Monthly Archives: October 2015

NSA | Define NSA at AcronymFinder

Posted: October 30, 2015 at 6:44 pm

NSA National Security Agency (US government) NSA National Speakers Association NSA No Strings Attached NSA Naval Support Activity NSA Network Security Appliance (Sonicwall) NSA Notary Signing Agent NSA National Security Advisor NSA Not Seasonally Adjusted NSA National Security Archive NSA National Security Act NSA National Society of Accountants NSA National Sheriffs' Association (Alexandria, VA, USA) NSA National Security Affairs NSA No Sugar Added NSA National Stuttering Association NSA National Stroke Association NSA Network Spinal Analysis NSA National Spiritual Assembly (Institution of the Baha'i Faith) NSA Norwegian Shipowners Association NSA North Slope of Alaska NSA National Sheep Association (Malvern, Worcestershire, UK) NSA National Safety Associates NSA National Scrabble Association NSA Non-State Actor (international relations) NSA National Student Association NSA North Star Academy NSA New Saint Andrews College (Moscow, Idaho) NSA National Sunflower Association NSA National Stone Association (Washington, DC) NSA National Stereoscopic Association NSA Negative Security Assurances NSA National Steeplechase Association NSA National Sound Archive NSA National Security Area NSA NATO Standardization Agency NSA National Smokers Alliance NSA Nebraska Statewide Arboretum NSA Negotiated Service Agreement (US postal service) NSA National Security Agents (gaming clan) NSA Non-Standard Analysis NSA National Seniors Australia (est. 1976) NSA Nuclear Science Abstracts NSA Normalized Site Attenuation NSA Nashville School of the Arts (Tennessee) NSA National Storytelling Association NSA National Slag Association (Alexandria, VA) NSA Northern Study Area NSA Navy Support Activity NSA National Skateboard Association NSA Noise Sensitive Area NSA Nikkei Stock Average NSA National Shipping Authority NSA National School of Administration (China) NSA Non-surgical Sperm Aspiration NSA Nunavut Settlement Area NSA New Statistical Account (Reports on the conditions of Scotland, with reports on each parish, in the 1830s) NSA National Supers Agency (fictional from the movie The Incredibles) NSA National Safety Association NSA National Security Anarchists (hacker group) NSA National Sprint Association (UK) NSA Natuurwetenschappelijke Studievereniging Amsterdam (University of Amsterdam Physics Department student organization) NSA Nebraska Soybean Association NSA Naperville Soccer Association NSA No Smoking Area NSA National Softball Association, Inc. NSA Norcross Soccer Association (Georgia) NSA Naval Supervising Activity NSA National Singles Association (Atlanta, Georgia) NSA Navy Stock Account NSA Night Stalker Association NSA National Success Association NSA National Shuffleboard Association NSA National Software Alliance NSA No Significant Abnormalities (disease assessment) NSA Northern Slope of Alaska NSA National Service Alliance, LLC NSA Non Semi Auto (concealed handgun license; Texas) NSA Non Standard Area (of a database) NSA Nantucket Shellfish Association (Nantucket, MA) NSA National Scout Association NSA National Standard Application NSA Narrow-Slot Approximation NSA National Sentinel Audit NSA Node Switching Assembly NSA Net Sales Area NSA Network Search Algorithm NSA Nikkei Student Association NSA Nuclear Support Agency NSA Naval Systems Analysis NSA Nichiren Shosu of America NSA Net Sellable Area (real estate) NSA Network South Australia (Adelaide, Australia) NSA Neutron Source Assembly NSA Net Server Assistant NSA Norwegian Security Act NSA Nabelschnurarterie (German: Umbilical Cord Artery) NSA Narrow Slot Aperture NSA Nikkei Siam Aluminium Limited (Pathumtani, Thailand) NSA New Student Ambassadors (various schools) NSA Nippon Software Industry Association (Japan) NSA Nippon Steel Australia NSA Nippon Supporters Association (Japan) NSA Nippon Surfing Association (Japan) NSA No Secrets Association NSA Non-Self-Aligned NSA Non Standard Ammunition (munitions) NSA Neil Stewart Associates (UK) NSA Network Security Administrator NSA Network Security Agreement NSA Network Simplex Algorithm NSA New Settlement Apartments (New York, NY) NSA New Small Airplane (Boeing) NSA Network Storage Appliance (computing) NSA Network Supported Account (Cisco) NSA Network Systems Administrator (various organizations) NSA Nouvelle Substance Active (French: New Active Substance; Canada) NSA Nordic Securities Association (est. 2008) NSA Non-Standard Auto (insurance) NSA Naczelny Sad Administracyjny (Polish: Supreme Administrative Court) NSA National Scrapbooking Association NSA National Sex Authority NSA National Smokejumper Association NSA National Snow Analyses (US NOAA) NSA Need Special Assistance NSA Natural Systems Agriculture NSA National Supervisory Authority (EU) NSA National Survey of Adolescents NSA Native Speakers of Arabic NSA National Statistical Authorities (EU) NSA National Sports Academy (various locations) NSA National Space Agency

More:
NSA | Define NSA at AcronymFinder

Posted in NSA | Comments Off on NSA | Define NSA at AcronymFinder

PRISM (surveillance program) – Wikipedia, the free encyclopedia

Posted: at 6:44 pm

PRISM is a clandestine[1]surveillance program under which the United States National Security Agency (NSA) collects internet communications from at least nine major US internet companies.[2][3][4] Since 2001 the United States government has increased its scope for such surveillance, and so this program was launched in 2007.

PRISM is a government code name for a data-collection effort known officially by the SIGAD US-984XN.[5][6] The PRISM program collects stored internet communications based on demands made to internet companies such as Google Inc. under Section 702 of the FISA Amendments Act of 2008 to turn over any data that match court-approved search terms.[7] The NSA can use these PRISM requests to target communications that were encrypted when they traveled across the internet backbone, to focus on stored data that telecommunication filtering systems discarded earlier,[8][9] and to get data that is easier to handle, among other things.[10]

PRISM began in 2007 in the wake of the passage of the Protect America Act under the Bush Administration.[11][12] The program is operated under the supervision of the U.S. Foreign Intelligence Surveillance Court (FISA Court, or FISC) pursuant to the Foreign Intelligence Surveillance Act (FISA).[13] Its existence was leaked six years later by NSA contractor Edward Snowden, who warned that the extent of mass data collection was far greater than the public knew and included what he characterized as "dangerous" and "criminal" activities.[14] The disclosures were published by The Guardian and The Washington Post on June 6, 2013. Subsequent documents have demonstrated a financial arrangement between NSA's Special Source Operations division (SSO) and PRISM partners in the millions of dollars.[15]

Documents indicate that PRISM is "the number one source of raw intelligence used for NSA analytic reports", and it accounts for 91% of the NSA's internet traffic acquired under FISA section 702 authority."[16][17] The leaked information came to light one day after the revelation that the FISA Court had been ordering a subsidiary of telecommunications company Verizon Communications to turn over to the NSA logs tracking all of its customers' telephone calls.[18][19]

U.S. government officials have disputed some aspects of the Guardian and Washington Post stories and have defended the program by asserting it cannot be used on domestic targets without a warrant, that it has helped to prevent acts of terrorism, and that it receives independent oversight from the federal government's executive, judicial and legislative branches.[20][21] On June 19, 2013, U.S. President Barack Obama, during a visit to Germany, stated that the NSA's data gathering practices constitute "a circumscribed, narrow system directed at us being able to protect our people."[22]

PRISM was publicly revealed when classified documents about the program were leaked to journalists of The Washington Post and The Guardian by Edward Snowden at the time an NSA contractor during a visit to Hong Kong.[2][3] The leaked documents included 41 PowerPoint slides, four of which were published in news articles.[2][3]

The documents identified several technology companies as participants in the PRISM program, including Microsoft in 2007, Yahoo! in 2008, Google in 2009, Facebook in 2009, Paltalk in 2009, YouTube in 2010, AOL in 2011, Skype in 2011 and Apple in 2012.[23] The speaker's notes in the briefing document reviewed by The Washington Post indicated that "98 percent of PRISM production is based on Yahoo, Google, and Microsoft".[2]

The slide presentation stated that much of the world's electronic communications pass through the U.S., because electronic communications data tend to follow the least expensive route rather than the most physically direct route, and the bulk of the world's internet infrastructure is based in the United States.[16] The presentation noted that these facts provide United States intelligence analysts with opportunities for intercepting the communications of foreign targets as their electronic data pass into or through the United States.[3][16]

Snowden's subsequent disclosures included statements that governments such as the United Kingdom's GCHQ also undertook mass interception and tracking of internet and communications data[24] described by Germany as "nightmarish" if true[25] allegations that the NSA engaged in "dangerous" and "criminal" activity by "hacking" civilian infrastructure networks in other countries such as "universities, hospitals, and private businesses",[14] and alleged that compliance offered only very limited restrictive effect on mass data collection practices (including of Americans) since restrictions "are policy-based, not technically based, and can change at any time", adding that "Additionally, audits are cursory, incomplete, and easily fooled by fake justifications",[14] with numerous self-granted exceptions, and that NSA policies encourage staff to assume the benefit of the doubt in cases of uncertainty.[26][27][28]

Below are a number of slides released by Edward Snowden showing the operation and processes behind the PRISM program.

Slide showing that much of the world's communications flow through the U.S.

Details of information collected via PRISM

Slide listing companies and the date that PRISM collection began

Slide showing PRISM's tasking process

Slide showing the PRISM collection dataflow

Slide showing PRISM case numbers

Slide showing the REPRISMFISA Web app

Slide showing some PRISM targets.

Slide fragment mentioning "upstream collection", FAA702, EO 12333, and references yahoo.com explicitly in the text.

FAA702 Operations, and map

FAA702 Operations, and map. The subheader reads "Collection only possible under FAA702 Authority". FAIRVIEW is in the center box.

FAA702 Operations, and map. The subheader reads "Collection only possible under FAA702 Authority". STORMBREW is in the center box.

Tasking, Points to Remember. Transcript of body: Whenever your targets meet FAA criteria, you should consider asking to FAA. Emergency tasking processes exist for [imminent /immediate ] threat to life situations and targets can be placed on [illegible] within hours (surveillance and stored comms). Get to know your Product line FAA adjudicators and FAA leads.

