Monday, December 6, 2021

SUMMARY OF PERSIAN GULF WAR ILLNESS PILOT STUDY ON MYCOPLASMAL INFECTIONS IN VETERANS AND FAMILY MEMBERS

 SUMMARY OF PERSIAN GULF WAR ILLNESS PILOT STUDY ON

MYCOPLASMAL INFECTIONS IN VETERANS AND FAMILY MEMBERS

Garth L. Nicolson, Ph.D. and Nancy L. Nicolson, Ph.D.

The Institute for Molecular Medicine, P.O. Box 52470, Irvine, California
92619-2470

Approximately 50,000-100,000 U.S. and ~3,500 British soldiers returned from
Operation Desert Storm with unusual illnesses characterized by a variety of
chronic signs and symptoms. Our step-daughter was one of these soldiers.
Since we had some experience with a disease that caused similar complex
signs and symptoms, we proposed that the Desert Storm or Persian Gulf War
Illness (GWI) might be caused by a severe mycoplasmal infection and that it
should be treatable with appropriate antibiotics. We conducted a pilot study
of Desert Storm veterans and their families for the presence of unusual
mycoplasmal infections. This study showed that 55/73 GWI patients, including
symptomatic family members, responded to an antibiotic (doxycycline) that is
effective against a variety of mycoplasmas, and these soldiers and their
family members who were sick with the same symptoms eventually recovered
from their illness (Nicolson, G.L. and Nicolson, N.L. Doxycycline treatment
and Desert Storm J. Amer. Med. Assoc. 273: 618-619, 1995). Since this study
we have continued to gather evidence that mycoplasmal infections, and
probably other chronic infectious agents, are causing the chronic signs and
symptomsof GWI that are similar to Chronic Fatigue Syndrome (Nicolson, G.L.
and Nicolson, N.L. Chronic fatigue illness and Operation Desert Storm. J.
Occup. Environ. Med. 38: 14-16, 1996).

Mycoplasmas are microorganisms whose genetic complexity and classification
are similar to bacteria. These microorganisms are usually indolent in normal
healthy individuals and are not often associated with severe diseases. In
fact, most adults may have had mycoplasmal pneumonia or a urogenital tract
infection caused by mycoplasmas. The mycoplasmas we have found in a sizable
fraction of the Gulf War Illness patients are unlikely to be naturally
occurring and could be Biological Weapons. We have based this notion on the
observation that the mycoplasmas that we have found in clinical blood
samples from Desert Storm veterans contain unusual DNA sequences that they
probably did not obtain in the wild. For example, we have detected
mycoplasma DNA sequences from Mycoplasma fermentans (incognitus strain) and
a few soldiers with modified Mycoplasma genitalium in veterans and their
family members with GWI as well as the HIV-1 envelope or env gene. The
former type of mycoplasma was studied by Dr. Shyh Lo, formerly of Tanox
Biosystems, a spin-off biotechnology company from the Baylor College of
Medicine, but now affiliated with the Armed Forces Institute of Pathology in
Washington, DC. Two points need to be clarified regarding our identification
of HIV-1 genes and mycoplasma sequences in the soldiers and symptomatic
family members that have GWI:

1. We detected HIV-1 genes in the same nucleoprotein fractions as the
mycoplasma genes but we did not detect the complete HIV-1 virus genome. Thus
these patients do not have the complete HIV-1 virus that is associated with
AIDS. This virus must contain the entire HIV-1 genome to replicate.

2. We observed a very small subset of soldiers who had another gene
sequence, the HIV-1 polymerase gene. Thus GWI patients contain individual
genes of the HIV-1 virus genome but not the complete virus.

What this might mean:

1. Mycoplasmas possessing the HIV-1 env gene could allegedly have been
engineered to make them more invasive and pathogenic and more difficult to
find. The HIV-1 env gene encodes a surface glycoprotein, gp120, that is
involved in virus attachment and entry into cells through receptors on the
cell surface. This could result in opportunistic cell attachment and
penetration of many types of cells and most tissues.

2. It is unlikely that our experiments are incorrectly detecting these
unusual genes in biological samples. We used highly specific oligonucleotide
probes for our studies. The probes are themselves unique complimentary DNA
sequences and are analogous to probes used in studies called DNA
hybridization analyses. Such techniques are well accepted in the forensic
field. If the DNA sequence from a particular infectious agent is present, we
can specifically identify its presence. Since the DNA probe is radiolabeled,
it will interlock with a specific DNA sequence from the infectious agent to
produce a radioactive signal (if the infectious DNA sequence is present). In
our case the agent DNA is detected in cell nuclear fractions, and we detect
the radioactive signal by X-ray autoradiography using Nucleoprotein Gene
Tracking (Nicolson, N.L. and Nicolson, G.L. The isolation, purification and
analysis of specific gene-containing nucleoproteins and nucleoprotein
complexes. Methods Mol. Genetics 5: 281-298, 1994).

In our ongoing studies involving several thousand Desert Storm Veterans and
their families, we have detected a preliminary pattern that may be
associated with unit deployment. Approximately one-half of the American
soldiers involved in the deep insertions into Iraq--such as the US Army's
101st Airborne Division and 5th Special Forces Group that are suffering from
GWI and Chronic Fatigue Symptoms--were positive for mycoplasmal infections,
and most have the Mycoplasma fermentans (incognitus strain) as well as HIV-1
env gene sequences. A pilot study on the diagnosis and treatment of 30 Gulf
War Illness patients has now been published in an international
peer-reviewed medical journal (Nicolson, G.L. and Nicolson, N.L. Diagnosis
and treatment of mycoplasmal infections in Persian Gulf War Illness-CFIDS
patients. Int. J. Occup. Med. Immunol. Tox. 5: 69-78, 1996). In this study
almost all GWI patients recovered after multiple (3-7) cycles of antibiotic
therapy. Although they are probably not cured of the infection, they are
able to perform normal functions such as fulfilling normal employment
duties.

There are additional points that require some explanation:

1. One could be suffering severely from this type of mycoplasmal infection
and less sensitive tests, such as antibody tests, could be negative. Since
the mycoplasma that we have detected is present deep inside the cell, the
usual antibody tests for extracellular mycoplasmas may be relatively
useless.

2. The most sensitive type of DNA test, the polymerase chain reaction (PCR)
technique, could also prove negative in an infected individual, because the
DNA chains of the invading mycoplasma may be be tightly complexed with
nucleoproteins and might not be accessible for the PCR reaction.

3. Gulf War Illness appears to be a collection of illnesses produced as a
result of multiple chemical and biological exposures from endogenous and
exogenous sources such as Chemical/Biological Weapons (CBW).

The Iraqi Armed Forces deployed CBW to forward positions and were operating
under the concept of Integrated War Strategy, a Soviet war doctrine that
proposes use of mixtures of Chemical and Biological Weapons to confuse
diagnosis and treatment. Some soldiers from the Gulf War were probably
exposed to endogenous and exogenous chemicals, such as smoke, fuel,
insecticides, etc., and have Multiple Chemical Sensitivity Syndrome (MCS)
induced by exposure to various chemical agents, some may have been exposed
to CBW, or both.

