Mind Control Technology. Ultra Science Ins and Outs.

Whilst Mind Control may sound like Science Fiction… a recent FOI request beams a different approach. Documents reveal a deep and lasting series of Research Experiments designed to transmit… their thoughts… into your Mind. Controlled… or not… these of Our World Legends of a strange Science… are herein. The docs… the vids… Intel and more. gifcredit/thanks:thefreethoughtproject/giphy

 

Hypnotism and it’s related mechanisms and Tech…

…have been updated.

Our World Legends updated as well it seems.

 

A recent FOI Request provided documents which detail the strange Science of…

Mind Control Technology.

Ultra Science Ins and Outs…

… are covered by Guest Blogger Aaron Kesel;..

…with a repost from activistpost.com. Thanks.

 

 

Accidental FOIA Reveals Mind Control Documents;

Here’s Further Evidence This Technology Exists:

 

photocredit/thanks:twitter

 

By Aaron Kesel

Journalist Curtis Waltman filed a Freedom of Information Act request with the Washington State Fusion Center (which is partnered with Department of Homeland Security) to obtain information about Antifa and white supremacist groups; instead of getting information on how the agency targets the groups, he got way more than the information he was looking for – Curtis was accidentally sent a mysterious file with the label “EM effects on human body.zip.”

The file included methods of “remote mind control,” MuckRockreported.

 

photocredit/thanks:raven1net

 

According to MuckRock, the mind control documents came from the Department of Homeland Security-linked agency in the form of a file called “EM effects on human body.zip.”

The file reportedly contained various diagrams detailing the horrors of “psycho-electronic weapon effects.”

 

photocredit/thanks:supratiksaha/raven1net

 

One document lists the various forms of torment made possible by using “remote mind control” methods, from “forced memory blanking” and “sudden violent itching inside eyelids” to “wild flailing” followed by “rigor mortis” and a remotely induced “forced orgasm.”

It was not immediately clear how the documents wound up in the agency’s response to a standard FOIA request, but there was reportedly no indication the “remote mind control” files stemmed from any government program.

 

photocredit/thanks:supratiksaha

 

 

According to Popular Mechanics, the documents are not official documents but are rather documents captured by the Fusion Center.

The federal government has absolutely experimented with mind control in a variety of methods, but the documents here do not appear to be official.

Waltman had no idea why these documents were included in his request and isn’t sure why the government is holding them. The WSFC did not respond to requests for more information.

The documents themselves are quite bizarre and, honestly, despite reports dismissing them, it is worth remembering that this is exactly what the CIA was working on for years during MKULTRA.

That program was supposed to have been shut down after the Church Hearings and other congressional hearings exposed all of the CIA’s clandestine activities at the time many that violated human rights including experimentation on patients and the American population without their knowledge.

Last year, it was revealed that mainstream science had caught up with the black project world (CIA) and had successfully weakened or strengthened particular memories from the brain or outright deleted inherited memories from mice, Activist Postreported.

There was a series of CIA mind control programs including BLUEBIRD, ARTICHOKE, MKULTRA, MKSEARCH and MKNAOMI during the ’50s to ’90s. The CIA sought to blank-slate test subjects wiping memories through drugs, electric shock, high-pitched sound and other torture techniques.

The Project Bluebird/Artichoke document below was kept hidden and under wraps and distracted from other subprojects in MKULTRA through Operation Dormouse for a reason; just read the documents it’s literally the CIA suggesting to create mind-controlled slaves that can covertly commit murder in the 1950s-’60s.

 

photocredit/thanks:pinterest

 

Although, many suspect that this project involved the South American plant derivative, scopolamine, a dangerous substance known as the “zombie drug.” Documents released only a few weeks ago in the JFK files suggest that the CIA was using electromagnetic weaponry to accomplish this goal.

How?

Well, it started out with using electrodes on a subject’s brain, and I suspect it evolved into tapping into the brain’s own natural frequency over time as the Army documents details on Voice To Skull technology decades later.

 

photocredit/thanks:thefreethoughtproject

 

In the mid-1950s, neurophysiologist Carl Wilhelm Sem-Jacobsen built his own EEG lab at Gaustad psychiatric hospital in Norway with copious funding from the Rockefeller, Ford, and other “charitable” foundations.  He soon took on multiple U.S. government contracts from the Air Force, Navy, and NASA for research using electrodes implanted in the brains of psych patients to carry out what many have said was unethical research.

These experiments melded over time and were continued under the auspices of a Project MKUltra branch and evolved to what was known as Project Artichoke.

Our government performed various unethical experiments on thousands of Americans for decades on the record exposed by the Church Committee. But before MKULTRA in 1947 the Navy and OSI conducted the first known post-war mind control program, Project Chatter, which continued the drug experiments of the Nazis.

Project Chatter was a highly classified Navy program to search for a truth drug that would get its victim to speak fast. They tested all types of drugs including barbiturates, amphetamines, and heroin. The studies involved “mind control” experiments by hypnosis and narco-hypnosis.

In 1953, Project Chatter was abandoned by the Navy for other projects like the Navy’s project “Perfect Concussion” which was Subproject 54 under MKULTRA. Scientists focused on testing ultrasound signals to create amnesia. In the documents, the Navy sought to create “Sub-aural frequency blasts” which means “below the ear.” Sub-aural frequency would indicate the potential usage of infrasound i.e. sonar.

Around the same time of Project Chatter, another compartmentalized group was running Project Moonstruck which sought to use electronic implants in brain and teeth for tracking, mind and behavior control, conditioning, programming, covert operations through Electronic Stimulation of the Brain, E.S.B. (Auspiciously the documents for Moonstruck are missing, only mere references can be found on sites archiving our history.)

The Army eventually founded Operations Third Chance and Derby Hat which both used LSD; other project names remain unknown though the existence of these programs is unquestionable.

The goals of MKULTRA were to break down human beings both physically and mentally, and modify and control their behavior as well as test chemicals on people for research purposes. These means included but were not limited to, hypnosis, chemical, biological and radioactive exposure.

President Bill Clinton was forced to apologize after parts of these programs were revealed to have been continuing after the Church Committee Hearings and they were caught running experiments on Africans under the Tuskegee experiment.

