I have made plenty of postings about mind control and it’s side products, but I think that people need some good example. I think that best example of music industry’s MK-Ultra mind control is Britney Spears. So read it through and make your own conclusions:
Through the years, the evidence became overwhelming that Britney Spears is a victim of some kind of mind control. She is being “managed” all the time.. her contacts are limited to whatever her “Handlers” agree to.. she can’t spend her own money freely without the consent of her father or fiance. Bear in mind that this is an adult woman who earned millions in her career, but is allowed a small weekly allowance that the court approved of giving her!!
You can read more information on her “condition” on my previous post titled Robot Britney.. Stand Still And Smile!, where you will understand the dark world of MK-Ultra mind manipulation and the disgusting project that is called “Monarch Programming”.
The Illuminati Formula Used to Create an Undetectable Total Mind Controlled Slave.
while the second is called: Deeper Insights Into the Illuminati Formula.
These two books – if you can find them – will help you enormously to understand the bizzare lives that women like Britney are living.
But if you have never heard of such things then an introduction is necessary, so you can see for yourself the hidden meanings of the song lyrics I’m going to quote later, where Britney herself tells her fans & listeners about the abuse she is going through!
Nazi work on mind control and Operation Paperclip
During the Nazi era, some “scientists” were working on a method to control the human Body and Mind so that an Agent/Handler would be able to use the victim any way he wants, and make him or her do whatever he needs.. like puppet masters to a puppet.
That project didn’t end with the Nazis.. it was transfered to America, just like what happened to many of the German scientists that the CIA brought to the USA to complete their work!
Many of those scientists continued their studies (in Physics, Social Behaviour, Chemistry, Nuclear weapons, etc.) funded by the American government.
Some of the projects were kept secret so the public wouldn’t be shocked by their horrific nature.. and that included the “Meinung Kontrolle” that became MK-Ultra or Mind Control!
The congress was forced once to investigate when information about the project was leaked. (The original documents of this investigation is available online)
Monarch Programming and the MK project
Monarch Programming is a part of the MK project where the subjects/victims are mostly females. They are used mainly as (Sex Kittens) but are also “useful” for many other purposes.
The term Monarch of course is a kind of butterflies, and it may refer to the fact that the sex slaves are OWNED by their masters, body and mind, and that these masters see themselves as “monarchy” or Elite that have the Natural Right to enslave other humans!!
The symbolism of the butterfly is that it’s beautiful but weak.. and after a period of apparent death is transformed into something new, like the new personalities of the victims after the trauma.
The main goal of the Monarch programming mind control technique is to create Multiple Personalities inside the victim’s mind, separated from one another, so that she will have no recollection of her actions that were done under the control of the other personalities (usually called ALTERs)
It is an intentionally manufactured MPD (Multiple Personality Disorder).
The techniques used to “split” the mind are based on a simple psychological fact. Under extreme pressure, and after brutal physical & psychological torture, some human minds will try to defend their sanity by autumatically ERASING the horrible memories, just like bad sectors on a hard disk.
The mind will create Memory Walls around these traumatic events, so that the human being can continue to function, without these events crippling him.
The abuse of this psychological fact is the basis of monarch programming.
The handler creates the horrible memories intentionally, usually by sexually abusing the targeted victim, preferably at a young age!.. This works “best” if the abuser is one who the victim trusts, like a father or a guardian, so the shock effect will be bigger.
When the victim realizes that their is no escape from the contining abuse, then the second phase of the technique begins.. usually under the supervision of a psychiatric working with the handler.. some of them are even assigned by a court, under the impression that a “professional help” will make the abused girl heal!!
The mind of the victim then is at its weakes state, and ready to accept “suggestions” like (Forget all the pain by locking it up inside your mind) or (Let’s move all the bad memories to an ater-ego that no one can see but you) etc.
The victim comes out of this PROGRAMMING worse than before, but this time she is:
Crazy in the eye of society, so no one will believe her if she really broke out of her mental prison and tried to expose her handlers!
Uncertain of her sanity.. so can easily be convinced that what she thinks is happening to her is really Hallucinations!
A slave to her handlers, as they now have the keys to her different personalities, and can switch them as they want.
Some of the victims are usually implicated in criminal acts (drug dealing or worse) so they will always remain afraid of the authorities.. And to kill any remaining hope inside them, the handlers may make them witness real corrupt cops and judges so the victim will be convinced that there is no way out, and any attempt to escape or expose is futile.
The medical statistics show a massive growth in the number of MPD cases in the USA, which isn’t seen anywhere else on earth. The real reason is that most of these cases aren’t “natural cases” but manufactured. The modern books call the condition of these cases DID, which stands for Dissociative Identity Disorder, as the victim’s mind dissociates into many Alter Personalities.
The victims also dis-associate from reality to cope with all the abuse.
What are the victims used for?
They are mainly females, so “sex slave” is the usual career.
And as they are familiar with abuse, some of them are used in the porn industry, especially the pornographic category of Abuse, Humiliation, Slapping, S&M etc.
They are cheap, and do whatever the producer tell them to do, even if it’s degrading or painful.
Some of the male victims are trained to be future handlers themselves!, as they will obey orders silently and feel no remorse. It’s a vicious cycle that renews its horror.
Some special cases are used as political assassins, like Sirhan Sirhan, the Christian Palestinian immigrant who allegedly shot Robert F. Kennedy in the 1960s then lost every memory of the accident. He is still in prison, and even after more than 40 years can’t regain his memory.. but the investigations proved that he was suffering from some kind of “Hypnosis”, beside his natural tendency to accept “mental suggestions” because of the trauma he felt while a child (during the Israeli attacks)
He also had a head injury while working as a jockey in America, so controlling his mind was very easy later.
Another occupation for MK-Ultra slaves is as drug dealers. The shocking thing here is that they work for official departments!
And the explanation of that is as follows: The CIA has too many dark projects that can’t officially ask the government to fund them, because too many questions would be asked then. So they run other “operations” that can secure the funds needed. And what is more lucrative than smuggling & dealing drugs?!
What is “better” is that they use brainwashed puppets to do the dirty work and take the blame if something went wrong!
Sex Kittens are also used as political leverage, to implicate important politicians in sex scandals then use the tapes to pressure them any way the Elite wants.
Any politician who “gets out of the specified line” could be made to shut up easily that way.
Another popular use for sex slaves is to serve the masters’ dirty desires that any healthy sane woman will refuse to do. But this is a dark and disgusting subject that you may find more information on elsewhere, as I don’t want to talk about it in detail.
Mind Control is an industry that involves Sex, Drugs and Politics
From all of the above you can see that the Mind Control is an industry that involves Sex, Drugs and Politics.. three of the most important things in the American culture. But what about the entertainment business and the pop culture.. where do they fit here?
The main reasons that the “MPD/DID” victims are used in the entertainment business are:
1 – Controlling the “Idols” that the masses love and mimic
2 – Using them as special high-class escorts to the VIP who are too powerful to be satisfied with “ordinary” women!
Michael Jackson was abused as a child, then was used by the “culture creators” to serve a specific goal. They wanted – for whatever reason – to convince the public to accept a black man when he turns “white” and acts in a childish/feminine manner. Then years later they wanted the public to accept a white man when he acts and sings like a black man, so they manufactured Eminem, and so forth!
This is a part of a Social Engineering agenda that other writers have written about extensively, so look it up.
(I recommend Alan Watt as a researcher who was part of the music business for years. You can also check the writings of Henry Makow, and Ben Singleon who used to publish his thoughts of a famous blog called psudo-occult media)
The second reason as I mentioned is to use the controlled famous celebrities as one-night prostitutes. Lots of millionaires pay a lot of money (to the handler who controls the female star) in exchange for having sex with these stars. Bear in mind that theses celebs are bred from the start to be “sex symbols”.
It’s a very profitable “industry” indeed, and its classic example is Marilyn Monroe.
Breakdown of Britney Spears
Now that you have all this information you will be able to understand the Breakdown that Britney Spears had some years ago.
You will understand the reason that she was smiling when she went into the hairdresser’s salon and asked for a complete head shave, so “no one can touch her anymore”!
She thought that making herself undesirable will stop her handlers from using her sexually.
She wasn’t breaking down but breaking out of her handlers’ prison! It didn’t work of course, but at least she tried.
Now they keep her in a semi-sedated state all the time.. I guess so the real original personality won’t surface on camera and expose the truth.
You can see that she is always afraid of the flashes of the cameras.. always clutching her fists and standing as an obeying soldier waiting for commands.
They used her kids to keep her “in line”, and I wouldn’t be surprised if they threatened to take them away if she gets out of line.
Her phone is monitored, the same as her web surfing!.. The few true friends she had were forced to get away from her by various means.
The Album she tried to use to “tell the truth” was censored and she was forbidden to release its songs.
This album was called (Original Doll) for obvious reasons. She went to radio stations behind her Label Company’s back to give the listeners samples of its songs, so the world will know of its existence and it’ll be hard for “them” to bury it!
Some of the songs were leaked later, maybe even by her. The most important to her was the song called Rebellion, which came at a moment in her life when she thought that she will be able to rebel on her handlers.
There is another song from her Chaotic album that was called Mona Lisa.. and it talks about her inner struggle with the alter ego, and her victory in the battle!
She even talked in the song about a “public fall” that was being prepared for her, to hurt her image and credibility. That was before the infamous breakdown incident!
Some of the lyrics are explicit and blatantly sexual in nature
Some of the lyrics are explicit and blatantly sexual in nature, and it might be referring to memories of some of the sexual acts she did while in her other personas.
And now you may be able to see the coming lyrics in a new light.
A story about Mona Lisa
This is a story, about Mona Lisa,
The Mona Lisa.
Ladies and gentlemen, I’ve got a little story to tell,
About Mona Lisa, and how she suddenly fell,
You see, everyone knew her, they knew her oh so well,
Now I’m taking over to release her from her spell.
She’s the original
She wants you to know
She’s been cloned
She’s been gone
She was taken under,
Drowning in her sea,
Running like an angel,
She was crying and could not see
Now see everyone’s watching as she starts to fall,
They want her to break down and be a legend of her fall
She’s so unpredictable
She wants you to know
That she’s home, that she’s home
You used me,
Tried to abuse me
Now I’m gonna give him what he wants and more,
Do all those explicit things that I told you “No”,
Places you couldn’t go,
You know where I’m talking
Money, Love And Happiness
I’m about to go crazy
I know you wanna get in my head
I’d rather get in yours instead
I wanna run away to a place of Fairy land
of dreams, that is where I’ll find
everything I need to have a peace of mind
All it takes is money, love and happiness
Be wary of others
The ones closest to you
The poison they feed you
And the voodoo that they do
But in rebellion
There’s a sparkle of truth
Don’t just stand there
Do what you got to do
You’ll find it in rebellion
Your body starts breathing
They’re not believing what they’re seeing
‘Cause you’re rebellion
You’ll find it so compelling
With everyone yelling
‘Cause your soul, you’re not selling
‘Cause you’re rebellion
Over To You Now
Do you like this?
This place, that I’m bringin’ you to
‘Cause I do
Oh my God!
I know this place
It’s still a secret
And I don’t think you’ve ever been
It’s kinda hard, to find the entrance
You need some juice
But you’ll love it once you get there
This special place
It’s in the basement
You have to work your way around
The place is hot
And then it’s pumpin’
So are you ready to go down?
And when you come
You might be stuck here
(p.s: This song clearly is about anal sex)
Another song relevant to the subject is “Sweet Dreams (are made of this)’ which was recently covered by the actress Emily Browning as part of the sound track to the weird movie Sucker Punch.
This movie is intentionally shallow on the surface, but is heavy with mind control symbolism!.. One interpretation of its meaning is that ALL the main girls in the story are simply different alters to the main character (Babydoll), and the movie depicts her struggle to accept the conditioning and trauma she suffered.
Some of the alters are “killed”, while the handlers allow one of them to “escape”. The original personality then is erased completely with a lobotomy operation!
It is really a weird movie, but it’s obvious that the writer knows the trauma-based monarch programming technique too well!
Sweet dreams are made of this
Sweet dreams are made of this
Who am I to disagree?
Travel the world and the seven seas
Everybody’s looking for something
Some of them want to use you
Some of them want to get used by you
Some of them want to abuse you
Some of them want to be abused
I wanna use you and abuse you
I wanna know what’s inside you
I just found this interview on the net and it was pretty mind blowing how these monsters have told and are telling all the things before they do it, because all the other people in the world are in sleep. They count on that we don’t care and that they can take this world without anyone noticing.
Here some most disgusting things in this interview:
“Hey, we ARE god’s chosen people. Its just most Jews do not like to admit it, but our god is Lucifer.”
(Rabbi Abe Finkelstein)
“You know, us, Jews, we’re pretty smart guys. I know that actually we’ll get all the rest of their countries around the world. They’ll wipe each other out. Because us, Jews – we are SPECIAL. We are the chosen people. And we are the smartest people in the world and have always said, down through the ages – we want a world of our own.
And we’re gonna get it, and there’s nothing any of the goyim cattle are gonna do to stop us.” (Rabbi Abe Finkelstein)
AND THE MOST SHOCKING ONE!!!:
“And ah, you know we are, I know you know, cause I’ve got it on your show before, I mean we steal a hundred to three hundred thousand children a year just in this country. And we drain the blood and we mix it with a Passover bread, and then we throw the bodies into the slaughter houses that we own, and we grind up all the bodies in the sausage and the hamburgers.
