Warning: count(): Parameter must be an array or an object that implements Countable in /home/tbrnew5/public_html/wp-includes/post-template.php on line 284

TBR News July 15, 2019

Jul 15 2019

The Voice of the White House Washington, D.C. July 15, 2019:

“Working in the White House as a junior staffer is an interesting experience.

When I was younger, I worked as a summer-time job in a clinic for people who had moderate to severe mental problems and the current work closely, at times, echos the earlier one.

I am not an intimate of the President but I have encountered him from time to time and I daily see manifestations of his growing psychological problems.

He insults people, uses foul language, is frantic to see his name mentioned on main-line television and pays absolutely no attention to any advice from his staff that runs counter to his strange ideas.

He lies like a rug to everyone, eats like a hog, makes lewd remarks to female staffers and flies into rages if anyone dares to contradict him.

His latest business is to re-institute a universal draft in America.

He wants to do this to remove tens of thousands of unemployed young Americans from the streets so they won’t come together and fight him.

Commentary for July 15:” One thing I have clearly learned while working in the White House is that our President is a cartoon character. Cheats on his income tax and brags about it, takes bribes, cheats small businessmen and staff, has a raft of peculiar habits and actually thinks he is a king in Washington and all must bask in the light of his sun. He is loud and obnoxious and delights in tormenting people who cannot, or will not, fight back. If someone stood up to him, in public, he woud have a fatal stroke, believe me. He bought the Oval Office and it is up to the irate pubic to evict him when the time comes.”

The Table of Contents

  • Encyclopedia of American Loons
  • The Broken Encirclement Plan: Nato in Eastern Europe
  • Trump and the Numbers Game
  • An Israeli Nazi funding and arming the American far-right
  • The Domestic Spying Mania
  • The CIA Confessions:
  • The Crowley Conversations 

William Schnoebelen

A.k.a. Christopher Syn (name taken in the 1970s for numerological reasons)

William Schnoebelen is an evangelist, author (sometimes with his wife Sharon) and lecturer, known for his anti-Mormon, anti-masonic (yes) and anti-Wiccan views and for his fundamentalist Protestant viewpoint. His views are slightly more insane than Jack Chick’s (Schnoebelen is published by Chick Publications), and possibly only challenged by Gene Ray. He currently runs his own organization With One Accord Ministries (website here). His antipathy toward the organizations mentioned above can partially be explained by the fact that he is, in fact, himself a former Mormon and wiccan, as well as a Gnostic Bishop with the Monastery of the Seven Rays, voodoo priest, and member of the Church of Satan. He claims to have reached a high rank with the Freemason (reaching “Palladium Masonry”, which is a well-known hoax and doesn’t exist), and to have been part of the Illuminati (he has published the video “Exposing the Illuminati from within”: two parts, here and here. You get an idea of where he comes from.

To top it, Schnoebelen claims to have been a practicing vampire from 1979, and has released a nine-hour DVD program titled “Interview with an Ex-Vampire: A True Story” (hosted by one Stephanie Relfe, who provides a biography of Schnoebelen here), although there is ample evidence that Schnoebelen doesn’t quite know what “True Story” means. Unfortunately his vampire activities came to an end (he was also a practicing sorcerer) in 1980 when he failed a saving throw against an evangelical bank clerk who promised to “be praying for you in Jesus’ name,” was turned, and subsequently lost all his magical powers. He doesn’t like D&D, by the way (more on that below), and there is probably a connection here.

According to none other than Schnoebelen, part of Schnoebelen’s spiritual education was extra-terrestrial, apparently.

Sort of to complete the circle, he also has an “N.D. degree” from Trinity College of Natural Healing in Indiana, and is also certified by the Certified Natural Health Professionals organization in Warsaw, IN. His whale.to profile is here.

Among Schnoebelen’s numerous books are “Masonry: Beyond the Light”, which exposes the freemasons as Satanists; “Wicca: Satan’s little white lie”, which exposes Wiccans as Satanists; “Mormonism’s Temple of Doom’, which exposes Mormons as Satanists, and “Blood on the Doorpost”; which tells you how to conquer the Satanism in your life and achieve success through the power of the Law of Attraction and The Secret (yes, that The Secret). He may be most famous for his attacks on Mormonism, however, since some Mormon responders actually took it as a serious threat. Together with one Ed Decker Schnoebelen raised concerns about, among other things, the spires on Mormon temples, claiming that they were really “Satan’s spires” and represented “an up-side-down nail pointing defiantly toward heaven, as if to impale the Lord Jesus Christ anew when he comes in the clouds” and that because of “the trapezoidal shape” of the spires they “draw demons like fly paper”.

Besides such high-flown theology, Schnoebelen’s book “Space Invaders” is about UFOs and seems to assume that the eponymous Arcade game is a real-life documentary (“Bill shows how the “cute little space aliens” have their roots in the rituals of such black magicians as Aleister Crowley” and “reveals how flying saucers and ‘alien abductions’ may well figure into the end-time plans of the Beast. Drawing on Genesis 6”). Schnoebelen knows, since Schnoebelen has been a vampire. What more expertise in magic and the occult do you need?

He is no fan of Harry Potter, and produced a video “Harry Potter: Politically Correct Paganism” with Jan Markell (already covered) and one Wendell Amstutz. Neither is he a fan of Dungeons and Dragons, which involves evil, brainwashing (“Erosion of family values – the Dungeon Master (DM) demands an all-encompassing and total loyalty, control and allegiance”), real sorcery, Satanism, immorality (“male characters in the game often try to seduce female characters”) and – worst of all – science (“In this worldview, there is no sovereign God; but rather the universe is run like a gigantic piece of machinery”). Updated here.

Diagnosis: Clinically unable to distinguish imagination and reality (preciously few of his claims about his own past have been substantiated) the amazing Bill Schnoebelen is one of a kind. He’s probably harmless.

Don Schmierer

Don Schmierer is an insanely lunatic and thoroughly evil person. Together with Scott Lively and Caleb Lee Brundidge, Schmierer participated in a 2009 workshop in Kampala to, pretty much, provide the architecture for the Ugandan anti-gay bill (discussed here). Schmierer is a board member of Exodus International, an organzation devoted to promoting “freedom from homosexuality through the power of Jesus Christ”. After the law passed in Uganda and brought about some horrible deaths Schmierer said he felt “duped”, arguing that he had been invited to speak on “parenting skills” for families with gay children and that, although he claimed homosexuals could be converted into heterosexuals, he had no idea some Ugandans were contemplating the death penalty for homosexuality.

There are reasons to think Don is not as stupid as he claims he is, and even if he were he would nevertheless be responsible.

It is telling that he mentioned receiving threats and more than 600 hate mails related to his visit: “I spoke to help people,” he said, “and I’m getting bludgeoned from one end to the other.” No, Don. You are not the victim here, and you don’t get to claim that you are.

Diagnosis: Vile loon who should be charged with crimes against humanity; he is a representative for a very dangerous trend: extremist religious organizations who, unable to establish theocracy or use violence against those they dislike in the US, targets Africa instead – and are extremely successful at it. Exodus (headed by one Alan Chambers) is one such organization.

 

The Broken Encirclement Plan: Nato in Eastern Europe

The first serious, and successful, U.S. direct interference in Russian leadership policies was in 1953.

An ageing Josef Stalin, suffering from arteriosclerosis and becoming increasingly hostile to his subordinates, was poisoned by Laverenti P. Beria, head of his secret police.

Beria, a Mingrelian Jew, very ruthless and a man who ordered and often supervised the executions of people Stalin suspected of plotting against him, had fallen out of favor with Stalin and had come to believe that he was on the list of those Stalin wished to remove.

