Beware of the Internet Troll

Beware of the Internet Troll

 


WRITTEN BY A TRUTH SOLDIER

HTTP://DANIELTOWSEY.WORDPRESS.COM

I ASSUME MANY OF YOU HAVE NEVER HEARD OF AN INTERNET TROLL.

I WILL NOW CAUTION THOSE OF YOU IN THE TRUTH REVOLUTION AND THOSE OF YOU WHO ARE NEW

 TO THE TRUTH MOVEMENT AS TO

WHAT A TROLL IS, WHAT THEY DO AND HOW THEY DO IT..

FIRST OF ALL A TROLL IS ONE THAT IS TRAINED IN WORD WARFARE AND THEY ARE PAID TO SIT AT THEIR

 COMPUTERS ALL DAY SEARCHING

OUT TRUTH TELLERS WHO ARE IN PUBLIC FORUMS OR ANY OTHER ON-LINE PLACES WHERE PEOPLE

 WILL GO TO TO TRY AND SEEK TRUTH,

IN THE QUEST TO UNDERSTAND THE EVILS OF THE NEW WORLD ORDER BANKSTERS THAT ARE TRYING

 TO NOT ONLY CONTROL THE WORLD.

THEY WANT TO OWN IT ALL.

SOME TROLLS ARE ASSIGNED KNOWN TARGETED TRUTH ACTIVISTS, WRITERS, TRUTH SOLDIERS,

 TRUTH WARRIORS ETC.

OKAY MANY OF YOU UNINFORMED MIGHT ALREADY HAVE STOPPED READING THIS..

I CAN NOT HELP THE DROP OUTS.

BUT FOR THE REST OF YOU WHO HAVE ENOUGH MENTAL STRENGTH TO HANDLE THE OCCULT KNOWLEDGE.

HERE GOES..

THE NWO IS ALWAYS ABOUT CONTROLLING WHAT IS TERMED AS YOU THE SHEEPLE.

THE NWO MONITORS ALL PUBLIC SENTIMENTS..

THEY ALWAYS MONITOR ALL PUBLIC ACTIVITIES AND REBELLIONS AGAINST THE NWO MATRIX

CONTROL SYSTEM.

SO IT IS VERY EASY TO UNDERSTAND THAT THEY MOST DEFINITELY HAVE PROFESSIONAL

SABOTEURS NOW KNOWN AS TROLLS INVOLVED IN

THE SABOTAGING AND DESTRUCTION OF ALL FREE THINKING INDIVIDUALS AND MOVEMENTS.

SO THE TROLL WELL JOIN IN A DISCUSSION OR LEAVE DISCREDITING RESPONSE TO TRUTH ACTIVISTS

POSTS..

THESE TROLLS (MEMBERS) WILL HAVE A FAKE NAME, BUT PLEASE UNDERSTAND THAT TROLLS ARE

ASSIGNED A PARTICULAR JOB TO DO OR

ARE ASSIGNED TO TARGET CERTAIN SPECIFIC INDIVIDUALS.

SOME TRUTH ACTIVISTS MAYBE LURED INTO PRE-STRUCTURED TROLL TRAPS.

SITES THAT WERE CREATED BY TROLLS TO ENTRAP INDIVIDUALS AND AT BARE MINIMUM THESE SITES

ARE ENGINEERED TO WASTE THE

ACTIVIST VALUABLE TIME.

TROLLS WILL BE IN ON-LINE SKYPE RELATED RADIO CHAT ROOMS.

SOME OF THESE ON-LINE RADIO COMMUNITIES MAY ACTUALLY HAVE NO LISTENERS AT ALL.

THESE TROLLS ARE EXPERTS AT ATTACKING KNOWN TRUTH SOLDIERS.

THE TROLLS WILL DIG THEIR WAY DEEP INTO THE TRUST OF THE GROUP.

IF A TROLL IS VERY SUCCESSFUL IT WILL GET INTO POSSIBLY THE CONTROL OF THE GROUP OR THE DISCUSSION.

THE REAL GOAL OF ANY TROLL IS TO KILL FREE AND INDEPENDENT INTELLECTUAL CRITICAL THOUGHT.

A TROLLS JOB IS TO SIDE TRACT AND DESTROY ALL INTELLIGENT DISCOURSE.

WHEN THESE TROLLS SIGN IN THEY IN FACT CAN BE ANYONE IN THE TROLL COVERT BUSINESS.

SO THAT MEANS JUST BECAUSE YOUR SCREEN SAYS IT IS SUCH AND SUCH IT DOES NOT MEAN IT IS

ACTUALLY THE SAME INDIVIDUAL THAT IS

DOING THE TROLLING.

TROLLS ARE IN THE ESPIONAGE BUSINESS.

I THINK I HAVE NOW EXPLAINED ENOUGH TO ENLIGHTENING YOU ABOUT THIS VERY DANGEROUS

ANTI FREE SPEECH

AND ANTI FREEDOM ACTIVITY..

SO BEWARE OF THE TROLLS..

STAYED TUNED FOR MY NEXT ARTICLE TO BE ENTITLED. “BEWARE OF THE FAKE TRUTHER SITES”

READ AND DOWNLOAD A TRUTH SOLDIER ARTICLES AT

HTTP://WWW.SCRIBD.COM/DANIELTOWSEY

FOLLOW A TRUTH SOLDIER ON

HTTP://WWW.TWITTER.COM/DANIELTOWSEY

Twenty-Five Ways To Suppress Truth: The Rules of Disinformation

http://ca.groups.yahoo.com/group/TheTruthSoldiersClub/message/12279

http://vaticproject.blogspot.com/2009/07/twenty-five-ways-to-suppress-truth.html

RIGHT CLICK SAVE AS BEWARE OF THE INTERNET TROLL.PDF

C.I.A. Sponsored Trolls Monitor Internet &

Interact With Users to Discredit Factual Information

http://worldtruth.tv/c-i-a-sponsored-trolls-monitor-internet-interact-with-users-to-discredit-factual-information/

CIA Logo

In July of this year it became apparent through a flood of mainstream media reports that the National Security Agency (NSA) was “desperate to hire new hacking talent to protect the nation’s critical infrastructure” yet the NSA is notorious for its surveillance programs on American digital activity.

