HUMAN CIVIL RIGHTS ACTIVE METRIC CLAY
HUMAN CIVIL RIGHTS RESEARCH INFORMATION
HISTORY CHANNEL ON MIND CONTROL HUMAN RIGHTS VIOLATIONS
ILLUMINATI ON SECERT SOCIETIES AND FREE MASONRY
MILITARY WEAPONS USED ON CIVILIANS
HITLER AND CIA PAPER CLIP
PROJECT CAMELOT AND MORE RESEARCH
THE NEW WORLD ORDER AND CIA FROM OSS
ATLANTIS AND DARK SECRETS: INSIDE BOHEMIAN GROVE
9\11 THE SECERT HISTORY AND THE GREAT CONSPIRACY
THE NAVY ELECTROMAGNETIC RAIL GUN
ABSTRACT RESEARCH ON MIND CONTROL WEAPONRY
RELIGIOUS ORGANIZATION GOVERNMENTAL MILITARY
MEDIA WORLDWIDE
HUMAN RIGHTS & SCIENCE & LEGAL & POLITICAL ORGANISATIONS
DEAR WORLD INFORMATION ON HUMAN RIGHTS VIOLATIONS
ABSTRACT RESEARCH ON MIND CONTROL WEAPONRY TWO
ABSTRACT RESEARCH ON MIND CONTROL WEAPONRY T HREE
ABSTRACT RESEARCH ON MIND CONTROL WEAPONRY FOUR
COINTELPRO AND WAR ON BLACK AMERICAN MARTIN LUTHER KING AND KENNEDYASSASSINATION
ARSENAL OF HYPOCRISTY
AMERICAN FREEDOM TO FASCISM
THE COMMUNIST PARY IN CHINA
THE COMMUMIST PARTY IN RUSSIA
INFORMATION ABOUT CIVIL RIGHTS
MORE INFORMATION ON HUMAN RIGHTS
IMAGES OF THE HUMAN AND CIVIL RIGHTS VIOLATIONS
MIND CONTROL VIDEOS AND NON-LETHAL WEAPONS
HUMAN CIVIL RIGHTS LATEST BLOGS
HUMAN AND CIVIL RIGHTS BLOG
HUMAN AND CIVIL RIGHTS ACTIVE
BLOG HUMAN AND CIVIL RIGHTS
LANDMINES AND INTERNATIONAL NEGOTIALIONS TO BAN CLUSTER BOMBS
NUCLEAR WEAPONS TESTS
BLOG INFORMATION TAKE ACTION
SCALAR WAVES, WEAPONS AND ENERY
MILITARY PSYCHOLOGICAL WARFARE
ALEX JONES AND COINTELPRO AND BIBLE PROPHECY
AMERICA TO FASICISM AND FRED HAMPTON
HATE CRIMES VIDEOS AND RACISM
BIBLE PROPHECY IN THE NEWS AND KABBALA
HUMAN AND CIVIL RIGHTS VIOLATIONS OF DIRECT ENERGY WEAPONS
GENERAL PSYCHOLOGY AND MENTAL HEALTH
CHEMICAL AND ENERGY
ISLAMIC WORLD AND NUCLEAR, TERRORIST GROUPS, AND RELIGOUS THEOLOGY
UNDSTANDING COMPUTERS, CODE C+ C++ AND JAVA SOFTWARE
UCLA Anderson School of Management
UNITED NATIONS YOUTUBE VIDEOS
CLAY’S PLACE
Home Education, Human Resources,
Privacy Invasion and Health
RESEARCH METHODS
Metric Clay
Human Rights Active
1701 Ridley Lane
Starkville, MS. 39759
662-324-5865
[email protected]
http://home.bellsouth.net/p/PWP-metclay
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 2 O F 51
Heart Disease:
Heart Attacks
More than 1 million Americans have heart attacks each year. A heart attack, or myocardial
infarction (MI), is permanent damage to the heart muscle. "Myo" means muscle, "cardial" refers
to the heart and "infarction" means death of tissue due to lack of blood supply.
What Happens During a Heart Attack?
The heart muscle requires a constant supply of oxygen-rich blood to nourish it. The coronary
arteries provide the heart with this critical blood supply. If you have coronary artery disease,
those arteries become narrow and blood cannot
flow as well as it should. Fatty matter, calcium,
proteins and inflammatory cells build up within
the arteries to form plaques of different sizes. The
plaque deposits are hard on the outside and soft
and mushy on the inside
ABSTRACT
These movies information is about the proof of the illegal privacy invasion that can cause a lot of
problems and sickness that is plaguing mankind. The coma causing and heart attack causing
hospitalization is the result of some from of illegal privacy invasion one way are another. The
Alzheimer's, Epileptic Seizures, Dyslexic, mind control, Schizophrenia, Radiation sickness, Heart
Attacks, Breath Cancer Cervical Cancer and Bipolar Disorder. The illegal experimental privacy
invasion through different form of technology is causing most of these plagues by using the
Satellites, Radar, Telephone lines, Cellular phones, Microwave technology, and power line hacking.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 3 O F 51
INFORMATION
Frequently Asked Questions About Alzheimer's Disease
Does Alzheimer's disease affect only the elderly?
While most Alzheimer's victims are more than 65 years old, it can strike men and women in their
40s and 50s.
How many people are afflicted with Alzheimer's disease?
It affects an estimated 4 million American adults. It is the most common form of dementing illness.
Can an Alzheimer's patient die of the disease?
More than 100,000 die of complications from Alzheimer's disease annually, making it the fourthleading
cause of death in adults, after heart disease, cancer and stroke.
Does the disease strike one gender more than the other?
The disease knows no social or economic boundaries and affects men and women almost equally.
What are the symptoms of Alzheimer's disease?
Symptoms of Alzheimer's disease include a gradual memory loss, decline in ability to perform
routine tasks, impairment of judgment, disorientation, personality change, difficulty in learning and
loss of language skills.
Do all the symptoms appear at the same time?
No. There is a variation in the rate of change from person to person. The disease can eventually
renders its victims totally incapable of caring for themselves.
What is the cause of Alzheimer's disease?
The cause of Alzheimer's disease is not known and is currently receiving intensive scientific
investigation. Suspected causes include a genetic predisposition, a slow virus or other infectious
agents, environmental toxins and immunologic changes. There are other factors under investigation.
How is Alzheimer's disease diagnosed?
There is no single clinical test to identify Alzheimer's disease. Before diagnosis of the disease is
made, other conditions must be excluded such as depression, adverse drug reactions, metabolic
changes, nutritional deficiencies, head injuries and stroke.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 4 O F 51
BREAST CANCER
Breast cancer is the most common malignancy in women and the second leading cause of cancer
death (exceeded by lung cancer in 1985). Breast cancer is three times more common than all
gynecologic malignancies put together. The incidence of breast cancer has been increasing steadily
from an incidence of 1:20 in 1960 to 1:7 women today.
1. The American Cancer Society estimates that 211,000 new cases of invasive breast cancer will be
diagnosed this year and 43,300 patients will die from the disease. Breast cancer is truly an epidemic
among women and we don't know why.
Breast cancer is not exclusively a disease of women. For every 100 women with breast cancer, 1
male will develop the disease. The American Cancer society estimates that 1,600 men will develop
the disease this year. The evaluation of men with breast masses is similar to that in women, including
mammography.
The incidence of breast cancer is very low in the twenties (age) gradually increases and plateaus at
the age of forty-five and increases dramatically after fifty. Fifty percent of breast cancer is diagnosed
in women over sixty-five indicating the ongoing necessity of yearly screening throughout a woman's
life.
Breast cancer is considered a heterogenous disease, meaning that it is a different disease in different
women, a different disease in different age groups and has different cell populations within the tumor
itself. Generally, breast cancer is a much more aggressive disease in younger women. Autopsy
studies show that 2% of the population has undiagnosed breast cancer at the time of death. Older
women typically have much less aggressive disease than younger women
WHAT IS DYSLEXIA?
Dyslexia is a brain-based type of learning disability that specifically impairs a person's ability to read.
These individuals typically read at levels significantly lower than expected despite having normal
intelligence. Although the disorder varies from person to person, common characteristics among
people with dyslexia are difficulty with phonological processing (the manipulation of sounds) and/or
rapid visual-verbal responding.
Is there any treatment?
The main focus of treatment should be on the specific learning problems of affected individuals. The
usual course is to modify teaching methods and the educational environment to meet the specific
needs of the individual with dyslexia.
What is the prognosis?
For those with dyslexia, the prognosis is mixed. The disability affects such a wide range of people,
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 5 O F 51
producing different symptoms and varying degrees of severity, that predictions are hard to make. The
prognosis is generally good, however, for individuals whose dyslexia is identified early, who have
supportive family and friends and a strong self-image, and who are involved in a proper remediation
program.
What research is being done?
The NINDS and other institutes of the National Institutes of Health, including the National Institute
of Child Health and Human Development and the National Institute of Mental Health, conduct
research on dyslexia. Current research avenues focus on developing techniques to diagnose and treat
dyslexia and other learning disabilities, increasing the understanding of the biological basis of
learning disabilities, and exploring the relationship between neurophysiological processes and
cognitive functions with regard to reading ability.
What Are Seizures and Epilepsy?
Seizures are the primary symptom of epilepsy. Seizures occur when the brain's electrical signals
misfire and a person's consciousness or actions are altered for a short period of time. When the
electrical signals return to normal, usually within a few seconds or a few minutes, the seizure stops.
1. Epilepsy is characterized by recurring seizures. It is not contagious and usually not hereditary,
although a predisposition to seizures may be apparent in certain families.
Epilepsy, a word of Greek origin meaning "to hold or seize," is a fairly common neurological
condition caused by brief bursts of electrical impulses in the brain. Seizures may be triggered by
repetitive sounds, flashing lights, or touch to certain parts of the body. Epileptic seizures affect about
2 million Americans of all races and religions, and both genders. Epileptic seizures are most likely
to appear in two stages of life: either before age 15 or after age 65.
Seizures usually occur without warning and without the person's awareness of what is happening.
Some people with epilepsy will have only an occasional seizure, while others will have many on a
daily basis.
Many children will eventually outgrow their seizures. Having a single seizure does not necessarily
mean that someone has epilepsy. For instance, an infant or young child with a rectal temperature
higher than 102 degrees Fahrenheit (38.9 degrees Celsius) may lose consciousness and shake for a
minute or 2 but most febrile seizures are harmless to the child and do not indicate epilepsy.
Types of Seizures
There are several different types of seizures. Seizures are known as generalized seizures if the
whole brain is misfiring, and partial seizures if only one part of the brain is affected. Some of the
most common types of seizures are:
Convulsive seizures (tonic-clonic or grand mal seizures): symptoms may include a sudden cry,
loss of consciousness, falling, loss of bladder or bowel control, and uncontrollable shaking
of the entire body. These seizures are generalized.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 6 O F 51
Absence seizures (petit mal seizures): symptoms include staring blankly without a loss of
consciousness, rapid blinking, chewing actions, or twitching facial muscles. These seizures
are generalized.
Simple partial seizures: These occur while a person is awake. Symptoms may include abnormal
sensations or movements of a certain part of the body while the person is awake; one part of
the body, arm, leg, or face may jerk.
Complex partial seizure: These begin with a 1- to 2-minute period during which the person
loses touch with surroundings. Similar to an absence seizure, but it is followed by random
actions such as picking at clothing or trying to remove it.
WHAT IS SCHIZOPHRENIA?
Schizophrenia is a brain disorder that affects almost 2.2 million American adults (approximately 1
out of every 100). If you or someone you love has schizophrenia, treatment can help.
People with schizophrenia often have trouble thinking clearly or making decisions. They may have
a hard time telling real life from fantasy. They may also find it a challenge to deal with other people.
These can all be symptoms of schizophrenia.
Schizophrenia generally consists of the following kinds of symptoms.
Positive symptoms: Such as delusions or hallucinations which are also known as seeing or believing
things that are not real. (These are called ““positive”” symptoms because they are there but
shouldn’’t be.)
Negative symptoms: Such as social avoidance, emotional withdrawal which are also known as a
lack of feeling, or expression. Starting to do things, but not following through. Taking no pleasure
or interest in life. (These are called ““negative”” symptoms because they refer to things that are missing.)
Disorganized symptoms: Confused in thinking and speech. Acting in ways that do not make sense.
The above are the most common symptoms of schizophrenia, but they can also happen at the same
time as the following symptoms: not being able to focus, unable to solve simple problems, being sad,
or not being able to remember things.
What causes schizophrenia?
No one knows for sure. But experts think it is linked to certain chemicals in the brain. When these
chemicals are out of balance, a person can get schizophrenia. The illness seems to be caused by
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 7 O F 51
different things. A family history of the disease is one example.
While there is no cure for schizophrenia, it can be treated. Many people are able to feel better by
taking medicines called antipsychotics. These medicines can help people with schizophrenia stop
seeing things that others do not see. Or feeling sad and depressed. Or not trusting people around
them. Antipsychotic medicines seem to work by restoring the balance of chemicals in your brain.