Dr. Ewen Cameron was partially backed by the CIA during project MKULTRA and used electrodes to zap the memories from his unwitting patients’ brains during the 1950s. This method of torture was called “psychic driving.”

After horrendous electric shocks, drugs were given to the test subjects to put them into days of prolonged delirious sleep. Cameron would then subject them to audio tapes he made in which he repeated certain phrases thousands of times with the hope of producing new personalities within them.

A 2012 lawsuit filed by veterans’ groups, against the CIA and the DOD, refers to Cameron’s methods. The suit also states that two researchers, Dr. Louis West and Dr. Jose Delgado, working together under the early CIA MKULTRA subproject 95, utilized two protocols: brain implants (“stimoceivers”) and RHIC-EDOM (Radio Hypnotic Intracerebral Control-Electronic Dissolution of Memory) to program the minds of victims.

Translation: they sought to bury memories, and implant false memories that never happened.

The CIA ultimately found that stress and sleep deprivation can make people more susceptible to false memories as have other researchers.

Although, the new documents are presumed to not be government documents, there are other documents released in 2006 from the U.S. Army Intelligence and Security Command entitled, “Bioeffects of Selected Nonlethal Weapons.”

The document is dated in 1998, over 15 years ago. One of the main topics regards the effects of “radio frequency directed energy.” The document discusses the “incapacitating effect” of “microwave hearing,” exactly like the new document describes.

There is no sound propagated through the air like normal  sound. This technology in its crudest form could be used to distract  individuals; if refined, it could also be used to communicate with  hostages or hostage takers directly by Morse code or other message  systems, possibly even by voice communication.

From that document, the technology is able to be tuned into a single person like a radio station.

The phenomenon is tunable in that the characteristic sounds and  intensities of those sounds depend on the characteristics of the RF  energy as delivered. Because the frequency of the sound heard is  dependent on the pulse characteristics of the RF energy, it  seems possible that this technology could be developed to the point  where words could be transmitted to be heard like the spoken word,  except that it could only be heard within a person’s head. In one experiment, communication of the words from one to ten using ‘speech modulated’ microwave energy was successfully demonstrated. Microphones next to the person experiencing the voice could not pick up the sound. Additional development of this would open up a wide range of possibilities.

Further, the paper discusses using this technology to disrupt neural control, which “activates specific forms of behavior such as sexual, aggressive, ingestive activities.”

Besides implanting memories, the military later attempted to create what it deemed Voice To Skull technology.

Voice To Skull is described in the patent as a “hearing system” where “Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to  10,000 megahertz that are modulated with a particular waveform.”

Similar psychotronic technology to Voice To Skull that wasn’t directly beaming frequencies into people but rather using radio stations to broadcast a signal outside of the human hearing range was used by the Pentagon, known as Silent Sound Spread Spectrum (SSSS) or S-quad. U.S. Psychological Operations officers tested this technology on Iraqi troops in Kuwait during Operation Desert Storm in 1991.

A news briefing detailed how American troops would take over the Iraqis’ FM stations and broadcast a silent signal underneath the audible programming:

The clandestine station programming consisted of  patriotic and religious music and intentionally vague, confusing and  contradictory military orders and information to the Iraqi soldiers in  the Kuwaiti Theater of Command (KTO). The size and power of enemy forces  was always intentionally exaggerated. Surrender was encouraged. According to statements made by captured and deserting Iraqi  soldiers, however, the most devastating and demoralizing programming was  the first known military use of the new, high tech, type of subliminal  messages referred to as Ultra-High-Frequency ‘Silent Sounds’ or ‘Silent  Subliminals’. (Newsweek, July 30, 1990, Page 61) Although completely silent to the human ear, the negative  voice messages placed on the tapes alongside the audible programming by  psyops psychologists were clearly perceived by the subconscious minds of  the Iraqi soldiers and the silent messages completely demoralized and  instilled a perpetual feeling of fear and hopelessness in their minds.

Then there is the suggestion of using Voice To Skull technology in Afghanistan under the moniker “Voice Of Allah” a few years back under the George Bush administration. That plan also included the broadcasting of a hologram image of what Allah was depicted to have looked like. Further, there was a plan years prior to do the same thing to other Arab nations.

The Gulf War hologram story might be dismissed were it not the case that washingtonpost.com learned that a super secret program was established in 1994 to pursue the very technology for application to PSYOPS.  The “Holographic Projector” is described in a classified Air Force document as a system to “project information power from space … for special operations deception missions. (Source: Washington Post)

Steven Corman, writing at the COMOPS journal, described his own encounter with this technology:

At  a government workshop some time ago I head someone describe a new tool that was described as the “voice of Allah.” This was said to be a device  that would operate at a distance and would deliver a message that only a  single person could hear. The story was that it was tested in a conflict situation in Iraq and pointed at one insurgent in a group, who whipped around looking in all directions, and began a heated  conversation with his compatriots, who did not hear the message. At the time I greeted this story with some skepticism.

Holosonic Research Labs and American Technology Corporation both have versions of directed sound, which can allow a single person to hear a message that others around don’t hear. Holosonic sells a technology called “Audio Spot Light” while ATC sells the Long Range Acoustic Device. DARPA also has its own sonic projector. Intriguingly, Strategy Pagereported that troops used LRAD as a modified Voice of God weapon:

It appears  that some of the troops in Iraq are using “spoken” (as opposed to  “screeching”) LRAD to mess with enemy fighters. Islamic terrorists tend  to be superstitious and, of course, very religious. LRAD can put the  “word of God” into their heads. If God, in the form of a voice that only  you can hear, tells you to surrender, or run away, what are you gonna  do?

CNET once reported on the technology, noting that users don’t hear sound through their ears but instead the sound resonates and reverberates inside the person’s head – except in that case it was used for advertising.

The folks who heard the ad for A & E’s TV show “Paranormal State”  emitted from a billboard in New York City’s Greenwich Village must have  thought it was pretty weird. As they walked into the targeted area they  were exposed to highly focused sound, picked up not by their ears, but  by their skulls. The otherwise inaudible sound waves are experienced via  bone conduction–the sound resonates inside the passerby’s head.

The use of mind control technologies was predicted as well in the military publication of Strategic Studies Institute of the U.S. Army War College, published in 1994.

