Total Pageviews

Showing posts with label European. Show all posts
Showing posts with label European. Show all posts

Monday, May 11, 2015

Despite hypocritical protests by European governments, on the contrary,Snowden disclosed that those “3rd party” partners are joined at the hipwith their “Five Eyes” cousins. In a recent interview with Der Spiegel,Snowden was asked if “German authorities or German politicians [are]involved in the NSA surveillance system?” “Yes, of course. We’re in bedtogether with the Germans the same as with most other Westerncountries. For example, we tip them off when someone we want is flyingthrough their airports (that we for example, have learned from the cellphone of a suspected hacker’s girlfriend in a totally unrelated thirdcountry–and they hand them over to us. They don’t ask to justify how weknow something, and vice versa, to insulate their political leadersfrom the backlash of knowing how grievously they’re violating globalprivacy.” Disclosing new information on how UKUSA functions today,Snowden told the German newsmagazine: “In some cases, the so-calledFive Eye Partners go beyond what NSA itself does. For instance, theUK’s General [sic] Communications Headquarters (GCHQ) has a systemcalled TEMPORA.”

Free MacBook Pro 17 Inch i7 (click here)

Those who follow Glenn Beck might be aware that Tuesday marks the release of his latest book, “Agenda 21,” the suspenseful and perhaps sobering tale of a futuristic America in which a UN-led program spawned an authoritarian state where individuals are stripped of all personal rights and freedoms. Oddly, Beck’s novel is not simply a work of fiction, but based on an actual program created by the United Nations by the very same name — “Agenda 21? — which, according to the UN’s own website, is a “comprehensive plan of action to be taken globally, nationally and locally by organizations of the United Nations system, governments and major groups, in every area in which human impacts on the environment.” In so many words, the United Nations seeks to co-opt, via individual governments, and eventually, a “one-world government,” privately held land under the auspices of ensuring its “sustainability.” Worse still, the UN’s Agenda 21 has even laid out plans for “depopulation” or rather, “population control.” If it sounds like something out of George Orwell’s 1984, that is because Agenda 21's tenets are eerily in line with the demented alternate reality Orwell himself had imagined while scribing the pages of his famed novel. “Sustainable development” is the catch-phrase Beck urged his Monday evening viewers to be leery of. Where one can live and what land should be designated for would, under fully-realized Agenda 21 plan, be controlled by the United Nations and a future one-world government. Consider the following section from the UN website on Agenda 21's plan for “promoting sustainable human settlement development.” Free MacBook Pro 17 Inch i7 (click here) Emphasis added: The overall human settlement objective is to improve the social, economic and environmental quality of human settlements and the living and working environments of all people, in particular the urban and rural poor. Such improvement should be based on technical cooperation activities, partnerships among the public, private and community sectors and participation in the decision-making process by community groups and special interest groups such as women, indigenous people, the elderly and the disabled.These approaches should form the core principles of national settlement strategies. In developing these strategies, countries will need to set priorities among the eight program areas in this chapter in accordance with their national plans and objectives, taking fully into account their social and cultural capabilities. Furthermore, countries should make appropriate provision to monitor the impact of their strategies on marginalized and disenfranchised groups, with particular reference to the needs of women. 7.5. The program areas included in this chapter are: (a) Providing adequate shelter for all; (b) Improving human settlement management; (c) Promoting sustainable land-use planning and management; (d) Promoting the integrated provision of environmental infrastructure: water, sanitation, drainage and solid-waste management; (e) Promoting sustainable energy and transport systems in human settlements; (f) Promoting human settlement planning and management in disaster-prone areas; (g) Promoting sustainable construction industry activities; (h) Promoting human resource development and capacity-building for human settlement development. Watch below as Beck explains exactly what Agenda 21 is and how everyday Americans are already experiencing its implementation, perhaps without even realizing it. The videos that follow feature Agenda 21 experts — even one self-proclaimed “liberal democrat” — delving deeper into this sinister-sounding agenda. They discuss how the program has slipped under the radar, working its way into everyday life slowly but surely, and what the outcomes of full implementation would be. Free MacBook Pro 17 Inch i7 (click here) ———————— People are shocked by the scope of secret state spying on their private communications, especially in light of documentary evidence leaked to media outlets by former NSA contractor Edward Snowden. While the public is rightly angered by the illegal, unconstitutional nature of NSA programs which seize and store data for retrospective harvesting by intelligence and law enforcement officials, including the content of phone calls, emails, geolocational information, bank records, credit card purchases, travel itineraries, even medical records–in secret, and with little in the way of effective oversight–the historical context of how, and why, this vast spying apparatus came to be is often given short shrift. Revelations about NSA spying didn’t begin June 5, 2013 however, the day when The Guardian published a top secret FISA Court Order to Verizon, ordering the firm turn over the telephone records on millions of its customers “on an ongoing daily basis.” Before PRISM there was ECHELON: the top secret surveillance program whose all-encompassing “dictionaries” (high-speed computers powered by complex algorithms) ingest and sort key words and text scooped-up by a global network of satellites, from undersea cables and land-based microwave towers. Past as Prologue Confronted by a dizzying array of code-named programs, the casual observer will assume the spymasters running these intrusive operations are all-knowing mandarins with their fingers on the pulse of global events. Yet, if disastrous US policies from Afghanistan and Iraq to the ongoing capitalist economic meltdown tell us anything, it is that the American superpower, in President Nixon’s immortal words, really is “a pitiful, helpless giant.” In fact, the same programs used to surveil the population at large have also been turned inward by the National Security State against itself and targets military and political elites who long thought themselves immune from such close attention. Coupled with Snowden’s disclosures, those of former NSA officer Russell Tice (first reported here and here), revealed that the agency–far in excess of the dirt collected by FBI spymaster J. Edgar Hoover in his “secret and confidential” black files–has compiled dossiers on their alleged controllers, for political leverage and probably for blackmail purposes to boot. Free MacBook Pro 17 Inch i7 (click here) While Tice’s allegations certainly raised eyebrows and posed fundamental questions about who is really in charge of American policy–elected officials or unaccountable securocrats with deep ties to private security corporations despite being deep sixed by US media, they confirm previous reporting about the agency. When investigative journalist Duncan Campbell first blew the lid off NSA’s ECHELON program, his 1988 piece for New Statesman revealed that a whistleblower, Margaret Newsham, a software designer employed by Lockheed at the giant agency listening post at Menwith Hill in North Yorkshire, England, stepped forward and told the House Permanent Select Committee on Intelligence in closed session, that NSA was using its formidable intercept capabilities “to locate the telephone or other messages of target individuals.” Campbell’s reporting was followed in 1996 by New Zealand investigative journalist Nicky Hager’s groundbreaking book, Secret Power, the first detailed account of NSA’s global surveillance system. A summary of Hager’s findings can be found in the 1997 piece that appeared in CovertAction Quarterly. As Campbell was preparing that 1988 article, a report in the Cleveland Plain Dealer alleged that arch-conservative US Senator Strom Thurman was one target of agency phone intercepts, raising fears in political circles that “NSA has restored domestic, electronic, surveillance programs,” said to have been dialed-back in the wake of the Watergate scandal. Ironically enough, congressional efforts to mitigate abuses by the intelligence agencies exposed by the Church and Pike Committees in the 1970s, resulted in the 1978 creation of the Foreign Intelligence Surveillance Court. However, as The New York Times reported July 7, that court “in more than a dozen classified rulings . . . has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans,” a “parallel Supreme Court” whose rulings are beyond legal challenge. In an 88-page report on ECHELON published in 2000 by the Electronic Privacy Information Center (EPIC) Newsham said that when she worked on the development of SILKWORTH at the secret US base, described as “a system for processing information relayed from signals intelligence satellites,” she told Campbell and other reporters, including CBS News’ 60 Minutes, that “she witnessed and overheard” one of Thurman’s intercepted phone calls. Like Thomas Drake, the senior NSA official prosecuted by the Obama administration under the 1917 Espionage Act, for information he provided The Baltimore Sun over widespread waste, fraud and abuse in the agency’s failed Trailblazer program, Newsham had testified before Congress and filed a lawsuit against Lockheed over charges of sexual harassment, “corruption and mis-spending on other US government ‘black’ projects.” Free MacBook Pro 17 Inch i7 (click here) A year earlier, in a 1999 on the record interview with the Danish newspaper Ekstra Bladet, Newsham spoke to journalists Bo Elkjaer and Kenan Seeberg, telling them of her “constant fear” that “certain elements” within the US secret state would “try to silence her”; a point not lost on Edward Snowden today. “As a result,” the newspaper reported, “she sleeps with a loaded pistol under her mattress, and her best friend is Mr. Gunther–a 120-pound German shepherd that was trained to be a guard and attack dog by a good friend in the Nevada State Police.” “To me,” the whistleblower said, “there are only two issues at stake here: right or wrong. And the longer I worked on the clandestine surveillance projects, the more I could see that they were not only illegal, but also unconstitutional.” “Even then,” between 1974 and 1984 when she worked on ECHELON, it “was very big and sophisticated.” “As early as 1979 we could track a specific person and zoom in on his phone conversation while he was communicating,” Newsham averred. “Since our satellites could in 1984 film a postage stamp lying on the ground, it is almost impossible to imagine how all-encompassing the system must be today.” When queried about “which part of the system is named Echelon,” Newsham told the reporters: “The computer network itself. The software programs are known as SILKWORTH and SIRE, and one of the most important surveillance satellites is named VORTEX. It intercepts things like phone conversations.” Despite evidence presented in her congressional testimony about these illegal operations, “no substantive investigation took place, and no report was made to Congress,” Campbell later wrote. “Since then,” the British journalist averred, “investigators have subpoenaed other witnesses and asked them to provide the complete plans and manuals of the ECHELON system and related projects. The plans and blueprints are said to show that targeting of US political figures would not occur by accident, but was designed into the system from the start.” (emphasis added) This would explain why members of Congress, the federal Judiciary and the Executive Branch itself, as Tice alleges, tread lightly when it comes to crossing NSA. However, as information continues to emerge about these privacy-killing programs it should also be clear that the agency’s prime targets are not “terrorists,” judges or politicians, but the American people themselves. In fact, as Snowden stated in a powerful message published by WikiLeaks: “In the end the Obama administration is not afraid of whistleblowers like me, Bradley Manning or Thomas Drake. We are stateless, imprisoned, or powerless. No, the Obama administration is afraid of you. It is afraid of an informed, angry public demanding the constitutional government it was promised–and it should be.” How did we get here? Is there a direct line from Cold War-era programs which targeted the Soviet Union and their allies, and which now, in the age of capitalist globalization, the epoch of planet-wide theft and plunder, now targets the entire world’s population? ECHELON’s Roots: The UKUSA Agreement Lost in the historical mists surrounding the origins of the Cold War, the close collaboration amongst Britain and the United States as they waged war against Nazi Germany and Imperial Japan, by war’s end had morphed into a permanent intelligence-military alliance which predated the founding of NATO. With the defeat of the Axis powers, a new global division of labor was in the offing led by the undisputed superpower which emerged from the conflagration, the United States. Self-appointed administrator over Europe’s old colonial holdings across Africa, Asia and the Middle East (the US already viewed Latin America as its private export dumping ground and source for raw materials), the US used its unparalleled position to benefit the giant multinational American firms grown larger and more profitable than ever as a result of wartime economic mobilization managed by the state. By 1946, the permanent war economy which later came to be known as the Military-Industrial Complex, a semi-command economy directed by corporate executives, based on military, but also on emerging high-tech industries bolstered by taxpayer-based government investments, was already firmly entrenched and formed the political-economic base on which the so-called “American Century” was constructed. While resource extraction and export market domination remained the primary goal of successive US administrations (best summarized by the slogan, “the business of government is business”), advances in technology in general and telecommunications in particular, meant that the system’s overlords required an intelligence apparatus that was always “on” as it “captured” the flood of electronic signals coursing across the planet. The secret British and US agencies responsible for cracking German, Japanese and Russian codes during the war found themselves in a quandary. Should they declare victory and go home or train their sights on the new (old) adversary–their former ally, the Soviet Union–but also on home grown and indigenous communist and socialist movements more generally? In opting for the latter, the UK-US wartime partnership evolved into a broad agreement to share signals and communications intelligence (SIGINT and COMINT), a set-up which persists today. In 1946, Britain and the United States signed the United Kingdom-United States of America Agreement (UKUSA), a multilateral treaty to share signals intelligence amongst the two nations and Britain’s Commonwealth partners, Canada, Australia and New Zealand. Known as the “Five Eyes” agreement, the treaty was such a closely-guarded secret that Australia’s Prime Minister was kept in the dark until 1973! In 2010, the British National Archives released previously classified Government Communications Headquarters (GCHQ) files that provide an important historical overview of the agreement. Also in 2010, the National Security Agency followed suit and published formerly classified files from their archives. Accompanying NSA’s release was a 1955 amended version of the treaty. It’s secretive nature is clearly spelled out: “It will be contrary to this Agreement to reveal its existence to any third party unless otherwise agreed by the two parties.” In 2005, 2009 and 2013, The National Security Archive published a series of previously classified documents obtained from NSA under the Freedom of Information Act that revealed agency thinking on a range of subjects, from global surveillance to cyberwar. What we have learned from these sources and reporting by Duncan Campbell and Nicky Hager, are that the five agencies feeding the surveillance behemoth, America’s NSA, Britain’s GCHQ, Canada’s Communications Security Establishment (CSE), Australia’s Defense Signals Directorate (DSD) and New Zealand’s Government Communications Security Bureau (GCSB), are subdivided into first and second tier partners, with the US, as befitting a hyper-power, forming the “1st party” and the UK, Australia, Canada and New Zealand forming “2nd party” partners. Under terms of UKUSA, intelligence “products” are defined as “01. Collection of traffic. 