David Petraeus, former director of the CIA, said at a summit for In-Q-Tel, that he was speculating on the “internet of things” and that “‘Transformational’ is an overused word, but I do believe it properly applies to these technologies . . . particularly to their effect on clandestine tradecraft.”

Petraeus is seeking to better the CIA’s ability to create online identities for undercover spies. Currently, each internet user has a digital footprint that can trace the movements online to the person on the other end of the screen. Petraeus wants to utilize technology that will essentially erase a digital footprint; erasing all traces of anyone at the whim of the CIA.

In a possible preparation for the ability of the CIA to spy on American citizens with their household items, the NSA’s Utah Data Center is located in the Utah desert in the foot hills of the Wasatch mountain range. This is the centerpiece of the Global Information Grid; a military project that collects yottabytes of data. They are listening to every conversation, reading every post, intercepting every text message under the false flag of terrorism.

The facility has the technological ability to record and analyze every communication in the world. From emails to phone calls to text messages to chats; nothing is private anymore.

Based on “threat Levels” the NSA can use all the technology at their disposal to obtain information on:

• Finances
• Stock transactions
• Business deals
• Foreign military
• Diplomatic secrets
• Legal documents
• Personal civilian communications

This information could be used at Fusion Centers for the DHS to create a more efficient profile on each and every American citizen. The implications are staggering. This ability to collect these types of data are a violation of the 4th Amendment guard against unreasonable searches and seizures. By collecting intelligence on every American citizen, the US government is treating everyone as if they were a potential foreign or domestic terrorist. Whether this assumption is valid or not, under the US constitution, Americans are supposed to be protected from intrusion of government; even if that government is their own.

At the same time the NSA spy center was being constructed, Attorney General Eric Holder new guidelines for the National Counterterrorism Center (NCTC). These guidelines will allow the NCTC access to data on American citizens once held under right to privacy. The NCTC will focus on collecting and sharing information; regardless of whether or not there is the threat of terrorism. The will collaborate with local state officials, tribal courts and private partners; as well as the FBI and DHS and other federal agencies.

The Obama administration empowered the NCTC with the authority afforded Obama under Presidential Executive Order 13354. This EO was codified by the Intelligence Reform and Terrorism Prevention Act of 2004. The NCTC reports directly to the President and director of National Intelligence as instructed by the President and Department of Homeland Security (DHS). Sen. John McCain was integral in the creation of this combination of military strength and governmental power culminating in all-encompassing tyranny.

Both private and public corporations will be employed to mine the data. Silicon Valley and other technology giants in the private sector will have open access to private information on any and all American citizens.

Since the manufactured attack on 9/11, the US government has created a “vast domestic intelligence apparatus” that spies on Americans and collects massive amounts of data to be profiled and used at the discretion of the Federal Bureau of Investigations (FBI), local law enforcement, DHS and military criminal investigators. The FBI and NSA house more than 1.5 billion government and private sector profiles. The information on average citizens includes all sources of criminal and non-criminal databases that assist the US government in creating a filing system on each American.

The NSA has a comprehensive program to search out our schools into scouting grounds for a team of American grown hacker community. The Obama administration has made it a concern of theirs that the future of cybersecurity rest with the college graduates of tomorrow. The NSA is focusing on colleges and universities within the US. Four schools have already been singled out as officialCenters of Academic Excellence in Cyber Operations (CAE-COP).

The CAE-COP focuses on recruiting persons with “particular emphasis on technologies and techniques related to specialized cyber operations (e.g., collection, exploitation, and response), to enhance the national security posture of our Nation.”

Those chosen for this program become vital researchers expected to assist the NSA in:

• Global communications and computing networks
• Developing a digital strategic advantage
• Collaboration with the US government on cyber issues
• Carry out directives on designated targets at the discretion of the US government

These “cyber operators” are trained to become an elite team of “computer geniuses” that are experts in computer hacking, digital communications, cyber intelligence – for the purpose of spying on Americans; as well as conducting interactive digital psy-ops with users of the internet.

Earlier this month, Janet Napolitano, in her blog entitled “Inspiring the Next Generation of Cyber Professionals”, would like future generations to learn about cybersecurity so that their contribution to the federal government is secure to “ensure their professional development.” The collaboration of the Department of Homeland Security and the National Security Agency will support “the nation’s educational infrastructure by supporting Centers of Academic Excellence” to make sure that the “scope of cyber education” becomes an important function for those in the field as inspired by theNational Initiative for Cybersecurity Education (NICE).

NICE is meant to “establish an operational, sustainable and continually improving cybersecurity education program for the nation to use sound cyber practices that will enhance the nation’s security.” The National Institute of Standards and Technology (NIST) oversee NICE by providing information and leverage to encourage the development of citizens to become “responsible” when using the Internet.

Beginning in kindergarten, Napolitano hopes that the DHS-sponsored US Cyber Challenge will provide schools, universities and all forms of academia in the private sector the federal government-allocated tools they would need to “develop the best and brightest cyber talent to meet our nation’s growing and changing security needs.”

In 2011, the NICE report entitled, “Shaping the Future of Cybersecurity Education”, explored intercepting children in the public education system, as well as continuing the focus throughout their educational career, there can be a national recruitment and retention process that produces “skilled workers for the private sector and government.”

Napolitano’s Secretary’s Honors Program for Cybersecurity Professionals is meant to recruit college students for the purpose of assimilating their talents into the federal government for “missions including cyber” security as defined by the DHS Advisory Council Task Force on CyberSkills. This focus is to ensemble the most effectual cybersecurity team comprised of civilians, US veterans and those educated specifically in the field of IT technologies. For the sake of national security, DHS is selecting the most technically skilled citizens in the avenues of malware and digital forensic analysis, to participate in the Cybersecurity Internship Program for a 2 year internship that will result in a devotional career in the federal government and service to Big Sis.