 

photocredit/thanks:pinterest

 

There are also other patents –  (herehere here , here and here.)

And, finally, the most important patent entitled: “Thought transmission unit sends modulated  electromagnetic wave beams to human receiver to influence thoughts and  actions without electronic receiver.”

This is not science fiction. This is, to put it bluntly, mad science driven by insanity. These are declassified black projects or SAPs (special access programs.) Much of what the clear world or civilian population knows about military technology is severely underestimated despite the public nature of certain technologies like the heat ray and sound cannon. If you dig even deeper there is an old reference on the Army’s website for a technology called “Voice To Skull.” (ARMY SITE YANKED WIRED REPORTED) [ARCHIVED COPY OF ARMY PAGE]

Dr. Joseph C. Sharp completed the first successful test of auditory microwave technology which could bypass the ears and beam sound directly into a person’s head at the Walter Reed Army Institute of Research in 1973.

Sharp, strapped inside an isolation chamber, heard “words” beamed at him in a pulsed-microwave audiogram. (An audiogram is a  computerized analog of the spoken voice.) ARPA, now DARPA, researcher Robert O. Becker at the time foresaw “obvious applications in covert operations.”

Becker imagined barrages of “voices” driving an enemy insane, and post-hypnotic suggestion radioed to programmed assassin directing the test subject to kill its target. According  to Naval Captain Paul Tyler in a 1976 essay, “The Electromagnetic  Spectrum in Low-Intensity Conflict,” a “speed-of-light weapons effect”  could be achieved with “the passage of approximately 100 milliamperes  of directed frequency through the myocardium, leading to cardiac standstill and death.”

In 1975, a neuropsychologist Don R. Justesen, the director of  Laboratories of Experimental Neuropsychology at Veterans Administration Hospital in Kansas City, unwittingly leaked National Security Information when he published an article in American Psychologist on the influence of microwaves on living creatures’  behavior. In the article, he quoted the results of  an experiment described to him by his colleague, Joseph C. Sharp, who was working on Pandora, a secret project of the American Navy.

By radiating themselves with these ‘voice modulated’  microwaves, Sharp and Grove were readily able to hear, identify, and  distinguish among the 9 words. The sounds heard were not unlike those  emitted by persons with artificial larynxes (pg. 396).

Dr.  Milton Zaret, a leading microwave scientist was later recruited by  “Pandora,” a CIA project code-named for the study of radio-frequency-directed brain response he stated,

The CIA inquired whether I  thought electromagnetic radiation beamed at the brain from a distance could affect the way a person might act, and if microwaves could be used  to facilitate brainwashing or to break down prisoners under investigation.

 

photocredit/thanks:goldbidgo4all

It’s long been known that microwaves at certain frequencies can produce an auditory effect that sounds like it’s coming from within someone’s head. Then there’s the question of classified microwave work at Brooks Air Force Base which officials have refused to talk about.

In January 2007, Washington Postwrote on the same subject:

In 2002, the Air Force Research Laboratory patented  precisely such a technology: using microwaves to send words into  someone’s head… Rich Garcia, a spokesman for the research laboratory’s  directed energy directorate, declined to discuss that patent or current  or related research in the field, citing the lab’s policy not to comment  on its microwave work. In response to a Freedom of Information Act  request filed for this article, the Air Force released unclassified  documents surrounding that 2002 patent — records that note that the  patent was based on human experimentation in October 1994 at the Air  Force lab, where scientists were able to transmit phrases into the heads  of human subjects, albeit with marginal intelligibility. Research  appeared to continue at least through 2002. Where this work has gone  since is unclear — the research laboratory, citing classification,  refused to discuss it or release other materials.

Previous research in electromagnetic weapons has shown that low-frequency waves or beams can affect brain cells, alter psychological states and make it possible to transmit commands directly into someone’s thought process making them think it’s their own thoughts. In fact there is even a patent which suggests doing just that.

In the 1940s George Estabrooks, a Harvard University graduate, Rhodes Scholar and chairman of psychology at Colgate University, Canada, acknowledged conducting extensive  hypnosis work on behalf of the CIA, FBI and military intelligence creating Manchurian candidates.

He boasted to Science Digest in 1971: “I can hypnotize a man — without his knowledge or  consent — into committing treason against the United States.” Estabrook (Bowhart. Operation Mind Control.)

Eight years later,  it was reported that a “Man Hallucinates, Says Microwaves Are Murdering Him,” in the March 21, 1979, edition of the Los Angeles Herald Examiner and later New Scientist.  That man was electronics engineer Leonard Kille, who founded the Scientific Engineering Institute (SEI) on behalf of the CIA.

In  July 1968 at South Vietnam’s Bien Hoa Hospital, SEI teams had implanted electrodes in the skulls of Vietcong prisoners of war in experimental attempts to direct the behavior of brain-wired subjects by remote control.

Kille himself was a test subject of the electrodes implanted in his brain.  In 1971, a hospital attendant found Kille holding a metal wastebasket over his head in an attempt to “stop the microwaves.” A sympathetic doctor at Boston’s VA hospital, where Kille was transferred, ordered him “a large sheet of aluminum foil so he may fashion a protective helmet for himself.”

Not informed that Kille had electrodes implanted his head, the VA doctors diagnosed him as a delusional paranoid individual.

In 1965 The New York Timesreported obscure EMR experiments secretly funded by the government under the front-page headline: “Mind Control Coming, Scientist Warns.”  University of California psychology professor Dr.  David Krech is quoted warning, “EMR research may carry with it even more  serious implications than the achievements of the atomic physicists.”

Earlier, a 1963 CIA-issued manual on the study of Radio-Hypnotic Intra-Cerebral Control (RHIC) explained:

When a part of your brain  receives a tiny electrical impulse from outside sources, such as vision,  hearing, etc., an emotion is produced—anger at the sight of a gang of  boys beating an old woman, for example. The same emotions of anger can be created by artificial radio signals sent to your brain by a  controller. You could instantly feel the same white-hot anger without  any apparent reason.