The hypothetical dissemination and exposure to Biological and Chemical
agents could have been accomplished by the following possible means:

In our Testimony to the U.S. Congress (April 4, 1996) we listed some
possible ways that soldiers could have exposed to Chemical/Biological
Weapons in Desert Storm:

1. Bombing of targets in Iraq thought to be Chemical/Biological Weapons
facilities. This caused plumes of smoke that could have transported CBW down
wind into our lines. Improper fluids and procedures for aircraft
decontamination and failure to decontaminate other vehicles returning from
various operations could have resulted in exposure.

2. Exposure to SCUD B (SS-1) skyburst warheads equipped to deliver CBW.
There were several types of SCUD warheads used in the conflict, and there
were many eyewitness accounts of the skyburst type that are usually used for
CBW exploding over Saudi and Western Kuwait.

3. Exclusionary zones may have been created with CBW agents. Military
Intelligence units reported that some areas of Southern Iraq contained
posted zones where nothing was alive (dead animals, humans, etc.). These
could have been created by spraying CBW agents on the sand.

4. The vaccines used before Desert Storm have come into question, because
some soldiers who were not deployed came down with Gulf War Illness. (But
some soldiers who were deployed and civilians who did not receive vaccines
have also come down with Gulf War Illness). Vaccine contamination, although
uncommon, can occur, and some individuals may have obtained their infections
by this route.

We have concentrated on the chronic illnesses associated with Desert Storm,
especially those involving immediate family members who also became ill.
That some Gulf War Illness patients with immediate family members who have
become sick with similar chronic signs and symptoms indicates that these
diseases are similar and are contagious. In addition, these infectious
diseases may have been transmitted to some unborn children, and this could
explain along with chemical exposures the higher apparent rates of infantile
death and birth defects in Gulf War Illness families.

For your information, we have also been studying personnel working in the
Texas Department of Criminal Justice (TDCJ) who presented with an array of
signs and symptoms that are, as assessed by environmental physicians,
identical to Gulf War Illness. These individuals were tested (like the
Desert Storm veterans) using Nucleoprotein Gene Tracking. Preliminary
results parallel our observations in Desert Storm veterans and suggest that
these illnesses were present in the U.S. before the Gulf War. We strongly
suspect that TDCJ prisoners were illegally used in Biological Weapons
testing. Thus the modified mycoplasmas detected in Gulf War Veterans may
have their origin in the U.S. It is interesting that before Desert Storm
some Texas biotechnology companies were developing vaccines (apparently
under U.S. Army contracts) and testing them in TDCJ prisons.

If detected early, the diseases associated with invasive mycoplasmal
infections are treatable with multiple cycles of antibiotics, but the
confusing panorama of signs and symptoms, and current political policies
make it extremely difficult to help veterans and their families. We have
relayed the above information to the Israeli, Syrian, Pakistani, Iraqi,
Egyptian, Turkish and French governments and their Armed Forces, and anyone
else who has asked us for assistance. Some officials associated with the
governments above have thanked us, but have also told us that their hands
were diplomatically tied in publicly discussing this issue. The manufacture,
sale, deployment and use of Biological Weapons were theoretically rendered
illegal by the 1972 Geneva Convention. Certain governments, however, have
flaunted these international agreements and have participated in atrocious
human experimentation for decades. In the U.S. this build-up began as early
as 1980, and its expansion was proposed in a 180 page secret report by CIA
Director John Deutsch when he was an Undersecretary of Defense. The impact
of Gulf War Illness on our societies will probably take decades to assess.
Biological Weapons are uncontrollable, and if we don't quickly identify and
effectively treat these infections, they will continue to spread in the
military and civilian populations.

Garth L. Nicolson, Ph.D.

Director and Research Professor

Institute for Molecular Medicine and Office Address:

Professor of Pathology and Laboratory Medicine P.O. Box 52470, Irvine, CA
92619-2470 (US mail)

Professor of Internal Medicine or 1761 Kaiser Ave., Irvine, CA 92614
(courier)

The University of Texas Medical School at Houston Direct Phone: (714)
476-7933

Nancy L. Nicolson, Ph.D.

CEO, Institute for Molecular Medicine

Saturday, December 4, 2021

A List Of Some Technological Theft Devices Used By NSA, Paid For By You

 As revealed by the Patriot Edward Snowden.

https://github.com/iamcryptoki/snowden-archive


The Snowden Archive

This repository is a complete collection of all documents leaked by former National Security Agency contractor and whistleblower Edward Snowden that have subsequently been published by news media around the world.