In August, the DHS was central in the taking of domain names for websites without due process or explanation – simply using the blanket claim of copyright infringement. Holder and Napolitano received correspondence from several members of the House of Representatives who were in protest of the domain name seizures, citing that the copyright claims were questionable and that the websites were clearly being censored for alternative reasons.

The letter stated that: “Our concern centers on your Department’s methods, and the process given, when seizing the domain names of websites whose actions and content are presumed to be lawful, protected speech.”

According to Lynnae Williams, former CIA clandestine service trainee and DIA analyst, the FBI and CIA use trolls to monitor social media and interact with users to discredit information disseminated on the web. Williams explains that the CIA provides training videos to new recruits on how to troll the internet. Once a target is locked-in, all open source information is obtained on the individual, and then any angle to discredit them in public forum is used on social media sites.

Software is used to sift through the “mountains” of users on social networking sites. At the Atlanta CIA branch where Williams was trained, she personally witnessed CIA-sponsored and sanctioned trolling of Americans on social networking sites.

In 2011, the CIA revealed its Open Source Center where recruited personnel are used as government trolls to “analyze” websites for information pertinent to the objective of the US government – meaning discrediting targets on certain websites. Under the guise of conducting business intelligence (i.e. cyberespionage), the Open Source software gathers digital data on targets; including all Facebook posts, Twitter posts, comments on website threads. Those assigned to monitor this data can interact with users online through anonymous portals. Agents are designated to surveillance operations to message anyone, analyze political and religious speech, assess trends and conduct electronic eavesdropping through cell phones, satellites and other digital apparatus.

Agents not only survey the internet and interact as anonymous persons through directed postings, but also are deployed to wander through the streets domestically and in foreign nations to monitor newspaper and other printed media to extract useful information about the temperament of the general public.

Source:

http://www.liveleak.com/

I Was a Paid Internet Shill: How Shadowy Groups Manipulate Internet Opinion and Debate

Written by Alcyone January 8, 2013 in Corporate Controlled Media

Update 1/12/2013: CLN has received a takedown notice asking us to remove this article on the basis that “It is libelous and utterly false” from someone claiming to be a legal agent of Above Top Secret’s parent company. We are currently investigating and will post status updates as they become available. The original thread now appears to have vanished from Above Top Secret’s website.

Update 1/17/2013: We have requested clarification regarding the takedown request and have not received a response. We will provide updates on any new developments.

Update 4/3/2012: Above Top Secret’s legal agent never responded to our request for clarification of their takedown request. The original thread has now been moved to the “Hoax” category of the website, as ATS claims the author admitted it was a hoax in a private exchange. To the best of our knowledge, this private exchange or the details thereof have not been posted publicly to substantiate this claim. Regardless, we believe that covert operations to manipulate online opinion and debate do exist (and indeed have been publicly acknowledged in many of the supporting links below). Whether this specific case is true or not, it remains a valuable and provocative dialogue still worthy of consideration.

____________________

CLN Editor’s Note: The type of propaganda strategy described in the article below occurs across a wide range of topics and is employed by various corporate, political, and governmental groups to promote a variety of agendas. It is called astroturfing, and it is far more common than most would imagine. 

This post is not about Israel, and it is not partisan. It is simply an illustration of the mechanics of how online debate can be manipulated. As this is an anonymous post, we have no way of verifying the information contained herein, and it is presented only for your consideration.

Our intent in posting this is not to spread paranoia or incite shill witch hunts, but merely to encourage readers to view what they read and engage with online with a more discerning eye.

This alleged confession is presented verbatim from its original thread to preserve its integrity. As such, you may notice some minor typographical errors.

——

Thread is close and hoaxed. The author admitted in a private exchange that the entire story was fabricated.
I am writing here to come out of the closet as a paid shill. For a little over six months, I was paid to spread disinformation and argue political points on the Internet. This site, ATS, was NOT one that I was assigned to post on, although other people in the same organization were paid to be here, and I assume they still walk among you. But more on this later.

I quit this job in the latter part of 2011, because I became disgusted with it, and with myself. I realized I couldn’t look myself in the mirror anymore. If this confession triggers some kind of retribution against me, so be it. Part of being a real man in this world is having real values that you stand up for, no matter what the consequences.

My story begins in early 2011. I had been out of work for almost a year after losing my last job in tech support. Increasingly desperate and despondent, I jumped at the chance when a former co-worker called me up and said she had a possible lead for me. “It is an unusual job, and one that requires secrecy. But the pay is good. And I know you are a good writer, so its something you are suited for.” (Writing has always been a hobby for me). She gave me only a phone-number and an address, in one of the seedier parts of San Francisco, where I live. intrigued, I asked her for the company’s URL and some more info. She laughed. “They don’t have a website. Or even a name. You’ll see. Just tell them I referred you.” Yes, it sounded suspicious, but long-term joblessness breeds desperation, and desperation has a funny way of overlooking the suspicious when it comes to putting food on the table.

The next day, I arrived at the address – the third floor in a crumbling building. The appearance of the place did not inspire confidence. After walking down a long, filthy linoleum-covered corridor lit by dimly-flickering halogen, I came to the entrance of the office itself: a crudely battered metal door with a sign that said “United Amalgamated Industries, Inc.” I later learned that this “company” changed its name almost monthly, always using bland names like that which gave no strong impression of what the company actually does. Not too hopeful, I went inside. The interior was equally shabby. There were a few long tables with folding chairs, at which about a dozen people were tapping away on old, beat-up computers. There were no decorations or ornaments of any type: not even the standard-issue office fica trees or plastic ferns. What a dump. Well, beggars can’t be choosers.

The manager, a balding man in his late forties, rose from the only stand-alone desk in the room and came forward with an easy smile. “You must be Chris. Yvette [my ex-co-worker] told me you’d be coming.” [Not our real names]. “Welcome. Let me tell you a little about what we do.” No interview, nothing. I later learned they took people based solely on referral, and that the people making the referrals, like my ex-colleague Yvette, were trained to pick out candidates based on several factors including ability to keep one’s mouth shut, basic writing skills, and desperation for work.