02. Acquisition of communications documents and equipment. 03. Traffic analysis. 04. Cryptanalysis. 05. Decryption and translation. 06. Acquisition of information regarding communications organizations, procedures, practices and equipment.” “Such exchange,” NSA informed us, “will be unrestricted on all work undertaken except when specifically excluded from the agreement at the request of either party and with the agreement of the other.” “It is the intention of each party,” we’re told, “to limit such exceptions to the absolute minimum and to exercise no restrictions other than those reported and mutually agreed upon.” This certainly leaves wide latitude for mischief as we learned with the Snowden disclosures. Amid serious charges that “Five Eyes” were illegally seizing industrial and trade secrets from “3rd party” European partners such as France and Germany, detailed in the European Parliament’s 2001 ECHELON report, it should be clear by now that since its launch in 1968 when satellite communications became a practical reality, ECHELON has evolved into a global surveillance complex under US control. The Global Surveillance System Today The echoes of those earlier secret programs reverberate in today’s headlines. Last month, The Guardian reported that the “collection of traffic” cited in UKUSA has been expanded to GCHQ’s “ability to tap into and store huge volumes of data drawn from fibre-optic cables for up to 30 days so that it can be sifted and analyzed. That operation, codenamed Temporal, has been running for some 18 months.” Then on July 6, The Washington Post disclosed that NSA has tapped directly into those fiber optic cables, as AT&T whistleblower Mark Klein described to Wired Magazine in 2006, and now scoops-up petabyte scale communications flowing through the US internet backbone. The agency was able to accomplish this due to the existence of “an internal corporate cell of American citizens with government clearances.” “Among their jobs documents show, was ensuring that surveillance requests got fulfilled quickly and confidentially.” Following up on July 10, the Post published a new PRISM slide from the 41-slide deck provided to the paper by Edward Snowden. The slide revealed that “two types of collection” now occur. One is the PRISM program that collects information from technology firms such as Google, Apple and Microsoft. The second source is “a separate category labeled ‘Upstream,’ described as accessing ‘communications on fiber cables and infrastructure as data flows past’.” Recently, Der Spiegel, reported that NSA averred the agency “does NOT target its 2nd party partners, nor request that 2nd parties do anything that is inherently illegal for NSA to do.” This is an outright falsehood exposed by former Canadian Communications Security Establishment (CSE) officer Mike Frost. In a 1997 CovertAction Quarterly exposé, Frost recounted how “CSE operated alone or joined with NSA or GCHQ to: intercept communications in other countries from the confines of Canadian embassies around the world with the knowledge of the ambassador; aid politicians, political parties, or factions in an allied country to gain partisan advantage; spy on its allies; spy on its own citizens; and perform ‘favors’ that helped its allies evade domestic laws against spying.” “Throughout it all,” Frost insisted, “I was trained and controlled by US intelligence which told us what to do and how to do it.” Everyone else, Der Spiegel reports, is fair game. “For all other countries, including the group of around 30 nations that are considered to be 3rd party partners, however, this protection does not apply. ‘We can, and often do, target the signals of most 3rd party foreign partners,’ the NSA boasts in an internal presentation.” It should also be clear that targeting isn’t strictly limited to the governments and economic institutions of “3rd party foreign partners,” but extends to the private communications of their citizens. Der Spiegel, citing documents supplied by Snowden, reported that the agency “gathered metadata from some 15 million telephone conversations and 10 million Internet datasets.” The newsmagazine noted that “the Americans are collecting from up to half a billion communications a month in Germany,” describing the surveillance as “a complete structural acquisition of data.” Despite hypocritical protests by European governments, on the contrary, Snowden disclosed that those “3rd party” partners are joined at the hip with their “Five Eyes” cousins. In a recent interview with Der Spiegel, Snowden was asked if “German authorities or German politicians [are] involved in the NSA surveillance system?” “Yes, of course. We’re in bed together with the Germans the same as with most other Western countries. For example, we tip them off when someone we want is flying through their airports (that we for example, have learned from the cell phone of a suspected hacker’s girlfriend in a totally unrelated third country–and they hand them over to us. They don’t ask to justify how we know something, and vice versa, to insulate their political leaders from the backlash of knowing how grievously they’re violating global privacy.” Disclosing new information on how UKUSA functions today, Snowden told the German newsmagazine: “In some cases, the so-called Five Eye Partners go beyond what NSA itself does. For instance, the UK’s General [sic] Communications Headquarters (GCHQ) has a system called TEMPORA.” “TEMPORA,” the whistleblower averred, “is the signals intelligence community’s first ‘full-take’ Internet buffer that doesn’t care about content type and pays only marginal attention to the Human Rights Act. It snarfs everything, in a rolling buffer to allow retroactive investigation without missing a single bit.” “Right now,” Snowden said, “the buffer can hold three days of traffic, but that’s being improved. Three days may not sound like much, but remember that that’s not metadata. ‘Full-take’ means it doesn’t miss anything, and ingests the entirety of each circuit’s capacity. If you send a single ICMP packet and it routes through the UK, we get it. If you download something and the CDN (Content Delivery Network) happens to serve from the UK, we get it. If your sick daughter’s medical records get processed at a London call center . . . well, you get the idea.” We do; and thanks to Edward Snowden we now know that everyone is a target ————————— PROJECT MONARCH PROGRAMMING DEFINITIONS 1. ALPHA - This is considered "regular programming." This is actually what would be considered a "base Personality" control. The original purpose of Alpha was to program (train/condition the mind through torture) of the espionage agent to perform certain difficult tasks. This program also locks in photographic memory, improves physical strength up to 5 times, and visual acuity is radically improved to 40 times normal limits, along with a host of other super-human traits. Alpha programming is accomplished through deliberately subdividing the victim's personality, which in essence causes a left brain right brain division allowing for a programmed union of L and R through neuron pathway stimulations and you've got . a person who can now utilize both sides of his/her brain for any simple task. 2. BETA -This is a combination of Alpha ; "logic" programming and Beta primordial (primitive mind) sex programming. This programming eliminates learned moral convictions and stimulates the primitive sexual instincts devoid of inhibitions. This training Program (usually for women) is for developing the "ultimate prostitute"...a sex machine. This is the most used (by the abusers knowledgeable of the Project Monarch) program. Children of knowledgeable persons are being preconditioned through incest and "sold" into the conspiracy for additional Beta conditioning to eventually satisfy the bizarre perversions of politicians, bankers, drug lords, or anyone deemed valuable to the conspiracy. 3. DELTA - This program was originally designed to train special agents and espionage agents' minds for becoming fearless terrorists devoid of fear and basic self preservation instincts capable of incredible feats of physical endurance and murder. The new revised edition of Delta has pulled from the Delta program information on training the new breed of man - one who kills and, if caught, self-destructs. This program is now applied to some Beta prostitutes who double as drug mules...to protect the identity of their owners if they are caught, they die -of "natural causes." 4. THETA -Psychic programming ...the "exotic one". But not to be confused with the paranormal phenomenon of fortune telling or future forecasting. Those are examples of a magician's craft - while Theta psychic programming was and is the exploration of an unpredictable fact of human science. The initial results of Theta programmed subjects were inconsistent that the Theta project was virtually abandoned before its research completion date. Duke University, North Carolina, among other prominent "institutions", devoted many years to this project with what equated to poor results. It seems that the region of the brain able of transmitting and/or receiving "mental messages" has not yet evolved to a level for dependable communication...with any predictable, reliable consistency. The Soviets, however, invested billions of dollars into their version of psychic research and claimed/proved remarkable successes. With the advances in directed energy research... Theta "psychic driving" is obsolete. But the Theta program "head" was not dead yet. Theta couldn't die because of the Soviet's reported successes...it evolved into bio-medical human telemetry and directed target energy involving lasers and/or electromagnetic...the results of which were referred to as "electronic possession". The ultimate challenge for the 21st century exorcist... providing he worked a day job-as a skilled CIA supported Neurosurgeon. A few years ago, this programming technique involved the surgical implantation of sodium/lithium powered high frequency receiver/ transducers coupled to a multi-range discharge capacitor that when signaled by remote control would electronically stimulate designated parts of the brain to signal the victim to respond according to his/her program. These experiments were only partially successful with a high mortality and paralysis rate. However, the technical mind control equipment evolution would advance to levels well beyond the grasp of any reader. Now it seems that "implants" will eventually become as common in numbers as are the victims of trauma based psychological mind control...but non implanted ,non programmed victims will hold the largest majority...the 1990's version of mind control requires neither implant or program...just computer driven directed energy using microwave...anybody can become a target. THE COMPONENTS Originally the physical components thought to be necessary to program/deprogram were rather complex and cumbersome...enough "laboratory decadence" to make Dr. Frankenstein blush. There were elaborate sound and light-proof sensory depravation isolation chambers, some using exotic suspension fluids that could mimic weightlessness. Direct current high voltage with very low amperage electroshock devices are the most important tools of the trade as the brain is electrically powered. Voltages ranged from .072 volt to 200,000 depending on application and to what part of the body it was to be administered. There are "strap on" head and foot devices that could deliver a mind altering shock of an exact duration according to the subject's brainwave activity and/or heartbeat. Other portable hand held stun gun type devices can deliver shock up to 200,000 volts for a variety of reasons, but primarily for instant control of the conscious mind. A great deal of successful research and development went into the effects of harmonics or inaudible to the conscious ear sound waves that affect the RNA covering of neuron pathways to the subconscious. Harmonics generators, code named ether-wave, are capable of subconscious mind embedding detailed messages (commands linked to audible triggers). This is known as electronic programming and is a standard programming device in all forms of Project Monarch. Hence the reason many Monarch survivors (drug mules/prostitutes) recall being taken onto certain US military bases and "Freedom Ranch" a.k.a. trauma centers for "programming". Mind altering drugs...natural and synthetic compounds that can instantly alter certain brain/thought functions were developed from modern medical technology and from ancient witchcraft formulas. The revised components list is not so comprehensive and obvious. For instance, a sound proofed burial casket makes a great sensory depravation chamber similar to one being used now at a Kentucky (CIA) conditioning camp". There, Delta, Alpha, and Beta victims of this conspiracy are regularly taken by their owners for " reconditioning " a n d reprogramming for drug muling runs or "assignments". Most make it out of this man-made-hell alive, some don't...but as it is said, there's always more where those came from. Whereas, the only other equipment components needed are devices to hang victims upside down by their ankles, cattle prods the cylinder type that are inserted deep into the vagina or rectum for a "simulated orgasm with the devil". High voltage (up to 200,000 volts DC) hand held law enforcement type stun guns are a must tool for the victim's owner to erase certain memory (if used on the muscle area of the victims within 2 hours of the "to-be-forgotten" event, and to control the victim's "insane" fits of rage if they are mistakenly triggered to perform a pre- conditioned task and they are at the moment in the "wrong personality". The only other components the Beta owner must posses are a diary or a damn good memory of their programs, key, and a working knowledge of hypnosis. In other words, a small brief case will contain everything a Beta owner "needs" to control his slave...completely ...forever. THE FORMULA The formula for Beta programming is the exact same as for Alpha, the only difference is that through a series of specific tortures and commands the Beta victim retreats deeper into her primitive mind and the results are a woman with a child like insatiable sexual appetite. This re- tapped sexual appetite was "developed" in her formative years through constant incest with her father figure. What begins as unbearable pain