BIPOLAR DISORDER
Bipolar disorder, also known as manic-depression, affects at least 2 million Americans at any given
time. The disorder is characterized by alternating periods of extreme moods. A person with Bipolar
disorder experiences cycling of moods that usually swing from being overly elated or irritable
(mania) to sad and hopeless (depression) and then back again, with periods of normal mood in
between. For those who have this disorder, it can be extremely distressing and disruptive. The
frequency of the swings between these two states, and the duration of the mood, varies from person
to person.
Bipolar disorder typically begins in adolescence or early adulthood and continues throughout life.
It is often not recognized at first as a serious disorder, and people who have it may suffer needlessly
for years or even decades. This disorder is not a character flaw, and it is not your fault. It is a serious
mood disorder that affects a person's ability to function in every day activities. It affects one's work,
one's family, and one's social life.
Today, much more is known about the causes and treatment of this mental health problem. We know
that there are biological and psychological components to every bipolar disorder and that the best
form of treatment is a combination of medication and psychotherapy. Contrary to the popular
misconceptions about bipolar disorder today, it is not a purely biochemical or medical disorder.
However, with the proper treatment, Bipolar disorder can be effectively managed and a person can
lead a normal life.
A person's family history and genetics often play an important role in the greater likelihood of
someone having this disorder in their lifetime. Increased stress and inadequate coping mechanisms
to deal with that stress may also contribute to the disorder's manifestation. Bipolar disorder is most
often experienced as a swing between a manic and a depressed mood, which may often be related
to increased stress or other event in a person's normal life. Nearly anything can trigger a person to
shift in mood, and sometimes there is no obvious trigger at all. Often, the first manic episode is
triggered because of some external stressor the person has experienced. However, the hallmark of
Bipolar disorder is that the person's extreme moods often seem to come on of their own accord. Once
the person's mood begins to cycle, there is often not an external reason the person can find for feeling
the way that he/she does.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 8 O F 51
We have developed the information here to act as a comprehensive guide to help you better
understand bipolar disorder and find out more information about it on your own. Choose from
among the categories at left to begin your journey into recovery.
METHODS OF SPECIFIC CONCEPT RECOGNITION
The Defense Advanced Research Projects Agency in 1972 contracted Pinneo & Hall for work
that a 1975 US technical report entitled “Feasibility Study For Design of a Biocybernetic
Communication System.” The study concludes “that it is feasible to use the human EEG coincident
with overt and covert speech as inputs to a computer for such communication” (covert speech is
defined as verbal thinking.) 2 The 149 page report1 states: “enough information has been obtained
. . . to specify the optimum parameters to use for an EEG operating system, and to suggest future
research towards that end.”
Pinneo & Hall utilized templates for EEG word recognition constructed by averaging EEG patterns
evoked by 9 words in each subject for visually presented words, and primarily utilized 4 electrodes
over brain language areas for prediction. People with high hemispheric lateralization had EEG
patterns for some words that frequently classified 100% correctly, regardless of the number of
repetitions with stability over time. Over all words, however, classification accuracy for these people
was 85% for overtly, and 72% for words repeated to oneself, but solely by mental means without
vocalization. Across all subjects specific word EEG patterns were classified 35% correctly for
overtly, and 27% correctly for covertly spoken words, but more people were in the 70-100%
classification range than in the 10-15% range. 1 Subjects with low hemispheric laterality, particularly
stutterers had near chance EEG classification. EEG concept recognition was actually 10-15% higher
for pictures rather than words. Phrases containing similarly articulated words or homonyms were
better recognized than these words alone without context.
REMOTE AND PROXIMATE BRAIN WAVE
CAPTURE METHODS
Contact electrodes with conductive paste typically record EEG, while MEG detectors are in an array
slightly removed from the head. Remote detection of brain rhythms by electrical impedance sensors
is described. Though non-contact is the only remote descriptor for EEG, this same detector design
is applied to monitoring electrocardiogram with wrist sensor location Passive brain wave fields
extend as far as 12 feet from man as detected by a cryogenic antenna This device is entirely
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 9 O F 51
adaptable to clandestine applications, and pointed comments are made on the disappearance of
physiological remote sensing literature since the 1970’s for animals and humans, while all other
categories of remote sensing research greatly expanded.
In 1976, the Malech Patent # 3951134 “Apparatus and method for remotely monitoring and altering
brain waves” was granted.i Example of operation is at 100 and 210 MHz, which are frequencies
penetrating obstruction. ii “The individual components of the system for monitoring and controlling
brain wave activity may be of conventional type commonly employed in radar”; and “The system
permits medical diagnosis of patients, inaccessible to physicians, from remote stations” are quotes
indicating remote capacity. License is to Dorne & Margolin Inc., but now protection is expired with
public domain. The Malech patent utilizes interference of 210 and 100 MHz frequencies resulting
in a 110 MHz return signal, which is demodulated to give EEG waveform. The capability of remote
EEG is predicted by electromagnetic scattering theory using ultrashort pulses, which is different from
the unpulsed Malech patent. Ultrashort pulses are currently defined in the range of 10-12 to 10-15
second. Considering that EEG word elicited potentials are comparatively long (hundreds of
milliseconds), indicates that remote radar brain wave capture is adequate to word recognition, with
ultrashort pulses allowing some 109 or more radar reflections in a millisecond (10-3 sec.)
The possibility of impressing an ‘experience set’ on an individual by ultrashort pulses is also
contemplated.163 The above patent can alter brain waves as well as detect them. Microwave nonlethal
weapon brain wave disruption and behavioral change including unconsciousnessare known.
THOUGHT READING COVERT DEVELOPMENT
EVIDENCE
The research arm of agencies with missions to covertly acquire information would certainly develop
to operational capability any thought reading potential, which was reported feasible some 30 years
ago to the Department of Advanced Research Projects Agency (DARPA.) Reports that such
development has progressed are multiple, and two are confirmed by details of the 1975 DARPA
EEG specific word recognition report, which itself is evidence of development covert to open
databases. An International Committee of the Red Cross Symposium synopsis states EEG computer
mind reading development by Lawrence Pinneo in 1974 at Stanford. A letter by the Department of
Defense Assistant General Counsel for Manpower, Health, and Public Affairs, Robert L. Gilliat
affirmed brain wave reading by the Advanced Research Projects Agency in 1976, the same year as
Malech remote EEG patent grant.
Other assertions affirm each other as to specifics. News articles quote Dr. John Norseen of
Lockheed Martin Aeronautics that thought reading is possible and has had development. He
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 10 O F 51
predicted by 2005 the deployment of thought reading detectors for profiling terrorists at airports.170
A further acknowledgement of developing a device to read terrorists’ minds at airports was made
in a NASA presentation to Northwest Airlines security specialists Statements in all articles indicate
remoteness of brain wave detection, though somewhat proximate.
“Thought reading or synthetic telepathy” communications technology procurement is considered in
a 1993 Jane’s Special Operations Forces (SOF) article: “One day, SOF commandos may be capable
of communicating through thought processes.” Descriptive terms are “mental weaponry and psychic
warfare” Although contemplated in future context, implied is availability of a technology with
limited mobility, since troop deployment anticipation must assume prior development. Victim
complaints that mind reading is part of an assault upon them are very similar to such a capacity.
Other complaints by these victims, such as technologic internal voice assault are upheld by
considerable documentation that internal voice transmission is feasible, even at a distance and within
structures, and a presumptive diagnosis of such complaints is largely consistent with microwave
exposure--a basis for both internal voice and EEG capture technologies.
http://www.thefreedictionary.com/
The Stargate Project was one of a number of code names used to cover "remote viewing programs."
Others included Sun Streak, Grill Flame, and Center Lane, by DIA and Inscom, and Scangate
by CIA, from the 1970s, through to 1995. It was an offshoot of research done at'SRI' (Stanford
Research Institiute).
The research program was launched partly because some intelligence officers believed a 'psi-gap' had
emerged between America and the Soviet Union, for example the reputed abilities of Nina Kulagina.
But it was also borne of the soul searching that took place in the American military post Vietnam,
and a willingness that subsequently emerged to 'think outside the box,' as exemplified by Jim
Channon's 'First Earth Batallion' briefing.
Remote sensing of places or events is normally performed in the present, but sessions have also been
undertaken in the past and future. One of the outcomes from the funding was a set of protocols
designed to make clairvoyance a more scientific process, and minimize as much as possible session
noise and inaccuracy. The term "remote viewing" emerged as a generalised short hand to describe
this more structured approach to clairvoyance.
The project was eventually terminated, according to the official report at the time, because there was
insufficient evidence of the utility of the intelligence data produced. However, in the generalized
intelligence and defense budget cuts of the period, many projects lost funding. More realistically the
unit was terminated because of managerial failure. In 1989 new civilian administrators unfamiliar
with CRV protocols, had brought in tarot card readers and channelers. As a result, the quality of the
session data produced had rapidly deteriorated.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 11 O F 51
In 1995 the project was transferred to the CIA and a retrospective evaluation of the results was
performed. The CIA contracted the American Institutes for Research for this evaluation. An analysis
conducted by Professor Jessica Utts showed a statistically significant effect. While agreeing with this
basic analysis, noted long time CSICOP psychic debunker Ray Hyman suggested the results were
not enough on their own, and a wider data set was required. Based upon Ray’s finding that the
intelligence utility was yet to be demonstrated, even if it was a real phenomena, the CIA followed
the recommendation to terminate the project.
Key Project Personnel
Firstly, it should be noted there is no comprehensive formal history of the project, and there may well
be key members who have chosen to remain anonymous. However, certain members of the project
have come forward, and certain details of the personnel are available.
Major General Albert Stubblebein
A key sponsor of the research internally at Fort Meade, convinced of the reality of a wide variety of
psychic phenomena, he never mastered walking through walls, although he did greatly bruise his
noise in numerous attempts. In the early 1980s was responsible for Army intelligence. Some
commentators have confused 'Project Jedi' run by special forces primarily out of Fort Bragg with
Stargate. In fact General Stubblebein was poorly received when he visited Fort Bragg, and did not
participate nor was aware of the goat lab experiments being conducted.
Ingo Swann
Coined the term 'remote viewing' as a derivation of protocols originally developed by René
Warcollier, a French chemical engineer in the early 20th century, documented in the book Mind to
Mind. Swann's achievement was to break free from the conventional mould of casual
experimentation and candidate burn out, and develop a viable set of protocols that put clairvoyance
within a framework named “Coordinate Remote Viewing" (CRV).
Joe McMoneagle
In the early 1970's Joe had a Near Death Experience (NDE) that bestowed him with exceptional
psychic powers. Widely considered a "natural," Joe has stated that remote viewing ability is
predominately determined by innate talent. While many disagree with this statement, it is notable
none of his critics seem able to work to the same level as Joe. Joe's definition implies that remote
viewing is any psychic undertaking that is performed under scientific protocols.
Lyn Buchanan
A sergeant brought in by General Stubblebein for two main reasons. Firstly extraordinary telekinetic
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 12 O F 51
abilities, secondly computer software expertise. This made him exceptionally well qualified to be
the data base manager for the Stargate project. From this vantage point, Lyn had the opportunity to
work with all the key members of the unit, and in possession of statistical analysis of the session
data, was able to properly assess the accuracy of the session data obtained. After leaving the forces,
Lyn founded Problems, Innovations, Solutions, contracted Mel Riley to work for his company, and
continues to undertake private tuition.
Mel Riley
Army Sergeant who retired in 1991. Mel is another natural psychic, and was noted for being able to
describe what lay under objects in aerial photography. This aroused inconclusive interest in the
1970s. In 1984, the CRV unit had only several trained remote viewers, and Mel was requested
transferred to the unit. Based upon his innate ability, with training in the CRV protocols, Mel quickly
became an impressive remote viewer. Mel was featured in the documentary released in 1995 by the
BBC titled "The Real X-Files." He has recounted past life experiences as a Native American, and
continues to be involved in native American culture, enjoying a quiet life with his wife.
Paul H. Smith
Retired U.S. Army Major and intelligence officer. Paul was one of the five people trained as a
prototype test subject in Ingo Swann's psychic development of the Coordinate Remote Viewing
(CRV) protocols in 1983. Paul was later assigned to work part time in the Defense Intelligence
Agency’s remote viewing unit. He was the main author of what is known today as the “CRV
Manual” which was written as an effort to describe CRV technology for the sole purpose to solicit
continued annual funding for the unit from congress. The CRV manual was not written under the
guidance of Ingo Swann, nor was it written for the purpose of teaching CRV. Paul, having natural
artistic abilities, produced impressive CRV session sketches. He always preferred to remote view
in the blind, being tasked with CRV coordinates by a project manager. Paul rarely took the initiative
to perform CRV session analysis of his own work or to operate as the team project manager.
Ed Dames
One of the first five who were trained by Ingo Swann in the Coordinate Remote Viewing protocols.