We sat down at his desk and he began by asking me a few questions about myself and my background, including my political views (which were basically non-existent). Then he began to explain the job. “We work on influencing people’s opinions here,” is how he described it. The company’s clients paid them to post on Internet message boards and popular chartrooms, as well as in gaming forums and social networks like Facebook and MySpace. Who were these clients? “Oh, various people,” he said vaguely. “Sometimes private companies, sometimes political groups.” Satisfied that my political views were not strong, he said I would be assigned to political work. “The best people for this type of job are people like you, without strong views,” he said with a laugh. “It might seem counterintuitive, but actually we’ve found that to be the case.” Well, OK. Fine. As long as it comes with a steady paycheck, I’d believe whatever they wanted me to believe, as the guy in Ghostbusters said.

After discussing pay (which was much better than I’d hoped) and a few other details, he then went over the need for absolute privacy and secrecy. “You can’t tell anyone what we do here. Not your wife, not your dog.” (I have neither, as it happens.) “We’ll give you a cover story and even a phone number and a fake website you can use. You will have to tell people you are a consultant. Since your background is in tech support, that will be your cover job. Is this going to be a problem for you?” I assured him it would not. “Well, OK. Shall we get started?”

“Right now?” I asked, a bit taken aback.

“No time like the present!” he said with a hearty laugh.

Continued in the next post – See more at: http://www.abovetopsecret.com/forum/thread826545/pg1#sthash.EGrlcV4k.dpuf

——

Thread is close and hoaxed. The author admitted in a private exchange that the entire story was fabricated.

I am writing here to come out of the closet as a paid shill. For a little over six months, I was paid to spread disinformation and argue political points on the Internet. This site, ATS, was NOT one that I was assigned to post on, although other people in the same organization were paid to be here, and I assume they still walk among you. But more on this later.

I quit this job in the latter part of 2011, because I became disgusted with it, and with myself. I realized I couldn’t look myself in the mirror anymore. If this confession triggers some kind of retribution against me, so be it. Part of being a real man in this world is having real values that you stand up for, no matter what the consequences.

My story begins in early 2011. I had been out of work for almost a year after losing my last job in tech support. Increasingly desperate and despondent, I jumped at the chance when a former co-worker called me up and said she had a possible lead for me. “It is an unusual job, and one that requires secrecy. But the pay is good. And I know you are a good writer, so its something you are suited for.” (Writing has always been a hobby for me). She gave me only a phone-number and an address, in one of the seedier parts of San Francisco, where I live. intrigued, I asked her for the company’s URL and some more info. She laughed. “They don’t have a website. Or even a name. You’ll see. Just tell them I referred you.” Yes, it sounded suspicious, but long-term joblessness breeds desperation, and desperation has a funny way of overlooking the suspicious when it comes to putting food on the table.

The next day, I arrived at the address – the third floor in a crumbling building. The appearance of the place did not inspire confidence. After walking down a long, filthy linoleum-covered corridor lit by dimly-flickering halogen, I came to the entrance of the office itself: a crudely battered metal door with a sign that said “United Amalgamated Industries, Inc.” I later learned that this “company” changed its name almost monthly, always using bland names like that which gave no strong impression of what the company actually does. Not too hopeful, I went inside. The interior was equally shabby. There were a few long tables with folding chairs, at which about a dozen people were tapping away on old, beat-up computers. There were no decorations or ornaments of any type: not even the standard-issue office fica trees or plastic ferns. What a dump. Well, beggars can’t be choosers.

The manager, a balding man in his late forties, rose from the only stand-alone desk in the room and came forward with an easy smile. “You must be Chris. Yvette [my ex-co-worker] told me you’d be coming.” [Not our real names]. “Welcome. Let me tell you a little about what we do.” No interview, nothing. I later learned they took people based solely on referral, and that the people making the referrals, like my ex-colleague Yvette, were trained to pick out candidates based on several factors including ability to keep one’s mouth shut, basic writing skills, and desperation for work.

We sat down at his desk and he began by asking me a few questions about myself and my background, including my political views (which were basically non-existent). Then he began to explain the job. “We work on influencing people’s opinions here,” is how he described it. The company’s clients paid them to post on Internet message boards and popular chartrooms, as well as in gaming forums and social networks like Facebook and MySpace. Who were these clients? “Oh, various people,” he said vaguely. “Sometimes private companies, sometimes political groups.” Satisfied that my political views were not strong, he said I would be assigned to political work. “The best people for this type of job are people like you, without strong views,” he said with a laugh. “It might seem counterintuitive, but actually we’ve found that to be the case.” Well, OK. Fine. As long as it comes with a steady paycheck, I’d believe whatever they wanted me to believe, as the guy in Ghostbusters said.

After discussing pay (which was much better than I’d hoped) and a few other details, he then went over the need for absolute privacy and secrecy. “You can’t tell anyone what we do here. Not your wife, not your dog.” (I have neither, as it happens.) “We’ll give you a cover story and even a phone number and a fake website you can use. You will have to tell people you are a consultant. Since your background is in tech support, that will be your cover job. Is this going to be a problem for you?” I assured him it would not. “Well, OK. Shall we get started?”

“Right now?” I asked, a bit taken aback.

“No time like the present!” he said with a hearty laugh.

Continued in the next post – See more at: http://www.abovetopsecret.com/forum/thread826545/pg1#sthash.EGrlcV4k.dpuf

For more information on this important topic, see:

- Alcyone @CLN


http://danieltowsey.wordpress.com/2010/12/21/beware-of-the-internet-troll/

HENRY DEACON AKA ARTHUR NEUMANN – ALL INTERVIEWS

HENRY DEACON – AKA ARTHUR NEUMANN

NOTE:  This page contains all written and video Camelot interviews with Arthur.

Re:  Arthur Neumann is his real name.  Initially, when he first came forward he did so under an assumed name (Henry Deacon) to protect himself and his family.  In 2009 he decided to come forward under his real name.

An Interview with ‘Henry Deacon’, a Livermore Physicist

 

This interview was transcribed from video as the interviewee expressed a wish to remain anonymous (‘Henry Deacon’ is a pseudonym, prompted by his similarity to the likeable and creative polymath on the Eureka TV series). Certain details have been deleted and/or amended in order to ensure that his identity remains concealed, and the transcript has been “cleaned” of most expressed natural hesitations and the like. Meanwhile, it is most important to note that none of the factual information disclosed has been altered or amended in any way.