McDonald’s is one of our favorite outlets, and the, the people that eat out for breakfast, they [unintelligible, like “eat out their”] children for lunch, and, you know, us Jews, we’ve got to do what we do.”
(Rabbi Abe Finkelstein)
OKLAHOMA CITY – First McDonald’s was under fire for horse-meat, then mysterious “Pink slime”, and now human meat? A shocking discovery has been made in an Oklahoma City McDonald’s meat factory and other McDonald’s meat factories nationwide. Meat inspectors reportedly found human meat, stored in the meat factory freezers of an Oklahoma City meat factory…
So here’s the introduction, video and links…. this is just horrible:
This could be the most mind shattering thing you have ever heard of. If this won’t blow your mind, nothing will, or you don’t have anything to blow, just as ZioNazis openly state it about “goyim” – non-“Jews”.
An audio recording of an interview with Chabad Lubavich Rabbi Finkelstein outlining the doctrine of ZioNazis and their “father”, Lucifer.
According to Finkelstein, you are nothing but a cattle to be slaughtered and sacrificed to their “god”, Lucifer, and milked by “god chosen people” for all you have as long as you last.
This is an outline of what they call the “NWO” nowadays – a ZioNazi Luciferian doctrine of world domination and world takeover. The authority with which rabbi Finkelstein speaks is quite something indeed. He speaks as though he knows it all in and out, down to the last dot and comma.
Basically, it outlines their entire doctrine of evil most profound, world domination, parasitism unlimited, wars and revolutions, puppet governments and how they are controlled, ritual sacrifice of hundreds of thousand of children each year and the rest of it. This is pretty much their entire doctrine. Nothing much to be added to it. And it is pronounced clearly by someone of ultimate authority, pretty much clear on its face value.
Finkelstein is quite casual in this interview and tells it all bluntly, in a semi-humorous manner how “goyim” (non-Jews) are being exploited and destroy each other during all the wars and revolutions staged and managed by “god chosen people”.
“Rabbi Finkelstein amazingly gives honest answers about world Jewry’s control of banking, media and governments, their creation of communism, their founding of the Jesuits, their holocaust hoax, their human sacrifice rituals and many more jaw-dropping subjects. I find the only things more shocking than Rabbi Finkelstein’s blunt admissions are his complete callous disregard and playful disdain for us lowly “goyim.” What do you guys think of this?”
Here’s the video:
Here’s the content of the interview if you want to check details:
Abductions could be orchestrated with military and there are lots of experiences out there where there is nothing about aliens, but mind control and drug usage. This is a Maarit’s story…
Here’s the about her case video:
And here’s the story:
Synopsis of Maarit’s Interview
Disclaimer: This is a witness testimony of a military abductee Re-Ab, and contains disturbing material and is not recommended reading for those who cannot handle the reality of malevolent alien abductions or shadow government activities. I cannot vow to the absolute facts of all of this testimony nor all of Maarit’s opinions. This is offered as another piece of the puzzle exploring the milab issue and as an extension of the work of the late Dr. Karla Turner and Barbara Bartholic, as well as my own contribution. It is not meant to be fear based but as a “wake up call” testimony to acknowledge those who should not have to live lives of harassment, oppression and secrecy.
This interview is with a female milab-abductee from Scandinavia named Maarit. She chose to use a pseudonym to protect her anonymity. She contacted me in late 2010 to share her testimony of alien abductions and subsequent military abductions following her pregnancy with her son in 2005. I interviewed Maarit because she is one of a handful of very lucid abductees, who can recall a greater degree of her abduction related experiences without the use of hypnosis. Although she has neuroimmunological health issues related to multiple sclerosis, I believe her to be mentally intact and credible. She is also highly psychic and can lucid dream— the ability to be conscious and aware during the dream state, which enabled her to regain greater degrees of awareness during her alien and military abductions. A large component of her military abductions involve being used as a guinea pig with colluding pharmaceutical-medical companies who work in conjunction with the shadow government on milabs. Maarit shares her understanding of how and why she is “genetically modified”—a hybrid if you will–and how this figures into her neurophysiologic and immunological issues with Multiple Sclerosis, and an Rh-negative blood type.
Maarit explains how her life and marriage have been completely orchestrated by her alien handlers who are primarily draconian, reptilian and military. She has observed many species of ETs in her experiences and recalls being in DUMBs (Deep Underground Military Bases) and a nuclear silo with dark winged, draconian entities. She discusses her understanding of the genetic and energetic-soul matrix, vibrational aspects of hybrids and the alien soul recycling technology. She had an experience similar to Ted Rice of Dr. Karla Turners Masquerade of Angels, involving having her consciousness transferred into a “black box” and placed into a cloned body.
Although hybrid issues are now a focal interest in current abduction research, she asserts the most important aspects we need to focus on is how aliens—specifically reptilians–can manipulate, orchestrate and interfere with our relationships. Maarit awakened to her experiences after more memories surfaced, which triggered the realization of malevolent and mind controlling elements in her abductions. The use of Virtual Reality (VRE) brain entrainment technology is done to control consciousness, and is hooked up once an abductee is implanted. One of her screen memories installed by draconian entities involved seeing beatific, New Agey, dolphin scenes upon awakening from an abduction experience. Beneath this screen memory was an abduction in an underground base. She admitted to having previously promoted popular “benevolent ET experiences” on a Scandinavian radio talk show before becoming lucid to the reality of the deceptive, mind controlling nature of her abductions. Now, she is fighting back, regaining her lucidity and spiritual resilience. She wants us to know humans can fight back for their awareness and freedom. Awareness is the key to empowerment.
1. Tell me a bit about how you discovered you had ET experiences, and your initial beliefs about alien/abduction and contact? What shifted your beliefs about the true nature of ETs and your experiences, any particular incidents which “broke the programming” of what the more popular UFO groups and researchers were promoting?
Before we start, I would like to thank Eve Lorgen for her work, which bravely goes to the dark side of this alien phenomena. I contacted her while I was frustrated and tired. Her open heart and integrity as a researcher and therapist made a huge impact on me. I consider our intensive correspondence as a major turning point in my life. She offered her presence for a total stranger, not so many willing to do these days. In the UFO-field there are not so many researchers who are willing to step out of the comfort zone of contactee oriented happy UFO-scenarios. Only by realizing the alien manipulative agenda we can achieve autonomy for our consciousnesses as a human race.
First of all, I consider myself to be an abductee–being unwillingly used by aliens and military for several purposes. Because I have been manipulated, drugged and mind controlled by humans and aliens, I do not use the term contactee. In my experiences there is no reciprocal nuance to be observed as in cases of alleged contactee people. I do not consider myself to be special or chosen in any way. I don’t have any channeled information to offer. All I can offer is question after question.
When I refer to term shadow government/people, I mean globally operating companies related to medical warfare operatives as well as factions of military / intelligent groups. Which ones, I don’t know for certain.
I can divide my alien encounters in two different parts. One part of this alien encounter began before I was even born. I have conscious memories of that time when I was in another, subtle form of existence and forced unwillingly to manifest in this three-dimensional universe as we humans observe it now. I consider the essence of my spiritual being to be alien, per se. I remember how I was shown different parental alternatives to choose from. The connecting link between these human couples was some sort of DNA- structure. My consciousness moved into my infant human body just before labor and I was fully aware of these memories even when I was a baby. After a while the normal neurological adjusting begun and I saw myself as a “normal” child with heightened psychic abilities.
The second part of my “human” experience with alien encounters began in childhood at 4 years old, and I knew I was not alone. When I woke up, there was blood on my pillow and I knew “somebody” stuck something in to my nose. I constantly saw scary dreams and woke up in terror. These things happened during the time when I was 4-7 years old. But as funny as it sounds, during the childhood I do not have any clear memories of these beings that were terrorizing me or how they look liked. But when I saw a picture of a UFO, I knew “they” were the ones.
Another wave of consciously remembered encounters happened, as usual, during my teens. Even as a child I was fascinated by astronomy, nuclear physics, philosophical principles related to existence and ontology. I was more and more “humanized” as whole. I wanted to find the solution, the ultimate matrix for meta-consciousness and all that I could find at that time was the New-Age movement and the shallow answers it had to offer.
Even when I was fairly aware of being abducted at that time (16 -30 years old) that these encounters were not benevolent, I was mentally forced to interpret my experiences as such. The New-Age way to look these alien encounters during 80′s and 90′s was so full of subjective reasoning and pressure. Mostly because here in Scandinavia some the UFO-researchers are highly contactee oriented. And the material these “certain” new age-minded UFO-researchers produced was directly linked to their publishing business.
In Scandinavia we were not given proper options in which we could judge the characters of the alien encounters by ourselves. I was once even on the local radio telling (when I was still into the New Age perspective) about these lovely space brothers, which are here to lift our vibrations, because I did not want to be shut out from the community of friends I was related to during that period of time. At that time I was just one piece of this manipulative machinery, which was planned to misdirect people by giving them highly calculated answers to solve their nocturnal horrifying problems. And I did my job, but not with smiling face.
As I got older, the abductions began to be physically more real. I could remember things, which did not suit the concept of contactee based rhetoric. My ovum was harvested on regular basis and I saw constant marks like sudden bruises, straight cuts, triangular rashes, scoop marks, burned like areas in my ankles, needle marks on my forehead and nose with the upper layer of dermis removed on my body after these episodes. I could not lie to myself anymore about the nature of these encounters. They were malevolent, controlling and they affected my consciousness and memories in a suppressive manner. Not once was I given a straight answer by the abductors for the alien agenda.
At that time I found myself being alone. Suddenly after that conscious realization, of questioning the aliens motives as not being “good”, was when I was isolated mentally and socially via certain episodes in my life. I was carrying a secret no one publicly would respond to in the UFO-field here in Scandinavia. So I felt I was living a private hell in front of many ignorant eyes.
The shift from New-Age beliefs to more an objective state of mind was subtle but very solid and inevitable concerning my realization of the true nature of these alien abductions. The milab involvement however, began when I was pregnant 5 years ago, in 2005-6. At that time I had no knowledge of this milab scenario at all. I did not know what was going on because the UFO-researchers in Scandinavia neglect this subject and there is no open discussion about this military involvement at all in my country. We have only one New Age magazine, which promotes tarot-readers and lighthearted contactees and their supporters in UFO-community.
I just wondered about this sudden appearance of military and medical personnel during my abductions. The focal point of consciously realizing my milab connection was the precipitating incident, which “coincidentally” delayed my Multiple Sclerosis diagnosis 2 years ago. My diagnosis was not given in proper ways, because my qauda equina operation was initially delayed and there was a professional error made by a local doctor. The surgery left me with an untreated infection, which created a permanent inflammatory problem with the central nervous system. The unbelievable doctor’s behavior caused a huge amount of mental stress and a short episode of dissociation, which affected the way my brains functioned. This actually caused me to remember things I should not have. I became conscious in a way the shadow government would not want me to be.
In hindsight, I realize many of these major events and turning points of my life are produced and controlled by aliens. And this is the most important factor I’m going to pinpoint out later.
2. Why do you believe or have you been told by the aliens or military “handlers”, why they are using you in their experiments? Are you a hybrid or genetically modified by aliens?
The aliens have used me because I live in a genetically modified body. My physical existence offers an opportunity for the aliens to make genetic surveillance in a multigenerational way. When I say genetically modified, it is my understanding that this means an alteration of DNA so that the nervous system modified with alien DNA–and energetic body as well— can sustainthealien consciousness because only this kind of consciousness can make a hybrid body functional, per se. This is actually part of the soul recycling technology. When I say I am a hybrid I understand myself—my consciousness is something you refer to as draconian. I was obligated before birth to move into an altered body to fulfill my task. To perform that transition I had to choose the human parents too as long as the mother was a blood type RH negative factor. This immunological trait is a common feature among these so called, Draconians and their reproduction. But having an Rh-negative blood type doesn’t mean you are a hybrid, it’s just a necessary condition to carry on the biological technology. The genetic modification is very tied to CNS functions and immunological moderation. This alien genetic factor includes modification of consciousness aka vibrational aspects of soul/consciousness matrix as well. The soul matrix is a vibration like electricity in that it can be observed as tones of frequencies. The question of genetic alteration is not purely physical, as we understand. It includes vibrational factors as well. My understanding of draconian DNA is that it is basically inorganic, unlike the human DNA. The draconian body-DNA function needs radiation to sustain consciousness like humans need air to breathe. The draconian DNA structure is not a spiral alpha helix but a denser form of some inorganic and energetic matter, which could be described as a quadrangle. With this quadrangle the structures of energetic tones are organized to serve bodily functions. I believe this is why there have been procedures done to human DNA—balancing the functions and partitions of inorganic and organic matter within DNA. The fundamental building blocks for life are not quite what we have been told, apparently.
So, true hybrids have alien consciousness in an altered body via a genetic CNS modification. CNS modification is partly needed to handle the frequencies of alien consciousness with the energetic body. The alteration of CNS-genetics is done outside the womb during the impregnation by technology, which can hold and change the soul matrix via magnetic field. The modified embryo is then implanted inside the womb of the Rh negative female. The different kind of alien soul matrix revives the function of the hybrid body and altered CNS function. (All hybrids are psychic). So you may understand why the real hybrids are keeping the secret and silence. The various produced beings, through hybrid bodies, are altered outside the womb during the embryonic stage for other things as well, such as functioning in a different kind of environment, and they have higher tolerance for radiation as well. The radiation itself is not poison to some ET races at all. (EL-This was shared with me BEFORE the Japanese nuclear incident on 3/11/011 at Fukishima)
I have been used as an incubator for alien hybrid embryos. The Rh-negative factor is the key here. Many women abductees used in this way have the Rh- factor in their blood. The Rh- factor prevents the possible autoimmune reaction during the early stages of alien pregnancy.