Richard Helms oversaw military-oriented EMR research into the transmission of strategic subliminal messages into the aggregate minds of enemy populations. In a 1964 memo to the Warren Commission regarding the possibility that Lee Harvey Oswald had been a mind-controlled assassin, Helms outlined the existence  of “biological radio communication.” “Cybernetics science of communication and control theory that is concerned with  the study of automatic control systems, such as the brain and  mechanical-electrical communications,”

Helms admitted, “can be used in  molding of a child’s character, the inculcation of knowledge and  techniques, the amassing of experience, the establishment of social  behavior patterns … all functions which can be summarized as control  of the growth processes of the individual.”

A subsequent CIA directive, summarized in a brochure on “cybernetic  technique” distributed by Mankind Research Unlimited, an EMR study facility in Washington, D.C., detailed the deep state’s development of a “means by which information of modest rate can be fed to humans utilizing  other senses than sight or hearing.”

According to the brochure, the CIA’s cybernetic technique, “based on Eastern European research,” involved beaming information via radio frequencies to individual human nerve cells. The purpose, the directive stated, was for “the enhancement of a subject’s mental and physical performance.”

“Recently researchers from the University of Washington showed that they could send one person’s thoughts through a computer to control the hand motion of a person sitting half a mile away. The team first demonstrated this brain-to-brain connection was possible back in August 2013.

But now the researchers have put the technology through more rigorous testing and are close to making it usable in real-world scenarios,” Live Science reported.

Neuroscientists in France implanted false memories into the brains of sleeping mice in 2015. Using electrodes to directly stimulate and record the activity of nerve cells, they created artificial associative memories that persisted while the animals snoozed and then influenced their behavior when they finally woke up. MIT scientist also achieved the same result using mice in a similar experiment prior in 2013.

Meanwhile, Japanese researchers have developed a trick to implant false visions into people’s brains, altering the way they experience the world and potentially even the way they think.

In 2016, Dailymail reported that scientists had discovered a disturbing trick to plant false experiences into people’s brains.

As Huffington Postreported in 2014, “Mind control is becoming a reality,” in the clear science world, while black project scientists are far ahead of these advances as this article illustrates.

Knowing all this information and seeing all the cited times in history that a shooter has heard voices in their head, one has to question if all the shootings were legitimate or if some of them were deep state CIA operations. (See my article: “I HEAR VOICES: MKUltra? A Worrying Trend Of Mass Shooting Suspects Throughout History Before Committing Horrific Murders.“)

With the inadvertent release of suspicious files talking about mind control it seemed like no better time to put this article out. Will the disclosure of this technology allow for the acceptance that it exists rather than constant ridicule with tinfoil hats?

This entire article is cited to its teeth — your move CIA.

Electromagnetic Weapons are Being Used to Torture and Subjugate Countless American Citizens…: http://www.biggerthansnowden.com/

Top image credit: Truthstream Media

 

gifcredit/thanks:thefreethoughtproject/giphy

 

The above discourse is of a Topic that infringes on many basic Rights.

Disguising fear as ignorance… many boo-hoo this Topic.

 

Science,.. in particular the Strange Sciences do lil’ to correct this mis-conception.

Intentionally… or not… unknown.

 

Technology has the Power to set us Free… or enslave.

A need for full and proper discourse and disclosure… obvious.

When such,.. revealed and open… Control is…

…shared by ALL those concerned.

 

Your Mind… and/or mine… deserve no less.

Tis Your Mind… after all.

 

Are You… still in Control.?.

 

Meditation… State of MIND changes, NDE, OBE, REMOTE VIEWING, Tunnel of Light… Balancing by Inner Gods. Our World LEGENDS. Join Shiro using Shamanic Concepts combined with Meditational Approach,.. with add-ons…add-ins as well. Mood music.

 

 

(… 😎 Late Admin Add-in… Recently in:

Economics and Finance Intel Report.

 

For… those with an… Interest in and of,..

Interest.

 

Do You… Understand the inner Nature…

of Money.?. Yay… or Nay… here… then…

 

What Happens When A Hurricane Meets

Wind Turbines & Solar Panels:..

 

…may be of Interest Indeed.

In deed… and in fact… too.

To see where Yours and Public Monies…

goeth.

 

Goeth and… Follow the… link…

to the Money… Trail thereof and therein.)

 

Till next…

 

The Isis On The Cake.

Behind the scenes of many world stories… lies INTEL. The reblog overview herein presents researchers with refs and more on how such as ISIS forms. Investigations lead into many avenues and Shiro has left these starting connections therein too. There are many who see more of the whys and hows. Some of them are herein. Truth hurts… perhaps indeed.

 

(Video Link)

 

The machinations of those behind several world events lie unseen in the world of Mass Media.

The following reblog overview… with all links and refs therein… may fill in some gaps.

 

In particular, the VT investigative crew has much to offer.

THE ISIS ON THE CAKE.

A chunk of raw INTEL… for researchers to indulge.

Historien om svikerne Gen. Allen og Petraeus og de terrorister de skapte…

Norsk pedofiliskandale knyttet til Bilderberger…

Norway pedophile scandal: Politicians, police reportedly among 20 arrested suspects

By GPD on November 21, 2016

Editor’ note:  Ties have been found to the Belgian/Netherlands PESN/Wiki pedophile groups tied to the Scalia/Hubertus/Bilderberger group whose data networks were managed by Sterling Allan, former Rense radio host.

At least 20 people have been arrested in Norway on pedophile charges, officials say, adding that the suspects include lawyers, economists and even a primary schoolteacher. Reports claim the case also involves politicians and a police officer.

Thirty-one people are also currently under investigation, Deputy Police Chief Gunnar Fløystad said.

 

 

Les resten:

Norway pedophile scandal: Politicians, police reportedly among 20 arrested suspects

Dommer Scalia myrdet etter Obama-møte (oppdatert)

Scalia Murdered After Obama Meeting (updated) | Veterans Today

Ex-CIA chief: Trump will usher in new age in US-Israel relations

MORE Islam (not less) can stop ISIS! -West Point study

Syria & Iraq War Report – November 21, 2016: ISIS Suffer Losses in Syria and Iraq

Russland kommer til å ta i bruk Iskander-raketter i Kalingrad “ekslave” på grunn av USAs missil-trussel

Russia to deploy Iskander rockets in Kaliningrad exclave over US cruise missile threat

Russland krever kriminaletterforskning av USA-støttet giftgassangrep på Syria

Russia Demands Investigation of US Backed Poison Gas Attack on Syria

US senators promise to act against Trump on Russia ties

UK Navy losing ability to deal with potential threats: MPs

 

 

UPDATED: Idlib ‘Gas Attack’ is same old BS as before

By Ian Greenhalgh on April 4, 2017

[Editor’s note: The sense of Deja Vu is overwhelming, this story is a full repeat of the ‘Assad used poison gas on civilians in Ghouta’ fairytale of 2013.