to a child's mind quickly "switches" to an sexual desire for the very person who was abusing her...daddy. This reversal is the key to all programming -Pain becomes pleasure, up is down, etc. Hence the reason Colonel Michael Aquino, attached to the DIA, adopted the satanic philosophy of reversing everything including bad is good. WARNING The following information, although intended for multi- generational family abuse systems, is adequate to divide a person's base personality for enslavement purposes, but for humanitarian reasons, I cannot publish the actual programming information, If you try this at home -you are on your own, and when our nation "wakes up"...you will become a target for prosecution. First, slow body metabolism by reducing caloric intake say, for an average 125 lb. female 19-30 years of age to 300 per day -reduce to 0 intake of all sugar, lower protein intake accordingly, (This action will literally starve the brain into submission). From time to time water depravation may be necessary to swell the brain by raising the temperature making memory of experienced events difficult or impossible to recall by the victim a.k.a. the "kiss and not tell syndrome". Combine with 3 to 10 seconds-f 120,000 volts to leg or back. Vomiting and flu like symptoms will occur but memory is now hidden behind a wall of "black lightening". Sleep depravation - absolutely a must in preconditioning and continued maintenance for new programming. Victims must not experience more than two hours continuous uninterrupted sleep. Maximum sleep allowed 3 hours per 24 hour day. Days should be spent in heavy physical exercise to the point of constant exhaustion. This action stimulates the brain to overproduce endorphins and thus temporarily silence the logic center. This action also is responsible for reversing the brain's functions from right to left or vice versa. Victims will respond to most any command robotically and hypnotic programming becomes a breeze. Hanging the victims upside down for periods of time, one-two hours per day will further trick the brain into dissociation from reality and can reverse such primordial brain functions as turning pain into pleasure - up will become down - out will become in, and above all the person administering the tortures will become omnipotent in the victim's now rearranged mind. This phenomena is likened to the Stockholm Syndrome. Daily tortures administered should focus on any of the known victims former idiosyncrasies. This could include introducing ant into the ear canal or coverings the victim in say (harmless) spiders or snakes (rubber facsimile will work) or exposing them to loud noises (firecrackers) disguised as bombs, heated needles or toothpicks under the fingernails, even constant tickling. These idiosyncrasies then became "tortures-of-the-mind" tortures that there are no escape from. When the operator ceases torturing the victims short of death, he's considered benevolent and "worship" by the victim will again commence ...even stronger than before. The controllers voiced wishes will become instead commands to the victim and all moral decision making processes (sex, murder, etc.) totally bridged (ignored) by the "new mind" of the victim. High voltage electroshock has multi use purposes - for Torture, left brain right brain function, reversals, and, depending on the amount of voltage administered and the location on the body, to compartmentalize programs or to set in new ones. Electroshock is also used as a "harmless" not so subtle reminder to carry out commands. High DC voltage is a key component as it, too, produces an instant euphoric state due to the increased endorphin production, coupled with the victim's total lack of physical control. Sensory depravation can be accomplished through hanging in conjunction with eye and ear covers - or with more elaborate sound and light proof rooms or even burial caskets. I am more familiar with specially heated salt water tanks where buoyancy accomplishes weightlessness, and fitted electroshock movement sensitive sensors are positioned on the victims to stimulate the mental sensation of loss of consciousness while wide awake and should the victims move externally, high voltage is automatically administered and the victim actually looses consciousness momentarily. This process is repeated over and over until the brain is trained to stop all external body movement from the conscious mind. Then the victim can be audibly commanded and programmed to a calendar date to perform a task:...say 50 years in the future Without even being cued by an operator...flawlessly. This program becomes a part of the primitive mind -the same one that tells the victim's heart to beat, etc. Death or health programs can easily be put in place and are not diffusible through conventional psychiatry without knowledge of exact keys administered by an expert psycho/hypno- therapist. I personally know of one 13 year old girl who is currently institutionalized awaiting such care due to her being locked in through the use of sophisticated harmonics equipment from birth, But US Department of Justice officials have stopped her mother (Beta victim) in their pursuit of Justice...and so goes the mother's credibility and the needed expert mental health assistance for her child. Now you've got the formula. "Try" and protect yourself from it ...nobody else will. Free MacBook Pro 17 Inch i7 (click here) THE VICTIMS, PAST AND PRESENT It is "alleged"... The first victims were captured MPD spies and dissidents from friendly and dissident nations, but unfortunately for the second group of victims, there weren't enough caught to properly study and develop the so-called Manchurian Candidate, via psychological abuse with our country's newly organized Project MK Ultra. The second group, it is alleged, were bright aggressive young men who had applied to Officers Candidate School (OCS). These men took entrance exams and psychological tests, tests that revealed whether or not they would become "candidates" for Project Monarch as their entrance psychological exams revealed they were victims of child abuse. These eager young men were allegedly told (more or less) that they couldn't go to OCS for whatever reason but they could "volunteer" for a career in Intelligence and with their Top Secret "training" they could develop incredible super human physical and psychological abilities...with a "just sign here". This true but very misleading information created powerful patriotic images in their minds...they envisioned being "special" espionage agents in just a few months instead of years at OCS. 007 stuff...well, sort of anyway. They were the first volunteers! Their fates are unknown even to their families and themselves if they're still alive. The present day Beta victims are allegedly "recruited" a little younger than 19...BIRTH. Some (but certainly not all) by fathers who got caught sending kiddy porn through the US Mails, but most were either government or MOB connected. These "caught" fathers were more or less then blackmailed by alleged CIA agents to dedicate their child to the program in exchange for money, business favors, and protection against prosecution...these pedophiles became an honorable member of a US Government Criminal Conspiracy. The father's were then educated at government expense on how to precondition their little girl/boy with tortures of the mind and body and with sex - which would give this child a "gift that keeps on giving" Multiple Personality Disorder - a super child. Some more aggressive fathers would have a half dozen children and "dedicate" as many as "Uncle" wanted. Most all became affluent or rich...except the victims...The Victims of Project Monarch. Organized crime bosses jumped in the conspiracy for the protection of their lucrative child/adult pornography business. Day Care Centers were Opened by conspiracy members for what, was dubbed a "kiddy smorgasbord". Some conspirators got "sloppy" and used to much occult or satanic trauma for the Mind Control base on the kids and they "told". But to no avail...as our government regards public exposure of their own human experiments as a "threat to National Security". West Point had Day Care Center that recently collapsed under the pressure of irate parents who themselves were students at this elite OCS school in the "free" world. The same thing happened at Presidio, California. The government (US Army C/ID) covered it up in the name of National Security and the kids, are, in counseling now -scarred mentally for life. SO for now it looks like its going to be a return to "in home supply" and implants because it's the American way...and father and Uncle Sam "knows best" as they say. Note: There are many other known methods of recruiting victims for Alpha and Beta. This was just two common identified methods, among others, in professional sports. I could write a volumes on the other methods for types of Alpha victims such as "super baseball (victim) players who from time to time forget how to pitch and embarrass their owners. Ironically enough, one of the main alleged organizers of this conspiracy is a baseball fanatic and even required two of the Beta victims he used from time to time to memorize every players batting average on four teams...this man was US Attorney General, appointed by Reagan, who resigned his post in a cloud of dishonor and is now chief legal council for our "NEW WORLD ORDER" police force...the United Nations. THE USERS AND ABUSERS The identity of some of the main users/abusers of Project Monarch Alpha/Beta programmed victims have been positively identified to me by survivors who existed at the top of this US Government Criminal Conspiracy literally for their entire lives. There are other victims who are simply too afraid to talk now, programmed with the "No Where to Run, No where to Hide" and/or "Who Ya" Gonna Call" CIA themes, but can and will eventually... because they've named their abusers from the Pentagon to the White House. These users appear to be focusing not on recreational sex, but on drugs billions of dollars annually in heroin/cocaine mulled into the US via cruise ships, airplanes private and commercial by Alpha Beta victims. The sale of these drugs is allegedly supporting the CIA's illegal covert action habits. The CIA doesn't have a "Black Budget" like the Pentagon boys...they earn theirs the "old fashion way" - by importing and selling drugs through elaborate network systems of users that the CIA has taken years to establish. They also consume a lot of their own product! I've heard from victims some of the dollar amounts that were transferred via computer on just one deal that could buy a banana republic. The Beta mules stopped carrying suitcases full of cash in mid 1986 after the shift from Cuban/Jamaican suppliers went to Mexico. It has been confirmed that the North American Free Trade Agreement (NAFTA) treaty was Mexico' s reward for their cooperation. The abusers are really anyone the Beta victims have come in contact with...that knows what she/he is and how to activate their programmed triggers. To name a few, there are drug lords, politicians, (federal, state, and local) corrupt law enforcement personnel, big name entertainers who themselves usually own a Beta victim or two and a host of other conspiracy members. Victims are traded among members like livestock. When they reach 30 years of age they are many times used in snuff porn movies, or what is termed "thrown from the Freedom Train." The abusers are too numerous to mention here, but in the reports previously disseminated, were named - many on the Washington, DC level, and hopefully will become visible media targets once myself and concerned others wake up the populace with the well hidden truth. THE FUTURE Psychological mind control techniques, formulas and equipment, unlike nuclear weapon systems, can be reproduced without exotic and expensive component systems...in the privacy of one's own home by virtually any one with average intelligence, a little information, and no conscience tie. criminals). Mind Control Out Of Control is just as lethal as nuclear war byproducts, however through genetically engineering psychology...the "evil" seed is passed on generation to generation. Trauma based mind control, also aptly termed "white slavery" for the CHOSEN ONES IN THE 21ST Century will be predictably the largest "cottage industry" in terms of illicit profits, death, and destruction of innocent victims...unless the trend is stopped and those responsible in government and the private sector are punished and the survivors/victims given qualified rehabilitative psychiatric care. The US now has nuclear regulatory agencies which exercise caution as to who can even build nuclear weapons, power plants, x- ray machines, or even smoke detectors. But not for Mind Control - thanks to the same US government corrupt officials...it's out of control. The results of which are showing up everywhere. Multiple Personality Disordered persons are now common place - whereas before 1980 it was one of the rarest diagnosed psychiatric disorders...from 200 cases to 24,000. Which could mean a bare minimum over 250,000 undiagnosed programmed MPDs walking around waiting to explode with rage as serial killers, child abusers, etc. etc. etc., against the society that protects a few US government criminal conspirators -why? While we're waiting for the answer, another child is being raped, most likely by the very person biologically designed to protect them...their father. So in a few years - he can put a notice in his computer bulletin board..."Beta trained child for sale...Best offer...will trade for business of equal value." THE FUTURE? PROJECT MONARCH ALPHA, BETA PROGRAMMED VICTIM/ SURVIVOR IDENTIFICATION INFORMATION 1. Victim majority is female (71%). 2. Victims are Multiple Personality Disordered (100%). 3. Victims/survivors have (or are) participated in commercially and privately produced/sold legal and illegal pornography. (100%) interviewed). This pornography is often the "underground variety" of bestiality, child/adult, child/child, adult/infant, sado-masochistic, satanic/occult films and videos, magazines, and still photographs. 4. Older victims were frequently tattooed for easy identification with a "so-called" Blue or other colored MONARCH butterfly. This practice became more or less obsolete in the early 1970's and was replaced by the victim wearing butterfly hair barrettes, large butterfly ear rings, pins, necklaces, bracelets, or embroidered insignias to "advertise" their art of expertise to knowledgeable abusers. This rule applies to 100% of the victims interviewed. 5. ALL MONARCH survivors were victims of brutal sexual child abuse. Programmed survivors have been found to be multi- generational incest victims whose genealogy can be traced to either Catholicism, Mormonism, and/or members of US Intelligence Communities. 6. Many victims are frequently determined to have been the natural or adopted children of multi-generational Satanist or in some cases "renegade witchcraft" occult groups. 7. Survivors once in therapy are always adjusted to possess homicidal and/or suicidal ideations which only recently has been determined to be as a result of sophisticated trauma base psychological programming. 8. Victims almost always possess multiple electric prod (stun gun) scars and/or the resultant moles in the muscled areas of the back, arms, neck and thighs. Some victims are also (in addition to) vaginally mutilated through "body piercing" (rings placed in nipples, vaginal lips, or clitoris) or through actually elaborated carving the vaginal area. Also, scars from branding irons or knives throughout the body will depict pentagrams, animals, crosses, even certain cartoon characters. There is also a group that "forces" moles through electric shock and/or chemical application to the neck and face to further identify to abusers the victim's training/programming Information about the Illuminati click here