Quickly established a reputation for pushing CRV to extremes, with target sessions on Atlantis,
Mars, UFOs, and aliens. Many in the unit despised him for this. Joe McMoneagle has expressed the
opinion session feedback is required to learn CRV, and this could not be obtained when targeting
such unverifiable locations. Eventually Mel Riley got so fed up with Ed, a fake session was arranged,
when they described Santa coming over the North Pole in his sleigh. With his ever active
imagination, Ed immediately deduced an object over the north pole was a nuclear attack, and was
set to call the highest levels of the military, before he was informed of the prank. Internally, his
reputation never recovered.
David Morehouse
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 13 O F 51
Dames brought David Morehouse into the DIA's Remote Viewing unit during its final days. David
has a somewhat troubled past, and is primarily notable for producing a largely fictionalised account
of the limited time he spent as a remote viewer called Psychic Warrior.
References
Remote viewers short biographical information
Review of Psychic Warrior by John B. Alexander, Ph.D., Colonel, US Army (Retired)
PSI-Tech
This article is copied from an article on Wikipedia.org - the free encyclopedia created and edited by
online user community. The text was not checked or edited by anyone on our staff. Although the vast
majority of the wikipedia encyclopedia articles provide accurate and timely information please do
not assume the accuracy of any particular article. This article is distributed under the terms of GNU
Free Documentation License.
C o p y r i g h t © 2 0 0 5 F a r l e x , I n c . S o u r c e U R L :
http://encyclopedia.thefreedictionary.com/Project+stargate
INFORMATION ABOUT PRIVACY INVASION AND
WARS OF ILLEGAL COVERT OPERATIONS
WEBSITE FOR VIDEO FILES
http://www.logicalimages.com/focusPubHealth.htm
BIOHAZARD 7327 KB
http://www.bt.cdc.gov/training/historyofbt/
http://www.wanttoknow.info/050423secretgovernment#view
SECRETGOV1-2 3021KB AND 2727 KB
http://www.peace.ca/stockwellvideo.htm
STOCKWELL 1590 KB
http://www.bt.cdc.gov/radiation/justintime.asp
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 14 O F 51
Radiological Terrorism: Just in Time Training for Hospital Clinicians
33895 KB
Information about biological weapons and the Biological and Toxin Weapons Convention
(BTWC)
http://www.brad.ac.uk/acad/sbtwc/other/video/acmodule1.htm
Nichaolas Sims, Reader in International Relations, London School of Economics, 'Evaluation of
Proposals: Resumed Session of Biological and Toxin Weapons Convention Fifth Review
Conference', November 2002. Matt Meselson, Professor of Molecular and Cellular Biology, Harvard
University, 'Biotechnology and Weapons of Mass Destruction - the Future? ' November 2002. Real
High (LAN) <meselson.ram> - Real Low (56k) <meselson56k.ram> Windows Media High (LAN)
<meselson.wvx> - Low <meselson56k.wvx> Jayantha Dhanapala, Under-Secretary General for
Disarmament Affairs, United Nations, Civil Society Organisations and the BWC speech given at
launch of the Bio-Weapons Prevention Project, during the Resumed Session of the 5th Review
Conference of the BWC, United Nations, Geneva, 12 November 2002. Real High (LAN)
<dhana_bwpp.ram> - Real Low (56k) <dhana_bwpp56k.ram> - To see a copy of the transcript of
this speech, click here <http://disarmament.un.org/speech/11nov2002.htm>
NickSNov 256k
meselson56k
dhana bwpp56k
Distance Learning Module 2: THE 2001 BIOLOGICAL AND TOXIN WEAPONS
CONVENTION REVIEW CONFERENCE
The following 7 videos deal with issues of relevance to the Biological and Toxin Weapons
Convention Review Conference process. Further videos can be found also on this page which
relate to the problems posed to international security by the proliferation of weapons of mass
destruction. Please see Arms Control and International Security videos 1- 13 below.
Video 1-In the light of current concern over biological warfare a great deal of interest has been
expressed in the Fifth Review Conference of the Biological and Toxin Weapons Convention
(BTWC). We asked Nicholas A. Sims of the Department of International Relations at the London
School of Economics how the Convention came into being. - Real High <Sims_1.ram> (LAN) - Real
Low <sims_156k.ram> (56k) Video 1 - Windows Media High <Sims_1.wvx> (LAN) - Low
<Sims_156k.wvx> Video 2 - Negotiation of the BTWC in the late 1960s resulted at entry into force
in a much weaker treaty regime than had been envisaged in the original proposal put forward by the
British. In this video Nicholas A. Sims describes the ways in which specific parts of the original
proposal were weakened. - Real High <sims2A.ram>(LAN) - Real Low <sims2A56k.ram> (56k)
Video 2 - Windows Media High <Sims2A.wvx> (LAN) - Low <Sims2A56k.wvx> Video 3 - In this
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 15 O F 51
video Nicholas A. Sims describes the way in which the BTWC treaty regimes has evolved since its
entry into force in 1975. - Real High <sims3A.ram>(LAN)- Real Low <sims3A56k.ram> (56k)
Video 3 - Windows Media High <Sims3A.wvx> (LAN) - Low <Sims3A56k.wvx> Video 4 - In this
video Nicholas A. Sims begins by describing the main objectives of the Review Conference Process.
He then goes on to explain what happened at the Fifth Review Conference and why the Review
process was suspended until November 2002. - Real High <sims4A.ram>(LAN) - Real Low
<sims4A56k.ram> (56k) Video 4 - Windows Media High <Sims4A.wvx> (LAN) - Low
<Sims4A56k.wvx> Video 5 - In this video Nicholas A. Sims describes what it was that broke the
consensus at the Fifth Review Conference of the Biological and Toxin Weapons Convention. - Real
High <sims5A.ram> (LAN) - Real Low <sims5A56k.ram> (56k) Video 5 - Windows Media High
<Sims5A.wvx> (LAN) - Low <Sims5A56k.wvx> Video 6 - For the past 7 seven years the so-called
Ad Hoc Group had been mandated to negotiate a legally binding verification and compliance
Protocol to strengthen the Biological and Toxin Weapons Convention. In this video we asked
Nicholas A. Sims whether it was the intention of the United States to put forward a proposal during
the course of the Review that was intended to terminate the work of the Ad Hoc Group and its
mandate. - Real High <sims_6A.ram>(LAN)- Real Low <sims_6A56k.ram> (56k) Video 6 -
Windows Media High <Sims_6A.wvx> (LAN) - Low <Sims_6A56k.wvx> Video 7 -In this final
Review Conference Video Nicholas A. Sims describes strategies that both governmenal and nongovernmental
groups might adopt prior to the reconveneing of the Review Conference process in
November 2002. - Real High <sims_7A.ram>(LAN) - Real Low <sims_7A56k.ram> (56k)
THE GUINNESS WORLD RECORDS
CRIMES OF ILLEGAL PRIVACY INVASIONS
The war in Iraq can’t be explained only if they were trying too, accomplish a coverup of their
involvement with them in the wars with Iran and Kuwait. If the republican Party had been
investigating these terrorist republicans’ gods of guards in America that is going around stalking,
crusading and causing inquisitions against citizens using military technology for the purpose of
discrediting them like with the first election with George W. Bush in Florida to criminalize voters
to void their votes, we may have stopped some wars and war games of these nuclear gun slingers.
These republican gods or guards who are the most terrorists in the known world with the illegal
privacy invasion “Star War’s” a nuclear terrorist tactics doomsday cult. These cross species that is
one fourth Islam and one fourth communist and one fourth Nazi and one fourth anti-Semitic atheist
disbelief which are Nephelium in their belief who believes that warfare is the answer to peace.
These illegal privacy invasions with more than 80,000 web sites with links to 1000's of more is
number one in budget deficits, number one in the least amount of federal and state government
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 16 O F 51
expenditure, number one in lowest voter turnouts, number of political parties represented in the
lower or single house. They’re also number one in number of international human rights treaties not
signed, number one in terrorism, number one in stalking, number one in injuries and deaths from
road accidents, number one in carbon dioxide emissions, number one in oil consumption, number
one in total and per capita municipal wastes, number one in hazardous waste produced, number one
in births to mothers under the age of twenty. They’re also number one in hate crimes and racism,
number one in anti family, number one in rapes of whole families through illegal privacy invasions
at 500,000 runaways to one million and a half a year, number one in among countries in the united
nations with a legally constituted government to not ratify the un convention on the rights of the
child, number one in drugs trafficking.
The war crimes are causing the united nations to hate America because of being number one in the
military spending, number one is mass murder, death squads, ethic cleaning and race wars, number
one is causing family violence, number one in likelihood of children under the age of fifteen to die
from gunfire, number one in firearm deaths, number one in likelihood of children under the age of
fifteen to commit suicide with a gun, number one in lowest eighth-grade math scores. They’re also
number one in number of known executions of child offenders, number one in espionage, number
one in Frankenstein experiments, number one in per capita energy use, number one in causing
bisexual relations, homosexual, transsexual, incest, and pedophiles, number one in imprisoning and
criminalzation, number one in slander, propaganda, informants and spying out liberty. They’re also
number one is creating mobs, number one is attempted murder, number one in threats of whole
families, number one in black mail, number one in divorce causing at 1 out of 2, number one in
identity thieves at 50 billion, number one in illegal covert causing wars against civilians in the world
using the CIA with 3,000 major wars and 10,000 minor wars in third world countries, number one
in human rights violations and number one in civil rights violations. These are the worst terrorists
ever known to mankind with these syndicates being spread all around the world. The creations of
the Taliban, Al Qaeda and cartels that have resulted because of these money launders who has been
using the hard-working people’s money to dirty it up with their illegal drugs, gunrunning, banking
cartels and black market technology that the military is selling to the mobs, and other terrorist who
have these same beliefs, number one in illegal privacy invasions at 500,000 a year. Number one in
disease outbreaks like AIDS, HIV. The epidemic is causing more than 20,000 orphans in Africa
alone by 2010. Number one in lies, in the world conquer New World Order with more than 8,000
treaties being broken more than 1,500 years. Number one is world court violations and world court
of justice. Number one in creating torture and causing torture. Number one in slavery in the world
and labor laws violations.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 17 O F 51
THESE BOOKS SHOW THE ILLEGAL
PRIVACY INVASION COVERT
TERRORIST
1. “Psychic Dictatorship in the U.S.A.” by Alex Constantine
2. “Trance formation of America” about Monarch Project of CIA by Cathy O’Brien and
Mark Philips
3. “Surveillance Society “The Rise of the Antichrist” by Grant R. Jeffery
4. “Body Electric” by Susan Squires
5. “The Body Magnetic” by Buryl Payne, PH. D.
6. “Magnetic Fields” by Ron Loewinsohn
7. “The Body Electric” by Robert O. Becker, M.D. and Gary Selden
8. “Combatting Cult Mind Control” by Seven Hassan
9. “Stupid White Men” by Michael Moore
10. “Mind Control” by Peter Schrag
11. “Clear Body Clear Mind” about the Effective Purification Program L. Ron Hubbard
12. “Strategic Spiritual Warfare” by Ray Beeson & Patricia Hulsey
13. “Extraterrestrials what on earth is going on”? By Mark Hitchcock & Scot Overbey
14. “Don’t Judge My Future By My Past” by Pastor Dennis Leonard
15. “In the Name of Satan” about How the forces of evil work and what you can do to defeat
them by Bob Larson
16. “Betrayal The Collapse of Global Public Health of Trust” by Laurie Garrett , A
magnificent attempted to make people realize that the future health of the world is on great danger.
Comment by Larry Kramer, “A fine and valuable work” says President Bill Clinton
17. “The Satan Syndrome” about putting the power of Darkness in its place by Nigel Wright
18. “Spiritual Warfare” about Safeguarding Yourself against Deception, Finding Balance and
Insight, Discovering Your Strength in Christ By Neil T. Anderson and Timothy M. Warner
19. “The Surveillance” about book one of intervention by Julian May
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 18 O F 51
20. “Return of the Nephilim” by Chuck Missler on Tape with notes
THE NEW WORLD ORDER
1. “EU Final World Empire” by Alan Franklin
2. “Guardians of the Grail and the men who plan to rule the world” by J.R. Church
3. “Toward a New World Order The countdown to Armageddon” by Donald S. McAlvany
4. “The False Prophet Evil Architect of the New World Order” by Ken Klein
5. “The United Nations Conspiracy” by Robert W. Lee
6. “President’s Secret Wars” about CIA and Pentagon Covert Operation from World War 2
Through the Persian Gulf Revised and Updated Edition by John Prados
7. “Surviving Global Slavery” about Living Under the New World Order . Internationally
acclaimed self-defense author, discusses the impacts of a worldwide dictatorial government on many
facets of our lives by Robert K. Spear
8. “Final Warning” about the Economic Collapse and the Coming World Government by
Grant R. Jeffery
9. “Prince of Darkness” about Antichrist and the New World Order by Grant R. Jeffery
10. “The Mark of the New World Order 666” about The Cashless Economic System of
Global Electronic Enslavement Is Ready Now!
11. “Overture to Armageddon?” about Beyond the Gulf War - is Israel in Jeopardy? - Will
a Saddam Hussein rise again? - What is the role of the West in the “New World Order”?
