image75

The Common SMART Prison


1.18.19   1:04:29   With the advent of cryptocurrencies, the internet of things, the 'SMART' grid, and the rising spectres of robotics and Trans-Humanism, the world is changing very rapidly. But what is it changing into? In this presentation Max will break down the Internet Of Things, the roll-out of new Chinese trade agreements and of the planned digital social crediting system that will encompass all aspects of our lives, unless WE, the people, take urgent action ... NOW!

The Madness of Corporatocracy


1.17.19    1:14:24    - FREXIT & Gilet Jaune : A French Doctor Speaks out - Treaty of Aachan : The attempt to establish Franco-Germany - 5G & Active Denial Weaponary - The UN General Secretary gets an education on 5G - David Noakes (Still in JAIL) & GcMAF - Ben Gilroy JAILED for telling the TRUTH about the Irish Judiciary - What really happened at Hillsborough on 15th April 1989?

They Spy with Their Little Eye

1.15.19   The Five Eyes, a part of what the NSA calls internally its “global network,” have their dirty fingerprints all over the latest spying scandal engulfing New Zealand, writes exiled Kiwi journalist and activist Suzie Dawson.

Chemtrails Exposed: The Deep State And The New Manhattan Project

1.14.19  [The CIA is] a secret government – a shadowy government with its own air force, its own navy, its own fund-raising mechanism, and the ability to pursue its own ideas of the national interest, free from all checks and balances and free from the law itself. – Senator Daniel Inouye in his closing statement to the Iran-Contra hearings, Aug. 3, 1987

Surveillance Targeting
Today is Classic Torture

1.13.19    1:57:51    Dr. Millicent Black and Ramola D have a second public conversation on the subject of how those being wrongfully watchlisted and terrorlisted by the FBI and DHS are being subjected to terminal nonconsensual experimentation with new-age medical implants, directed energy weapons -- in field weapons testing projects the DOD/USA/Navy are running but trying to keep secret--and in multiple medical and military/Intel experiments involving 24/7 trauma inflicted with remote electrical weapons and Psy Ops, and sleep deprivation, as well as social terrorism, blacklisting, character assassination and life sabotage--how all this relates quite closely to classic understandings of classic torture.

Technology & Technical information


"The CIA and FBI are behind most, if not all terrorism."

     -  Ted Gunderson, former FBI Chief

VPN Control (Targeted) - How They Control Every Online Connection


12.24.2018   22.34   Remote Neural Monitoring is about control, period. This video explains the lengths that the perpetrators who torture me have gone to control who can view information from me. I know the truth about their crimes, and that is very dangerous to them, which makes my knowledge dangerous to me. All I have is the truth, and I continue to tell it, even if it is to death ears and blind eyes.

Two Men Arrested for 

Sex-Trafficking 12-Year-Old Girl, Teen


12.20.2018   Officers rescued the girls after the young victim called her former foster parent, who told police they were being held there “against their will,” police said.


After finding out about the young girl’s phone call, Exavier allegedly tried leaving with the girls, but was intercepted by authorities, who also discovered Newsome in the motel room.


The duo picked up their victims from a “secured group facility,” around 7 p.m. Tuesday, according to court records. The 12-year-old had been reported missing.


“Further investigation revealed Exavier and Newsome picked up the girls from the group home where they live and drove them to the motel where Newsome attempted to have the 12-year-old girl engage in sexual activities with him and encouraged her to become a prostitute,” according to a press release from the arrest. 

Whose Streets, Indeed? 


12.20.2018    Police are under orders to avoid creating “flashpoints,” meaning confrontations between police and hooligans that might look bad on video.

Organized Gang Stalking (GISTAPWO – 666), Mind Control, and Cults


12.17.2018  Global Gang Stalking operations (GISTAPWO-666) deploy the same personnel, technologies and objectives as JADE HELM and UWEX, the massive multi-state US military drills for “dissident extraction” carried out in 2015 and 2016. These are “assymetrical,” “unconventional,” network-centric warfare” “civil-military operations”/”Military Operations Other Than War” carried out by: 1) all military branches and their Special Operations Forces and psychological operations groups, 2) CIA, FBI, DHS, NSA, FEMA, etc. 3) local, federal and state police, 4) private security contracting firms, and 5) many sectors of the civilian population. 