Monday, May 4, 2015

Home to the oldest university in Europe, Bologna’s long tradition of education, cultural heritage and political vitality makes it an attractive location for SAIS' European campus

     The Future of Eugenics.  Eugenics, although based on the science of genetics, is not itself a science, for it must above all concern itself with social values, with the question:  Whither mankind?  Perhaps general agreement could be had that freedom from gross physical or mental defects and the possession of sound health, high intelligence, general adaptability, and nobility of spirit are the major goals toward which eugenics should aim; perhaps even that diversity of nature is better than uniformity of type.  But how far ought selective reproduction to interfere with human freedoms?  Genetically, as in other respects, "there is so much bad in the best of us and so much good in the worst of us" that it is hard to assess the worth of the manifest hereditary characteristics are the product of environment, particularly for those qualities that are eugenics' major concern: sound health, high intelligence, and the like.  The Jukes and Kallikaks were horrible examples of degenerate humanity, but what might they have been in a better world?  Were their alcoholism, their crime, and their vice inescapable products of their genes?  It seems very doubtful.  Only the experiment of putting them from earliest infancy into an optimum environment--not forgetting that it need not be the same for everyone--than to modify gene frequencies by wise selection.  Once mankind has produced an approximation of that optimum environment, the eugenics task will be much simpler.  In fact, the natural selection exerted by such an environment may make eugenics quite unnecessary.
                                              -H. Bentley Glass

Project Mercury was the first human spaceflight program of the United States led by its newly created space agency NASA. It ran from 1959 through 1963 with the goal of putting a human in orbit around the Earth, and doing it before the Soviet Union, as part of the early space race. It involved 7 astronauts flying a total of 6 solo trips. On 5 May 1961, Alan Shepard became the first American in space in a suborbital flight after the Soviet Union had put Yuri Gagarin into space and orbit one month earlier. John Glenn became the first American to reach orbit on 20 February 1962, he was the third person to do so, after soviet Gherman Titov had made a day long flight in August 1961. When the project ended in May 1963, the Americans' NASA program was still behind the Soviet Space Program, but the gap was seen as closing. The race to the Moon began.
The space race started in 1957 by the launch of the Soviet satellite Sputnik I. This came as a shock to the American public and led to the creation of NASA to gather the efforts in space exploration already existing in USA. After the launch of the first American satellite in 1958, manned space flight became the next goal. The spacecraft was produced by McDonnell Aircraft. It was cone shaped with room for one person together with supplies of water, food and oxygen in a pressurized cabin. It was launched from Cape Canaveral in Florida by modified military missiles, most importantly Atlas D, and had a rescue tower for protection from a failing rocket. The whole flight could be controlled from the ground through a network of tracking stations which also allowed communication with the astronaut. If necessary, the astronaut could override commands from the ground. For reentry into Earth's atmosphere, small rockets were used to bring the spacecraft out of its orbit. A heatshield would protect the spacecraft from the heat of reentry, and a parachute would slow the craft for a water landing. Here both astronaut and spacecraft were picked up by helicopter and brought to a ship.
From a slow start with humiliating mistakes, the Mercury Project became popular and the manned flights were followed by millions on radio and TV not only in United States, but around the world. Apart from the manned missions, Mercury had a total of 20 unmanned launches as a part of the development of the project. This also involved test animals, most famously the chimpanzees Ham and Enos. Mercury laid the groundwork for Project Gemini and the follow-on Apollo moon-landing program, which was announced a few weeks after the first manned flight. The astronauts went under the name Mercury Seven and they named their spacecraft with a "7" to the name. The project name was taken from Mercury, a Roman god. It is estimated to have cost $1.71 billion and have involved the work of 2 million people.

Yossi Leshem worked at the Society for the Protection of Nature in Israel (SPNI), the leading NGO in Israel, for 25 years, as a guide, as Director of a Field Study Center,as Head of the Nature Protection Department, Initiator and Director of the Israel Raptor Information Center between 1980-1991, and as the Executive Director of the SPNI between 1991-1995.  Leshem is Senior Researcher in the Department of Zoology in the Faculty of Life Sciences at Tel Aviv University and is the founder and Director of the International Center for the Study of Bird Migration at Latrun, Israel, established by Tel Aviv University and the SPNI.  In November 2007 he was elected as the Chairman of the SPNI Council.  Leshem has been involved in many aspects of nature conservation, with the emphasis on bird research for 38 years. Since 1984 his research for his doctorate, which was conducted with the cooperation of the Israeli Air Force and the Ministry of Science, has resulted in a decrease of 76% in the number of collisions with aircraft caused by birds, and has saved 790 million dollars, not to mention the numbers of lives, both human and avian. Today he serves as Lt. Col. (Ret) in the Israeli Air Force and continues this research. In 2005 he won the prestigious Mike Kuhring Prize for achievements of high significance for an improved flight safety concerning the bird problems of aviation, and for his mission to connect safety with nature conservation via education that gave bird strike prevention world wide appreciation.  Leshem is involved in a variety of activities in bird migration research, in educational activities that take place in over 250 schools in Israel part of cooperation with the Palestinians and the Jordanians, and has developed an educational and scientific site on the Internet ( www.birds.org.il ) called "Migrating Birds Know No Boundaries". Leshem developed a 6 year research and an educational program in cooperation with the Palestinians and Jordanians under the same title as the web site.  At the moment Dr. Leshem is conducting a number of scientific projects, among them a project which tracks migrating birds that have been fitted with satellite transmitters, and a project that tracks migration with the aid of radar, in cooperation with a team of Russian immigrant scientists.  Leshem initiated a program to use Barn Owls and Kestrels as pest controllers to reduce the use of pesticides in agricultural fields, which became a national program and a regional project with Jordan and the Palestinian Authority.  Leshem published 3 books, scientific papers, and hundreds of articles in popular magazines.  Dr. Leshem visited Japan as a visiting Prof. at the University of Tokyo, June 30 th – October 12 th, 2006. Leshem is a Recipient of "Lifetime Achievement Award for Environmental Protection" in 2008, given for sixty years of Israel

It is important to understand the cultural background of the era that created this field of science.”  After the Civil War, there was turbulent economy and an influx of immigrants from Southern and Eastern Europe.  The economy of the US had rapid fluctuations and remained in this tenuous manner until WWI.  As the economy became more uncertain, the social inequalities between different segments of society became more visible.
            In the same era, the idea of Social Darwinism became popular and was used to explain these social inequalities.  Social Darwinism utilizes the concept of natural selection from Charles Darwin and applies it to society.  Social Darwinism explains survival of the fittest in terms of the capability of an individual to survive within a competitive environment.  This explains social inequalities by explaining that the wealthy are better individuals and therefore better suited to survive in the uncertain economy.  In terms of survival of the fittest the wealthy are more likely to survive and produce more offspring than the poor.
            However, this was not occurring.  The birthrate of the elite was declining while the birthrate of the poor was increasing.  Meanwhile governmental social programs and aid were doing little help the increasing poverty.  The government utilized the idea of scientific management, known as progressivism.  Progressive reformers relied on science to control both nature and human society.  This view of science as a method of reform and the newly rediscovered science of genetics gave rise to social engineering.   Eugenicists believed genetics were the cause of problems for the human gene pool. Eugenics stated that society already had paid enough to support these degenerates and the use of sterilization would save money.  The eugenicists used quantitative facts to produce scientific evidence.  They believed that charity and welfare only treated the symptoms, eugenic sought to eliminate the disease. The following traits were seen as degenerative to the human gene pool to which the eugenicists were determined to eliminate: poverty, feeble-mindedness-including manic depression, schizophrenia, alcoholism, rebelliousness, criminality, nomadness, prostitution.
 The accuracy of eugenicist methods was severely overrated.  Although based on genetics, the eugenic scientists did not document any genetic relationship to some qualities that they studied, such as politeness, bluntness, etc.  It is especially amazing that the scientists made such brilliant relationships between genes and behavior at a time when they did not even know that DNA carried genes, causing the researchers to treat complex behavior as though it had a single cause.  Other flaw in research included the researchers did not did not take into account the impact that the environment plays into a person’s phenotype.  They also used culturally based IQ tests on immigrants to determine IQ.  Finally, the early eugenicists made up results to give scientific results.
Many of the eugenicist's ideas came from studies of the supposed deterioration of a genetic stock over time. For example, the sociologist Richard Dugdale based his study on “The Jukes,” which is a clan of 700 criminals, prostitutes, and paupers.  Dugdale believed that bad environment caused their degeneracy and could be reversed over time. A.H. Estabrook resurveyed the Jukes in 1915 but saw little improvement in the family. He concluded that several traits associated with inadequacy were inherited.  However, since the eugenicists did not understand genetics and the methods of inheritance, they formed their method of inheritance.  The meant that desired traits could only be spread to children through marriage between two “worthy” families.  Undesired traits were always spread between “shiftless” families.  A child between a worthy family and a shiftless family would be mostly shiftless…but a little desirable.