12. “Racing Toward The Mark of the Beast” about your money, Computers, and the end of
the world by Peter Lalonde & Paul Lalonde
13. “World Orders Old and New” about the left’s leading critic of government policy, power,
and language, takes on the international scene since 1945, devoting particular attention to events
following the collapse of the Soviet Union. By Noam Chomsky
14. “Global Dreams” about Imperial Corporations and the New World Order by Richard J.
Darnet & John Cavanagh
15. “The Imperial Temptation” about The New World Order and America’s Purpose by
Robert W. Tucker & David C.
16. “The New World Order” about a reality you cannot afford to ignore by Pat Robertson
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 19 O F 51
THE BIBLE AND CODES
1. “Megiddo The Omega Code 2" about In the beginning the end had a name by By TBN
Films & Goodtimes Entertainment
2. “Bible Code II the Countdown” about the code remained hidden for 3000 years, until it
was unlocked by a famous Israeli mathematician, who broke it with a computer, investigative
reporter Michael Drosnin made the Bible Code known to the world is his first book. By Michael
Drosnin
3. “The Genesis Factor” about The Amazing Mysteries of the Bible Codes by Yacov Rambsel
4. “Apocalypse Code” by Hal Lindsey who is the best known prophecy teacher in the world
and author of 15 best-selling books
5. “His Name is Jesus” about the Phenomenal Hebrew Codes discovered in the world of God
by Yacov Rambsel
6. “CodeFinder” Millennium Edition Bible Code Software by Research Systems
7. “Unlocking The Bible Codes” about the key to cracking the Bibles Hidden Secrets on Your
PC
8. “Secrets of the Bible Code Revealed” about the assassination of both John F. Kennedy and
Robert Kennedy and The name of “Yeshua,” or Christ, in Messianic prophecies & The
circumstances surrounding the death of Princess Diana & President Richard Nixion’s removal from
offices & Man landing on Moon by Grizzly Adams Production
9. “The Omega Code” about Revelation fortold it, The end has begun! By TBN Films &
Goodtimes Entertainment
10. “The Secrets of Hebrew words” by Benjamin Blech
11. “The Inner Meaning of the Hebrew Letters” by Robert M. Haralick
12. “The Alef-Beit” Jewish thought revealing through the Hebrew Letters by Rabbi Yitzchak
13. “Biblica Hebrew” step by step Volume 1 second edition by Menahem Mansoor
14. “Biblica Hebrew” step by step Volume 2 second edition by Menahem Mansoor
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 20 O F 51
SLAVERY BOOKS CRIMES AGAINST
HUMANITY
1. “Unequal Justice” about Lawyers and Social Change in Modern America by Jerold S.
Auerbach
2. “Race Matters” by Cornel West
3. “The Black Holocaust for beginners” by S.E. Anderson
4. “The Slave Trade” by Hugh Thomas
5. “The Case for Black Reparations” by Borisi Bittker is sterling Professor Emertus of Law
at Yale University
6. “Jesse The Life and Pilgrimage of Jesse Jackson” by Marshall Frady
7. “Human Cargo about the story of the Atlantic Slave Trade” by Anne Terry White
8. “Unequal Protection” about Environmental Justice & Communities of Color by Robert D.
Bullard a Sierra Club Book
9. “Unequal Justice” about A Question of Color is a much-needed comprehensive
examination of racial/ethic minorities and crime by Coramae Richey Mann
10. “Should America Pay”? About Slavery and the raging debate on reparations the inclusion
of dissenting voices and historical documents makes the argument for reparations even more urgent
and compelling by Raymond A. Winbush, PH.D.
11. “Smart Money moves for African Americans” by Kelvin Boston
12.”Up From Slavery” by Booker T. Washington
13. “The Tropical Atlantic in the Age of the Slave Trade” American Historical Association
by Philip D. Curtin
14. “Vessels of Evil” about American Slavery and the Holocaust by Laurence Mordekhai
Thomas
15. “The Debt” about what America owes to Blacks by Randall Robinson
16. “Sins of the Fathers” about the study of the Atlantic Slave Traders 1441-1807 by James
Pope-Hennessy
17. “African American Who Were First” by Joan Potter & Constance Claytor
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 21 O F 51
BIBLE PROPHECY
1. “2001: on the Edge of Eternity” by Dr. Jack Van Impe
2. “The Final Battle” by Hal Lindsey
3. “Every Prophecy of the bible” by John F. Walvoord
4. “Land of Hypocrisy” by Kennie Anderson
5. “Armageddon The Appointment with Destiny” by Grant R. Jeffery
6. “The Final Kingdom” about God, Daniel, and Babylon Where all kingdoms how to The
Ancient of Days and Babylon has fallen, has fallen, has fallen! All the images of its gods lie shattered
on the ground by Ron Cantrell
7. “Beginning of the End” about The Assassination of Yitzhak Rabin and the Coming
Antichrist by John Hagee
8. “The End of the Age” A Novel by Pat Roberston
9.” Day of Deception” is about separating Truth form falsehood in These Last Days, We are
Deceived! “America is deceived, Individuals are deceived. Christians are deceived,” says John
Hagee, “by our government, by our values, even by the Church, Jesus Christ prophesied four times
in Matthew 24 that the cardinal indicator of the terminal generation would be deception. We are
deceived – by Satan and his witchcraft.”
10. “By Way of Deception” about The Making and Unmaking of a Mossad Officer by Victor
Ostrovsky & Claire Hoy
11. “Armageddon, Oil and the Middle East Crisis” is about what the bible says about the
future of the Middle East and the end of Western Civilization by John F. Walvoord
12. “The New Economic Disorder” our Economy in the End Times about startling expose
of the financial wipe out prophesied in the Bible, by economist Larry Bates
13. “The Vision of his Glory” about finding hope through the Revelation of Jesus Christ by
Anne Graham Lotz
14. “They Pierced The Veil” and saw the future by J.R. Church
15. “The Edge of Time” about The final countdown has begun by Peter & Patti Lalonde
16. “Double Deal” about a Cop who was a mobster by Michael Corbitt with Sam Giancana
17. “Global Peace” about the Rise of Antichrist by Dave Hunt
18. “Planet Earth 2000 A.D.” about Will Mankind Survive? By Hal Lindsey
19. “The Signature of God” by Grant R. Jeffery
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 22 O F 51
SPY AGENCIES ILLEGAL
COVERT WARS
1. “Inside the CIA Revealing the secrets of the world’s Most powerful spy Agency” by
Ronald Kessler
2. “FBI” by Ronald Kessler
3. “Masters of Deceit” by J. edger Hoover
4. “The Wizards of Langley” about Inside the CIA’s Directorate of Science and
Technology by Jeffrey T. Richelson
5. “From the Shadows” about the ultimate inside’s story of five presidents and how they
won the cold war and indispensable contribution to our understanding of America’s response to
the Soviet challenge during the waning years of superpower rivalry by Robert M. Gates former
Director of the Central Intelligence Agency
6. “Gideon’s Spies” about the secret history of the Mossad, “This is one of the few books
that has captured the true nature of the Israeli government and the thought process of the Israeli
power elite.” by Gordon Thomas
7. “The Pentagon” About an explosive and illumination study of the structure and power
of the Pentagon by Clark R. Mollenhoff
8. “The Puzzle Palace” about inside the National Security Agency America’s Most Secret
Intelligence Organization by James Bamford
9. “Body of Secrets” about the Anatomy of the Ultra-Secret National Security Agency by
James Bamford
10. “The Mitrokhin Archive” about the KGB in Europe and the West by Christopher
Andrew and Vasili Mitrokhin
11. “The Samson Option” about Israel’s Nuclear Arsenal and American Foreign Policy
12. “Barry & the boys” about The CIA, the Mob and America’s Secret History illegal
wars Bay of Pigs, Watergate, Iran-Contra and the Mena Drug Scandal by Daniel Hopsicker
13. “Peace Impossible-War unlikely” about the cold war between the United States and
the Soviet Union by Joseph L. Nogee and John Spanier
14. “Whiteout” the CIA, Drugs, And The press by Alexander Cockburn and Jeffrey St.
Clair
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 23 O F 51
SECULAR BOOKS ON WARS AND WAR
CRIMES AGAINST HUMANITY
1. “Secrets, Lies and Democracy” by Noam Chomsky
2.”American Foreign Policy” by David L. Bender
3. “Understanding Power The Indispensable Chomsky” by Noam Chomsky
4. “The Invisible Man & The War of the Worlds” by H.G. Wells
5. “Lie’s and Lying Liars who tell them” about a fair and balanced look at the right by Al
Franken
6. “The Culture of Terrorism” by Noam Chomsky
7. “The Dark Side of Camelot” by Seymour M. Hersh
8. “The Cheating of America about how tax avoidance and Evasion” by the Super Rich
are costing the Country Billions and What you can do about it by Charles Lewis and Bill Allison
and the Center for Public Integrity
9. “Militarizing The American Criminal Justice System” about The Changing Roles of
the Armed Forces and the Police” by Peter B. Kraska is Professor of Criminal Justice at Eastern
Kentucky University.
10. “Why do people hate America”? By Ziauddin Sardar and Merryl Wyn Davies
11. “The Art of Diplomacy “ about The American Experience by Thomas A. Bailey
12. “Special Ops” about being a brotherhood of War Novel by W.E.B. Griffin
13. “Shadow Warriors inside the Special Forces” Tom Clancy with General Car Stiner
)Ret.) AndTony Koltz
15. “Secret Sanction” a Novel by Brian Haig
16. “Night of Camp David’ by Fletcher Knebel
17. “Bush at War” by Bob Woodward”
18. “Censored 2003" The top 25 Censored Stories about Media Democracy in Action by
Peter Phillips & Project Censored
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 24 O F 51
MERCENARY / PRIVATE MILITARY COMPANIES
(PMCS)
http://www.globalsecurity.org/military/world/para/mercenary.htm
The term mercenary is applied to a variety of historical situations which do not appear to have
elements in common. Casca, the eternal mercenary, pulled the duty of nailing Christ to the Cross and
was doomed to spend eternity as a soldier, a career that can lead to billets like sitting on five-gallon
water cans in the cold desert wind on Christmas Eve in Saudi Arabia.
Estimates of the number of private international security personnel range from 15,000 to 20,000.
That is as much as 15 percent of the total US presence of about 130,000 soldiers. These private
contractors -- who most often work for corporations, diplomats, or journalists -- have no
accountability to the US military. These private security contractors can earn up to $1,000 a day.
NATO forces have used private soldiers for security in the Balkans. But the proportion of private
security personnel to regular military soldiers was no greater than 10 percent.
Mercenary / Private Military Companies (PMCs)
http://www.globalsecurity.org/military/world/para/pmc-list.htm
Not all companies provide all services. Some of these companies are classical "merc" operations,
while others are risk management firms that have nothing in common with privately contracted
military support operations.
ACS Defense
AD Consultancy (UK)
Aegis Defence Services Ltd
AKE Limited (UK)
AirScan (US)
Alpha Five (Hong Kong)
AMA Associates Ltd [UK]
ArmorGroup (UK)
Beni Tal [Israel]
Blackwater Security Company (US)
Combat Force (South Africa)
Combat Support Associates
Control Risks Group
Corporate Trading Intl (Hong Kong)
Cubic Defense Applications
Custer Battles (US)
Defence Systems Ltd. (UK)
Diligence Middle East (US)
DynCorp International(US)
Erinys Iraq Limited
Executive Outcomes (South Africa) defunct
Genric (UK)
Global Development Four
Global Marine Security Systems Company
Global Risk International
Global Risk Strategies (UK)
Group 4 Falck A/S (India)
Gurkha Security Guards (Isle of Man, UK)
Halliburton [KBR Engineering &
Construction]
Hill and Associates, Ltd. (Hong Kong)
Honey Badger Arms and Ammo (South
Africa)
ICI of Oregon
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 25 O F 51
ICP Group Ltd (UK)
ISI Group
Investments Surveys (South Africa)
Jardine Securicor Gurkha Services (Hong
Kong)
Joseph Patrick International
Kas Enterprises (South Africa)
Longreach Security (South Africa)
Main Street Supply
Meteoric Tactical Solutions (South Africa)
Meyer & Associates (US)
Military Professional Resources Inc. (US)
Northbridge Services Group Ltd.
