1.18.19 1:04:29 With the advent of cryptocurrencies, the internet of things, the 'SMART' grid, and the rising spectres of robotics and Trans-Humanism, the world is changing very rapidly. But what is it changing into? In this presentation Max will break down the Internet Of Things, the roll-out of new Chinese trade agreements and of the planned digital social crediting system that will encompass all aspects of our lives, unless WE, the people, take urgent action ... NOW!
1.17.19 1:14:24 - FREXIT & Gilet Jaune : A French Doctor Speaks out - Treaty of Aachan : The attempt to establish Franco-Germany - 5G & Active Denial Weaponary - The UN General Secretary gets an education on 5G - David Noakes (Still in JAIL) & GcMAF - Ben Gilroy JAILED for telling the TRUTH about the Irish Judiciary - What really happened at Hillsborough on 15th April 1989?
They Spy with Their Little Eye
1.15.19 The Five Eyes, a part of what the NSA calls internally its “global network,” have their dirty fingerprints all over the latest spying scandal engulfing New Zealand, writes exiled Kiwi journalist and activist Suzie Dawson.
Chemtrails Exposed: The Deep State And The New Manhattan Project
1.14.19 [The CIA is] a secret government – a shadowy government with its own air force, its own navy, its own fund-raising mechanism, and the ability to pursue its own ideas of the national interest, free from all checks and balances and free from the law itself. – Senator Daniel Inouye in his closing statement to the Iran-Contra hearings, Aug. 3, 1987
Today is Classic Torture
1.13.19 1:57:51 Dr. Millicent Black and Ramola D have a second public conversation on the subject of how those being wrongfully watchlisted and terrorlisted by the FBI and DHS are being subjected to terminal nonconsensual experimentation with new-age medical implants, directed energy weapons -- in field weapons testing projects the DOD/USA/Navy are running but trying to keep secret--and in multiple medical and military/Intel experiments involving 24/7 trauma inflicted with remote electrical weapons and Psy Ops, and sleep deprivation, as well as social terrorism, blacklisting, character assassination and life sabotage--how all this relates quite closely to classic understandings of classic torture.
"The CIA and FBI are behind most, if not all terrorism."
- Ted Gunderson, former FBI Chief
12.24.2018 22.34 Remote Neural Monitoring is about control, period. This video explains the lengths that the perpetrators who torture me have gone to control who can view information from me. I know the truth about their crimes, and that is very dangerous to them, which makes my knowledge dangerous to me. All I have is the truth, and I continue to tell it, even if it is to death ears and blind eyes.
12.20.2018 Officers rescued the girls after the young victim called her former foster parent, who told police they were being held there “against their will,” police said.
After finding out about the young girl’s phone call, Exavier allegedly tried leaving with the girls, but was intercepted by authorities, who also discovered Newsome in the motel room.
The duo picked up their victims from a “secured group facility,” around 7 p.m. Tuesday, according to court records. The 12-year-old had been reported missing.
“Further investigation revealed Exavier and Newsome picked up the girls from the group home where they live and drove them to the motel where Newsome attempted to have the 12-year-old girl engage in sexual activities with him and encouraged her to become a prostitute,” according to a press release from the arrest.
12.20.2018 Police are under orders to avoid creating “flashpoints,” meaning confrontations between police and hooligans that might look bad on video.
12.17.2018 Global Gang Stalking operations (GISTAPWO-666) deploy the same personnel, technologies and objectives as JADE HELM and UWEX, the massive multi-state US military drills for “dissident extraction” carried out in 2015 and 2016. These are “assymetrical,” “unconventional,” network-centric warfare” “civil-military operations”/”Military Operations Other Than War” carried out by: 1) all military branches and their Special Operations Forces and psychological operations groups, 2) CIA, FBI, DHS, NSA, FEMA, etc. 3) local, federal and state police, 4) private security contracting firms, and 5) many sectors of the civilian population.
12.13.2018 1:54:37 Sister Keri Burnor is a former Roman Catholic nun, who served faithfully in the church until she was sexually assaulted by priests. Her search for justice and truth put her face to face with evil and powerful powers including the CIA. Her intimate knowledge fo the inner workings of the Roman Catholic Church and the evils that are hidden and covered up therein put her life in jeopardy. She survived more than 10 attempts on her life between 2010 and 2016 due to her knowledge of the Catholic Church's rampant sexual abuse, the Shadow Government and the Deep State, and the use of nanotech against targeted individuals. You can find Sister Keri at www.clergyvictim.com.