VT has thoroughly debunked that story, we exposed the role of Israel, Turkey, Qatar, Saudi Arabia, the Ukraine , the CIA and the Russian Mafia, all of whom had a hand in the supply of the gas to the Syrian “rebels” who were the ones who used it on innocent Syrian civilians.

The story that blamed it on Assad came from the Syrian Human Rights Observatory, a one man disinfo op in the suburbs of Coventry, England run by Rami Abdul Rehman. Once again, as in 2013, it is the tubby little liar Rehman and his SHRO that is behind the lies, once again the ‘Assad did it’ meme is being used to hide the true guilty party – the ISIS and FSA Mercenaries.

In 2014, Serena Shim stumbled upon a safehouse run by Jared Cohen and Google Idea Groups, a short distance from a border crossing into Syria between Hatay, Turkey and Aleppo province in Syria. In the safehouse were three Ukrainian secret service who had just buried a load of sarin gas shells from the Republic of Georgia. VT Bureau Chief and former US Army chemical weapons expert Jeffrey Silverman had followed the transit of these WMDs from Lugar Labs, a CIA facility near the Tblisi airport in Georgia. Silverman, working with TV network Russia24, VT and Russia Today, had exposed this facility, funded as a US Agricultural Research Station under the direct supervision of the US Army Biological and Chemical Warfare Facility at Fort Dietrich, Maryland.

Les resten:

http://www.veteranstoday.com/2017/04/04/idlib-gas-attack-is-same-old-bs-as-before/

Googles “Gas-man” Jared Cohen (mer nederst på siden)

———- Forwarded message ———-
From:
Date: 2016-09-09 19:24 GMT+02:00
Subject: Fwd: Viktige nyheter, del 67 – USAs klarerte ruter for å forsyne IS med våpen
To: forsvaret@mil.no, post@pst.politiet.no, 02255@tv2.no, 03030@nrk.no, 2200@vg.no, 2286@aftenposten.no, john.arne.markussen@dagbladet.no

———- Forwarded message ———-

From:

Date: 2016-08-30 17:33 GMT+02:00

Subject: Viktige nyheter, del 67 – USAs klarerte ruter for å forsyne IS med våpen

To: redaksjonen@nettavisen.no

496)

A tale of two traitors and the terrorists they created

By Ian Greenhalgh on April 6, 2016

… by Gordon Duff and Ian Greenhalgh

Never have two less qualified individuals, we are talking Generals Petraeus and Allen, duplicated what this pair has done.  “Honeytrapped” by allowing the “little brain” to think in place of the only slightly larger one located a short distance higher, each combined moral flexibility, inferior intellect and hubris.  These are the parents of the ISIS bastard child as much as anyone, no Saudi price, not madman Erdogan or scheming Netanyahu, not “Hanoi Songbird,” John McCain, Paul Vallely or Googles “Gas-man” Jared Cohen (recently outed in a Hillary email, now tying him to sarin deaths across Syria in 2012 and 2013).

 

Gen. John Allen, the US General compromised after being caught in an Israeli honeytrap along with CIA director Gen. David Petraeus. Allen & Petraeus were the senior US commanders during the Afghanistan and Iraq wars.
Today we seen another in a series of assaults on reason and reality in the propaganda war on Russia.  Reaching the bottom of the proverbial barrel, the UK Guardian constructs a polemic on Russian failures in Syria of all things, perhaps the first time a major nation state has effectively moved against terrorism, unless you want to count the US fiasco in Vietnam as a victory.

The Guardian runs to the Atlantic Council of all things, where, in March 2015, General John Allen, fresh from a resignation scandal tied to an affair with a Florida housewife/call girl/Mossad agent, is given control of America’s efforts in Syria.

As the real story progresses, Allen resigns in disgrace, again mind you, and the White House turns to Russia and Iran, awakened to the betrayal by the Atlantic Council, a cheap CIA front, and General Allen, longtime associate of his thinner clone, Petraeus, read “betray us,” also burned by sophomoric sexual antics.

One could note how America’s service academies, seeking out rubes, losers and mama’s boys, then promoting them beyond their already very limited capabilities, has left America defenseless.  One could point out how easy it has been for Israel to throw girls, boys, aging hags and even cross dressing arm wrestlers at the Pentagon’s endless supply of ass kissing nerds.  One could say that and more but we choose to take the high road, sure we do.

Petraeus with ‘Florida Socialite’ Jill Kelley, who befriended a number of top officers at MacDill Air Force Base in Tampa, played a starring role in the soap opera surrounding the extramarital affair of Gen. David Petraeus. Kelley received threatening emails from Petraeus’ mistress, Paula Broadwell, who appeared to perceive Kelley as a threat. Petraeus resigned as CIA director, and the FBI later discovered thousands of pages of email exchanges between the 37-year-old Kelley and Gen. John Allen, the top U.S. commander in Afghanistan, who once served at MacDill.

Three hundred million times two – a tale of two traitors

2007 – 300 million US dollars to Petraeus who then went into the prisons of Iraq and recruited individuals for 300 bucks a month to go to Ramadhi, become the command structure of the future ‘ISIS’ and split Iraq in two; creating an ‘Islamic State’ in the north where raping, looting and pillaging became the norm and where the cultural wealth, the oil wealth, almost anything of value that could be trucked north to Turkey was stolen on behalf of international corporations owned by the same group of criminals who control the intelligence agencies that blackmail generals and politicians into starting these conflicts.

Petraeus told us tales of creating ‘Sunni militias’; in reality, he created ISIS.

Petraus with Paula Broadwell, the author of the biography, “All In: The Education of General David Petraeus.” She was the woman in the extramarital affair that Petraeus cited as the reason for his resignation from the CIA.

2011 – 300 million US dollars to Allen who spent it all on TOW missiles and other US weapons which all ended up in the hands of IS.

