Tumgik
decryptedmatrix · 12 years
Text
Fluoride and The Pineal Gland: Know the Truth
http://youtu.be/XSZQ3ixu7a4
The single animal study of pineal function indicates that fluoride exposure results in altered melatonin production and altered timing of sexual maturity. Whether fluoride affects pineal function in humans remains to be demonstrated. The two studies of menarcheal age in humans show the possibility of earlier menarche in some individuals exposed to fluoride, but no definitive statement can be made. Recent information on the role of the pineal organ in humans suggests that any agent that affects pineal function could affect human health in a variety of ways, including effects on sexual maturation, calcium metabolism, parathyroid function, postmenopausal osteoporosis, cancer, and psychiatric disease. SOURCE: National Research Council. (2006). Fluoride in Drinking Water: A Scientific Review of EPA's Standards. National Academies Press, Washington D.C. p221-22. "In conclusion, the human pineal gland contains the highest concentration of fluoride in the body. Fluoride is associated with depressed pineal melatonin synthesis by prepubertal gerbils and an accelerated onset of sexual maturation in the female gerbil. The results strengthen the hypothesis that the pineal has a role in the timing of the onset of puberty. Whether or not fluoride interferes with pineal function in humans requires further investigation." SOURCE: Luke J. (1997). The Effect of Fluoride on the Physiology of the Pineal Gland. Ph.D. Thesis. University of Surrey, Guildford. p. 177.
Original Article
7 notes · View notes
decryptedmatrix · 12 years
Text
WHO ARE THEY REALLY GUARDING? ASSANGE OR DAVISON?
This article by Peter Eyre suggests that it is not only Julian Assange who is being heavily guarded after having sought refuge in the Ecuadorean Embassy but rather, and more importantly, a woman named Andrea Davison.
Eyre writes:
Dr David Kelly and Andrea Davison have several things in common both were experts on Biological Weapons and both were involved in the arms that went to Iraq and WMD’s and both were whistleblowers.
In his article, Eyre makes the case that others are also making that the Assange Wikileaks revealations are less than stellar and in fact, it has been said by several sources that Assange is likely a CIA/Australian secret service/Mossad asset and not the hero and defender of whistleblowers that he has been depicted as.
Apparently, Ms. Davison has evidence of arms sales and weapons of mass destruction that were moved by the Brits from South Africa to Oman and then stolen....  And much more that according to Eyre would implicate Brown, Blair and other British government members in a vast conspiracy.
According to this evidence Ms. Davison:
She knows as much as the late Dr. David Kelly and in actual fact puts herself on par with him…..she also did many runs to Iraq and herself worked for the DTI Select Committee as an “Arms to Iraq” investigator and may have also worked for MI5/6…….and yes she would be considered as a “thorn in the side” to current and past leaders and their respective governments!!
Dr. David Kelly is widely thought to have been suicided to keep hin silent and so if this is true, and Davison has similar evidence, it is vital that she be allowed to testify in open court or at the very least have that evidence reach the major media with whatever further information it can provide on just how far this rabbit hole goes.
Peter Eyre was a recent guest on my radio show... And I will endeavor to have him on once again to discuss this and other background to the axis of power with regard to the City of London who he refers to as the "Crown Templar".
It is fact that all of the above were all involved in the New World Order financial rape of not only this country but many others compliments of the Crown Templar that is housed in the City of London – the “True axis of evil” with its tentacles radiating out from the Rothschild’s and the Committee of 300 across the waters to Europe and the good old US of A.
Many Camelot readers will be familiar with our whistelblower [see Anglo Saxon Mission article here] who talks in detail about being present during City of London meetings where fates of nations were discussed like dominoes on a board.  This is an area that needs further revealing and Eyre is clearly on that trail as an investigative journalist with inside information in that regard.
Thursday, 23 August 2012 02:04
Written by Kerry Cassidy
Original Article
3 notes · View notes
decryptedmatrix · 12 years
Text
Irish Heroine of Batman Shooting Spree Drowns
It is widely known that victims and witnesses were giving conflicting reports when compared to the 'official' version of events. Did Jenny hear something she shouldn't have? Did she know something they didn't want to get out? This is far too suspicious...
-Max Maverick, DCMX Editor
US president Barack Obama and his wife Michelle paid tribute to Jenny and her colleagues who are credited with saving the lives of some of those injured in the massacre.
PHD student James Holmes has been charged in relation to the shootings which left 12 people dead.
However, her family has now been plunged into a sense of grief of their own. Jenny was out swimming in a lake close to her home when she is believed to have drowned.
Her husband Greg Pinson and five-year-old son Jack are struggling to come to terms with the loss of a "wonderful mother".
Heartbroken
Her mother Brigid, who was unable to fly to Denver for the funeral, added: "I am heartbroken, it is just terrible, terrible. She was such a wonderful person who was just so full of life and a wonderful mother who loved Jack so much," she said.
"I will miss her so much. Her brothers and sisters went over for the funeral and we had a little mass for her here. She could light up a room when she walked into it."
Jenny studied to be a nurse in Denver in the nineties and decided to settle there.
She was a GAA fanatic and founded the Denver Gaels ladies football club.
The club posted an emotional tribute on its website, describing Jenny as a "loving and devoted mother" and a "proud Meath woman".
"Every team has its ups and downs, its wins and losses ... the Pinson and Gallagher families, the Gaels and our Irish community suffered a great loss. Jennifer Gallagher passed on, leaving a wake of sorrow, sadness and loving memories.
"When you met Jenny she brightened up your day and wanted to know how you were doing. Others always came first in the most natural and sincere way.
"In her vocation as a nurse, she cared for those with most acute needs in the burn unit, the ER and most recently was recognized for her work with the Aurora shooting victims by President Obama. We were all very proud of her"
A special memorial mass is due to take place in Duleek on August 26.
Original Article
4 notes · View notes
decryptedmatrix · 12 years
Text
Thousands of UK Workers 'Blacklisted' Over Political Views
Activists threaten legal action over failure to investigate
Corporations in the UK who used a secret "blacklisting" database to screen out ‘left wing trouble-makers’ and union sympathizers as potential job recruits are facing renewed scrutiny after the UK-activist group Liberty called for a fresh investigation Monday night.
A demonstration outside the Olympic site on March 1, 2011 was called in solidarity with the whistleblower who was fired for standing up for an illegally blacklisted workmate. The blacklist scandal first broke in 2008, when the UK media revealed that more than 40 leading employers had subscribed to the vetting service provided by The Consulting Association, which had surveillance files on more than 3,200 workers, including political activists, shop stewards and health and safety representatives.
Police seized the database three years ago and Ian Kerr, the founder of The Consulting Association, was fined only about $7,500. Invoices were discovered showing that 44 companies had paid to access the names on the list.
But full details of the material it contained only emerged as workers began to pursue legal action over their inclusion.
Liberty is now threatening to go to court to force the UK government to investigate the case, which it has compared in severity to the national press phone hacking scandal.
Corinna Ferguson, legal officer for Liberty, told the Independent: "We can't believe the inaction of the Information Commissioner on a human-rights violation of such wide public interest.