The French newspaper Le Monde disclosed new PRISM slides (See Page 4, 7 and 8) coming from the "PRISM/US-984XN Overview" presentation on October 21, 2013.[29] The British newspaper The Guardian disclosed new PRISM slides (see pages 3 and 6) in November 2013 which on the one hand compares PRISM with the Upstream program, and on the other hand deals with collaboration between the NSA's Threat Operations Center and the FBI.[30]

Wikimedia Commons keeps copies of the leaked PowerPoint slides, and other associated documents.

PRISM is a program from the Special Source Operations (SSO) division of the NSA, which in the tradition of NSA's intelligence alliances, cooperates with as many as 100 trusted U.S. companies since the 1970s.[2] A prior program, the Terrorist Surveillance Program,[31][32] was implemented in the wake of the September 11 attacks under the George W. Bush Administration but was widely criticized and challenged as illegal, because it did not include warrants obtained from the Foreign Intelligence Surveillance Court.[32][33][34][35][36] PRISM was authorized by the Foreign Intelligence Surveillance Court.[16]

PRISM was enabled under President Bush by the Protect America Act of 2007 and by the FISA Amendments Act of 2008, which immunizes private companies from legal action when they cooperate with U.S. government agencies in intelligence collection. In 2012 the act was renewed by Congress under President Obama for an additional five years, through December 2017.[3][37][38] According to The Register, the FISA Amendments Act of 2008 "specifically authorizes intelligence agencies to monitor the phone, email, and other communications of U.S. citizens for up to a week without obtaining a warrant" when one of the parties is outside the U.S.[37]

The most detailed description of the PRISM program can be found in a report about NSA's collection efforts under Section 702 FAA, that was released by the Privacy and Civil Liberties Oversight Board (PCLOB) on July 2, 2014.[39]

According to this report, PRISM is only used to collect internet communications, not telephone conversations. These internet communications are not collected in bulk, but in a targeted way: only communications that are to or from specific selectors, like e-mail addresses, can be gathered. Under PRISM, there's no collection based upon keywords or names.[39]

The actual collection process is done by the Data Intercept Technology Unit (DITU) of the FBI, which on behalf of the NSA sends the selectors to the US internet service providers, which were previously served with a Section 702 Directive. Under this directive, the provider is legally obliged to hand over (to DITU) all communications to or from the selectors provided by the government.[39] DITU then sends these communications to NSA, where they are stored in various databases, depending on their type.

Data, both content and metadata, that already have been collected under the PRISM program, may be searched for both US and Non-US person identifiers. These kind of queries became known as "back-door searches" and are conducted by NSA, FBI and CIA.[40] Each of these agencies have slightly different protocols and safeguards to protect searches with a US person identifier.[39]

Internal NSA presentation slides included in the various media disclosures show that the NSA could unilaterally access data and perform "extensive, in-depth surveillance on live communications and stored information" with examples including email, video and voice chat, videos, photos, voice-over-IP chats (such as Skype), file transfers, and social networking details.[3] Snowden summarized that "in general, the reality is this: if an NSA, FBI, CIA, DIA, etc. analyst has access to query raw SIGINT [signals intelligence] databases, they can enter and get results for anything they want."[14]

According to The Washington Post, the intelligence analysts search PRISM data using terms intended to identify suspicious communications of targets whom the analysts suspect with at least 51 percent confidence to not be U.S. citizens, but in the process, communication data of some U.S. citizens are also collected unintentionally.[2] Training materials for analysts tell them that while they should periodically report such accidental collection of non-foreign U.S. data, "it's nothing to worry about."[2]

According to The Guardian, NSA had access to chats and emails on Hotmail.com, Skype, because Microsoft had "developed a surveillance capability to deal" with the interception of chats, and "for Prism collection against Microsoft email services will be unaffected because Prism collects this data prior to encryption."[41][42]

Also according to The Guardian's Glenn Greenwald even low-level NSA analysts are allowed to search and listen to the communications of Americans and other people without court approval and supervision. Greenwald said low level Analysts can, via systems like PRISM, "listen to whatever emails they want, whatever telephone calls, browsing histories, Microsoft Word documents.[31] And it's all done with no need to go to a court, with no need to even get supervisor approval on the part of the analyst."[43]

He added that the NSA databank, with its years of collected communications, allows analysts to search that database and listen "to the calls or read the emails of everything that the NSA has stored, or look at the browsing histories or Google search terms that you've entered, and it also alerts them to any further activity that people connected to that email address or that IP address do in the future."[43] Greenwald was referring in the context of the foregoing quotes to the NSA program X-Keyscore.[44]

Unified Targeting Tool

Shortly after publication of the reports by The Guardian and The Washington Post, the United States Director of National Intelligence, James Clapper, on June 7, 2013 released a statement confirming that for nearly six years the government of the United States had been using large internet services companies such as Google and Facebook to collect information on foreigners outside the United States as a defense against national security threats.[18] The statement read in part, "The Guardian and The Washington Post articles refer to collection of communications pursuant to Section 702 of the Foreign Intelligence Surveillance Act. They contain numerous inaccuracies."[46] He went on to say, "Section 702 is a provision of FISA that is designed to facilitate the acquisition of foreign intelligence information concerning non-U.S. persons located outside the United States. It cannot be used to intentionally target any U.S. citizen, any other U.S. person, or anyone located within the United States."[46] Clapper concluded his statement by stating, "The unauthorized disclosure of information about this important and entirely legal program is reprehensible and risks important protections for the security of Americans."[46] On March 12, 2013, Clapper had told the United States Senate Select Committee on Intelligence that the NSA does "not wittingly" collect any type of data on millions or hundreds of millions of Americans.[47] Clapper later admitted the statement he made on March 12, 2013 was a lie,[48] or in his words "I responded in what I thought was the most truthful, or least untruthful manner by saying no."[49]

On June 7, 2013 U.S. President Barack Obama, referring to the PRISM program[citation needed] and the NSA's telephone calls logging program, said, "What you've got is two programs that were originally authorized by Congress, have been repeatedly authorized by Congress. Bipartisan majorities have approved them. Congress is continually briefed on how these are conducted. There are a whole range of safeguards involved. And federal judges are overseeing the entire program throughout."[50] He also said, "You can't have 100 percent security and then also have 100 percent privacy and zero inconvenience. You know, we're going to have to make some choices as a society."[50] In separate statements, senior Obama administration officials (not mentioned by name in source) said that Congress had been briefed 13 times on the programs since 2009.[51]

On June 8, 2013, Director of National Intelligence Clapper made an additional public statement about PRISM and released a fact sheet providing further information about the program, which he described as "an internal government computer system used to facilitate the government's statutorily authorized collection of foreign intelligence information from electronic communication service providers under court supervision, as authorized by Section 702 of the Foreign Intelligence Surveillance Act (FISA) (50 U.S.C. 1881a)."[52][53] The fact sheet stated that "the surveillance activities published in The Guardian and the Washington Post are lawful and conducted under authorities widely known and discussed, and fully debated and authorized by Congress."[52] The fact sheet also stated that "the United States Government does not unilaterally obtain information from the servers of U.S. electronic communication service providers. All such information is obtained with FISA Court approval and with the knowledge of the provider based upon a written directive from the Attorney General and the Director of National Intelligence." It said that the Attorney General provides FISA Court rulings and semi-annual reports about PRISM activities to Congress, "provid[ing] an unprecedented degree of accountability and transparency."[52] Democratic Senators Udall and Wyden, who serve on the U.S. Senate Select Committee on Intelligence, subsequently criticized the fact sheet as being inaccurate.[clarification needed] NSA Director General Keith Alexander acknowledged the errors, stating that the fact sheet "could have more precisely described" the requirements governing the collection of e-mail and other internet content from U.S. companies. The fact sheet was withdrawn from the NSA's website around June 26.[54]

In a closed-doors Senate hearing around June 11, FBI Director Robert Mueller said that Snowden's leaks had caused "significant harm to our nation and to our safety."[55] In the same Senate NSA Director Alexander defended the program.[further explanation needed] Alexander's defense was immediately criticized by Senators Udall and Wyden, who said they saw no evidence that the NSA programs had produced "uniquely valuable intelligence." In a joint statement, they wrote, "Gen Alexander's testimony yesterday suggested that the NSA's bulk phone records collection program helped thwart 'dozens' of terrorist attacks, but all of the plots that he mentioned appear to have been identified using other collection methods."[55][56]

On June 18, NSA Director Alexander said in an open hearing before the House Intelligence Committee of Congress that communications surveillance had helped prevent more than 50 potential terrorist attacks worldwide (at least 10 of them involving terrorism suspects or targets in the United States) between 2001 and 2013, and that the PRISM web traffic surveillance program contributed in over 90 percent of those cases.[57][58][59] According to court records, one example Alexander gave regarding a thwarted attack by al Qaeda on the New York Stock Exchange was not in fact foiled by surveillance.[60] Several senators wrote Director of National Intelligence Clapper asking him to provide other examples.[61]

U.S. intelligence officials, speaking on condition of anonymity, told various news outlets that by June 24 they were already seeing what they said was evidence that suspected terrorists had begun changing their communication practices in order to evade detection by the surveillance tools disclosed by Snowden.[62][63]

In contrast to their swift and forceful reactions the previous day to allegations that the government had been conducting surveillance of United States citizens' telephone records, Congressional leaders initially had little to say about the PRISM program the day after leaked information about the program was published. Several lawmakers declined to discuss PRISM, citing its top-secret classification,[64] and others said that they had not been aware of the program.[65] After statements had been released by the President and the Director of National Intelligence, some lawmakers began to comment:

Senator John McCain (R-AZ)

Senator Dianne Feinstein (D-CA), chair of the Senate Intelligence Committee

Senator Rand Paul (R-KY)

Senator Susan Collins (R-ME), member of Senate Intelligence Committee and past member of Homeland Security Committee

Representative Jim Sensenbrenner (R-WI), principal sponsor of the Patriot Act

Representative Mike Rogers (R-MI), a Chairman of the Permanent Select Committee on Intelligence.