Allen stood up in front of the entire world and said he had 50,000 trained ‘moderate’ Syrian fighters ready to go against ISIS. When it was admitted before Congress that the real number of fighters was only 46, Allen’s credibility struck an iceberg and was lost with all hands.

As for those 46 fighters – they immediately went off and joined ISIS. No doubt they proved useful in teaching the other head chopping mercenary scum how to use their shiny new American-made weapons.

Les resten (+ video fra retten):

A tale of two traitors and the terrorists they created | Veterans Today

495)

Zombie Enabler David Petraeus Is Back (sort of)!

By Jonas E. Alexis on January 26, 2016

Whole lotta shakin’ goin’ on here.

Mr. Petraeus, if we are to “unleash America’s airpower in Afghanistan,” does that include passing substantial classified documents to mistresses? Please, proceed with your argument.

Whole lotta shakin’ goin’ on here.

…by Jonas E. Alexis

If you thought that zombie enabler David Petraeus was politically dead, then you will have to rethink things a little. After he was morally wounded in the Paula Broadwell debacle, after it was obviously discovered that this man was an agent working against the interest of America,[1] New World Order agents went work in order to rescue one of their saviors from political oblivion.

Keep in mind that Neocon shill Victor Davis Hanson of the Hoover Institution literally believed that Petraeus was a savior who could save the Iraq debacle.[2] Thomas Sowell of the same institution almost believed the same thing.[3] After the Broadwell debacle, those talking heads stopped mumbling about their dead savior.

Recently, the Washington Post has located Petraeus’ political corpse and sort of resuscitated him. NWO agents seemed to have realized this man can still be used as an asset. What is Petraeus’ recent fire-and-brimstone message? He shouts: “It’s time to unleash America’s airpower in Afghanistan.”[4] Well, who has been saying this for the last five years or so? The Neo-Bolsheviks, who had strong connections with Petraeus.[5] Petraeus is not kidding here at all:

“President Obama’s desire to avoid large new ground commitments in the Middle East is, in many respects, understandable, given the experiences of some 15 years of war.

“At present, however, the modest number of U.S. and coalition troops in Afghanistan operate with one hand tied behind their backs – at a time when Afghan forces, though fighting hard, are struggling. That should be changed. We should unleash our airpower in support of our Afghan partners in the same way that we support our Iraqi and Syrian partners against extremists.

“At present, U.S. and NATO airpower in Afghanistan is used only to attack validated al-Qaeda targets, to counter specific individuals or groups who have attacked coalition forces previously and to respond directly to attacks on coalition forces.”[6]

 

 

If we are to “unleash America’s airpower in Afghanistan,” does that include passing substantial classified documents to mistresses?[7] How can we know that Mr. Petraeus is not going to do the same thing? How can we know that he is not going to accumulate more mistresses?

If we have to talk about airpower in Afghanistan, let’s talk about the “kind of cat-fight stuff” with mistresses first.[8] Let’s talk about how America was betrayed in Iraq and Afghanistan. I am waiting for Petraeus to write an article at the Washington Post discussing how he allowed sexual weaknesses to destroy his military career and perhaps his family. Mistress Paula Broadwell wrote All In: The Education of General David Petraeus:

“As we [Petraeus and herself] talked during the run from the Pentagon to the Washington Monument and back, Petraeus progressively increased the pace until the talk turned to heavy breathing and we reached a six-minute-per-mile pace. It was a signature Petraeus move. I think I passed the test?”[9]

What test, Mrs. Broadwell?

In any event, Petraeus should really be ashamed of himself precisely because he has no right to tell the American people to continue perpetual wars in Afghanistan. Most Americans trusted this man to do a decent job in the region, but he ended up selling America to the Dreadful Few.

Les resten:

http://www.veteranstoday.com/2016/01/26/zombie-enabler-david-petraeus-is-back-sort-of/

 


 

Jamey Johnson & The Blind Boys Of Alabama – Take The High Road

Live From Daryl’s House – “Boyfriend Jeans”

GLADYS KNIGHT IN OAKLAND (FEAT.BUBBA FROM THE PIPS

 Miks – Little Richard – Good Golly Miss Molly (Muhammad Ali’s 50th birthday)

Miks – Ry Cooder – Goodnight Irene

Trombone Shorty – St. James Infirmary – In Performance at the White House: Red, White, and Blues

Trombone Shorty,Blind Boys of Ala.#5″Down By The Riverside” @ Warren’s Xmas Jam 12/15/12

Al Green Gospel! None But The Righteous People Get Ready The Lord Will Make A Way I’ll Fly Away

UPDATED: Idlib ‘Gas Attack’ is same old BS as before | Veterans Today

4. apr. 2017 – The origin of the gas attack fairytale is the White Helmets, the fake … Rights Observatory, a one man disinfo op in the suburbs of Coventry, … In 2014, Serena Shim stumbled upon a safehouse run by Jared Cohen and Google …

Veterans Today endorses Donald Trump | Veterans Today

1. apr. 2017 – This guy knows how to make you an offer you can’t refuse. … Wall Street Journal: Jared Kushner has ties with Goldman Sachs and George …

The Treason Machine, How Israel and Turkey Nearly … – Veterans Today

10. mai 2016 – … penetrated and operated by Israeli intelligence, staged gas attacks in Syria killing thousands. … traced the sarin gas to a Hatay, Turkey safe house run by Jared Cohen’s Google Idea Groups, …. Exactly, very well put man.

Intel Drop, April Fools Day Plus One and We’re all … – Veterans Today

2. apr. 2017 – This is the gang that moved poison gas into Syria, ran assassination teams in Iran, … So Jared Cohen, who was then at State [now at Google], and I … General Michael Flynn is one of these, a man who went to war much as …

Exposing InfoWars and Israel | Veterans Today

7. apr. 2017 – The New York Times is now demonizing everyone who’s calling out the “sarin gas attack” false flag. According to the Times, only ?right wing …

 

Village People – Go West

(Agenda 21)

#IS #Bilderberger #Pedofili #Petraeus #GeneralAllen #USA #Folkemord #Obama #Stoltenberg

Tillegg:

Jens Stoltenberg deltar på møte i lyssky klubb for makteliten – Nettavisen

1. jun. 2017 – Blant de 131 medlemmene i Bilderberg-gruppen er NATOs generalsekretær Jens Stoltenberg og politikerveteran og tidligere utenriksminister i …

 

 

Some interesting research points and avenues therein.