Ramola D Reports
12.12.2018 1:25:33 “Max,” a seeming Intelligence or corporate insider from Sweden who wishes to be known merely as a white hat insider speaks with me about a program of ELF signals sent to South Africa across many decades as well as information passed down to him by his father, who worked for South African intelligence and learned about covert biowarfare and electronic warfare experiments conducted on South Africans. Andrija Puharich, MD, confirms this latter, suggesting that South Africa and six other countries fell within the sphere of EMF influence transmitted putatively by Soviet transmitters; Open Minds radio host from the 80s, Bill Jenkins has interviewed Puharich on this and other subjects—we play a small clip from this interview, which can be found at https://archive.org/details/OpenMindW.... Max correlates this period of ELF pulsing at a targeted Black population in South Africa with off-the-charts murder rates recorded across the 70s, 80s and peaking in the 90s.
12.12.2018 14:54 Russian Jewish oligarch Leonard Blavatnik
12.11.2018 49:43 Anthony Patch - CERN Awakens, Quantum Computing & Mass Mind Control
12.10.2018 1:46:22 Ramola D • Dr. Eric Karlstrom discusses further the planned takeover of society over time by various factions including banksters, Globalists, Satanists and Babylonian Zionists, and we relate present circumstances of targeting and social oppression in our communist USSA to historic situations and extensions via Tavistock, the Nazis, Paperclip, the CIA, MK ULTRA, and so on. We also discuss briefly what any of us can do about all of this, and encourage people to take action and speak out and register disagreement on large issues locally at the level of city councils and county governments.
11.19.2018 Have the fires in California been planned all along? Is there an agenda by the United Nations in conjunction with the Democrats for a land grab and to push the Agenda 21 and fake Climate Change narrative?
You might be convinced after this report in which I prove by using a map from 1992 that that is EXACTLY what is happening
11.16.2018 1:54:19 Ramola D Report #94: Marc Delantre
Air Force Defense Research Sciences Program
11.15.2018 Human-Centered Intelligence, Surveillance & Reconnaissance (ISR) Leveraged Science and Technology (S&T) Program
This research objective is dual natured: (1) improve the capability to identify, track and locate human targets in the ISR environment and (2) improve the performance of humans who process, exploit, analyze, produce, and disseminate the ISR data and information. Human-centered ISR research encompasses three major research areas: (1) human signatures, (2) human trust and interaction and (3) human analyst augmentation. The human signatures research develops technologies to sense and exploit human bio-signatures at both the molecular level and macro (anthropometric) level. The human trust and interaction research develops technologies to improve human-to-human interactions as well as human-to- machine interactions. The human analyst augmentation research develops technologies to enhance analyst performance and to test the efficacy of newly developed technologies within a simulated operational environment.
KTH is the Royal Institute of Technology. Wireless@kth is a research center in “Mobile Systems for Mobile Services”. That together with researchers at KTH and its industry partners is developing this key field for Sweden/Stockholm.
11.13.2018 12:39 Microchipping humans with chips the size of a grain of rice is ancient technology that is now being accepted on the mainstream level. In 2002 the Jacob family became the first known family to inject the chip in the wake of 911 for the purposes of having “more security”. In this video Dan Dicks of Press For Truth points out how this is old technology and that there does exist today the ability to do similar injections on a molecular level which plays into the Transhumanist movement where mankind hopes to merge man and machine with the ultimate goal of eventually become like gods.
11.9.2018 Big Brother Watch recently released a report detailing a staggering 90% false positive rate for its face recognition systems and then went on to describe the Home Office defence of these systems – “misleading, incompetent and authoritarian.”
The fact that on Remembrance Sunday 2017, the Metropolitan Police used automated facial recognition to find so-called ‘fixated individuals’ – people not suspected of any crime, but who might be suffering mental health issues, should be a wake-up call for us all.
10.30.2018 State Department Links to George Soros’ Open Society Foundation – Romania
Judicial Watch released 49 pages of new State Department documents showing top Soros representatives in Romania collaborating with the State Department in a program jointly funded by, among others, Soros’s Open Society Foundations – Romania and USAID, called the “Open Government Partnership.”
12.7.2018 In particular, he is concerned about the bill's secrecy provisions that mostly prevent the disclosure of a notice.
Mr Stanton also described the lack of a warrant framework around the issuing of notices under the bill as "extraordinary".
In most cases, authorities would still need an "underlying warrant or authorisation" to access the actual content of encrypted communications, but not to issue a notice.
Amendments at the last moment added additional safeguards to the TCN regime, but fell short of requiring judicial scrutiny each time one is issued.
"Given the risks and the power associated with those notices, we think that there's a severe lack of oversight," he added.
12.7.2018 We have made more than 600 million dollars’ worth of surplus military equipment available to law enforcement that, as you know, the previous administration would not allow you to have. It was sitting in storage houses and warehouses all over the country getting old and gaining dust — beautiful stuff. And they didn’t like it because it made you look too strong. And I liked it because it made you safe. And now it’s been distributed all over the country to the police and you’re using it very well and very judiciously and we appreciate it.