Olive Security Ltd (UK)
Omega Support Ltd. (Hong Kong)
Optimal Solution Services (Australia)
O'Gara-Hess & Eisenhardt
Overseas Security & Strategic Information,
Inc (US)
PAE
Parasec Strategic Concept (Hong Kong)
RamOPS Risk Management Group (US)
Sandline (UK)
Saracen International (South Africa)
Securicor Hong Kong
Shield Security (South Africa)
Special Project Service Ltd. (UK)
Strategic Consulting International (SCI)
Sumer International Security Iraq [DynCorp]
The Steele Foundation
Triple Canopy Inc.[US]
Vinnell Corporation (US) : A Northrop
Grumman Company
Wade-Boyd and Associates LLC
Mercenary / Private Military Companies (PMCs)
Links
Private Military Companies Weblink
International Peace Operations Association
Private Security Firms Can End Africa's Wars Cheaply By Peter Fabricius, Saturday Star
(Johannesburg) September 23, 2000
Private Military Companies
Private Military Companies
Private Military Companies
Mercenary / Private Military Companies (PMCs)
References
Security Companies Doing Business in Iraq ND 2004 [American Citizen Services in Iraq, Bureau
of Consular Affairs, U.S. Department of State]
Contractors Provide Vital Services to Deployed Forces but Are Not Adequately Addressed in
DOD Plans GAO-03-695 - June 2003
Private Military Companies: Options for Regulation Foreign and Commonwealth Office
February 12, 2002
PRIVATE MILITARY COMPANIES - SESSION 2001–2002 -- RESPONSE OF THE
SECRETARY OF STATE FOR FOREIGN AND COMMONWEALTH AFFAIRS October 2002
Report on the question of the use of mercenaries as a means of violating human rights and impeding
the exercise of the right of peoples to self-determination, submitted by Mr. Enrique Bernales
Ballesteros, Special Rapporteur, pursuant to Commission resolution 2001/3 E/CN.4/2002/20 -- 10
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 26 O F 51
January 2002
THE PRIVATE MILITARY COMPANY: A LEGITIMATE INTERNATIONAL ENTITY WITHIN
MODERN CONFLICT A thesis presented to the Faculty of the U.S. Army Command and General
Staff College - 2001
Report on the question of the use of mercenaries as a means of violating human rights and impeding
the exercise of the right of peoples to self-determination, submitted by Mr. Enrique Bernales
Ballesteros, Special Rapporteur E/CN.4/1997/24 -- 20 February 1997
International Convention against the Recruitment, Use, Financing and Training of Mercenaries, 4
December 1989
ZIMBABWE/MERCENARIES VOA 28 Apr 2004
Iraq: Private Security Personnel -- Dangerous Or Cost-Effective? RFE/RL 13 Apr 2004
Iraq: Al-Fallujah Deaths Highlight Role Of Private Security Forces RFE/RL 02 Apr 2004
SOUTH AFRICA: Guns still for hire for troubled continent IRIN 26 Mar 2004
ZIMBABWE/ MERCENARIES VOA 23 Mar 2004
ZIMBABWE: Suspected soldiers of fortune charged under security law IRIN 17 Mar 2004
ZIMBABWE / PLANE VOA 17 Mar 2004
ZIMBABWE: Suspected mercenaries awaiting charges IRIN 11 Mar 2004
SAF/MERCENARIES VOA 10 Mar 2004
ZIMBABWE/PLANE VOA 09 Mar 2004
AUGUST 1977 THE CIA ADMITTED TO NO LESS
THAN 10,000 SUBPROJECTS OR MINOR WARS
This article is copied from an article on Wikipedia.org - the free encyclopedia created and edited
by online user community. The text was not checked or edited by anyone on our staff. Although
the vast majority of the wikipedia encyclopedia articles provide accurate and timely information
please do not assume the accuracy of any particular article. This article is distributed under the
terms of GNU Free Documentation License
Synonyms for: project
Related Encyclopedia Entries:
http://encyclopedia.thefreedictionary.com/
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 27 O F 51
Some of this information is about the illegal projects of the government that has been going on
before World War II. This is what is happening with the money that the government is using for
illegal wars around the world. Some of these project may not relate to the governments directly but
most of these project was government approved.. There is many more project about government wars
and managements on the website http://encyclopedia.thefreedictionary.com/ and a lot more if you
research looking for all CIA and other projects. I just copied form a coupled of pages an didn’t what
to brake up these projects at www.dictionarydefinition.net/project.html
Project
Project-X
Project 2501
Project A-ko
Project Alpha
Project Ben-Yehuda
Project Bodzinka
Project Bojinca
Project Bojinga
Project Bojinka
Project Censored
Project Galactic Guide
Project Genie
Project Gotham Racing
Project Gutenberg
Project Gutenburg
Project HARP
Project Habakkuk
Project Jennifer
Project MAC
Project Management
Project Management Body of
Knowledge
Project Matterhorn
Project Mercury
Project Mogul
Project Nike
Project Orbiter
Project Orion
Project Paper Clip
Project Paperclip
Project Pat
Project Pluto
Project RAND
Project Rainbow
Project Rastko
Project Runeberg
Project Sugita Genpaku
Project Tiger
Project Vanguard
Project Whirlwind
Project Xanadu
Project for a New American Century
Project for the New American
Century
Project lifecycle
Project management
Project management process
Project management software
Project management standards
Project manager
Project objective
Project plan
Project planning
Project studio
Projectile
Projectile point
Projectiology
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 28 O F 51
Projection
Projective geometry
Projective line
Projective linear group
Projective module
Projective plane
Projective rep
Projective representation
Projective space
Projective variety
Projects in a Controlled Environment
Projects working for peace among
Israelis and Arabs
Projects working for peace among Israelis and
Palestinians
Projectvoyeur.com
Project seahorse
Project SHAD
Project Sherwood
Project Sign
Project Snowblind
Project Space Station
Project stakeholders
Project stargate
Project Stealth Fighter
Project Steve
Project Stormfury
Project Sugita Genpaku
Project Super Nova
Project Superstar
Project team
Project Risk Management
Project Rockstar
Project Rulison
Project Runeberg
Project Runway
Project Safe Neighborhoods
Project Safety Office
Project SCORE
Project Seabird
Project seahorsnd
Project Service Level Agreement
Project SHAD
Project Shadow
Project Shared VisionProject Sherwood
Project Sign
Project Snowblind
Project Software Development Incorporated
Project Space Station
Project Specific Erection Plan
Project stakeholders
Project Star Gate
Project Star Trek
Project stargate
Project Status Control
Project Status Report
Project Stealth Fighter
Project Steering Committee
Project Step Off
Project Steve
Project Stock
Project StoreX
Project Storm Fury
Project Stormfury
Project studio
Project Study Plan
Project Study Report
Project Study Report/Project Report
(transportation/environmental)
Project Sugita Genpaku
Project Summary Work Breakdown Structure
Project Super Nova
Project Superstar
Project Support Agreement
Project Support Data
Project Support Environment Working Group
Project Support Environments Standards
Working Group
Project Support Office (project management)
Project Support Team, Inc.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 29 O F 51
STAR WARS DISASTER RELIEF FUNDS
The crimes against humanity illegally warring civilians
This information is about the “Star Wars” program that is apart of COINTELPRO that was warring
the civilians in America. This program that was designed to stop Russia nuclear weapons and to
keep up with key military official was unleashed against civilians to war them families and friends.
These Nuremberg War crimes that is being portrayed are some of the worst war crimes that any
nation of the war could ever hear off in their life. Just imagine that some warmongering military
officials who had declared war on civilian invading your home to war you as if you were the enemy.
There has been many laws that restrict the military from interfering in the lives of civilian citizens.
One of them is the Posse Comitatus Act that brought on the reconstruction era which cause Africa
Americans their businesses and jobs.
RECONSTRUCTION PERIOD.
The victory of the North in the American Civil War put an end to slavery and to the South's effort
to secede from the Union. However, for more than a decade after the Civil War the status of the
liberated slaves and the terms on which the defeated states would be restored to the Union--that is,
the way in which the South and the Union would be reconstructed--remained a source of conflict.
The years during which the Civil War settlement continued to be contested are known as the
Reconstruction period. Reconstruction lasted roughly from the end of the war in April 1865 to the
withdrawal of the last federal troops from the South in April 1877. This Posse Comitatus Act that
caused the Union Soldiers to leave the south and let the Confederate and ex-confederate soldiers to
get after the blacks and to keep them as second class citizens. The brought about the Jim Crow laws
and black codes that lead to the end of the freedom of the Africa Americans in the south. Many of
the southern states didn’t end slavery because they didn’t amendment to State Constitution but allow
the state to practice war crimes of slavery even after the United Nations were established. Let’s take
for instants that the state of Mississippi didn’t abolish slavery until 1995 about 135 years after the
Civil Wars. The anti-African family confederation was still existed with the Klux Klu Klan and other
Sovergn Committees being establish to war Civil Rights and Human Rights.
US CODE COLLECTION
http://www.law.cornell.edu/uscode/
TITLE 6 > CHAPTER 1 > SUBCHAPTER VIII > Part H > §§ 466 Prev | Next
§§ 466. Sense of Congress reaffirming the continued importance and applicability of the Posse
Comitatus Act
a) Findings
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 30 O F 51
Congress finds the following:
(1) Section 1385 of title 18 (commonly known as the ““Posse Comitatus Act””) prohibits the use of
the Armed Forces as a posse comitatus to execute the laws except in cases and under circumstances
expressly authorized by the Constitution or Act of Congress.
(2) Enacted in 1878, the Posse Comitatus Act was expressly intended to prevent United States
Marshals, on their own initiative, from calling on the Army for assistance in enforcing Federal law.
(3) The Posse Comitatus Act has served the Nation well in limiting the use of the Armed Forces to
enforce the law.
(4) Nevertheless, by its express terms, the Posse Comitatus Act is not a complete barrier to the use
of the Armed Forces for a range of domestic purposes, including law enforcement functions, when
the use of the Armed Forces is authorized by Act of Congress or the President determines that the
use of the Armed Forces is required to fulfill the President’’s obligations under the Constitution to
respond promptly in time of war, insurrection, or other serious emergency.
(5) Existing laws, including chapter 15 of title 10 (commonly known as the ““Insurrection Act””),
and the Robert T. Stafford Disaster Relief and Emergency Assistance Act (42 U.S.C. 5121 et seq.),
grant the President broad powers that may be invoked in the event of domestic emergencies,
including an attack against the Nation using weapons of mass destruction, and these laws specifically
authorize the President to use the Armed Forces to help restore public order.
(b) Sense of Congress
Congress reaffirms the continued importance of section 1385 of title 18, and it is the sense of
Congress that nothing in this chapter should be construed
KU KLUX KLAN.
A secret terrorist organization, the Ku Klux Klan led underground resistance against the civil rights
and political power of newly freed slaves during the Reconstruction period after the American Civil
War. The Klan's goal was to reestablish the dominance of the prewar plantation aristocracy. It was
revived in an altered form in the 20th century.
Organized in 1866 by Confederate veterans as a social club in Pulaski, Tenn., the Ku Klux Klan
was restructured along political and racial lines a year later in Nashville, Tenn. Sometimes called the
Invisible Empire of the South, the KKK, or the Klan, it was presided over by a grand wizard and a
descending hierarchy of grand dragons, grand titans, and grand cyclopses. They took the name of the
organization from the Greek word kyklos, meaning "circle," and the English word clan. Dressed in
robes and hoods designed to frighten superstitious victims and to prevent identification by Federal
troops, Klansmen whipped and killed freed slaves in nighttime raids. With intimidation and threats,
Klansmen drove blacks and their white sympathizers out of their communities, destroying their crops
and burning their houses and barns.
Because of an increase in the number of kidnappings and murders, the grand wizard of the Klan
ordered it disbanded in 1869, but local groups remained active. The rest of the nation reacted
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 31 O F 51
strongly to the increased violence in the South, and Congress passed the Force Act in 1870 and the
Ku Klux Klan Act in 1871, authorizing the president to suspend the writ of habeas corpus, suppress
disturbances by force, and impose heavy penalties on terrorist organizations. Resulting federal
prosecution of Klan members, however, created widespread Southern sympathy in their behalf. As
Southern political power gradually reverted to traditional white Democratic control during the 1870s,
the need for anti-Republican, antiblack organizations to remain secret decreased.
MIND CONTROL AND EXPERIMENTAL
ILLEGAL COVERT WAR MOVIES
ROOM 1
1. “Frankenstein” The start of implanting the brain and using other part of the body by using
the electrical source of lighting to bring back to life. We have the operations of hearts, brains,
kidneys and other parts that someone can get. The bone marrow and selling of baby parts in the
more updated version of these operations.
2. “Mind Snatcher” The changing of behavior through implanting rods to the part of the brain
that can cause them to control thoughts and behavior by electrical struck for the Military.
3. “The Capitol Conspiracy” When they’re in your head, how do you watch your back?
Implanting mental abilities using mind control with CIA Experiments. Fast on the trail of a group
of anti-government radicals, CIA special agent is shaken by a series of mysterious mental flashbacks
and re-discovers his involvement in a top-secret government experiment. He realizes that the socalled
“radicals” were all orphaned children used as guinea pigs in a mental experiment to cultivate
clairvoyant abilities.
4. “Spy Game” illegal covert war that causes spying out liberty mind games and espionage.
When a top-secret, unauthorized mission goes bad, CIA agent is captured and sentenced to die. His
Boss battles enemies abroad and the system inside the CIA to save his friend.