Senator Mark Udall (D-CO)

Representative Todd Rokita (R-IN)

Representative Luis Gutierrez (D-IL)

Senator Ron Wyden (D-OR)

Following these statements some lawmakers from both parties warned national security officials during a hearing before the House Judiciary Committee that they must change their use of sweeping National Security Agency surveillance programs or face losing the provisions of the Foreign Intelligence Surveillance Act that have allowed for the agency's mass collection of telephone metadata.[75] "Section 215 expires at the end of 2015, and unless you realize you've got a problem, that is not going to be renewed," Rep. Jim Sensenbrenner, R-Wis., author of the USA Patriot Act, threatened during the hearing.[75] "It's got to be changed, and you've got to change how you operate section 215. Otherwise, in two and a half years, you're not going to have it anymore."[75]

Leaks of classified documents pointed to the role of a special court in enabling the government's secret surveillance programs, but members of the court maintained they were not collaborating with the executive branch.[76]The New York Times, however, reported in July 2013 that in "more than a dozen classified rulings, the nation's surveillance court has created a secret body of law giving the National Security Agency the power to amass vast collections of data on Americans while pursuing not only terrorism suspects, but also people possibly involved in nuclear proliferation, espionage and cyberattacks."[77] After Members of the U.S. Congress pressed the Foreign Intelligence Surveillance Court to release declassified versions of its secret ruling, the court dismissed those requests arguing that the decisions can't be declassified because they contain classified information.[78]Reggie Walton, the current FISA presiding judge, said in a statement: "The perception that the court is a rubber stamp is absolutely false. There is a rigorous review process of applications submitted by the executive branch, spearheaded initially by five judicial branch lawyers who are national security experts, and then by the judges, to ensure that the court's authorizations comport with what the applicable statutes authorize."[79] The accusation of being a "rubber stamp" was further rejected by Walton who wrote in a letter to Senator Patrick J. Leahy: "The annual statistics provided to Congress by the Attorney General [...]frequently cited to in press reports as a suggestion that the Court's approval rate of application is over 99%reflect only the number of final applications submitted to and acted on by the Court. These statistics do not reflect the fact that many applications are altered to prior or final submission or even withheld from final submission entirely, often after an indication that a judge would not approve them."[80]

The U.S. military has acknowledged blocking access to parts of The Guardian website for thousands of defense personnel across the country,[81] and blocking the entire Guardian website for personnel stationed throughout Afghanistan, the Middle East, and South Asia.[82] A spokesman said the military was filtering out reports and content relating to government surveillance programs to preserve "network hygiene" and prevent any classified material from appearing on unclassified parts of its computer systems.[81] Access to the Washington Post, which also published information on classified NSA surveillance programs disclosed by Edward Snowden, had not been blocked at the time the blocking of access to The Guardian was reported.[82]

The former head of the Austrian Federal Office for the Protection of the Constitution and Counterterrorism, Gert-Ren Polli, stated he knew the PRISM program under a different name and stated that surveillance activities had occurred in Austria as well. Polli had publicly stated in 2009 that he had received requests from US intelligence agencies to do things that would be in violation of Austrian law, which Polli refused to allow.[83][84]

The Australian government has said it will investigate the impact of the PRISM program and the use of the Pine Gap surveillance facility on the privacy of Australian citizens.[85] Australia's former foreign minister Bob Carr said that Australians shouldn't be concerned about PRISM but that cybersecurity is high on the government's list of concerns.[86] An Australian diplomat stated that the acts of Edward Snowden were treachery and offered a staunch defence of her nation's intelligence co-operation with America. [87]

Brazil's president, Dilma Rousseff, responded by cancelling a planned October 2013 state visit to the United States, demanding an official apology, which by October 20, 2013, hadn't come.[88] Also, Rousseff classified the spying as unacceptable between more harsh words in a speech before the UN General Assembly on September 24, 2013.[89] As a result, Boeing lost out on a US$4.5 billion contract for fighter jets to Sweden's Saab Group.[90]

Canada's national cryptologic agency, the Communications Security Establishment (CSEC), said that commenting on PRISM "would undermine CSE's ability to carry out its mandate." Privacy Commissioner Jennifer Stoddart lamented Canada's standards when it comes to protecting personal online privacy stating "We have fallen too far behind" in her report. "While other nations' data protection authorities have the legal power to make binding orders, levy hefty fines and take meaningful action in the event of serious data breaches, we are restricted to a 'soft' approach: persuasion, encouragement and, at the most, the potential to publish the names of transgressors in the public interest." And, "when push comes to shove," Stoddart wrote, "short of a costly and time-consuming court battle, we have no power to enforce our recommendations."[91][92]

On 20 October 2013 a committee at the European Parliament backed a measure that, if it is enacted, would require American companies to seek clearance from European officials before complying with United States warrants seeking private data. The legislation has been under consideration for two years. The vote is part of efforts in Europe to shield citizens from online surveillance in the wake of revelations about a far-reaching spying program by the U.S. National Security Agency.[93] Germany and France have also had ongoing mutual talks about how they can keep European email traffic from going across American servers.[94]

On October 21, 2013 the French Foreign Minister, Laurent Fabius, summoned the U.S. Ambassador, Charles Rivkin, to the Quai d'Orsay in Paris to protest large-scale spying on French citizens by the U.S. National Security Agency (NSA). Paris prosecutors had opened preliminary inquiries into the NSA program in July, but Fabius said, " obviously we need to go further" and "we must quickly assure that these practices aren't repeated."[95]

Germany did not receive any raw PRISM data, according to a Reuters report.[96]German Chancellor Angela Merkel said that "the internet is new to all of us" to explain the nature of the program; Matthew Schofield of McClatchy Washington Bureau said, "She was roundly mocked for that statement."[97] Gert-Ren Polli, a former Austrian counter-terrorism official, said in 2013 that it is "absurd and unnatural" for the German authorities to pretend not to have known anything.[83][84] The German Army was using PRISM to support its operations in Afghanistan as early as 2011.[98]

In October 2013, it was reported that the NSA monitored Merkel's cell phone.[99] The United States denied the report, but following the allegations, Merkel called President Obama and told him that spying on friends was "never acceptable, no matter in what situation."[100]

Israeli newspaper Calcalist discussed[101] the Business Insider article[102] about the possible involvement of technologies from two secretive Israeli companies in the PRISM programVerint Systems and Narus.

The Mexican Government after finding out about the PRISM program has started to build its own spying program to spy on its own citizens. According to Jenaro Villamil a writer from Proceso(magazine), CISEN the intelligence agency from Mexico has started to work with IBM and Hewlett Packard to develop its own data gathering software. Facebook, Twitter, Emails and other social network sites are going to be priority."[103]

In New Zealand, University of Otago information science Associate Professor Hank Wolfe said that "under what was unofficially known as the Five Eyes Alliance, New Zealand and other governments, including the United States, Australia, Canada, and Britain, dealt with internal spying by saying they didn't do it. But they have all the partners doing it for them and then they share all the information."[104]

Edward Snowden, in a live streamed Google Hangout to Kim Dotcom and Julian Assange alleged that he had received intelligence from New Zealand, and the NSA has listening posts in New Zealand[105]

At a meeting of European Union leaders held the week of 21 October 2013, Mariano Rajoy, Spain's prime minister, said that "spying activities aren't proper among partner countries and allies". On 28 October 2013 the Spanish government summoned the American ambassador, James Costos, to address allegations that the U.S. had collected data on 60 million telephone calls in Spain. Separately, igo Mndez de Vigo, a Spanish secretary of state, referred to the need to maintain "a necessary balance" between security and privacy concerns, but said that the recent allegations of spying, "if proven to be true, are improper and unacceptable between partners and friendly countries".[106]

In the United Kingdom, the Government Communications Headquarters (GCHQ), which also has its own surveillance program Tempora, had access to the PRISM program on or before June 2010 and wrote 197 reports with it in 2012 alone. But after 2014, the Tempora lost its access to the PRISM programme.[citation needed] The Intelligence and Security Committee of the UK Parliament reviewed the reports GCHQ produced on the basis of intelligence sought from the US. They found in each case a warrant for interception was in place in accordance with the legal safeguards contained in UK law.[107]

In August 2013, The Guardian newspaper's offices were visited by agents from GCHQ, who ordered and supervised the destruction of the hard drives containing information acquired from Snowden.[108]

The original Washington Post and Guardian articles reporting on PRISM noted that one of the leaked briefing documents said PRISM involves collection of data "directly from the servers" of several major internet services providers.[2][3]

Corporate executives of several companies identified in the leaked documents told The Guardian that they had no knowledge of the PRISM program in particular and also denied making information available to the government on the scale alleged by news reports.[3][109] Statements of several of the companies named in the leaked documents were reported by TechCrunch and The Washington Post as follows:[110][111]

In response to the technology companies' denials of the NSA being able to directly access the companies' servers, The New York Times reported that sources had stated the NSA was gathering the surveillance data from the companies using other technical means in response to court orders for specific sets of data.[18]The Washington Post suggested, "It is possible that the conflict between the PRISM slides and the company spokesmen is the result of imprecision on the part of the NSA author. In another classified report obtained by The Post, the arrangement is described as allowing 'collection managers [to send] content tasking instructions directly to equipment installed at company-controlled locations,' rather than directly to company servers."[2] "[I]n context, 'direct' is more likely to mean that the NSA is receiving data sent to them deliberately by the tech companies, as opposed to intercepting communications as they're transmitted to some other destination.[111]

"If these companies received an order under the FISA amendments act, they are forbidden by law from disclosing having received the order and disclosing any information about the order at all," Mark Rumold, staff attorney at the Electronic Frontier Foundation, told ABC News.[114]

On May 28, 2013, Google was ordered by United States District Court Judge Susan Illston to comply with a National Security Letter issued by the FBI to provide user data without a warrant.[115] Kurt Opsahl, a senior staff attorney at the Electronic Frontier Foundation, in an interview with VentureBeat said, "I certainly appreciate that Google put out a transparency report, but it appears that the transparency didn't include this. I wouldn't be surprised if they were subject to a gag order."[116]

The New York Times reported on June 7, 2013, that "Twitter declined to make it easier for the government. But other companies were more compliant, according to people briefed on the negotiations."[117] The other companies held discussions with national security personnel on how to make data available more efficiently and securely.[117] In some cases, these companies made modifications to their systems in support of the intelligence collection effort.[117] The dialogues have continued in recent months, as General Martin Dempsey, the chairman of the Joint Chiefs of Staff, has met with executives including those at Facebook, Microsoft, Google and Intel.[117] These details on the discussions provide insight into the disparity between initial descriptions of the government program including a training slide which states, "Collection directly from the servers"[118] and the companies' denials.[117]

While providing data in response to a legitimate FISA request approved by the FISA Court is a legal requirement, modifying systems to make it easier for the government to collect the data is not. This is why Twitter could legally decline to provide an enhanced mechanism for data transmission.[117] Other than Twitter, the companies were effectively asked to construct a locked mailbox and provide the key to the government, people briefed on the negotiations said.[117] Facebook, for instance, built such a system for requesting and sharing the information.[117] Google does not provide a lockbox system, but instead transmits required data by hand delivery or ssh.[119]

In response to the publicity surrounding media reports of data-sharing, several companies requested permission to reveal more public information about the nature and scope of information provided in response to National Security requests.