Sister Keri Burnor on the 

Catholic Church, Targeted 

Individuals, and Nanotech


12.13.2018    1:54:37   Sister Keri Burnor is a former Roman Catholic nun, who served faithfully in the church until she was sexually assaulted by priests. Her search for justice and truth put her face to face with evil and powerful powers including the CIA. Her intimate knowledge fo the inner workings of the Roman Catholic Church and the evils that are hidden and covered up therein put her life in jeopardy. She survived more than 10 attempts on her life between 2010 and 2016 due to her knowledge of the Catholic Church's rampant sexual abuse, the Shadow Government and the Deep State, and the use of nanotech against targeted individuals. You can find Sister Keri at www.clergyvictim.com.

Report # 101: "Max, a White Hat Insider" On ELF Signals in South Africa, Neural Influence Tech


Ramola D Reports


12.12.2018  1:25:33    “Max,” a seeming Intelligence or corporate insider from Sweden who wishes to be known merely as a white hat insider speaks with me about a program of ELF signals sent to South Africa across many decades as well as information passed down to him by his father, who worked for South African intelligence and learned about covert biowarfare and electronic warfare experiments conducted on South Africans. Andrija Puharich, MD, confirms this latter, suggesting that South Africa and six other countries fell within the sphere of EMF influence transmitted putatively by Soviet transmitters; Open Minds radio host from the 80s, Bill Jenkins has interviewed Puharich on this and other subjects—we play a small clip from this interview, which can be found at https://archive.org/details/OpenMindW.... Max correlates this period of ELF pulsing at a targeted Black population in South Africa with off-the-charts murder rates recorded across the 70s, 80s and peaking in the 90s.


BBC Reports Israeli/Russian Gangsters About To Run Pentagon Cloud


12.12.2018    14:54   Russian Jewish oligarch Leonard Blavatnik

Shadow Government Short Part 3


12.12.2018  Kevin Shipp


Part 4


12.12.2018   37:01   Kevin Shipp



Part 1 


Part 2

CERN Awakens, Quantum Computing and Mass Mind Control


12.11.2018  49:43   Anthony Patch - CERN Awakens, Quantum Computing & Mass Mind Control

Global Gestapo 8:

The Planned Takeover of Society

and What We Can Do About It


12.10.2018   1:46:22   Ramola D • Dr. Eric Karlstrom discusses further the planned takeover of society over time by various factions including banksters, Globalists, Satanists and Babylonian Zionists, and we relate present circumstances of targeting and social oppression in our communist USSA to historic situations and extensions via Tavistock, the Nazis, Paperclip, the CIA, MK ULTRA, and so on. We also discuss briefly what any of us can do about all of this, and encourage people to take action and speak out and register disagreement on large issues locally at the level of city councils and county governments.

“Useless Eaters” Must Be 

Eliminated, Say Globalists


11.19.2018  The globalist plan to exterminate humanity begins: “Useless eaters” must be eliminated, say globalists

UN Involved in California Fires?


11.19.2018  Have the fires in California been planned all along? Is there an agenda by the United Nations in conjunction with the Democrats for a land grab and to push the Agenda 21 and fake Climate Change narrative?


You might be convinced after this report in which I prove by using a map from 1992 that that is EXACTLY what is happening

CA Fire Psyop


11.17.2018  Memes, Mind Control and Mass Manipulation

Gladio Code, Covert Neurotech, & the Terror Chessboard


11.16.2018  1:54:19  Ramola D Report #94: Marc Delantre

USAF Human-Centered

Intelligence Grant


Air Force Defense Research Sciences Program


11.15.2018 Human-Centered Intelligence, Surveillance & Reconnaissance (ISR) Leveraged Science and Technology (S&T) Program


This research objective is dual natured: (1) improve the capability to identify, track and locate human targets in the ISR environment and (2) improve the performance of humans who process, exploit, analyze, produce, and disseminate the ISR data and information. Human-centered ISR research encompasses three major research areas: (1) human signatures, (2) human trust and interaction and (3) human analyst augmentation. The human signatures research develops technologies to sense and exploit human bio-signatures at both the molecular level and macro (anthropometric) level. The human trust and interaction research develops technologies to improve human-to-human interactions as well as human-to- machine interactions. The human analyst augmentation research develops technologies to enhance analyst performance and to test the efficacy of newly developed technologies within a simulated operational environment.