With his intelligence connections, Beria was contacted by the American CIA through one of his trusted agents in Helskinki and through this contact, Beria was supplied dosages of warfarin

The first drug in the class to be widely commercialized was dicoumarol itself, patented in 1941 and later used as a pharmaceutical. potent coumarin-based anticoagulants for use as rodent poisons, resulting in warfarin in 1948. The name warfarin stems from the acronym WARF, for Wisconsin Alumni Research Foundation + the ending -arin indicating its link with coumarin. Warfarin was first registered for use as a rodenticide in the US in 1948, and was immediately popular; although it was developed by Link, the WARF financially supported the research and was assigned the patent.

Warfarin was used by a Lavrenti Beria to poison Stalin. Stalin’s cooks and personal bodyguards were all under the direct control of Beria. He acknowledged to other top Soviet leaders that he had poisoned Stalin, according to Molotov’s memoirs, Nikita Khrushchev and others.

Warfarin is tasteless and colorless, and produces symptoms similar to those that Stalin exhibited.

Stalin collapsed during the night after a dinner with Beria and other Soviet leaders, and died four days later on March 5, 1953.

Foreign Minister Vyacheslav Molotov, in his political memoirs (published posthumously in 1993), claimed that Beria told him that he had poisoned Stalin. “I took him out,” Beria supposedly boasted. And after Stalin was found unconscious, medical care was not provided for many hours. Other evidence of the murder of Stalin by Beria associates was presented by Edvard Radzinsky in his biography of Stalin. It has been suggested that warfarin was used; it would have produced the symptoms reported.

After the fall of Gorbachev and his replacement by Boris Yeltsin, a known CIA connection, the Russian criminal mob was encouraged by the CIA to move into the potentially highly lucrative Russian natural resource field.

By 1993 almost all banks in Russia were owned by the mafia, and 80% of businesses were paying protection money. In that year, 1400 people were murdered in Moscow, crime members killed businessmen who would not pay money to them, as well as reporters, politicians, bank owners and others opposed to them. The new criminal class of Russia took on a more Westernized and businesslike approach to organized crime as the more code-of-honor based Vory faded into extinction.

The Izmaylovskaya gang was considered one of the country’s most important and oldest Russian Mafia groups in Moscow and also had a presence in Tel Aviv, Berlin, Paris, Toronto, Miami and New York City. It was founded during the 1980s under the leadership of Oleg Ivanov and was estimated to consist of about 200 active members (according to other data of 300–500 people). In principle, the organization was divided into two separate bodies—Izmailovskaya and Gol’yanovskaya  which utilized quasi-military ranks and strict internal discipline. It was involved extensively in murder-for-hire, extortions, and infiltration of legitimate businesses.

The gangs were termed the Oligarchy and were funded by the World Bank, the International Monetary Fund and the Israeli-owned Bank of New York all with the assistance of the American government.

The arrival of Vladimir Putin as the new leader of Russia was at first ignored in Washington. A former KGB Lt. Colonel who had been stationed in East Germany, Putin was viewed as inconsequential, bland and colorless by the purported Russian experts in both the Department of State and the CIA.

Putin, however, proved to be a dangerous opponent who blocked the Oligarchs attempt to control the oil fields and other assets, eventual control of which had been promised to both American and British firms.

The Oligarchs were allowed to leave the country and those remaining behind were forced to follow Putin’s policies. Foreign control over Russian natural resources ceased and as both the CIA, various foreign firms and the American government had spent huge sums greasing the skids, there was now considerable negative feelings towards Putin.

The next serious moves against Russia came with a plan conceived by the CIA and fully approved by President George W. Bush, whose father had once been head of the CIA.

This consisted of ‘Operation Sickle’ which was designed to surround the western and southern borders of Russia with states controlled by the United States through the guise of NATO membership. Included in this encirclement program were the Baltic States, Poland, the Czech Republic, Georgia and a number of Asiatic states bordering southern Russia. It was the stated intention of the NATO leadership to put military missiles in all these countries.

The so-called “Orange Revolution” funded and directed by the CIA, overthrew the pro-Moscow government in the Ukraine, giving the United States theoretical control over the heavy industrialized Donetz Basin and most importantly, the huge former Soviet naval base at Sebastopol.

The Georgia Train and Equip Program (GTEP) was an American-sponsored 18-month, $64-million program aimed at increasing the capabilities of the Georgian armed forces by training and equipping four 600-man battalions with light weapons, vehicles and communications. The program enabled the US to expedite funding for the Georgian military for Operation Enduring Freedom.

On February 27, 2002, the US media reported that the U.S. would send approximately two hundred United States Army Special Forces soldiers to Georgia to train Georgian troops. The program implemented President Bush’s decision to respond to the Government of Georgia’s request for assistance to enhance its counter-terrorism capabilities and addressed the situation in the Pankisi Gorge.

The program began in May 2002 when American special forces soldiers began training select units of the Georgian Armed Forces, including the 12th Commando Light Infantry Battalion, the 16th Mountain-Infantry Battalion, the 13th “Shavnabada” Light Infantry Battalion, the 11th Light Infantry Battalion, a mechanized company and small numbers of Interior Ministry troops and border guards.

Eventually, responsibility for training Georgian forces was turned over to the US Marine Corps in conjunction with the British Army. British and American teams worked as part of a joint effort to train each of the four infantry battalion staffs and their organic rifle companies. This training began with the individual soldier and continued through fire team, squad, platoon, company, and battalion level tactics as well as staff planning and organization. Upon completing training, each of the new Georgian infantry battalions began preparing for deployment rotations in support of the Global War on Terrorism

The CIA were instrumental in getting Mikhail Saakashvili, an erratic politician, pro-West, into the presidency of Georgia but although he allowed the country to be flooded with American arms and “military trainers” he was not a man easily controlled and under the mistaken belief that American military might supported him, commenced to threaten Moscow. Two Georgian provinces were heavily populated by Russians and objected to the inclusion in Georgia and against them, Saakashvili began to make threatening moves.

The 2008 South Ossetia War or Russo-Georgian War (in Russia also known as the Five-Day War) was an armed conflict in August 2008 between Georgia on one side, and Russia and separatist governments of South Ossetia and Abkhazia on the other.

During the night of 7 to 8 August 2008, Georgia launched a large-scale military offensive against South Ossetia, in an attempt to reclaim the territory. Georgia claimed that it was responding to attacks on its peacekeepers and villages in South Ossetia, and that Russia was moving non-peacekeeping units into the country. The Georgian attack caused casualties among Russian peacekeepers, who resisted the assault along with Ossetian militia.

Georgia successfully captured most of Tskhinvali within hours. Russia reacted by deploying units of the Russian 58th Army and Russian Airborne Troops in South Ossetia, and launching airstrikes against Georgian forces in South Ossetia and military and logistical targets in Georgia proper. Russia claimed these actions were a necessary humanitarian intervention and peace enforcement.

When the Russian incursion was seen as massive and serious, U.S. president George W. Bush’s statement to Russia was: “Bullying and intimidation are not acceptable ways to conduct foreign policy in the 21st century.” The US Embassy in Georgia, describing the Matthew Bryza press-conference, called the war an “incursion by one of the world’s strongest powers to destroy the democratically elected government of a smaller neighbor”.

Initially the Bush Administration seriously considered a military response to defend Georgia, but such an intervention was ruled out by the Pentagon due to the inevitable conflict it would lead to with Russia. Instead, Bush opted for a softer option by sending humanitarian supplies to Georgia by military, rather than civilian, aircraft. And he ordered the immediate evacuation of all American military units from Georgia. The huge CIA contingent stationed in the Georgian capital fled by aircraft and the American troops, mostly U.S. Marines, evacuated quickly to the Black Sea where they were evacuated by the U.S. Navy.

British and Israeli military units also fled the country and all of them had to leave behind an enormous amount of military equipment to include tanks, light armored vehicles, small arms, radio equipment, and trucks full of intelligence data they had neither the time nor foresight to destroy.

The immediate result of this demarche was the defection of the so-called “NATO Block” eastern Europeans from the Bush/CIA project who saw the United States as a paper tiger that would not, and could not, defend them against the Russians. In a sense, the Russian incursion into Georgia was a massive political, not a military, victory.