We increased funding for Project Safe Neighborhoods to $50 million dollars this year and we’re asking Congress to add an additional increase for next year. That will happen.
12.6.2018 1:00:46 CIA Whistleblower Barbara Hartwell shares articles and affidavits she has published from whistleblowers Richard Taus and Mike Ruppert while we both discuss the current situation of COINTELPRO persecution that FBI Whistleblower Geral Sosbee has lately been reporting to us, and include his recent letter to McAllen Texas City Council officials seeking protection from harassment.
In the Post 9/11 Era, Understanding the Targeted Individual Phenomenon is No Longer Optional
12.6.2018 In the post September 11th era, the security-service-stalking situation represents a state-of-emergency that requires people from every walk of life — including those with integrity within our intelligence agencies and all security-service organizations — to see through the very fear that arises in the face of such a grotesque problem, and leverage that seeing, to let this fear give wings to your innate evolutionary impulse to evolve to your truest, deepest, most genuine self. The self within you that knows no fear.
10.23.2018 Sweden using RFID. SJ Rail staff shown Linkedin passenger profiles instead of their ticket information at kickoff.
7.26.2018 Directed conversations apparently are when police supervisors write out scripts for undercover officers (or informants) to recite in front of suspects. “Gas lighting” is when undercover officers (or informants) break into a suspect’s home and move things around or do intentional damage to utilities, appliances or clothes, for example. “Mobbing” is often at work when several co-workers have agreed to become police informants (snitches) and they mob, surround and simultaneously bully a co-worker creating a hostile work environment. Some TI websites and groups mention mobbing in other contexts like stores or in public, suspects get enveloped by a swarm of irritating and menacing undercover officers (or informants).
Depopulation Agenda In Motion
7.22.2018 Deborah Tavares interview.
Several threats are being perpetrated upon us by the Deep State and their friends in control of the UN. We discussed many issues including the use of directed energy weapons, not just to create chaos in N California, but in places like Finland. The goal is to block access to water and to use it as a weapon. We also discussed how the UN and Agenda 21 are prepared to move on America and the world in a very big way.
6.29.2018 “They will induce many deaths. You are at the heart of the program to break you down in every way financially, mentally, social supports, etc. But from an outsiders perspective, they only see you doing it to yourself.”
5.7.2018 Guardian learns 40% of young people
on list in Haringey had ‘zero’ risk of causing harm
Under the so-called gang violence matrix, suspected gang
members are given a score assessing how dangerous they are
and can be targeted for “Al Capone-style” disruption tactics.
4.30.2018 The technology works by placing wireless sensors in workers' hats or caps that when combined with artificial intelligence can spot workplace rage, anxiety or depression.
Employers use this 'emotional surveillance technology' to boost productivity and profits by tweaking workflows, including employee placement and break lengths.
4.10.2018 1.21.07 The early history and roots of the CIA derive from its Nazi background she notes, when Project Paperclip brought over SS officers and scientists in the thousands and ensconced them in Intelligence and military jobs in the US, where they pursued invasive and abusive mind control research among other things. Narrating an astounding story surrounding one notorious Nazi scientist, she reveals that her own family had an intimate and unfortunate connection to this Nazi history.
2.9.2018 1:26:44 "We have a demonic force that is taking over." Deborah Tavares exposes the trans humanist genocidal plan to drastically reduce the US population through globalist policies including UN Agenda 21, smart cities, 5G and directed energy weapons. The scope and horror of what is unfolding will leave you seething with anger. But it's not too late - if we educate our friends and neighbors and take action to stop this madness, now. Visit Deborah's site StopTheCrime.net for all of her latest information. LUKE 8:17 For there is nothing hidden that will not be disclosed, and nothing concealed that will not be known or brought out into the open.
10.8.2017 The United Nations Office of the High Commissioner for Human Rights is sanctioning a sexual revolution that will culminate in the legalization and whole-hearted support of transgenderism but will also support the legalization of pedophilia.
12.15.2017 Daughter of survivor of brutal experiments ‘nervous’ to speak out after non-disclosure demand
4.16.17 Radio show host Josh Tolley interviewed an unidentified American woman from Missouri who learned about her state’s refugee immigration program by attending UN-sponsored meetings and participating in the programs. She said that refugees are brought into the US in alliance with the UN Refugee Resettlement Organization Offices of Refugee Monitoring out of Washington, DC. In her state, Missouri Social Services administers the refugee programs that provide welfare for housing, food stamps, and medicare, in addition to cash and jobs.
3.30.2017 The Kecksburg UFO crash is officially “nothing” according to investigations, despite a wealth of witnesses. It was largely lost to time, until the release of a book on a secret Nazi project in 2000.
