating on how these things were done it will be useful to list some of the bioengineering methods in use at the present time:

IVF: In-vitro fertilization. Sperm and egg of the same species is fused in-vitro. The embryo is implanted in the uterus. A common method of treating infertility since the 1978 British ‘test tube baby’.

CSCT: Cross-species cell transfer (or nuclear transfer). An in-vitro fertilization in which a somatic (e.g. skin) ‘donor’ cell is fused in vitro with the ‘host’ egg of a different but similar species (but of the same genus). The embryo is implanted in the uterus of the host.

CCSCT: Cloned cross-species cell transfer. Same as CSCT except the egg is de-nucleated, resulting in a clone of the donor animal (although a small amount of DNA, in the mitochondria, always comes from the egg). This was the method employed by Advanced Cell Technology, Inc, to regenerate the recently extinct Asian Gaur using an ordinary cow as host (which died shortly after – darn!).

RDNA: Recombinant DNA. Since, in most cases, DNA cannot be transferred directly from one organism to another, in this technique a desirable DNA fragment, isolated from the animal ‘donor’ cell, is incorporated into the plasmid of a benign bacteria (the vector). The bacteria reproduces the fragment as a part of it’s own DNA, and the hybrid bacteria cells are injected back into the animal. This is currently the method of human ‘gene therapy’, but one would expect that the technique could also be used for cross-species cell transfer if the bacteria were benign to both species.

HESC: Human Embryonic Stem Cells. A human somatic cell is fused in vitro with a de-nucleated egg of a different species. “These differentiated cells began to grow as an embryo and then reverted to become embryonic stem cells, which can grow into virtually any type of tissue for transplant use”

So let’s speculate.

Zecharia Sitchin’s statement concerning the development of the Adam sounds like our current technique of cross-species cell transfer (CSCT), the ‘essence’ being DNA fragments (genes) which the gods wanted incorporated into the Ape woman’s egg. The resulting Adam, a hybrid like mules or hinnies, was sterile. Later on some procedure was employed to enable the “mixed creatures” to procreate.

Incorporating the “spirit” (certain traits or abilities) of the gods into the prophets, apparently a partial and selective reprogramming of the central nervous system, could have been accomplished via the technique of recombinant DNA.

Finally, the custom of the ancient ‘god-kings’ of Mesopotamia and Egypt of marrying their sisters and reproducing without apparent damage to the family gene pool would have been possible using the technique of cloned cross-species cell transfer (CCSCT) in the following scenario:

Harvest an egg from a human female and remove the DNA.

Collect a skin cell from a living god, or a deceased god whose cells have been preserved by freezing (or embalming?).

Fuse the skin cell and egg in vitro, and electrically stimulate the embryo to start dividing.

Implant the embryo back into the female, whose immune system will accept it.

If all goes well the human will birth a clone of the god. Now repeat the procedure using a skin cell from a goddess. The cloned god-son and goddess-daughter would be totally genetically different, and could marry and reproduce without genetic damage or violating rules pertaining to incest. Furthermore, since the god-son and his mother are genetically different, they may marry, as was required in ancient Egypt, without violating taboos.

But what if the god and human are of a very different species, or even of a different genus? That this is probable is evidenced by literature suggesting that some of the gods were frightful to look at, and took great care not to be seen by humans, except possibly by the highest priest:

– Concerning the appearance of (the angel) Eleleth. “…now as for that angel, I cannot speak of his power…No, truly, my mouth cannot bear to speak of his power and the appearance of his face.”

(Robinson, 1978, “The Hypostasis of the Archons’)

– In the tale of the birth of Samson, the wife of Manoah says, “A man of God has come to see me, and His appearance was like the appearance of an Angel of God, very terrifying.”

(Green, Jay, 1986, Judges 13:2-14) (This might have been an android).

– “Quetzalcoatl…only he, no other God, had a human body. He was ‘el hombre-dios’, the god made flesh, man embodied with divine spirit.”

– Fanged (Tlaloc) or grotesque (Xipe Totec – ‘The Flayed One’), the gods sometimes hid behind skins of flayed humans.

– “…now it is revealed to us concerning the race of the gods, and we confess it along with everyone else, that they have come into being out of a pure matter, and their bodies are heads only.” (Robinson, 1978, the Asclepius tractate, 21-29)

– “…they (the first male and female earthlings-Adam and Eve?) saw that they were naked, and they became enamored of one another. When they saw their makers, they loathed them since they were beastly forms.” (Robinson, 1978, “On the Origin of the World”).

In these cases probably the techniques of recombinant DNA or the generation of human embryonic stem cells was used. Scary as it sounds the “the hominid-animal mixtures” described by the Babylonian priest Berossus (Burstein, 1978) could have resulted from the modern human embryonic stem cells technique. In

fact when this experiment was announced two years ago by Advanced Cell Technology, biotechnology watcher Jeremy Rifkin strongly objected:

“They should never, ever have done this. We don’t know what kind of creature could develop from that.”

I think we now do know of at least one kind of creature that can “develop from that ” – the Adam!