“Normal” females are also producing human embryos for aliens. These embryos are partly grown and used as a biological protein source for Reptiods. Abducted humans—abductees—do not need genetic alteration of they are used for other biotechnological uses and consumption—for Reptiods. So frankly put, as food. These reptile beings are able to grow large amounts of biologically “alive” tissue. This tissue can be cloned to make manufactured grey beings as well. This kind of tissue cannot be cloned forever without degeneration. That’s why the aliens are abducting so many humans. All of us have to satisfy the need of food for a large alien civilization. It’s so simple. We are not on the top of the food chain. This is something we just have admit to ourselves.
Many abductees tell us about the baby presentations made by the aliens. The whole thing—in my opinion– is just meant to do some psychological bonding to prevent resistance of human beings. Nothing more. The babies presented, as more mature babies are probably human-alien hybrids made to use as servants later on.
My son is being abducted as well. He is genetically modified too. His birth was a miracle. We had to use ICSI-method (in vitro fertilization) in order to have a vibrant embryo to be placed. During my pregnancy in alien encounters, I was introduced to my son two times. The body was small, his skin pale. He had huge blue eyes and only a small amount of hair. When he came to see me with this “Nordic” looking figure, his consciousness was maintained in a classic hybrid-like body. And just like mine, his awareness joined the genetically altered human body during my delivery. He has described that kind of memory to me. We have an ultra strong connection, and we communicate also by using pure feelings.
Military want all the “cookies” I can give them–my genetics, my psychic abilities, and there is medical research being done that offers benefits for both involved parties and their co-operation as well. And they have plugged my son in to their operations as well. This was the main reason I decided to share my story: to tell people to wake up and fight for their freedom. We have to understand that there are multiple participants with multiple agendas related to abductions/milab activity. And more and more, I believe, the two—medical shadow groups and military are linking together. It seems to me that human participants have to work for these alien beings in ever deeper levels than was previously imagined. This is one reason why I believe there is not going to be an open disclosure about the true nature of the alien encounters. Some human factions are too deep into this mess. The disclosure would risk the economical/scientific benefits and power these groups have gained via alien connection and cooperation.
When a human is abducted for a first time, s/he is being implanted. The military has the needed technology to track the signals emitted by the implants of these new abductees. The implants insert themselves within the central nervous system, when the connection is made; there is a signal, which the military can pick up. So, all the alien abducted people are possible milab victims—hence—ReAbs, if they posses something that can be beneficial to the military. No one is safe and the MK ultra days are not over. The military/shadow government has the identities of every single abductee in this world.
3. What kinds of medical issues have you experienced that you believe to be due to abductions? Have you been mind controlled by them, how?
Aliens have done several physical procedures. They have taken bone marrow from my neck and hip with a long needle. They have collected ovum. They have put an implant in to my nostril. They have collected tissue samples from my arm and knee.
Psychologically they have erased my memories and installed fake ones. They have used what felt like electrical vibrations straight in to my frontal lobe to do mind control. One morning I found a puncture mark in the middle my forehead, after having strong feelings to not look in the mirror (suggestions by them to not look into the mirror), and when I saw the mark, I remembered how they put some kind of electric vibration into my brains somehow through that needle and I was told not to remember and not to talk. And then they forced me to look at images of the dolphins again from a screen-like device. I see the dolphins every time when my subconscious is trying to bring something to the surface. They have caused pure emotional horror and enjoyed the ride. (EL—I have nothing against dolphins and friendly higher intelligent species, it’s just their image is being projected in screen memories to pacify our minds into complicity.)
I have an autoimmune inflammation in my CNS, because the inflammation of peripheral nerves went straight to the CNS (following a surgery). The diagnosis is G 37.9, and still waiting to be confirmed as MS, the primary progressive form. The whole episode—with the delay of the operation and the inflammation going straight to the CNS—was, I believe, alien orchestrated and my body is now being used as a guinea big for medical pharmaceutical research done by some faction of the military/shadow government. Because my body is altered, I have degeneration in my pelvic and cervical area as well.
I have had a neuropsychological evaluation twice. I’m suffering from memory problems and visual-spatial problems as well. The findings refer to an organic nature of impairment. I cannot work because of my physical and neuropsychological condition. Some of these changes can be explained via MS, and some because of the mind control and the methods aliens and military use. There is no cure for this. I have been recommended for neuropsychological rehabilitation.
I have been told by Draconians that my body is genetically altered. My blood pressure is quite low and my average body temperature is somewhere between 35-35.5 degrees of Celsius. (37C = 98.6F, so it’s between 95.0- 96.8 F) My psychic abilities are far higher than average. I sense human emotions and thought forms as soon as I see a person. This is something I would like to get rid of, because it wears me out. I prefer solitude and vibrationally developed, disciplined emotions like gratitude etc. Unfortunately there are not so many people possessing these features. I believe I have also been used to test draconian weaponry modified for human military use because of my psychic abilities and vibrations. Some weapons can only be activated through psychic influence.
4. Have you recognized any of the locations you have seen in your milab/abduction experiences such as DUMBS (Deep Underground Military Bases) or medical facilities? Have you recognized any human personnel you have seen in your “regular life” accidentally?
I have been in a DUMB several times that I can consciously remember. One place believe–merely my own speculation–is located somewhere in Canada or in the northern part of USA. The speculation is based only on visual observation of the nature. When I got out from underground I saw these huge trees I have seen on nature documentaries in my country. It was a mountain area, in the middle of the forest. And there was a railway entering in to the DUMB. The entrance was open and there was fence around the yard.
The other place was a nuclear silo, in a place were nuclear weapons were stored. These places could be one and the same, but somehow I doubt that.
I have seen the same medical personnel who treated me at the University hospital, department of Neurology during the process of my neurological diagnosis. There is one professor of clinical neuroimmunology and neurophysiology and one medical doctor of neurology who are using me in their medical research done for the shadow government. This medical research is dealing the use of nitro-oxide as a regulator in the immune response of the CNS. Nitro-oxide is under constant interest in pharmaceutical work. (Not to be confused with dental nitrous oxide) Applications can be used in cardiovascular and pulmonary diseases and in asthma as well. There are experiments made to use the asthma medication to relieve the symptoms of MS flares. So, the connection between my condition, these doctors and milab abduction is to understand and regulate the immune response in the human nervous system.
I believe I’m under interest because of my genetic differences too. So I’m serving multiple purposes, which I probably even don’t know about. One factor in my opinion is their interest in understanding how to connect together different types of neurological tissues without creating the usual degenerative autoimmune reaction. As one can understand, the application of this information is huge. One can do the digging by them selves by Googling nitro-oxide and CNS. It is all there.
The professor I saw in a DUMB is closely connected to a major pharmaceutical company. The same company is developing a drug for narcolepsy as well and the nitro-oxide is playing an important role once again. I believe I’m used to test the narcotic influence of different medicines as well. The medical researcher I’m talking about is doing research on the neurophysiological aspects of dreams as well.
I also had one very important condition they needed in their study. I did not have plaques in my brain or spinal cord. These kinds of findings are implications of the primary progressive form of MS. All the people in my area suffering from this type of illness are being sent to these specific doctors for evaluation. Surprisingly. In this specific University hospital there is a highly respected research group doing studies about the nitro-oxide finding as an indicator of brain atrophy in primary progressive MS. This specific university hospital and some personnel of this research group have been doing medical research and evaluation for the military people too. So there is a huge network going on, not only nationally but globally too. And the unfortunate ones (milabs) are being plugged in:
The applications for NO are drugs developed and under development for neurological diseases as well like Frampidrine for walking difficulties and muscle weakness for people suffering neurological diseases.
Before this accident I was not interested in pharmacology in any level. I only had one conscious memory of the nurse who came to me when I was sitting on the research table, in a DUMB probably. She had a needle and she injected some liquid in to my right knee. “This is nitrixide (that’s what I first remembered)” she said. “You should not make such a fuss about things.” After that I saw the same medical researcher entering the room. That’s all I remember. And all I needed to remember to start to do my own checking out. I have taken photos from my knees after the nitro-oxide shots as well.
So, it’s no wonder these events were manipulated to the point were the delayed operation caused an autoimmune response in my CNS. I was a good catch. And this is only the tip of the iceberg from the work of this hidden network. I’m sure of it. But to go deeper in to this could be a story of it’s own.
5. What kinds of aliens are primarily working on your case? Can you describe their basic jobs and goals?
Primarily Reptiods, greys and other aliens like mantis-creatures, because they are working under draconian control. Before I continue, I have to clarify the position of reptiles and Draconians in order to understand what is going on and by whom.
Draconians do not conduct abductions per se as the interdimensional reptiles are doing, even they are occasionally seen in the UFO. Dracionians control the reptilian race and their behavior and the reptiles are servants for the Draconians. Draconians need the hybrid bodies to be used as containers for consciousness, because only a vibrant soul-matrix can reinforce manufactured hybrid bodies. There are a lot of species co-working in these scenarios, so it’s difficult to define what kind of role the different ET creatures are playing from our point of view. Positive, neutral or negative.
When I generally speak about hybrids, I don’t know whether they are human-reptilian, human-Draconian, or human-some other race/races. And the other abductees and UFO-researchers don’t know that for sure either. So pinpointing hybrids only as a reptilian human origin we can do crucial damage for the hybrid rhetoric as a whole.
Reptiods are servants for the draconian race. There are not so many Draco’s on Earth, physically present. I have seen them only working in this particular nuclear silo. Reptiods are allowed to use humans as a resource and do their thing as long as they don’t disobey the draconian administration. By using hybrids, Draconians can produce workers, biological material etc., (who knows) for their use. Reptilians do the needed work. They abduct people and hybrids for the use of cloning and further production. They have advanced technological development to do that and they are allowed to use humans for their own purposes as well, primarily for nutrition and entertainment. By entertainment I mean sexual activities with humans. These sexual behaviors have malevolent, sadomasochistic features.
In other words, there is a vast biological industrial activity going on where humans are being used as a source for biological and psychological–emotional material. The basic job for Reptiod-beings is to survive and carry their own cultural-genetic traits. This is something we have to understand. They do what they do because they are what they are– highly intelligent beings capable of remarkable things.
We have to step out of the victimized state of mind and get rid of the fear. This is the only way to get the respect of these creatures and develop a communication of some sort. Whining and unnecessary complaining are the dead end, then we start to dig our own psychological and physical grave for sure. Objectivity and courage is needed even to try to understand a different kind of intelligence and technology. This is something we are not able to do. The researchers who only feed the fear instead of objectivity are no better than the New Age people who are proclaiming easy ascension and waiting for spiritual enlightenment–even while being roasted in the oven.
I believe these Reptiod creatures are the main problems and bullies for humans. And these Reptiods do shape shift and can take the form of these so-called Nordics as well. Draconians are far more advanced than humans are capable of even understanding. I have consciously seen dark brown Draconians with wings and hoofs. They are a highly technically advanced, warrior-like race with great disciplined actions. Draconians are also philosophical creatures and can be very fearless if needed. Females are superior to male. They consider themselves to be more sophisticated than humans. Because they are ranked quite high in hierarchy of different races, we rarely see them like we see the most highly ranked bosses in our companies. They mingle with their own-kind of company.
I remember being in a silo barefoot and this male draconian came to me and sent me a mental thought that he finds the human feet very big and repulsive. I found it funny, because during that episode I could not even understand where I was. Their goal is to continue their lives as a race as well. Just like we humans do.
It is odd but very often, in the milab ops scenarios we are not allowed to wear shoes, and our clothes may be lying in one place, later to be put on, but we never have our shoes. It’s like we are not allowed to wear them. In my opinion there are couple of reasons why milabs remember being without their shoes or clothes. One reason is the fact, that some milabs are involved with research for example, related to radiation and they are being decontaminated after testing. This can partly explain the memories of showers and locker rooms. The other reasons why some milabs are not wearing shoes are the satanic rituals -performed in DUMB – and their participation in these rituals under mind control. Being without shoes is serving ritual necessities and psychological manipulation as well. Remember the Nazi concentration camps?
Reptiods are divided into interdimensional beings and some creatures that live under the surface of earth. These creatures live in caverns and have red eyes and dark brown skin. They eat meat too. Interdimensional Reptiods can shape shift and are predator-natured.
I have observed a conflict between the Draconians and some Reptiod party/faction. It’s about power. There was a military faction assisting–willingly or unwillingly—I’m not sure—and these specific Reptiod groups are trying to overcome the draconian leadership, because the Draconians are in charge of some nuclear military DUMBS too. If this Reptiod rebellion is proceeding I’m feeling worried because this would mean the total loss of control made by Dracionians. Reptiods would be allowed to mess around and even the shadow government would not be safe. If considering this as a chess game, the situation is not pleasant from the human point of view. But this is merely my speculation.
I saw the power struggle personally during an abduction. The draconian entity came to stop the Reptiods and prevented them from using me somehow. This has happened two times. So I guess I have something to offer to these Draconians and shadow government and that’s why they keep an eye on me.
The Reptiods have expressed very violent activities towards me and some other abductees I have seen on the UFO like beating, etc. I believe they are having a hard time trying to suppress their basic need to kill. And that’s why some abductees are reporting very disturbing violent abductions and treatment.
The degeneration of personality traits and grappling for power applies to other species as well. By this degeneration I mean the need to produce unnecessary suffering while enjoying it.