If you notice something is missing or wrong, please file an issue or tweet at @iamcryptoki.
Timeline of Revelations (2013-2018)
2013
Date     Source     Publication
06/06/2013     Foreign Intelligence Surveillance Court order for Verizon to provide U.S. call metadata to FBI     The Guardian
06/06/2013     NSA collecting phone records of millions of Verizon customers daily     The Guardian
06/06/2013     NSA slides explain the PRISM data-collection program     The Washington Post
08/06/2013     Boundless Informant: the NSA's secret tool to track global surveillance data     The Guardian
08/06/2013     New NSA tool to quantify, track intelligence collection revealed – live     The Guardian
20/06/2013     The top secret rules that allow NSA to use US data without a warrant     The Guardian
27/06/2013     NSA collected US email records in bulk for more than two years under Obama     The Guardian
30/06/2013     New NSA leaks show how US is bugging its European allies     The Guardian
31/07/2013     XKeyscore: NSA tool collects 'nearly everything a user does on the internet'     The Guardian
09/08/2013     NSA loophole allows warrantless search for US citizens' emails and phone calls     The Guardian
16/08/2013     NSA broke privacy rules thousands of times per year, audit finds     The Washington Post
23/08/2013     NSA paid millions to cover Prism compliance costs for tech companies     The Guardian
30/08/2013     'Black budget' summary details U.S. spy network's successes, failures and objectives     The Washington Post
31/08/2013     Snowden Document: NSA Spied On Al Jazeera Communications     Der Spiegel
01/09/2013     'Success Story': NSA Targeted French Foreign Ministry     Der Spiegel
03/09/2013     Veja os documentos ultrassecretos que comprovam espionagem a Dilma     O Globo Fantastico
05/09/2013     Revealed: how US and UK spy agencies defeat internet privacy and security     The Guardian
08/09/2013     NSA Documents Show United States Spied Brazilian Oil Giant     O Globo Fantastico
11/09/2013     NSA shares raw intelligence including Americans' data with Israel     The Guardian
16/09/2013     'Follow the Money': NSA Monitors Financial World     Der Spiegel
20/09/2013     Belgacom Attack: Britain's GCHQ Hacked Belgian Telecoms Firm     Der Spiegel
28/09/2013     N.S.A. Gathers Data on Social Connections of U.S. Citizens     The New York Times
04/10/2013     Secret NSA documents show campaign against Tor encrypted network     The Washington Post
04/10/2013     Talk by Roger Dingledine of Torproject.org at the NSA     The Washington Post
04/10/2013     NSA and GCHQ target Tor network that protects anonymity of web users     The Guardian
06/10/2013     American and Canadian Spies target Brazilian Energy and Mining Ministry     O Globo Fantastico
14/10/2013     NSA collects millions of e-mail address books globally     The Washington Post
20/10/2013     Fresh Leak on US Spying: NSA Accessed Mexican President's Email     Der Spiegel
21/10/2013     France in the NSA's crosshair: phone networks under surveillance     Le Monde
24/10/2013     Espionnage de la NSA : "Une ligne rouge a été franchie", pour la CNIL     Le Monde
24/10/2013     NSA monitored calls of 35 world leaders after US official handed over contacts     The Guardian
25/10/2013     The NSA wiretapped French diplomats in the US     Le Monde
27/10/2013     Embassy Espionage: The NSA's Secret Spy Hub in Berlin     Der Spiegel
28/10/2013     La NSA espió 60 millones de llamadas en España en sólo un mes     El Mundo
30/10/2013     NSA infiltrates links to Yahoo, Google data centers worldwide, Snowden documents say     The Washington Post
01/11/2013     Snowden document reveals key role of companies in NSA data collection     The Guardian
03/11/2013     No Morsel Too Minuscule for All-Consuming N.S.A.     The New York Times
04/11/2013     How we know the NSA had access to internal Google and Yahoo cloud data     The Washington Post
04/11/2013     Claves y giros del espionaje masivo en España     El Mundo
17/11/2013     'Royal Concierge': GCHQ Monitors Diplomats' Hotel Bookings     Der Spiegel
17/11/2013     Australia's spy agencies targeted Indonesian president's mobile phone     The Guardian
19/11/2013     DNI Clapper Declassifies Additional Intelligence Community Documents Regarding Collection Under Section 501 of the Foreign Intelligence Surveillance Act     Office of the Director of National Intelligence
19/11/2013     Dette sier Snowden-dokumentet om USAs overvåkning av norske telefonsamtaler     Dagbladet
20/11/2013     US and UK struck secret deal to allow NSA to 'unmask' Britons' personal data     The Guardian
22/11/2013     NSA-files repeatedly show collection of data «against countries» - not «from»     Dagbladet
23/11/2013     NSA infected 50,000 computer networks with malicious software     NRC Handelsblad
23/11/2013     N.S.A. Report Outlined Goals for More Power     The New York Times
26/11/2013     Top-Secret Document Reveals NSA Spied On Porn Habits As Part Of Plan To Discredit 'Radicalizers'     The Huffington Post
26/11/2013     Microsoft, suspecting NSA spying, to ramp up efforts to encrypt its Internet traffic     The Washington Post
02/12/2013     Revealed: Australian spy agency offered to share data about ordinary citizens     The Guardian
02/12/2013     New Snowden docs show U.S. spied during G20 in Toronto     CBC
04/12/2013     NSA tracking cellphone locations worldwide, Snowden documents show     The Washington Post
05/12/2013     Revealed: How the Nsa Targets Italy     L'Espresso
05/12/2013     The NSA Toolbox: ANT Product Catalog     gov1.info
09/12/2013     Spies Infiltrate a Fantasy Realm of Online Games     The New York Times
10/12/2013     New documents show how the NSA infers relationships based on mobile location data     The Washington Post
10/12/2013     NSA uses Google cookies to pinpoint targets for hacking     The Washington Post
10/12/2013     Snowden document shows Canada set up spy posts for NSA     CBC
11/12/2013     Read the Snowden Documents From the NSA     SVT
23/12/2013     Edward Snowden, after months of NSA revelations, says his mission's accomplished     The Washington Post
29/12/2013     NSA: Die Klempner aus San Antonio     Der Spiegel
29/12/2013     Inside TAO: Documents Reveal Top NSA Hacking Unit     Der Spiegel
30/12/2013     NSA-Programm "Quantumtheory": Wie der US-Geheimdienst weltweit Rechner knackt     Der Spiegel
30/12/2013     NSA-Totalausspähung: FDP-Politiker Baum setzt auf Generalbundesanwalt     Der Spiegel
30/12/2013     NSA's Secret Toolbox: Unit Offers Spy Gadgets for Every Need     Der Spiegel
2014
Date     Source     Publication
02/01/2014     NSA seeks to build quantum computer that could crack most types of encryption     The Washington Post
16/01/2014     NSA collects millions of text messages daily in 'untargeted' global sweep     The Guardian
27/01/2014     Spy Agencies Tap Data Streaming From Phone Apps     The New York Times
27/01/2014     Snowden docs reveal British spies snooped on YouTube and Facebook     NBC
28/01/2014     Angry Birds and 'leaky' phone apps targeted by NSA and GCHQ for user data     The Guardian
30/01/2014     For the NSA, espionage was a means to strengthen the US position in climate negotiations     Information DK
31/01/2014     CSEC used airport Wi-Fi to track Canadian travellers: Edward Snowden documents     CBC
04/02/2014     Exclusive: Snowden Docs Show UK Spies Attacked Anonymous, Hackers     NBC
07/02/2014     Exclusive: Snowden Docs Show British Spies Used Sex and 'Dirty Tricks'     NBC
08/02/2014     NSA hielp Nederland met onderzoek naar herkomst 1,8 miljoen     NRC Handelsblad
11/02/2014     The NSA's Secret Role in the U.S. Assassination Program     The Intercept
15/02/2014     Document Describes Eavesdropping on American Law Firm     The New York Times