Before eugenics became internationally recognized in WWII, it was a very popular movement in the United States.  In fact the American Eugenics Society set up pavilions and "Fitter Families Contest" to popularize eugenics at state fairs.  The average family advocated for the utilization of eugenics while educational systems embraced eugenics, which was presented as science fact by the majority biology texts.  In fact, eugenics became so popular that eighteen solutions were explored in a Carnegie-supported study in 1911, to report the best practical means for eliminating defective genes in the Human Population.  Although the eighth of the 18 solutions was euthanasia, the researchers believed it was too early to implement this solution. The most commonly suggested method of eugenicide in America was a lethal chamber, or gas chamber.  Instead, the main solution was the rapid expansion of forced segregation and sterilization, as well as increased marriage restrictions. However, not everybody was in favor of eugenics, Punnett at the first international congress for Eugenics in 1911 stated, “Except in very few cases, our knowledge of heredity in man at present is far to slight and far too uncertain to base legislation upon.”  Carrie Buck, and her mother Emma, had been committed to the Virginia Colony for Epileptics and Feeble Minded in Lynchburg, Virginia. Carrie and Emma were both judged to be “feebleminded” and promiscuous, because they had both had children out of wedlock. Carrie’s child, Vivian, was judged to be “feebleminded” at seven months of age. Hence, three generations of “imbeciles” became the “perfect” family for Virginia officials to use as a test case in favor of the eugenic sterilization law enacted in 1924. Upon reviewing the case, the Supreme Court concurred “that Carrie Buck is the probable potential parent of socially inadequate offspring, likewise afflicted, that she may be sexually sterilized without detriment to her general health and that her welfare and that of society will be promoted by her sterilization.”   It is impossible to judge whether or not Carrie was “feebleminded”, but she was not promiscuous.  Vivian’s was the result of Carrie’s rape by the nephew of her foster parents. She was probably institutionalized to prevent further shame to the family. Just as clearly, Vivian was no imbecile. Vivian’s first grade report card from the Venable School in Charlottesville showed that this daughter of a supposed social degenerate got straight “As” in deportment (conduct) and even made the honor role in April 1931. She died a year later of an intestinal disorder.
Although in 1942 the Supreme Court made a law allowing the involuntary sterilization of criminals, it never reversed the general concept of eugenic sterilization.  In 2001, the Virginia General Assembly acknowledged that the sterilization law was based on faulty science and expressed its "profound regret over the Commonwealth's role in the eugenics movement in this country and over the damage done in the name of eugenics.”  On May 2, 2002 a marker was erected to honor Carrie Buck in her hometown of Charlottesville.
Laws against interracial marriage had existed in some states since colonial times, but the number increased after the Civil War.  In 1913, 29 states had laws forbidding mixed-race marriages. Twenty-two states had stiff penalties -- fines of up to $2,000 and/or prison terms of up to 10 years.  Eugenicists actively supported the old laws and the making of new ones. The eugenicist-inspired Virginia Integrity Act of 1924 prohibited marriage between a white person and anyone with a trace of blood other than Caucasian. The Act was struck down, along with all other anti-miscegenation laws, in 1967.  The world thought Hitler was mad, but the concept of a white, blond-haired, blue-eyed master Nordic race was not Adolf Hitler’s. The idea was created in the United States at least two decades before Hitler came to power. In fact, in 1924, when Hitler wrote Mein Kampf, he frequently quoted American eugenics and displayed a thorough knowledge.  “There is today one state, Hitler wrote, in which at least weak beginnings toward a better conception [of immigration] are noticeable. Of course, it is not our model German Republic, but the United States."  Hitler told his fellow Nazis that he closely followed American eugenic legislation. “I have studied with great interest the laws of several American states concerning prevention of reproduction by people whose progeny would, in all probability, be of no value or be injurious to the racial stock.”
During the beginning of the third Reich, eugenicists across America welcomed Hitler’s plans as the logical implementation of their own research. Ten years after Virginia passed its 1924 sterilization act, Joseph DeJarnette, superintendent of Virginias Western State Hospital, complained in the Richmond Times-Dispatch, “The Germans are beating us at our own game.”
 In 1934, the number of sterilizations in Germany was accelerating beyond 5,000 per month.  Beginning in 1940, thousands of Germans were taken from homes for the elderly, mental institutions and other state ran institutions and was systematically gassed. In all, between 50,000 and 100,000 were killed.  Hitler’s believed that Jewish were racially inferior.  They played a decisive role in social degeneracy, such as prostitution, pornography, modern art, financial crimes, and the narcotics trade.  Jewish people possessed no ethics or morality and that they had been engaged in a 4,000-year-old conspiracy to dominate the world pursuant to their view of themselves as the chosen people. Just like other eugenicists, Hitler believe that these characteristics and values were in the genes of the Jewish people, and therefore are able to be eradicated from the general population (cf. generally Mein Kampf).  Hitler's made his threat to exterminate European Jewry was made to the Reichstag on January 30, 1939: “In the course of my life I have often been a prophet, and have usually been ridiculed for it . . . If the international Jewish financiers in and outside Europe should succeed in plunging the nations once more into a world war, then the result will not be the Bolshevisation of the earth, and thus the victory of Jewry, but the annihilation [Vernichtung] of the Jewish race in Europe”
Hitler attempted to succeed in this goal by annihilating hundreds of thousands of the Jewish population in concentration camps using the American favored method of extermination of the gas chambers.  There were also rumors that Hitler made Lebensborn a "stud farms" where SS men and suitable young women were mated to breed a master race.  However this is nothing more than a myth.  Lebensborn was in fact a conservative institution with a conservative sexual code, attempting to maintain middle-class respectability.
The connection between the American Eugenics movement and the Nazi eugenic movement was further solidified in the Nuremburg trials that judged the crimes committed by the Nazis during the war.  In their defense the Nazis quoted Oliver Wendell Holmes from the infamous 1927 Buck v. Bell trial. Supreme Court Justice Oliver Wendell Holmes wrote, “It is better for all the world, if instead of waiting to execute degenerate offspring for crime, or to let them starve for their imbecility, society can prevent those who are manifestly unfit from continuing their kind . . . Three generations of imbeciles are enough.”

•      Hereditary feeble-mindedness: 200,000
•      Schizophrenia: 80,000
•      Epilepsy: 60,000
•      Manic-depressive psychosis: 20,000
•      Serious physical deformities: 20,000
•      Hereditary deafness: 16,000
•      Hereditary alcoholism: 10,000
•      Hereditary blindness: 4,000
•      Huntington's chorea: 600
•      TOTAL: 410,600

The most commonly suggested method of eugenicide in America was a lethal chamber, or gas chamber. Instead, the main solution was the rapid expansion of forced segregation and sterilization, as well as increased marriage restrictions. However, not everybody was in favor of eugenics, Punnett at the first international congress for Eugenics in 1911 stated, “Except in very few cases, our knowledge of heredity in man at present is far to slight and far too uncertain to base legislation upon.” Carrie Buck, and her mother Emma, had been committed to the Virginia Colony for Epileptics and Feeble Minded in Lynchburg, Virginia. Carrie and Emma were both judged to be “feebleminded” and promiscuous, because they had both had children out of wedlock. Carrie’s child, Vivian, was judged to be “feebleminded” at seven months of age. Hence, three generations of “imbeciles” became the “perfect” family for Virginia officials to use as a test case in favor of the eugenic sterilization law enacted in 1924. Upon reviewing the case, the Supreme Court concurred “that Carrie Buck is the probable potential parent of socially inadequate offspring, likewise afflicted, that she may be sexually sterilized without detriment to her general health and that her welfare and that of society will be promoted by her sterilization.” It is impossible to judge whether or not Carrie was “feebleminded”, but she was not promiscuous. Vivian’s was the result of Carrie’s rape by the nephew of her foster parents. She was probably institutionalized to prevent further shame to the family. Just as clearly, Vivian was no imbecile. Vivian’s first grade report card from the Venable School in Charlottesville showed that this daughter of a supposed social degenerate got straight “As” in deportment (conduct) and even made the honor role in April 1931. She died a year later of an intestinal disorder.

The Philadelphia Experiment was a naval military experiment alleged to have been carried out at the Philadelphia Naval Shipyard in Philadelphia, Pennsylvania, USA sometime around October 28, 1943. The U.S. Navy destroyer escort USS Eldridge was claimed to be rendered invisible (or "cloaked") to enemy devices.
The story is thought to be a hoax.   The U.S. Navy maintains that no such experiment was ever conducted, and details of the story contradict well-established facts about the Eldridge itself, as well as commonly accepted physics.  The experiment was allegedly based on an aspect of the unified field theory, a term coined by Albert Einstein.  The Unified Field Theory aims to describe mathematically and physically the interrelated nature of the forces that comprise electromagnetic radiation and gravity, in other words uniting the fields of electromagnetism and gravity into one field. Consequently, if light were bent, then space-time would be bent, effectively creating an invisible time machine.  According to the accounts, unspecified 'researchers' thought that some version of this Unified Field Theory would enable a person to use large electrical generators to bend light around an object so that the object became completely invisible. The Navy would have regarded this as being of obvious military value, and by the accounts, it sponsored the experiment.  Another unattributed version of the story proposes that researchers were preparing magnetic and gravitational measurements of the seafloor to detect anomalies, supposedly based on Einstein's attempts to understand gravity. In this version, there were also related secret experiments in Nazi Germany to find antigravity, allegedly led by SS-Obergruppenführer Hans Kammler. There are no reliable, attributable accounts but in most accounts of the experiment, the destroyer escort USS Eldridge was fitted with the required equipment at the Philadelphia Naval Yard. Testing allegedly began in the summer of 1943, and it was supposedly successful to a limited degree. One test allegedly resulted in the Eldridge being rendered almost completely invisible, with some witnesses  reporting a "greenish fog" appearing in its place. Crew members supposedly complained of severe nausea afterwards. Also, it is said  that when the ship reappeared, some sailors were embedded in the metal structures of the ship, including one sailor who ended up on a deck level below that where he began, and had his hand embedded in the steel hull of the ship, as well as some sailors who went "completely bananas".   At that point, it is said  that the experiment was altered at the request of the Navy, with the new objective being solely to render the Eldridge invisible to radar. None of these allegations has been independently substantiated.  The conjecture then alleges that the equipment was not properly re-calibrated, but in spite of this, the experiment was repeated on October 28, 1943. This time, the Eldridge not only became invisible, but she physically vanished from the area in a flash of blue light and teleported to Norfolk, Virginia, over 200 miles (320 km) away. It is claimed that the Eldridge sat for some time in full view of men aboard the ship SS Andrew Furuseth, whereupon the Eldridge vanished from their sight, and then reappeared in Philadelphia at the site it had originally occupied. It was also said that the warship went approximately 10 seconds back in time.  Many versions of the tale include descriptions of serious side effects for the crew.   Some crew members were said to have been physically fused to bulkheads, while others suffered from mental disorders, and still others supposedly simply vanished.  It is also claimed that the ship's crew may have been subjected to brainwashing, in order to maintain the secrecy of the experiment.

The earliest practical precursor to the human space flight program was Project Albert. It was a horrific failure, with nearly all its pilots unable to survive the ordeal. Of course, these pilots were monkeys. Still, their story — full of confiscated rockets, drugs, and desert skies raining body parts — is one of the most tragic tales of the early space program.

Towards the end of World War II, a group of German aviation experts found themselves in possession of a lot of rockets and not a lot of pleasant options. They had engineered the V-2 rocket, which had been used to vigorously bomb Britain. They were on the losing side of a war that had inflicted massive casualties on the USSR. Both armies were now closing in and the scientists didn't relish the prospect of being captured by either of them. And so they went looking for Americans. When they found them, they offered to lead the American military to whatever rocket parts they could offer in exchange for political considerations and transport to America.

RELATED

Remember the time we bombed Mexico with German rockets?
Germany spent the end of the 1930s and half the 1940s inventing and perfecting missiles. They made so many, they still had a ton of them left over… Read…
They got the transport, and America got a lot of rockets. These aviation experts did various things with the V-2s, including accidentally bombing Mexico once, but one of the most exciting ideas they had was preliminary tests for sending humans into space. This was hard to do, since no one knew anything about the effects of space on physiology. It was entirely new territory. And so they started the project in 1948 with an ill-fated rhesus monkey named Albert.

The Grisly Failures of Project Albert, Precursor to the Apollo Space Program
SEXPAND
On June 11th Albert went up on the first test, drugged slightly, but otherwise healthy. At least on the way up to the 63 kilometer high trip he was healthy. No one had a reliable way to monitor his vital signs, and so it fell to medical experts afterwards to discover that the dead monkey that scientists found at the end of the trial had suffocated during the flight, not in reaction to the altitude. A year later Albert II went up to 134 kilometers. This time the person examining the corpse was asked for time, not cause of death. The parachute to his rocket had failed to deploy.

Albert III went up in September. His rocket exploded at ten kilometers up. No one was consulted this time about either time or cause of death. Albert IV was snuffed in another parachute failure in 1949.

It's fair to say that the scientists were somewhat disillusioned with what the V-2s had to offer at that point, and so they switched to rockets made by Aerojet in the fifties. They kept the name Albert, though, and the next two Alberts inherited the luck of the first four. Yet another parachute failure claimed Albert V. It seemed that luck was changing when Albert VI landed alive and safe in 1951. Sadly, he landed rather off course. He waited for hours in the New Mexico sun in a sealed metal container until military teams found and recovered the rocket, but he died of stress and heat exhaustion two hours after the recovery.

At last the proto-space experts decided to switch the names as they had switched the rockets. Two monkeys named Patricia and Mike survived a flight in 1952. Their flight had also not gone as planned, and had only managed to climb a little over twenty kilometers. But, considering they were the first monkeys to make it out of a rocket comfortably alive, their flight was celebrated. It took another seven years - and no more monkeys named Albert - for any simians to actually make it to space and back alive. Still, let us give thanks for all those fallen Alberts, and wonder if NASA should institute some new naming requirement for their missions.