The CIA was not happy with the actions of Vladimir Putin and when he ran for reelection, they poured money into the hands of Putin’s enemies, hoping to reprise the Ukrainian Orange Revolution but the effort was in vain.

On September 6, 2016, Vladimir Putin’s state limousine, travelling on a Moscow highway, was slammed into by a car which jumped the median strip.

Putin’s driver was killed but Putin was not in the car at the time.

Shortly after this incident, a WikiLeaks release disclosed the CIA’s ability to get control of a car’s computer system and cause it to go out of control.

 

Trump and the Numbers Game

July 15, 2019

There were 56.5 million Hispanics in the United States in 2015, accounting for 17.6% of the total U.S. population.

The Hispanic Mexican population of the United States is projected to grow to 107 million by 2065.

The share of the U.S. population that is Hispanic has been steadily rising over the past half century. In 2015, Hispanics made up 17.6% of the total U.S. population, up from 3.5% in 1960, the origins of the nation’s Hispanic population have diversified as growing numbers of immigrants from other Latin American nations and Puerto Rico settled in the U.S.

For example, between 1930 and 1980, Hispanics from places other than Mexico nearly doubled their representation among U.S. Hispanics, from 22.4% to 40.6%. But with the arrival of large numbers of Mexican immigrants in the 1980s and 1990s, the Mexican share among Hispanics grew, rising to a recent peak of 65.7%.

California has the largest legal poplation of Mexicans, 14,013,719. And  California is also home to almost 25% of the country’s undocumented population. California is followed by Texas where 31.14%,(8,500,000) are Mexican, Florida has 4,223,806 Mexicans, Illinois 2,153,000, Arizona,1,895,149, Colorado, 1,136,000 Georgia, 923,000, North Carolina, 890,000, and Washington, 858,000 Mexicans.

Given the fact that President Trump has strong personal dislikes for both Blacks and Latinos, manifest in his recent vicious treatment of Mexican immigrants in their legal attempts to immigrate to the United States, the sheer number of Mexicans now resident in the United States ought to give him, and his far-right Republican Congressional supporters serious pause in their denial of entrance for legal immigrant attempts and the subsequent brutal maltreatment of small children of these immigrants.

If the Mexican voting population of the United States were to organize, like the recent organizing of the black voting population of Alabma in opposition to the fanatical Judge Moore, the results in the November elections could well prove to be a stunning disaster for both Trump and the Republicans.

Numbers certainly count but Trump is obviously unaware of their potential danger, both to him and his right-wing radical supporters.

 

An Israeli Nazi funding and arming the American far-right

July 14, 2019

One of the more interesting personalities involved in the growing American neo-Nazi political movement is one using the name of ‘Al Chapman.’

As far as can be ascertained, the paternal side of Al Chapman’s family were from Wilno, Lithuania. His grandfather Chaim Shapiro was a Lubavitch rabbi who fled to Stockholm disguised as a Christian. Chaim Shapiro married Esther Domeratsky at Viborg on February 17, 1941 and immigrated to Israel in 1947.

Ilán Shapiro was born in Israel on September 8, 1949, in Tel Aviv. After military service in the IDF, extended from 30 to 36 months by a temporary decree in January 1968, he came to the USA in 1971 to attend an English language school in New York to perfect the colloquial English he learned as a child.

After his English studies, Ilán Shapiro returned to Israel where he became involved with the Israeli think tank JINSA (Jewish Institute for National Security Affairs). Ilán Shapiro returned to the United States via Canada in 1979 as Alan A. Shapiro. Shapiro has also been closely associated with the Chabad Lubavitch Hasidics, who follow the Qabala and hold extremist and insulting opinions of non-Jews. He is also believed to have links to AIPAC and is believed by U.S. counter intelligence to be probably a Mossad operative.

Currently residing in the Washington area, where he has strong, daily, connections with the Trump White House,  the clean-shaven Shapiro cultivates a more-American-than-the-Americans image, sometimes going by the name Al Chapman, and is heavily involved in gun shows and, notably, the Third Reich militaria scene in the US. He has been tracked on a number of Internet militaria forums under a variety of pseudonyms.

Shapiro/Chapman is involved in the trading of high end Third Reich militaria and Nazi VIP memorabilia but maintains a firewall between the public and himself. He is said to be involved in the supply of high end fakes to a small group of US and Europe-based dealers.

As Al Shapiro, he sometimes claims to have served in the Six Day War in June 1967 but would have been three months short of his 18th birthday at the time. As Al Chapman, he has claimed to have served in the US Air Force in Vietnam but no record of this service has been found.

Shapiro was taught colloquial English as a child and when he was finished with his obligatory IDF service, he came to the United States to find his fortune and better serve his employers, the Israeli government and people. In due time, Alan became connected with a number of the Hebraic Illuminati in and around Washington, an area that has proven to be of rich pickings for some.

At one period or another, Alan was a very early associate and, as they like to say, a “close friend” of the notorious “Roger Steele” late of “Hollywood Military Hobbies.” Steele, whose real name was Gaylord Earnest Wessock, was a well-known homosexual, convicted counterfeiter and an outlet for the forged and fantasy daggers of James P. Atwood, fake SS insignia and caps manufactured by one John Nesbitt or ‘Reisenhaft’ of California, Inventor of the famous “SS Viking Ring” and other fantasy pieces.

After “Steele’s” death as the result of a stroke, Shapiro sold ‘Hollywood Military Hobbies’ customer lists to a number of dealers as well as the Los Angeles office of the FBI. He later changed his name to “Al Chapman” and ran several retail, mail order outlets, mostly in Miami, Florida.

Shapiro/Chapman then bought a small print shop in Jacksonville, Florida and began to manufacture various German Third Reich lower level documents, such as preliminary certificates for high military decorations. He had an aide, Malcolm Ransome, type in names, add stamps and so on and antique these by soaking them in diluted coffee and stuffing them into a commercial clothes dryer for age.

Shapiro/Chapman sold these documents widely, both in the United States and the UK to a number of militaria dealers (see Mollo, Andrew; Foreman, Adrian; Fischer, Malcom; Ulrich of England; the Klenau Auction in Germany; Merschintsky, Wolfgang; Zyla, Raymond;  Snyder, Charles; Globe Militaria; Andrei Huskins; Stuart, Emily; OMSA; Kleitmann, K.G.; Rich, Dr. Edward P.; Manion’s Auction; Steffans, Roger Auctions.)Using the lists of “Steele’s” customers, he later became an advisor to the Justice Department’s OSI team investigating the existence and identification of alleged neo-Nazi groups in the United States. He has made a liaison with the Wiesenthal Foundation in Los Angeles and the San Diego office of the DHS. He was a collaborator with Andrew Allen, a wealthy San Francisco real estate developer, in penetrating and virtually destroying Willis Carto’s right-wing and anti-Semitic ‘Spotlight’ paper.

Shapiro still manufactures, and sells, fake documents, but the good news is that his printer always uses paper with chemical paper-whiteners and as these were never in use before 1951, an ultra violet light (or “blacklight”) will cause these recent fakes to fluoresce.

Shapiro banks in Paris with a branch of the BNP and uses three different sham American (and one Canadian) corporations to bank his incomes and avoid the American IRS. In what he mistakenly believes is a confidential email, he has boasted of having cheated the IRS out of over three hundred thousand dollars in unpaid taxes.

He has also been the man who supplied the manufacture for the many fake “SS Honor Rings” being sold. His mistake here is not to know that after November 11, 1943, by order of Himmler, no actual rings were presented, only the papers. Most of Shapiro’s ” SS Honor Rings” bearing Himmler’s signature are dated with the spring solstice in March 1944 and therefore are dead giveaways as fakes.