"Contracting out the blacklisting of innocent workers, politicians and journalists is no better than farming out phone hacking to private detectives and the consequences for our democracy are just as grave. If we cannot persuade the Commissioner to discharge his public duty, we will consider seeking assistance from the courts."
Statements from some of the blacklisted workers from the Blacklist Support Group (BSG):
Mick Abbott, a 74-year-old ex-scaffolder, commented: “This nearly ruined my marriage and it meant that my children were on free meals at school. My file goes back to 1964 and the last entry says that I rekindled the campaign for justice for the Shrewsbury picketers in 2006. They have been watching me all these years and passing this information around, blighting my life over four decades.”
Steve Kelly, an electrician and spokesperson for the Blacklist Support Group said: “I was blacklisted because I was a union member and because I raised issues about safety. In 2007, [Sir Robert] McAlpine sacked me from the Colchester Barracks project after 2 days for refusing to work on a moving platform without proper training (exactly as we had been instructed in the site induction) – the dismissal is recorded on my blacklist file.
“Over the year I suffered severe financial strain, my wages were cut in half which caused immense stress paying bills and putting food on table. I was out of work for a year apart from few weeks here and there in 2001. Being sacked from Colchester Barracks after only two days piled up the stress and caused a nervous breakdown for me eventually.
“The blacklisting firms should be made to pay compensation for years lost and years in future. They should be made to employ blacklisted workers or not be awarded any public government backed contracts. An apology in national press and to individuals whose lives they ruined would be a start.”
SOURCE: CommonDreams.org
Original Article
1 note · View note
decryptedmatrix · 12 years
Text
PRIVACY SOS: Remote Monitoring & Access, Spy Tech Secretly Embeds Itself In Phones
In 2008, a Reston, VA based corporation called Oceans' Edge, Inc. applied for a patent. On March, 2012 the company's application for an advanced mobile snooping technology suite was approved.
The patent describes a Trojan-like program that can be secretly installed on mobile phones, allowing the attacker to monitor and record all communications incoming and outgoing, as well as manipulate the phone itself. Oceans' Edge says that the tool is particularly useful because it allows law enforcement and corporations to work around mobile phone providers when they want to surveil someone's phone and data activity. Instead of asking AT&T for a tap, in other words, the tool embeds itself inside your phone, turning your device against you.
A former employee of Oceans' Edge notes on his LinkedIn page that the company's clients included the FBI, Drug Enforcement Agency, and other law enforcement.
Oddly enough, Oceans' Edge, Inc. describes itself as an information security company on its sparsely populated website. The "About Us" page reads:
Oceans Edge Inc. (OE) is an engineering company founded in 2006 by wireless experts to design, build, deploy, and integrate Wireless Cyber Solutions.
Our team is composed of subject matter experts in the following areas:
Wireless Cyber Security
Mobile Application Development
Wireless Communication Protocols
Wireless Network Implementation
Lawful Intercept Technology
With this expertise, we deliver engineering services and wireless technology solutions in critical mission areas for our government and commercial customers.
But while the company may offer "cyber security" solutions to government and corporations, as the website claims, the firm only has one approved patent on file with the US Patent and Trademark Office.
Remote mobile spying
The patent is for a "Mobile device monitoring and control system." The applicants summarize the technology thusly:
Methods and apparatus, including computer program products, for surreptitiously installing, monitoring, and operating software on a remote computer controlled wireless communication device are described.
In other words, the technology works to snoop on mobile phones by secretly installing itself on phone hardware. The targeted phone is thus compromised in two ways: first, the attacker can spy on all the contents of the phone; and second, the attacker can operate the phone from afar. That's to say, it doesn't just let the attacker read your text messages. It also potentially lets him write them.
The summary goes on:
One aspect includes a control system for communicating programming instructions and exchanging data with the remote computer controlled wireless communication device. The control system is configured to provide at least one element selected from the group consisting of: a computer implemented device controller; a module repository in electronic communication with the device controller; a control service in electronic communication with the device controller; an exfiltration data service in electronic communication with the device controller configured to receive, store, and manage data obtained surreptitiously from the remote computer controlled wireless communication device; a listen-only recording service in electronic communication with the device controller; and a WAP gateway in electronic communication with the remote computer controlled wireless communication device.
The technology therefore also enables automated data storage of all of a phone's activity in the attacker's database. So if someone used this technology to spy on your phone, they would be able to use the Oceans' Edge product to automatically store everything you do on it, to go back to later.
In case you aren't sure who would want this kind of spook technology or why, Oceans' Edge explains in the patent application:
A user's employment of a mobile device, and the data stored within a mobile device, is often of interest to individuals and entities that desire to monitor and/or record the activities of a user or a mobile device. Some examples of such individuals and entities include law enforcement, corporate compliance officers, and security-related organizations. As more and more users use wireless and mobile devices, the need to monitor the usage of these devices grows as well. Monitoring a mobile device includes the collection of performance metrics, recording of keystrokes, data, files, and communications (e.g. voice, SMS (Short Message Service), network), collectively called herein "monitoring results", in which the mobile device participates.
The application goes on to explain that the tool is beneficial to law enforcement or other customers because it allows them to avoid dealing with pesky mobile phone providers when they want to covertly spy on people's mobile communications. Instead of the FBI going to AT&T or T-Mobile to get access to your cell data, they can just surreptitiously install this bug on your phone. They'll get all your data -- and your phone company might never know.
Mobile device monitoring can be performed using "over the air" (OTA) at the service provider, either stand-alone or by using a software agent in conjunction with network hardware such a telephone switch. Alternatively, mobile devices can be monitored by using a stand-alone agent on the device that communicates with external servers and applications. In some cases, mobile device monitoring can be performed with the full knowledge and cooperation of one of a plurality of mobile device users, the mobile device owner, and the wireless service provider. In other cases, the mobile device user or service provider may not be aware of the monitoring. In these cases, a monitoring application or software agent that monitors a mobile device can be manually installed on a mobile device to collect information about the operation of the mobile device and make said information available for later use. In some cases, this information is stored on the mobile device until it is manually accessed and retrieved. In other cases, the monitoring application delivers the information to a server or network device. In these cases, the installation, information collection, and retrieval of collected information are not performed covertly (i.e. without the knowledge of the party or parties with respect to whom the monitoring, data collection, or control, or any combination thereof, is desired, such as, but not limited to, the device user, the device owner, or the service provider). The use of "signing certificates" to authenticate software prior to installation can make covert installation of monitoring applications problematic. When software is not signed by a trusted authority, the software may not be installed, or the device user may be prompted for permission to install the software. In either case, the monitoring application is not installed covertly as required. Additionally, inspection of the mobile device can detect such a monitoring application and the monitoring application may be disabled by the device user. Alternatively, OTA message traffic may be captured using network hardware such as the telephone switch provided by a service provider. This requires explicit cooperation by the service provider, and provides covert monitoring that is limited to message information passed over the air. As a result, service provider-based monitoring schemes require expensive monitoring equipment, cooperation from the service provider, and are limited as to the types of information they can monitor.