There is also an original grey-race, per se. They are workers for these reptilian entities. And there are a huge amount of manufactured grey look-alike beings used for physical labor. They are being manufactured inside a DUMB and some are being transported to other locations.
6. Many milabs and now the popularized “supersoldiers” have described being used as operatives under mind control physically across the globe and even off world. They also describe virtual reality experiences, a term popularized by the late Dr. Karla Turner. Can you tell me if you can tell the difference between a true physical abduction, and one that is virtual reality?
Yes. But this is only my experience. In my case true physical abductions leave marks. Something is done to my physical body. Sometimes there can be menstrual irregularities and abdominal pain, bruises, needle marks, scars etc. The consciousness is totally controlled during these episodes. I can remember flashes of 1-10 seconds. Then I remember being shut down. My field of observation is narrowed. I can see sometimes see clearly tiny areas at one time, like clear small windows of clarity in a limited field of vision. Sometimes I can feel being moved and pushed even when I’m unable to open my eyes or when I’m in a dream like state. In physical abductions I get more of a drugged feeling and less clear memory, and lots of blank spots in-between. Most of the time these memories-whether physical or virtual reality– are very hard to separate because of the consciousness control.
Nowadays military don’t walk in to your house anymore. Trust me. They can open a time/space portal and pick you up so that you don’t even notice.
The main objective for these aliens is not to be noticed. They prefer to stay in the shadows, because otherwise humans could start to do preventative actions to stop the abductions by strengthening their lucidity, using and developing proper technology for resistance. So we are not dealing with gods. We are dealing with mortal entities.
In the virtual reality experiences, it is as real as watching a movie or living an everyday life, with no observable limitations. With lucidity, realizing you are dreaming–you can wake up from this scenario. In VRE there is always some aspect of “strangeness” involved if one is able to recognize this. By this I mean for an example, a different kind of phone you have never seen before, strangers, furniture etc. By recognizing these, you can achieve lucidity and wake up in your bed. But this is hard, because the VRE is produced in your brains by using methods like signals and electrical stimulation, which affects your neural and muscular function as well. This makes the scenario seem even more real. And physical/mental adjustment is being done under VRE situations. This makes the scenario seem even more real. And physical/mental adjustment is being done under VRE situations. By this I mean psychological conditioning on how to act or control oneself during RV-operations, behavioral modification on how to handle fear, tolerate pain etc. True physiological modification, implanting is being done either in a DUMB or in a UFO. Reptiods use VRE for harvesting emotions too. This happens by causing horrifying VRE experiences for abductees. The military and aliens as well can produce VRE by sending signals to implants. Military can change these induced brainwaves into images and sounds on a screen. Aliens don’t need that kind of technology, because they sense these telepathically.
I have been able to observe the exact moment, when I’m being activated for the use. This happens when I’m going to sleep. Just when my brainwaves are starting to change for a sleep mode, I see a flash of bright light in my “minds” eye, even with eyes shut. Usually the scene “in my eyes” change and I get an impression of an open space in front of my closed eyes. I can also see from what kind of interior I’m been plugged into. So there is a radar-like computer network through which abductees can be controlled. There is also portable equipment that have antenna, which can send the VRE signals too. And some factions of the perpetrators are using this for their own purposes. I believe the connection can function in two ways: Once the abductee is able to use heightened psychic capacity and lucidity, one can attain information from the other party by doing remote viewing. I have been able to this once and then I saw the warehouse from where the signal was sent.
One has to understand that we are dealing with high technology, which most people don’t know– even the moderate applications can be seen in a use in everyday life. For example, one “official” branch of this technology is being introduced to people as different kinds of computer related appliance for handicapped people. One can do their one research on this subject if interested.
7. Have you ever been tasked by your milab controllers to do remote viewing? If so, how is this experience compared to the entrained “VRE” scenarios?
Yes I have. I have been sent to observe some alien creatures (draconian related) several times. I have also been used for more mundane issues like checking some locks or paper documents. These were written in English–that I could remember. Remote viewing is produced either by physical abuse (and splitting of consciousness) or by using the VRE related technology. Consciousness can be separated and moved by using some sort of electrical vibration. I can tell the difference between the RV from VRE by observing the visual scene I’m seeing. In RV my vision is somehow truly controlled. It feels to me, like I’m watching the environment through a bottle. The vision is somehow twisted and distorted. I see only the things I’m told to observe. I can do some conscious reasoning during these episodes as well. Sometimes there can be unwanted reaction and the RV situation is slipping into a spontaneous out-of-the-body experience. When this happens, I hear a buzzing sound in my ears and I have problems controlling the movements of my energy body. I can slip through the walls recklessly until I’m being drawn back to my body. Also, in RV there is seldom any physical sensations, pain etc., present. Naturally. So only by lucidity and deep reflection one can discern these different kinds of phenomena. Very often, remote viewing and virtual reality they are also linked together.
8. What do you think is going on with the hybrid issue as popularized by Dr. David Jacobs in his alien abduction case histories? Have you seen alien-human hybrids in your experiences? What do you believe is their real function?
When we are talking about the hybrid-issue, we have to understand that as a human race we don’t really have the complete picture of this issue. There are not as many genetically different alien related hybrids on earth as the some researchers are stating. That’s for sure. To say alien hybrids are all malevolent, suffering from severe personal disorders is as narrow-minded approach as New Agers have, when saying that alien agenda is good and hybrids are a way to save humankind. Nonsense.
Based on what I have experienced, true alien hybrids are here to serve the surveillance of the genetic study made by the alien race. Hybrids are not to meant to infiltrate into human society to fulfill some hidden purposes of draconians or reptiles. This is something one has to understand. Hybrids are used just to produce more hybrids for the use of draconians. Hybrids are used like machines in draconian bioindustry. We have no knowledge why this alteration is being made. Our social or emotional life per se is not under interest of any kind. Hybrids of the more alien types I mentioned live their lives in different societies like other people do. When I speak about hybrids I consider them to be draconian/alien consciousnesses in an altered human body. But I’m sure that reptoids have their own breeding program going on which is something draconians consider not suitable behavior–rebellion. So yes, there are reptilian hybrids–reptilian consciousnesses in human altered bodies. And then there are genetic mixtures of many other races as well -made by dracos, which are not connected to human race at all.
According to my understanding and memories we cannot define a hybrid just by observing the differences of the DNA- structures between hybrids and humans because some of the changes are energetic in nature as I said before.
The major difference is the heightened psychic ability compared to other human beings. When I say I consider my self to be alien-hybrid, aka-a genetically modified human with alien soul matrix consciousness, I know there should be a genealogist to confirm my statement to make this official proof. It is not even important, to me because I have to live an ordinary every day life anyway (and of course deal with the constant interference in my life.) I do not see myself mean or malevolent in any way. Neither is my son. But people who are acting like judges, I consider to be dangerous. There is no room for hypocrisy.
Humans manipulate, torture, neglect and abuse their kind in similar ways that these Reptiods are doing to achieve their own agenda. Wake up time. Instead of this, we should concentrate on real issues, which are the alien manipulation through their hive-like almost organic influence and the possessions they can take over certain individuals. These things have nothing to with hybrids per se, like the ones I’ve defined. There can also be observed people with low vibrations and lack of integrity acting and playing with abductees. This has nothing to do with hybrids as well and the hybrid issue is something I consider to be less important in the field of abduction research. Wrong conclusions only create unnecessary fear.
Only by seeing the overall impact of this alien manipulation we can start to live our own lives in a more compassionate way. We need to find the true humanity of our own kind and not be willing to be an amusement for them to give them the vibes—or emotional reactions that the Reptiods like.
Another thing we have to wake up to understand is that the alien modification with hybrids (aka- genetically modified human abductees) starts before physical manifestation such as in vitro before birth or while in the womb and is carried on constantly in hybrid’s lives. This means one can observe certain patterns in hybrids and abductees.
The abductors are creating an environment were the hybrid and/or abductee is often emotionally and socially isolated either geographically or by parents. This provides them convenient ground to influence the life patterns of the hybrid and repress possible interference made by other human beings. Experimental control.
They often set up a love affair to mate the hybrid or abductee with a suitable candidate. Through this selected person, aliens can control the action of a hybrid.(aka- genetically modified human-abductee) This usually means that true hybrids are being kept “hidden” by preventing them from having a major position in modern society. This can be made by disrupting and orchestrating their education, relationships and health as was done in my case. So as one can understand, there is no glory to be had in this hybrid issue. There is only suffering if these patterns are not revealed and worked through, so as to gain personal and social integration of a hybrid person. (Secrecy and isolation harms us)
Many of these aspects apply to abductees as well and can be produced by the shadow military government people too.
I have seen so called “hybrids”(the more alien ones only seen or existing on ships, etc.) during my abductions. They were merely showing me where to go etc. I had no conversation with them that I could consciously remember. These beings were very short and gave me an impression of physical density of some sort. In the room I saw one of them was having modified air pressure given to them. I could imagine one can experience this by diving deep. I have also seen small horse looking, white creatures. They were kept in containers. And the hybrids are working to collect liquid from the ligaments of these creatures.
In order to understand the modern hybrid discussion, we need to accept the fact that most information is given by the abductees who are merely reporting the facts aliens want and allow them to see and “remember”. And certain researchers are adding water to the mill by taking these fragment memories to form a theory. This, in my opinion is how the distortion is made and facts are neglected. We simply don’t know what kind of genetic experiments are being done and by whom.
9. Have you observed the alien possession of a human situation such as the term “reptilian hosting” being used?
Yes I have. I did not know the name for this subject until recently. Before going deeper into this issue I have to tell that Eve Lorgen has gone straight in to the heart of this alien discussion. Really. She has openly formed a view of alien manipulation, which I find to be true in my life. After I realized that, I was able to form some kind of synthesis made from my life. I did not know the idea or concept of ALIEN LOVE BITE until recently, but these three little words changed my life and showed me the way to self realization and more awareness to fight for autonomy in my life. Alien hosting does happen.
Regardless of that, I always subconsciously knew this kind of phenomenon was happening in my life. By hosting I refer to a person who is under direct influence of a Reptiod being mainly through mind control. Sometimes the reptile’s spirit can enter a person’s body and cause some changes in the physical appearance of the hosted person as well. Facial features can change, their voice etc. These changes can be seen and often are observed even consciously. But mostly they are neglected because the other partner or persons close to them don’t understand what is going on. I believe many hosted people are considered to suffer from psychiatric diseases like personality disorders, (Like narcissistic, sociopath-EL) psychotic behavior even the problems have different etiology than in normal F-code (DSM) diagnosis. In my opinion the hosting occurs within the orchestrated relationships.
It is done if there is a need from the reptiles to cause immediate influence on the hybrid’s/abductees’ life during certain periods of time like to have the other partner feeling emotions such as fear and abandonment. Possession occurs when the reptilian being itself wants to experience directly emotions and physical stimulus through a hybrids/abductees body. (EL—it can occur with non-abductees too)
The other term closely connected to hosting is the reptilian hive-mind. The term hive-mind in my understanding is the needed reptilian matrix or created context in hybrid’s lives. By this I mean that the reptiles are capable of creating a reality matrix like a Nintendo game. Reality matrix contains certain amount of freedom for abductee or hybrid to make decisions in their life but nevertheless, the outcome is what the reptiles want it to be. By using this hive mind manipulation many people can be included in the matrix to act as wanted for the needed result.
The reptilian hive-mind is being activated as a lure like episode often among multiple needed participants to create the needed situations into hybrids or abductees lives. This has happened to me many times in my life and during these situations I felt quite powerless to change the course of the events I could already know was going to happen.
The Hive mind, or created reality matrix, is usually deactivated once the needed result is gained. For example, marriage–in my case–and the delayed surgery and so on. (EL-This can extend to sabotaged media efforts to have guests on to tell their stories, where certain aspects of the alien agenda are never allowed to be spoken in a large way in the public domain.)
After the deactivation of the “hive mind” the people involved often seem to wake up somehow. They may feel shame about what they have done and don’t seem to understand how they could not have seen the results of their behavior. In this way the reptilians can enjoy the caused misery two times, once with hybrid or abductee and secondly with the awakened manipulated participants—who, by the way, are non-abductees and ARE VERY MUCH AFFECTED BY THIS TOO—and are less aware than the abductees themselves are. —EL)
I could tell you examples of people who are under hosting or shape shifting reptiles per se in my opinion, but I’d rather not. If I would start to pinpoint people I would not act any better than people who infer all the hybrids are one bunch of sociopathic monsters. Instead I would encourage people to judge others based on their actions, like Jesus was doing. Actions reveal the color of ones heart. Not the words or appearance.
My husband was under reptilian hosting and hive-mind influence when we met almost 20 years ago. Without going in to specific details the pattern was clearly seen. He was compulsive, neglectful, aggressive and he constantly created disturbance in my life during the key points in my life, I considered that were critical for my work. I did lot of work with confronting him to pull him out of the lure. The lure—being the reptilian hive mind that was trying to control his behavior and thoughts. And I did a good job. Today I have great husband and we work as a team.
In the early years of our relationship, he was an abductee too. There were also very intense times of paranormal activity too. I’m quite aware that aliens and the shadow government people manipulate him on regular basis. By this I mean that subconsciously he is monitoring my behavior. (aka– a handler as a sleeper agent—EL) Even while writing this, he is quite restless. He cannot concentrate to anything etc. But the situation is under control, because I know what is going on. And he has begun to recognize his own behavior too. I can sense he is worried because he is aware of my disclosure and the spooky calls and that at the same time he is under the command too. Not easy part to play for him.