The policy of the supporters of the far right groups is to exacerbate latent racism in the United States to the point where public violence erupts and the political polarization of the public becomes manifest. By encouraging and arming the far right and neo nazi groups, the Scavenius group is laying the groundwork for an acceptable and militant government reaction, the institution of draconian control over the entire population and the rationale for national and official government control, all in the name of law and order. It is planned that the far right and neo nazi groups be taken into the law enforcement structure and used to put down any public demonstrations that the government deems to be a potential threat to their policies.

 

The Domestic Spying Mania

July 15, 2019

by Christian Jürs

  1. Federal control of all domestic media, the internet, all computerized records, through overview of all domestic fax, mail and telephone conversations,

2 .A national ID card, universal SS cards being mandatory,

  1. Seizure and forced deportation of all illegal aliens, including millions of Mexicans and Central Americans, intensive observation and penetration of Asian groups, especially Indonesian and Chinese,
  2. A reinstitution of a universal draft (mandatory service at 18 years for all male American youths…based on the German Arbeitsdienst.
  3. Closer coordination of administration views and domestic policies with various approved and régime supportive religious groups,
  4. An enlargement of the planned “no travel” lists drawn up in the Justice Department that would prevents “subversive” elemetst from flying, (this list to include “peaceniks” and most categories of Muslims)
  5. The automatic death penalty for any proven acts of sedition,
  6. The forbidding of abortion, any use of medical marijuana,
  7. Any public approval of homosexual or lesbian behavior to include magazines, websites, political action groups and soon to be forbidden and punishable.

As the popularity of drones for domestic surveillance grows in the United States, so do privacy concerns for citizens just going about their daily business. Designer Adam Harvey has come up with a line of anti-drone clothing that is much more stylish than an aluminum foil hat.

The anti-drone clothes include a hoodie, a scarf, and a burqa. They are made with a metalized fabric designed to thwart thermal imaging. They work by reflecting heat and masking the person underneath from the thermal eye of a drone. The designs may hide you from certain drone activities, but they would definitely make you noticeable to people out on the street.

The scarf and burqa are both inspired by traditional Muslim clothing designs. Harvey explains the choice, saying, “Conceptually, these garments align themselves with the rationale behind the traditional hijab and burqa: to act as ‘the veil which separates man or the world from God,’ replacing God with drone.”

The anti-drone garments are part of a larger line of clothing called Stealth Wear. These are called  “New Designs for Countersurveillance.” The manufacturer states: “Collectively, Stealth Wear is a vision for fashion that addresses the rise of surveillance, the power of those who surveil, and the growing need to exert control over what we are slowly losing, our privacy.”

If drones get to be more commonplace in our communities, it’s not too much of a stretch to see this sort of fashion becoming more mainstream, much like RFID-blocking wallets and passport holders.

INTERNET

The government intelligence agencies and their allied private contractors now regularly accesses all emails, chats, searches, events, locations, videos, photos, log-ins and any information people post online with a warrant, which the U.S. Foreign Intelligence Surveillance Court always  grants secretly and without being ever made public.

And the revelation of Prism, a secret government program for mining major Internet companies, states that the government now has direct access to Internet companies’ data without a warrant.

Every company impacted – Google, YouTube, Yahoo, Facebook, Apple, Microsoft, Skype, PalTalk and AOL – publically deny knowing about the program or giving any direct access to their servers. These denials are intented to bolster public confidence in their services because in reality, all of these entities cooperate fully with requests for customer information.

Google is the supplier of the customized core search technology for Intellipedia, a highly-secure online system where 37,000 U.S. domestic and foreign area spies and related personnel share information and collaborate on investigative missions.

And there is absolutely nothing one can commit to the Internet that is private in any sense of the word

In addition, Google is linked to the U.S. spy and military systems through its Google Earth software venture. The technology behind this software was originally developed by Keyhole Inc., a company funded by Q-Tel http://www.iqt.org/ , a venture capital firm which is in turn openly funded and operated on behalf of the CIA.

Google acquired Keyhole Inc. in 2004. The same base technology is currently employed by U.S. military and intelligence systems in their quest, in their own words, for “full-spectrum dominance” of the American, and foreign, political, social and economic spheres.

However, Internet Service Providers and the entertainment industry are now taking Internet monitoring to a whole new level….

If someone download copyrighted software, videos or music, all Internet service providers (ISP)  have the ability to detect this downloading.

The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet. In the United States for example, under the Communications Assistance For Law Enforcement Act, all phone calls and broadband Internet traffic (emails, web traffic, instant messaging, etc.) are required to be available for unimpeded real-time monitoring by Federal law enforcement agencies., to include the FBI, NSA, the CIA and the DHS.

There is far too much data on the Internet for human investigators to manually search through all of it and so automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic and identify and report to human investigators traffic considered interesting by using certain “trigger” words or phrases, visiting certain types of web sites, or communicating via email or chat with suspicious individuals or groups. Billions of dollars per year are spent, by agencies such as the Information Awareness Office, NSA, and the FBI, to develop, purchase, implement, and operate systems such as Carnivore, NarusInsight, and ECHELON to intercept and analyze all of this data, and extract only the information which is useful to law enforcement and intelligence agencies. One flaw with NSA claims that the government needs to be able to suck up Internet data from services such as Skype and Gmail to fight terrorists: Studies show that would-be terrorists don’t use those services. The NSA has to collect the metadata from all of our phone calls because terrorists, right? And the spy agency absolutely must intercept Skypes you conduct with folks out-of-state, or else terrorism. It must sift through your iCloud data and Facebook status updates too, because Al Qaeda.Terrorists are everywhere, they are legion, they are dangerous, and, unfortunately, they don’t really do any of the stuff described above.

Even though the still-growing surveillance state that sprung up in the wake of 9/11 was enacted almost entirely to “fight terrorism,” reports show that the modes of communication that agencies like the NSA are targeting are scarcely used by terrorists at all.

Computers can be a surveillance target because of the personal data stored on them. If someone is able to install software, such as the FBI’s Magic Lantern and CIPAV, on a computer system, they can easily gain unauthorized access to this data. Such software can be, and is   installed physically or remotely. Another form of computer surveillance, known as van Eck phreaking, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters. The NSA runs a database known as “Pinwale”, which stores and indexes large numbers of emails of both American citizens and foreigners.

EMAIL

The government agencies have been fully capable to look at any and all emails.

A warrant can easily grant access to email sent within 180 days. Older emails are available with an easier-to-get subpoena and prior notice.

Government officials also are fully capable of reading all the ingoing and outgoing emails on an account in real time with a specific type of wiretap warrant, which is granted with probable cause for specific crimes such as terrorism.

Google received 122,503 user data requests involving 2,375,434 users from the U.S. government in 2016. It granted about 98 percent of those requests.

Microsoft, with its Outlook/Hotmail email service, received 61,538 requests involving 52,291 users, at least partially granting 92  percent of those requests.

PHONES

With the advent of smartphones and SIM cards, cellphones are no longer strictly for storage of digits and 180-character short messages.

Cellphones assist in navigating for car trips, to enable making Internet purchases and to watch events on television stations.   It is possible to deposit checks with a bank app and a camera, locate businesses of interest and also to use transportation by using a QR-code. Phones hold our coupons, our favorite cat videos and functions as a credit card when we forget ours at home.

The NSA collects subscriber information from major cell phone carriers. This information is primarily based on metadata, such as location and duration of calls, along with numbers dialed, all in search of links to suspected terrorists.

In 2013, to date, law enforcement agencies made 2.3 million requests for subscriber information.

These government requests for surveillance information from the NSA, are limited to metadata. That doesn’t mean that the content of conversations is off-limits. To listen in, the government just needs a warrant, one that’s granted through the secret Foreign Intelligence Surveillance Court.

The court approves almost every request, fully denying just nine out of 133,900 government applications for surveillance over its 33-year existence, according to Foreign Intelligence Surveillance Act reports submitted to Congress.

Although this is not new technology, law enforcement authorities are using our own cell phones to spy on us more extensively than ever before as a recent Wired article described….