Germany spent the end of the 1930s and half the 1940s inventing and perfecting missiles. They made so many, they still had a ton of them left over… Read…
They got the transport, and America got a lot of rockets. These aviation experts did various things with the V-2s, including accidentally bombing Mexico once, but one of the most exciting ideas they had was preliminary tests for sending humans into space. This was hard to do, since no one knew anything about the effects of space on physiology. It was entirely new territory. And so they started the project in 1948 with an ill-fated rhesus monkey named Albert.

The Grisly Failures of Project Albert, Precursor to the Apollo Space Program
SEXPAND
On June 11th Albert went up on the first test, drugged slightly, but otherwise healthy. At least on the way up to the 63 kilometer high trip he was healthy. No one had a reliable way to monitor his vital signs, and so it fell to medical experts afterwards to discover that the dead monkey that scientists found at the end of the trial had suffocated during the flight, not in reaction to the altitude. A year later Albert II went up to 134 kilometers. This time the person examining the corpse was asked for time, not cause of death. The parachute to his rocket had failed to deploy.

Albert III went up in September. His rocket exploded at ten kilometers up. No one was consulted this time about either time or cause of death. Albert IV was snuffed in another parachute failure in 1949.

It's fair to say that the scientists were somewhat disillusioned with what the V-2s had to offer at that point, and so they switched to rockets made by Aerojet in the fifties. They kept the name Albert, though, and the next two Alberts inherited the luck of the first four. Yet another parachute failure claimed Albert V. It seemed that luck was changing when Albert VI landed alive and safe in 1951. Sadly, he landed rather off course. He waited for hours in the New Mexico sun in a sealed metal container until military teams found and recovered the rocket, but he died of stress and heat exhaustion two hours after the recovery.

At last the proto-space experts decided to switch the names as they had switched the rockets. Two monkeys named Patricia and Mike survived a flight in 1952. Their flight had also not gone as planned, and had only managed to climb a little over twenty kilometers. But, considering they were the first monkeys to make it out of a rocket comfortably alive, their flight was celebrated. It took another seven years - and no more monkeys named Albert - for any simians to actually make it to space and back alive. Still, let us give thanks for all those fallen Alberts, and wonder if NASA should institute some new naming requirement for their missions.

The Marine Corps Warfighting Laboratory's Project Albert is the research and development effort whose goal is to develop the process and capabilities of Data Farming, a method to address decision-maker's questions that applies high performance computing to modeling in order to examine and understand the landscape of potential simulated outcomes, enhance intuition, find surprises and outliers, and identify potential options. Data Farming is the method by which potentially millions of data points are explored and captured. It could be considered akin to Data Mining combined with feedback which allows for the more intelligent collection of more data points. This process is made possible, in part, by the exploitation of High Performance Computing assets and methods, and the project is fully supported by the Maui High Performance Computing Center. The Project Albert modeling approach is achieved through the development of a suite of models, called Distillations, to drive home the point that these models are produced as an intentional complement to the very highly-detailed simulations being developed within the DoD, which by the very fact that they are so highly-detailed and encumbered, do not permit the examination of a very wide range of possibilities and outcomes.

By virtue of their being much easier to run and understand (think: SimCity adapted to a combat situation), they are proving to be effective tools that help capture and scientifically reproduce the ideas of Subject Matter Experts, such as those thinking about tomorrow's concepts, doctrine, and requirements. This suite of entity-based models allow for rapid and highly tailorable changes in entity characteristics and behaviors, quite amenable to, and intentionally designed for rapid, repeatable concept exploration. Project Albert develops a suite, vice a single model, to allow for the testing of robustness of observations across modeling platforms, and because each model has inherent strengths and unique capabilities with regard to each aspect of modeling how entities think, decide, shoot, move, and communicate. The Project Albert suite of models includes Map-Aware Non-Uniform Automata (MANA), Socrates, and Pythagoras. It is of note that MANA is developed by the New Zealand Defense Technology Agency, and it is used free of charge by members of the Project Albert Team. Project Albert is also harnessing existing, and developing new, methodologies for investigating the results of running such models. In this regard, a wide range of Data Exploration and Data Visualization tools and methods are being employed.

Also being developed is the concept and initial implementation of Automated Red Teaming, a methodology that helps identify how Red can beat Blue through intelligent, effective, and efficient search through the space of possibilities. This is accomplished in part through the employment of a variety of evolutionary algorithms.

Currently, Project Albert is collaborating with military decision-makers, both inside the USMC, jointly, and within coalitional arrangements, to apply these techniques and tools to real-world questions. Some examples of the work efforts can be found on the Project Albert International Workshop pages. Another example of collaboration efforts is Project Albert 's Internship and Experimental History Program. This program has employed interns from U.S. Naval Academy, Naval Postgraduate School, U.S. Military Academy, and civilian academic institutions. Experimental History describes the process of taking a historical battle of interest and recreating it in one or more of our distillations and applying the process of data farming to it to yield a set of data that address interesting what ifs. In a sense, it is akin to taking a single data point (of history) and expanding the understanding of it to a region of possibilities. Finally, initial progress is also already being made on the integration (translation of scenarios) between different models and C2 Platforms, e.g. from C2PC to one of the Project Albert models, and on the development of collaborative environments that assist in the whiteboarding and creation of scenarios and in the joint understanding of the data that results from Data Farming the scenario.

Project Mercury was the first human spaceflight program of the United States led by its newly created space agency NASA. It ran from 1959 through 1963 with the goal of putting a human in orbit around the Earth, and doing it before the Soviet Union, as part of the early space race. It involved 7 astronauts flying a total of 6 solo trips. On 5 May 1961, Alan Shepard became the first American in space in a suborbital flight after the Soviet Union had put Yuri Gagarin into space and orbit one month earlier. John Glenn became the first American to reach orbit on 20 February 1962, he was the third person to do so, after soviet Gherman Titov had made a day long flight in August 1961. When the project ended in May 1963, the Americans' NASA program was still behind the Soviet Space Program, but the gap was seen as closing. The race to the Moon began.
The space race started in 1957 by the launch of the Soviet satellite Sputnik I. This came as a shock to the American public and led to the creation of NASA to gather the efforts in space exploration already existing in USA. After the launch of the first American satellite in 1958, manned space flight became the next goal. The spacecraft was produced by McDonnell Aircraft. It was cone shaped with room for one person together with supplies of water, food and oxygen in a pressurized cabin. It was launched from Cape Canaveral in Florida by modified military missiles, most importantly Atlas D, and had a rescue tower for protection from a failing rocket. The whole flight could be controlled from the ground through a network of tracking stations which also allowed communication with the astronaut. If necessary, the astronaut could override commands from the ground. For reentry into Earth's atmosphere, small rockets were used to bring the spacecraft out of its orbit. A heatshield would protect the spacecraft from the heat of reentry, and a parachute would slow the craft for a water landing. Here both astronaut and spacecraft were picked up by helicopter and brought to a ship.
From a slow start with humiliating mistakes, the Mercury Project became popular and the manned flights were followed by millions on radio and TV not only in United States, but around the world. Apart from the manned missions, Mercury had a total of 20 unmanned launches as a part of the development of the project. This also involved test animals, most famously the chimpanzees Ham and Enos. Mercury laid the groundwork for Project Gemini and the follow-on Apollo moon-landing program, which was announced a few weeks after the first manned flight. The astronauts went under the name Mercury Seven and they named their spacecraft with a "7" to the name. The project name was taken from Mercury, a Roman god. It is estimated to have cost $1.71 billion and have involved the work of 2 million people.

Yossi Leshem worked at the Society for the Protection of Nature in Israel (SPNI), the leading NGO in Israel, for 25 years, as a guide, as Director of a Field Study Center,as Head of the Nature Protection Department, Initiator and Director of the Israel Raptor Information Center between 1980-1991, and as the Executive Director of the SPNI between 1991-1995.  Leshem is Senior Researcher in the Department of Zoology in the Faculty of Life Sciences at Tel Aviv University and is the founder and Director of the International Center for the Study of Bird Migration at Latrun, Israel, established by Tel Aviv University and the SPNI.  In November 2007 he was elected as the Chairman of the SPNI Council.  Leshem has been involved in many aspects of nature conservation, with the emphasis on bird research for 38 years. Since 1984 his research for his doctorate, which was conducted with the cooperation of the Israeli Air Force and the Ministry of Science, has resulted in a decrease of 76% in the number of collisions with aircraft caused by birds, and has saved 790 million dollars, not to mention the numbers of lives, both human and avian. Today he serves as Lt. Col. (Ret) in the Israeli Air Force and continues this research. In 2005 he won the prestigious Mike Kuhring Prize for achievements of high significance for an improved flight safety concerning the bird problems of aviation, and for his mission to connect safety with nature conservation via education that gave bird strike prevention world wide appreciation.  Leshem is involved in a variety of activities in bird migration research, in educational activities that take place in over 250 schools in Israel part of cooperation with the Palestinians and the Jordanians, and has developed an educational and scientific site on the Internet ( www.birds.org.il ) called "Migrating Birds Know No Boundaries". Leshem developed a 6 year research and an educational program in cooperation with the Palestinians and Jordanians under the same title as the web site.  At the moment Dr. Leshem is conducting a number of scientific projects, among them a project which tracks migrating birds that have been fitted with satellite transmitters, and a project that tracks migration with the aid of radar, in cooperation with a team of Russian immigrant scientists.  Leshem initiated a program to use Barn Owls and Kestrels as pest controllers to reduce the use of pesticides in agricultural fields, which became a national program and a regional project with Jordan and the Palestinian Authority.  Leshem published 3 books, scientific papers, and hundreds of articles in popular magazines.  Dr. Leshem visited Japan as a visiting Prof. at the University of Tokyo, June 30 th – October 12 th, 2006. Leshem is a Recipient of "Lifetime Achievement Award for Environmental Protection" in 2008, given for sixty years of Israel


About the Bologna Center
Home to the oldest university in Europe, Bologna’s long tradition of education, cultural heritage and political vitality makes it an attractive location for SAIS' European campus. On the cusp of its 60th anniversary, SAIS Bologna is distinguished by strong faculty-student relationships, vigorous debate and a cohesive social and intellectual community. Exposure to contrasting European and U.S. perspectives on global issues offers a distinctive academic pairing—making for an extraordinarily enriching experience.

Degrees & Programs
Master of Arts
Master of Arts in International Affairs
Master of International Public Policy
Diploma in International Studies


Visit the Bologna Center
Prospective Students

Campus Tours
SAIS Bologna has an open-door policy for prospective students and encourages vists throughout the academic year when classes are in session. To arrange a visit, contact the Admissions Office at admissions@jhubc.it.

Open Day
Open Day is an opportunity for students to visit the SAIS Bologna campus. During the day-long event visitors meet current students and faculty and attend classes. To register for Open Day, please click here

Information Sessions
We understand that many of our applicants live far from the places we travel to. To make sure as many candidates as possible have their questions answered, we have arranged a set of online information sessions. To connect to the sessions, prospective students need access to a computer, an internet connection and a phone line (or Skype). For instructions on how to log-in, please contact admissions.eu@jhu.edu. Below is the fall 2013 schedule.

August 28 at 4pm - general introduction
September 26 at 10 am - standardized tests
October 23 at 4pm - statement of purpose
November 26 at 10am - letters of recommendation
December 12 at 4pm - analytical essay
all times local Bologna, Italy time
Academic Catalog


Public & Press

Events
Various seminar series are organized at SAIS Bologna throughout the academic year. Seminars are grouped thematically and each one is hosted by a SAIS Bologna faculty member. These events bring prominent scholars and practitioners from Europe, the United States and other parts of the world to present current research to the Bologna Center and local community.