Now I’m being played off the field by the reptiles and the hive-mind synchronized events. I live in the middle of the forest on a pension disability I cannot move long distances and my memory is playing tricks on me. They did a great job!
Also at the same time I can sense a relief. I feel something is moving away from my life. And I begin to see life differently, being more present. The reptilians and shadow government have changed their tactics. After such a long period of negativity good “accidents” have started happen. I’m holding my breath. I know these synchronized events are manipulated as the previous years of my life, but I can handle that by not being emotionally too attached with these events. Even though I know I cannot ever really be free from this mess, there is a pause from negative tactics and I have waited for that. So this whole thing means that “we” are having negotiations of my limited freedom. I’m being given threats on my life in VRE and at the same time I’m being given candies as well.
As one can understand, the issue of alien manipulated relationships and events are in my opinion, much more important than an isolated study of abduction experiences. Only by seeing a bigger alien picture can we understand the overall impact aliens have in our lives. They own us. They control us. And this happens in ordinary relationships all over the world. (EL—This is what Barbara Bartholic and myself have believed for years)
10. Have you ever seen or observed the human clones in your experiences?
Yes I have. In a DUMB, I have seen my clone. Somehow it was not properly made. The tissues looked puffy. This creature could barely walk and it was wobbling. Movements were very clumsy and the scenario reminded me of the Frankenstein’s story. Somehow I believe human participants made this clone. In UFO craft I have consciously seen male clones, lots of them, lying on the tables. I saw this accidentally when a hybrid creature was showing me the way to somewhere. I think this was not meant for my eyes to observe, but accidents do happen.
I strongly believe that almost 13 years ago, my original body was killed and used somehow. My consciousness was put in to cloned body. (This happened to Ted Rice and was elaborated on in the late Dr. Karla Turner’s Masquerade of Angels book–EL) At that time I felt physically different and looked younger. My friend also told me that I looked different. But I have no conscious memories of this. Only my instinct. The procedure was conducted after very sadomasochistic events by the Reptiods and humans, which I do not want to go into specific detail. But the process of soul recycling (after being born into a body) begins after abductees are given some sort of liquid to drink. I had to drink it as well as a couple I had not seen before. What happened to them, I don’t know. I also experienced being killed (in a ritualized fashion) a second time in the autumn 2010, a similar procedure and I have conscious memories of that incident.
I was spontaneously awakened in the 2010 “storage in a black box” procedure, where the pure consciousness, essence of me was temporarily kept. I know these issues are frightening and sound psychotic. Only a very strong person is able to go deeply in to these disturbing experiences without being shocked. The denial of these soul-recycling procedures is natural for humans and I can understand that clearly. I’m telling this, because the facts and witness testimonies cannot be ignored forever. Behind the surface there are more things happening than friendly discussions with the space brothers.
I can give you one thought to contemplate: What the term karma is given to people as a justifier for their memories of previous lives, which they lived because their consciousnesses had been recycled by the aliens may not be because of the karmic law. In my opinion we don’t know what is the natural process of consciousness to transform or move forward. We only know that we have been told to behave or otherwise we could wake up as pigs. We are being told that we remember past live because of reincarnation, not because someone has reincarnated us. There is a huge difference here and I believe the technology for doing this is being kept hidden and it would be very precious for humanity if they don’t already have it.
One of my favorite remote viewers Edward Riordan remote viewed this object in the coordinated remote view session and was monitored by advanced controlled remote viewer, Jerry Harthcock. This is higly interesting topic and case and I just have to make a posting of it. It takes a little time to watch through, but if you are interested in remote viewing, I highly recommend this session to you:
Published on Mar 1, 2015
See copyright and licensing information below.
This 28-minute video is a condensed version of a 2-hrs long, “operational” controlled remote viewing session done under blind conditions by Edward Riordan on February 3-4, 2015, against the space-object known as 67P. 67P is not a “comet”. The session was monitored by advanced controlled remote viewer, Jerry Harthcock.
This video is Part 1 of 5. The entire 5-Part series constitutes approximately 9-10 hours of actual in-session CRV time covering a span of about 30 hours with intermittent break/rest periods. The remote viewer was not provided any feedback until the end the last session. I other words, Ed was blind to the target at all times prior and during his approximately 30- hrs long “deep immersion” session.
Target coordinates: 8566 1161
Target cue (blind to the viewer): “Describe ‘the’ most important aspects of the target site in the image below.”
—Copyright and Licensing Information—
The music soundtrack entitled “Breathe” and incorporated into this video is performed and copyrighted by Triad and lawfully licensed pursuant to Creative Commons license.
The black and white images of space-object 67P is copyrighted by ESA and licensed for such use herein under Creative Commons license, which may be viewed and downloaded at:
Black & white copies of the original photos as well as processed audio recordings from Rosetta’s magnetrometer used herein may be viewed and downloaded at the links below.
Apart from minor edits such as tone-adjust, rotation, scaling, sharpening, mirroring, colorizing and cropping, no other alterations to the original images have been made. The processed audio recordings from ESA’s Rosetta magnetrometer have been cropped and/or slowed down by 70% and 80%, but no other modifications have been made to said recordings.
The instant video entitled “VESSEL ADRIFT” is copyrighted (C) 2015 by Jerry D. Harthcock, all rights reserved. Ed Riordan is hereby authorized to perform this instant video on his YouTube channel. Signed: s\Jerry D. Harthcock\
I’m pretty fed up with all this spying. Governments, corporations individuals, every day gadgets are just spying and spying us 24/7. And this is their mother, Skynet aka ECHELON:
In the greatest surveillance effort ever established, the US National Security Agency (NSA) has created a global spy system, codename ECHELON, which captures and analyzes virtually every phone call, fax, email and telex message sent anywhere in the world.
ECHELON is controlled by the NSA and is operated in conjunction with,
the Government Communications Head Quarters (GCHQ) of England
the Communications Security Establishment (CSE) of Canada
the Australian Defense Security Directorate (DSD)
the General Communications Security Bureau (GCSB) of New Zealand
These organizations are bound together under a secret 1948 agreement, UKUSA, whose terms and text remain under wraps even today.
The ECHELON system is fairly simple in design: position intercept stations all over the world to capture all satellite, microwave, cellular and fiber-optic communications traffic, and then process this information through the massive computer capabilities of the NSA, including advanced voice recognition and optical character recognition (OCR) programs, and look for code words or phrases (known as the ECHELON “Dictionary”) that will prompt the computers to flag the message for recording and transcribing for future analysis.
Intelligence analysts at each of the respective “listening stations” maintain separate keyword lists for them to analyze any conversation or document flagged by the system, which is then forwarded to the respective intelligence agency headquarters that requested the intercept.
But apart from directing their ears towards terrorists and rogue states, ECHELON is also being used for purposes well outside its original mission.
The regular discovery of domestic surveillance targeted at American civilians for reasons of “unpopular” political affiliation or for no probable cause at all in violation of the First, Fourth and Fifth Amendments of the Constitution – are consistently impeded by very elaborate and complex legal arguments and privilege claims by the intelligence agencies and the US government.
The guardians and caretakers of our liberties, our duly elected political representatives, give scarce attention to these activities, let alone the abuses that occur under their watch.
Among the activities that the ECHELON targets are:
Since the close of World War II, the US intelligence agencies have developed a consistent record of trampling the rights and liberties of the American people.
Even after the investigations into the domestic and political surveillance activities of the agencies that followed in the wake of the Watergate fiasco, the NSA continues to target the political activity of “unpopular” political groups and our duly elected representatives. One whistleblower charged in a 1988 Cleveland Plain Dealer interview that, while she was stationed at the Menwith Hill facility in the 1980s, she heard real-time intercepts of South Carolina Senator Strom Thurmond.
A former Maryland Congressman, Michael Barnes, claimed in a 1995 Baltimore Sun article that under the Reagan Administration his phone calls were regularly intercepted, which he discovered only after reporters had been passed transcripts of his conversations by the White House. One of the most shocking revelations came to light after several GCHQofficials became concerned about the targeting of peaceful political groups and told the London Observer in 1992 that the ECHELON dictionaries targeted Amnesty International, Greenpeace, and even Christian ministries
Since the demise of Communism in Eastern Europe, the intelligence agencies have searched for a new justification for their surveillance capability in order to protect their prominence and their bloated budgets.
Their solution was to redefine the notion of national security to include economic, commercial and corporate concerns. An office was created within the Department of Commerce, the Office of Intelligence Liaison, to forward intercepted materials to major US corporations.
In many cases, the beneficiaries of this commercial espionage effort are the very companies that helped the NSA develop the systems that power the ECHELON network.
This incestuous relationship is so strong that sometimes this intelligence information is used to push other American manufacturers out of deals in favor of these mammoth US defense and intelligence contractors, who frequently are the source of major cash contributions to both political parties.
While signals intelligence technology was helpful in containing and eventually defeating the Soviet Empire during the Cold War, what was once designed to target a select list of communist countries and terrorist states is now indiscriminately directed against virtually every citizen in the world.
The European Parliament is now asking whether the ECHELON communications interceptions violate the sovereignty and privacy of citizens in other countries. In some cases, such as the NSA’s Menwith Hill station in England, surveillance is conducted against citizens on their own soil and with the full knowledge and cooperation of their government.
This report suggests that Congress pick up its long-neglected role as watchdog of the Constitutional rights and liberties of the American people, instead of its current role as lap dog to the US intelligence agencies.
Congressional hearings ought to be held, similar to the Church and Rockefeller Committee hearings held in the mid-1970s, to find out to what extent the ECHELON system targets the personal, political, religious, and commercial communications of American citizens. The late Senator Frank Church warned that the technology and capability embodied in the ECHELON system represented a direct threat to the liberties of the American people.
Left unchecked, ECHELON could be used by either the political elite or the intelligence agencies themselves as a tool to subvert the civil protections of Constitution and to destroy representative government in the United States.
The culmination of the Cold War conflict brought home hard realities for many military and intelligence agencies who were dependent upon the confrontation for massive budgets and little civilian oversight.
World War II Allied political and military alliances had quickly become intelligence alliances in the shadow of the Iron Curtain that descended upon Eastern Europe after the war.
But for some intelligence agencies the end of the Cold War just meant a shift in mission and focus, not a loss of manpower or financial resources. One such US governmental organization is the National Security Agency (NSA).
Despite the disintegration of Communism in the former Soviet Union and throughout Eastern Europe, the secretive NSA continues to grow at an exponential rate in terms of budget, manpower and spying abilities.
Other countries have noticed the rapid growth of NSA resources and facilities around the world, and have decried the extensive spying upon their citizens by the US.
A preliminary report released by the European Parliament in January 1998 detailed research conducted by independent researchers that uncovered a massive US spy technology network that routinely monitors telephone, fax and email information on citizens all over the world, but particularly in the European Union (EU) and Japan.
Titled “An Appraisal of Technologies of Political Control,” <1> this report, issued by the Scientific and Technological Options Assessment (STOA) committee of the European Parliament, caused a tremendous stir in the establishment press in Europe.
At least one major US media outlet, The New York Times,<2> covered the issuance of the report as well.
The STOA report also exposed a festering sore spot between the US and our EU allies. The widespread surveillance of citizens in EU countries by the NSA has been known and discussed by European journalists since 1981. The name of the system in question is ECHELON, and it is one of the most secretive spy systems in existence.
ECHELON is actually a vast network of electronic spy stations located around the world and maintained by five countries: the US, England, Canada, Australia, and New Zealand. These countries, bound together in a still-secret agreement called UKUSA, spy on each other’s citizens by intercepting and gathering electronic signals of almost every telephone call, fax transmission and email message transmitted around the world daily.
These signals are fed through the massive supercomputers of the NSA to look for certain keywords called the ECHELON “dictionaries.”
Most of the details of this mammoth spy system and the UKUSA agreement that supports it remain a mystery. What is known of ECHELON is the result of the efforts of journalists and researchers around the world who have labored for decades to uncover the operations of our government’s most secret systems.
The 1996 publication of New Zealand journalist Nicky Hager’s book, Secret Power: New Zealand’s Role in the International Spy Network,<3> provided the most detailed look at the system and inflamed interest in ECHELON as well as the debate regarding its propriety.
This paper examines the expanse of the ECHELON system along with the intelligence agreements and exchanges that support it. The operation of ECHELON serves the NSA’s goal of spying on the citizens of other countries while also allowing them to circumvent the prohibition on spying on US citizens. ECHELON is not only a gross violation of our Constitution, but it violates the good will of our European allies and threatens the privacy of innocent civilians around the world.
The existence and expansion of ECHELON is a foreboding omen regarding the future of our Constitutional liberties.
If a government agency can willingly violate the most basic components of the Bill of Rights without so much as Congressional oversight and approval, we have reverted from a republican form of government to tyranny.
The success of the Allied military effort in World War II was due in no small part to successes in gathering enemy intelligence information and cracking those military and diplomatic messages.
In addition, the Allied forces were able to create codes and encryption devices that effectively concealed sensitive information from prying Axis Power eyes. These coordinated signal intelligence (SIGINT) programs kept Allied information secure and left the enemies vulnerable.
But at the close of the conflict, a new threatening power – the Soviet Union – was beginning to provoke the Cold War by enslaving Eastern Europe. These signal intelligence agencies now had a new enemy toward which to turn their electronic eyes and ears to ensure that the balance of power could be maintained. The volleys of electronic hardware and espionage that would follow for forty years would be the breeding ground of the ECHELON spy system.
