Monthly Archives: January 2015

Super Soldier Talk with Ben Murphy – Reptilians, Heather Material – Nov 14, 2014

Ben murphy shares his story of how he survived a near fatal wound, his take on James Casbolt, his experience with extraterrestrial beings, and the release of audio CDs to activate super soldiers given to him by Heather Anderson. Also we like to give a special thanks to for correcting the audio malfunction.

To read the transcripts please visit

View original post

British securocrats try to sneak in Snooper’s Charter yet again


Earlier this month, four U.K. lords tried to sneak the text of a rejected piece of legislation popularly known as the Snooper’s Charter into a new anti-terror bill. After debate in the House of Lords produced heavy pushback, the peers withdrew the amendments that would have brought the surveillance law in by the back door.

And now, incredibly, they’re trying it again just days later. On Saturday, ahead of a “report stage” debate on Monday (the Counter-Terrorism and Security Bill is almost fully baked), Lords West, Blair, Carlile and King introduced a new amendment that appears to be nearly identical to the last, and to the Communications Data Bill before it.

Again, this new amendment would force “telecommunications operators” – which these days includes the likes of [company]Facebook[/company] and [company]Skype[/company], as well as traditional telcos – to store communications metadata for up to a year and hand it over to…

View original post 407 more words

UK Lords kill attempt to sneak in new surveillance laws


Members of the U.K. House of Lords, who last week introduced amendments to an antiterror bill that would have essentially brought back defeated surveillance legislation, have withdrawn the amendments after a spirited debate in the House.

The amendments had been added to the Counter-Terrorism and Security Bill and would have reintroduced key planks of the Communications Data Bill, popularly known as the Snooper’s Charter.

This included a new data retention regime and very broadly-phrased clauses that would have allowed security services to force communications service providers such as Facebook to install equipment in their facilities, so U.K. intelligence and law enforcement could search through Britons’ communications metadata.

Lord King, one of the four peers who introduced the amendments, withdrew them after hours of debate on the basis that their contentiousness might sink the wider terror bill.

It was certainly a lively debate. The peers who submitted the amendments attacked the…

View original post 266 more words

License plate data lets cops spy on US drivers at record rates


A new investigation shows the scale of surveillance on U.S. highways is more extensive than many previously imagined, thanks to a license plate database that allows federal and local law enforcement to watch cars and even drivers in real time.

According to documents reviewed by the Wall Street Journal, the database was created by the Drug Enforcement Administration to track cartel activity, but it soon came to comprise millions of records that are regularly shared with police forces across the country:

The Justice Department has been building a national database to track in real time the movement of vehicles around the U.S., a secret domestic intelligence-gathering program that scans and stores hundreds of millions of records about motorists […]

The DEA program collects data about vehicle movements, including time, direction and location, from high-tech cameras placed strategically on major highways. Many devices also record visual images of drivers and passengers, which are sometimes clear…

View original post 201 more words

Levitation program tracked file-sharing sites, Snowden doc shows


The Canadian spy agency CSE monitors activity across over 100 free file upload sites, a newly-revealed PowerPoint document from NSA whistleblower Edward Snowden’s cache has shown.

The document describing CSE’s Levitation program was published on Wednesday by The Intercept, reporting alongside Canadian broadcaster CBC. Although Canada has long been known to be a member of the core Anglophone “Five Eyes” spying club, this is the first Snowden revelation putting it at the forefront of one of the Eyes’ mass surveillance programs.

Using an internet cable-tap program called Atomic Banjo, CSE’s agents were at the time of the presentation’s authoring collecting HTTP metadata for 102 cyberlocker sites, including Sendspace and Rapidshare, and tracking 10-15 million “events” each day to find “about 350 interesting download events per month.” And yes, this meant filtering out loads of TV shows and such.

According to the presentation, the technique yielded a “German hostage…

View original post 129 more words

UK terror law amendments would bring back “Snooper’s Charter”


Four U.K. Lords have proposed amendments to an anti-terror bill that would revive much of the dormant Communications Data Bill, a.k.a the “Snooper’s Charter”.

In particular, the amendments would let British authorities force web and telecoms providers — even those outside the U.K. — not only to retain metadata on customers’ communications, but also to install equipment for “filtering” data. It looks like access to this data would not be subject to judicial oversight.