The applicants describe some of the challenges they had to overcome, which include:
Additional challenges are present when the monitoring results are transmitted from a mobile device. First, many mobile devices are not configured to transmit and receive large amounts of information. In some instances, this is because the mobile device user has not subscribed to an appropriate data service from an information provider. In other instances, the mobile device has limited capabilities.
In other words, make sure you get that unlimited data plan, or else it'll be really hard for the FBI to spy on your mobile phone! It'll take up so much of your data usage that you'll notice and maybe even complain to your mobile provider! That would be awkward.
Second, transmitting information often provides indications of mobile device activity (e.g. in the form of activity lights, battery usage, performance degradation).
Bad battery performance that the geeks at the Apple genius bar can't explain? Maybe your device has been compromised.
Third, transmitting information wirelessly requires operation in areas of intermittent signal, with automated restart and retransmission of monitoring results if and when a signal becomes available.
The monitoring program has got to be clever enough to stop and restart every time you go out of range of your cell network, or you turn the phone off.
Fourth, many mobile devices are "pay as you go" or have detailed billing enabled at the service provider. The transmission of monitoring results can quickly use all the credit available on a pre-paid wireless plan, or result in detailed service records describing the transmission on a wireless customer's billing statement.
When the snoops steal your information, you might have to pay for the pleasure of being spied on. That's because your mobile phone provider might read the spying activity as your activity. After all, it's coming from your phone.
Lastly, stored monitoring results can take up significant storage on a mobile device and the stored materials and the use of this storage can be observed by the device user.
Is there a large chunk of space on your phone that seems full, but you can't figure out why? Perhaps a snoop tool like that devised by Oceans' Edge, Inc. is storing data on your phone that it plans to later capture.
Given all of those potential problems, the technologists had a lot of work cut out for them. Here's how they addressed those problems:
From the foregoing, it will be appreciated that effective covert monitoring of a mobile device requires the combination of several technologies and techniques that hide, disguise, or otherwise mask at least one aspect of the monitoring processes: the covert identification of the mobile devices to be monitored, the covert installation and control of the monitoring applications, and the covert exfiltration of collected monitoring results. As used herein, "covert exfiltration" refers to a process of moving collected monitoring results from a mobile device while it is under the control of another without their knowledge or awareness. Thus covert exfiltration processes can be those using stealth, surprise, covert, or clandestine means to relay monitoring data. "Collected monitoring results" as used herein includes any or all materials returned from a monitored mobile device to other devices, using either mobile or fixed points-of-presence. Examples of collected monitoring results include one or more of the following: command results, call information and call details, including captured voice, images, message traffic (e.g. text messaging, SMS, email), and related items such as files, documents and materials stored on the monitored mobile device. These materials may include pictures, video clips, PIM information (e.g. calendar, task list, address and telephone book), other application information such as browsing history, and device status information (e.g. device presence, cell towers/wireless transmitters/points-of-presence used, SIM data, device settings, location, profiles, and other device information). Additionally, the capability to covertly utilize a mobile device as a covertly managed camera or microphone provides other unique challenges. 
Thus covert monitoring of a mobile device's operation poses the significant technical challenges of hiding or masking the installation and operation of the monitoring application, its command and control sessions, hiding the collected monitoring results until they are exfiltrated, surreptitiously transmitting the results, and managing the billing for the related wireless services. The exemplary illustrative technology herein addresses these and other important needs.
In short, Oceans' Edge Inc., a company founded and operating in the heart of CIA country, says it has a technology that can secretly install itself on mobile phones and push all the contents of the devices to an external database, doing so entirely under the radar of both the target and the target's mobile provider. It even boasts that the tool allows for covertly managing phone cameras and microphones.
What kind of contracts does this company have, and with which government agencies? A cursory internet search didn't turn up much, except for a couple of bids to work on a military information operations program and a cyber defense project. Neither one of those programs has an obvious link to the mobile snooping device described in the patent application.
Since we don't know which agencies are using this technology or how, it's hard to say to what extent this kind of secret monitoring is taking place in the US. We have some evidence suggesting that the FBI and DEA are using this tool (thanks, Chris Soghoian, for the tip). If those agencies really are using this technology, they should get warrants before they compromise anyone's phone.
Is the government getting warrants to use this tool? We don't know.
Oceans' Edge Inc., like many purveyors of surveillance products, claims that its technology is only deployed for "lawful interception," but it makes no claims about what that actually means. There's no mention of judicial oversight, warrants, or any kind of due process. As I've written elsewhere on this blog, given the state of the law concerning surveillance in the digital age, we shouldn't let our guard down simply because a company claims its surveillance tools are used lawfully. That's because we do not know how these tools are being deployed, and yet we know that the state of surveillance law in the US at present grants the government wide latitude to infringe on our privacy in ways that are often improper or even unconstitutional.
In most cases (with a few notable exceptions), lawmakers haven't worked to address this issue.
As we can see, surveillance technologies are developing rapidly. It's past time for our laws to catch up.
sosadmin's blog
Original Article
5 notes · View notes
decryptedmatrix · 12 years
Text
Israel Embraces Medical Cannabis
While Americans petition state senators to legalize medical marijuana, and the Dutch simply go to an Amsterdam café to self-medicate, thousands of Israelis are enrolled in a regulated medical marijuana program. As talk-show veteran Montel Williams recently saw for himself, Israel is one of the most progressive countries in the world to “legalize it.”
Israel’s inroads into legalizing cannabis for pain relief and managing terminal illness rest on the seminal research of Prof. Raphael Mechoulam of the Hebrew University in Jerusalem’s Center for Research on Pain.
Back in 1964, working from bags of hashish seized by the local police, Mechoulam isolated the active compound from cannabis, THC. He came to be a trusted consultant on the topic to governments and individuals — even to a US senator who was worried about his child’s use of pot at jazz clubs — and urged that derivative compounds called cannabinoids be legalized for medical purposes in Israel.
Mechoulam’s work has inspired generations of research teams around the world to look to marijuana for alleviating medical conditions from chemo-induced nausea to chronic pain. His work led to the discovery of ananamides, naturally occurring THC-like materials in the brain.Mechoulam was recently awarded the Rothschild Prize in physical and chemical sciences in recognition of his contributions. With the help of his efforts, Israel started to develop policies so that medical marijuana can be accessed by those who need it most.
Reducing the reliance on opiates
Mechoulam’s lab was one of the stops on a recent tour of Israel’s medical marijuana researchers by US celeb Montel Williams, who told reporters that the United States could learn a few things from Israel’s approach.
Diagnosed with multiple sclerosis (MS) in 1999, Williams advocates for research and education on new directions in treatment, including medical marijuana, through his MS Foundation. Williams says that medical marijuana helps ease his neuropathic pain and he’s working to legalize it in the United States.Mechoulam acknowledges that Israel’s approach is probably the most advanced in the world, considering the numbers of patients taking medical marijuana in a supervised way.