The diplomatic foundation that was the genesis of ECHELON is the UKUSA agreement. The agreement has its roots in the BRUSA COMINT (communications intelligence) alliance formed in the early days of World War II and ratified on May 17, 1943 by the United Kingdom and the United States.<4>
The Commonwealth SIGINT Organization formed in 1946-47 brought together the UK, Canada, Australia and New Zealand post-war intelligence agencies.<5>
Forged in 1947 between the US and UK, the still-secret UKUSA agreement defined the relations between the SIGINT departments of those various governments. Direct agreements between the US and these agencies also define the intricate relationship that these organizations engage in.
Foremost among those agencies is the US National Security Agency (NSA), which represents the American interest. The NSA is designated as the “First Party to the Treaty.”
The Government Communications Headquarters (GCHQ) signed the UKUSA agreement on behalf of the UK and its Commonwealth SIGINT partners.
This brought Australia’s Defense Signals Directorate (DSD), the Canadian Communications Security Establishment (CSE) and New Zealand’s Government Communications Security Bureau (GCSB) into the arrangement. While these agencies are bound by additional direct agreements with the US and each other, these four countries are considered the “Second Parties to the (UKUSA) Treaty.”
Third Party members include Germany, Japan, Norway, South Korea and Turkey. There are sources that indicate China may be included in this group on a limited basis as well.<6>
National Security Agency (US)
The prime mover in the UKUSA arrangement is undeniably the National Security Agency (NSA).
The majority of funds for joint projects and facilities (discussed below) as well as the direction for intelligence gathering operations are issued primarily through the NSA.
The participating agencies frequently exchange personnel, divide up intelligence collection tasks and establish common guidelines for classifying and protecting shared information. However, the NSA utilizes its role as the largest spy agency in the world to have its international intelligence partners do its bidding.
President Harry Truman established the NSA in 1952 with a presidential directive that remains classified to this day. The US government did not acknowledge the existence of the NSA until 1957. Its original mission was to conduct the signal intelligence (SIGINT) and communications security (COMSEC) for the US.
President Ronald Reagan added the tasks of information systems security and operations security training in 1984 and 1988 respectively. A 1986 law charged the NSA with supporting combat operations for the Department of Defense.<7>
Headquartered at Fort George Meade, located between Washington D.C. and Baltimore, Maryland, the NSA boasts the most enviable array of intelligence equipment and personnel in the world. The NSA is the largest global employer of mathematicians, featuring the best teams of code-makers and code-breakers ever assembled.
The latter’s job is to crack the encryption codes of foreign and domestic electronic communications, forwarding the revealed messages to their enormous team of skilled linguists to review and analyze the messages in over 100 languages. The NSA is also responsible for creating the encryption codes that protect the US government’s communications.
In its role as gang leader for UKUSA, the NSA is primarily involved with creating new surveillance and codebreaking technology, directing the other cooperating agencies to their targets, and providing them with training and tools to intercept, process and analyze enormous amounts of signals intelligence.
By possessing what is arguably the most technologically advanced communications, computer and codebreaking equipment of any government agency in the world, the NSA serves as a competent and capable taskmaster for UKUSA.
The ECHELON Network
The vast network created by the UKUSA community stretches across the globe and into the reaches of space.
Land-based intercept stations, intelligence ships sailing the seven seas and top-secret satellites whirling twenty thousand miles overhead all combine to empower the NSA and its UKUSAallies with access to the entire global communications network. Very few signals escape its electronic grasp.
Having divided the world up among the UKUSA parties, each agency directs its electronic “vacuum-cleaner” equipment towards the heavens and the ground to search for the most minute communications signals that traverse the system’s immense path.
the NSA facilities in the US cover the communications signals of both American continents
the GCHQ in Britain is responsible for Europe, Africa and Russia west of the Ural Mountains
the DSD in Australia assists in SIGINT collection in Southeastern Asia and the Southwest Pacific and Eastern Indian Ocean areas
the GSCB in New Zealand is responsible for Southern Pacific Ocean collections, particularly the South Pacific island nations group
the CSE in Canada handles interception of additional northern Russian, northern European and American communications.<8>
The backbone of the ECHELON network is the massive listening and reception stations directed at the Intelsat and Inmarsat satellites that are responsible for the vast majority of phone and fax communications traffic within and between countries and continents.
The twenty Intelsat satellites follow a geo-stationary orbit locked onto a particular point on the Equator.<9>
These satellites carry primarily civilian traffic, but they do additionally carry diplomatic and governmental communications that are of particular interest to the UKUSA parties.
Originally, only two stations were responsible for Intelsat intercepts: Morwenstow in England and Yakima in the state of Washington. However, when the Intelsat 5 series was replaced with the Intelsat 701 and 703 satellites, which had much more precise transmission beams that prohibited reception of Southern Hemisphere signals from the Yakima base in the Northern Hemisphere, additional facilities were constructed in Australia and New Zealand.<10>
Today, the Morwenstow station directs its ears towards the Intelsats traversing the atmosphere above the Atlantic and Indian Oceans and transmitting to Europe, Africa and western parts of Asia. The Yakima station, located on the grounds of the Yakima Firing Station, targets Pacific Ocean communications in the Northern Hemisphere as well as the Far East.
Another NSA facility at Sugar Grove, West Virginia, covers traffic for the whole of North and South America.
A DSD station at Geraldton, Australia, and the Waihopai, New Zealand GCSB facility cover Asia, the South Pacific countries and the Pacific Ocean. An additional station on Ascension Island in the Atlantic Ocean between Brazil and Angola is suspected of covering the Atlantic Intelsat’s Southern Hemisphere communications.<11>
Non-Intelsat satellites are monitored from these same stations, as well as from bases in Menwith Hill, England; Shoal Bay, Australia; Leitrim, Canada; Bad Aibling, Germany, and Misawa, Japan. These satellites typically carry Russian and regional communications.<12>
It is known that the Shoal Bay facility targets a series of Indonesian satellites and that the Leitrim station intercepts communications from Latin American satellites, including the Mexican telephone company’s Morelos satellite.<13>
Several dozen other radio listening posts operated by the UKUSA allies dot the globe as well, located at military bases on foreign soil and remote spy posts. These stations played a critical role in the time prior to the development of satellite communications because much of the world’s communications traffic was transmitted on radio frequency bands.
Particularly in the high-frequency (HF) range, radio communications continue to serve an important purpose despite the widespread use of satellite technology because their signals can be transmitted to military ships and aircraft across the globe. Shorter range very high-frequencies (VHF) and ultra high-frequencies (UHF) are also used for tactical military communications within national borders.
Major radio facilities in the UKUSA network include,
Tangimoana, New Zealand
the joint NSA/GCHQ facility at the Indian Ocean atoll of Diego Garcia <14>
A separate high frequency direction finding (HFDF) network intercepts communications signals for the unique purpose of locating the position of ships and aircraft. While these stations are not actually involved in the analysis of messages, they play a critical role in monitoring the movements of mobile military targets.
The Canadian CSE figures prominently in the HFDF UKUSA network, codenamed CLASSIC BULLSEYE and hosting a major portion of the Atlantic and Pacific stations that monitored Soviet ship and submarine movements during the Cold War.
Stations from Kingston and Leitrim (Ontario) to Gander (Newfoundland) on the Atlantic side, to Alert (Northwest Territories) located at the northernmost tip of Canada on the Arctic Ocean that listens to the Russian submarine bases at Petropavlovsk and Vladivostok, and finally to Masset (British Columbia) in the Pacific – monitor shipping and flight lanes under the direction of the NSA.<15>
The CSE also maintains a small contingent at Lackland Air Force Base in San Antonio, Texas, which probably monitors Latin American communications targets.
Another major support for the ECHELON system is the US spy satellite network and its corresponding reception bases scattered about the UKUSA empire. These space-based electronic communications “vacuum cleaners” pick up radio, microwave and cell phone traffic on the ground.
They were launched by the NSA in cooperation with its sister spy agencies, the National Reconnaissance Office (NRO) and the Central Intelligence Agency (CIA).
The Ferret series of satellites in the 1960s
The Canyon, Rhyolite and Aquacade satellites in the 1970s
The Chalet, Vortex, Magnum, Orion, and Jumpseat series of satellites in the 1980s,
…have given way to the new and improved Mercury, Mentor and Trumpet satellites during the 1990s.
Table I. US Spy Satellites in Current Use
5-inch resolution spy photographs
LaCrosse Radar Imaging
3 to 10-foot resolution spy photographs
Surveillance of cellular phones
Satellite Data Systems
Defense Support Program
Missile early warning
Defense Meteorological Support Program
Meteorology, nuclear blast detection
These surveillance satellites act as giant scoops picking up electronic communications, cell phone conversations and various radio transmissions.
The downlink stations that control the operations and targeting of these satellites are under the exclusive control of the United States, despite their location on foreign military bases.
The two primary downlink facilities are at Menwith Hill, England, and Pine Gap, Australia.
Inside Menwith Hill
The Menwith Hill facility is located in North Yorkshire near Harrogate, England.
The important role that Menwith Hill plays in the ECHELON system was recognized by the recent European Parliament STOA report:
Within Europe, all email, telephone and fax communications are routinely intercepted by the United States National Security Agency, transferring all target information from the European mainland via the strategic hub of London then by satellite to Fort Meade in Maryland via the crucial hub at Menwith Hill in the North York Moors of the UK.<17>
The existence and importance of the facility was first brought to light by British journalist and researcher Duncan Campbell in 1980.<18>
Today, it is the largest spy station in the world, with over twenty-five satellite receiving stations and 1,400 American NSA personnel working with 350 UK Ministry of Defense staff on site.
After revelations that the facility was coordinating surveillance for the vast majority of the European continent, the base has become a target for regular protests organized by local peace activists. It has also become the target of intense criticism by European government officials who are concerned about the vast network of civilian surveillance and economic espionage conducted from the station by the US.<19>
The beginnings of Menwith Hill go back to December 1951, when the US Air Force and British War Office signed a lease for land that had been purchased by the British government.
The NSA took over the lease of the base in 1966, and they have continued to build up the facility ever since. Up until the mid-1970s, Menwith Hill was used for intercepting International Leased Carrier (ILC) and Non-Diplomatic Communications (NDC).
Having received one of the first sophisticated IBM computers in the early 1960s, Menwith Hill was also used to sort through the voluminous unenciphered telex communications, which consisted of international messages, telegrams and telephone calls from the government, business and civilian sectors looking for anything of political, military or economic value.<20>
The addition of the first satellite intercept station at Menwith Hill in 1974 raised the base’s prominence in intelligence gathering. Eight large satellite communications dishes were installed during that phase of construction.
Several satellite-gathering systems now dot the facility:<21>
STEEPLEBUSH – Completed in 1984, this $160 million system expanded the satellite surveillance capability and mission of the spy station beyond the bounds of the installation that began in 1974.
RUNWAY – Running east and west across the facility, this system receives signals from the second-generation geosynchronous Vortex satellites, and gathers miscellaneous communications traffic from Europe, Asia and the former Soviet Union. The information is then forwarded to the Menwith Hill computer systems for processing. RUNWAY may have recently been replaced or complemented by another system, RUTLEY.
PUSHER – An HFDF system that covers the HF frequency range between 3 MHz and 30 MHz (radio transmissions from CB radios, walkie-talkies, and other radio devices). Military, embassy, maritime and air flight communications are the main target of PUSHER.
MOONPENNY – Uncovered by British journalist Duncan Campbell in the 1980s, this system is targeted at the communication relay satellites belonging to other countries, as well as the Atlantic and Indian Ocean Intelsat satellites.
KNOBSTICKS I and II – The purpose of these antennae arrays are unknown, but they probably target military and diplomatic traffic throughout Europe.
GT-6 – A new system installed at the end of 1996, GT-6 is believed to be the receiver for the third generation of geosynchronous satellites termed Advanced Orion or Advanced Vortex. A new polar orbit satellite called Advanced Jumpseat may be monitored from here as well.
STEEPLEBUSH II – An expansion of the 1984 STEEPLEBUSH system, this computer system processes information collected from the RUNWAY receivers gathering traffic from the Vortex satellites.
SILKWORTH – Constructed by Lockheed Corporation, the main computer system for Menwith Hill processes most of the information received by the various reception systems.
One shocking revelation about Menwith Hill came to light in 1997 during the trial of two women peace campaigners appealing their convictions for trespassing at the facility.
In documents and testimony submitted by British Telecomm in the case, R.G. Morris, head of Emergency Planning for British Telecomm, revealed that at least three major domestic fiber-optic telephone trunk lines – each capable of carrying 100,000 calls simultaneously – were wired through Menwith Hill.<22>
This allows the NSA to tap into the very heart of the British Telecomm network.
Judge Jonathan Crabtree rebuked British Telecomm for his revelations and prohibited Mr. Morris from giving any further testimony in the case for “national security” reasons.
According to Duncan Campbell, the secret spying alliance between Menwith Hill and British Telecomm began in 1975 with a coaxial connection to the British Telecomm microwave facility at Hunter’s Stone, four miles away from Menwith Hill – a connection maintained even today.<23>
Additional systems (TROUTMAN, ULTRAPURE, TOTALISER, SILVERWEED, RUCKUS, et. al.) complete the monumental SIGINT collection efforts at Menwith Hill.
Directing its electronic vacuum cleaners towards unsuspecting communications satellites in the skies, receiving signals gathered by satellites that scoop up the most minute signals on the ground, listening in on the radio communications throughout the air, or plugging into the ground-based telecommunications network, Menwith Hill, alongside its sister stations at Pine Gap, Australia, and Bad Aibling, Germany, represents the comprehensive effort of the NSA and its UKUSA allies to make sure that no communications signal escapes its electronic net.