On June 14, 2013, Facebook reported that the U.S. government had authorized the communication of "about these numbers in aggregate, and as a range." In a press release posted to its web site, the company reported, "For the six months ending December 31, 2012, the total number of user-data requests Facebook received from any and all government entities in the U.S. (including local, state, and federal, and including criminal and national security-related requests) was between 9,000 and 10,000." The company further reported that the requests impacted "between 18,000 and 19,000" user accounts, a "tiny fraction of one percent" of more than 1.1 billion active user accounts.[120]

That same day, Microsoft reported that for the same period, it received "between 6,000 and 7,000 criminal and national security warrants, subpoenas and orders affecting between 31,000 and 32,000 consumer accounts from U.S. governmental entities (including local, state and federal)" which impacted "a tiny fraction of Microsoft's global customer base."[121]

Google issued a statement criticizing the requirement that data be reported in aggregated form, stating that lumping national security requests with criminal request data would be "a step backwards" from its previous, more detailed practices on its website's transparency report. The company said that it would continue to seek government permission to publish the number and extent of FISA requests.[122]

Cisco Systems has seen a huge drop in export sales because of spying fears from the National Security Agency using backdoors in its products.[123]

On September 12, 2014, Yahoo! reported the U.S. Government threatened the imposition of $250,000 in fines per day if Yahoo didn't hand over user data as part of the NSA's PRISM program.[124] It is not known if other companies were threatened or fined for not providing data in response to a legitimate FISA requests.

The New York Times editorial board charged that the Obama administration "has now lost all credibility on this issue,"[125] and lamented that "for years, members of Congress ignored evidence that domestic intelligence-gathering had grown beyond their control, and, even now, few seem disturbed to learn that every detail about the public's calling and texting habits now reside in a N.S.A. database."[126] It wrote with respect to the FISA-Court in context of PRISM that it is "a perversion of the American justice system" when "judicial secrecy is coupled with a one-sided presentation of the issues."[127] According to the New York Times, "the result is a court whose reach is expanding far beyond its original mandate and without any substantive check."[127]

James Robertson, a former federal district judge based in Washington who served on the secret Foreign Intelligence Surveillance Act court for three years between 2002 and 2005 and who ruled against the Bush administration in the landmark Hamdan v. Rumsfeld case, said FISA court is independent but flawed because only the government's side is represented effectively in its deliberations. "Anyone who has been a judge will tell you a judge needs to hear both sides of a case," said James Robertson.[128] Without this judges do not benefit from adversarial debate. He suggested creating an advocate with security clearance who would argue against government filings.[129] Robertson questioned whether the secret FISA court should provide overall legal approval for the surveillance programs, saying the court "has turned into something like an administrative agency." Under the changes brought by the Foreign Intelligence Surveillance Act of 1978 Amendments Act of 2008, which expanded the US government's authority by forcing the court to approve entire surveillance systems and not just surveillance warrants as it previously handled, "the court is now approving programmatic surveillance. I don't think that is a judicial function."[128] Robertson also said he was "frankly stunned" by the New York Times report[77] that FISA court rulings had created a new body of law broadening the ability of the NSA to use its surveillance programs to target not only terrorists but suspects in cases involving espionage, cyberattacks and weapons of mass destruction.[128]

Former CIA analyst Valerie Plame Wilson and former U.S. diplomat Joseph Wilson, writing in an op-ed article published in The Guardian, said that "Prism and other NSA data-mining programs might indeed be very effective in hunting and capturing actual terrorists, but we don't have enough information as a society to make that decision."[130] Computer security expert John Bambenek from the University of Illinois suggested that use of data mining in national security cases might be prone to inaccuracy and manipulation.[131]

The Electronic Frontier Foundation (EFF), an international non-profit digital-rights group based in the U.S., is hosting a tool, by which an American resident can write to their government representatives regarding their opposition to mass spying.[132]

The Obama administration's argument that NSA surveillance programs such as PRISM and Boundless Informant had been necessary to prevent acts of terrorism was challenged by several parties. Ed Pilkington and Nicholas Watt of The Guardian said of the case of Najibullah Zazi, who had planned to bomb the New York City Subway, that interviews with involved parties and U.S. and British court documents indicated that the investigation into the case had actually been initiated in response to "conventional" surveillance methods such as "old-fashioned tip-offs" of the British intelligence services, rather than to leads produced by NSA surveillance.[133] Michael Daly of The Daily Beast stated that even though Tamerlan Tsarnaev, who is alleged to have conducted the 2013 Boston marathon bombings with his brother Dzhokhar Tsarnaev, had visited the Al Qaeda-affiliated Inspire magazine website, and even though Russian intelligence officials had raised concerns with U.S. intelligence officials about Tamerlan Tsarnaev, PRISM did not prevent him from carrying out the Boston attacks. Daly observed that, "The problem is not just what the National Security Agency is gathering at the risk of our privacy but what it is apparently unable to monitor at the risk of our safety."[134]

Ron Paul, a former Republican member of Congress and prominent libertarian, thanked Snowden and Greenwald and denounced the mass surveillance as unhelpful and damaging, urging instead more transparency in U.S. government actions.[135] He called Congress "derelict in giving that much power to the government," and said that had he been elected president, he would have ordered searches only when there was probable cause of a crime having been committed, which he said was not how the PRISM program was being operated.[136]

New York Times columnist Thomas L. Friedman defended limited government surveillance programs intended to protect the American people from terrorist acts:

Yes, I worry about potential government abuse of privacy from a program designed to prevent another 9/11abuse that, so far, does not appear to have happened. But I worry even more about another 9/11. ... If there were another 9/11, I fear that 99 percent of Americans would tell their members of Congress: "Do whatever you need to do to, privacy be damned, just make sure this does not happen again." That is what I fear most. That is why I'll reluctantly, very reluctantly, trade off the government using data mining to look for suspicious patterns in phone numbers called and e-mail addressesand then have to go to a judge to get a warrant to actually look at the content under guidelines set by Congressto prevent a day where, out of fear, we give government a license to look at anyone, any e-mail, any phone call, anywhere, anytime.[137]

Political commentator David Brooks similarly cautioned that government data surveillance programs are a necessary evil: "if you don't have mass data sweeps, well, then these agencies are going to want to go back to the old-fashioned eavesdropping, which is a lot more intrusive."[138]

Conservative commentator Charles Krauthammer worried less about the legality of PRISM and other NSA surveillance tools than about the potential for their abuse without more stringent oversight. "The problem here is not constitutionality. ... We need a toughening of both congressional oversight and judicial review, perhaps even some independent outside scrutiny. Plus periodic legislative revisionsay, reauthorization every couple of yearsin light of the efficacy of the safeguards and the nature of the external threat. The object is not to abolish these vital programs. It's to fix them."[139]

In a blog post, David Simon, the creator of The Wire, compared the NSA's programs, including PRISM, to a 1980s effort by the City of Baltimore to add dialed number recorders to all pay phones to know which individuals were being called by the callers;[140] the city believed that drug traffickers were using pay phones and pagers, and a municipal judge allowed the city to place the recorders. The placement of the dialers formed the basis of the show's first season. Simon argued that the media attention regarding the NSA programs is a "faux scandal."[140][141] Simon had stated that many classes of people in American society had already faced constant government surveillance.

Political theorist, and frequent critic of U.S. government policies, Noam Chomsky argued, "Governments should not have this capacity. But governments will use whatever technology is available to them to combat their primary enemy which is their own population."[142]

A CNN/Opinion Research Corporation poll conducted June 11 through 13 found that 66% of Americans generally supported the program.[143][144][Notes 1] However, a Quinnipiac University poll conducted June 28 through July 8 found that 45% of registered voters think the surveillance programs have gone too far, with 40% saying they do not go far enough, compared to 25% saying they had gone too far and 63% saying not far enough in 2010.[145] Other polls have shown similar shifts in public opinion as revelations about the programs were leaked.[146][147]

In terms of economic impact, a study released in August by the Information Technology and Innovation Foundation[148] found that the disclosure of PRISM could cost the U.S. economy between $21.5 and $35 billion in lost cloud computing business over three years.[149][150][151][152]

Sentiment around the world was that of general displeasure upon learning the extent of world communication data mining. Some national leaders spoke against the NSA and some spoke against their own national surveillance. One national minister had scathing comments on the National Security Agency's data-mining program, citing Benjamin Franklin: "The more a society monitors, controls, and observes its citizens, the less free it is."[153] Some question if the costs of hunting terrorists now overshadows the loss of citizen privacy.[154][155]

Excerpt from:
PRISM (surveillance program) - Wikipedia, the free encyclopedia

Posted in NSA | Comments Off on PRISM (surveillance program) – Wikipedia, the free encyclopedia

Ron Paul investment ad predicts currency crisis, civil unrest

Posted: at 6:41 pm

Ron Paul at the launch of Rand Pauls presidential campaign in Louisville last month. (Photo: Carolyn Kaster/AP)

While Kentucky Sen. Rand Paul continues his bid for the 2016 Republican presidential nomination, his father is starring in an ad that warns darkly that the United States is teetering on the brink of a devastating financial crisis whose effects can only be avoided by following his investment advice.

Hi, Ron Paul here, the former GOP congressman and two-time Republican presidential candidate says in the radio ad published by BuzzFeed. Today I have an urgent message for every American whos retired or thinking about retiring soon. You see, our own governments disastrous policies have now put you, me and everyone over the age of 50 at great risk. Sometime in the near future, were going to have yet another financial crisis. This one wont be solved with bailouts, and it will hit seniors the hardest.

The 79-year-old warns of a coming economic armageddon one not backed up by mainstream economic projections. According to a recent report from Moodys Analytics, the U.S. economy is expected to grow 3 percent for the year despite a slowdown due, in part, to an unseasonably bad winter. And the value of the U.S. dollar has increased almost 15 percent from last year.