The Communications Data Bill is supposedly dead in the water during the current Parliament – the Conservatives’ Liberal Democrat coalition partners refuse to allow it – but the key elements are found in the amendments to the Counter-Terrorism and Security Bill, which is in its latter stages of development.

The amendments broadly describe a data retention regime, and much of their language seems to double up what can already be found in the recently rushed-through Data…

View original post 688 more words

Whistleblower Randy Cramer Tells About Secret Military Operations on Mars

Posted on April 30, 2014

Note: Images have been resized and the multiple copy issue is being resolved.

By Eve Lorgen

Randy Cramer-aka-Captain “Kaye”, a former supersoldier I Interviewed back in 2006, code named “Zed” (See:

is going public with his testimony about his service for the Mars Defense Force. The MDF is part of the Earth Defense Force, a UN “Unacknowledged Special Access Program”. His recruitment in 1987 into the “US Marine Corps Special Section” began a 20 year tour of duty working for the Mars Defense Force, which is the primary defense unit that protects the Mars Colony Corporation. This defense unit recruits people from many military services globally to protect the interests of the MCC, which consists of five civilian space colonies. Aries Prime is the main human “headquarters” on Mars, and is located inside of a crater.

According to Randy, the atmosphere on Mars is…

View original post 7,658 more words

Defending encryption doesn’t mean opposing targeted surveillance


David Omand, the former head of British spy agency GCHQ, has made an extraordinary threat. Speaking earlier this week, he said that if companies such as Apple and Google don’t abandon their end-to-end encryption efforts, intelligence services will have to employ more “close access” surveillance on people they suspect of evil deeds.

This means physical observation, or bugging rooms, or hacking into phones and computers. According to Omand, such actions are “more targeted but in terms of intrusion into personal privacy – collateral intrusion into privacy – we are likely to end up in an ethically worse position than we were before.”

No, you’re not. Surreptitiously getting a key to a suspect’s communications is no more ethical than conducting close personal surveillance — but in the big picture, the latter is vastly preferable.

The ethics of spying

Targeted surveillance will always mean “collateral intrusion” into the privacy of people associated with…

View original post 601 more words

How the internet’s engineers are fighting mass surveillance


The Internet Engineering Task Force has played down suggestions that the NSA is weakening the security of the internet through its standardization processes, and has insisted that the nature of those processes will result in better online privacy for all.

After the Snowden documents dropped in mid-2013, the IETF said it was going to do something about mass surveillance. After all, the internet technology standards body is one of the groups that’s best placed to do so – and a year and a half after the NSA contractor blew the lid on the activities of the NSA and its international partners, it looks like real progress is being made.

Here’s a rundown on why the IETF is confident that the NSA can’t derail those efforts — and what exactly it is that the group is doing to enhance online security.

Defensive stance

The IETF doesn’t have members as such, only…

View original post 1,611 more words

FBI doesn’t want companies to hack in retaliation


Major banks, retailers, manufacturers and other companies are fed up with the increasing amount of cyber attacks and are exploring hacking in revenge, something the FBI doesn’t seem too keen on, according to a Bloomberg report.

Based on the perception that the U.S. government is not doing enough to stop data breaches, some companies are looking to hack into criminal networks and take back their goods as well as stop future breaches. To help with the retaliation hacks, these companies are supposedly working with security firms.

Citing anonymous sources, Bloomberg reports that the FBI is investigating who took down the Iranian servers responsible for launching cyber attacks against major banks last year. Supposedly, [company]JPMorgan[/company] Chase (whose unpatched server led to a data breach earlier this summer) advocated such a move in a secret meeting in February 2013. But a spokeswoman told Bloomberg that the bank didn’t present any sort…

View original post 229 more words

UK wants hot tech grads to do spy work before building startups


The British government is considering a program that would see the most promising tech graduates spend some time working for the GCHQ signals intelligence agency, the U.K.’s equivalent to the NSA, before they move into the private sector.

As per a Thursday article in The Independent, confirmed to me by the Cabinet Office on Friday, the scheme would give the U.K. a rough equivalent to the system in Israel, where many tech entrepreneurs have come out of Unit 8200 of the Israel Defence Force. Unit 8200 is also a signals intelligence operation, and the cybersecurity firm Palo Alto Networks is a notable spinout.