5. “The Robert Hanssen Story” Robert Philip Hanssen (born on April 18, 1944) was an FBI
agent who was convicted of spying for the Soviet Union, later Russia. He was arrested on February
20, 2001 at a park near his home in Vienna, Virginia and charged with selling American secrets to
Moscow for $1.4 million in cash and diamonds over a 15-year period.
6. "Aldrich Ames: Traitor Within" Aldrich Hazen Ames (born June 16, 1941 in River Falls,
Wisconsin) is a former Central Intelligence Agency counter-intelligence officer and analyst, who in
1994 was convicted of spying for the Soviet Union. Ames began working for the CIA in 1963, and
his first assignment was as a case officer in Ankara, Turkey, where (somewhat ironically) his job was
to target Soviet intelligence officers for recruitment. He first began spying for the Soviet Union in
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 32 O F 51
1985 when he walked into the Soviet embassy in Washington to offer secrets for money. Ames was
assigned to the CIA's Europe Division / Counterintelligence branch where he was responsible for
directing the analysis of Soviet intelligence operations. He had access to the identities of US sources
in the KGB and Soviet military. The information Ames provided led to the compromise of at least
100 US intelligence operations and to the execution of at least 10 US sources. The Soviets/Russians
paid Ames approximately $2.5 million, allowing Ames and his wife to live a lifestyle beyond the
means of a normal CIA officer's family. Ames, who struggled with alcoholism, had no ideological
affinity for the USSR and spied for money and ego.
7. “Deadly Drifter” is an atypical, covertly satirical film about sex, and drugs to political
mistrust and extremist conspiracies. A self-invented “urban guerilla” of sorts. They’re sent on
clandestine missions by a mysterious employer who relays his assignments through peculiar methods
of mind control tactics and secret codes.
8. “Rage” The mind is being implanted to kill and misinterpret words from others by voices
telling him to video tape the murders.
9. “Lawnmower Man 2 Jobe’s War” Virtual Reality being used to restore the brain by
brainwashing. Then takes over the place for him to rule with Egypt chip that is the key for world
control and the ultimate revenge
10. “Virtuosity” The governmental experiments using Virtual Reality composite of some 200
personalities, each and every one a notorious killer. He’s Sid 6.7, a virtual reality creation designed
to put L.A. police officers to the test . The brain like DNA of the worlds worst killers into a
cybernetic created formed man. There was also a woman able to sense all impulses of a man.
11. “Minority Report” The use of telepathy and mind control tactics to stop crimes called
precrime..For six years, Washington D.C. has been murder-free thanks to astounding technology
which identifies killers before they commit their crimes.
12. “Artificial Intelligence” The development of robots from cybernetic cyborg.
13. “Chain Reaction” Scientific experiment find frequencies for water hydrogen energy but
mysterious bureaucrat powerful enough to cover it up. A student machinist finds himself caught in
a maze of secret government cover-ups, hi-tech espionage and murder after working on a groundbreaking
scientific experiment.
14. “Deceived” is about extraterrestrial signal or frequency received from a remote space
observatory in the Sierra Nevada Mountains an extraterrestrial signal has been received. Contact has
been made then a powerful group rushes to the observatory to exploit the signal and harness its
incredible power.
15. “Left Behind” about Tribulation force when millions of people vanished the one man
emerges form the madness as a brave and caring leader. His name is NICOLAE CARPATHIA and
the ravaged world he represents peace, order and hope, However, ancient biblical prophecies warn
about such a time and warn about such a man. Buck Williams a world-renowned journalist, knows
Nicolae’s true identity: he is the Antichrist.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 33 O F 51
MIND CONTROL AND EXPERIMENTAL
ILLEGAL COVERT WAR MOVIES
ROOM 2
1. “Frankenstein” The start of implanting the brain and using other part of the body by using
the electrical source of lighting to bring back to life. We have the operations of hearts, brains,
kidneys and other parts that someone can get. The bone marrow and selling of baby parts in the
more updated version of these operations.
2. “Jekyll & Hyde” Unnatural uncontrollable unleashed by obsessed with healing power of
drugs Dr. Jekyll pursues his experiments in transformation despite the influence his ego” Hyde
wields over him. When the evil Hyde is unleashed, the city is held under siege by murder and
destruction Jekyll’s transformation to Hyde escalates a scandalous romance with his married sisterin-
law Sara Crawford.
3. “Jack the Ripper” a insanely obsessed Doctor that stalks places like drinking bars to serial
kill the women that remind him of his mother.
4. “Mind Storm” A former NSA director responsible for selling them out to the Soviet hire
a private investigator with powerful psychic abilities, to fine now Senator Armitage a leading
presidential candidate to find his daughter Rayanna. Tracy stumbles onto a cult led by David
Mendez’s a mysterious New Age guru whose telepathic powers dwarf her own. Illegal Covert
training and mind control on children against the Soviet but now a trap to lure the Senator in, and
it’s members, including Rayanna, are expendable.
5. “Eraser” A U.S. Marshal who ‘erases” the lives and identities of people entering the
Witness Protection Program. Kruger must protect an executive who’s uncovered a deal to put a new
superweapon in the wrong hands. These ultratech security and outbrawning killers with
hypervelocity weapons. Illegal EM arms race making and espionage to the Russia Mob.
6. “The Manchurian Candidate” Illegal stalking and experimental implanting and mind
control killing by Manchurian Global South Africa Mercenaries and false religious light cult.
7. “Enemy of the State” High - powered suspense thriller where nonstop action meets cutting
-edge technology when a successful Washington, D.C. attorney who without knowledge is given a
video that ties a top official of the NSA with the murder of a congressman for political purposes.
They set up a illegal covert Ops stalking and using a lethal team of skilled NSA surveillance
operatives who wage a relentless, ultrahigh-tech campaign to discredit his and retrieve the
incriminating evidence.
8. “The Net” A freelance software analyst who debugs software for clients has come across
a program call Gate keeper that has back downs into the systems that they have put sold them to. By
using a form of cybernetic to get into her life and mind they change her name and set her up to get
the information about the Gate keeper system. This is a nightmare when this form of cybernetics is
used to kill anyone who finds out that a Cathedral religious Antichrist type is using their system
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 34 O F 51
politically to kill Christians and control the world.
9. “The Truman Show” Illegal privacy invasion and stalking for money by Movie makers but
resemble Echelon facility in England.
10. “Die Another Day” The Communist North Korea is selling illegal weapons to South
Africa but the plans are spoiled by 007 who changes to place with the diamond dealer. This causes
him to get captured and tortured by North Korea who finally trade him but to the British. The Korea
general son who didn’t die but ended up in Cuba with a DNA face change to look American but
British adopted nation. This Korea builds a satellite that can divert the suns energy as a weapon to
create light are illegally using it as a laser.
11. “Revelation” Counter-terrorism expert Thorold Stone is investigating an underground
resistance movement, he discovers a conspiracy that leads right to the heart of the new world order.
The World Government of One Nation Earth (O.N.E.) Is distributing virtual reality headsets to
everyone on earth for the day of wonders for the false messiah Illegal alien invasion and mind control
brainwashing Virtual Reality by Antichrist to discredit Christians.
12. “Apocalypse” Two Co-anchors of the world News Network are in a position to uncover
the truth. But Helen discovers the identity of this great leader. The False Messiah using brainwashing
in false light to cause a mark of his in Virtual Reality and the Battle of Armageddon. With global
police forces in hot pursuit, there is but one chance to warn the world as it rushes headlong into the
Apocalypse.
MIND CONTROL AND EXPERIMENTAL
ILLEGAL COVERT WAR MOVIES
ROOM 3
1. “The Mind’s Eye” The way that the mind should be at peace The Mind’s eye is a
spectacular odyssey through time. Your journey begins at the dawn\0 of creation and moves through
the rise of man and technology. Travel in the world of abstraction and on into the future with
breathtaking computer animation imagery.
2. “The Gate to the Mind’s Eye” Alloy is faced with a vision of the year 2075 doom. There
is only one way to reverse the madness; collapse the universe into itself and begin again. This
evolution faithless believe is the problem in the first place that has caused the invasion of demons
and war to plague the mind.
3. 2000 A.D. Are you Ready? Virtual Reality and other Hi Tech technology for control of
mankind using cybernetic cyborg.
4. Carman Video Slam the Devil, Court Room, Meeting with Satan, Mission 3:16
5. “Fugitive Mind” Ex-military used as assassin by scientists for government to take control
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 35 O F 51
of his brain and destroy him completely by implanting thoughts into the brain using governmental
facility for political gain. Robert Dean awakens one day after years of working for multinational
conglomerate GENCOM to find that he has lost much of his memory. While piecing together his
past, he uncovers a fiendish experiment that has programmed his mind to carry out brutal and bizarre
crimes.
6. “Mind Ripper” A top secret experiment to create a superhuman has gone terribly wrong.
The use of illegal viruses and mind control Virtual Reality technology for experimental advances is
causing scientist research to create monsters.
7. “X-MEN” The Nazi illegal experimental technology of Jews for the military. This is
similar to what the antichrist is doing by walking through walls, and reading the thoughts of other.
8. “Matrix” The Multi state anti-terrorist information Exchange which I believe to be the
COINTELPRO Program. This is the most massive database surveillance program in history that has
caused the destruction of the world. Mind-warp stunts, techno-visuals. Keanu Reeves and Laurence
fishburne lead the fight to free humankind in the Matrix. This is a cyberthriller to keep this super
surveillance mind control system from killing all mankind.
9. “Matrix Reloaded” The home base is revealed where humankind is left in a cave under the
earth with machines keeping the air clean and under a full scale attack by the sentinel and
government clones to destroy all human life.
10. “Tribulation” A police Detective finds himself battling a mysterious group that posses
frightening psychic powers. His family become a target of this dark society he begin to believe in
what was happening but was mystical force takes control of his car putting him is a coma. Him
waking up to a mark on the right hand signifying their allegiance to this global leader. The use of
Tower of Babel Satanism of ganging up on God to kill the true people of God. This mind control
type of remote viewing is what is causing suicides in families.
MIND CONTROL AND EXPERIMENTAL
ILLEGAL COVERT WAR MOVIES
ROOM 4
1. “Star Wars” The Reagan era brought about the Star Wars program that came from the SDI
which gave the movie makers some form of evil verses light with demons. The mankind world that
is typing the kill The Creators world and universe. The bible say’s love not the world neither the
thing in the world.
2. “Star Wars The Empire Strikes Back” This show forth the saying that evil doesn’t die but
waits to be reborn.
3. “Star Wars 2 Attack of the Clones” The plans of those who have caused treason in God’s
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 36 O F 51
World by planing wars with the evil side of the world and universe using illegal fallen angels are
aliens.
4. “Dr. Dolittle” The animals speaking to people and being used to talk back to them. This
can only happen if that animal is possessed by a demon are someone is using some night stalker
technology to tell them what to do.
5. “Space Jam” This is a cartoon about the invasion of alien demons to steal the abilities of
humans to get rich on their planet. This type of “Torture Ware” technology is about the body and
mind being attack to confuse it. This would cause a mental break down of the mind.
6. “Island of Dr. Monroe” The experimental research of Dr. Monroe using human DNA to
bring about a cross species in human and animal. The implants of chips to control them with a
torture cattle device. There are more than one million animal experiments a year.
7. “Men in Black” The Extraterrestrial alien being that has invaded the planet without
mankind knowing what has happened. The mind erasing technology is here also, to keep these types
of alien invasion secret.
8. “The Nutty Professor” The College Professor who is experimenting with DNA makeup
to bring about some weight lost began to change his voice to another person also.
9. “Aliens’ 2” The alien movie about building a place to live on another planet but is
inhabited by aliens who use them as host for their growth in numbers. These creatures like the heat
so, they build their cocoon around a thermal nuclear reactor.
MIND CONTROL AND EXPERIMENTAL
ILLEGAL COVERT WAR MOVIES
ROOM 5
1. History Channel “Mind Control Video” Dr. Cameron illegal government experiments
2. Ministry Hagee “Invasion of Demon” sermon because of legalism criminalzation belief.
3. “Exorcist 2" The Heretic the fallen Catholicism Church because of like of faith in exorcism
causing other mind control teaching to plague the Church like locusts. The Possession and exorcism
of demon of the evil spirits of the air that battle religious faith and psychiatric knowledge of a
Vatican investigator and hypnotic research specialist.
4. Scifi Channel “Plague of Locust Movie” dealing with illegal experimental locusts that kill
humans.
5. “Independence Day” Movie dealing with Alien Invasion
6. “The Lawnmower Man" Experiment end with Plague of Locust and Virtual Reality gods
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 37 O F 51
7. National Geographic Channel UFO invasion of home and bed video and Surveillance
information
8. “Poltergeist” The invasion of Satan to kidnap a child by using demonic tactics of mind
control and being on a Cemetery that had the coffins still their lead to some of the phenomenal
9. Carman Video on no “Monsters in the House” and casting them out.
10. Discovery Channel dealing with ghost and Parapsychology which is Phenomena that
appear to contradict physical laws and suggest the possibility of causation by mental processes
11. “The Entity” is a Parapsychology thriller mind and body rapes. The possession of the
home and car also, look like a earthquake is shaking in the home but the entity.