Wireless@kth


KTH is the Royal Institute of Technology. Wireless@kth is a research center in “Mobile Systems for Mobile Services”. That together with researchers at KTH and its industry partners is developing this key field for Sweden/Stockholm.

UK Firms Plan To MICROCHIP 

Employees With Old School 

BIOTECH To “Improve Security”


11.13.2018  12:39  Microchipping humans with chips the size of a grain of rice is ancient technology that is now being accepted on the mainstream level. In 2002 the Jacob family became the first known family to inject the chip in the wake of 911 for the purposes of having “more security”. In this video Dan Dicks of Press For Truth points out how this is old technology and that there does exist today the ability to do similar injections on a molecular level which plays into the Transhumanist movement where mankind hopes to merge man and machine with the ultimate goal of eventually become like gods.

Child Sexual Abuse

Underlies the Deep State


A CONSPIRACY OF SILENCE


11.11.2018 We’re up against some pretty heavy hitters, and they are absolute scum. Like John DeCamp, I will not back down.

UK Government Goes Full Orwellian. 

DNA, Fingerprint, Face, Voice: 

Biometric Data for 

Every Single Citizen in the UK


11.9.2018  Big Brother Watch recently released a report detailing a staggering 90% false positive rate for its face recognition systems and then went on to describe the Home Office defence of these systems – “misleading, incompetent and authoritarian.”


The fact that on Remembrance Sunday 2017, the Metropolitan Police used automated facial recognition to find so-called ‘fixated individuals’ – people not suspected of any crime, but who might be suffering mental health issues, should be a wake-up call for us all.

Shadow Government Short Part 2


11.7.2018    17:37   Part 2 of CIA Officer Kevin Shipp's revelation of the Shadow Government


Part 1


Part 3


Part 4

Open Society Foundation – Romania


10.30.2018    State Department Links to George Soros’ Open Society Foundation – Romania


Judicial Watch released 49 pages of new State Department documents showing top Soros representatives in Romania collaborating with the State Department in a program jointly funded by, among others, Soros’s Open Society Foundations – Romania and USAID, called the “Open Government Partnership.”

'Outlandish' Encryption Laws 

Leave Australian Tech Industry 

Angry and Confused


12.7.2018  In particular, he is concerned about the bill's secrecy provisions that mostly prevent the disclosure of a notice.


Mr Stanton also described the lack of a warrant framework around the issuing of notices under the bill as "extraordinary".


In most cases, authorities would still need an "underlying warrant or authorisation" to access the actual content of encrypted communications, but not to issue a notice.


Amendments at the last moment added additional safeguards to the TCN regime, but fell short of requiring judicial scrutiny each time one is issued.


"Given the risks and the power associated with those notices, we think that there's a severe lack of oversight," he added.

2018 Safe Neighborhoods

National Conference


Video Transcript


12.7.2018 We have made more than 600 million dollars’ worth of surplus military equipment available to law enforcement that, as you know, the previous administration would not allow you to have. It was sitting in storage houses and warehouses all over the country getting old and gaining dust — beautiful stuff. And they didn’t like it because it made you look too strong. And I liked it because it made you safe. And now it’s been distributed all over the country to the police and you’re using it very well and very judiciously and we appreciate it.


We increased funding for Project Safe Neighborhoods to $50 million dollars this year and we’re asking Congress to add an additional increase for next year. That will happen.

CIA Whistleblower Barbara Hartwell 

on COINTELPRO Reports from 

ex-FBI Geral Sosbee


12.6.2018     1:00:46   CIA Whistleblower Barbara Hartwell shares articles and affidavits she has published from whistleblowers Richard Taus and Mike Ruppert while we both discuss the current situation of COINTELPRO persecution that FBI Whistleblower Geral Sosbee has lately been reporting to us, and include his recent letter to McAllen Texas City Council officials seeking protection from harassment.

Mandatory Implantation 

of Microchips in Employees?


12.6.2018 Employing the same technology used in contactless credit cards, the tiny device is generally implanted in a worker’s hand and can be used for such things as opening doors or turning on devices.