In summary it appears that our current knowledge of animal biology and physiology permits a close understanding of how the gods might have accomplished their bioengineering feats. Furthermore, since we are assuming that the gods had this ability millennia ago, it’s exciting to speculate concerning their current biotechnology. I suspect we would find it indescribable.

 

The Immortals

“The more science learns what life is, the more reluctant scientists are to define it “

Leila M. Coyne

“Eternity is very long, especially near the end”

Woody Allen

A universal attribute of the “gods” was their immortality, or at least their very long lives compared to humans. Several references to this characteristic follows:

– “For a thousand years, in your eyes, are as yesterday when it passes, and as a watch in the night.” (Green, Jay, 1986, Psalm 90:4).

This represents a time dilation factor of 1/365,000.

– “…that one day with the Lord is as a thousand years, and a thousand years as one day.” (Green, Jay, 1986, 2 Peter 3:8).

Also a time dilation factor of 1/365,000.

– “…adding up to 1200 divine years of 432,000 Earth years” – The Vishnu Purana, as quoted by Zecharia Sitchin (Sitchin,1993).

A time dilation factor of 1/360 or 1/432,000, whichever way it is interpreted.

– “Put not thy faith in length of years, for the gods regard a lifetime as but an hour.” (Frankfort, 1948).

A time dilation factor of 1/52,840 for a 60 year lifetime.

– Mead (1921) writes,

“Jesus tells his initiated of the dissolution of the universe after its expansion is completed ‘in the years of the light’. Mary Magdalene asks him: ‘My Lord, how many years of the years of the world is a year of the light?’ Jesus answered: ‘A day of the light is a thousand years in the world, so that thirty-six myriads of years and a half myriad of years of the world are a single year of the light.’”

Translating we have 1 day of light = 1000 Earth years; 1 year of the light = 365 days of the light = 365,000 Earth days = 36.5 myriads of Earth years, i.e. as used here “myriad” represents the multiplier 10,000.

– From The Vision of Isaiah:

“After taking Isaiah to Heaven, the angel was requested to return the prophet to Earth. Isaiah said: ‘Why so soon? I have only been here two hours.’ The angel said: ‘Not two hours, but thirty-two years…’” (Slemen, 2000).

A time dilation factor of 1/140,160.

These references seem to imply that the AAs did not live forever, but so much longer than humans that they appeared to be immortal. The texts report that the Sumerian goddess Inanna did age, but she was considered immortal.

One obvious advantage of being even relatively immortal is that one could move about the galaxy without having to achieve very high, and very expensive, speeds. As astronomer Sandy Faber noted, “If we could live longer we wouldn’t have to accelerate to high speeds”. Living longer instead of going faster is of course a familiar science fiction theme.

I can think of four possibilities to account for the alleged immortality of the gods:

(1) Organ replacement, if the gods are biological, or parts replacement if they are not – some of the ‘angels’ and other emissaries of the gods seemed suspiciously robotic:

“Behold, I send an angel before thee, to keep thee in the way, and to bring thee into the place which I have prepared. Beware of him, and obey his voice, provoke him not; for he will not pardon your transgressions, for my name is in him.” (Exodus 23:20-21).

(2) Rejuvenation by somatic cell nuclear transfer.

(3) Time dilation via travel at relativistic speeds relative to Earth.

(4) Gravitational time dilation by orbiting a large black hole.

I am not aware of any references to organ or parts replacement by the gods; however rejuvenation was likely since there was a “Tree of Life” which the gods had access to but humans did not. Zecharia Sitchin (1980) suggests that to be taken up in ancient Egypt meant that one would be immortal, so the rocket ship represented the “tree of life”, and was also symbolized by the obelisks.

According to the ancient king lists the 1st god-king of Ur reigned for 28,800 Earth years, but the texts also mention that the goddess Inanna grew old and fat after being on Earth for an extended period. So was the Tree of Life a repository of spare parts, a cellular rejuvenator, or was it a location such as the vicinity of a black hole?

Time dilation via high speeds seems unlikely, since the degree of time dilation implied by all of the foregoing statements would require velocities very close to the speed of light, which we currently consider to be impossible (although physicists have recently claimed to have transmitted photons, which have no mass, faster than the speed of light, moving a spacecraft faster than the speed of light would seem to require most of the energy in the entire universe).

Rejuvenation by somatic cell nuclear transfer was probably employed since the gods possessed a very advanced biotechnology. In this “still largely theoretical procedure…(the procedure) can ‘rejuvenate’ an aged cell, restoring the proliferative capacity inherent in cells at the beginning of life.” (West, 2000).

Rejuvenation (replacement) by cloning is also very probable. This procedure, which can be used to produce “young cells of any type”, avoids the “Hayflick limit” in which the “telemeres” on the ends of the chromosomes are reduced every time the cell divides until they are used up and division stops (Cibelli, 2000).