Henry’s name and employment details are known and verified and we were able to meet with him personally more than once. He was understandably a little nervous but definitely wanted to talk with us. In conversation, he sometimes responded with silence and meaningful glances or enigmatic smiles rather than words. He was entirely disarming, in a very quiet way, and was not always certain about what he should or shouldn’t say. At times, however, he took great pleasure in revealing the truth about some key matter in a way that could not be traced back to him. One or two supplementary details were provided by e-mail after the interview.

The most important piece of additional information comes at the very end of the transcript, where Henry confirms Dan Burisch’s testimony.

Readers are welcome to distribute this freely with the proviso that no part of it must be altered or deleted. Unaltered extracts can be quoted if the context is made clear. We consider this interview to be extremely important and in our opinion the information revealed should be made widely known.

For further information from Henry, updated in February 2007, please click here. However, it’s probably best to familiarize yourself first with the material presented below as an introduction to Henry and his testimony. 

Click here for a further update (May 2007)

We have heard nothing from Henry Deacon for the last five weeks. Prior to our last communication, in the last week of March 2007, he had told us he was being ‘coerced’. Up to that time he had been in very regular communication with us. We now feel certain he has been forced into silence.

While this newest update contains fascinating further information on a number of topics (including more information on Mars and some details of the inside story of 9/11), we continue to believe that the most important information he has shared is to be found in the second update. However, as stated above, new readers are advised to read Henry’s testimony in sequence.

Read the interview here…..

http://projectcamelotportal.com/videos-interviews/item/henry-deacon-aka-arthur-neumann-all-interviews

Space Alien Worked for U.S. Government? Valiant Thor

Before It’s News)

Valiant Thor

The man in front is said to be Valiant Thor, a benevolent alien from Venus who worked with the U.S. government. The photo was presented by Phil Schneider, who said he met the alien while working on secret government operations, at the 1995 Preparedness Expo.

His name is Valiant Thor; he looks human, but he has some key physiological differences. He is from Venus. He worked for the U.S. government for some time in the 1950s before leaving in his spaceship.

This is the story told by the late Phil Schneider, a geologist and engineer who said he had level-1 security clearance in secret government projects. He helped build underground military bases and worked at the famed Area 51 base.

Schneider said he met Thor, and he’s not the only one to make such a claim. Dr. Frank Stranges wrote a book titled “Stranger at the Pentagon,”about his alleged meeting with Thor.

Schneider showed a picture of  Thor during a lecture at the 1995 Preparedness Expo. The photo was taken in 1943. Schneider said the alien had been working for the U.S. military since 1937. Thor had six fingers on each hand, an oversized heart, one giant lung, copper oxide blood like an octopus, an IQ off the scale (could be estimated as 1200), and could speak 100 languages fluently (including alien languages). He also said his lifespan is 490 years.

According to Dr. Stranges, Thor was about 6 feet tall and 185 pounds with brown, wavy hair and brown eyes. Dr. Stranges said President Dwight Eisenhower and Richard Nixon both met Thor.

Timothy Good, a former U.S. Government consultant who has been vocal about his knowledge of aliens, also said Eisenhower met aliens.

http://beforeitsnews.com/conspiracy-theories/2014/04/space-alien-worked-for-u-s-government-valiant-thor-2461638.html?utm_content=awesm-publisher&utm_source=http%3A%2F%2Fl.facebook.com%2Fl.php%3Fu%3Dhttp%253A%252F%252Fb4in.info%252FqXxb%26h%3DrAQEdAeLV%26enc%3DAZN9axYtJji1zMMR4mwd24vLtu1e85KP04QsIpn-oAE-1lO9hIDoWQoilaxWrOzkcBBgyzV8cIvB7q-Y_7x1Iy0oW9CfhFrWaHyygLUGwgNdYNQGAmC_phEYoAxDymFUUYq7S9GLgGfRiKWnW1s_1YUe0py_y49ajoQE7JgBwlP3bw%26s%3D1&utm_campaign&utm_medium=twitter&utm_term=http%3A%2F%2Fb4in.info%2FqXxb

 

Thor left Earth on the morning of March 16, 1960, according to Dr. Stranges. He left in a spaceship from Alexandria, Va.

http://www.theepochtimes.com/n3/607288-space-alien-worked-for-u-s-government/

http://melbrake.wordpress.com

IS THE SURRENDER OF THE BLM A STRATEGIC DE-ESCALATION?

Was the surrender of the Bureau of Land Management too good to be true? Should the Bundy family be on the look-out for a pre-dawn SWAT team raid?

Doug Hagmann of The Hagmann and Hagmann Report [2] believes so.

The following correspondence was posted as an alert on SteveQuayle.com [3]:

To put it bluntly, the people are being hoodwinked into believing that the situation is being resolved. It is not. It is a strategic de-escalation to fool the public. [3]

Date: Saturday, 12 April 2014

Time: 1840 ET

To: Steve Quayle

From Doug Hagmann

At 1750 hours ET, I was contacted by my source within the Department of Homeland Security regarding the current situation at the Bundy Ranch. To put it bluntly, the people are being hoodwinked into believing that the situation is being resolved. It is not. It is a strategic de-escalation to fool the public. This source stated that the retreat of the BLM agents and the release of the cattle was actually crafted as a potential plan yesterday (Friday, 11 April 2014) based on the following:

1. A military assessment of satellite and drone surveillance imagery of the “patriot resistance. Drones under the control of the U.S. military were in use, taking real-time photographic images of not just the activity at the ranch, but “identifying the protesters, any arms and any supplies they might have or be carrying. “Mission accomplished.”

2. Real-time communication intercepts between patriots on-site and their off-site support;

3. Active monitoring of internet traffic regarding the coverage of events at ranch;

4. The monitoring of real-time video from the scene.

This source stated that a response by the patriot movement was anticipated, although exceeded their expectations. Although this was a real operation, they also ran this as a test case for future government operations once they saw the response. They were also actively managing the media, in some cases threatening to cut off White House access to anyone covering the event.