The ECHELON Dictionaries
The extraordinary ability of ECHELON to intercept most of the communications traffic in the world is breathtaking in its scope.
And yet the power of ECHELON resides in its ability to decrypt, filter, examine and codify these messages into selective categories for further analysis by intelligence agents from the various UKUSA agencies.
As the electronic signals are brought into the station, they are fed through the massive computer systems, such as Menwith Hill’s SILKWORTH, where voice recognition, optical character recognition (OCR) and data information engines get to work on the messages.
These programs and computers transcend state-of-the-art; in many cases, they are well into the future. MAGISTRAND is part of the Menwith Hill SILKWORTH super-computer system that drives the powerful keyword search programs.<24>
One tool used to sort through the text of messages, PATHFINDER (manufactured by the UK company, Memex),<** Be sure to read footnote for update 25 **> sifts through large databases of text-based documents and messages looking for keywords and phrases based on complex algorithmic criteria. Voice recognition programs convert conversations into text messages for further analysis.
One highly advanced system, VOICECAST, can target an individual’s voice pattern, so that every call that person makes is transcribed for future analysis.
Processing millions of messages every hour, the ECHELON systems churn away 24 hours a day, 7 days a week, looking for targeted keyword series, phone and fax numbers, and specified voiceprints. It is important to note that very few messages and phone calls are actually transcribed and recorded by the system.
The vast majority are filtered out after they are read or listened to by the system. Only those messages that produce keyword “hits” are tagged for future analysis. Again, it is not just the ability to collect the electronic signals that gives ECHELON its power; it is the tools and technology that are able to whittle down the messages to only those that are important to the intelligence agencies.
Each station maintains a list of keywords (the “Dictionary”) designated by each of the participating intelligence agencies. A Dictionary Manager from each of the respective agencies is responsible for adding, deleting or changing the keyword search criteria for their dictionaries at each of the stations.<26>
Each of these station dictionaries are given codewords, such as COWBOY for the Yakima facility and FLINTLOCK for the Waihopai facility.<27> These codewords play a crucial identification role for the analysts who eventually look at the intercepted messages.
Each message flagged by the ECHELON dictionaries as meeting the specified criteria is sorted by a four-digit code representing the source or subject of the message (such as 5535 for Japanese diplomatic traffic, or 8182 for communications about distribution of encryption technology,) <28> as well as the date, time and station codeword.
Also included in the message headers are the codenames for the intended agency: ALPHA-ALPHA (GCHQ), ECHO-ECHO (DSD), INDIA-INDIA (GCSB), UNIFORM-UNIFORM (CSE), and OSCAR-OSCAR (NSA).
These messages are then transmitted to each agency’s headquarters via a global computer system, PLATFORM,<29> that acts as the information nervous system for the UKUSA stations and agencies.
Every day, analysts located at the various intelligence agencies review the previous day’s product. As it is analyzed, decrypted and translated, it can be compiled into the different types of analysis: reports, which are direct and complete translations of intercepted messages; “gists,” which give basic information on a series of messages within a given category; and summaries, which are compilations from both reports and gists.<30>
These are then given classifications: MORAY (secret), SPOKE (more secret than MORAY), UMBRA (top secret), GAMMA (Russian intercepts) and DRUID (intelligence forwarded to non-UKUSA parties).
This analysis product is the raison d’être of the entire ECHELON system. It is also the lifeblood of the UKUSA alliance.
The ECHELON system is the product of the Cold War conflict, an extended battle replete with heightened tensions that teetered on the brink of annihilation and the diminished hostilities of détente and glasnost.
Vicious cycles of mistrust and paranoia between the United States and the Soviet Empire fed the intelligence agencies to the point that, with the fall of communism throughout Eastern Europe, the intelligence establishment began to grasp for a mission that justified its bloated existence.
But the rise of post-modern warfare – terrorism – gave the establishment all the justification it needed to develop even greater ability to spy on our enemies, our allies and our own citizens. ECHELON is the result of those efforts. The satellites that fly thousands of miles overhead and yet can spy out the most minute details on the ground; the secret submarines that troll the ocean floors that are able to tap into undersea communications cables;<31> and all power the efficient UKUSA signals intelligence machine.
There is a concerted effort by the heads of intelligence agencies, federal law enforcement officials and congressional representatives to defend the capabilities of ECHELON. Their persuasive arguments point to the tragedies seen in the bombings in Oklahoma City and the World Trade Center in New York City.
The vulnerability of Americans abroad, as recently seen in the bombing of the American embassies in Dar es Salaam, Tanzania, and Nairobi, Kenya, emphasizes the necessity of monitoring those forces around the world that would use senseless violence and terror as political weapons against the US and its allies.
Intelligence victories add credibility to the arguments that defend such a pervasive surveillance system.
The discovery of missile sites in Cuba in 1962, the capture of the Achille Lauro terrorists in 1995, the discovery of Libyan involvement in the bombing of a Berlin discotheque that killed one American (resulting in the 1996 bombing of Tripoli) and countless other incidents that have been averted (which are now covered by the silence of indoctrination vows and top-secret classifications) all point to the need for comprehensive signals intelligence gathering for the national security of the United States.
But despite the real threats and dangers to the peace and protection of American citizens at home and abroad, our Constitution is quite explicit in limiting the scope and powers of government.
A fundamental foundation of free societies is that when controversies arise over the assumption of power by the state, power never defaults to the government, nor are powers granted without an extraordinary, explicit and compelling public interest.
As the late Supreme Court Justice William Brennan pointed out:
The concept of military necessity is seductively broad, and has a dangerous plasticity. Because they invariably have the visage of overriding importance, there is always a temptation to invoke security “necessities” to justify an encroachment upon civil liberties.
For that reason, the military-security argument must be approached with a healthy skepticism: Its very gravity counsels that courts be cautious when military necessity is invoked by the Government to justify a trespass on [Constitutional] rights.<32>
Despite the necessity of confronting terrorism and the many benefits that are provided by the massive surveillance efforts embodied by ECHELON, there is a dark and dangerous side of these activities that is concealed by the cloak of secrecy surrounding the intelligence operations of the United States.
The discovery of domestic surveillance targeting American civilians for reasons of “unpopular” political affiliation – or for no probable cause at all – in violation of the First, Fourth and Fifth Amendments of the Constitution is regularly impeded by very elaborate and complex legal arguments and privilege claims by the intelligence agencies and the US government.
The guardians and caretakers of our liberties – our duly elected political representatives – give scarce attention to the activities, let alone the abuses, that occur under their watch. As pointed out below, our elected officials frequently become targets of ECHELON themselves, chilling any effort to check this unbridled power.
In addition, the shift in priorities resulting from the demise of the Soviet Empire and the necessity to justify intelligence capabilities resulted in a redefinition of “national security interests” to include espionage committed on behalf of powerful American companies.
This quiet collusion between political and private interests typically involves the very same companies that are involved in developing the technology that empowers ECHELON and the intelligence agencies.
Domestic and Political Spying
When considering the use of ECHELON on American soil, the pathetic historical record of NSA and CIA domestic activities in regards to the Constitutional liberties and privacy rights of American citizens provides an excellent guidepost for what may occur now with the ECHELON system.
Since the creation of the NSA by President Truman, its spying capability has frequently been used to monitor the activities of an unsuspecting public.
In 1945 Project SHAMROCK was initiated to obtain copies of all telegraphic information exiting or entering the United States.
With the full cooperation of RCA, ITT and Western Union (representing almost all of the telegraphic traffic in the US at the time), the NSA’s predecessor and later the NSA itself were provided with daily microfilm copies of all incoming, outgoing and transiting telegraphs.
This system changed dramatically when the cable companies began providing magnetic computer tapes to the agency that enabled the agency to run all the messages through its HARVEST computer to look for particular keywords, locations, senders or addressees.
Project SHAMROCK became so successful that the in 1966 NSA and CIA set up a front company in lower Manhattan (where the offices of the telegraph companies were located) under the codename LPMEDLEY.
At the height of Project SHAMROCK, 150,000 messages a month were printed and analyzed by NSA agents.<33>
NSA Director Lew Allen brought Project SHAMROCK to a crashing halt in May 1975 as congressional critics began to rip open the program’s shroud of secrecy.
The testimony of both the representatives from the cable companies and of Director Allen at the hearings prompted Senate Intelligence Committee chairman Sen. Frank Church to conclude that Project SHAMROCK was,
“probably the largest government interception program affecting Americans ever undertaken.”<34>
A sister project to Project SHAMROCK, Project MINARET involved the creation of “watch lists” by each of the intelligence agencies and the FBI of those accused of “subversive” domestic activities.
The watch lists included such notables as Martin Luther King, Malcolm X, Jane Fonda, Joan Baez and Dr. Benjamin Spock.
After the Supreme Court handed down its 1972 Keith decision,<35> which held that – while the President could act to protect the country from unlawful and subversive activity designed to overthrow the government – that same power did not extend to include warrantless electronic surveillance of domestic organizations, pressure came to bear on Project MINARET.<36>
Attorney General Elliot Petersen shut down Project MINARET as soon as its activities were revealed to the Justice Department, despite the fact that the FBI (an agency under the Justice Department’s authority) was actively involved with the NSA and other intelligence agencies in creating the watch lists.
Operating between 1967 and 1973, over 5,925 foreigners and 1,690 organizations and US citizens were included on the Project MINARET watch lists.
Despite extensive efforts to conceal the NSA’s involvement in Project MINARET, NSA Director Lew Allen testified before the Senate Intelligence Committee in 1975 that the NSA had issued over 3,900 reports on the watch-listed Americans.<37>
Additionally, the NSA Office of Security Services maintained reports on at least 75,000 Americans between 1952 and 1974.
This list included the names of anyone that was mentioned in a NSA message intercept.
While the NSA was busy snooping on US citizens through Projects SHAMROCK and MINARET, the CIA got into the domestic spying act by initiating Operation CHAOS.
President Lyndon Johnson authorized the creation of the CIA’s Domestic Operations Division (DOD), whose purpose was to,
“exercise centralized responsibility for direction, support, and coordination of clandestine operations activities within the United States….”
When Johnson ordered CIA Director John McCone to use the DOD to analyze the growing college student protests of the Administration’s policy towards Vietnam, two new units were set up to target anti-war protestors and organizations:
Project RESISTANCE, which worked with college administrators, campus security and local police to identify anti-war activists and political dissidents
Project MERRIMAC, which monitored any demonstrations being conducted in the Washington D.C. area
The CIA then began monitoring student activists and infiltrating anti-war organizations by working with local police departments to pull off burglaries, illegal entries (black bag jobs), interrogations and electronic surveillance.<38>
After President Nixon came to office in 1969, all of these domestic surveillance activities were consolidated into Operation CHAOS.
After the revelation of two former CIA agents’ involvement in the Watergate break-in, the publication of an article about CHAOS in the New York Times<39> and the growing concern about distancing itself from illegal domestic spying activities, the CIA shut down Operation CHAOS.
But during the life of the project, the Church Committee and the Commission on CIA Activities Within the United States (the Rockefeller Commission) revealed that the CIA had compiled files on over 13,000 individuals, including 7,000 US citizens and 1,000 domestic organizations.<40>
The Foreign Intelligence Surveillance Court (FISC)
In response to the discovery of such a comprehensive effort by previous administrations and the intelligence agencies, Congress passed legislation (the Foreign Intelligence Surveillance Act of 1978) <41> that created a top-secret court to hear applications for electronic surveillance from the FBI and NSA to provide some check on the domestic activities of the agencies.
In 1995, Congress granted the court additional power to authorize surreptitious entries. In all of these actions, Congressional intent was to provide a check on the domestic surveillance abuses mentioned above.
The seven-member court, comprised of federal District Court judges appointed by the Supreme Court Chief Justice, sits in secret in a sealed room on the top floor of the Department of Justice building. Public information about the court’s hearings is scarce; each year the Attorney General is required by law to transmit to Congress a report detailing the number of applications each year and the number granted.
With over 10,000 applications submitted to the FISC during the past twenty years, the court has only rejected one application (and that rejection was at the request of the Reagan Administration, which had submitted the application).
While the FISC was established to be the watchdog for the Constitutional rights of the American people against domestic surveillance, it quickly became the lap dog of the intelligence agencies.
Surveillance requests that would never receive a hearing in a state or federal court are routinely approved by the FISC. This has allowed the FBI to use the process to conduct surveillance to obtain evidence in circumvention of the US Constitution, and the evidence is then used in subsequent criminal trials.
But the process established by Congress and the courts ensures that information regarding the cause or extent of the surveillance order is withheld from defense attorneys because of the classified nature of the court.<42>
Despite Congress’s initial intent for the FISC, it is doubtful that domestic surveillance by means of ECHELON comes under any scrutiny by the court.
Political Uses of ECHELON and UKUSA
Several incidents of domestic spying involving ECHELON have emerged from the secrecy of the UKUSA relationship.
What these brief glimpses inside the intelligence world reveal is that, despite the best of intentions by elected representatives, presidents and prime ministers, the temptation to use ECHELON as a tool of political advancement and repression proves too strong.
Former Canadian spy Mike Frost recounts how former British Prime Minister Margaret Thatcher made a request in February 1983 to have two ministers from her own government monitored when she suspected them of disloyalty.