Thanks much for the overview to all those concerned.

Good luck with the gaining of knowledge.

 

 

Till next…

 

Top 20 Most Popular Hacking Tools.

Computers and THE IOT… have a Language… ALL IT’S OWN. SEEK AND SEARCH THE IT Our World LEGENDS with Shiro to sort out some useful tools indeed it seems. A TOP 20… WHITEHAT… Shiro STYLE. Scanning, testing, hacking tips galore.

 

 

hi and good wishes.
Thanks much for the info in the following post.
As admin of a ninja and Our World LEGENDS storytelling site…
…not IT adept.

e.g. many of the terms we see in the
IoT Threat reports and so forth…
are somewhat meaningless…

till such as this… explains.

 

TOP 20

MOST POPULAR

HACKING TOOLS.

 

O KUNOICHI OF THE WHISPY HAIR… WATCH AN EMPIRE FALL… ONLINE… MISINFO, DISINFO, 3 LETTER AGENCIES… AND ONES WITH LONGER NAMES TOO. CLICK AWAY.

Thanks again OP.
Will reblog to ninpolegends.com

via Most Popular Hacking Tools

 

IS TRUTH AS RARE AS DIAMONDS.?. O KUNOICHI OF THE FACE SCREEN.?. SEEK AND SEARCH A MONOPOLY… TO SHINE THAT LIGHT INDEED.

 

 

In the world of cyber security,

there are many tools available on the internet;

many of them are free and others are not.

 

1. Aircrack-ng

photocredit/thanks:aircrackng

 

Aircrack-ng is an 802.11 WEP and WPA-PSK keys breaking program that can resolve keys once enough information regarding the terms stolen. It executes the standard FMS attack alongside a few improvements like KoreK breach and additionally the all-new PTW attack, in this way making the assault much quicker contrasted with other WEP splitting devices. Actually, Aircrack-ng is an arrangement of software for evaluating remote systems.

 

2. sqlmap

photocredit/thanks:sqlmap

 

sqlmap is an open source infiltration testing device that robotized the procedure of recognizing and abusing SQL infusion imperfections and assuming control of database servers. Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB and HSQLDB database management systems.

It accompanies an effective identification program, numerous corner elements for a definitive infiltration analyzer and an expansive scope of changes enduring from database fingerprinting, to other information getting from the database to getting to the basic record framework and executing orders on the working framework through an out-of-band network.

 

3. John The Ripper

photocredit/thanks:bslom

 

John the Ripper is a free secret password cracking tool. At first it was created for the Unix working framework, it now keeps running on fifteen distinct stages (eleven of which are building design particular adaptations of Unix, DOS, Win32, BeOS, and OpenVMS).

It is a standout amongst the most mainstream watchword testing and breaking projects as it joins various secret word wafers into one bundle, autodetects watchword hash sorts and incorporates an adjustable. It can be keep running against different scrambled secret word organizations including a few sepulcher watchword hash sorts most usually found on different Unix variants (in view of DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash.

Extra modules have extended its capacity to incorporate MD4-based secret key hashes and passwords put away in LDAP, MySQL and others.

4. Nmap – Network Mapper

photocredit/thanks:nmap

 

Nmap is a contraction of ‘System Mapper’, just like an exceptionally surely understood free open source programmers device. Nmap is utilized for system disclosure and security examining. Numerous framework administrators use nmap for system stock, open ports, overseeing administration update timetables, and observing host or administration uptime.

The apparatus utilizes crude IP parcels as a part of innovative approaches to figure out what hosts are accessible on the system, what administrations (application name and form) those hosts are putting forth, what working frameworks (and OS renditions and conceivable patches) and what sort and form of bundle channels/firewalls are being utilized by the objective.

Nmap keeps running on all real PC working frameworks, and authority parallel bundles are accessible for Linux, Windows, and Mac OS X. Notwithstanding the fantastic charge line Nmap executable, the Nmap suite incorporates a propelled GUI and results from viewer, an adaptable information exchange, redirection, and investigating apparatus, a utility for looking at output results, and a bundle era and reaction examination device.

 

5. THC Hydra

photocredit/thanks:hydra

 

THC Hydra is another exemplary watchword splitting apparatus. Entirely speaking Hydra is a system login watchword splitting apparatus, which is very quick. An extraordinary element about Hydra is that you can add modules to expand the usefulness of this hacking instrument.

When you have to savage power break a remote association administration, Hydra is regularly the instrument of a decision. It can perform fast word reference assaults against more than 50 conventions, including telnet, FTP, HTTP, https, smb, a few databases, and considerably more. Like THC Amap this discharge is from the fine people at THC. Other online wafers are Medusa and Ncrack. The Nmap Security Scanner additionally contains numerous online savage power secret key splitting modules.

 

6. Burp Suite

photocredit/thanks:burpsuite

 

Burp Suite is an incorporated stage that was fabricated to assault (pentest) web applications. The stage contains many hacking devices with various GUI interfaces that encourage and accelerate the procedure of assaulting an application. As ever, the apparatus is intended to have a similar outlook as a dark cap programmer would.

Burp Suite is a coordinated stage for performing security testing of web applications. Its different instruments work consistently together to bolster the whole testing procedure, from starting mapping and investigation of an application’s assault surface, through to discovering and misusing security vulnerabilities.

 

7. Cain and Abel

photocredit/thanks:alternativeto

 

Cain and Abel (regularly abridged to Cain) is a secret key recuperation instrument for Microsoft Windows. It can recuperate numerous sorts of passwords utilizing techniques, for example, system parcel using so as to sniff, breaking different secret key hashes routines, for example, lexicon assaults, animal power, and cryptanalysis assaults.

Cryptanalysis assaults are done by means of rainbow tables which can be created with the winrtgen.exe project gave Cain and Abel. Cain and Abel are kept up by Massimiliano Montoro and Sean Babcock. Recording VoIP discussions, translating mixed passwords, recuperating remote system keys, uncovering secret key boxes, revealing stored passwords and breaking down steering conventions.