Mobile carriers responded to a staggering 1.3 million law enforcement requests last year for subscriber information, including text messages and phone location data, according to data provided to Congress.

A single “request” can involve information about hundreds of customers. So ultimately the number of Americans affected by this could reach into “the tens of millions” each year.

The number of Americans affected each year by the growing use of mobile phone data by law enforcement could reach into the tens of millions, as a single request could ensnare dozens or even hundreds of people. Law enforcement has been asking for so-called “cell tower dumps” in which carriers disclose all phone numbers that connected to a given tower during a certain period of time.

So, for instance, if police wanted to try to find a person who broke a store window at an Occupy protest, it could get the phone numbers and identifying data of all protestors with mobile phones in the vicinity at the time — and use that data for other purposes.

Perhaps you should not be using your cell phone so much anyway. After all, there are more than 500 studies that claim to show that cell phone radiation is harmful to humans.

The official and unofficial tapping of telephone lines is widespread. In the United States for instance, the Communications Assistance For Law Enforcement Act (CALEA) requires that all telephone and VoIP communications be available for real-time wiretapping by Federal law enforcement and intelligence agencies. Two major telecommunications companies in the U.S.—AT&T Inc. and Verizon—have contracts with the FBI, requiring them to keep their phone call records easily searchable and accessible for Federal agencies, in return for $1.8 million dollars per year. Between 2003 and 2005, the FBI sent out more than 140,000 “National Security Letters” ordering phone companies to hand over information about their customers’ calling and Internet histories. About half of these letters requested information on U.S. citizens.

Human agents are not required to monitor most calls. Speech-to-text software creates machine-readable text from intercepted audio, which is then processed by automated call-analysis programs, such as those developed by agencies such as the Information Awareness Office, or companies such as Verint, and Narus, which search for certain words or phrases, to decide whether to dedicate a human agent to the call.

Law enforcement and intelligence services in the United Kingdom and the United States possess technology to remotely activate the microphones in cell phones, by accessing phones’ diagnostic or maintenance features in order to listen to conversations that take place near the person who holds the phone.

Mobile phones are also commonly used to collect location data. The geographical location of a mobile phone (and thus the person carrying it) can be determined easily even when the phone is not being used, using a technique known multilateration to calculate the differences in time for a signal to travel from the cell phone to each of several cell towers near the owner of the phone. The legality of such techniques has been questioned in the United States, in particular whether a court warrant is required. Records for one carrier alone (Sprint), showed that in a given year federal law enforcement agencies requested customer location data 8 million times.

CREDIT CARDS

Think Uncle Sam knows where you buy your coffee? He might be able to tell you the exact cafe.

It all starts with that stripe on the back of your credit card, which gets swiped through thousands of readers every year.

That solid black bar is made up of millions of iron-based magnetic particles, each one 20-millionths of an inch wide. Each credit-card owner has a personalized strip full of intimate data sitting right inside his or her pocket. Any purchase can be traced directly back to your wallet.

Although the scope of credit-card tracking efforts are unknown, the Journal reported that the NSA has established relationships with credit card companies akin to those that they had established with phone carriers, which provide them with data under warrant, subpoena or court order. These former officials didn’t know if the efforts were ongoing.

What could they find? Based on the technology of the mag stripe, quite a bit.

Even with just the metadata – digitally contained bits of information – on a credit card, they could most likely see when and where a purchase was made, and how much it cost.

SURVEILLANCE CAMERAS

Whether they’re walking to work, withdrawing money from an ATM or walking into their favorite local grocer, Americans could be within sight of one of the United States’ estimated 30 million surveillance cameras.

Police use them to monitor streets, subways and public spaces. Homeowners put them on their houses. Businesses mount them in stores and on buildings.

In Boston, for example, the FBI used still photos and video pulled from cameras to identify suspects after the Boston Marathon bombing. The images showed the suspects making calls from their cellphones, carrying what the police say were bombs, and leaving the scene.

New high-tech, high-definition security camera manufacturers give police departments the options of thermal imaging, 360-degree fields of view and powerful zoom capabilities for identifying people. Advances in camera technology enable new ways to monitor American citizens.

Surveillance cameras are video cameras used for the purpose of observing an area. They are often connected to a recording device or IP network, and may be watched by a security guard or law enforcement officer. Cameras and recording equipment used to be relatively expensive and required human personnel to monitor camera footage, but analysis of footage has been made easier by automated software that organizes digital video footage into a searchable database, and by video analysis software (such as VIRAT and HumanID). The amount of footage is also drastically reduced by motion sensors which only record when motion is detected. With cheaper production techniques, surveillance cameras are simple and inexpensive enough to be used in home security systems, and for everyday surveillance.

In the United States, the Department of Homeland Security awards billions of dollars per year in Homeland Security grants for local, state, and federal agencies to install modern video surveillance equipment. For example, the city of Chicago, Illinois, recently used a $5.1 million Homeland Security grant to install an additional 250 surveillance cameras, and connect them to a centralized monitoring center, along with its preexisting network of over 2000 cameras, in a program known as Operation Virtual Shield. Speaking in 2009, Chicago Mayor Richard Daley announced that Chicago would have a surveillance camera on every street corner by the year 2016.

As part of China’s Golden Shield Project, several U.S. corporations, including IBM, General Electric, and Honeywell, have been working closely with the Chinese government to install millions of surveillance cameras throughout China, along with advanced video analytics and facial recognition software, which will identify and track individuals everywhere they go. They will be connected to a centralized database and monitoring station, which will, upon completion of the project, contain a picture of the face of every person in China: over 1.3 billion people Lin Jiang Huai, the head of China’s “Information Security Technology” office (which is in charge of the project), credits the surveillance systems in the United States and the U.K. as the inspiration for what he is doing with the Golden Shield Project.

The Defense Advanced Research Projects Agency (DARPA) is funding a research project called Combat Zones That See that will link up cameras across a city to a centralized monitoring station, identify and track individuals and vehicles as they move through the city, and report “suspicious” activity (such as waving arms, looking side-to-side, standing in a group, etc.).

Governments often initially claim that cameras are meant to be used for traffic control, but many of them end up using them for general surveillance. For example, Washington, D.C. had 5,000 “traffic” cameras installed under this premise, and then after they were all in place, networked them all together and then granted access to the Metropolitan Police Department, so they could perform “day-to-day monitoring”.

The development of centralized networks of CCTV cameras watching public areas – linked to computer databases of people’s pictures and identity (biometric data), able to track people’s movements throughout the city, and identify whom they have been with – has been argued by some to present a risk to civil liberties. Trapwire is an example of such a network.

FEDERAL HIGHWAY SURVEILLANCE 

A joint Pentagon/Department of Transportation plan to conduct a permanent surveillance of all motor vehicles using the Federal Highway System is code named ARGUS. It was initially a part of an overall public surveillance program instituted and organized by Admiral Poindexter, who was convicted of various criminal acts as the result of the Iran-Contra affair and then brought back to government service by the Bush Administration. Following public disclosure of Poindexter’s manic attempts to pry into all aspects of American life and his subsequent public departure from government service (he is still so employed but as a “private consultant” and not subject to public scrutiny) many of his plans were officially scrapped. ARGUS, however, is still valid has been fully developed and now is in experimental use on twelve Federal highways across the country..

This surveillance consists of having unmanned video cameras, soon to be installed over all Federal highways and toll roads with Presidential approval. These cameras work 24/7 to video all passing vehicles, trucks, private cars and busses. The information is passed to a central data bank and entered therein. This data can readily viewed at the request of any authorized law enforcement agency to include: private investigative and credit agencies licensed to work with Federal law enforcement information on any user of the road systems under surveillance. Provision will be made, according to the operating plans, to notify local law enforcement immediately if any driver attempts to obscure their license plate number and instructs them to at once to “apprehend and identify” the vehicle or vehicles involved. Federally-funded high-tech street lights now being installed in American cities are not only set to aid the DHS in making “security announcements” and acting as talking surveillance cameras, they are also capable of “recording conversations,” bringing the potential privacy threat posed by ‘Intellistreets’ to a whole new level.