Event Calendar
Contact

Bologna Center
Via Belmeloro 11
40126  Bologna
Italy
+39 051 2917811



The,Bad,Science,Mark,R.,Rowe,San,Diego,California,92102,Mark,Rowe,David,Rowe,Nina,Dougherty,Clifford,Dougherty,Anita,Ferguson,Virginia,Ferguson,William,Jones,Frederick,Jones,Charles,Rowe,Jacqueline,Kennedy,Esther,Rowe,Ralph,Rowe,Judy,Garland,Ethel,Kennedy,Robert,John,Kennedy,international,affairs,world,economic,domination,and,control,policy,makers,decisions,for,material,gain,persuasion,of,the,masses,Did,you,know,that,the,NSA,can,track,the,location,of,your,phone,even,when,it,is,turned,off,and,the,batteries,have,been,removed,This,admission,went,largely,unnoticed,in,a,Washington,Post,report,entitled,NSA,growth,fueled,by,need,to,target,terrorists,In,the,article,writer,Dana,Priest,details,how,teams,of,NSA,employees,stationed,around,the,globe,are,dedicated,to,tracking,phones,in,real,time,By,September,2004,a,new,NSA,technique,enabled,the,agency,to,find,cellphones,even,when,they,were,turned,off,JSOC,troops,called,this,The,Find,and,it,gave,them,thousands,of,new,targets,including,members,of,a,burgeoning,al,Qaeda,sponsored,insurgency,in,Iraq,according,to,members,of,the,unit,At,the,same,time,the,NSA,developed,a,new,computer,linkup,called,the,Real,Time,Regional,Gateway,into,which,the,military,and,intelligence,officers,could,feed,every,bit,of,data,or,seized,documents,and,get,back,a,phone,number,or,list,of,potential,targets,It,also,allowed,commanders,to,see,on,a,screen,every,type,of,surveillance,available,in,a,given,territory,The,technique,by,which,the,NSA,can,wiretap,cellphones,even,when,they,are,turned,off,and,powered,down,is,most,likely,being,performed,with,the,complicity,of,telecommunications,companies,who,have,proven,friendly,to,NSA,snooping,Trojan,horse,programs,disguised,behind,routine,system,updates,are,the,likely,method,through,which,the,NSA,gains,direct,access,to,millions,of,Americans,cellphones,and,other,devices,you,may,recall,the,fact,that,Verizon,and,ATT,notably,did,not,sign,the,collective,letter,asking,the,government,to,allow,affected,companies,to,release,information,on,government,requests,for,data,writes,Tim,Cushing,given,this,background,its,not,unimaginable,that,Verizon,and,ATT,would,accommodate,the,NSA,and,FBI,if,it,wished,to,use,their,update,systems,to,push,these,trojans,as,we,have,also,previously,highlighted,terms,of,agreement,for,many,of,the,apps,you,download,to,your,smartphone,now,use,your,microphone,to,listen,to,you,and,your,camera,to,take,pictures,of,you,without,your,knowledge,the,notion,of,the,federal,government,tracking,your,location,via,your,cellphone,is,particularly,prescient,given,yesterdays,report,concerning,the,DHS,funded,mesh,network,system,that,seattle,police,eventually,intend,to,roll,out,across,the,city,but,have,temporarily,been,forced,to,deactivate,due,to,a,privacy,outcry,aruba,networks,company,behind,the,system,of,wifi,hubs,which,can,record,the,last,1000,locations,of,cellphones,belonging,to,anyone,in,the,coverage,area,bragged,in,their,promotional,material,that,the,grid,could,track,rogue,or,unassociated,devices,In,other,words,even,if,you,do,not,allow,your,phone,to,connect,to,such,wifi,networks,they,can,still,access,your,device,record,its,current,and,historical,location,as,well,as,download,private,information,from,your,apps,and,other,settings,And,there,appeared,a,great,wonder,in,heaven;,a,woman,clothed,with,the,sun,and,the,moon,under,her,feet,and,upon,her,head,a,crown,of,twelve,stars:,And,she,being,with,child,cried,travailing,in,birth,and,pained,to,be,delivered,And,there,appeared,another,wonder,in,heaven;,and,behold,a,great,red,dragon,having,seven,heads,and,ten,horns,and,seven,crowns,upon,his,heads.,And,his,tail,drew,the,third,part,of,the,stars,of,heaven,and,did,cast,them,to,the,earth:,and,the,dragon,stood,before,the,woman,which,was,ready,to,be,delivered,for,to,devour,her,child,as,soon,as,it,was,born.,And,she,brought,forth,a,man,child,who,was,to,rule,all,nations,with,a,rod,of,iron:,and,her,child,was,caught,up,unto,God,and,to,his,throne.,And,the,woman,fled,into,the,wilderness,where,she,hath,a,place,prepared,of,God,that,they,should,feed,her,there,a,thousand,two,hundred,and,threescore,days.,And,there,was,war,in,heaven:,Michael,and,his,angels,fought,against,the,dragon;,and,the,dragon,fought,and,his,angels,And,prevailed,not,neither,was,their,place,found,any,more,in,heaven,And,the,great,dragon,was,cast,out,that,old,serpent,called,the,Devil,and,Satan,which,deceiveth,the,whole,world:,he,was,cast,out,into,the,earth,and,his,angels,were,cast,out,with,him.,And,I,heard,a,loud,voice,saying,in,heaven,Now,is,come,salvation,and,strength,and,the,kingdom,of,our,God,and,the,power,of,his,Christ,for,the,accuser,of,our,brethren,is,cast,down,which,accused,them,before,our,God,day,and,night,And,they,overcame,him,by,the,blood,of,the,Lamb,and,by,the,word,of,their,testimony;,and,they,loved,not,their,lives,unto,the,death,Therefore,rejoice,ye,heavens,and,ye,that,dwell,in,them.,Woe,to,the,inhabiters,of,the,earth,and,of,the,sea!,for,the,devil,is,come,down,unto,you,having,great,wrath,because,he,knoweth,that,he,hath,but,a,short,time.,And,when,the,dragon,saw,that,he,was,cast,unto,the,earth,he,persecuted,the,woman,which,brought,forth,the,man,child,And,to,the,woman,were,given,two,wings,of,a,great,eagle,that,she,might,fly,into,the,wilderness,into,her,place,where,she,is,nourished,for,a,time,and,times,and,half,a,time,from,the,face,of,the,serpent,And,the,serpent,cast,out,of,his,mouth,water,as,a,flood,after,the,woman,that,he,might,cause,her,to,be,carried,away,of,the,flood.,And,the,earth,helped,the,woman,and,the,earth,opened,her,mouth,and,swallowed,up,the,flood,which,the,dragon,cast,out,of,his,mouth,And,the,dragon,was,wroth,with,the,woman,and,went,to,make,war,with,the,remnant,of,her,seed,which,keep,the,commandments,of,God,and,have,the,testimony,of,Jesus,Christ,Charles,Rowe,Jacqueline,Kennedy,Esther,Rowe,Ralph,Rowe,Judy,Garland,Ethel,Kennedy,Robert,John,Kennedy,international,affairs,world,economic,domination,and,control,policy,makers,decisions,for,material,gain,persuasion,of,the,masses,Did,you,know,that,the,NSA,can,track,the,location,of,your,phone,even,when,it,is,turned,off,and,the,batteries,have,been,removed,This,admission,went,largely,unnoticed,in,a,Washington,Post,report,entitled,NSA,growth,fueled,by,need,to,target,terrorists,In,the,article,writer,Dana,Priest,details,how,teams,of,NSA,employees,stationed,around,the,globe,are,dedicated,to,tracking,phones,in,real,time,By,September,2004,a,new,NSA,technique,enabled,the,agency,to,find,cellphones,even,when,they,were,turned,off,JSOC,troops,called,this,The,Find,and,it,gave,them,thousands,of,new,targets,including,members,of,a,burgeoning,al,Qaeda,sponsored,insurgency,in,Iraq,according,to,members,of,the,unit,At,the,same,time,the,NSA,developed,a,new,computer,linkup,called,the,Real,Time,Regional,Gateway,into,which,the,military,and,intelligence,officers,could,feed,every,bit,of,data,or,seized,documents,and,get,back,a,phone,number,or,list,of,potential,targets,It,also,allowed,commanders,to,see,on,a,screen,every,type,of,surveillance,available,in,a,given,territory,The,technique,by,which,the,NSA,can,wiretap,cellphones,even,when,they,are,turned,off,and,powered,down,is,most,likely,being,performed,with,the,complicity,of,telecommunications,companies,who,have,proven,friendly,to,NSA,snooping,Trojan,horse,programs,disguised,behind,routine,system,updates,are,the,likely,method,through,which,the,NSA,gains,direct,access,to,millions,of,Americans,cellphones,and,other,devices,you,may,recall,the,fact,that,Verizon,and,ATT,notably,did,not,sign,the,collective,letter,asking,the,government,to,allow,affected,companies,to,release,information,on,government,requests,for,data,writes,Tim,Cushing,given,this,background,its,not,unimaginable,that,Verizon,and,ATT,would,accommodate,the,NSA,and,FBI,if,it,wished,to,use,their,update,systems,to,push,these,trojans,as,we,have,also,previously,highlighted,terms,of,agreement,for,many,of,the,apps,you,download,to,your,smartphone,now,use,your,microphone,to,listen,to,you,and,your,camera,to,take,pictures,of,you,without,your,knowledge,the,notion,of,the,federal,government,tracking,your,location,via,your,cellphone,is,particularly,prescient,given,yesterdays,report,concerning,the,DHS,funded,mesh,network,system,that,seattle,police,eventually,intend,to,roll,out,across,the,city,but,have,temporarily,been,forced,to,deactivate,due,to,a,privacy,outcry,aruba,networks,company,behind,the,system,of,wifi,hubs,which,can,record,the,last,1000,locations,of,cellphones,belonging,to,anyone,in,the,coverage,area,bragged,in,their,promotional,material,that,the,grid,could,track,rogue,or,unassociated,devices,In,other,words,even,if,you,do,not,allow,your,phone,to,connect,to,such,wifi,networks,they,can,still,access,your,device,record,its,current,and,historical,location,as,well,as,download,private,information,from,your,apps,and,other,settings,The,Future,of,Eugenics,Eugenics,although,based,on,the,science,of,genetics,is,not,itself,a,sciences,for,it,must,above,all,concern,itself,with,social,values,with,the,question:,Whither,mankind?,Perhaps,general,Agreement,could,be,had,that,freedom,from,gross,physical,or,mental,defects,and,the,the,freedom,from,gross,physical,or,mental,defects,and,the,possession,of,sound,health,high,intelligence,general,adaptability,and,mobility,of,sprier,are,the,major,goals,toward,which,eugenics,should,aim;,perhaps,even,that,diversity,of,nature,is,better,than,uniformity,of,type,But,hour,far,ought,selective,reproduction,to,inters,with,human,freedoms:,Genetically,as,in,other,respects,"there,is,so,much,bad,in,the,best,of,us,and,so,much,good,in,the,worst,of,us",that,it,is,hared,to,asses,the,worth,of,the,manifest,hereditary,characteristics,of,a,person;,and,the,numerous,hidden,recessive,genes,or,genes,of,low,penetrance,make,it,quit,impossible,Nor,can,on,determine,to,what,extent,a,person's,manifest,characteristics,a,the,product,of,environment,particularly,for,this,qualities,what,eugenics',major,concern:,con,health,high,intelligence,and,the,like,THe,Jukes,and,Kallikaks,were,horrible,examples,of,degenerate,humanity,but,what,might,they,have,been,in,a,better,world:,Were,their,alcoholism,their,crime,and,their,vice,inescapable,products,of,their,genes?,It,seems,very,doubtful,Only,the,experiment,of,putting,them,from,earliest,infancy,in,to,an,optimum,environment,could,possible,yield,and,answer,It,is,easier,to,define,the,essentials,of,a,optimum,environment,not,forgetting,that,it,need,not,be,the,same,for,everyone,than,to,modify,gene,frequencies,by,wise,selection,Once,mankind,has,produced,an,approximation,of,that,optimum,environment,the,eugenic,task,will,be,simpler,In,fact,that,natural,selection,exerted,by,such,an,environment,may,make,eugenics,quite