Despite this, the coverage by the alternative media began to create a public relations problem that was not easily managed. Note the lack of acknowledgment by the White House regarding this event. They are intentionally framing it as a state issue, despite the fact that all federal response has been and continues to be from the White House. There is a reason for this – a reason that has not been identified in any of the public reports to date. I will explain in further detail in a follow-up report on Sunday, after this source attends [redacted] to obtain more specific information about future federal operations. Regardless, according to this source, the government will take back ‘their land’ as they must to fulfill international obligations. It was never about grazing rights or anything other than (1) “securing clear title” to the land, and (2) further demonizing any patriotic resistance. It is my understanding, based on the information from this source, that it is a critical task to create a situation that will also advance their agenda of gun control and confiscation.

A more detailed report will follow on Sunday, 13 April 2014, with additional and much more specific information about their inside plans and future operations.  ( source: SteveQuayle.com [3])

Delivered by The Daily Sheeple [4]


Contributed by The Daily Sheeple of www.TheDailySheeple.com [5].

This content may be freely reproduced in full or in part in digital form with full attribution to the author and a link to http://www.TheDailySheeple.com.

Article printed from The Daily Sheeple: http://www.thedailysheeple.com

URL to article: http://www.thedailysheeple.com/is-the-surrender-of-the-blm-a-strategic-de-escalation_042014

URLs in this post:

[1] Image: http://www.thedailysheeple.com/is-the-surrender-of-the-blm-a-strategic-de-escalation_042014/too-good-to-be-true

[2] The Hagmann and Hagmann Report: http://www.homelandsecurityus.com/hagmann-hagmann-report-live

[3] SteveQuayle.com: http://www.stevequayle.com/index.php?s=33&d=877

[4] The Daily Sheeple: http://www.TheDailySheeple.com/

[5] http://www.TheDailySheeple.com: http://www.thedailysheeple.com

Blue Planet Project/Pulsar Project

The “Pulsar Project” is believed to be the personal notes and scientific dairy of a scientist who was contracted by the government over several years to visit all crash sites, interrogate captured Alien Life Forms and analyze all data gathered from that endeavor.

He also wrote notes on or about any documents which he came in contact with, which in any way related directly or indirectly to the organization, structure or operation for the collection of such data.

This individual was discovered to have kept and maintained such personal notes and therefore was scheduled for termination.

He narrowly escaped termination by the government and is currently in hiding out of this country.

aaaaa bluepl47

DOWNLOAD THE PDF FILE HERE: blue_planet_pulsar_project

Inside the Military’s New Office for Cyborgs

Inside the Military’s New Office for Cyborgs

Joint Chiefs Chairman Gen. Martin Dempsey controlling a prosthetic arm during a visit to DARPA

The ability to link human brains to machines, create new life forms and build Star Trek-style disease detectors will be the focus of a new Defense Department office soon.

The new office, named the Biological Technology Office, orBTO, will serve as a clearinghouse for Defense Advanced Research Projects Agency, or DARPA, programs into brain research, synthetic biology and epidemiology. The office will cover everything from brewing up tomorrow’s bioweapon detectors and connecting humans to computers to designing entirely new types of super-strong living materials that could form the basis of future devices. Here are the key areas in more detail.

The human brain is often called the most complex object in the known universe, composed of 100 billion neurons and 100 trillion synapse connections. As a computer, it performs 10,000 trillion operations per second. That’s about one third as fast as the Chinese Tianhe-2 Super computer, which can perform 33,860 trillion calculations per second. But the human brain does it’s calculating with just 20 watts of power. Tianhe-2 needs 24 million watts.

In the last two decades, our understanding of the human brain has advanced tremendously through functional magnetic resonance imaging, or fMRI, magnetoenceplograhy, and high-resolution brain scans. Our ability to use brain signaling to control devices has grown at a similar pace, but getting brain material to mesh with sensors and electronics is no simple matter. A DARPA program, Revolutionizing Prosthetics, to better help veterans with amputated limbs control prosthetic legs and arms with brain signals was announced in 2009 but only very recently began to bear fruit. Last year, researchers from the Rehabilitation Institute of Chicago demonstrated a cybernetic arm prosthetic that functions like something straight out of RoboCop. The BTO will oversee a variety of programs aimed at understanding both the hardware and the software of the human brain.

The prosthetics that are wirelessly neurally-controlled are just at the research stage. But some of the ones where the prosthetics are connecting in to the peripheral nervous system or are being controlled by other muscles in the body are currently in an FDAprocess,” said Arati Prabhakar, DARPA director, in an interview with Defense One. So while we still haven’t been able to connect a prosthetic directly to the brain, researchers have achieved much better integration with prosthetics and nerves.

Prabhakar says that the research has applications well beyond helping veterans to live better lives, including the creation of devices and chips that mimic the brain. “That kind of amazing capability is something that no one thought was possible. What we’re learning about the human brain could give us insight into how we build our artificial processing capabilities.”

The agency’s Cortical Processor program, with a $2.3 millionFY 2015 budget request, seeks to recreate in software the brain’s capability to take in lots of incoming stimuli from sensory organs and spit out recognized patterns. “There is a processing structure in nature, the mammalian neocortex, that… routinely solves the most difficult recognition problems in real-time…” according to the agency’s recently submittedbudget proposal.

One far off potential application for the agency’s brain research is neural-controlled piloting of drones or better steering for manned aircraft via neurological feedback, which could build off of current research using electroencephalography, or EEG, to pilot robots. EEG is a nonsurgical method for recording the brain’s electromagnetic signals via a cap that’s worn over the skull. Those signals are powerful enough to steer some robots.

In 2010, Northeastern University Electrical engineering professor Deniz Erdogmus and several researcherssuccessfully demonstrated the piloting of a Roomba robot vacuum cleaner using thoughts. In 2012, Chinese researchers at Zhejiang University used EEG to pilot a small consumer UAV. These are the sorts of incremental research breakthroughs that seem to suggest that brain-controlled quad-copters are literally hovering around the corner. But EEG signals are too crude to do brain-based piloting in real time combat operations. Useful gains in this area will require getting not just powerful but more precise signals, and that means getting hot electronics closer to the brain. Unfortunately, soft and delicate brain tissue does not easily mix with circuits. It’s a technical and materials challenge of enormous complexity, but hardly outside of the realm of possibility. A group of researchers from Singapore recentlyunveiled a neural probe that can be integrated on the brain with little damage to cellular structures.