According to the Cabinet Office sources quoted in the Independent piece, the idea would be to “capitalize on the expertise in GCHQ in terms of IT commercialization” by creating “a secure space where business can work with GCHQ and build an eco-system between the two.” (Side…

View original post 257 more words

Obama administration won’t act on Aaron Swartz petition


The White House will not act on a petition filed to fire the U.S. Attorney who prosecuted Aaron Swartz, co-founder of Reddit and crusader for a free-and-open internet. Swartz died, of an apparent suicide, two years ago.

Swartz, 26 years old, was reportedly despondent over the government’s decision to pursue federal charges that he hacked into an academic database, downloading millions of research papers. He faced a maximum of 50 years in prison.

A petition filed on White, which received more than 61,000 signatures, asked the administration to remove Carmen Ortiz, the U.S. Attorney out of Boston, for overzealous prosecution for what critics call minor infractions. The petition cites a lack of a sense of “proportionality.”

In its response to the petition, the administration said it will continue to examine such thorny issues as “open access to information, privacy and intellectual property, free speech and security” But it will not fire Ortiz. The response noted that…

View original post 70 more words

Are you being tracked? A TED Fellow on how law enforcement follows your movements, and why you should care

TED Blog

Catherine-Crump-CTA-imageDid you know that across the United States, cameras are automatically taking pictures of your car’s license plate as you drive by, recording your plate number and your locations over time? In a chilling talk given at TEDGlobal 2014, civil liberties lawyer and TED Fellow Catherine Crump called attention to the ubiquity of mass surveillance technology currently being deployed without public awareness, laws governing its use or privacy policies regulating what happens to the data being collected. (Watch the talk, “The small and surprisingly dangerous detail the police track about you.”)

Crump tells the TED Blog more about her work, and the technologies that are quietly threatening the privacy and civil liberties of innocent people.

You are a civil liberties lawyer with many different strands to your work, but in the talk you gave at TEDGlobal, you focused on automatic license plate reader technology. Why did you choose that topic?

I think…

View original post 2,268 more words

The Aviary: Key players of the 1980s and 1990s

The story of artificial telepathy research in the 1980s and 1990s centers on The Aviary and their leader, Col. John B. Alexander (see photo).

“The Aviary” is a collection of strange birds: a group of key scientists, military men and intelligence agents who share an intense interest in UFOs, telepathy, remote viewing, parapsychology, mind control and the creation of psychotronic weapons.

They seem to work and flock together, and they are reportedly part of a secretive cell. Its members are codenamed after birds, hence they are called “the Birds” and their cell is called the “Aviary.”


The strange UFO slant on this group appears to be simple disinformation.

Members of the Aviary have reportedly participated in MILABS operations — black operations by rogue military-intelligence units that stalk, harrass, terrorize, kidnap, drug, gang-rape and mind-rape innocent civilians, using hypnotic mind-control programming to implant a false post-hypnotic “memory” that…

View original post 1,729 more words

Leaked US report says encryption “best defense” to protect data


A newly leaked document courtesy of Edward Snowden revealed that some U.S. officials are encouraging the use of encryption as a means to protect data, which contrasts with British Prime Minister David Cameron’s recent statements against encrypted communications, according to a report by The Guardian.

The 2009 document penned by the U.S. National Intelligence Council, which supports the U.S. Director of National Intelligence and acts as the middleman between the intelligence and policy communities, explained that companies and the government are prone to attacks by nation-states and criminal syndicates “due to the slower than expected adoption…of encryption and other technologies.”

The report detailed a five-year prognosis on the “global cyber threat to the US information infrastructure” and stated that encryption technology is the “[b]est defense to protect data.” Encryption makes it possible for documents and messages to be unreadable to people who don’t have the appropriate cryptographic key.


View original post 223 more words

Report: No real substitute for NSA’s bulk data collection


A new report from the National Research Council concludes that untargeted, or bulk, data collection remains probably the best method for fulfilling the National Security Agency’s mission. However, the report’s authors note, there are measures that can be taken to make that practice more transparent and less susceptible to agency abuse.