“At present, about six or seven thousand people get it for various reasons, for [chronic] pain and for cancer, as it’s helping the symptoms of cancer by lowering the amount of opiates patients have to take,” Mechoulam tells ISRAEL21c. That number is expected to rise to about 40,000 by 2016.
“People who are in great pain who are taking opiates aren’t really functional anymore. Taking THC as a medical marijuana, or in its pure form, means that the opiates can be lowered, and then this person will have a better way of life,” he says.
Rigorous screening
The Health Ministry slowly began the program in 1994, but it really got going in 2002 under the direction of Dr. Yehuda Baruch from Abarbanel Hospital, a psychiatric facility in Bat Yam.
Patients of all ages may apply for approval through their own medical doctor or through the Sheba Medical Center, and must pass a rigorous screening process. Those eligible include cancer patients undergoing chemotherapy; cancer patients with final-stage tumors; patients enrolled in an Israeli HIV center; and people under treatment for chronic pain, Crohn’s or ulcerative colitis, MS and post-traumatic stress disorder.
When properly dispensed under medical supervision, medical cannabis has a very low rate of abuse, says Mechoulam.
Still working as a researcher, Mechoulam is asked periodically to test the levels of THC in pot grown by licensed Israelis. And while he’s happy with the country’s progress, he says more research needs to be done on standardizing the dosages and incorporating missing elements in the medical strain used in Israel.
“Basically Israel is moving in the right direction. [THC] has to be better quantified, and cannabidial, a potent anti-inflammatory agent, needs to be present in the doses used in Israel,” he says. Cannabidial alleviates possible undesirable side-effects of THC.
These room-to-grow tips not withstanding, “Israel is one of the leading cannibinoid centers of research in the world. There are about two dozen groups working on it and people come from all around the world to see what we do,” Mechoulam concludes.
By: Karin Kloosterman, March 29, 2012
SOURCE
  Original Article
0 notes
decryptedmatrix · 12 years
Text
Colbert's The Word - Two Birds With One Drone
Two Birds, With One Drone
The Obama administration reasons that anyone in a strike zone is likely Al Qaeda, so no one has to feel guilty about civilian casualties.
  The Colbert Report Mon - Thurs 11:30pm / 10:30c The Word - Two Birds With One Drone www.colbertnation.com
Colbert Report Full Episodes Political Humor & Satire Blog Video Archive
Original Article
0 notes
decryptedmatrix · 12 years
Text
10 Foods with More Ammonia than Pink Slime
One of the most nausea-inducing qualities of “pink slime” (a.k.a. disinfected leftover beef trimmings, a.k.a. the contents of your fast food hamburger patty) is the fact that it’s doused with ammonia. But as it turns out, that’s not as uncommon as you might like to think.According to the University of Michigan Risk Science Center, a burger patty made with pink slime contains 0.02 grams of ammonia per 100 grams of meat — but bleu cheese contains almost seven times as much.
Here are 10 foods with more ammonia than your slimy, slimy burger:
Cheese. Oh my god, cheese is like an ammonia warehouse. Domestic bleu cheese topped the list with 0.138 grams of ammonia per 100 grams, but cheddar (0.11), beer cheese (0.092), American cheese (0.081), and a couple types I’ve never heard of all ranked.
Salami, 0.11 grams of ammonia per 100 grams.
Peanut butter, 0.049 grams per 100.
Mayonnaise, 0.041 grams per 100.
Ketchup, 0.035.
Gelatin, 0.034.
Onions, 0.027.
Potato chips, 0.024, though I imagine the brand and flavor would matter.
Brewer’s yeast, 0.022.
Margarine, 0.021
Now, to be fair this is based on a 1973 paper, so the ammonia content in some of these foods may have changed. But on the other hand, in 1973 the ammonia content in a burger patty was half what it is today. So those changes might not have been for the better.
It’s not totally clear whether you should be less freaked out by pink slime, or a hell of a lot more freaked out by everything else. But one thing is for certain: You may want to think twice about whether you’re going to eat that burger with mayo, onion, ketchup, and American cheese — or whether you’re just going to use it to clean your windows.
SOURCE:
Original Article
3 notes · View notes
decryptedmatrix · 12 years
Text
Conspiracy Theorists Deserve An Apology
The world must apologize to 9/11 truth-tellers.
The reason why there is so much hate and scorn for 9/11 truth activists is because they are right and consistent. The destruction of the 9/11 myth and war on terror ideology is unbearable for the children who are emotionally, spiritually, and psychologically attached to the U.S. government and the Israeli government. They are under the delusion that these evil governments actually care about them, their security, and their future.
The mature men and women of America and the West are waking up and confronting the lies of 9/11 and 7/7. And this political awakening is not unique to America and Western civilization. There is a global political and spiritual awakening happening. All totalitarian regimes in the world will fail in hijacking history and they will fall into ruin. The state terrorists in Washington, London, and Tel Aviv have already lost the battle for history and the souls of mankind.
Alternative accounts of history and reality under totalitarian regimes have always been denounced by regime political mouthpieces as crazy and conspiratorial. And they always failed because truth and history were not on their side. The crazy and the conspiratorial were proven right in the end. This is what history shows, and especially the history of the demonic 20th century. So we should have hope and continue to speak the truth about 9/11 to wake up as many people as possible before the U.S. and Israeli governments blow up the whole world.
II. Unthinking and Regressive: Think Progress Attacks 9/11 Truth, Drudge Report, And Infowars
The political mouthpiece of the Obama administration called 'Think Progress' tried to shame and belittle Drudge Report for highlighting Infowars stories. Paul Joseph Watson writes in his article, "Obama Front Group Attacks Drudge For Linking To Infowars":
"Think Progress is a little more than a PR firm for the Obama administration. No wonder they are so terrified that thanks to traffic from Drudge, the likes of Infowars and World Net Daily have grown to become two of the most visible anti-Obama news outlets on the web.
Think Progress claims it is upset that Drudge is promoting what they call “conspiracy theories,” but in reality the root of the anger is that Drudge is providing a platform for some of the Obama administration’s most ardent critics."
Think Progress is not worth talking about. It is an irrelevant thought-control political operation. Their reporters defend myths and fallacies while putting down truth-tellers as conspiracy theorists. What they are doing is not only unjust but just plain stupid. They are embarrassing themselves. It is actually very sad.
Truth is more powerful than totalitarian propaganda. The mainstreaming of the 9/11 truth movement is unstoppable. 9/11 truth deniers should rejoin reality and admit that it is wrong to defend the official conspiracy theory that was spread by the Bush administration and Israeli government quickly after the traumatic events.
III. The Religious Nature of The 9/11 Deception and Propaganda
Author and Christian theologian David Ray Griffin explained why the belief in the official conspiracy theory of 9/11 is religious in nature in his lecture in October 2007 called, "9-11 and Nationalistic Faith." Griffin was recently interviewed by Jan Frel of AlterNet in an article called, "David Ray Griffin: How a Retired Theologian Became a High-Priest of the 9/11 Truth Movement." Describing Dr. Griffin as a "High-Priest," suggesting that the 9/11 truth movement is somehow a new age mystery cult, is really aiming low.