The program has cost to date over $5 billion over a three year period.

This program can easily be installed and running on a nationwide basis within two years from its commencement.

It also is now a Federal crime to attempt to damage or in any way interfere with these surveillance devices.

Some states such as Colorado are using cameras as an alternative method of charging motorists toll fares. As a motorist drives through the toll lanes, motion-activated cameras capture an image of the license plate and the driver is billed.

Cameras are watching if you speed or run a red light, too.

Also, police departments in several metro areas began employing cameras to deter traffic infractions and raise revenue.

Libertarians and electronic privacy advocates oppose these methods, citing a lack of transparency in the use of the cameras and the retention of the data they collect.

DRONES

As many as 30,000 domestic drones will travel the skies above U.S. soil within 20 years, according to a report for Congress by the Federal Aviation Administration.

Congress has called on the FAA to integrate unmanned aircraft into the national air system by 2017.

Already, the FAA has approved domestic drone use by 81 agencies, including schools, police departments and the Department of Homeland Security.

Among the applicants approved: the Arlington Police Department in Texas; California State University in Fresno; Canyon County Sheriff’s Office in Idaho; the city of Herington, Kan.; the Georgia Tech Research Institute; Kansas State University; the Miami-Dade Police Department in Florida; the Mississippi Department of Marine Resources; the Seattle Police Department; and the Universities of Alaska at Fairbanks, California-Davis and Florida.

Although these drones range in size, most are able to hover tens of thousands of feet in the sky, collecting images of people on the ground below.

Based on current trends – technology development, law enforcement interest, political and industry pressure, and the lack of legal safeguards – it is clear that drones pose a looming threat to Americans’ privacy.

Law enforcement agencies all over the United States are starting to use unmanned drones to spy on us, and the Department of Homeland Security is aggressively seeking to expand the use of such drones by local authorities….

The Department of Homeland Security has launched a program to “facilitate and accelerate the adoption” of small, unmanned drones by police and other public safety agencies, an effort that an agency official admitted faces “a very big hurdle having to do with privacy.”

The $4 million Air-based Technologies Program, which will test and evaluate small, unmanned aircraft systems, is designed to be a “middleman” between drone manufacturers and first-responder agencies.

The EPA is already using drones to spy on cattle ranchers in Nebraska and Iowa. Will we eventually get to a point where we all just consider it to be “normal” to have surveillance drones flying above our heads constantly?

The FBI uses aerial surveillance drones over US soil, and has agreed that further political debate and legislation to govern their domestic use may be necessary.

The bureau’s director admitted it used drones to aid its investigations.

However, the potential for growing drone use either in the US, or involving US citizens abroad, is an increasingly charged issue in Congress, and the FBI acknowleged there may need to be legal restrictions placed on their use to protect privacy.

It is known that drones are used by border control officials and have been used by some local law enforcement authorities and Department of Homeland Security in criminal cases.

“To the extent that it relates to the air space there would be some communication back and forth [between agencies],” Mueller said.

 “Pre-Crime” Surveillance Cameras

Also aiding and abetting police in their efforts to track our every movement in real time is Trapwire, which allows for quick analysis of live feeds from CCTV surveillance cameras. Some of Trapwire’s confirmed users are the DC police, and police and casinos in Las Vegas. Police in New York, Los Angeles, Canada, and London are also thought to be using Trapwire.

Using Trapwire in conjunction with NGI, police and other government agents will be able to pinpoint anyone by checking the personal characteristics stored in the database against images on social media websites, feeds from the thousands of CCTV surveillance cameras installed throughout American cities (there are 3,700 CCTV cameras tracking the public in the New York subway system alone), as well as data being beamed down from the more than 30,000 surveillance drones taking to the skies within the next eight years. Given that the drones’ powerful facial recognition cameras will be capable of capturing minute details, including every mundane action performed by every person in an entire city simultaneously, soon there really will be nowhere to run and nowhere to hide, short of living in a cave, far removed from technology.

NGI will not only increase sharing between federal agencies, opening up the floodgates between the Department of Homeland Security, the State Department, the Department of Justice, and the Department of Defense, but states can also get in on the action. The system was rolled out in Michigan in February 2012, with Hawaii, Maryland, South Carolina, Ohio, New Mexico, Kansas, Arizona, Tennessee, Nebraska, and Missouri on the shortlist for implementation, followed by Washington, North Carolina, and Florida in the near future.

Going far beyond the scope of those with criminal backgrounds, the NGI data includes criminals and non-criminals alike – in other words, innocent American citizens. The information is being amassed through a variety of routine procedures, with the police leading the way as prime collectors of biometrics for something as non-threatening as a simple moving violation. For example, the New York Police Department began photographing irises of suspects and arrestees in 2010, routinely telling suspects that the scans were mandatory, despite there being no law requiring defendants to have their irises scanned. Police departments across the country are now being equipped with the Mobile Offender Recognition and Information System, or MORIS, a physical iPhone add-on that allows officers patrolling the streets to scan the irises and faces of individuals and match them against government databases.

To start with, there’s the government’s integration of facial recognition software and other biometric markers into its identification data programs.

The FBI’s Next Generation Identification (NGI) system is a $1 billion project that is aimed at dramatically expanding the government’s current ID database from a fingerprint system to a facial recognition system. NGI will use a variety of biometric data, cross-referenced against the nation’s growing network of surveillance cameras to not only track your every move but create a permanent “recognition” file on you within the government’s massive databases. Researchers at the Massachusetts Institute of Technology’s Media Lab are developing software that can read the feelings behind facial expressions. In some cases, the computers outperform people. The software could lead to empathetic devices and is being used to evaluate and develop better advertisements.

By the time it’s fully operational in 2018, NGI will serve as a vast data storehouse of “iris scans, photos searchable with face recognition technology, palm prints, and measures of gait and voice recordings alongside records of fingerprints, scars, and tattoos.” One component of NGI, the Universal Face Workstation, already contains some 13 million facial images, gleaned from “criminal mug shot photos” taken during the booking process. However, with major search engines having “accumulated face image databases that in their size dwarf the earth’s population,” the government taps into the trove of images stored on social media and photo sharing websites such as Facebook.A company known as BRS Labs has developed “pre-crime” surveillance cameras that can supposedly determine if you are a terrorist or a criminal even before you commit a crime and dozens of these cameras are being installed at major transportation hubs in San Francisco….

In its latest project BRS Labs is to install its devices on the transport system in San Francisco, which includes buses, trams and subways.

The company says will put them in 12 stations with up to 22 cameras in each, bringing the total number to 288.

The cameras will be able to track up to 150 people at a time in real time and will gradually build up a ‘memory’ of suspicious behavior to work out what is suspicious.

Mobile Backscatter Vans

Police all over America will soon be driving around in unmarked vans looking inside your cars and even under your clothes using the same “pornoscanner” technology currently being utilized by the TSA at U.S. airports….

American intelligence agencies are set to join the US military in deploying American Science & Engineering’s Z Backscatter Vans, or mobile backscatter radiation x-rays. These are what TSA officials call “the amazing radioactive genital viewer,” now seen in airports around America, ionizing the private parts of children, the elderly.

These porno scanner wagons will look like regular anonymous vans, and will cruise America’s streets, indiscriminately peering through the cars (and clothes) of anyone in range of its mighty isotope-cannon. But don’t worry, it’s not a violation of privacy. As AS&E’s vice president of marketing Joe Reiss sez, “From a privacy standpoint, I’m hard-pressed to see what the concern or objection could be.”

RFID Microchips

Most Americans don’t realize this, but RFID microchips are steadily becoming part of the very fabric of our lives. Many of your credit cards and debit cards contain them. Many Americans use security cards that contain RFID microchips at work. In some parts of the country it is now mandatory to inject an RFID microchip into your pet.