In an effort to avoid the legal difficulties involved with domestic spying on high governmental officials, the GCHQ liaison in Ottawa made a request to CSE for them to conduct the three-week-long surveillance mission at British taxpayer expense. Frost’s CSE boss, Frank Bowman, traveled to London to do the job himself.
After the mission was over, Bowman was instructed to hand over the tapes to a GCHQ official at their headquarters.<43> Using the UKUSA alliance as legal cover is seductively easy.
As Spyworld co-author Michel Gratton puts it,
The Thatcher episode certainly shows that GCHQ, like NSA, found ways to put itself above the law and did not hesitate to get directly involved in helping a specific politician for her personal political benefit…
[T]he decision to proceed with the London caper was probably not put forward for approval to many people up the bureaucratic ladder. It was something CSE figured they would get away with easily, so checking with the higher-ups would only complicate things unnecessarily.<44>
Frost also told of how he was asked in 1975 to spy on an unlikely target – Prime Minister Pierre Trudeau’s wife, Margaret Trudeau.
The Royal Canadian Mounted Police’s (RCMP) Security Service division was concerned that the Prime Minister’s wife was buying and using marijuana, so they contacted the CSE to do the dirty work. Months of surveillance in cooperation with the Security Service turned up nothing of note.
Frost was concerned that there were political motivations behind the RCMP’s request:
“She was in no way suspected of espionage. Why was the RCMP so adamant about this? Were they trying to get at Pierre Trudeau for some reason or just protect him? Or were they working under orders from their political masters?”<45>
The NSA frequently gets into the political spying act as well.
Nixon presidential aide John Ehrlichman revealed in his published memoirs, Witness to Power: The Nixon Years, that Henry Kissinger used the NSA to intercept the messages of then-Secretary of State William P. Rogers, which Kissinger used to convince President Nixon of Rogers’ incompetence.
Kissinger also found himself on the receiving end of the NSA’s global net. Word of Kissinger’s secret diplomatic dealings with foreign governments would reach the ears of other Nixon administration officials, incensing Kissinger.
As former NSA Deputy Director William Colby pointed out,
“Kissinger would get sore as hell…because he wanted to keep it politically secret until it was ready to launch.”<46>
However, elected representatives have also become targets of spying by the intelligence agencies.
In 1988, a former Lockheed software manager who was responsible for a dozen VAX computers that powered the ECHELON computers at Menwith Hill, Margaret Newsham, came forth with the stunning revelation that she had actually heard the NSA’s real time interception of phone conversations involving South Carolina Senator Strom Thurmond.
Newsham was fired from Lockheed after she filed a whistleblower lawsuit alleging that the company was engaged in flagrant waste and abuse. After a top secret meeting in April 1988 with then-chairman of the House Permanent Select Committee on Intelligence, Rep. Louis Stokes, Capitol Hill staffers familiar with the meeting leaked the story to the Cleveland Plain Dealer.<47>
While Sen. Thurmond was reluctant to pressure for a thorough investigation into the matter, his office revealed at the time that the office had previously received reports that the Senator was a target of the NSA.<48>
After the news reports an investigation into the matter discovered that there were no controls or questioning over who could enter target names into the Menwith Hill system.<49>
The NSA, under orders from the Reagan administration, also targeted Maryland Congressman Michael Barnes. Phone calls he placed to Nicaraguan officials were intercepted and recorded, including a conversation he had with the Foreign Minister of Nicaragua protesting the implementation of martial law in that country.
Barnes found out about the NSA’s spying after White House officials leaked transcripts of his conversations to reporters.
CIA Director William Casey, later implicated in the Iran-Contra affair, showed Barnes a Nicaraguan embassy cable that reported a meeting between embassy staff and one of Barnes’ aides.
The aide had been there on a professional call regarding an international affairs issue, and Casey asked for Barnes to fire the aide. Barnes replied that it was perfectly legal and legitimate for his staff to meet with foreign diplomats.
“I was aware that NSA monitored international calls, that it was a standard part of intelligence gathering. But to use it for domestic political purposes is absolutely outrageous and probably illegal.”<50>
Another former chairman of the Senate Intelligence Committee has also expressed his concerns about the NSA’s domestic targeting.
“It has always worried me. What if that is used on American citizens?” queried former Arizona Senator Dennis DeConcini. “It is chilling. Are they listening to my private conversations on my telephone?”<51>
Seemingly non-controversial organizations have ended up in the fixed gaze of ECHELON, as several former GCHQ officials confidentially told the London Observer in June 1992.
Among the targeted organizations they named were Amnesty International, Greenpeace and Christian Aid, an American missions organization that works with indigenous pastors engaged in ministry work in countries closed to Western, Christian workers.<52>
In another story published by the London Observer, a former employee of the British Joint Intelligence Committee, Robin Robison, admitted that Margaret Thatcher had personally ordered the communications interception of the parent company of the Observer, Lonrho, after the Observer had published a 1989 expose charging bribes had been paid to Thatcher’s son, Mark, in a multi-billion dollar British arms deal with Saudi Arabia.
Despite facing severe penalties for violating his indoctrination vows, Robison admitted that he had personally delivered intercepted Lonrho messages to Mrs. Thatcher’s office.<53>
It should hardly be surprising that ECHELON ends up being used by elected and bureaucratic officials to their political advantage or by the intelligence agencies themselves for the purpose of sustaining their privileged surveillance powers and bloated budgets. The availability of such invasive technology practically begs for abuse, although it does not justify its use to those ends.
But what is most frightening is the targeting of such “subversives” as those who expose corrupt government activity, protect human rights from government encroachments, challenge corporate polluters, or promote the gospel of Christ.
That the vast intelligence powers of the United States should be arrayed against legitimate and peaceful organizations is demonstrative not of the desire to monitor, but of the desire to control.
With the rapid erosion of the Soviet Empire in the early 1990s, Western intelligence agencies were anxious to redefine their mission to justify the scope of their global surveillance system.
Some of the agencies’ closest corporate friends quickly gave them an option – commercial espionage.
By redefining the term “national security” to include spying on foreign competitors of prominent US corporations, the signals intelligence game has gotten ugly. And it very well may have prompted the recent scrutiny by the European Union that ECHELON has endured.
While UKUSA agencies have pursued economic and commercial information on behalf of their countries with renewed vigor after the passing of communism in Eastern Europe, the NSA practice of spying on behalf of US companies has a long history.
Gerald Burke, who served as Executive Director of President Nixon’s Foreign Intelligence Advisory Board, notes commercial espionage was endorsed by the US government as early as 1970:
“By and large, we recommended that henceforth economic intelligence be considered a function of the national security, enjoying a priority equivalent to diplomatic, military, and technological intelligence.”<54>
To accommodate the need for information regarding international commercial deals, the intelligence agencies set up a small, unpublicized department within the Department of Commerce, the Office of Intelligence Liaison.
This office receives intelligence reports from the US intelligence agencies about pending international deals that it discreetly forwards to companies that request it or may have an interest in the information. Immediately after coming to office in January 1993, President Clinton added to the corporate espionage machine by creating the National Economic Council, which feeds intelligence to “select” companies to enhance US competitiveness.
The capabilities of ECHELON to spy on foreign companies is nothing new, but the Clinton administration has raised its use to an art:
In 1990 the German magazine Der Speigel revealed that the NSA had intercepted messages about an impending $200 million deal between Indonesia and the Japanese satellite manufacturer NEC Corp. After President Bush intervened in the negotiations on behalf of American manufacturers, the contract was split between NEC and AT&T.
In 1994, the CIA and NSA intercepted phone calls between Brazilian officials and the French firm Thomson-CSF about a radar system that the Brazilians wanted to purchase. A US firm, Raytheon, was a competitor as well, and reports prepared from intercepts were forwarded to Raytheon.<55>
In September 1993, President Clinton asked the CIA to spy on Japanese auto manufacturers that were designing zero-emission cars and to forward that information to the Big Three US car manufacturers: Ford, General Motors and Chrysler.<56>
In 1995, the New York Times reported that the NSA and the CIA’s Tokyo station were involved in providing detailed information to US Trade Representative Mickey Kantor’s team of negotiators in Geneva facing Japanese car companies in a trade dispute.<57>
Recently, a Japanese newspaper, Mainichi, accused the NSA of continuing to monitor the communications of Japanese companies on behalf of American companies.<58>
Insight Magazine reported in a series of articles in 1997 that President Clinton ordered the NSA and FBI to mount a massive surveillance operation at the 1993 Asian/Pacific Economic Conference (APEC) hosted in Seattle.
One intelligence source for the story related that over 300 hotel rooms had been bugged for the event, which was designed to obtain information regarding oil and hydro-electric deals pending in Vietnam that were passed on to high level Democratic Party contributors competing for the contracts.<59>
But foreign companies were not the only losers: when Vietnam expressed interest in purchasing two used 737 freighter aircraft from an American businessman, the deal was scuttled after Commerce Secretary Ron Brown arranged favorable financing for two new 737s from Boeing.<60>
But the US is not the only partner of the UKUSA relationship that engages in such activity. British Prime Minister Margaret Thatcher ordered the GCHQ to monitor the activities of international media mogul Robert Maxwell on behalf of the Bank of England.<61>
Former CSE linguist and analyst Jane Shorten claimed that she had seen intercepts from Mexican trade representatives during the 1992-1993 NAFTA trade negotiations, as well as 1991 South Korean Foreign Ministry intercepts dealing with the construction of three Canadian CANDU nuclear reactors for the Koreans in a $6 billion deal.<62>
Shorten’s revelation prompted Canadian Deputy Prime Minister Sheila Copps to launch a probe into the allegations after the Mexicans lodged a protest.
But every spy agency eventually gets beat at their own game. Mike Frost relates in Spyworld how an accidental cell phone intercept in 1981 of the American Ambassador to Canada discussing a pending grain deal that the US was about to sign with China provided Canada with the American negotiating strategy for the deal.
The information was used to outbid the US, resulting in a three year, $2.5 billion contract for the Canadian Wheat Board. CSE out-spooked the NSA again a year later when Canada snagged a $50 million wheat sale to Mexico.<63>
Another disturbing trend regarding the present commercial use of ECHELON is the incestuous relationship that exists between the intelligence agencies and the US corporations that develop the technology that fuels their spy systems.
Many of the companies that receive the most important commercial intercepts – Lockheed, Boeing, Loral, TRW and Raytheon – are actively involved in the manufacturing and operation of many of the spy systems that comprise ECHELON.
The collusion between intelligence agencies and their contractors is frightening in the chilling effect it has on creating any foreign or even domestic competition.
But just as important is that it is a gross misuse of taxpayer-financed resources and an abuse of the intelligence agencies’ capabilities.
While the UKUSA relationship is a product of Cold War political and military tensions, ECHELON is purely a product of the 20th Century – the century of statism.
The modern drive toward the assumption of state power has turned legitimate national security agencies and apparati into pawns in a manipulative game where the stakes are no less than the survival of the Constitution. The systems developed prior to ECHELON were designed to confront the expansionist goals of the Soviet Empire – something the West was forced out of necessity to do.
But as Glyn Ford, European Parliament representative for Manchester, England, and the driving force behind the European investigation of ECHELON, has pointed out:
“The difficulty is that the technology has now become so elaborate that what was originally a small client list has become the whole world.”<64>
What began as a noble alliance to contain and defeat the forces of communism has turned into a carte blanche to disregard the rights and liberties of the American people and the population of the free world.
As has been demonstrated time and again, the NSA has been persistent in subverting not just the intent of the law in regards to the prohibition of domestic spying, but the letter as well. The laws that were created to constrain the intelligence agencies from infringing on our liberties are frequently flaunted, re-interpreted and revised according to the bidding and wishes of political spymasters in Washington D.C. Old habits die hard, it seems.
As stated above, there is a need for such sophisticated surveillance technology. Unfortunately, the world is filled with criminals, drug lords, terrorists and dictators that threaten the peace and security of many nations. The thought that ECHELON can be used to eliminate or control these international thugs is heartening.
But defenders of ECHELON argue that the rare intelligence victories over these forces of darkness and death give wholesale justification to indiscriminate surveillance of the entire world and every member of it. But more complicated issues than that remain.
The shameless and illegal targeting of political opponents, business competitors, dissidents and even Christian ministries stands as a testament that if America is to remain free, we must bind these intelligence systems and those that operate them with the heavy chains of transparency and accountability to our elected officials.
But the fact that the ECHELON apparatus can be quickly turned around on those same officials in order to maintain some advantage for the intelligence agencies indicates that these agencies are not presently under the control of our elected representatives.
That Congress is not aware of or able to curtail these abuses of power is a frightening harbinger of what may come here in the United States.
The European Parliament has begun the debate over what ECHELON is, how it is being used and how free countries should use such a system. Congress should join that same debate with the understanding that consequences of ignoring or failing to address these issues could foster the demise of our republican form of government.
Such is the threat, as Senator Frank Church warned the American people over twenty years ago.
At the same time, that capability at any time could be turned around on the American people and no American would have any privacy left, such [is] the capability to monitor everything: telephone conversations, telegrams, it doesn’t matter.
There would be no place to hide. If this government ever became a tyranny, if a dictator ever took charge in this country, the technological capacity that the intelligence community has given the government could enable it to impose total tyranny, and there would be no way to fight back, because the most careful effort to combine together in resistance to the government, no matter how privately it was done, is within the reach of the government to know.
Such is the capability of this technology…
I don’t want to see this country ever go across the bridge. I know the capacity that is there to make tyranny total in America, and we must see to it that this agency and all agencies that possess this technology operate within the law and under proper supervision, so that we never cross over that abyss.
That is the abyss from which there is no return.<65>