9/11 truth has nothing to do with religion or priests. Scientific facts are the basis of the movement. Architects, engineers, chemists, scientists, and university professors are the leading spokespeople. Religious figures like Dr. Griffin have contributed great wisdom and understanding but to imply that the 9/11 truth movement is led by "priests" is a lie.
Priests are nowhere to be found in the 9/11 truth movement and that's okay because they are not needed. They are too busy defending evil empires on the pulpit and sacrificing moral principles for temporary power. Their days as the rulers of the spiritual life of Western civilization have come and gone.
Dr. Griffin is a noble exception, but, in general, Christianity has proven to be useless, corrupt, stupid, blind, and power-driven. The same is true for every other moronic religion that makes individuals submit their heart and soul to a corrupt clergy. The majority of Christians are too obsessed about the second coming and the holiness of Israel to really understand that 9/11 was an inside job committed by the occult elite in America and Israel. They don't want to admit that the criminal wars in the Middle East have nothing to do with defending the security of USrael.
What do priests and religious idiots offer humanity and the world? Nothing. They are absent in the battle for souls and the battle for freedom because they are corrupt, blind, and stupid. Expecting Christians to fight the totalitarian state and liberate America is laughable. I'm generalizing here, but Christians, Muslims, and religious Jews are the most tyrannical, greedy, hypocritical, hateful, soulless, and ungrateful people in the world. They want to have a monopoly on the human soul and human mind. What maniacs! And the totalitarian priests who head the CIA and Mossad are just as crazy and demented because they also want to monopolize the thoughts of citizens and control the growth of society.
The role of blind religious faith in preventing people from seeing the truth about 9/11 is big. American Christians, who have bought USrael's propaganda and blindly accept the official 9/11 story, feel no shame in calling for the destruction of Iran and the Muslim world. They make me sick. They don't realize that they're bringing destruction upon themselves by calling for the destruction of other nations and civilizations. As they say, what goes around comes around. If warmongering American Christians want death and destruction so much then they will get it in plenty, except the fires of hell won't burn in the Middle East alone, but in America as well.
IV. Conspiracy Theorists And 9/11 Truthers Deserve An Apology
Who is trying to stop World War III and wake the West up from its sleep? Progressives? No. Liberals? No. Conservatives? No. Christians? No. Journalists? No. They all believe in the official 9/11 deception, which is the ideological foundation that justifies USrael's aggressive wars in the Middle East.
9/11 truth-tellers, the "conspiracy theorists," have tried to wake up humanity in order to stop the USraeli government from starting the catastrophe of world war three. And for their efforts they have been slandered and smeared in the press. But the 9/11 truth movement still continues to grow by the day.
There is a simple reason why the rise of 9/11 truth cannot be contained by the USraeli government, and it is this: the age of slandering and smearing is over. Belittling people by calling them mentally ill conspiracy theorists and truthers is not working anymore. We embrace these terms. We are proud of being called conspiracy theorists because it means we're thinking.
Slandering and smearing Infowars and other alternative news websites is futile. It is a waste of time. Censorship, disinformation, and propaganda are failing. The global free market and global civil society have spoken. People want the news, not smears; truth, not lies; facts, not totalitarian propaganda; freedom, not tyranny; peace, not war.
The Excavator Related: We Are All Conspiracy Theorists Now: The Mainstreaming of 9/11 Truth The Evaporation of Darkness: Mass Deprogramming And The End of The 9/11 Consensus A Radical Rethinking of Conspiracy Theories Is Underway Globally
Original Article
2 notes · View notes
decryptedmatrix · 12 years
Text
Identify Traits of an Old Soul
Are You an Old Soul?
How can you tell if you are an old soul?  Are there differences in traits or behaviors? What signs can I look for that can help me differentiate the difference?
Generally speaking, we are all old souls, but some of us have been here longer than others.
The word “old” is only relative to time.  Because time is linear and our souls are eternal, 10,000 years would be the blink of an eye.
Dolores Cannon believes that we need to incarnate many, many times as inanimate objects, plants and animals before we can become human.  Then, as humans, we still need to incarnate many, many times to learn all of the lessons we came here for.  For example, according to Cannon, we all had to be an air molecule and a drop of water to learn what it’s like to work together as ONE.
So, how can you tell if you have an old soul?
You understand many of life’s deeper lessons.
For some people, it is hard to fathom that the soul of a child may be much older than the soul of his or her parents. For these particular people, this is a sign that their soul might be younger than yours.  When you begin to understand why you keep incarnating to this 3rd dimensional reality, it becomes similar to the movie, Groundhog Day, where Phil wakes up each day to find out that it’s still February 2nd until he learns how to remove his ego and starts doing kind deeds for others.
Once you realize that time, space, energy and matter are 3rd dimensional products, the theory of time becomes irrelevant, thus the theory of how old your soul is also becomes irrelevant.
But for the sake of understanding how old your soul may be, we’ll continue!
You are in touch with your natural abilities or have an extreme interest in these abilities.
Some people are born with innate gifts, such as special healing abilities or psychic abilities.  The truth is that we all possess these abilities, but an older soul is more in tune with how to access and implement these abilities in the name of humanity. If you don’t have any particular ability, but have a strong interest in them, this is simply your soul trying to recall these abilities that you may have had in a previous lifetime.
You become spiritually aware.
Everyone is pure consciousness, but many people have a difficult time understand what this means.  Your soul is pure consciousness and love.  It has a unique understanding of how the matrix is being played on this planet and understands that everything we do as a collective will help to facilitate the awakening of others.
You understand the importance forgiveness.
Some people are old souls who still have much to learn because they are trapped inside the box with their ideologies, are stubborn or have not learned the importance of forgiveness. By forgiving yourself and others, we can release any karma between these people.
You’re able to transcend ego.
It’s nearly impossible for anyone to completely transcend ego 100% of the time but simply being aware of our ego and how it plays against unity consciousness is a definite sign on an old soul. On the other side, there is no ego.  During your life review, you will re-live your ego and will see how it affected others, as well as yourself.  At this point in “time”, you will probably make a soul contract with the hopes of overcoming ego and atoning for whatever ego issues you had in your previous incarnation.
You’re able to transcend materialism.
Money and materialism are products of this 3rd dimensional reality and it’s easy to succumb to materialism, especially when it’s in your face through advertising, programming and peer pressure. An older soul realizes that money is non-existent on the other side and it generally takes away from who we truly are as spiritual beings. Those who are older souls will generally use money as a tool to either help facilitate their spiritual progression through spiritual retreats or by possibly creating a lavish feng shui home decorated with spiritual meaning versus the most luxurious furnishings. They may also use their money to help others who are less fortunate.
You are able to understand the concept that your body is a shell for your soul.
Before you were born, you not only chose your parents, you also chose your life situations and challenges that would help to facilitate your spiritual growth while atoning for any previous karma. The body that you are currently in is simply a vessel for your soul.  Your name is what your soul currently refers itself as, but in previous lifetimes, you had many different names and you have lived many previous lives as either a male or a female.  Your name and title are both associated with ego because ultimately, you are infinite consciousness and we are all on the same team.