12. “Ghost Busters” When the University downsizes the parapsychology department, Doctors
Venkman, Stantz and Spengler make the leap from scientists to ghostbusters, investigators and
exterminators of paranormal pests! This is dealing with UFO forms of Parapsychology and the
demon possession of ancient gods in ancient Mesopotamia.
13. EMP Hail Lindsay TBN
14. C-SPAN EMP attack report
15. “Under Siege 2" Dark Territory dealing with EMP weapon
16. “Golden Eye” dealing with Russia form of EMP weapons
17. Documentary “Final Warning” about Surveillance Society by Grant R. Jeffrey
18. “Fallen” A Police Detective witness a execution of possessed serial killer that he
captured. The spirit that possessed the serial killer left him and possessed one of the guards that was
their to continue the killing like a copy cat killer.
CONVENTION ON THE PREVENTION AND PUNISHMENT
OF THE CRIME OF GENOCIDE
http://www.ohchr.org/english/law/genocide.htm
Approved and proposed for signature and ratification or accession by General Assembly
resolution 260 A (III) of 9 December 1948
Entry into force: 12 January 1951, in accordance with article XIII
The Contracting Parties ,
Having considered the declaration made by the General Assembly of the United Nations in its
resolution 96 (I) dated 11 December 1946 that genocide is a crime under international law,
contrary to the spirit and aims of the United Nations and condemned by the civilized world,
Recognizing that at all periods of history genocide has inflicted great losses on humanity, and
Being convinced that, in order to liberate mankind from such an odious scourge, international coMIND
CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 38 O F 51
operation is required,
Hereby agree as hereinafter provided :
Article I
The Contracting Parties confirm that genocide, whether committed in time of peace or in time of
war, is a crime under international law which they undertake to prevent and to punish.
Article II
In the present Convention, genocide means any of the following acts committed with intent to
destroy, in whole or in part, a national, ethnical, racial or religious group, as such:
( a ) Killing members of the group;
( b ) Causing serious bodily or mental harm to members of the group;
( c ) Deliberately inflicting on the group conditions of life calculated to bring about its physical
destruction in whole or in part;
( d ) Imposing measures intended to prevent births within the group;
( e ) Forcibly transferring children of the group to another group.
Article III
The following acts shall be punishable:
( a ) Genocide;
( b ) Conspiracy to commit genocide;
( c ) Direct and public incitement to commit genocide;
( d ) Attempt to commit genocide;
( e ) Complicity in genocide.
Article IV
Persons committing genocide or any of the other acts enumerated in article III shall be punished,
whether they are constitutionally responsible rulers, public officials or private individuals.
Article V
The Contracting Parties undertake to enact, in accordance with their respective Constitutions, the
necessary legislation to give effect to the provisions of the present Convention, and, in particular,
to provide effective penalties for persons guilty of genocide or any of the other acts enumerated
in article III.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 39 O F 51
Article VI
Persons charged with genocide or any of the other acts enumerated in article III shall be tried by a
competent tribunal of the State in the territory of which the act was committed, or by such
international penal tribunal as may have jurisdiction with respect to those Contracting Parties
which shall have accepted its jurisdiction.
Article VII
Genocide and the other acts enumerated in article III shall not be considered as political crimes
for the purpose of extradition.
The Contracting Parties pledge themselves in such cases to grant extradition in accordance with
their laws and treaties in force.
Article VIII
Any Contracting Party may call upon the competent organs of the United Nations to take such
action under the Charter of the United Nations as they consider appropriate for the prevention
and suppression of acts of genocide or any of the other acts enumerated in article III.
Article IX
Disputes between the Contracting Parties relating to the interpretation, application or fulfilment
of the present Convention, including those relating to the responsibility of a State for genocide or
for any of the other acts enumerated in article III, shall be submitted to the International Court of
Justice at the request of any of the parties to the dispute.
Article X
The present Convention, of which the Chinese, English, French, Russian and Spanish texts are
equally authentic, shall bear the date of 9 December 1948.
Article XI
The present Convention shall be open until 31 December 1949 for signature on behalf of any
Member of the United Nations and of any non-member State to which an invitation to sign has
been addressed by the General Assembly. The present Convention shall be ratified, and the
instruments of ratification shall be deposited with the Secretary-General of the United Nations.
After 1 January 1950, the present Convention may be acceded to on behalf of any Member of the
United Nations and of any non-member State which has received an invitation as aforesaid.
Instruments of accession shall be deposited with the Secretary-General of the United Nations.
Article XII
Any Contracting Party may at any time, by notification addressed to the Secretary-General of the
United Nations, extend the application of the present Convention to all or any of the territories
for the conduct of whose foreign relations that Contracting Party is responsible.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 40 O F 51
Article XIII
On the day when the first twenty instruments of ratification or accession have been deposited, the
Secretary-General shall draw up a procèès-verbal and transmit a copy thereof to each Member of
the United Nations and to each of the non-member States contemplated in article XI.
The present Convention shall come into force on the ninetieth day following the date of deposit
of the twentieth instrument of ratification or accession.
Any ratification or accession effected subsequent to the latter date shall become effective on the
ninetieth day following the deposit of the instrument of ratification or accession.
Article XIV
The present Convention shall remain in effect for a period of ten years as from the date of its
coming into force.
It shall thereafter remain in force for successive periods of five years for such Contracting Parties
as have not denounced it at least six months before the expiration of the current period.
Denunciation shall be effected by a written notification addressed to the Secretary-General of the
United Nations.
Article XV
If, as a result of denunciations, the number of Parties to the present Convention should become
less than sixteen, the Convention shall cease to be in force as from the date on which the last of
these denunciations shall become effective.
Article XVI
A request for the revision of the present Convention may be made at any time by any Contracting
Party by means of a notification in writing addressed to the Secretary-General.
The General Assembly shall decide upon the steps, if any, to be taken in respect of such request.
Article XVII
The Secretary-General of the United Nations shall notify all Members of the United Nations and
the non-member States contemplated in article XI of the following:
( a ) Signatures, ratifications and accessions received in accordance with article XI;
( b ) Notifications received in accordance with article XII;
( c ) The date upon which the present Convention comes into force in accordance with article
XIII;
( d ) Denunciations received in accordance with article XIV;
( e ) The abrogation of the Convention in accordance with article XV;
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 41 O F 51
( f ) Notifications received in accordance with article XVI.
Article XVIII
The original of the present Convention shall be deposited in the archives of the United Nations.
A certified copy of the Convention shall be transmitted to each Member of the United Nations
and to each of the non-member States contemplated in article XI.
Article XIX
The present Convention shall be registered by the Secretary-General of the United Nations on the
date of its coming into force.
STANDARD RULES ON THE EQUALIZATION OF
OPPORTUNITIES FOR PERSONS WITH DISABILITIES
http://www.ohchr.org/english/law/opportunities.htm
Adopted by General Assembly resolution 48/96 of 20 December 1993
INTRODUCTION
Background and current needs
1. There are persons with disabilities in all parts of the world and at all levels in every society.
The number of persons with disabilities in the world is large and is growing.
2. Both the causes and the consequences of disability vary throughout the world. Those variations
are the result of different socio-economic circumstances and of the different provisions that
States make for the well-being of their citizens.
3. Present disability policy is the result of developments over the past 200 years. In many ways it
reflects the general living conditions and social and economic policies of different times. In the
disability field, however, there are also many specific circumstances that have influenced the
living conditions of persons with disabilities. Ignorance, neglect, superstition and fear are social
factors that throughout the history of disability have isolated persons with disabilities and
delayed their development.
4. Over the years disability policy developed from elementary care at institutions to education for
children with disabilities and rehabilitation for persons who became disabled during adult life.
Through education and rehabilitation, persons with disabilities became more active and a driving
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 42 O F 51
force in the further development of disability policy. Organizations of persons with disabilities,
their families and advocates were formed, which advocated better conditions for persons with
disabilities. After the Second World War the concepts of integration and normalization were
introduced, which reflected a growing awareness of the capabilities of persons with disabilities.
PRINCIPLES FOR THE PROTECTION OF PERSONS WITH
MENTAL ILLNESS AND THE IMPROVEMENT OF
MENTAL HEALTH CARE
http://www.ohchr.org/english/law/principles.htm
Adopted by General Assembly resolution 46/119 of 17 December 1991
Application
These Principles shall be applied without discrimination of any kind such as on grounds of disability,
race, colour, sex, language, religion, political or other opinion, national, ethnic or social origin, legal
or social status, age, property or birth.
Definitions
In these Principles:
"Counsel" means a legal or other qualified representative;
"Independent authority" means a competent and independent authority prescribed by domestic law;
"Mental health care" includes analysis and diagnosis of a person's mental condition, and treatment,
care and rehabilitation for a mental illness or suspected mental illness;
"Mental health facility" means any establishment, or any unit of an establishment, which as its
primary function provides mental health care; "Mental health practitioner" means a medical doctor,
clinical psychologist, nurse, social worker or other appropriately trained and qualified person with
specific skills relevant to mental health care; "Patient" means a person receiving mental health care
and includes all persons who are admitted to a mental health facility; "Personal representative"
means a person charged by law with the duty of representing a patient's interests in any specified
respect or of exercising specified rights on the patient's behalf, and includes the parent or legal
guardian of a minor unless otherwise provided by domestic law; "The review body" means the body
established in accordance with Principle 17 to review the involuntary admission or retention of a
patient in a mental health facility.
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 43 O F 51
Convention on the Non-Applicability of Statutory Limitations to
War Crimes and Crimes Against Humanity
http://www.ohchr.org/english/law/warcrimes.htm
Adopted and opened for signature, ratification and accession by General Assembly
resolution 2391 (XXIII)
of 26 November 1968
Entry into force: 11 November 1970, in accordance with article VIII
Preamble
The States Parties to the present Convention ,
Recalling resolutions of the General Assembly of the United Nations 3 (I) of 13 February 1946
and 170 (II) of 31 October 1947 on the extradition and punishment of war criminals, resolution
95 (I) of 11 December 1946 affirming the principles of international law recognized by the
Charter of the International Military Tribunal, Nüürnberg, and the judgement of the Tribunal, and
resolutions 2184 (XXI) of 12 December 1966 and 2202 (XXI) of 16 December 1966 which
expressly condemned as crimes against humanity the violation of the economic and political
rights of the indigenous population on the one hand and the policies of apartheid on the other,
Recalling resolutions of the Economic and Social Council of the United Nations 1074 D
(XXXIX) of 28 July 1965 and 1158 (XLI) of 5 August 1966 on the punishment of war criminals
and of persons who have committed crimes against humanity,
Noting that none of the solemn declarations, instruments or conventions relating to the
prosecution and punishment of war crimes and crimes against humanity made provision for a
period of limitation,
Considering that war crimes and crimes against humanity are among the gravest crimes in
international law,
Convinced that the effective punishment of war crimes and crimes against humanity is an
important element in the prevention of such crimes, the protection of human rights and
fundamental freedoms, the encouragement of confidence, the furtherance of co-operation among
peoples and the promotion of international peace and security,
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 44 O F 51
PRINCIPLES OF INTERNATIONAL CO-OPERATION IN
THE DETECTION, ARREST, EXTRADITION AND
PUNISHMENT OF PERSONS GUILTY OF WAR CRIMES
AND CRIMES AGAINST HUMANITY
http://www.ohchr.org/english/law/guilty.htm
Adopted by General Assembly resolution 3074 (XXVIII) of 3 December 1973
The General Assembly ,
Recalling its resolutions 2583 (XXIV) of 15 December 1969, 2712 (XXV) of 15 December 1970,
2840 (XXVI) of 18 December 1971 and 3020 (XXVII) of 18 December 1972,
Taking into account the special need for international action in order to ensure the prosecution and
punishment of persons guilty of war crimes and crimes against humanity,
Having considered the draft principles of international co-operation in the detection, arrest,
extradition and punishment of persons guilty of war crimes and crimes against humanity,
Declares that the United Nations, in pursuance of the principles and purposes set forth in the Charter
concerning the promotion of co-operation between peoples and the maintenance of international
peace and security, proclaims the following principles of international co-operation in the detection,
arrest, extradition and punishment of persons guilty of war crimes and crimes against humanity:
1. War crimes and crimes against humanity, wherever they are committed, shall be subject to
investigation and the persons against whom there is evidence that they have committed such crimes
shall be subject to tracing, arrest, trial and, if found guilty, to punishment.
2. Every State has the right to try its own nationals for war crimes against humanity.
GENEVA CONVENTION RELATIVE TO THE
PROTECTION OF CIVILIAN PERSONS IN TIME OF WAR
(2ND PART)
http://www.ohchr.org/english/law/civilianpersons.htm
Adopted on 12 August 1949 by the Diplomatic Conference for the Establishment of
International Conventions for the Protection of Victims of War, held in Geneva from 21
April to 12 August 1949
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 45 O F 51
Entry into force: 21 October 1950
Part I
GENERAL PROVISIONS
Article 1
The High Contracting Parties undertake to respect and to ensure respect for the present Convention
in all circumstances.