18/02/2014     Snowden Documents Reveal Covert Surveillance and Pressure Tactics Aimed at WikiLeaks and Its Supporters     The Intercept
25/02/2014     How Covert Agents Infiltrate the Internet to Manipulate, Deceive, and Destroy Reputations     The Intercept
27/02/2014     Optic Nerve: millions of Yahoo webcam images intercepted by GCHQ     The Guardian
05/03/2014     The secret role of the Dutch in the American war on terror     NRC Handelsblad
07/03/2014     The NSA Has An Advice Columnist. Seriously.     The Intercept
11/03/2014     How a Court Secretly Evolved, Extending U.S. Spies' Reach     The New York Times
12/03/2014     How the NSA Plans to Infect 'Millions' of Computers with Malware     The Intercept
13/03/2014     Foreign Officials In the Dark About Their Own Spy Agencies' Cooperation with NSA     The Intercept
15/03/2014     Compare the NSA's Facebook Malware Denial to its Own Secret Documents     The Intercept
18/03/2014     NSA surveillance program reaches 'into the past' to retrieve, replay phone calls     The Washington Post
20/03/2014     Inside the NSA's Secret Efforts to Hunt and Hack System Administrators     The Intercept
21/03/2014     La France suspectée de cyberespionnage     Le Monde
22/03/2014     N.S.A. Breached Chinese Servers Seen as Security Threat     The New York Times
29/03/2014     'A' for Angela: GCHQ and NSA Targeted Private German Companies and Merkel     Der Spiegel
04/04/2014     The "Cuban Twitter" Scam Is a Drop in the Internet Propaganda Bucket     The Intercept
30/04/2014     British Spy Chiefs Secretly Begged to Play in NSA's Data Pools     The Intercept
30/04/2014     No Place to Hide Documents     Glenn Greenwald
19/05/2014     Data Pirates of the Caribbean: The NSA Is Recording Every Cell Phone Call in the Bahamas     The Intercept
10/06/2014     DEA/NSA SANDKEY Voice Intercepts     Cryptome
18/06/2014     Keith Alexander Talking Points     Dagbladet
18/06/2014     The NSA in Germany: Snowden's Documents Available for Download     Der Spiegel
30/06/2014     Court gave NSA broad leeway in surveillance, documents show     The Washington Post
09/07/2014     Meet the Muslim-American Leaders the FBI and NSA Have Been Spying On     The Intercept
14/07/2014     Hacking Online Polls and Other Ways British Spies Seek to Control the Internet     The Intercept
23/07/2014     Privacy watchdog's next target: the least-known but biggest aspect of NSA surveillance     The Washington Post
23/07/2014     The NSA's New Partner in Spying: Saudi Arabia's Brutal State Police     The Intercept
04/08/2014     Cash, Weapons and Surveillance: the U.S. is a Key Party to Every Israeli Attack     The Intercept
05/08/2014     Watch Commander: Barack Obama's Secret Terrorist-Tracking System, by the Numbers     The Intercept
12/08/2014     NPR Is Laundering CIA Talking Points to Make You Scared of NSA Reporting     The Intercept
15/08/2014     NSA/GCHQ: The HACIENDA Program for Internet Colonization     Heise Online
25/08/2014     The Surveillance Engine: How the NSA Built Its Own Secret Google     The Intercept
31/08/2014     A Two-Faced Friendship: Turkey Is 'Partner and Target' for the NSA     Der Spiegel
14/09/2014     Treasure Map: The NSA Breach of Telekom and Other German Firms     Der Spiegel
15/09/2014     New Zealand Launched Mass Surveillance Project While Publicly Denying It     The Intercept
11/10/2014     Core Secrets: NSA Saboteurs in China and Germany     The Intercept
20/11/2014     Vodafone-Linked Company Aided British Mass Surveillance     The Intercept
25/11/2014     Snowden-Leaks: How Vodafone-Subsidiary Cable & Wireless Aided GCHQ's Spying Efforts     Suddeutsche Zeitung
04/12/2014     Operation Auroragold: How the NSA Hacks Cellphone Networks Worldwide     The Intercept
13/12/2014     Operation Socialist: The Inside Story of How British Spies Hacked Belgium's Largest Telco     The Intercept
28/12/2014     Obama's Lists: A Dubious History of Targeted Killings in Afghanistan     Der Spiegel
28/12/2014     NSA Documents: Attacks on VPN, SSL, TLS, SSH, Tor     Der Spiegel
28/12/2014     Prying Eyes: Inside the NSA's War on Internet Security     Der Spiegel
2015
Date     Source     Publication
17/01/2015     The Digital Arms Race: NSA Preps America for Future Battle     Der Spiegel
17/01/2015     The Digital Arms Race: How the NSA Reads Over Shoulders of Other Spies     Der Spiegel
27/01/2015     CSE tracks millions of downloads daily: Snowden documents     CBC
04/02/2015     Western Spy Agencies Secretly Rely on Hackers for Intel and Expertise     The Intercept
10/02/2015     NSA Claims Iran Learned from Western Cyberattacks     The Intercept
19/02/2015     The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle     The Intercept
26/02/2015     CSE monitors millions of Canadian emails to government     CBC
26/02/2015     CSE monitors millions of Canadian emails to government     CBC
26/02/2015     CSE monitors millions of Canadian emails to government     CBC
07/03/2015     Snowden files: Inside Waihopai's domes     Stuff
10/03/2015     The CIA Campaign to Steal Apple's Secrets     The Intercept
11/03/2015     Snowden revelations: NZ's spy reach stretches across globe     NZ Herald
25/03/2015     Communication Security Establishment's cyberwarfare toolbox revealed     CBC
02/04/2015     Britain Used Spy Team to Shape Latin American Public Opinion on Falklands     The Intercept
2016
Date     Source     Publication
29/01/2016     Anarchist Snapshots: Hacked Images From Israel's Drone Fleet     The Intercept
02/02/2016     Exclusive: Snowden intelligence docs reveal UK spooks' malware checklist     Boing Boing
11/05/2016     The Secret NSA Diary of an Abu Ghraib Interrogator     The Intercept
16/05/2016     The Most Intriguing Spy Stories From 166 Internal NSA Reports     The Intercept
07/06/2016     Facing Data Deluge, Secret U.K. Spying Report Warned of Intelligence Failure     The Intercept
15/08/2016     The Raid: In Bungled Spying Operation, NSA Targeted Pro-Democracy Campaigner     The Intercept
19/08/2016     Shadow Brokers: The NSA Leak Is Real, Snowden Documents Confirm     The Intercept
29/12/2016     Top-Secret Snowden Document Reveals What the NSA Knew About Previous Russian Hacking     The Intercept
16/11/2016     Titanpointe: The NSA's Spy Hub in New York, Hidden in Plain Sight (Project X)     The Intercept
06/09/2016     Inside Menwith Hill: The NSA's British Base at the Heart of U.S. Targeted Killing     The Intercept
2017
Date     Source     Publication
10/04/2017     Burn After Reading: Snowden Documents Reveal Scope of Secrets Exposed to China in 2001 Spy Plane Incident     The Intercept
24/04/2017     Why Soviet Weather Was Secret, a Critical Gap in Korea, and Other NSA Newsletter Tales     The Intercept
24/04/2017     NSA Kept Watch Over Democratic and Republican Conventions, Snowden Documents Reveal     The Intercept
24/04/2017     NSA Blimp Spied in the United States     The Intercept
24/04/2017     Japan Made Secret Deals With the NSA That Expanded Global Surveillance     The Intercept
06/06/2017     Fifty Years Later, NSA Keeps Details of Israel's USS Liberty Attack Secret     The Intercept
19/08/2017     The U.S. Spy Hub in the Heart of Australia     The Intercept
20/08/2017     Pine Gap plays crucial role in America's wars, leaked documents reveal     Australian Broadcasting Corporation
25/10/2017     NSA Concealed Records on JFK Assassination for Decades     The Intercept
30/11/2017     NSA Secretly Helped Convict Defendants in U.S. Courts, Classified Documents Reveal     The Intercept
2018
Date     Source     Publication
01/03/2018     The Powerful Global Spy Alliance You Never Knew Existed     The Intercept
01/03/2018     Norway Used NSA Technology for Potentially Illegal Spying     The Intercept
20/03/2018     The NSA Worked to "Track Down" Bitcoin Users, Snowden Documents Reveal     The Intercept