I fear there will be civil unrest, a drop in stock prices, pension fund collapses, big changes to Social Security and Medicare, the erosion of personal liberties, bank and brokerage closings and ultimately a major crisis as the U.S. dollar is rejected for almost any nonpaper alternative, Paul continues.

Ron Pauls doomsday view could complicate his sons bid for the GOP nomination as Rand Paul looks to run a more mainstream campaign than did his father, who lost three separate bids for the presidency before leaving Congress and becoming a source of investment advice for apocalyptic thinkers.

This is the second most interesting father-son psychodrama in the presidential race, Washington Post political reporter Karen Tumulty told Yahoo News last month. On one hand, [Rand Paul] wants to draw distinctions [with Ron Paul], but on the other hand, tap into that energy his father was able to build.

The minute-long spots direct listeners to a website that includes a 54-minute infomercial-style video produced by Stansberry & Associates Investment Research, a conservative investment advice newsletter.

Dr. Ron Paul strongly believes when the next crisis hits, there will be no warning, and the government wont save you, a voice-over says. Go online to http://www.ronpaulwarning6.com, where youll learn simple steps you can take to protect your retirement.

In the video, billed as an exclusive interview with the 12-term former congressman, Paul says the pending crisis will be worse than our Great Depression.

In short, I believe that we as a nation are on the brink of a massive financial crisis infinitely worse than the crisis of 2008, he says. And thats because it wont be a banking and mortgage problem but a full-blown currency crisis the likes of which weve never experienced in this country. The savings of millions of people could be wiped out overnight. The stock market could crash by 50 percent or more. The way of life weve enjoyed as Americans for over 50 years could come to an end. Its not a question of if this will happen, but when.

The former Libertarian presidential candidate says that as a result of the inevitable currency crisis, the middle class gets wiped out, the way you work, live, retire in America everything is going to change.

But the real killer, Paul says, will be the effect of all this on our society and on our liberties.

Ron Paul also appears in a similar, Stansberry-produced video carrying the same message.

People wont have any clue what to do when theres a line around the block just to access the ATM, he says. I think well see problems in the big cities especially in fact, were already seeing the beginnings of that: Ferguson, the riots in New York and Detroit.

The informercial eventually offers viewers a $49.50 Stansberry hard-copy Survival Blueprint that includes, among other tips, the strategy that can save you and your neighborhood, how to quickly open a foreign bank account and the secret paper currency used by the worlds wealthiest people.

Read More

Those who try to leave the website are even prompted with a pop-up warning: Please: Dont wait until its too late.

Here is the original post:
Ron Paul investment ad predicts currency crisis, civil unrest

Posted in Ron Paul | Comments Off on Ron Paul investment ad predicts currency crisis, civil unrest

Can You Cheat Death With Cryonics? – YouTube

Posted: at 7:44 am

How the process of cryonics works,does it work and the problem scientists are currently having with the process.

**REMEMBER TO SUBSCRIBE FOR MUCH MORE TO COME**

FLLW THE VENDOR 101 Subscribe - https://www.youtube.com/c/TheVendor101 Google+ - https://plus.google.com/+TheVendor101 Twitter - https://twitter.com/thevendor101

The process of Cryonics, it's a technique used to store a persons body at an extremely low temperature with the hope of one day reviving them. You may of seen this method used in many sci fi films for example the demolition man, But, the science behind this process isn't just fictional, it actually does exist, and the technique is being performed today. However it is still in its very early infancy. The idea of being cryogenically suspended is that if you die from a disease or condition that is currently incurable, scientists freeze you. Then one day in the near or far future, when the technology has been created to revive your body and the cure for the disease or condition has been discovered, you will be brought back, cured and allowed to carry on your life, only in the future. So how does it work? Well first you would have to join a cryonics facility and pay an annual membership fee. Then, when you are confined legally dead, an emergency response team from the facility stabilises your body, supplying your brain with enough oxygen and blood to preserve minimal function until you can be transported to the suspension facility. You are then packed in ice and injected with an anticoagulant ready to be transported, once you are at the cryonics facilities the team remove the water from your cells and replace it with a type anti freeze called a cryoprotectant to prevent cells from freezing and shattering. Your body is then cooled on a bed of dry ice until it reaches -130 C and then you are inserted in to an individual container that is then placed into a large metal tank filled with liquid nitrogen at a temperature of around -196 degrees Celsius. This isn't a cheap process however, currently it costs more than 100,000 to have your whole body preserved. The kind of price that Walt Disney would of been able to pay all those years ago. However the fact that everybody thinks they know about the famous Mr Disney being preserved though cryogenics after deaf, is actually incorrect. It is only an urban legend, Walt was cremated in 1966 after he passed away. In actual fact, James Bedford became the 1st human to be cryogenically preserved on 12 January 1967. Currently there is around 150 people that have had their whole body stored in liquid nitrogen in the United States, while around 80 have had just their heads or brains preserved. So does it actually work? Will science ever bring back James Bedford? Well, currently none of companies offering cryogenic suspension have successfully revived anyone, and dont expect to be able to anytime soon. One of the biggest problems with this process seems to be that if the scientists do not warm the body at exactly the right speed and temperature, the cells could form ice crystals and shatter. However there are studies in to some frogs that have a natural antifreeze in there cells which can protect them if theyre frozen completely solid. This may one day be adapted to the human body, potentially solving this problem. Another method that may be available in the future, is nanotechnology. These tiny little bots may make it possible to repair or build human cells and tissue if it becomes damaged during the cryogenic process. This may sound like a Sci Fi story as seen in many films, but some scientists have predicted that the first cryonic revival might occur as early as the year 2045 and there are more than 1,000 living people who have instructed companies to preserve their bodies after their death, on the hope that these scientists one day, will bring them back.

Attributes - Frozen Head - Self_(2011)_by_Marc_Quinn Black and white film - Cryonic Society at Phoenix, Arizona, January 31, 1967 Universal Newsreel- Public domain film from the US National Archives Cryogenic Scene-Demolition Man Futuristic User Interface -Nawaz Alamgir Killer T cell attacking cancer-Cambridge University Music - Night Music - YouTube Audio Library

Read more:
Can You Cheat Death With Cryonics? - YouTube

Posted in Cryonics | Comments Off on Can You Cheat Death With Cryonics? – YouTube

Abel Danger: Airliner Atrocity Is Another Illuminati False Flag

Posted: at 7:41 am

Source: henrymakow.com

July 19, 2014

by Henry Makow Ph.D.

False flag: You commit an atrocity and blame your enemies. In this case, the Kiev-based junta shot down the plane and blamed the Donetsk separatists and their Russian backers. The reaction of the Western mass media is the "tell." Just as they blamed Osama bin Laden within a half-hour of the 9-11 false flag, the Illuminati Jewish mass media pins the blame on the Russian-backed separatists without any evidence whatever. Echoes of 9-11, they call this shootdown "an act of terror."

You have to ask, "who benefits" from such a crime? What possible benefit could the Russians or their allies derive from this atrocity?

The Ukrainians on the other hand are backed by the US-based Illuminati Jewish NeoCons who are anxious to increase tensions and provoke war with Russia. Their ultimate goal is to unseat Putin. This heinous crime must be seen in the context of the sinking of the Maine or the Lusitania as an attempted casus belli. Obama called it a "wakeup call for Europe." CNN "experts" say the Russians did it; militias don't have the skills. (No proof is necessary, just like Assad's "chemical attack" on his own people. This is what the Illuminati-Jewish-dominated West has descended to: Commit an atrocity and blame the "enemy," i.e. the nation that refuses to surrender.)

Here are articles which support the False Flag view:

Was Ukraine's Ministry of Interior Behind the Downing of Malaysian Airlines MH17?

The Ukrainians says the separatist militias do not have the Buk system. A report from an expat Spanish air traffic controller in Kiev said the plane was diverted over the conflicted area and taken down by order of the Nazi-run Ukrainian Interior Ministry which is in charge of pacifying the Eastern region. 'Smoking gun' intercepts in the MH17 shootdown The Ukrainian Secret Service released a reported phone conversation in which Russian separatists admit shooting down the plane by mistake. The Russians debunk this as a fraud. They say the conversation was concocted before the plane was hit. See also: "Busted: Tape Made Before Shootdown"

Malaysia Airlines Flight MH17 Downed Over Warzone Ukraine. Who Was Behind It? Cui Bono?

Russia and the fighters operating in eastern Ukraine have nothing to gain by downing a civilian airliner, but absolutely everything to lose thus pointing the finger in another direction that of NATO and their proxy regime in Kiev.

Malaysian Plane Crash: Lies and Sinister Political Agenda by the West

The Russian Defense Ministry has said that when a Malaysia Airlines plane was apparently shot down over Ukraine, a Ukrainian Buk anti-aircraft missile battery was operational in the region.

Kiev Refuses to Release Controller Instructions to MH17 Pilots A simple search at FlightAware reveals that MH17 was in fact diverted 200 kilometers north from the usual flight path taken by Malaysia Airlines in the previous days and plunged right in the middle of a war zone. Why? What sort of communication did MH17 receive from Kiev air control tower? Kiev has been mute about it. Yet the answer would be simple, had Kiev released the Air Traffic Control recording of the tower talking to Flight MH17; Malaysia did it after Flight MH370 disappeared forever. It won't happen; SBU security confiscated it. So much for getting an undoctored explanation on why MH17 was off its path, and what the pilots saw and said before the explosion. The Russian Defense Ministry, for its part, has confirmed that a Kiev-controlled Buk anti-aircraft missile battery was operational near MH17's crash. Kiev has deployed several batteries of Buk surface-to-air missile systems with at least 27 launchers; these are all perfectly capable of bringing down jets flying at 33,000 ft.

Russia Slams US for Implicating Rebels

On Saturday, Russian Deputy Foreign Minister Sergei Ryabkov said the US administration sought to pin the blame on separatists and Russia without waiting for the results of an investigation. "The statements of representatives of the US administration are evidence of a deep political aberration of Washington's perception of what is going on in Ukraine," he told Russian news agencies.

The cynicism is breath-taking.