Article 2
In addition to the provisions which shall be implemented in peacetime, the present Convention shall
apply to all cases of declared war or of any other armed conflict which may arise between two or
more of the High Contracting Parties, even if the state of war is not recognized by one of them. The
Convention shall also apply to all cases of partial or total occupation of the territory of a High
Contracting Party, even if the said occupation meets with no armed resistance.
Although one of the Powers in conflict may not be a party to the present Convention, the Powers
who are parties thereto shall remain bound by it in their mutual relations. They shall furthermore be
bound by the Convention in relation to the said Power, if the latter accepts and applies the provisions
thereof.
PROTOCOL ADDITIONAL TO THE GENEVA
CONVENTIONS OF 12 AUGUST 1949, AND RELATING TO
THE PROTECTION OF VICTIMS OF NONINTERNATIONAL
ARMED CONFLICTS (PROTOCOL II)
http://www.ohchr.org/english/law/protocol2.htm
Adopted on 8 June 1977 by the Diplomatic Conference on the Reaffirmation and
Development of International Humanitarian Law applicable in Armed Conflicts
Entry into force: 7 December 1978, in accordance with Article 23
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 46 O F 51
Preamble
The High Contracting Parties ,
Recalling that the humanitarian principles enshrined in Article 3 common to the Geneva
Conventions of 12 August 1949 constitute the foundation of respect for the human person in cases
of armed conflict not of an international character, Recalling furthermore that international
instruments relating to human rights offer a basic protection to the human person, Emphasizing the
need to ensure a better protection for the victims of those armed conflicts, Recalling that, in cases
not covered by the law in force, the human person remains under the protection of the principles of
humanity and the dictates of the public conscience,
Have agreed on the following:
THE BIO’S OF WORLD WAR
PHENOMENAL
These bio's is what is effecting the body one way are another by the people using some
experimentation devices to torture people. Some of these forms of bio's may be reject by the
government because of classified information being keep secret by the government.
BIO-TERRORISM
BIO-TERROR
BIO-WAR
BIO-WARFARE
BIO-WEAPONS
BIO-HAZARD
BIO-CHEMICAL SOCIETY
BIOLOGICAL WARFARE
BIPOLAR
BIO-SECURITY
BIOTECHNOLOGY
BIO-WARRIOR
BIO-ETHICS
BIO-SAFETY
BIOCHEMIST
BIOGEOGRAPHIC
BIOASSAY
BIOCATALYST
BIOCHEMICAL MECHANISM
BIOMEDICAL EXPERIMENTATION
BIOENGINEERING
BIOCLIMATIC
BIOCLIMATOLOGY
BIODEGRADABLE
BIOELECTRICITY
BIOENGINEERING
BIOFEEDBACK
BIOGENESIS
BIO-FLAVINOID
BIOGENY
BIOCATALYTIC
BIOSYNTHESIS
BIOSPHERE
BIO-DEFENSE
BIO-ATTACK
BIO-FILM
BIOSENSOR
BIOLUMINESCENT
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 47 O F 51
BIOLOGICAL
BIOPHYSICS
BIONATURAL
BIOPRIVACY
THE GREATS OF THE GREAT
BABYLON
Genesis 6:5 And Jehovah saw that the wickedness of man was great in the earth, and that
every imagination of the thoughts of his heart was only evil continually.
Genesis 6:6 And it repented Jehovah that he had made man on the earth, and it grieved him
at his heart.
Genesis 6:7 And Jehovah said, I will destroy man whom I have created from the face of the
ground; both man, and beast, and creeping things, and birds of the heavens; for it repenteth
me that I have made them.
Revelation 17:1 And there came one of the seven angels that had the seven bowls, and spake
with me, saying, Come hither, I will show thee the judgment of the great harlot that sitteth
upon many waters;
Revelation 17:2 with whom the kings of the earth committed fornication, and they that
dwell in the earth were made drunken with the wine of her fornication.
Revelation 17:3 And he carried me away in the Spirit into a wilderness: and I saw a woman
sitting upon a scarlet-colored beast, full of names of blasphemy, having seven heads and ten
horns.
Revelation 17:4 And the woman was arrayed in purple and scarlet, and decked with gold
and precious stone and pearls, having in her hand a golden cup full of abominations, even
the unclean things of her fornication,
Revelation 17:5 and upon her forehead a name written, MYSTERY, BABYLON THE
GREAT, THE MOTHER OF THE HARLOTS AND OF THE ABOMINATIONS OF THE
EARTH.
Revelation 17:6 And I saw the woman drunken with the blood of the saints, and with the
blood of the martyrs of Jesus. And when I saw her, I wondered with a great wonder.
IN THE GREATS OF AMERICA SHE GOING TO REJECT SOME OF THESE GREATS
BECAUSE OF WHATING TO COVERUP THERE SINS BY USING TERRORIST TACTICS
TO DO SO. THIS IS FROM BOOKS, MOVIES AND HISTORY THAT THIS INFORMATION
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 48 O F 51
IS GOTTEN FROM.
THE GREAT WORLD WARS
THE GREAT WARLORDS, WAR FARES,
WARMONGERS, WARLOCKS
THE GREAT WICKEDNESS
THE GREAT COINTELPRO
THE GREAT FALSE MESSIAHS AND
FALSE PROPHETS
THE GREAT LIES, LIARS, LYING
THE GREAT CONFUSION AND
DELUSION
THE GREAT STALKING BY GREAT
STALKERS
THE GREAT SLAVERY
THE GREAT SATAN, ADVERSARY,
DEVIL
THE GREAT INTERFERES
THE GREAT TERRORIST
THE GREAT MIND CONTROL
THE GREAT BLACK AND WHITE
MAGIC
THE GREAT INIQUITY IMMORALITY
THE GREAT CHEMICAL
CONTAMINATION
THE GREAT HATERS
THE GREAT DRUG LORDS
THE GREAT SMUGGLERS
THE GREAT ANTI-SEAL OF GOD
THE GREAT ANTI-CREATOR
THE GREAT ANTI-PEACE
THE GREAT ATHEIST BIG BANG
BELIEF
THE GREAT INVASION OF PRIVACY
ENEMY OF THE STATES
THE GREAT DEBTOR NATION
THE GREAT BLACK MARKET
THE GREATEST COVER-UP OF ALL:
THE GREAT VOTERS FRAUD IN
AMERICA
THE GREAT HARLOT THAT SITTETH
UPON MANY WATERS
THE GREAT HALLUCINATION
CHIMERA
THE GREAT INJUSTICES MONKEY
TRIAL EXPERIMENT
THE GREAT MONKEY WRENCH
MISMANAGEMENT
THE GREAT MONKEY VIRUSES
THE GREAT AIRBORNE DISEASES
THE GREAT INQUISITOR AND
CRUSADE
THE GREAT TRIPLE TREASON
THE GREAT LUCIFERIAN RELIGION
THE GREAT SECRET WARS
THE GREAT ANTI-CONSTITUTIONIST
ILLEGAL OPERATIONS, PROJECTS BY
THE SHADOW GOVERNMENT
Some this infromationa about some of these forms of shadow government will be denied by the
govenment because they don't want know body to know what they're doing to people. This is a
problem with classified information that don't allow people to know about all the government is
doing in secret wars and technology like the project paperclip. A lot of people don't know about this
psychology warfare because it is so unchristian and terrorist that the population would know that
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 49 O F 51
they're playing commumist games with civilians.
THE BLACK OF
THE SHADOW
GOVERNMENT
OPERATIONS
OF THE
SHADOW
GOVERNMENT
ALL ILLEGAL
PROJECTS
OF THE
SHADOW
GOVERNMENT
BLACK OPS BLACK BAG
BLACK SURVEILLANCE
BLACK TERRORIST
BLACK PROGRAM
BLACK ACTIVITIES
BLACK MAIL
BLACK BACKLASH
BLACK DOG
BLACK MASTERS
BLACK WIZARDS
TASK FORCE BLACK
BLACK HAWKS
BLACKCAT
SHADOW
GOVERNMENT
SHADOW WARRIOR
DARK SHADOWS
SHADOW OPS
DEEP BLACK
OPERATION PROMOTE
LIBERTY
OPERATION DESERT
STORM
OPERATION PANAMA
OPERATION JOINT
SPECIAL TASK FORCE
(JSOTF)
OPERATION JUST CAUSE
SPECIAL OPERATIONS
SPECIAL OPERATIONS
FORCES
OPERATION CLIMAX
OPERATION PAPERCLIP
OPERATION URGENT
FURY (GRENADA, OCTNOV
1983, JAN-JUN 1985)
OPERATION JUST
CAUSE
( P A N A M A ,
L A T E
DECEMBER 1989)
OPERATION DESERT
SHIELD (KUWAIT, IRAQ,
FROM AUGUST 1990)
OPERATION DESERT
S T O RM ( S A U D I
ARABIA, TURKEY, IRAQ,
1991)
OPERATION UPHOLD
DEMOCRACY (HAITI,
1994-1995)
OPERATION JOINT
GUARD (PART OF A UN
OPERATION IN BOSNIAHERZEGOVINA,
1995)
OPERATION DESERT
THUNDER (PART OF A
UN OPERATION IN IRAQ)
OPERATION DESERT FOX
(IRAQ, 2 TO 3 DAYS IN
DECEMBER 1998)
PROJECT DEEP WATER
PROJECT PAPERCLIP
PROJECT COLD EMPIRE
PROJECT AQUARIUS
PROJECT MILSTAR
P R O J E C T T A C IT
RAINBOW
PROJECT TIMBERWIND
PROJECT CODE EVA
PROJECT COBRA MIST
P R O J E C T C O LD
WITNE SS PROJECT
MONA RCH PROJECT
COINTEL PRO PROJECT
MK-ULTRA PROJECT
ARTICHOKE PROJECT
BLUEBIRD PROJECT
CHAOS PROJ E C T
STRATEGIC DEFENSE
INITIATIVE PROJECT
GLOBAL PROTECTION
AGAINST LIMITED
STRIKES PROJECT SON
OF STAR WARS
PROJECT PANDORA'S
BOX
PROJECT MONTAUK
PROJECT US HAARP
PROJECT HUMAN
COGNOM E PROJECT
GENOM E PROJECT
R U S S I A N B O OK
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 50 O F 51
T R A N S L A T I O N
PROJEC T MANHATTAN
PROJECT
PROJEC THOUSTON
PROJECT
PROJEC T BLOWBACK
PROJEC T ELECTRONIC
S U R V E I LL A N C E
PROJE CT NIZKOR
PROJ ECT OMEGA
PROJECT SIGMA
PROJECT CAMELOT
METRIC CLAY
1701 RIDLEY LANE
STARKVILLE MS 39759
662-324-5865
P.S. I HAVE MUCH MORE INFORMATION THEN THIS EVEN MORE THAN IS AT MY WEB
SITE.
PLEASE READ NOTICE
This site contains copyrighted material the use of which has not always been specifically authorized
by the copyright owner. We are making such material available in our efforts to advance
understanding of environmental, political, human rights, economic, democracy, scientific, and social
justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as
provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section
107, the material on this site is distributed without profit to those who have expressed a prior interest
in receiving the included information for research and educa t i o n a l pu r p o s e s . For m ore in
f or
m a t i on go t o : http://www.law.cornell.edu/uscode/17/107.shtml. If you wish to use copyrighted
material from this site for purposes of your own that go beyond 'fair use', you must obtain permission
from the copyright owner.
TITLE 17 > CHAPTER 1 > Sec. 107. Sec. 107. - Limitations on exclusive rights: Fair use
Notwithstanding the provisions of sections 106 and 106A, the fair use of a copyrighted work,
including such use by reproduction in copies or phonorecords or by any other means specified by
that section, for purposes such as criticism, comment, news reporting, teaching (including multiple
copies for classroom use), scholarship, or research, is not an infringement of copyright. In
determining whether the use made of a work in any particular case is a fair use the factors to be
considered shall include -
(1) the purpose and character of the use, including whether such use is of a commercial nature or
is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and
substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the
MIND CONTROL, ILLEGAL PRIVACY INVASION AND ITS SICKNESS AND DEATHS PAGE 51 O F 51
effect of the use upon the potential market for or value of the copyrighted work. The fact that a work
is unpublished shall not itself bar a finding of fair use if such finding is made upon consideration of
all the above factors.
GOVERNMENT COPYRIGHTS No copyright is claimed on material from United States Government
works Government publications are not eligible for copyright protection under United States law.
Works by agents, representatives or members of federal, state or local governments, whether paid
or unpaid, are therefore in the public domain. This includes the legislative, judical or executive
branches, the U.S. military, all law enforcment agencies and all other agencies or divisions which
are supported by taxpayer dollars, such as the U.S. Center for Disease Control and other
quasigovernmental organizations. All works produced under sponsorship, subsidy, direction or
control of the U.S. Government, their agents or representatives, whether classified or unclassified,
including all works produced by independent organizations receiving direct funding from the U.S.
Government for such works are ineligible for copyright protection.