I think it’s also logical that the gods might reside, at least some of the time, in an equilibrium orbit about a black-hole which is massive enough to provide an acceptable tidal force across the width of their spacecraft. How massive? If we assume a spacecraft of any length, but having a width of a kilometer (this is a big spaceship folks!), orbiting a black-hole of 32,425 solar masses, the tidal force across the width of the craft would be a comfortable 1g (the pull of gravity at the Earth’s surface). For the case of “1200 divine years of 432,000 human years”, i.e. a time dilation of 0.00278, the ratio of the circumference of the event horizon to the circumference of the orbit of the spacecraft is 0.999992.

Since the horizon circumference for this mass is only about 601,585 kms, our gods would need to drive very carefully! But in this orbit, one Earth year in the life of the gods is 360 years on Earth. The case of “…a thousand years, in your eyes, are as yesterday when it passes” is more difficult since the orbit of the spacecraft would essentially have to coincide with the event horizon.

But there is another clue. In the Sumerian tale of Nergal and Ereshkigal (Pritchard, 1975), there are hints that there were periods when the gods were not able to travel from one location to another, perhaps because their orbital positions or the planetary alignments were not favorable:

Anu opened his mouth to say to Kaka:

I will send thee, Kaka, to the Land of no Return,

To Ereshkigal…thou shalt say: “‘Thou art not able to come up,

In thy year thou canst not ascend to our presence, And we cannot go down,

In our month we cannot descend to thy presence…”

Gravitational time dilation is the logical explanation here. The time dilation factor is of course 1/12, so that the 96,410 km radius of Anu’s orbit is now a comfortable 665 km greater than the horizon radius. Notice that even this modest time dilation, if not close to a black-hole, would require a speed of 99.6% the speed of light – not possible according to current knowledge.

Although astronomers are convinced that the Milky Way’s core contains a massive black hole of about 2.6 million solar masses (Science News, 153:59) it is over 30,000 LY from Earth. So how likely is it that there is a suitably large black hole reasonably close to us, say in the Orion nebula? (The solar system used to be in the Orion nebula but is now about 1500 LY away). One clue may come from Stephen Hawking’s (1988) observation that,

“The number of black holes may well be greater even than the number of visible stars (about 1011 in our galaxy)…then the black hole nearest to us would probably be at a distance of about a thousand million kilometers, or about as far away as Pluto…”.

Furthermore the Space Telescope Science Institute reports recent observations which suggest that they may be numerous:

“Two international teams of astronomers using NASA’S Hubble Space Telescope and ground based telescopes in Australia and Chile have discovered the first examples of isolated stellar-mass black holes adrift among the stars in our galaxy.” (stsci, 2000) .

Finally astrophysicists have recently postulated that there may be as many as 25,000 black holes within 15 LYs of the center of our galaxy (Escude, 2000).

Lacking other clues I’ll speculate that a combination of cellular rejuvenation for those that are biological, parts replacement for those who are not, and gravitational time dilation are probably how the gods achieved their incredibly long lives, relative to Earthlings.

Source

QEG OPEN SOURCED

Here it is free energy by Nikola Tesla!:

QEG OPEN SOURCED

small QEG-HopeGirl-logo

As Promised, here are the open sourced documents for a quantum energy generator. This has been made possible by the people and for the people. It is freely given to the world.

CLICK HERE FOR QEG OPEN SOURCE DOCUMENTS

An average modern household requires 5-10KW of power  to operate.

A conventional generator needs   15KW to produce 10KW of power.

To produce these 15KW of power we rely on gas, diesel, propane, coal or other products that can be metered creating profits for the oil industry.

130 years ago Nikola Tesla invented and patented an energy generator. This is a resonance machine that only needs 1KW of input power to produce 10KW of output power.  His patents are now in the public domain.

The Fix the World Organization has reproduced Teslas design with a few modern twists to generate the same results.   Our Quantum Energy Generator (QEG) provides 10KW of power output for less than 1KW input, which it supplies to itself.

We have freely given this technology to the people of the world.  We’ve open sourced a full set of instructions, user manual, schematics and parts list for any engineer to follow and reproduce the same results.

How the QEG works:
First we use a starting power source, such as an outlet or a crank to power the 1 horsepower motor. This motor spins the rotor in the generator core. The unique oscillator circuitry configuration in the generator core causes resonance to occur. Once the core achieves this resonance it can produce up to 10KW of power, which can then be run through an inverter to power the motor that spins the rotor. You can then unplug the motor from the original power source and the generator will power itself.

Cottage Industry Community Units specifically for the production of QEG’s are NOW developing in communities in 30+ countries.  The People are making their own free energy devices.

The QEG belongs to humanity now. Many will make further improvements and we will all co-develop this practical bridge technology together.

The QEG: For the People and By the People

Fix the World is currently traveling to Taiwan, London and Morocco for the month of April to help communities build QEG’s. Everything we have accomplished has been made possible by the donations of people like you. If you would like to help keep us going, every little bit helps! Please consider giving back and making a donation of any amount to the Fix the World Organization. By Clicking here:

http://hopegirl2012.wordpress.com/donate-to-hopegirl-ftw/

Source