The Royal United Services Institute (RUSI), in a statement titled "The Downing of Malaysia Airlines Flight MH17: Russia in the Dock," provides a self-incriminating indictment as to the motives Kiev and its NATO backers had in carrying out the attack on MH17 and subsequently framing Russia for it. RUSI's statement claims: A Game Change: Within days, however, the real debate will shift from one about producing the right evidence and culprits, to more about what can be saved from the rapidly-deteriorating relations between Russia and the West. The tragedy will stain Russia's relations with the world for years to come. Nations determined to keep on good terms with Russia such as China or Vietnam which relies on Russian weapon supplies and wishes these to continue will keep quiet. And there will always be some plausible deniability, giving other countries enough room for manoeuvre to avoid accusing Russia directly for this disaster. But the culprits for the crime will be pursued by international investigators and tribunals. And many Russian officials will be added to the 'wanted' lists of police forces around the world. The story will linger, and won't be pretty for Russian diplomats. Given the fact that the majority of the victims are European citizens, it is also getting increasingly difficult to see how France would be able to deliver the Mistral ships which Russia ordered for its navy, or how Britain could continue shielding Russia from financial sanctions. And, given the fact that scores of US citizens were also killed on the MH17 flight means that the US Congress will demand greater sanctions on Russia, making any improvement in relations with Washington highly unlikely.

Russia Asks Kiev to Answer Ten Simple Questions

6. Why did Ukrainian air traffic controllers allow the plane to deviate from the regular route to the north, towards "the anti-terrorist operation zone"?

Related:

Another Summary of Evidence by Nick Kollerstrom Points to Ukrainian Military Jets shooting Down MH-17

Russian Expert Says Damage Confirms MH-17 Shot Down by Ukrainian Military Jets _______

First Comment from James Perloff:

Just in case they don't get a war against Russia over MH17, perhaps the Western media should trot out the following tried-and-tested headlines this week as "breaking news":

**PUTIN USES CHEMICAL WEAPONS AGAINST HIS OWN PEOPLE! **PRO-RUSSIAN REBELS HAVE WMDs THAT ARE AN IMMEDIATE THREAT TO THE WEST! **PRO-RUSSIAN REBELS THROW UKRAINIAN BABIES OUT OF INCUBATORS! **RUSSIAN PT BOAT LAUNCHES TORPEDO AT U.S. DESTROYER IN PERSIAN GULF!

If one false flag doesn't suffice, why not use the shotgun approach?

http://henrymakow.com/2014/07/Airliner-Atrocity-is-Illuminati-False-Flag.html

Read the original post:
Abel Danger: Airliner Atrocity Is Another Illuminati False Flag

Posted in Illuminati | Comments Off on Abel Danger: Airliner Atrocity Is Another Illuminati False Flag

Atopic dermatitis (eczema) Treatments and drugs – Mayo Clinic

Posted: October 29, 2015 at 2:45 pm

Atopic dermatitis can be persistent. You may need to try various treatments over months or years to control it. And even if you respond to treatment, your signs and symptoms may return (flare).

It's important to recognize the condition early so you can start treatment. If regular moisturizing and other self-care steps don't help, your doctor may suggest the following treatments and drugs:

Light therapy. The simplest form of light therapy (phototherapy) involves exposing your skin to controlled amounts of natural sunlight. Other forms use artificial ultraviolet A (UVA) and narrow band UVB either alone or with medications.

Though effective, long-term light therapy has harmful effects, including premature skin aging and an increased risk of skin cancer. For these reasons, phototherapy is not used for infants and young children. Talk with your doctor about the pros and cons of light therapy in your situation.

Treatment for infantile eczema includes:

See your baby's doctor if these measures don't improve the rash or if the rash looks infected. Your baby may need a prescription medication to control the rash or to treat an infection. Your doctor may recommend an oral antihistamine to help lessen the itch and to cause drowsiness, which may be helpful for nighttime itching and discomfort.

.

Read the original here:
Atopic dermatitis (eczema) Treatments and drugs - Mayo Clinic

Posted in Eczema | Comments Off on Atopic dermatitis (eczema) Treatments and drugs – Mayo Clinic

Futurism and Art History

Posted: at 2:43 pm

An Italian poet named Emilio Filippo Tommaso (1876-1944) established Futurism in 1908. He envisioned a new society that would make a complete rupture with the present and the past even as the world underwent rapid changes in the new century. Tomasso imagined a perfect world, a utopia that included new art and literary forms. In essence, the new society would replace past social norms and offer something better for art and poetry. In his Futurist Manifesto in 1909, Tommaso elaborated more on the Futurist vision, including the Four Post-Modernizations.

Umberto Boccioni (1882-1916) created and embodied the Futurism painting form with his paintings The City Rises (1910) and States of Mind (1911-1912). The latter features red, blue, and white as the dominant colors and includes humans in motion and futuristic buildings under construction at the top of the canvas. The elements of Futurism are embedded in the complex composition. Many colors break up and come together to portray a man shown from behind. He looks like can pull the observer into the future. Boccioni also sculpted a bronze cast in 1913 called Unique Forms of Continuity in Space, which now resides in the Museum of Modern Art. This human figure also embodies motion, a central concept of Futurism.

The Dada artist and writer, Marcel Duchamp, was the brilliant organizer of the Dadaists and the author of the Dada Manifesto. He had a brilliant older brother whose sculptures exhibit the impact of Futurism. Raymond Duchamp-Villon (1876-1918) created the magnificent bronze sculpture which was both mechanical and unique. He chose the simple name The Horse (1914), understating the complexity of this three-dimensional form as a complex representation of how humanity is propelling itself into an uncertain future.

It is hard to believe sometimes that the Dadaists and the Futurists, including the Duchamp brothers were creating such revolutionary work only a couple years after Braque and Picasso introduced Cubism to the Paris art world in the midst of the First World War. Joseph Stella also reverberated the Futurist sense of rhythm and motion in his painting, Battle of Lights, Coney Island painting (1914). Some historians even argue that Futurism even impacted Picassos Synthetic Cubism.

Architecture gave a vision to the idea of a futuristic city. Le Corbusier and Frank Lloyd Wright built models of their visions for a futuristic metropolis. However, these elaborate plans were never built. Wrights plan is reminiscent of the city of the future one sees when riding the Mass Transit Authority through Walt Disney Worlds Space Mountain.

See the article here:
Futurism and Art History

Posted in Futurism | Comments Off on Futurism and Art History

Futurism – RationalWiki

Posted: at 2:43 pm

Events, by definition, are occurrences that interrupt routine processes and routine procedures; only in a world in which nothing of importance ever happens could the futurologists dream come true.

Futurism, or futurology, is the study, or hypothetical study, of what might become of the human race and our relationship with technology and our environment. It is quite often difficult to discern between the realistic, the science woo, and the science fictional elements of the works of futurists.

The first use of the term "futurism" appeared during the early 19th century in reference to a specific brand of Christian eschatology that teaches that many parts of the Bible, especially the Book of Revelation, will take place in the future.[1] Obviously, futurism still holds some influence in modern Christianity considering all the cranks still banging on about the end times.

The term "futurist" was not explicitly used in reference to a number of 19th century science fiction writers such as Jules Verne and H.G. Wells, though modern futurists claim to draw inspiration from them.[2]

The original futurist movement was born in early 20th century Italy which was known for exalting art, technology, and violence. One of the key documents of the early futurist movement was The Futurist Manifesto, published in 1909 by Filippo Tommaso Marinetti.[3] This positioned Marinetti as the leader of the Italian futurist movement and eventually the head of the Futurist Political Party formed in 1918. Many of the futurists were also Italian nationalists and became fascist ideologues and supporters of Benito Mussolini.[4]

One of the many strains of futurist music (see the next couple sections) came out of the Italian movement. Musician Balilla Pratella wrote an article Manifesto of Futurist Musicians[5] in 1910. In it, he addresses young musicians (because "only they can understand what I have to say"), encouraging them to ditch commercialism, academia, closed competitions, critics, sacred music, librettist/composer partnerships, vocal centrism, and quite a few other things he believes are holding back musical innovation. Typical of the movement, Pratella adopts a vitriolic tone, never taking a moment's breath to stop painting the "traditionalists" as mortal enemies of music.

Pratella was forgotten over time and 20th-century classical music lived on.

Modern futurism came to be characterized by a more scientific (or scientistic, as some might say) bent while still retaining its artistic elements. Ossip K. Flechtheim called for a field of "futurology" beginning in the 1940s in an attempt to "scientifically" predict the future based on history.[6]Future Shock, by Alvin Toffler is known for being one of the most influential popularizations of futurism. Nowadays the field is rife with anyone who can get the media to call them futurists.

Futurist themes were embraced by a number of African-American artists, especially musicians, in the mid-20th century. This style eventually came to be known as "Afro-futurism." Sun Ra, a jazz pianist and bandleader, is known as the progenitor of this style.[7]. A number of other musicians have become associated with Afro-futurism, including Parliament-Funkadelic, Model 500 and DJ Spooky.

The current incarnation of futurism is known as transhumanism, a somewhat loosely knit movement that has gained a few wealthy financial benefactors in Silicon Valley. Many transhumanists are "Singularitarians" who posit a coming "technological singularity" in which an artificial intelligence is built that exceeds human intelligence and initiates an explosion of technological advancement. Transhumanists are also proponents of pseudoscientific, dubious, or otherwise problematic technology, such as cryonics and mind uploading. Ray Kurzweil is probably the most famous transhumanist around today.

The movement that came to be known as "cyborg feminism" or "cyberfeminism" takes its inspiration from Donna Haraway's 1985 essay "A Cyborg Manifesto." Haraway rebutted the idea that science and technology are inherently patriarchal or capitalistic. Cyberfeminism tends to concentrate on the intersection of gender roles and technology.[8] Another movement with some overlap with cyberfeminism is "postgenderism," which advocates for technological advances in service of erasing gender (and sexual dimorphism too).[9] Both of these movements also have some overlap with transhumanism.

There was a strain of '80s electronic synthesizer pop of this name, which they got from the Italian ones. It went "ZOMG MACHINES EXIST" in a new wave sort of manner with silly haircuts and eyeliner. Examples include Visage and Depeche Mode. In the early 2000s, industrial bands VNV Nation and Apoptygma Berzerk invented the name "futurepop" for their version of this.[10] Even more confusingly is a resurgence in 80s-sounding synth-music thanks to films like Drive and videogames like Hotline Miami with a number of names, like "Synthwave" or "Retro-Synth."[11] So "future" means "retro," except...

It's basically an aesthetic used in art and design built on all those failed futurist predictions leading to styles such as "steam punk" or "diesel punk."