The 80-plus-page report, which was written in response to a presidential directive to investigate alternatives to bulk data collection by the intelligence community, lays out various possible methods of targeting data collection to specific individuals, groups or behavior patterns –ranging from machine learning to real-time analysis — but seems to come down on the side of the status quo. The only way to investigate newly identified suspects or new information is to have a large database that might already include relevant data, the report explained.

The report does offer suggestions for improving public trust in the process, primarily focused on improving the sanctity…

View original post 445 more words

A True Story of “The Handler and the Butterfly”

Victims of MKUltra Trauma Based Mind Control – A monarch is the king or queen at the head of a monarchy. This is a form of government in which a state or polity is ruled or controlled by an individual who …(wiki)

Their purpose was to study mind control, interrogation, behavior modification and … Its remit was to develop mind-controlling drugs for use against the Soviet … (wiki)
The Monarch butterfly (Danaus plexippus) is a milkweed butterfly (subfamily Danainae) in the family Nymphalidae. It is perhaps the best known of all North …(wiki)

View original post

The Strange World of NSA Mind Control

“Whatever you think of Gaddafi and Mussa Kussa …

they were good and they were good counter-terrorism partners,”

Gen. Michael V. Hayden Former NSA and CIA Director 


The Strange World of NSA Mind Control
The surveillance society is a secretive apparatus of intrusion and deception. An enigma within a disinformation perception of reality is at the core all activities of spooks. One of the most pervasive and all reaching agencies is the NSA. The National Security Administration officially is a cryptologic intelligence agency whose primary function is Signals Intelligence Directorate (SID), which produces foreign signals intelligence information, and the Information Assurance Directorate (IAD), which protects U.S. information systems. The General Accounting Office defines the nature of the structure of the NSA.

“The National Security Agency (NSA) is a combat support agency within the Department of Defense (DOD) established by presidential directive in 1952. NSA has two separate missions: signals intelligence…

View original post 1,447 more words

Mind Control: the Pentagon Mission to Program the Brain

By Jon Rappoport

Region: USA

“Since the dawn of time, the most powerful groups in every society have practiced forms of mind control on populations. They determined it was necessary. Eventually, they decided it was their most important job. Convincing the masses that a fabricated reality is Reality…that task requires formidable mind control.” (The Underground, Jon Rappoport)

DARPA, the technical-research arm of the Pentagon, is leading the way in a mission to program the human brain.

What could go wrong?

In a word, everything.

Here is a DARPA release (5/27/14) on the upcoming “brain-mapping” plan, in accordance with Obama’s initiative aimed at “preventing violence through improved mental health”—otherwise known as Clockwork Orange:

“…developing closed-loop therapies that incorporate recording and analysis of brain activity with near-real-time neural stimulation.”

Translation: Reading myriad brain activities as they occur, and influencing that activity with various…

View original post 1,029 more words

Time to build personal protect fields

(c) Terry Floyd Johnson, 2015

Terrorists, ISIS, etc., and others, are stepping up their killing of innocents. ISIS kills children and teenagers, 3 men kill cartoonists, because they don’t like their political cartoons, about their God, the Big M, and of others like the leaders of ISIS.

These fanatics, use these so called reasons, to be able to kill, innocents, who can’t defend themselves, and they call themselves heroes, because they kill everything in sight.

These freaks of nature, must be brought down, and the best way is to arm the public with a personal protect field, that not only protects them, but allows the bullets, etc., to return to sender, killing the killers.

There are going to be those who don’t won’t to kill them, but simply be safe from them, their protect fields will simply block out whatever the assholes, not terrorists, want to do to them.

It’s time to build smart devices, who can actually save lives, and put an end to terrorists, and wars, for they are unable, to kill anyone. What if they destroy the environment around them, and the building crashed down on them. These personal protect fields, will be able to protect their owners, from any kind of terrorist act, and send back to sender. Thus the terrorists are the one who dies, not the innocents.

These personal protect fields are futuristic; well, the future is now, and the military have been working on ideas which will protect soldiers, and allow the killing of the enemy.

Use their research, and add it for personal protection, for every person in the world. We have the way to build this, use our creative engineering and our mind to come up with the answers.

Anyone who is interested in doing this, anyone who wants to fund the research, please contact me at

Come on do something that will make the creator wealthy, and save the human race from itself.