,unnecessary,See,also,Birth,Control,Genetics,Mark,Rowe,David,Rowe,Nina,Dougherty,Clifford,Dougherty,Anita,Ferguson,Virginia,Ferguson,William,Jones,Frederick,Jones,Charles,Rowe,Jacqueline,Kennedy,Esther,Rowe,Ralph,Rowe,Judy,Garland,Ethel,Kennedy,Robert,John,Kennedy,international,affairs,world,economic,domination,and,control,policy,makers,decisions,for,material,gain,persuasion,of,the,masses,Did,you,know,that,the,NSA,can,track,the,location,of,your,phone,even,when,it,is,turned,off,and,the,batteries,have,been,removed,This,admission,went,largely,unnoticed,in,a,Washington,Post,report,entitled,NSA,growth,fueled,by,need,to,target,terrorists,In,the,article,writer,Dana,Priest,details,how,teams,of,NSA,employees,stationed,around,the,globe,are,dedicated,to,tracking,phones,in,real,time,By,September,2004,a,new,NSA,technique,enabled,the,agency,to,find,cellphones,even,when,they,were,turned,off,JSOC,troops,called,this,The,Find,and,it,gave,them,thousands,of,new,targets,including,members,of,a,burgeoning,al,Qaeda,sponsored,insurgency,in,Iraq,according,to,members,of,the,unit,At,the,same,time,the,NSA,developed,a,new,computer,linkup,called,the,Real,Time,Regional,Gateway,into,which,the,military,and,intelligence,officers,could,feed,every,bit,of,data,or,seized,documents,and,get,back,a,phone,number,or,list,of,potential,targets,It,also,allowed,commanders,to,see,on,a,screen,every,type,of,surveillance,available,in,a,given,territory,The,technique,by,which,the,NSA,can,wiretap,cellphones,even,when,they,are,turned,off,and,powered,down,is,most,likely,being,performed,with,the,complicity,of,telecommunications,companies,who,have,proven,friendly,to,NSA,snooping,Trojan,horse,programs,disguised,behind,routine,system,updates,are,the,likely,method,through,which,the,NSA,gains,direct,access,to,millions,of,Americans,cellphones,and,other,devices,you,may,recall,the,fact,that,Verizon,and,ATT,notably,did,not,sign,the,collective,letter,asking,the,government,to,allow,affected,companies,to,release,information,on,government,requests,for,data,writes,Tim,Cushing,given,this,background,its,not,unimaginable,that,Verizon,and,ATT,would,accommodate,the,NSA,and,FBI,if,it,wished,to,use,their,update,systems,to,push,these,trojans,as,we,have,also,previously,highlighted,terms,of,agreement,for,many,of,the,apps,you,download,to,your,smartphone,now,use,your,microphone,to,listen,to,you,and,your,camera,to,take,pictures,of,you,without,your,knowledge,the,notion,of,the,federal,government,tracking,your,location,via,your,cellphone,is,particularly,prescient,given,yesterdays,report,concerning,the,DHS,funded,mesh,network,system,that,seattle,police,eventually,intend,to,roll,out,across,the,city,but,have,temporarily,been,forced,to,deactivate,due,to,a,privacy,outcry,aruba,networks,company,behind,the,system,of,wifi,hubs,which,can,record,the,last,1000,locations,of,cellphones,belonging,to,anyone,in,the,coverage,area,bragged,in,their,promotional,material,that,the,grid,could,track,rogue,or,unassociated,devices,In,other,words,even,if,you,do,not,allow,your,phone,to,connect,to,such,wifi,networks,they,can,still,access,your,device,record,its,current,and,historical,location,as,well,as,download,private,information,from,your,apps,,and,other,settings,washington,the,white,house,has,cancelled,a,planned,summit,meeting,next,month,between,president,barack,obama,and,russian,president,vladimir,putin,and,one,of,the,reasons,given,was,moscows,decision,to,grant,asylum,to,an,american,who,leaked,top,secret,information,Former,Vice,President,Dick,Cheney,called,Edward,Snowden,a,traitor,for,leaking,top,secret,documents,from,the,National,Security,Agency,in,an,interview,that,aired,Monday,afternoon,on,CNN,Cheney,added,that,he,hopes,the,U,S,is,eventually,able,to,catch,Snowden,who,was,granted,a,one,year,asylum,in,Russia,in,August,and,hopes,he,receives,the,justice,he,deserves,Cheney,said,Snowden,leaks,which,most,recently,revealed,that,the,National,Security,Agency,monitored,the,phone,conversations,of,35,world,leaders,have,hurt,Americas,ability,to,defend,itself,The,former,second,in,command,would,not,comment,on,whether,or,not,that,the,surveillance,began,in,2002,as,the,documents,indicated,The,fact,is,we,do,collect,a,lot,of,intelligence,without,speaking,about,any,particular,target,or,group,of,targets,Cheney,told,CNN,Jake,Tapper,That,intelligence,capability,is,enormously,important,to,the,United,States,to,our,conduct,of,foreign,policy,to,the,defense,matters,to,economic,matters,And,Im,a,strong,supporter,of,it,The,same,day,Cheney,came,out,against,Snowden,Wikileaks,set,up,a,Free,Snowden,a,website,designed,to,collect,money,to,defend,the,former,NSA,contractor,whose,asylum,ends,in,August,2014,Damascus,knows,the,struggle,for,the,moment,is,to,sway,American,public,opinion,With,that,in,mind,President,Assad,In,his,interview,with,CBS,and,statements,from,other,Syrian,officials,,have,stressed,at,least,three,ways,in,which,a,US,military,strike,would,backfire,There,is,the,unspecific,warning,if,not,outright,threat,of,direct,reprisals,by,Syria,,and,indirect,action,by,its,allies,such,as,Hezbollah,in,Lebanon,and,Iranian,backed,Shia,militias,in,Iraq,There,is,the,warning,that,American,action,would,strengthen,rebel,factions,linked,to,al,Qaeda,and,could,even,enable,them,to,seize,power,if,the,strike,were,damaging,enough,And,there,is,the,threat,echoed,by,Moscow,that,any,such,attack,would,scupper,already,dim,chances,of,a,political,settlement,through,peace,talks,in,Geneva,In,reality,much,depends,on,what,exactly,the,Americans,intend,to,do,If,their,strike,is,as,Mr,Kerry,said,incredibly,small,the,repercussions,might,be,very,limited,Iranian,backed,militias,in,Iraq,might,fire,off,some,mortars,at,the,enormous,US,embassy,compound,in,Baghdad,for,example,But,more,serious,actions,such,as,Hezbollah,striking,at,Israel,are,unlikely,unless,the,US,launches,a,very,major,operation,indeed,Russia,has,asked,Syria,to,put,its,chemical,weapons,stockpiles,under,international,control,and,then,have,them,destroyed,in,an,attempt,to,avoid,US,military,strikes,Foreign,Minister,Sergei,Lavrov,said,the,offer,was,made,during,talks,with,his,Syrian,counterpart,Walid,Muallem,who,welcomed,the,initiative,The,US,said,it,was,skeptical,but,would,have,a,hard,look,at,the,plan,The,US,accuses,Damascus,of,war,crimes,allegations,denied,by,the,regime,US,Secretary,of,State,John,Kerry,in,Europe,to,garner,support,for,the,military,action,,inadvertently,started,the,talk,of,Syria,giving,up,its,chemical,weapons,early,on,Monday,When,asked,at,a,news,conference,whether,there,was,anything,Syrian,President,Bashar,al,Assad,could,do,to,avoid,military,action,Mr,Kerry,replied,that,he,could,hand,over,his,entire,stockpile,of,chemical,weapons,within,the,next,week,US,officials,subsequently,clarified,that,Mr,Kerry,was,making,a,rhetorical,argument,rather,than,a,serious,offer,However,Mr,Lavrov,later,revealed,in,a,news,conference,that,he,had,urged,Mr,Muallem,to,not,only,agree,on,placing,chemical,weapons,storage,sites,under,international,control,,but,also,on,their,subsequent,destruction,He,said,he,had,also,told,Mr,Muallem,that,Syria,should,then,fully,join,the,Chemical,Weapons,Convention,Mr,Muallem,told,reporters,through,an,interpreter,that,Syria,welcomed,the,initiative,and,praised,Russia,for,attempting,to,prevent,American,aggression,against,our,people,Mr,Kerry,and,Mr,Lavrov,spoke,on,the,phone,after,the,Russian,proposal,was,put,forward,but,US,officials,sounded,a,cautious,note,over,the,plan,White,House,spokesman,Jay,Carney,said,the,US,government,would,study,the,proposal,but,had,skepticism,over,the,credibility,of,the,Assad,regime,In,an,interview,earlier,Assad,refused,to,even,acknowledge,that,he,has,chemical,weapons,Of,course,the,whole,world,knows,he,does,said,Mr,Carney,White,House,spokesman,Jay,Carney,said,the,US,would,study,Russia's,proposals,He,promised,that,the,US,would,continue,to,push,for,strikes,because,the,credible,threat,of,military,action,was,vital,in,putting,pressure,on,the,Assad,regime,US,allies,have,also,reacted,cautiously,UK,Minister,David,Cameron,said,the,destruction,of,the,weapons,would,be,a,huge,step,forward,but,warned,that,it,should,not,be,used,as,a,distraction,tactic,French,Foreign,Minister,Laurent,Fabius,called,on,Mr,Assad,to,make,rapid,serious,and,verifiable,comments,to,the,plan,German,Chancellor,Angela,Merkel,said,it,was,an,interesting,proposal,but,added,that,she,hoped,real,action,would,follow,Pay,the,price,Moscow,has,been,Mr,Assad's,main,international,ally,throughout,Syria's,two,and,a,half,year,civil,war,Russia,has,blocked,three,resolutions,against,Syria,in,the,UN,Security,Council,and,has,dismissed,US,claims,that,Mr,Assad's,forces,carried,out,a,chemical,attack,in,Damascus,on,August,killing,people,Mr,Assad's,government,blames,the,attack,on,rebels,fighting,to,overthrow,him,in,a,conflict,that,the,UN,says,has,claimed,some,lives,The,UN,sent,weapons,experts,into,Damascus,to,investigate,the,attack,UN,Secretary,General,Ban,Ki,moon,said,on,Monday,that,if,the,experts,concluded,chemicals,had,been,used,,he,would,consider,asking,the,Security,Council,to,approve,a,safe,zone,in,Syria,where,the,weapons,could,be,destroyed,Meanwhile,the,Syrian,leader,gave,an,interview,to,US,network,PBS,in,which,he,warned,the,US,against,intervention,saying,the,Middle,East,was,on,the,brink,of,explosion,You're,going,to,pay,the,price,if,you're,not,wise,with,dealing,with,terrorists,There,are,going,to,be,repercussions,he,said,The,government,is,not,the,only,player,in,this,region,You,have,different,parties,different,factions,different,ideologies,You,have,everything,in,this,decision,now,Mr,Assad,did,not,explain,whether,his,comment,was,a,threat,that,Syrian,backed,groups,such,as,Hezbollah,would,launch,retaliation,or,a,warning,that,strikes,would,bolster,al,Qaeda,linked,groups,He,also,denied,using,chemical,weapons,saying,there,was,no,evidence,to,hold,his,government,responsible,for,the,August,attack,Continue,reading,the,main,story,Start,Quote,The,proposal,to,destroy,Syria's,chemical,weapons,could,be,a,one,day,wonder,but,it,could,also,be,a,game,changer,Mark,Mardell,North,America,Heavy,lift,US,President,Barack,Obama,has,cleared,his,schedule,this,week,to,focus,all,his,attention,on,building,support,for,the,Syrian,intervention,He,has,acknowledged,he,faces,a,heavy,lift,to,win,congressional,backing,A,poll,carried,out,by,ABC,and,the,BBC,on,Friday,suggested,more,than,members,in,the,House,of,Representatives,were,either,opposed,or,likely,to,oppose,strikes,Just,representatives,said,they,would,support,or,were,likely,to,support,action,and,a,large,proportion,are,still,undecided,on,the,issue,Many,US,politicians,and,members,of,the,public,remain,concerned,that,military,action,could,draw,the,nation,into,a,prolonged,war,and,spark,broader,hostilities,in,the,region,of,the44,21,230,433,100000,1429,21