Stasi Tactics – Zersetzung
11.22.2016 The aim of the Zersetzung was to ‘switch off’ the group by rendering it ineffective, with an interim goal of hindering any positive media or public exposure. The usual ways to switch groups off were to:
create conflict between members – particularly useful subjects for sowing discord were those of a philosophical or political nature, money and personal (sexual) relations;
hinder and sabotage activities by the use of one or more infiltrators, who would agree to do tasks, but not get round to doing them, lose materials and equipment, repeatedly request changes and further edits of materials to slow down production, attempt to divert the group into more harmless activities etc;
isolate the groups from other activists, eg by spreading rumours regarding unacceptable behaviour and political views etc.
7.22.2016 10:27 Google claims to make a huge breakthrough in quantum computing. The D-Wave computer has been int he news recently, with NASA, Lockheed Martin etc. The greater events taking place here on the cutting edge of public science is opening up the window to all the science fiction themes we're read and watched about for decades.
6.2.2016 June 3 marks the 100th anniversary of the National Defense Act of 1916, a defining moment in the history of the National Guard.
The law codified the dual state and federal mission of the National Guard and required new Guardsmen to swear allegiance to both the Constitution of the United States and their state of record.
All state militias were renamed as National Guards, and Guardsmen would wear the U.S. Army uniform.
10.25.2015 Strong Cities Network (SCN) is a program hatched by the Department of Justice wherein control of local law enforcement is handed over to a London-based think-tank called the Institute for Strategic Dialogue
9.17.2014 Under the heading, "Immunity from liability", Section 35K of the draft National Security Legislation Amendment Bill (No.1) 2014 bill states:
"A participant in a special intelligence operation is not subject to any civil or criminal liability for or in relation to conduct if … the conduct does not involve the participant engaging in any conduct that: (i) causes the death of, or serious injury to, any person; or (ii) involves the commission of a sexual offence against any person; or (iii) causes significant loss of, or serious damage to, property;”
7.17.2014 For the first time, agencies within the intelligence community will be able to order a variety of on-demand computing and analytic services from the CIA and National Security Agency. What’s more, they’ll only pay for what they use.
The vision was first outlined in the Intelligence Community Information Technology Enterprise plan championed by Director of National Intelligence James Clapper and IC Chief Information Officer Al Tarasiuk almost three years ago. Cloud computing is one of the core components of the strategy to help the IC discover, access and share critical information in an era of seemingly infinite data.
10.2.2012 77 fusion centers have become pools of ineptitude, waste and civil liberties intrusions, according to a scathing 141-page report by the Senate Homeland Security and Governmental Affairs permanent subcommittee on investigations. Where’s the ACLU?
Ted L Gunderson Ex FBI
12.3.2011 14:53 Former head of FBI Los Angeles, Memphis, Dallas, poisoned with Arsenic says Dr Ed Lucidi who saw the body and treated Mr Gunderson who suffered bladder cancer and died as a result of its spread. Reportedly Mr Gunderson had a very large FBI dossier being a whistleblower against the agency and left out of moral considerations. He spoke to many around the country about his first hand informatio
3.13.2010 For four years, Officer A lived a secret life among anti-racist activists as they fought brutal battles with the police and the BNP. Here he tells of the terrifying life he led, the psychological burden it placed on him and his growing fears that the work of his unit could threaten legitimate protest
3.2008 The secret aircraft that helped the CIA tap phones in North Vietnam
Fall 2005 State Defense Force Journal, Vol. 1, No. 1
Congress enacted laws enabling the governors to establish and maintain state defense forces. The Constitution does not provide for state defense forces. Article I, Section 10 of the Constitution says "No state shall, without the consent of the Congress, ...keep troops, or ships of war in time of peace...”
During the preparedness period just prior to World War I, Congress for the first time consented to having state defense forces in the event the National Guard was federalized. Section 61 of the National Defense Act of 1916 says: ”No state shall maintain troops in time of peace other than as authorized in accordance with the organization prescribed in this Act.” Section 79 of the Act, however, says that when the National Guard is federalized, “there shall be immediately organized” reserve battalions of infantry or cavalry to constitute the fourth battalion of each regiment ordered to active duty.
11.2001 The United States should restore the militia to its original, constitutional role of homeland security to provide the large numbers of trained, armed, and disciplined military units that are needed to deal with terrorist attacks on America.
The National Guard of today is the modern counterpart of the provincial forces of the Seven Years War. They are professionals, albeit part-timers, and their role is to fight alongside the regular forces on foreign campaigns. Gradually during the twentieth century, the militia, whose role is to defend the homeland, disappeared.
1992 36:58 George Hunt became aware of the environmental fraud after attending the Wilderness conference in Colorado in 1987. From then until his death Dec 23rd 2013 George dedicated himself to exposing the environmental fraud.