You seem to have a special connection to eras long before you were born.
Did you ever watch an old movie or see some artwork from a specific era in time and have a connection to that era?  Chances are, you lived a previous life during that time period and this is your cellular memory letting you know!
You have an understanding of what you need to do to complete your spiritual progression.
Just by making it this far, you are more awakened than most people on this planet.  You have an understanding of Universal laws and what is left to do on your soul contract.  Even if you are not specifically sure of either, your higher self and spirit guides will continue lead you in the right direction.
You have a strong feeling that home isn’t Earth.
Did you ever look at a random area of the sky and star at an unknown star for no particular reason?  Do you have a special connection with specific star systems such as the Pleiades or Orion’s Belt?   Do wars and corruption make you feel uneasy, as if they didn’t exist where you originally came from?  Are you one of the souls who volunteered to come here at this specific point in time to help with the Earth’s ascension?  If you answered yes to any of these questions, then chances are, Earth is not your home planet.
You tend to be a loner.
The stigma on the word loner is often condescending, but those who are old souls are merely looking for other fragments of themselves and will often distance themselves from younger souls who need more incarnations into a 3rd dimensional planet. Older souls will seek out other like-mided people because there’s a comfort and familiarity with these types of people who will help to facilitate each others spiritual progression.
You have a rebellious nature.
Whether you rebel from religion, laws or anything else, this is a sign that your soul knows the only true laws… the Laws of the Universe.  While you respect the reasoning and intention behind laws and religion, you might not be compelled to use these as absolute laws when you know there are a set of higher laws that are intended to facilitate our spiritual progressions.
You have a burning desire to attain truth and inner wisdom.
Many older souls can easily see through the lies we’ve been taught through religion, politics and through our educational facilities.  While they realize they are all one with the universe, they also want the truth exposed to help other people’s awakening process. They also continue to seek knowledge in the spiritual, metaphysical and esoteric fields and will absorb this information much easier than anything they were taught in school.
You are not controlling of others.
Older souls are more accepting, not just of other people, but of circumstances as well.  For example, while you don’t approve of the corruption within politics, you understand how the corruption will help to awaken other people to the truth. You respect the free will of others and are more likely to use tact than verbal demands of others. You tend to be more of a team player than anything else.
You sense a separation between yourself and the “real world”.
As you transcend ego and materialism, you find yourself living a different lifestyle. While this lifestyle is unique to your current incarnation, there also seems to be a familiarity of the direction you’re heading.
You are curious whether you’re an old soul or not.
Many young souls wouldn’t ask this question or much less be concerned about it.  While many older souls aren’t concerned either, for different reasons, they simply “know” they’re old souls, but it’s nice to have affirmations that coincide with your spiritual progression.
There are many lessons we have learned throughout our lifetimes, all of which has culminated into this particular incarnation.  All of your previous life incarnations are embedded into your cellular memory and can be recalled through past life regressions.  Most of the people on this planet are old souls, yet many remain unawakened and still have a lot more to learn and will need several more incarnations to a 3rd dimensional planet.
Many of those who are awakened will probably move on to their next level of spiritual progression.  It’s important to remember that this is not a race because in the end, we all win.  Enjoy every millisecond in this incarnation because this may be the last time you’ll ever experience a 3rd dimensional reality!
By Gregg Prescott - in5d.com
Original Article
8 notes · View notes
decryptedmatrix · 12 years
Text
Medical Proof: Meditation Equals Relaxation
How often do you feel stress and anxiety?  How often do you meditate?  Those who meditate can attest that meditation equals relaxation!
How do I meditate?
The first step is learning how to meditate.  There are many different forms of meditation techniques, and many of these techniques can be intertwined with one another.  My best advice is to study as many forms of meditation as possible, such as transcendental meditation, vipassana, mirror meditation, yoga and so on, and then choose several methods that you enjoy the most.  As mentioned, you can also mix meditations to create your own, personalized meditation routine.  Here at in5d, we cover a wide range of techniques and methods, so try them out and see which ones you like the best!
Meditation benefits
There are many physiological, psychological and spiritual meditation benefits, such as how meditation reduces anxiety and stress while enhancing energy and vigor.  Meditation improves your ability to focus and to concentrate.  Spiritually, meditation gives you that sense of oneness while connecting to your higher source of power as well as to your higher self.
Click here for the complete list of meditation benefits.
Medical proof
The Harvard affiliated Mind-Body Medical Institute completed a meditation study in which they discovered a ‘relaxation response’ to meditation in which various biochemical and physical changes happened to the subject’s  bodies. Notable differences included changes in metabolism, blood pressure, respiration, heart rate and brain chemistry.
In another study, it was noted that meditation grows bigger brains!
The most notable meditation benefits are the complete feeling of relaxation and how it brings you closer to your higher source of power.
Meditation increases serotonin levels which help to promote relaxation
Serotonin is neurotransmitter that is produced in the brain and is made from the amino acid, tryptophan.  Tryptophan is found in high amounts in turkey, so it’s not surprising that after you eat a turkey dinner, you have the feeling of relaxation.  This is the same relaxation feeling that you receive when you meditate!
Medical research has indicated the people with low levels of serotonin are more likely to have anxiety and depression, which are usually treated with Big Pharma medications, but can generally be addressed through meditation.
Do you ever feel good after watching the nightly news?
As we know, we cannot control the elite, but with positive thoughts and intentions through meditation, we can change our physical reality and well-being. The main stream media promotes an agenda of fear and anxiety as a means to control the population through mind control measures.  On occasion, they will finish with a “feel good” story to make a good last impression on you.  Meditation does the exact opposite!  When your meditation is complete, you feel incredibly relaxed and at peace with the world.
Just do it and have fun!
In our busy lives, it is sometimes difficult to find the time to meditate every day, but if we make it part of our daily routine, then we can always find the time to meditate. The best time to meditate is when you feel like it!  Research has indicated that it is most beneficial to meditate in the morning when you are less likely to fall asleep, but in this writer’s opinion, there isn’t a bad time to meditate.  Just do it and have fun!
Permission is granted to reproduce this article on any website as long as it’s reproduced in its entirety.
Source: In5d.com
Original Article
0 notes
decryptedmatrix · 12 years
Text
Pentagon Employee Says Plane Did Not Crash into Building
http://youtu.be/qXC1aTZhxhM
Personal Interview with FBI / Pentagon Employee who Says no Plane hit the building that day, from her professional experience and lack of on site evidence of any plane or wreckage. No jet fuel anywhere, or smell of jet fuel.  No one else on site had seen any crash evidence or plane wreckage.  Believes government fabricated 'official' story.
        Original Article
0 notes
decryptedmatrix · 12 years
Text
Best Of UFO Sightings Of June 2012
http://youtu.be/aNj9mbQztHI
Awesome video mash-up of the best UFO sightings of June 2012. Check it out, made from the videos you can find below.