Friday, December 3, 2021

Electromagnetic 'Scalar' War

Will Iraq Be World's First
Electromagnetic 'Scalar' War?
By Bill Morgan
10-10-2

Source material: Scientist Tom Bearden, Chenier.Org
 
Scalar Potential Interferometers
 
With the Bush people rushing us toward war it is important for everyone to realize the true and rather frightening possibility that this war will involve the use of scalar electromagnetic weapons, by any of a number of possessors of such weapons. They are called "Longitudinal Wave Interferometers," or "Tesla howitzers", and use longitudinal (LW) electromagnetic (EM) waves to accomplish true action-at-a-distance.
These are the weapons Khrushchev spoke of 40 years ago, when he declared:
 
"We have a new weapon, just within the portfolio of our scientists, so to speak, which is so powerful that, if unrestrainedly used, it could wipe out all life on earth. It is a fantastic weapon." Khrushchev, to the Presidium, Jan. 1960
 
These are also the weapons referred to in 1997 by Defense Secretary William Cohen, when he said:
 
"Others [terrorists] are engaging even in an eco-type of terrorism whereby they can alter the climate, set off earthquakes, volcanoes remotely through the use of electromagnetic waves... So there are plenty of ingenious minds out there that are at work finding ways in which they can wreak terror upon other nations...It's real, and that's the reason why we have to intensify our [counter terrorism] efforts." - Defense Secretary William Cohen, 1997
 
One of the leading experts in the new science of scalar electromagnetics is scientist Thomas E. Bearden, and he has published many papers at his website Cheniere.Org. In a letter to a writer named "Russell" (Correspondence section) Bearden says,
 
"In short, Russell, the Secretary of Defense of the United States confirmed that there are indeed novel kinds of EM weapons, right now and have been for some time, which have been and are being used to (1) initiate earthquakes, (2) engineer the weather and climate, and (3) initiate the eruption of volcanoes. We wrote about those exact uses of the weaponry decades ago. Several nations now have such weapons. Three of them (two on one side and the other on a hostile side) are even firing practice shots into Western Australia, as a convenient test range."
 
http://www.earthchangestv.com/ufo/0209gandor.htm
 
At Cheniere.org one can find Bearden's 1990 paper Historical Background of Scalar EM Weapons and see that certain possessors of these new superweapons have been developing them for several decades now. He traces the clandestine development through the sightings of anomalous phenomena all around the globe, by the statements Soviet leaders have made, and by the development of a new electromagnetic theory which restores certain "lost equations" which had been thrown out long ago in an attempt to "simplify things." Apparently the Russians were the first to restore the lost equations which uncover the domain of scalar electromagnetics.
 
The new Scalar Electromagnetic weapons utilize a new type of electromagnetic waves called "longitudinal waves" or "scalar waves." They are called by other names, as Bearden points out:
 
"We now visualize the formation of waves of pure stress in the spacetime medium (in the vacuum). These we call scalar EM waves, Tesla waves, electrogravitational waves, longitudinal EM waves, waves of pure potential, electrostatic/magnetostatic waves, and zero-vector EM waves. All these terms are synonymous. Each sheds its own particular light upon the nature of these waves or of their original discoverer, Nikola Tesla." Tom Bearden
 
http://www.cheniere.org/books/ferdelance/s23.htm
 
So there are a number of names for these newly discovered waves.
 
The big Tesla howitzers are aimed at their targets by using a worldwide electromagnetic pattern called the "Woodpecker Grid," begun by the Russians in 1976. You can even "hear" the Woodpecker Grid at Bearden's website.
 
Several times during the Cold War the Russians tried to get an agreement on limiting the use of these weapons, which Brezhnev said were "more terrible than anything the world has known." And at that time, Bearden points out, nobody in the West even knew what they were talking about.
 
The "Fer de Lance" Briefing
 
In his briefing "Fer de Lance" Slides 66-71. Bearden describes what it would be like to operate one of these longitudinal wave interferometers and aim it at place on earth using the Woodpecker Grid. By placing a "marker beacon" at that target location (the glowing orbs of plasma that are being sighted all around the world) the system can "read" the location of the target area and obtain pin-point targeting. The "Fer de Lance" briefing is a must read for anyone wanting to know what is really going on in our world today. It is a set of graphics slides with Bearden's explanations.
Instantaneous effect
 
It is hard to imagine, but a strike with longitudinal wave weapon is instantaneous as the scalar waves do not go through our "3-space" world, but around it. As Bearden puts it:
 
"... it is possible to focus the potential for the effects of a weapon through spacetime itself, in a manner so that mass and energy do not "travel through space" from the transmitter to the target at all. Instead, ripples and patterns in the fabric of spacetime itself are manipulated to meet and interfere in and at the local spacetime of some distant target. There interference of these ripple patterns creates the desired energetic effect (hence the term energetics) directly in and through the target itself, emerging from the very spacetime (vacuum) in which the target is imbedded at its distant location." Bearden Fer-de-Lance
 
What Can These New Superweapons Do?
 
1. Exothermic mode
In what is called an "exothermic mode" the howitzers can cause a blast of heat at the interference zone, an explosion of near-nuclear proportions. It could topple buildings and cause other destruction. Or it could be set wide and heat the atmosphere in that region. Or it could be set to simply destroy all electronics in that interference (target) zone, or to destroy the hubs of the electric power grids of a very wide area. Although it seems unbelievable, the actual energy of the blast is not traveling through space to hit the target, but actually being made to emerge from the local vacuum in the interference (target) zone.
 
Using the exothermic mode it is possible to make any airplane drop from the sky, anywhere. It is possible to destroy any missile, in its flight path or in its silo. Bearden sites many instances of downed planes he believes were tests of the scalar weapons. (Gandor, Newfoundland)
 
"The Woodpecker grid/howitzer weapon system can be placed over the ocean and used against cruise missiles, naval surface-to-air and surface-to-surface missiles, submarine-launched ballistic and cruise missiles, etc. Placed over a carrier task force, it can also take care of the aircraft launched by the carrier as fast as they are launched. It can also handily take care of the missiles launched by guided-missile cruisers of the accompanying task force."
 
(Bearden http://www.cheniere.org/books/ferdelance/s65.htm )
 
Here is a slide which shows the exothermic mode of action.
 
2. Endothermic mode
In a second howitzer mode called the "endothermic" mode, the howitzer sucks energy out of the target area, essentially creating a blast of cold at the distant target. It is even capable of freezing parts of the ocean. Bearden gives a number of cases where these "cold explosions" have been witnessed, mostly by airline pilots. April 9, 1984: 1 2 3 ) A huge mushroom cloud of mostly water is seen rising miles into the sky from out of the ocean, an awesome sight.
 