Security Service Stalking


In the Post 9/11 Era, Understanding the Targeted Individual Phenomenon is No Longer Optional


12.6.2018 In the post September 11th era, the security-service-stalking situation represents a state-of-emergency that requires people from every walk of life — including those with integrity within our intelligence agencies and all security-service organizations — to see through the very fear that arises in the face of such a grotesque problem, and leverage that seeing, to let this fear give wings to your innate evolutionary impulse to evolve to your truest, deepest, most genuine self. The self within you that knows no fear.

Feds Spend $1.7 Billion

For 97 Acres In St. Louis


12.4.2018 The NGA answers to the Office of Director of National Intelligence and is charged with tracking everything that moves on planet earth. It is the ultimate in total surveillance in order to ‘master the human domain’.

RFID Errors in Sweden


10.23.2018  Sweden using RFID. SJ Rail staff shown Linkedin passenger profiles instead of their ticket information at kickoff.

Shadow Government Short Part 1


10.6.2018   25:11  First in a series of the Shadow Government speech broken down into 20 minute segments.


Part 2


Part 3


Part 4

Shadow Government/

Deep State Officials Exposed


8.12.2018  2:18:23   Kevin Shipp lays out in detail the structure of the Shadow Government/Deep State and the corrupt officials involved.

United States of Paranoia: Surveillance of Suspects or Gang Stalking Targeted Individuals 


7.26.2018  Directed conversations apparently are when police supervisors write out scripts for undercover officers (or informants) to recite in front of suspects. “Gas lighting” is when undercover officers (or informants) break into a suspect’s home and move things around or do intentional damage to utilities, appliances or clothes, for example.   “Mobbing” is often at work when several co-workers have agreed to become police informants (snitches) and they mob, surround and simultaneously bully a co-worker creating a hostile work environment. Some TI websites and groups mention mobbing in other contexts like stores or in public, suspects get enveloped by a swarm of irritating and menacing undercover officers (or informants).

Depopulation Agenda In Motion

7.22.2018  Deborah Tavares interview.

Several threats are being perpetrated upon us by the Deep State and their friends in control of the UN. We discussed many issues including the use of directed energy weapons, not just to create chaos in N California, but in places like Finland. The goal is to block access to water and to use it as a weapon. We also discussed how the UN and Agenda 21 are prepared to move on America and the world in a very big way. 

C-A/DARPA scientist Dr Robert Duncan


6.29.2018  “They will induce many deaths. You are at the heart of the program to break you down in every way financially, mentally, social supports, etc. But from an outsiders perspective, they only see you doing it to yourself.”

Police Gang Strategy 'Targets People Unlikely to Commit Violence' 


5.7.2018   Guardian learns 40% of young people 

on list in Haringey had ‘zero’ risk of causing harm


Under the so-called gang violence matrix, suspected gang 

members are given a score assessing how dangerous they are 

and can be targeted for “Al Capone-style” disruption tactics.

China Mining Data

From Workers' Brains


4.30.2018  The technology works by placing wireless sensors in workers' hats or caps that when combined with artificial intelligence can spot workplace rage, anxiety or depression.


Employers use this 'emotional surveillance technology' to boost productivity and profits by tweaking workflows, including employee placement and break lengths.

Barbara Hartwell, CIA Whistleblower Discusses CIA History, Propaganda, Targeting


4.10.2018    1.21.07  The early history and roots of the CIA derive from its Nazi background she notes, when Project Paperclip brought over SS officers and scientists in the thousands and ensconced them in Intelligence and military jobs in the US, where they pursued invasive and abusive mind control research among other things. Narrating an astounding story surrounding one notorious Nazi scientist, she reveals that her own family had an intimate and unfortunate connection to this Nazi history. 

Rothschild Genocide: Innovating the Population to Zero – Deborah Tavares


2.9.2018  1:26:44  "We have a demonic force that is taking over." Deborah Tavares exposes the trans humanist genocidal plan to drastically reduce the US population through globalist policies including UN Agenda 21, smart cities, 5G and directed energy weapons. The scope and horror of what is unfolding will leave you seething with anger. But it's not too late - if we educate our friends and neighbors and take action to stop this madness, now. Visit Deborah's site StopTheCrime.net for all of her latest information. LUKE 8:17 For there is nothing hidden that will not be disclosed, and nothing concealed that will not be known or brought out into the open. 