Music Used - Smooth WestCoast HipHop Beat by SuperDylanGraham http://www.youtube.com/watch?v=MmDI6_VDvtQ
UFO Formation Above Colorado Springs, colorado, USA http://www.youtube.com/watch?v=jJXAjYlE4iI
Triangle UFO Formation Over Apple Valley, California, USA http://www.youtube.com/watch?v=8Ly1C0yRirk
Mass Of UFOs Over Lubbok, Texas, USA http://www.youtube.com/watch?v=BGM4-8oyyCk
UFO Hovers Above Ciudad Juarez, Mexico http://www.youtube.com/watch?v=yG2Nw1GjvUc&feature=plcp
Orange Sphere UFO Over UK http://www.youtube.com/watch?v=PCwcjBGb82U
Arched UFO Over Colorado, USA http://www.youtube.com/watch?v=bYwHwJylJiY
Bright UFO Caught Over Melbourne, Australia http://www.youtube.com/watch?v=lPjiGboS83o
Edge Of Space UFOs Recorded With x60 Magnification http://www.youtube.com/watch?v=RKs_qs0B0oc
Diamond UFO Over Fort Myers Beach, Florida, USA http://www.youtube.com/watch?v=VbjasLQgGEQ
UFO Over Lake Okeechobee, Florida, USA http://www.youtube.com/watch?v=73c1oYZ6TCI
UFO Filmed With Night Vision Above Sävedalen, Sweden http://www.youtube.com/watch?v=rRYCTHrdvFo
UFO Bounces Off The Sun http://www.youtube.com/watch?v=IU5IM94GlGc
Transparent Disc UFO Over Australia http://www.youtube.com/watch?v=-cHChzkxN5g
UFO Observes Shenzhou 9 Launch http://www.youtube.com/watch?v=ZOxHUKWUSSM
UFO Dropping Bright lights Above Highland, Utah, USA http://www.youtube.com/watch?v=vL2zYoMhUxg
Ring Shaped UFO Over Universal City, California, USA http://www.youtube.com/watch?v=dTct4blJ0a8
Strange Shaped UFO Floating Over London, UK http://www.youtube.com/watch?v=A1exdIwIpfg
Diamond Shaped UFO Over Palatine, Illinois, USA http://www.youtube.com/watch?v=_apCa6YDa00
Do yo have a UFO video that you would like to share with the world?
Just Email us at: [email protected]
Facebook message us at: http://www.facebook.com/AnonymousFO
Original Article
1 note · View note
decryptedmatrix · 12 years
Text
Fault Lines: Controlling the Web - Mini Documentary by Al Jazeera
http://youtu.be/6FD9urcUWXw
In January 2012, two controversial pieces of legislation were making their way through the US Congress. SOPA, the Stop Online Piracy Act, and PIPA, the Protect Intellectual Property Act, were meant to crack down on the illegal sharing of digital media. The bills were drafted on request of the content industry, Hollywood studios and major record labels.
The online community rose up against the US government to speak out against SOPA, and the anti-online piracy bill was effectively killed off after the largest online protest in US history. But it was only one win in a long battle between US authorities and online users over internet regulation. SOPA and PIPA were just the latest in a long line of anti-piracy legislation US politicians have passed since the 1990s.
"One of the things we are seeing which is a by-product of the digital age is, frankly, it's much easier to steal and to profit from the hard work of others," says Michael O'Leary, the executive vice-president for global policy at the Motion Picture Association of America (MPAA).
The US government says it must be able to fight against piracy and cyber attacks. And that means imposing more restrictions online. But proposed legislation could seriously curb freedom of speech and privacy, threatening the internet as we know it.
Can and should the internet be controlled? Who gets that power? How far will the US government go to gain power over the web? And will this mean the end of a free and global internet?
Fault Lines looks at the fight for control of the web, life in the digital age and the threat to cyber freedom, asking if US authorities are increasingly trying to regulate user freedoms in the name of national and economic security.
Original Article
0 notes
decryptedmatrix · 12 years
Text
Protect Yourself from FBI Manipulation (w/attorney Harvey Silverglate)
http://youtu.be/jgDsbjAYXcQ
Learn how the FBI can manipulate what you say and use it against you, and how to prevent them from doing so! With civil liberties and civil rights attorney Harvey Silverglate.
Remember: if the FBI asks to speak with you, you do not have to talk to them, no matter what they say. The best thing you can do is take the agent's card and say your lawyer will contact them. Say nothing else, because lying to a federal agent can get you in very serious trouble, and they'll figure out a way to make it look like you lied. Watch the clip to see how that works. Don't get caught in their vice; don't speak to them without your lawyer present. Ever.
Original Article
0 notes
decryptedmatrix · 12 years
Text
Breatharianism: Life Without Eating
http://www.youtube.com/watch?v=Z3e5wueoN4U
Wiley Brooks, spiritual teacher and founder of the Breatharian Institute of America. Wiley believes we don't need to eat. Instead everything we need to live can come from the air.
Original Article
0 notes
decryptedmatrix · 12 years
Text
TRAPWIRE: Wikileaks Drops a Surveillance Bombshell - Widescale Facial Recognition & Behavior Pattern Mapping
Former senior intelligence officials have created a detailed surveillance system more accurate than modern facial recognition technology — and have installed it across the US under the radar of most Americans, according to emails hacked by Anonymous.
Every few seconds, data picked up at surveillance points in major cities and landmarks across the United States are recorded digitally on the spot, then encrypted and instantaneously delivered to a fortified central database center at an undisclosed location to be aggregated with other intelligence. It’s part of a program called TrapWire and it's the brainchild of the Abraxas, a Northern Virginia company staffed with elite from America’s intelligence community. The employee roster at Arbaxas reads like a who’s who of agents once with the Pentagon, CIA and other government entities according to their public LinkedIn profiles, and the corporation's ties are assumed to go deeper than even documented.
The details on Abraxas and, to an even greater extent TrapWire, are scarce, however, and not without reason. For a program touted as a tool to thwart terrorism and monitor activity meant to be under wraps, its understandable that Abraxas would want the program’s public presence to be relatively limited. But thanks to last year’s hack of the Strategic Forecasting intelligence agency, or Stratfor, all of that is quickly changing.
Hacktivists aligned with the loose-knit Anonymous collective took credit for hacking Stratfor on Christmas Eve, 2011, in turn collecting what they claimed to be more than five million emails from within the company. WikiLeaks began releasing those emails as the Global Intelligence Files (GIF) earlier this year and, of those, several discussing the implementing of TrapWire in public spaces across the country were circulated on the Web this week after security researcher Justin Ferguson brought attention to the matter. At the same time, however, WikiLeaks was relentlessly assaulted by a barrage of distributed denial-of-service (DDoS) attacks, crippling the whistleblower site and its mirrors, significantly cutting short the number of people who would otherwise have unfettered access to the emails.
On Wednesday, an administrator for the WikiLeaks Twitter account wrote that the site suspected that the motivation for the attacks could be that particularly sensitive Stratfor emails were about to be exposed. A hacker group called AntiLeaks soon after took credit for the assaults on WikiLeaks and mirrors of their content, equating the offensive as a protest against editor Julian Assange, “the head of a new breed of terrorist.” As those Stratfor files on TrapWire make their rounds online, though, talk of terrorism is only just beginning.