In the endothermic mode the sucked-out energy must go somewhere, so it is vented out at some other chosen spot on the earth. These endothermic plumes have been photographed by satellite.
 
Bearden envisions the use of cold explosions in a scalar war:
 
"Cold explosions can be used to freeze tanks, personnel, and equipment. The equipment and tanks thaw out. The personnel thaw out too, but they are dead when they do." Bearden, Fer-de-Lance
 
Starting with this slide from Fer de Lance you can see a number of sightings of giant mushroom clouds of water vapor which Bearden believes were created by the Russians testing the howitzers in endothermic ("cold explosion") mode. (Keep clicking "Next Slide").
 
In another slide the endothermic mode of operation is shown.
 
3. "Mindsnapper" mode
In a third and very terrifying mode the longitudinal wave patterns can be adjusted to affect the human mind. Bearden has dubbed this mode the "Mind-snapper" mode. Use of scalar waves in this mode is also called "psychoenergetics" or "psychotronics." At low power the mind-snapper causes everyone in the interference zone to fall unconscious. At high power the mind-body connection is "snapped" and instant death occurs. Bearden describes the manner of death:
 
"Those hit by the scalar EM weapon, however, have a most peculiar death mode.
 
"Death comes-instantly and totally. There is no convulsion, no response. The entire nervous system is destroyed instantly. Every living cell in the body is killed instantly, including all bacteria, germs, etc.
 
"A body hit with this thing falls like a limp rag and lies where it falls. It doesn't decay in even 30-45 days. In a macabre fashion, it's been reduced to something like food irradiated with nuclear radiation; everything is killed, so the material is preserved for an extended period before any decay can set in."
 
http://www.cheniere.org/books/ferdelance/s81.htm
 
In psychoenergetics mode the weapons can also induce a kind of hypnogogic trance in the minds of anyone in the target zone. It this involuntary trance state one's mind would be completely open to suggestions and orders. Bearden believes that this is what happened in the case of one Captain Button who inexplicably flew his A-10 Warthog airplane into a mountain was a test of the scalar weapons, taking over a man's mind and controlling him from a distance.
 
"Remember Captain Button, flying his A-10 Warthog toward the range, suddenly peeled away from his companions and flew off cross country for over an hour? He ignored all radio messages, circled at one point (probably dropped his ordnance there), then flew until he crashed into the side of a mountain and was killed.
 
"That was a deliberate test in the mid-U.S. to demonstrate that a human could be controlled for one hour, while doing a technical set of tasks (flying an airplane), in a hypnogogic state, successfully. The test was a total success."
 
http://www.cheniere.org/misc/time.htm
 
4. Earthquake/Weather mode
 
As Secretary of Defense William Cohen pointed out, these same longitudinal wave interferometers can be used to create earthquakes in the distant target zone, as well as tornados and other storms, and the precipitation of volcanic eruptions. Weather can be manipulated by using the exothermic mode to heat the atmosphere in one place, and using endothermic mode to cool the atmosphere in another place. Even the jet stream can be pulled this way and that by these actions.
 
Anyone one who keeps watch of the weather radar date from an unretouched source like weatherTAP will have seen many anomolies which MAY indicate hits by the howitzers. According to Bearden the Russians (KGB) have been manipulating weather over North America for decades. Cheniere.Org has a number of pictures of such radar anomolies, as well as some unusual cloud formations which, Bearden says, MAY be showing the effects of the scalar wave patterns traveling the channels of the Woodpecker Grid. Keep your eyes on the skies.
 
5. Death Ray
 
Nikola Tesla had envisioned a "Death Ray," and now it is a reality.
 
"Those hit by the scalar EM weapon, however, have a most peculiar deathmode.
 
"Death comes - instantly and totally. There is no convulsion, no response. The entire nervous system is destroyed instantly. Every living cell in the body is killed instantly, including all bacteria, germs, etc.
 
"A body hit with this thing falls like a limp rag and lies where it falls. It doesn't decay in even 30-45 days. In a macabre fashion, it's been reduced to something like food irradiated with nuclear radiation; everything is killed, so the material is preserved for an extended period before any decay can set in."
 
http://www.cheniere.org/books/ferdelance/s81.htm
 
"Ordinary" Warfare Obsolete
 
Warfare has been changed forever by the development of these scalar energy longitudinal wave howitzers. Remember, the power for these weapons comes from the time domain, longitudinal EM waves in the vacuum of empty space, and the power is tremendous and mind-boggling. Being able to blast away at any target from a distant control booth is something that has never happened before. This is incredible power to be in control of and it divides the history of weaponry into "before" and "after." And the destructive power of these weapons is delivered instantaneously to the target from the local vacuum at the place of the target.
 
Bearden describes how the old-style machinery of war has been made obsolete. Planes can be dropped to the ground, tanks are obsolete. Bearden says of the whole "Star Wars" defense system (SDI) : "It's obsolete to Soviet scalar EM weapons that are already deployed and operationally tested in place!"
 
 
"Interference phenomena are key. One can get action at a distance -- even over hundreds of thousands of kilometers.
 
"One can engineer gravitational and inertial effects.
 
"One can engineer the nucleus, including transmute it, easily and cheaply. One could clean up all the nuclear wastes. Electromagnetic energy can be produced at a distant target, or extracted from a distant target. This is not energy transmission through space in the form of EM force fields. Instead, it is transmission through spacetime in the form of electrogravitational potentials. Conventional EM shielding is ineffective against scalar EM."
 
http://www.cheniere.org/books/ferdelance/s104.htm
 
The fact that these weapons can transmute atoms means they can have a metal softening effect, leaving one to wonder if it were a clandestine use of a scalar interfermeter which brought down the Twin Towers. We may never know, since THAT evidence was so quickly destroyed without study.
 
Tesla Domes
 
The Tesla howitzers can be used in a nearly impregnable defensive mode whereby they throw up a dome (Tesla Dome) or a sphere (Tesla Globe) of highly powerful electromagnetic energy, enough to "dud" or destroy missiles which try to penetrate them. Once again, this energy is not going through space from the howitzer, but being made to emerge from the local vacuum at the location of the shell. KGB tests of these domes have been witnessed by airline pilots around the world. Bearden gives many examples of the Tesla domes being sighted around the world in his briefing paper "Fer-de-Lance." (Russian dome test, another globe incident, yet another globe test). These giant electromagnetic domes can be hundreds of miles across, or narrowed down more to total impermeability.
 
By using nested domes one can protect the domed area even against nuclear radiation itself. Tesla globes can be used to hit airborne targets by simply placing a globe of any chosen size in the flight path of the incoming missile. It does double duty because the missile hits it going in, and then the rubble hits it again going out the other side.
 