District officials said the Radio Frequency Identification System (RFID) tags would improve safety by allowing them to locate students — and count them more accurately at the beginning of the school day to help offset cuts in state funding, which is partly based on attendance.

Automated License Plate Readers

Automated license plate readers are being used to track the movements of a vehicle from the time that it enters Washington D.C. to the time that it leaves….

More than 250 cameras in the District and its suburbs scan license plates in real time, helping police pinpoint stolen cars and fleeing killers. But the program quietly has expanded beyond what anyone had imagined even a few years ago.

With virtually no public debate, police agencies have begun storing the information from the cameras, building databases that document the travels of millions of vehicles.

Nowhere is that more prevalent than in the District, which has more than one plate-reader per square mile, the highest concentration in the nation. Police in the Washington suburbs have dozens of them as well, and local agencies plan to add many more in coming months, creating a comprehensive dragnet that will include all the approaches into the District.

Data Mining

The government is not the only one that is spying on you. The truth is that a whole host of very large corporations are gathering every shred of information about you that they possibly can and selling that information for profit. It is called “data mining”, and it is an industry that has absolutely exploded in recent years.

One very large corporation known as Acxiom actually compiles information on more than 190 million people in the U.S. alone….

The company fits into a category called database marketing. It started in 1969 as an outfit called Demographics Inc., using phone books and other notably low-tech tools, as well as one computer, to amass information on voters and consumers for direct marketing. Almost 40 years later, Acxiom has detailed entries for more than 190 million people and 126 million households in the U.S., and about 500 million active consumers worldwide. More than 23,000 servers in Conway, just north of Little Rock, collect and analyze more than 50 trillion data ‘transactions’ a year.

Cable television spying

When people download a film from Netflix to a flatscreen, or turn on web radio, they could be alerting unwanted watchers to exactly what they are doing and where they are.

Spies will no longer have to plant bugs in your home – the rise of ‘connected’ gadgets controlled by apps will mean that people ‘bug’ their own homes.

The CIA claims it will be able to ‘read’ these devices via the internet – and perhaps even via radio waves from outside the home.

Everything from remote controls to clock radios can now be controlled via apps – and chip company ARM recently unveiled low-powered, cheaper chips which will be used in everything from fridges and ovens to doorbells.

These web-connected gadgets will ‘transform’ the art of spying – allowing spies to monitor people automatically without planting bugs, breaking and entering or even donning a tuxedo to infiltrate a dinner party.

‘Particularly to their effect on clandestine tradecraft. Items of interest will be located, identified, monitored, and remotely controlled through technologies such as radio-frequency identification, sensor networks, tiny embedded servers, and energy harvesters –  all connected to the next-generation internet using abundant, low-cost, and high-power computing.’

One of the world’s biggest chip companies, ARM, has unveiled a new processor built to work inside ‘connected’ white goods.

The ARM chips are smaller, lower-powered and far cheaper than previous processors – and designed to add the internet to almost every kind of electrical appliance.

It’s a concept described as the ‘internet of things’.

Futurists think that one day ‘connected’ devices will tell the internet where they are and what they are doing at all times – and will be mapped by computers as precisely as Google Maps charts the physical landscape now.

The forced conversion to High Definition TV means we will only be able to receive a digital TV signal instead of an analog TV signal. This began in 2009. The surveillance specialists will then have the ability to manipulate that digital signal in any direction desired, for any purpose desired.

In addition, all of the newer wide-screen High Definition TVs found in retail outlets today have both tiny cameras and audio detection devices covertly installed within them so the NSA can both observe and listen to everything within it operatinal radius.  The conversion boxes that have been offered with those free government coupons will have the same detection and surveillance devices.

And covert monitoring/tracking chips have been installed in all automobiles manufactured since 1990

  1. Don’t buy the newer HD TVs and don’t get their conversion box. Forget getting TV from broadcast or cable or satellite directly. One idea is to watch TV shows from your older computer with currently availabe TV reception hardware/software (newer computers probably have the surveillance devices installed) or send the video and audio from the computer into the AV jacks on your TV or VCR.
  2. Watch TV shows from programs previously recorded on VHS tapes or from DVDs using your older TV and VCR equipment. This could become a cottage industry overnight if enough people become aware of the covert surveillance agenda riding along on the coattails of the forced conversion to High Definition digital television.
  3. You can listen to only television audio from many inexpensive radios that include the TV audio bands from channel 2-13

In most cases, audio is good enough for me. I’m mainly looking for those few comedy offerings here and there that will provide a laugh. Most sitcoms are just awful: ‘boring’ or ‘banal’ would be complimentary descriptions.

There are also many “black box technologies” being developed out there that the public does not even know about yet.

Then there are the nation’s public schools, where young people are being conditioned to mindlessly march in lockstep to the pervasive authoritarian dictates of the surveillance state. It was here that surveillance cameras and metal detectors became the norm. It was here, too, that schools began reviewing social media websites in order to police student activity. With the advent of biometrics, school officials have gone to ever more creative lengths to monitor and track students’ activities and whereabouts, even for the most mundane things. For example, students in Pinellas County, Fla., are actually subjected to vein recognition scans when purchasing lunch at school.

Of course, the government is not the only looming threat to our privacy and bodily integrity. As with most invasive technologies, the groundwork to accustom the American people to the so-called benefits or conveniences of facial recognition is being laid quite effectively by corporations. For example, a new Facebook application, Facedeals, is being tested in Nashville, Tenn., which enables businesses to target potential customers with specialized offers. Yet another page borrowed from Stephen Spielberg’s 2002 Minority Report, the app works like this: businesses install cameras at their front doors which, using facial recognition technology, identify the faces of Facebook users and then send coupons to their smartphones based upon things they’ve “liked” in the past.

Making this noxious mix even more troubling is the significant margin for error and abuse that goes hand in hand with just about every government-instigated program, only more so when it comes to biometrics and identification databases. Take, for example, the Secure Communities initiative. Touted by the Department of Homeland Security as a way to crack down on illegal immigration, the program attempted to match the inmates in local jails against the federal immigration database. Unfortunately, it resulted in Americans being arrested for reporting domestic abuse and occasionally flagged US citizens for deportation. More recently, in July 2012, security researcher Javier Galbally demonstrated that iris scans can be spoofed, allowing a hacker to use synthetic images of an iris to trick an iris-scanning device into thinking it had received a positive match for a real iris over 50 percent of the time.

The writing is on the wall. With technology moving so fast and assaults on our freedoms, privacy and otherwise, occurring with increasing frequency, there is little hope of turning back this technological, corporate and governmental juggernaut. Even trying to avoid inclusion in the government’s massive identification database will be difficult. The hacktivist group Anonymous suggests wearing a transparent plastic mask, tilting one’s head at a 15 degree angle, wearing obscuring makeup, and wearing a hat outfitted with Infra-red LED lights as methods for confounding the cameras’ facial recognition technology.

Consider this, however: while the general public, largely law-abiding, continues to be pried on, spied on and treated like suspects by a government that spends an exorbitant amount of money on the security-intelligence complex (which takes in a sizeable chunk of the $80 billion yearly intelligence budget), the government’s attention and resources are effectively being diverted from the true threats that remain at large – namely, those terrorists abroad who seek, through overt action and implied threat, to continue the reign of terror in America begun in the wake of the 9/11 attacks.

The CIA Confessions: The Crowley Conversations

July 15, 2019

by Dr. Peter Janney

On October 8th, 2000, Robert Trumbull Crowley, once a leader of the CIA’s Clandestine Operations Division, died in a Washington hospital of heart failure and the end effects of Alzheimer’s Disease. Before the late Assistant Director Crowley was cold, Joseph Trento, a writer of light-weight books on the CIA, descended on Crowley’s widow at her town house on Cathedral Hill Drive in Washington and hauled away over fifty boxes of Crowley’s CIA files.