Prabhakar is cautiously optimistic about the future of human-computer interfacing. She says that current research represents “a door opening” into new applications. “I would say we are now standing on this side of the door looking through and seeing what’s going to come out of it.”

In the near term, a fuller understanding of our three-pound thinking organ would allow for improved situational awareness on the battlefield and better decision-making in life or death environments. “Think about warfighters in these very complex situations where the way that they understand the complexity around them makes all the difference in the world…We’re speculating but it might lead to some great advances.”

Turning the Building Blocks of Life into New Materials

You can define synthetic biology, loosely, as the creation of new, artificial biological structures for new purposes. The field is in its infancy and DARPA’s new office is meant to accelerate current research. One example of that is the 1,000 Molecules program, part of DARPA’s Living Foundries initiative, which is focused on “creating a biologically based manufacturing platform to provide rapid, scalable access to new materials with novel properties.” These new materials would allow for a “new generation of mechanical, electrical, and optical products.”

”What our program is trying to do is create the tools to make [synthetic biology] an engineering discipline. Instead of taking millions of dollars and many years to do even minor projects, we really want to unleash it,” said Prabhakar. “Think about what’s going to be possible for new chemistries beyond petrochemicals. Think about new types of chemicals with all kinds of structural and electronic and optical properties.”

Bioengineered materials derived from living components like lipids and proteins would be several times more diverse and functional than designs based on more traditional approaches to chemistry. Learning to harness the building blocks of life could allow for living materials that are stronger, more flexible, more durable and cheaper than anything available today. Those new materials could make their way into battlefield armor or even electronic components.

Synthetic biology also holds the promise of one day creating entirely new life forms. A group of researchers from the U.S. andU.K. recently announced the creation of the first artificial chromosome, derived from piecing together 273,871 separateDNA nucleotides from yeast, thus achieving a key step in the potential development of designer chromosomes or even new life.

Tricorders, Epidemics and Outrunning Disease

On Star Trek, the USS Enterprise’s doctor, Bones, carries around a handheld device called a “tricorder” that can instantly diagnose any disease. DARPA wants it. Rapidly spreading diseases, whether as a result of biological attack or a naturally-occurring epidemic, present a grave and rising national security threat. As previously discussed, a highly-lethal flu pandemic could result in as many as 150 million deaths.

DARPA is looking to create new diagnostic gadgets and software to give soldiers and decision-makers “a rapid and specific diagnosis of infection so we can actually understand the spread of disease, something we don’t have visibility into right now.” The ability to diagnose infections on site, perhaps with a single, handheld device, and then report the results immediately and globally could allow researchers to quickly identify the unique genetic makeup of emerging illnesses. That could help them to “create vaccines that offer immediate protection rather than vaccines that have a few week waiting period before immunity establishes itself. If we can get those capabilities built we can move faster than the disease is spreading,” said Prabhakar.

The DARPA program is called Autonomous Diagnostics to Enable Prevention and Therapeutics, or ADEPT, and is one example of the effort to conquer biological threats. The agency isn’t alone in moving to build more rapid and deployable diagnostic capabilities. Qualcomm and the X Prize Foundation are sponsoring a $10 million dollar competition to build a handheld diagnostic device. We don’t have to wait for Bones to show before realizing the benefits of the research effort. Today, health workers in Saudi Arabia are already using findings fromDARPA’s epidemiology-funded research to stay ahead of the Middle East respiratory syndrome coronavirus or MERS-CoV.

Prabhakar said it’s a fine and difficult line to walk, laying the research groundwork for the far future while offering new tools as quickly and as rapidly as possible. “We always are aiming for off-scale impact,” she said. “Meantime, we want to make sure we are delivering concrete capabilities.”

http://www.defenseone.com/technology/2014/04/inside-militarys-new-office-cyborgs/81670/

3000 Mile Wide Disc Caught By ISS? – Solved!

NASA Shuts Down Public ISS Cams Due To Amount of UFO Sightings … FOR THE VATICANS’ RAPTURE

.

.

PROJECT BLUEBEAM

.

.

This image was released by the Brasilia Planetarium recently and shows a massive disc shaped object stationed above the Earth. The disc is estimated to be around 3-5 thousand miles in diameter. Is it a Mothership ?

If you look at the bottom left of the image you can see a cloud formation passing over the top of the anomaly, this indicates that the object is not a projection onto the earth.

.

https://www.youtube.com/watch?v=0vzPVOChOTA

.

So many images of galactic craft have been downloaded by the public from NASA that they no longer can allow it to happen by chance. There are so many ships out there now that it’s unavoidable.

They installed two 17 million dollar HD cams to earn money using the ISS to sell satellite photos. Yes, NASA says they will shut down the live public cams due to budget cuts, even thought the Canada company selling the photos will pay NASA cash yearly.

So the “budget cuts” excuse is a lie.

The truth is they want to stop the viewers from seeing the UFOs at the ISS and posting them.”

Since January of 2014, new recordings of UFOs seen on ISS live cam could be found on YouTube every 3-5 days, that’s up from every 13-20 days last year.

Recently NASA has installed two HD cameras on the space station on several hard to do space walks and the consequences of those actions are becoming apparent to NASA.

Disclosing UFOs in High Definition will soon be possible.

It’s one thing to have a blurry photo of an object moving around the ISS using the regular old cams, but totally another thing to see it in high definition. They say the cameras can spy on object as small as 1-5 meters on the earth’s surface, so imagine how powerful a tool this could be in the hands of an UFO researcher.