Bearden cites a number of examples of these domes being tested around the world:
March 20, 1969 | March 24, 1977 | August 17, 1980 | June 17, 1966 | June 18, 1982 June 22, 1976
 
So while the Russians have arrived at a near perfect missile defense, the West is still messing around trying to hit an incoming missile with another missile.
 
 
 
Vulnerabilities
 
Bearden lists some of the vulnerabilities the new weapons create:
 
"Almost every weapon system we presently have -- or are developing -- is totally vulnerable to scalar EM weaponry.
This includes personnel, electronics (including fuzing and warhead), explosives, propellants, fuels, ordnance, ships, submarines, torpedoes, aircraft, helicopters, missiles, drones, rockets, tanks, armored vehicles, weapons carriers, self-propelled and towed artillery, communications, [see also] satellites, radars, command and control, directed energy weapon systems, surveillance and sensor systems, mines, artillery rounds and ammunition, nuclear warheads, etc.
We are in dire straits. We need a "Manhattan Project" of the highest priority. Now!
The Soviets have already had the equivalent of seven or eight Manhattan Projects in this area."
 
http://www.cheniere.org/books/ferdelance/s105.htm
 
 
Crop circles, Glowing Orbs, and Scalar Interferometers
 
Scalar interferometry may explain many unusual phenomena that are being sighted. Two immediately come to mind, the glowing orbs that are being seen in the skies around the world, and the crop circles. Both phenomena could be easily accomplished with the new scalar superweapons. Balls of plasma flying through the sky at phenomenal speeds may well be the "marker beacons" of the scalar weapons. Marker beacons are created for fine tuning the aiming of the devices. Air Force jets were recently sent aloft from Edwards AFB to chase two just glowing orbs. After chasing them a while, the orbs simple vanished. That is to say, the scalar beams creating the orb were turned off.
 
By feeding a graphic pattern into the aiming software such a plasma ball could be made to trace out that pattern, at the distant interference zone (target zone), making the standing crops fall over, creating a crop circle. Remember there are many modes and effects of these weapons. They are really the engineering of reality itself.
 
 
Summary
If Tom Bearden's information is correct then we will have to reexamine world affairs in a new light, seeing the maneuvering of those forces who possess the new weapons. For one thing, there is no defense against such weapons other than having the weapons oneself. And it would appear that Russia (actually the KGB) is the most advanced in the development of these weapons, at least according to Tom Bearden, who has briefed the U.S. Military on these issues a number of times.
 
With the Bush cabal about to attack Iraq, against the objection of nearly the entire rest of the world, one has to wonder if we are about to see the world's first overt scalar war.
 
If the U.S. is to prevail in that attack, it can only be with the tacit permission of the Russian possessors of this technology, for they could easily cause any sky or land attack to fail. They could drop the warplanes out of the sky, cause tanks and all communications to fail, cause whole battallions to drop dead like limp rags. If they wanted to they could put up a Tesla dome over Baghdad that would be impenetrable to missiles, planes and bombs.
 
Won't it just be too tempting for some possessor of this technology to try turn the tide of the coming war with longitudinal wave interferometers? And will that lead to an all out war with these same weapons? The world's first scalar electromagnetic war? Or will restraint be shown, by all possesors of these weapons, allowing an old-fashioned war to proceed in the old-fashioned way?
 
 
The devices called "Tesla howitzers" can be put to a myriad of peaceful uses, including reversing global warming (vent the heat to outer space), and preparing a surefire means of preventing any asteroids from hitting the earth.
 
Bearden says that the Russian possessors of these devices must surely have understood that the devices could wipe out all life on earth, even upsetting the scalar balance of earth and sun resulting in large storms on the sun. They can also backfire on the user of them:
 
"Perhaps with the free and open release of Tesla's secret, the scientific and governmental bureaucracies will be shocked awake from their slumber, and we can develop defenses before Armageddon occurs. Perhaps there is hope after all -- for even Brezhnev, in his strange July, 1975 proposal to the SALT talks, seemed to reveal a perception that a turning point in war and weaponry may have been reached, and that human imagination is incapable of dealing with the ability to totally engineer reality itself.
 
"Having tested the weapons, the Soviets must be aware that the ill-provoked oscillation of timeflow affects the minds and thoughts -- and the very lifestreams and even the collective species unconsciousnesses -- of all lifeforms on earth. They must know that these weapons are two-edged swords, and that the backlash from their use can be far more terrible to the user than was the original effect to his victim.
 
"If we can avoid the Apocalypse, the fantastic secret of Nikola Tesla can be employed to cure and elevate man, not kill him. Tesla's discovery can eventually remove every conceivable external human limitation. If we humans ourselves can elevate our consciousness to properly utilize the Tesla electromagnetics, then Nikola Tesla -- who gave us the electrical twentieth century in the first place -- may yet give us a fantastic new future more shining and glorious than all the great scientists and sages have imagined."
 
http://www.cheniere.org/books/part1/teslaweapons.htm
 
The secrecy with which this technology has been held from the human race can only be called a crime again humanity. Instead of using these incredible new discoveries for good, for free energy, and for healing, shadowy groups around the world have used the technology to make terrible weapons of war such as the earth has never dreamed of.
 
A final word from Tom Bearden:
 
"The "terror" in the "balance of terror" between nations has just increased by many, many orders of magnitude.
 
"The biblical prophecy that the Earth will be wiped out by "fire and brimstone from heaven" is very near fulfillment now.
 
"Put another way, the pucker factor -- even on the Russians who may contemplate unleashing Armageddon -- is higher than any Western strategic analyst has ever imagined, even in his wildest nightmares.
 
"Truly these weapons are "more frightening than the mind of man has imagined," as Brezhnev put it in 1975.
 
"The frightening scalar EM weapons can be used, but only very, very gingerly indeed. If a slight mistake is made, everybody loses everything."
 
http://www.cheniere.org/books/ferdelance/s74.htm

Sunday, November 7, 2021

ENMOD (Environmental Modification) Partial List Of Effects

 Weather Manipulation:
Weather weapons, water denial, floods, extremes.
Weather warfare, floods, snow, assisted biological attacks.
Massive insider insurance fraud.
Massive insider/secret war expenditures and foreign contractors.



Mind Control:
Mass Druggings.
Chemical Conditioning.
Electronic entrainment with HP ELF (High Powered Exremely Low Frequency Ground Waves) and other energies.
Corruption of the Schumann Resonance.
Hot spots on ground corresponding to lines in sky, some patents call the lingering and spreading petrochemical particulate lines "Ground Heaters".
Sleep deprivation.
Behavior modifying configurations causing sleepiness, tenseness, anxiety, anger, hate, and more.  Can be focused into very small areas, or used with phased array antennae across square miles.  Jose Delgado of Yale proved you can entrain minds by broadcasting patterns similar to those recorded from brains in various states, even drug induced states.