Once Trento had his new find secure in his house in Front Royal, Virginia, he called a well-known Washington fix lawyer with the news of his success in securing what the CIA had always considered to be a potential major embarrassment.

Three months before, on July 20th of that year, retired Marine Corps colonel William R. Corson, and an associate of Crowley, died of emphysema and lung cancer at a hospital in Bethesda, Md.

After Corson’s death, Trento and the well-known Washington fix-lawyer went to Corson’s bank, got into his safe deposit box and removed a manuscript entitled ‘Zipper.’ This manuscript, which dealt with Crowley’s involvement in the assassination of President John F. Kennedy, vanished into a CIA burn-bag and the matter was considered to be closed forever.

The small group of CIA officials gathered at Trento’s house to search through the Crowley papers, looking for documents that must not become public. A few were found but, to their consternation, a significant number of files Crowley was known to have had in his possession had simply vanished.

When published material concerning the CIA’s actions against Kennedy became public in 2002, it was discovered to the CIA’s horror, that the missing documents had been sent by an increasingly erratic Crowley to another person and these missing papers included devastating material on the CIA’s activities in South East Asia to include drug running, money laundering and the maintenance of the notorious ‘Regional Interrogation Centers’ in Viet Nam and, worse still, the Zipper files proving the CIA’s active organization of the assassination of President John Kennedy..

A massive, preemptive disinformation campaign was readied, using government-friendly bloggers, CIA-paid “historians” and others, in the event that anything from this file ever surfaced. The best-laid plans often go astray and in this case, one of the compliant historians, a former government librarian who fancied himself a serious writer, began to tell his friends about the CIA plan to kill Kennedy and eventually, word of this began to leak out into the outside world.

The originals had vanished and an extensive search was conducted by the FBI and CIA operatives but without success. Crowley’s survivors, his aged wife and son, were interviewed extensively by the FBI and instructed to minimize any discussion of highly damaging CIA files that Crowley had, illegally, removed from Langley when he retired. Crowley had been a close friend of James Jesus Angleton, the CIA’s notorious head of Counterintelligence. When Angleton was sacked by DCI William Colby in December of 1974, Crowley and Angleton conspired to secretly remove Angleton’s most sensitive secret files out of the agency. Crowley did the same thing right before his own retirement, secretly removing thousands of pages of classified information that covered his entire agency career.

Known as “The Crow” within the agency, Robert T. Crowley joined the CIA at its inception and spent his entire career in the Directorate of Plans, also know as the “Department of Dirty Tricks. ”

Crowley was one of the tallest man ever to work at the CIA. Born in 1924 and raised in Chicago, Crowley grew to six and a half feet when he entered the U.S. Military Academy at West Point in N.Y. as a cadet in 1943 in the class of 1946. He never graduated, having enlisted in the Army, serving in the Pacific during World War II. He retired from the Army Reserve in 1986 as a lieutenant colonel. According to a book he authored with his friend and colleague, William Corson, Crowley’s career included service in Military Intelligence and Naval Intelligence, before joining the CIA at its inception in 1947. His entire career at the agency was spent within the Directorate of Plans in covert operations. Before his retirement, Bob Crowley became assistant deputy director for operations, the second-in-command in the Clandestine Directorate of Operations.

Bob Crowley first contacted Gregory Douglas in 1993 when he found out from John Costello that Douglas was about to publish his first book on Heinrich Mueller, the former head of the Gestapo who had become a secret, long-time asset to the CIA. Crowley contacted Douglas and they began a series of long and often very informative telephone conversations that lasted for four years. In 1996, Crowley told Douglas that he believed him to be the person that should ultimately tell Crowley’s story but only after Crowley’s death. Douglas, for his part, became so entranced with some of the material that Crowley began to share with him that he secretly began to record their conversations, later transcribing them word for word, planning to incorporate some, or all, of the material in later publication

Conversation No. 99

Date: Friday, August 22, 1997

Commenced: 3:17 PM CST

Concluded: 3:35 PM CST

GD: Robert, we have talked about Clinton and I have been reading about his alleged tie ins with your people and the smuggling of drugs. Anything to it?

RTC: Oh yes, much true there. Drugs are brought up from South America, for cocaine and heroin and Mexico for marijuana. They just fly it in over the border and land at a safe small airfield, unload and go back from whence them came. Arizona is popular and some ranchers there are very rich from taking in landing fees.

GD: Clinton’s involvement?

RTC: His brother is hophead and Bill does like under the counter money. So does his wife. It’s a wink and a nod type of thing.

GD: Money corrupts and big money corrupts big people.

GD: Yes, anyone is for sale.

GD: I recall the story of the man in the bar who saw a beautiful woman come in. She sat next to him and he asked her if she would spend the night with him for a thousand dollars. She said she certainly would. Then he asked her if she would drop the price to fifty dollars. When she said, in some anger, ‘what do you think I am? He replied, ‘we already know that. I’m just trying to establish the price.’

RTC:(Laughter)  I haven’t heard that one but it does fit. And don’t be fooled by Clinton. He is a large man, very smooth, a great talker and very jovial. Have you offed in a second and think nothing about it. Well, he’s done his duty and will retire, a rich man.. And he will write a book and the New York Times will rave about it.

GD: Yes, they praised Posner’s totally idiotic book on the Kennedy killing.

RTC: Oh that piece of shit. I mean both the book and the author. What an odious ass kisser that one is. Bought and paid for. And so is the Times. They print just what we tell them to print, where our operations are concerned, and kill whatever we tell them to. I have had to deal with them in the past. We toss them a few nice bones from time to time but they do as they are told, believe me.

GD: So much for freedom of the press.

RTC: (Laughter) What a joker you are, Gregory. The Jews own all the major papers in this country, and we work with them. They won’t print a negative word about Israel and on the domestic scene, they do as we ask them. In point of fact, the Jews here think they are going to own everything but in fact, they are here on sufferance. They’ve been kicked out of every country they have lived in throughout history. Mostly a bunch of swindlers, con men and the like. On sufferance. If things get bad here, the men in power, and they are not Jews, will use them as scapegoats and force them out. We don’t  need concentration camps here as long as El Al can take them back to their Mediterranean paradise. Personally, the sooner the better before they ruin the stock market with their backdoor scheming and we have another depression.

GD: They had little to do with the ’29 one, however.

RTC: Just you wait, Gregory, they’ll do it again, mark my words. Yes, Hitler was right about them. Parasites. Never create anything and attach themselves to the system like leeches.

GD: As far as Clinton is concerned, he doesn’t have to worry about the Jews because of his wife but the born again morons hate him. Old Ken Staar is from Chicago and is as crazy as they come. As a matter of fact, all of these raging twits should be shoved into the El Al baggage compartments and shipped off with the Jews. By the way, did you know that the precious wailing wall in Jerusalem is not the foundation of Soloman’s temple but was built by the Arabs about 600 AD? How ironic it is to see devout Jews licking the stones that some Arab mason pissed on hundreds of years before. And there enough pieces of the true cross floating around to build a six room house.

RTC: The relic business was booming once.

GD: Well, now they sell other things, don’t they? I rarely read the main stream press because I don’t trust Israel and the press knocks themselves out to kiss their ass. I predict that if the US doesn’t disengage over there, the frustrated Arabs will start attacking us next. Washington said it best: No entangling alliances. Of course no one will follow such a course but the time will come when they wish they had.

RTC: I’m afraid so. This is beginning to sound like a Nazi party meeting but the truth will out, won’t it?

GD: Not in the New York Times, it won’t.

RTC: Isn’t the truth what people want to believe?

GD: Or are told to believe. If you lie to people long enough, they will either come to believe the lies or will recognize them for what they are and turn on the liars. I predict both of these concepts because one always follows the other.

 

(Concluded at 3:35 PM CST)

https://www.amazon.com/s/ref=nb_sb_noss?url=search-alias%3Daps&field-keywords=Conversations+with+the+Crow+by+Gregory+Douglas

 

 

No responses yet

Leave a Reply