Mr. Ferguson and others have mirrored what are believed to be most recently-released Global Intelligence Files on external sites, but the original documents uploaded to WikiLeaks have been at times unavailable this week due to the continuing DDoS attacks. Late Thursday and early Friday this week, the GIF mirrors continues to go offline due to what is presumably more DDoS assaults. Australian activist Asher Wolf wrote on Twitter that the DDoS attacks flooding the WikiLeaks server were reported to be dropping upwards of 40 gigabytes of traffic per second on the site.
According to a press release (pdf) dated June 6, 2012, TrapWire is “designed to provide a simple yet powerful means of collecting and recording suspicious activity reports.” A system of interconnected nodes spot anything considered suspect and then input it into the system to be "analyzed and compared with data entered from other areas within a network for the purpose of identifying patterns of behavior that are indicative of pre-attack planning.”
In a 2009 email included in the Anonymous leak, Stratfor Vice President for Intelligence Fred Burton is alleged to write, “TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.” Burton formerly served with the US Diplomatic Security Service, and Abraxas’ staff includes other security experts with experience in and out of the Armed Forces.
What is believed to be a partnering agreement included in the Stratfor files from August 13, 2009 indicates that they signed a contract with Abraxas to provide them with analysis and reports of their TrapWire system (pdf).
“Suspicious activity reports from all facilities on the TrapWire network are aggregated in a central database and run through a rules engine that searches for patterns indicative of terrorist surveillance operations and other attack preparations,” Crime and Justice International magazine explains in a 2006 article on the program, one of the few publically circulated on the Abraxas product (pdf). “Any patterns detected – links among individuals, vehicles or activities – will be reported back to each affected facility. This information can also be shared with law enforcement organizations, enabling them to begin investigations into the suspected surveillance cell.”
In a 2005 interview with The Entrepreneur Center, Abraxas founder Richard “Hollis” Helms said his signature product:
“can collect information about people and vehicles that is more accurate than facial recognition, draw patterns, and do threat assessments of areas that may be under observation from terrorists.” He calls it “a proprietary technology designed to protect critical national infrastructure from a terrorist attack by detecting the pre-attack activities of the terrorist and enabling law enforcement to investigate and engage the terrorist long before an attack is executed,” and that, “The beauty of it is that we can protect an infinite number of facilities just as efficiently as we can one and we push information out to local law authorities automatically.”
An internal email from early 2011 included in the Global Intelligence Files has Stratfor’s Burton allegedly saying the program can be used to “[walk] back and track the suspects from the get go w/facial recognition software.”
Since its inception, TrapWire has been implemented in most major American cities at selected high value targets (HVTs) and has appeared abroad as well. The iWatch monitoring system adopted by the Los Angeles Police Department (pdf) works in conjunction with TrapWire, as does the District of Columbia and the "See Something, Say Something" program conducted by law enforcement in New York City, which had 500 surveillance cameras linked to the system in 2010. Private properties including Las Vegas, Nevada casinos have subscribed to the system. The State of Texas reportedly spent half a million dollars with an additional annual licensing fee of $150,000 to employ TrapWire, and the Pentagon and other military facilities have allegedly signed on as well.
In one email from 2010 leaked by Anonymous, Stratfor’s Fred Burton allegedly writes, “God Bless America. Now they have EVERY major HVT in CONUS, the UK, Canada, Vegas, Los Angeles, NYC as clients.” Files on USASpending.gov reveal that the US Department of Homeland Security and Department of Defense together awarded Abraxas and TrapWire more than one million dollars in only the past eleven months.
News of the widespread and largely secretive installation of TrapWire comes amidst a federal witch-hunt to crack down on leaks escaping Washington and at attempt to prosecute whistleblowers. Thomas Drake, a former agent with the NSA, has recently spoken openly about the government’s Trailblazer Project that was used to monitor private communication, and was charged under the Espionage Act for coming forth. Separately, former NSA tech director William Binney and others once with the agency have made claims in recent weeks that the feds have dossiers on every American, an allegation NSA Chief Keith Alexander dismissed during a speech at Def-Con last month in Vegas.
SOURCE: RT.com
  NOW FOR THE RAW LEAKS:
http://privatepaste.com/c56f6848d2/trapwireCentralizedDatabaseMGMGrandLinkedSystemEtc - centralized database, vegas hotels, linked sites, etc
http://privatepaste.com/e5b7f4a21d/trapwireNYC - NYC circa 2010
http://privatepaste.com/a9bc9274ea/trapwireAustin - Austin
http://privatepaste.com/04eaef4343/trapwireEveryHVTUSCANUK - note the last paragraph
http://privatepaste.com/90198aa545/trapwireTexasBorder - Texas border circa 2009
http://privatepaste.com/568f0a512a/trapwireWalkTheCatBack - Talking about images to analyze and walking the cat back
http://privatepaste.com/318e0e652b/trapwireHVTCitizens - Trapwire for certain citizens that are important, but not USSS important
http://privatepaste.com/670091f5b0/trapwireLondonStockExchange - London Stock Exchange
http://privatepaste.com/b62ceaf254/trapwireNYCDCVegasLondonOttawaLA - NYC, DC, Vegas, London, Ottawa, LA
http://privatepaste.com/fba46e24ca/trapwireAustinDPSAllocated1Point8M - 1.8M for trapwire & equipment from Austin DPS
http://privatepaste.com/caf299c230/trapwireOnDesksOfUSSSMI5LAPDRCMPNYPD - trapwire on the desks of USSS CP, MI5, RCMP, LAPD CT, NYPD CT
http://privatepaste.com/5a71bac416/trapwireDCMetroNationalParkPoliceEtc - trapwire DC metro, National Park Police, etc
http://privatepaste.com/e6031c14f6/trapwireLAPD - trapwire LAPD as a prototype
http://privatepaste.com/febefa287f/trapwirePentagonArmyUSMCNavy - trapwire Army, Pentagon, USMC, Navy
http://privatepaste.com/58a60bff35/trapwireNSIFBIFtMeadeSevenYears - Trapwire 7 years circa 2011, National SAR Initiative (NSI), FBIs eGuardian, Ft. Meade, etc
http://privatepaste.com/f7b7ac02ab/trapwireAmtrackDHSFusionCenters - Amtrack, DHS fusion centers, DC Metro
http://privatepaste.com/7add918e4c/trapwireBehaviorPatternsToIdentifySurveillance - "TrapWire is a technology solution predicated upon behavior patterns in red zones to identify surveillance. It helps you connect the dots over time and distance.
http://privatepaste.com/d503851f0c/trapwireSalesforceGoogleDHSInstitute - salesforce, google, DHS institute
http://privatepaste.com/626712c0fa/trapwireNigerianPresidentialPalace - Nigerian Presidential Palace
http://privatepaste.com/bf0a0abf67/trapwireScotlandYardDowningWhiteHouseWalMartDell - Scotland Yard, 10 Downing St, White House, Wal-Mart, Dell
  Original Article
1 note · View note