ETICA Project

Ethical Evaluation of 

European Institutions


pdf, 66 pgs


Ethics of European Institutions

Weinstein Allegedly Hired

Intelligence Agency to Target Accusers


11.8.2017   7:16  The use of the company called Black Cube was first reported by Ronan Farrow in The New Yorker. Weinstein denies any wrongdoing.

The UN Is Normalizing Pedophilia: 

The Deep State Is Free to Prey 

Upon Your Children


10.8.2017   The United Nations Office of the High Commissioner for Human Rights is sanctioning a sexual revolution that will culminate in the legalization and whole-hearted support of transgenderism but will also support the legalization of pedophilia.

Trudeau government gag order in C-A brainwashing case silences victims, lawyer says


12.15.2017  Daughter of survivor of brutal experiments ‘nervous’ to speak out after non-disclosure demand

Whistleblower Reveals That A UN-Planned Invasion By Refugees Into The US Is Already Underway


4.16.17  Radio show host Josh Tolley interviewed an unidentified American woman from Missouri who learned about her state’s refugee immigration program by attending UN-sponsored meetings and participating in the programs.  She said that refugees are brought into the US in alliance with the UN Refugee Resettlement Organization Offices of Refugee Monitoring out of Washington, DC.  In her state, Missouri Social Services administers the refugee programs that provide welfare for housing, food stamps, and medicare, in addition to cash and jobs.

Is The Kecksburg UFO Crash And The Nazi Bell Connected?


3.30.2017  The Kecksburg UFO crash is officially “nothing” according to investigations, despite a wealth of witnesses. It was largely lost to time, until the release of a book on a secret Nazi project in 2000.

Stasi Tactics – Zersetzung

11.22.2016  The aim of the Zersetzung was to ‘switch off’ the group by rendering it ineffective, with an interim goal of hindering any positive media or public exposure. The usual ways to switch groups off were to:

create conflict between members – particularly useful subjects for sowing discord were those of a philosophical or political nature, money and personal (sexual) relations;
   hinder and sabotage activities by the use of one or more infiltrators, who would agree to do tasks, but not get round to doing them, lose materials and equipment, repeatedly request changes and further edits of materials to slow down production, attempt to divert the group into more harmless activities etc;
   isolate the groups from other activists, eg by spreading rumours regarding unacceptable behaviour and political views etc.

'BREAKTHROUGH IN QUANTUM COMPUTERS' says Google: Biometrics, Brain-Machine Interface & 2030 Agenda


7.22.2016  10:27  Google claims to make a huge breakthrough in quantum computing. The D-Wave computer has been int he news recently, with NASA, Lockheed Martin etc. The greater events taking place here on the cutting edge of public science is opening up the window to all the science fiction themes we're read and watched about for decades.

Federalizing the National Guard: National Defense Act of 1916


6.2.2016 June 3 marks the 100th anniversary of the National Defense Act of 1916, a defining moment in the history of the National Guard.


The law codified the dual state and federal mission of the National Guard and required new Guardsmen to swear allegiance to both the Constitution of the United States and their state of record.


All state militias were renamed as National Guards, and Guardsmen would wear the U.S. Army uniform.

Ted Gunderson - 

Former FBI Chief Exposes 

'Illuminati' (disturbing content)


4.24.2016   1:13:46   Former FBI Chief Ted Gunderson exposes the horror that has been inflicted upon so many men, women, and children.

Paradoxes of the Gray Zone


2.5.2016     fpri.org

Mastering the Gray Zone: Understanding Changing Era of Conflict


12.2015    pdf, 157 pgs


Strategic Studies Institute & U.S. Army War College Press report

Strong Cities Network: Trilateral, CFR, Rothschild Connections 


10.25.2015  Strong Cities Network (SCN) is a program hatched by the Department of Justice wherein control of local law enforcement is handed over to a London-based think-tank called the Institute for Strategic Dialogue

DARPA Cortical Modem Connects
Brain Directly to Computer for
'Electronic Telepathy and Telekinesis'

2.18.2015  the interface provides a direct link between the brain and an external device or software through manipulation of the visual cortex.