See original here:
Futurism - RationalWiki

Posted in Futurism | Comments Off on Futurism – RationalWiki

What is Cryonics? – How Cryonics Works

Posted: at 1:44 pm

Cryonics is the practice of preserving human bodies in extremely cold temperatures with the hope of reviving them sometime in the future. The idea is that, if someone has "died" from a disease that is incurable today, he or she can be "frozen" and then revived in the future when a cure has been discovered. A person preserved this way is said to be in cryonic suspension.

To understand the technology behind cryonics, think about the news stories you've heard of people who have fallen into an icy lake and have been submerged for up to an hour in the frigid water before being rescued. The ones who survived did so because the icy water put their body into a sort of suspended animation, slowing down their metabolism and brain function to the point where they needed almost no oxygen.

Cryonics is a bit different from being resuscitated after falling into an icy lake, though. First of all, it's illegal to perform cryonic suspension on someone who is still alive. People who undergo this procedure must first be pronounced legally dead -- that is, their heart must have stopped beating. But if they're dead, how can they ever be revived? According to scientists who perform cryonics, "legally dead" is not the same as "totally dead." Total death, they say, is the point at which all brain function ceases. Legal death occurs when the heart has stopped beating, but some cellular brain function remains. Cryonics preserves the little cell function that remains so that, theoretically, the person can be resuscitated in the future.

Continued here:
What is Cryonics? - How Cryonics Works

Posted in Cryonics | Comments Off on What is Cryonics? – How Cryonics Works

Top Ten Secret Societies | Illuminati Rex

Posted: at 1:41 pm

Annual meeting of around 130 North-Atlantic elites from the fields of energy, finance, government, intelligence, academia and the media.

Official site: http://www.bilderbergmeetings.org

Famous Attendees: David Rockefeller, Henry Kissinger, Bill Clinton, Gordon Brown, Angela Merkel, Alan Greenspan, Ben Bernanke, Larry Summers, George Soros, Donald Rumsfeld, Robert Murdoch, Jean-Claude Trichet (EU Bank President), Mervyn King (Bank of England), Edmond de Rothschild, Robert Oppenheimer, Robert McNamara, Henry Ford II

List of Bilderberg participants (wiki) 2012 list of US participants on They Rule Infographic showing how members of the Bilderberg are connected to absolutely everything.

With 65 to 70 regular members, the Bilderberg Group is the most exclusive group on this list. The group came to be identified with the Bilderberg Hotel in Holland where the group first met in 1954. The ultra secret group was founded by Denis Healey, Joseph Retinger, David Rockefeller and Prince Bernhard of the Netherlands (of the infamous Lockheed scandal in which he took kickbacks selling exploding planes).

From the get-go the Bilderbergers sought to develop a strategy and create European consensus for a European Common Market. They were behind the Amsterdam Treaty, the Treaty of Maastricht, the Treaty of Rome, and finally the European Constitution. Leaked 1955 transcripts revealed that Bilderbergers had discussed the creation of a United European with its own currency. They are also working on merging Canada, United states and Mexico into a North American Union. The Bilderberg discussed improving business relations and extending IMF loans to China before Nixons famous 1972 visit. At the Bilderberg meeting of 1991, David Rockefeller told then Arkansas Governor Bill Clinton to support NAFTA.

The groups major source of funds is the Rockefeller and Ford Foundations. The members are cherry picked most prominent members of other influential organization and national think tanks such as the Brookings, Carnegie Endowment, and Council of Foreign Relations. Much of the leadership of the Bilderberg is also groomed within these foundations. All these organization have similar ideologies. Henri de Castries of the French House of Castries currently heads the Bilderberg.

The High Priests of Globalization at the first Bilderberg Group Meeting in Oosterbeek, Netherlands

The annual meetings are held in a different country each year and is attended by around 130 elites with about 65 regulars. Forty percent of Bilderbergers are Americans. Each international region is roughly represented by one member from the finance sector, one from the government sector, and one from academia. The Group is separated into 6 panels with around 20 people in each panel. There are 3 main speakers per panel and everyone is obligated to comment.

As a whole the membership manages the planets resources and their membership is especially concentrated in the energy and banking sectors. Their goals are a one world constitution, a one world government, a one army and they work tirelessly towards that goal. The typical globalist agenda.

Potential candidate are observed a for a few meetings before being asked to join. Bilderberg researchers often point out that according to the Logan Act, it is illegal for any American government official to be present at the Bilderberg meetings.

Researcher and author of True Story Of Bilderberg Daniel Estulin has investigated the Bilderberg Group for 15 years. He stresses that the Bilderberg is not a Judeo-Masonic conspiracy. His book is the book on the Bilderberg. Strangely, Estulin claims that Bilderberg Steering Committee member and founder of Canadas largest book chain Heather Reisman has banned True Story Of Bilderberg from her stores. However, that doesnt appear to be the case.

Jim Tucker has dedicated his entire life to chasing the Bilderbergers around the world after learning of the Groups existing in the 70s. Tucker has an informer inside the group who has consistently leaked him list of participants and talking points for years.

Secret Bavarian secret society active at the end of the 18th century and modern blanket term for the crme de la elite crme.

The Bavarian Illuminati was founded by Adam Weishaupt on May 1, 1776. The Illuminati is a secret society within secret societies. In 1784, the order was banned by the Bavarian government. Today, the term Illuminati is usually used as a blanket term for the inner circle of the elite.

The Illuminati was separated into three classes; 1. The Nursery Class; 2. The Masonic Class; 3. The Mystery Class. Each class was separated into degrees. Lower classes were unaware of the existence of higher classes. Non Illuminati were called the Profane.

I. Nursery Class: 1. Illuminati Novice (1-2 year trial period) 2. Illuminati Minerval 3. Illuminati Minor

II. Masonic Class: Symbolic Masonry 1. Entered Apprentice 2. Fellow Craft 3. Master Mason

Scottish Masonry 1. Illuminati Major (Scot Novice) 2. Illuminati Dirigens (Scot Knight)

III. Mystery Class: Lesser Mysteries 1. Illuminati Priest 2. Illuminati Prince (Regent)

Greater Mysteries 1. Illuminati Magus 2. Illuminati Rex

I am currently exposing the secrets of the Bavarian Illuminati in comic format and Terry Melanson has written a detailed non-fiction book about Adam Weishaupts Order of the Illuminati.

Exactly what the illuminati is varies a great deal from one conspiracy theorist to the next. Different versions of it continues to appear in computer games, music, television and movies. Illuminati Researcher Mark Dices book Illuminati: Facts & Fiction does a great job at weeding through the various modern Illuminati incarnations and separating the wheat from the chaff. It has saved me hours of work in establishing the root of various Illuminati theories and rumors. (although he considers the Bavarian Illuminati to be Luciferian, which is something I should ask him about) Nevertheless, Dice book is essential.

Some researchers believe the Illuminati originated before and that Adam Weishaupt simply reincarnated a much older society. The 13 Bloodlines of the Illuminati is a popular theory about ancient families secretly ruling the United States.

Others believe that the modern elite and the current proponents of the New World Order grew out of Weishaupts movement. However, we have access to most of the original writings of the Illuminati and we know that the abolishment of private property was one of the goals of the Order. This is hardly in line with the modern capitalist plutocrats who make up todays Illuminati. Todays Illuminati is anything but enlightened.

Elite senior fraternity at Yale University

Famous Bonesmen: William H. Taft (Us President), George H.W. Bush (Us President, CIA), George W. Bush (US President) Averell Harriman, H.J. Heinz II, Henry Luce (Time-Life,CIA), Bill Bundy (CIA) and William F. Buckley. (CIA)

AKA Chapter 322, is a secret society at Yale University established by William Russell and Alphonso Taft in 1832. Each year 15 juniors are selected to join the Skulls in their senior year.

The Tomb, Yale

Investment banking firm Brown Brothers Harriman pays the tax bill. No one lives inside the Tomb. At the mention of the words Skull and Bones, they must leave the room. Meetings are on Thursdays and they always have dinner on Sundays. In the 2004 US Election, two Bonesmen, John Kerry and George W. Bush went head-to-head for the Presidency of the United States.

Skull and Bones, do you accept?

If the neophyte accepts, he is given a rolled up message tied with a black ribbon and sealed with the skulls emblem imprinted into black wax. The message instructs the neophyte of the time of place of his initiation. He is also instructed not to bring any metal. (Note that Masons are also divested of all metals during their initiation ceremonies.) Once they accept, they are members for life.

Skull and Bones owns Deer Island in St-Lawrence river

The clock is 5 minutes faster, which represents Skull and Bones which is to differentiate time spend inside the tomb from the outside, which is referred to as Barbarian time.

In 1876 a group of students calling themselves File and Claw broke into the Tomb and discovered that the Order was founded in 1832 (32) as the second chapter (+2) of a German secret society. They discovered a painting of a skull surrounded by Masonic symbols in Room 322 and released floor plans of the Tomb. The Skull themselves claim that 322 represents 322 bce, the year Demosthenes died. In keeping with this legend, their calendar begins 322 years before the Roman calendar. The year 2013 would be 2335 Anno Demostheni in Bonespeak.

They reportedly have the bones of Geronimo and Pancho Villa hidden in 322. Room 322 is the inner temple of the Skull and Bones. It features an encased skeleton which the Bonesmen called Madame Pompadour. There are other compartments in the case including manuscripts, secrecy oaths and initiation rituals.

HW Bush, Bonesman, 1948

Author of Fleshing out the Skull and Bones Kris Milliken, claims that the core group of Skull and Bones is still very much involved in the dope trade. They are Sorcerers of Death performing black magic. Taft Russells family fortune came from opium and according to Eustace Mullins, the fraternity continued to be involved in the dope trade all the way up to the Vietnam war.

3000 elites from academia, government, media, intelligence, military, banking and top corporations.

Official site: http://www.cfr.org

Famous Members: David Rockefeller, Henry Kissinger, Bill Clinton, Conrad Black, William F. Buckley, Bill Bundy, Allen Dulles, Gerald Ford, Herbert Hoover, Angelina, Jolie George Kennan, Carl Sagan, Paul Warburg, Oprah Winfrey, George Soros, Colin Powell, Bill Moyers, Rupert Murdoch, Zbigniew Brzezinski and Edgar Bronfman, Sr.