UFO Evidence 
Major Media Articles Present UFO Evidence

CLICK HERE : http://www.wanttoknow.info/ufos/ufos_evidence_larry_king

.http://outofthisworldx.wordpress.com/2014/04/05/nasa-shuts-down-public-iss-cams-due-to-amount-of-ufo-sightings/

Freelance journalist: ‘Hijacked flight 370 passenger sent photo from hidden iPhone tracing back to secret U.S. military base Diego Garcia’

Freelance journalist: ‘Hijacked flight 370 passenger sent photo from hidden iPhone tracing back to secret U.S. military base Diego Garcia’

IS PASSENGER PHILLIP WOOD AND OTHERS STILL ALIVE AFTER FLIGHT 370 WAS HIJACKED THEN TAKEN TO A SECRET U.S. MILITARY BASE LOCATED ON A REMOTE ISLAND IN THE INDIAN OCEAN?

By Shepard Ambellas

INDIAN OCEAN (INTELLIHUB) — According to freelance journalist Jim Stone, one of the American passengers, Phillip Wood, a technical storage executive at IBM, who was aboard the now missing Malaysian Airlines flight, keystered his iPhone 5 in his anus after the Boeing 777 carrying 239 people was hijacked by military personnel while on route to China.

Amazingly, Stone claims that metadata within the photo yields evidence confirming “100 percent” that Phillip Wood sent the photo, along with a brief voice activated text, from GPS coordinates which put Wood only a few miles away from the U.S. controlled Diego Garcia military base which is located on an island south of the Maldives in the Indian Ocean. In his post Stone claims that the coordinates may be off by a few miles (see update below post), proving that the iPhone actually sent the otherwise blank black picture revealing nothing else. Stone speculates the picture was taken in a dark room or in some position in which Wood’s hands were bound.

As reported by Stone, the picture was posted along with the following text allegedly from Wood:

“I have been held hostage by unknown military personal after my flight was hijacked (blindfolded). I work for IBM and I have managed to hide my cellphone in my ass during the hijack. I have been separated from the rest of the passengers and I am in a cell. My name is Philip Wood. I think I have been drugged as well and cannot think clearly.”

Strangely the blank black image labeled “1395192158752.jpg” contains the following metadata:

1395192158752Dimensions: 240 x 320

Device Make: Apple 

Device Model: iPhone 5

Color Space: RGB

Color Profile: sRGB IEC61966-2.1

Focal Length: 4.12

Alpha Channel: No

Red Eye: No

F Number: 2.4

Exposure Program: 2

Exposure Time: 1/15

Stone also points out in detail how the above Exchangeable Image Format (EXIF) image data is the “smoking gun”, writing:

The Exif is intact. Exif data gets embedded in every image by every camera and includes the circumstances under which the photo was taken. It can be viewed by saving the image to your desktop, and then right clicking it and selecting image properties. Hit the details tab. You can see that the image was taken on March 18 with an iPhone 5, with the ISO at 3200 and a shutter of 1/15. The coordinates are included in the exif data because the iPhone knows where it is, and the coordinates are for Diego Garcia. THE FIRST TIME A BLANK PHOTO SAID IT ALL. 

Exif can’t be rewritten with common software, it can only be added to in fields such as image credits with some advanced applications. It can be erased as well but NOT CHANGED. Photos with the exif intact will hold up in court. If the Exif is hacked and this is not real, the CIA or a really good hacker did this, which I doubt, I’d say it’s probably real.

Another smoking gun is that the voice recognition software put the word personal instead of personnel. This is completely consistent with a blind software assisted dial out.

Surrounding this story is the fact that the man who managed to get this information to Farganne (forum member Glitch) was harassed and received many threatening voice mails over it, that is another piece of evidence pointing to this as being real. One thing is certain, once it’s posted here on this site the genie is OUT OF THE BOTTLE. I cannot stress how important it is that the GPS coordinates in the photo do not perfectly match what Google says and are not posted anywhere on the web, because it proves that the source of those coordinates did not come from google or Wikipedia, they really did come from the imaging device and it HAD TO be at Diego Garcia when it took the photo.

Interestingly, 7-days ago, on March 24, 2014  at 2:30 AM EDT, it was reported by Intellihub News that flight 370 landed at Diego Garcia, a secret U.S. military base leased from the EU, during the early morning hours of March 8, 2014 after a YouTuber by the name of Montagraph put two-and-two together following other reports.

An excerpt from the article reads:

“[...] MH370 most likely landed at Diego Garcia and the plane may have been ushered into a massive “Faraday cage” style hangar to avoid passengers from communicating with the outside world.”

Surprisingly, this all dovetails with a Malaysian Insider report released on Mar. 18 titled “US military base, South Asian airports in MH370 pilot’s simulator, says paper“, as the pilot of MH370 was found to have had scale simulations of Diego Garcia in his home flight simulator.

An except from the Malaysian Insider reads:

Investigations into the flight simulator taken from the missing pilot’s home showed a software for five practice runways, including one belonging to the United States, Berita Harian reported today.

“Among the software we checked so far is the Male International Airport in Maldives, three airports in India and Sri Lanka, and one belonging to the US military base in Diego Garcia. All have a runway length of 1,000 metres,” a source told the Malay daily.

Police seized the flight simulator from pilot Captain Zaharie Ahmad Shah’s house last Saturday before reassembling it at the federal police headquarters in Bukit Aman, where experts were conducting checks.

If anyone has anymore information on this matter we urge you contact us at Intellihub Newsright away.

Update 2:49 PM EST

The following information was posted as a tip on Steve Quayle’s website:

Hi Steve,

Re: the black/blank photo from the IBM tech on the lost Malaysian jet. The photo was taken inside a building just off the runways at Diego Garcia. I put the photo into my editing software, grabbed the GPS point and here it is. Try this: go to: itouchmap.com , choose #6, go to the bottom right box and input the info:

-7 18 58.3 LATITUDE

72 25 35.6 LONGITUDE

Click on: SHOW POINT

Zoom in and you will see where the photo originated. Wow. You’ll probably recognize the heavy aircraft parked nearby.

Image Via itouchmap.com:

(SteveQuyale.com)

http://intellihub.com/freelance-journalist-hijacked-flight-370-passenger-sent-photo-hidden-iphone-tracing-back-secret-u-s-military-base-diego-garcia/