Magnifying Transmitter Phased Array Antennae operations:
Earthquakes, Tsunamis.
Ionospheric manipulation, ionospheric depletions, potentially fatal or cancer causing radiation intensifications.
High amplitude ultrasound attacks on individuals, locations, or across many miles.  Ultrasound attacks on an individual results in bodily damage, sleep deprivation, anxiety, blood pressure spikes and more.  High Powered Ultrasound attacks  on locations can result in deniable property damage or unnoticed but cumulative property damage, accelerated decay.   Ultrasound across large areas = temperature drops, sometimes radical, and other effects.
Local and large explosions as seen during demolitions at 911 and OKC, both cleaned up by CDI (Controlled  Demolition Incorporated).  FYI Tesla did Tunguska.


Known surveillance vectors of Aerosol Active Auroral Technologies:
Tiltable ionosperic mirrors for over the horizon eavesdropping of all types.
Teslas "Eye In The Sky" that can produce very detailed imagery of anywhere, even underground up to 1/4 mile through the use of technology which can either draw energy from the target or induce energy in the target, all done with high amplitude radiations and novel configurations like laser fields.
AI assisted audio surveillance that in the early 90s could pick out one voice in 5000 from a voice print.  Then information about this tech just stopped.  Like so much else.
A secret police state was initiated by super traitor bush and he successfully and secretly internationalized our law enforcement so that one big world police state was created starting here.  The NSA center at Salt Lake City is a big player in all this.

ENMOD WAS INTRODUCED SECRETLY BY SUPER TRAITOR JORGE BUSH THE SECOND AFTER HIS ASSIST WITH THE SUCCESSFUL ISRAELI COUP @ 911.  It is a total take over technology.

 




 

Thursday, March 25, 2021

The US Military Is Experimenting On Americans Daily

 Just got back from town, there were a lot of dissipating trails sprayed in the sky in conjunction with my movements on the ground, and then chemtrails started as soon as I got back to the house.  The masons here have made a satans bargain concerning their rain, they are in a wienie cheap lying cowboy thing which they do really well, to quote al jourgensen, beers steers and queers....cowboys....nm is full of that....anyway, they have been charged to make human sacrifice against the enemies of the world government, which the masons bought into a big way here, just to get rain.  When they succeed in their butt licking cowboy deeds they get rain, and when they fail, they get drought.  They too have sold their souls to the world government, they are not humans, they are not men, they are worms.








Tuesday, March 23, 2021

Latino Stasi Police Of Deming NM

There are people here collecting DHS dollars by spying on their neighbors, and they have illegal access to the telephones and other communications.  Many efforts are taken to confuse the identity of people these stasi police are trying to disappear, today was a case in point, well organized team, but they had to use money this time, an imporvement, they used to just sub people for me in public venues where the watchers were all carefully vetted, this is cocaine cartel modus operandi, and it is rife in the american government. There has been a drug oriented civil war going on under the guise of secrecy for over 20 years now.  The world governments agents talked the religious people into this because they have them all believing that bowing down to a lord is superior to freedom.  Today they subbed somebody for me, I can tell, but their world is shrinking and going away, and no matter hard they try they will never make me be their friend nor will I work for them.  A lot is just plain old intimidation by cocaine mobsters, but some is real identity theft.  The deming police are entirely corrupt.  Many state police and others in NM too.  Bill Gallagher.  Gone from shop 3 hours afternoon of march 23 2017. 

Saturday, March 20, 2021

The Death And Destiny Of Planet Earth

      The coins immediately below are all around 1000 years old.  They are from the book Byzantine Coins by Philip Grierson.  Notice the electronic symbologies, ground, current, voltage, resistance, and also pi. Look at some of the crosses called CROSS POTENT, they very much resemble antenna.  The first three # 622 623 624 are called Arab Byzantine issues and were issued by conquering Arabs who had breached the great pyramid and found an antenna or antennae inside, antenna that socketed at the top of the pyramid. That entrance to the great pyramid is still in use today and exhibits foreknowledge. Please also notice the antennae with balls on top of the pyramid looking things, look familiar at all?  Pyramids are super grounds, tectonic ultrasound created ala Tesla within the ionospheric shell can be used to excite and emit in a big orderly way. Able to influence the entire planetary field and more. 

     A lot of the later Byzantine issues then took on aspects of antenna and other indicative things in their make up, like blatant ground symbologys, ground on globe, atmospheric capacitance indicators and other things having to do with electricity, which was the SECRET holy grail. The Crusades were all about electricity. 
     Alexandria was full of this.

      The last picture shows the emperor and Christ in distinctly TV appearing devices within the cross potent, on screens.  This ties in with other lost history that has been rediscovered, but there can only be one reason for all the secrecy, and that is covert control, taking control of peoples minds slowly without them knowing it, its the way its done.
     The cross potent on the pyramid/steps was used extensively during the time right before, during, and right after the crusades.  It is my feeling that when the Arabs found the antenna in the great pyramid it caused the church to go crazy for electricity, the real holy grail.  They knew what was possible because of technology hoards found from the last world.  Phoenicians found a lot, even Caesar referred to the ancient lost world when writing about the ancient time honored and most favored Roman method of execution, crucifixion.  I think they found pictures from the last world where politicians and police and pilots were crucified for trying to use electricity to control people.  Look to Abydos for other pictures preserved by being carved in stone, thats the time frame we are looking at, and there are other indicators too.  A lot of these lost treasures went to Alexandria, and we all know what happened to that, dont we? Conveniently removed from public attention, and early.  Everything from the last world was all in pieces and they were trying to put it back together, because they believed total and perfect electronic control of people was possible.  Its what they have always hoped for, and they even admit it.  Free labor forever.
     The pyramids were super grounds, able to convert high power tectonically generated ultrasound to usable energies, then used WITH THE MOON to keep this planet in its traverse of 360 degrees, 360 days, a perfect circle around the sun, its how engineers do it, its says God was here....this planet was optimized for agriculture, a beautiful garden.  There is plenty more evidence of this around, search out satellitediscoveries.com and the triangle project, and so much more. The pyramids were much more extended than just Egypt, it was probably a geodesic setup or something like that. The planet rotated once per degree/day, Optimized For Agriculture, A Perfect Circle.  5.25 days off that means a lot of time, and its continually deteriorating while humans squabble amongst themselves below. How embarrassing is that?  Henry Help Us.
     The moon served many purposes, and has not been maintained in a long long time. It could come apart easily. The very last picture is an early nasa pix I got once from a friendly source, shows craters in lines, caved in underground facilities on the moon.  Search out the Clementine mission, there are whole cities that were underground, caved in circles as large as LA and much much more. One of the dome covers came loose and is still floating around up there, Hoagland has pix of it.  The ignorant greedy fools running this world have a lot more than coughs and sneezes to worry about.
     A lot of the active auroral stuff bush deployed is causing accelerated perturbation of the moons orbit, and it could come apart anytime now.  I wonder if bush did that on purpose?  Its the way they are.