List of Council on Foreign Relations Members (wiki) Membership map on They Rule

The Council on Foreign Relations grew out of the round table groups and began as a gathering of scholars known as the Inquiry which included the power behind FDRs throne and author of Philip Dru: Administrator, Colonel House and Walter Lippmann.

This group attended the Paris Peace Conference where powerful members of the elite attended a private gathering at the Majestic Hotel. Round Table member Lionel Curtis suggested the creation a Royal Institute for International Affair in London and the Council of Foreign Relations, its US counterpart in New York. The CFR was officially founded in 1921.

Council on Foreign Relations HQ at 58 East 68th Street and Park Avenue

It is one of the most powerful private organizations and has a major influence on U.S. foreign policy. Its equally powerful British sister organization, the Royal Institute of International Affairs has been renamed Chatham House. Today the CFR has over 3000 members.

The group suggested the formation of a League of Nation. Five of the 6 men of the Agenda Group which drafted the United States proposal for a United Nations were members of the CFR. Carol Quigley called its members the international financial coterie The CFR was instrumental in planning the post World War 2 economic and political world order.

About the round table groups: De Beers Cecil Rhodes and journalist William T. Stead organized a secret society with an executive committee known as the Circle of Initiate. The secret society had an outer circle known as the Association of Helpers which eventually evolved into the Round Table Groups.

Sources and further information: Memoirs (Amazon) David Rockefeller, 2003

David Rockefellers elite think tank of over 300 private citizens from Europe, Asia, and North America.

Official site: http://www.trilateral.org

Famous Members: David Rockefeller, George HW Bush, Bill Clinton, Zbigniew Brzezinski, Jean-Claude Trichet, Henry Kissinger and Jimmy Carter.

List of List of Trilateral Commission Members (tilateral.org .PDF) Membership map on They Rule.

David Rockefeller had been looking for a way to include Japan into international cooperation discussion. At the Belgium Bilderberg conference of 1972, Rockefeller discussed the idea with Columbia University Russian Studies professor Zbigniew Brzezinski (Zbig) who had himself previously approached the Bilderberg Steering Committee. The Steering Committee had been unreceptive to the idea.

The think tank had its first executive committee meeting in Tokyo in October 1973. The Trilateral Commission receive funds mostly from the Rockefeller Brothers Fund and is deeply rooted in the CFR. The commission helps governments around the world reach constructive accords with other governments. They promote closer cooperation between Europe, Asia, and North America. In 1974 they published The Crisis of Democracy calling for democracy in moderation.

Ancient secret society sworn to protect the holy bloodline of Jesus Christ and Mary Magdalene

Famous Grandmasters: Jean de Gisors (11881220), Nicolas Flamel (13981418), Ren dAnjou (14181480), Lonard de Vinci (15101519), Isaac Newton (16911727), Charles de Lorraine (17461780), Maximilian de Lorraine (17801801), Victor Hugo (18441885), Claude Debussy (18851918),Jean Cocteau (19181963)

Certainly one of the most intriguing of all secret societies, unfortunately, it isnt real. The Priory of Sion legend is completely made up! (almost)

He also included Rennes-le-Chteau restaurant owner Nol Corbus (another admitted hoaxer) legend of Father Franois Brenger Saunire about discovering parts of the Knights Templarss lost treasure. It all made for a great story.

The strange events of the Priory of Sion and Rennes-le-Chteau were finally epitomized on the big screen in 2006 Da Vinci Code starring Tom Hanks.

Note to Mr. Langdon: Vinegar freezes at just under 0C (32F ). Next time you encounter an impossible-to-open-without-the-combination-type Cryptex, consider sticking the thing in the freezer for a few hours.

Researchers Lynn Pickett and Clive Prince have found evidence for the existence of a Priory of Sion within the Masonic Strict Observance Rites of Germany. Their goal was to form a United states of Europe.

Male elites meet every July for a 2 week encampment at private campground.

Famous Attendees: Henry Kissinger, David Rockefeller, Ronald Reagan, GW Bush, Gerald Ford, Richard Nixon, Malcolm Forbes, William F. Buckley, Clint Eastwood, and William Randolph Hearst. Camp Membership

Founded in 1872, the Bohemian Grove is a 2700-acre campground in the midst of ancient Redwood trees located in Sonoma County, California. Every July, elites participate in a 2 week encampment to make ritual sacrifices to the sinister owl-god Moloch. Power brokers assemble at The Owl Shrine for informal Lakeside Talks. Nixon canceled his scheduled Lakeside Talk in 1971 because the media was insisting on covering it.

Thanks to the work of Alex Jones, Chris Jones and Phillip Weiss who have each individually infiltrated the Grove, the outside world has been able to assemble a lot of information on what happens there. Alex Jones footage can be seen in Dark Secrets: Inside Bohemian Grove (Youtube, 2:02:56) and Chris Joness (who worked undercover at the Grove) can be seen in Alex Jones The order of Death, which was released 5 years later to commemorate Alex Jones infiltration of the Grove. (Youtube, 44:46)

President Ronald Reagan and Richard Nixon, 1967

Weiss stayed as a guess at Bohemian Grove for 7 days in 1989. Weiss heard Walter Cronkite himself as the voice of the infamous owl. He even shook Ronald Reagans hand who confirmed that it was indeed at the Grove in 67 that he had assured Nixon that he would not challenge him in the upcoming Republican nomination. (so much for non-weaving. spiders) He also witnessed a Grover engaging in unBohemian behavior when Henry Kissinger rudely cut in line at the phone banks.

The Founding Founders, Freemasonry and the capital of the United States

Mostly harmless today, the freemasons held immense power in the 18th and 19th century. The earliest historical document mentioning the Old Charges of Freemasonry is the Regius Poem and dates to around 1425. The Grand Lodge of England formed in 1717. Masonic expressions that have become common idioms include: On the square, On the level, giving/getting the third degree and blackballing.

Blue Lodge and 2 major appendant bodies

Due to multiple bans on Freemasonry by Popes, a good catholic is still expected join the Knights of Columbus, as President Kennedy did, the Vaticans answer to Freemasonry. The Vatican is yet to reverse its stance on Freemasonry.

Freemasonry is composed of three levels, referred to as the Blue Lodge degrees:

1. Entered Apprentice 2. Fellow craft 3. Master Mason

Non-masons are called Cowans. There are multiple other degrees that a mason can obtain once he has become a Master Mason (Third degree) which masons call Appendant degrees. The most popular ones are the Scottish Rite of Freemasonry, with 33 degrees and the York Rite .

In addition there are Masonic Lodges not recognized by the Grand Loge of England, and as a result, by the majority of regular Masonic lodges. For example, the Rite of Memphis-Misraim has 99 degrees and the Grand Orient de France accepts women.

A group of Three Hundred ruling individual descendant from the Black Nobility

Famous Members: British royals, Dutch royals, House of Hapsburg (?),Lord Halifax, Winston Churchill, Cecil Rhodes, George Bush, Aldous Huxley, Henry Kissinger, David Rockefeller, Giuseppe Mazzini and H.G. Wells

The existence of the Committee of 300 is wholly dependent on the word of Dr John Coleman, author of Conspirators Hierarchy The Story of The Committee of 300.

Joseph Pavlonksy John Clarke Doctor Coleman tells us that he gazed upon a mention of the supranational Committee of 300 or the Olympians while stationed with MI6 in Angola. He then decided to dedicate the rest of his life to exposing the group. His status as a MI6 whistleblower and the origin of his doctorate are never discussed in interviews. (leading Eustace Mullins to question his motives.)

Coleman uses the core of conspiracy theory literature and adds his own secret group which allegedly controls all the other ones. (Popular author David Icke added shape-shifting Reptilians to conspiracy lore and became an international bestseller) All the usual players are there. The Bilderberg Group, the Royal Institute of International Affairs, the Club of Rome, the Trilateral Commission and the Council on Foreign Relations all make an appearance and serve as the executive arms of the Committee of 300. In Colemans scenario, the RIIA is above all the others and chooses the American Secretary of State and through him/her give the US President his marching orders. Prime Minister Disraeli had MI6 snuff out Abraham Lincoln and later, William Stevenson of Mi6 ordered the hit on JFK.

He also throws in popular nuggets such as the Black Nobility, (the group varies a great deal in conspiracy lore from the historical Black Nobility) who according to Coleman, made the Borgias look like Sunday school teachers. (The mysterious nobles are always a crowd pleaser.) According to Dr. Colemans decade long studies at the Cairo Museum (?), no member of the families of the Black Nobility or their servants has ever died from the Black Plague. He discovered that they drank a secret herbal compound and exposed themselves to low-frequency radiation making them immune to the disease.

The Queen of England is the head of the Committee of 300. The 300 families all rule with equal shares! (highly doubtful) The Queen is actually from the Black Nobility family of the House of Guelph. (Rex note: It is true that they change their name from Saxe-Coburg-Gotha to Windsor)

The Committee of 300 were behind Beatlemania and used the Beatles to induce young Americans towards drugs and Rock n Roll. They even came up with the word teenager (or not)

New words and new phrases prepared by Tavistock were introduced to America along with the Beatles. Words such as rock in relation to music sounds, teenager, cool, discovered and pop music were a lexicon of disguised code words signifying the acceptance of drugs and arrived with and accompanied the Beatles wherever they went, to be discovered by teenagers. Incidentally, the word teenagers was never used until just before the Beatles arrived on the scene, courtesy of the Tavistock Institute for Human Relations.

Colemans own deep hatred seeps into his work:

I hate to use these beautiful words in the context of Beatlemania; it reminds me of how wrongly the word lover is used when referring to the filthy interaction between two homosexuals writhing in pigswill. To call rock music, is an insult, likewise the language used in rock lyrics.

Is there any collaboration for Colemans Committee of 300 claims?

No.

Coleman claims to have heard Gorbachev referred to the Committee of 300 on CNN but no one has been able to confirm it and the clip has disappeared from the CNN archives. Proponents of the group often point to German industrialist Walter Rathenaus quote, but there is no indication that Rathenau was referring to an actual group rather than a number.

Three hundred men, all of whom know one another, direct the economic destiny of Europe and choose their successors from among themselves. Geschftlicher Nachwuchs, Neue freie Presse, Walter Rathenau, 1909

Original post:
Top Ten Secret Societies | Illuminati Rex

Posted in Illuminati | Comments Off on Top Ten Secret Societies | Illuminati Rex