Dr Daniel Lebowitz, M.D. 


12.2014  Presentation submitted to a Senate Hearing. This is an excellent introduction about Targeted Individuals.

George Brandis' New Anti-Terror

Law Allows ASIO to Torture


9.17.2014   Under the heading, "Immunity from liability", Section 35K of the draft National Security Legislation Amendment Bill (No.1) 2014 bill states:


"A participant in a special intelligence operation is not subject to any civil or criminal liability for or in relation to conduct if … the conduct does not involve the participant engaging in any conduct that: (i) causes the death of, or serious injury to, any person; or (ii) involves the commission of a sexual offence against any person; or (iii) causes significant loss of, or serious damage to, property;”

The Details About the CIA's

Deal With Amazon


7.17.2014 For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency. What’s more, they’ll only pay for what they use.


The vision was first outlined in the Intelligence Community Information Technology Enterprise plan championed by Director of National Intelligence James Clapper and IC Chief Information Officer Al Tarasiuk almost three years ago. Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.

USA INC, Nasa War Document Depopulation & You


7.23.2013  35:57  Deborah Tavares Nasa

Future Of War Document can be seen on http://stopthecrime.net/ Silent Weapons For Quiet Wars PDF link is there also. Filmed at Conspiracy Con with Trevor Coppola and Anthony J Hilder.

DHS ‘Fusion Centers’ Portrayed as Pools of Ineptitude and Civil Liberties Intrusions


10.2.2012  77 fusion centers have become pools of ineptitude, waste and civil liberties intrusions, according to a scathing 141-page report by the Senate Homeland Security and Governmental Affairs permanent subcommittee on investigations. Where’s the ACLU?

Ted L Gunderson Ex FBI
Whistleblower Poisoned?

12.3.2011   14:53   Former head of FBI Los Angeles, Memphis, Dallas, poisoned with Arsenic says Dr Ed Lucidi who saw the body and treated Mr Gunderson who suffered bladder cancer and died as a result of its spread. Reportedly Mr Gunderson had a very large FBI dossier being a whistleblower against the agency and left out of moral considerations. He spoke to many around the country about his first hand informatio

Undercover policeman reveals how he infiltrated UK's violent activists


3.13.2010  For four years, Officer A lived a secret life among anti-racist activists as they fought brutal battles with the police and the BNP. Here he tells of the terrifying life he led, the psychological burden it placed on him and his growing fears that the work of his unit could threaten legitimate protest

Black Budget


2004-2013

The Famous Black Helicopter


3.2008 The secret aircraft that helped the CIA tap phones in North Vietnam

The Role of State Defense Forces 

in Homeland Security


Fall 2005 State Defense Force Journal, Vol. 1, No. 1


Congress enacted laws enabling the governors to establish and maintain state defense forces. The Constitution does not provide for state defense forces. Article I, Section 10 of the Constitution says "No state shall, without the consent of the Congress, ...keep troops, or ships of war in time of peace...”


During the preparedness period just prior to World War I, Congress for the first time consented to having state defense forces in the event the National Guard was federalized. Section 61 of the National Defense Act of 1916 says: ”No state shall maintain troops in time of peace other than as authorized in accordance with the organization prescribed in this Act.” Section 79 of the Act, however, says that when the National Guard is federalized, “there shall be immediately organized” reserve battalions of infantry or cavalry to constitute the fourth battalion of each regiment ordered to active duty.

Restore the Militia

for Homeland Security


11.2001 The United States should restore the militia to its original, constitutional role of homeland security to provide the large numbers of trained, armed, and disciplined military units that are needed to deal with terrorist attacks on America.


The National Guard of today is the modern counterpart of the provincial forces of the Seven Years War. They are professionals, albeit part-timers, and their role is to fight alongside the regular forces on foreign campaigns. Gradually during the twentieth century, the militia, whose role is to defend the homeland, disappeared.

UN UNCED Earth Summit


1992   36:58    George Hunt became aware of the environmental fraud after attending the Wilderness conference in Colorado in 1987. From then until his death Dec 23rd 2013 George dedicated himself to exposing the environmental fraud.

1   2