The system does not misuse any product vulnerabilities or bugs that couldn’t be altered with little exertion. It covers some security viewpoints/shortcoming present in convention’s norms, verification routines, and reserving components; its primary design is the disentangled recuperation of passwords and qualifications from different sources, on the other hand, it likewise sends some “no standard” utilities for Microsoft Windows clients.

 

8. OWASP Zed

photocredit/thanks:slideserve

 

The OWASP Zed Attack Proxy (ZAP) is a simple to utilize integrated penetration testing tool for finding vulnerabilities in web applications. The Zed Attack Proxy (ZAP) is currently a standout amongst the most mainstream OWASP ventures. This hacking and pentesting instrument is an exceptionally proficient and ‘simple to use’ program that discovers vulnerabilities in web applications.

It is intended to be utilized by individuals with an extensive variety of security experience and as being what is indicated is perfect for designers and useful analyzers who are new to entrance testing. ZAP is a mainstream device on the grounds that it has a ton of bolster and the OWASP group is truly an astounding asset for those that work in Cyber Security. ZAP gives robotized scanners and an arrangement of instruments that permits you to discover security vulnerabilities physically.

 

9. Maltego

photocredit/thanks:hackonadime

 

Maltego is a computerized legal sciences stage that was made to convey a digital danger picture to the earth in which an association works. The one of a kind viewpoint that Maltego offers to both system and asset based substances is the accumulation of data posted everywhere throughout the web whether it’s the present arrangement of a switch balanced on the edge of your system or the present whereabouts of your Vice President on his global visits, Maltego can find, total and picture this data.

Maltego is a one of a kind stage created to convey an unmistakable danger picture to the environment that an association possesses and works. Maltego’s interesting leeway is to exhibit the many-sided quality and seriousness of single purposes of disappointment and in addition trust connections that exist presently inside of the extent of your base.

 

10. Metasploit

photocredit/thanks:hackertarget

 

The Metasploit is much more popular tool. Cybersecurity allows a penetration tester and hackers to use this tool, its function is to seek the security of the network with making a vulnerability along with system also. What’s more, Metasploit likewise obliges productive administration and testing of Intrusion Detection Systems.

The most well known “division” of this ‘multi reason hacking device’ is the open source Metasploit Framework Project, ordinarily alluded to as essentially ‘Metasploit’.

This apparatus helps the client create and execute (known or generally) adventure code against a remote target machine. Numerous Metasploit clients utilize the apparatus for hostile to criminological and avoidance purposes, a large number of which are incorporated with the Metasploit Framework.

 

photocredit/thanks:onthewater

 

11. Wireshark

photocredit/thanks:hitmaxz

 

Wireshark is perhaps the best known ‘Programmers Tool’ out there. Wireshark has been around for quite a while now and it is utilized by a huge number of security experts to troubleshoot and break down systems. Wireshark is a fabulous programming and correspondences convention improvement and instruction. Initially named Ethereal, in May 2006 the task was renamed Wireshark because of trademark issues. It is free and open-source parcel analyzer.

 

12. Angry IP Scanner

photocredit/thanks:angryip

 

Angry IP Scanner on the other hand known as ipscan is an open-source and cross-stage system scanner intended to be quick and easy to utilize. It examines IP addresses and ports and has numerous different elements.

It is generally utilized by system executives and simply inquisitive clients around the globe, including huge and little endeavors, banks and government organizations. It keeps running on Linux, Windows and Mac OS X, potentially supporting different stages too.

 

13. Nessus Remote Security Scanner

photocredit/thanks:tenable

 

At odd times previously this software tool was much more popular simply by the demand of the hacking world. Currently this application source is unavailable for official but users can still use it for free, it usually works with a client-server system, it helps users to find out vulnerability, it has been used by more than  75,000 companies.

Nessus Security Scanner is the most famous of companies, Nessus helped many big companies to analyse their business proportional audit process which is efficiently cost saving.

 

14. Ettercap

photocredit/thanks:youtube

 

Ettercap is a free and open source system security device for man-in-the-center assaults on LAN. It can be utilized for PC system convention examination and security evaluating.

It keeps running on different Unix-like working frameworks including Linux, Mac OS X, BSD and Solaris and on Microsoft Windows. It is equipped with blocking movement on a system section, catching passwords, and leading dynamic listening stealthily against various normal conventions.

Ettercap meets expectations by putting the system interface into a wanton mode and by ARP harming the objective machines. Along these lines, it can go about as a ‘man in the center’ and unleash different assaults on the casualties. Ettercap has plugin bolster so that the elements can be stretched out by including new plugins.

 

15. Wapiti

photocredit/thanks:hackingarticles

 

Wapiti is a web application vulnerability scanner tool allows you to audit the security of your web application through scanning the application and program of the web. It works by “black-box” types of scanning that will scan the webpages of the deployed web app but will not study the source code of the web pages and also from the web page, can scan it to inject data.

 

photocredit/thanks:likesuccess

 

16. Nikto

photocredit/thanks:slideshare

 

Nikto Web Scanner is a Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software, and other problems. It performs generic and server types specific checks. It also captures and prints any cookies received. The Nikto code itself is Open Source (GPL), however the data files it uses to drive the program are not.

 

17. SuperScan

photocredit/thanks:slideshare

 

SuperScan is a Powerful TCP port scanner, pinger, resolver. You can get improved host detection using multiple ICMP methods, TCP SYN scanning. Moreover, you will get a selection of useful tools (ping, traceroute, Whois etc).

 

18. Yersinia

photocredit/thanks:yersinia

 

Yersinia is a network security/hacking tool for Unix-like operating systems, designed to take advantage of some weakness in different network protocols. Yersinia is considered a valuable and widely used security tool. It presents a solid framework for analyzing and testing the deployed networks and systems.

 

19. Eraser

photocredit/thanks:homebt

 

Most people have some data that they would rather not share with others – passwords, personal information, classified documents from work, financial records, self-written poems and the list continues. An eraser is a security tool for windows which simply allows users to remove sensitive data from their hard drive by overwriting several times with selected patterns.

 

 

20. Acunetix Vulnerability Scanner

photocredit/thanks:softwaretestinghelp

 

Over 70% of websites and web applications contain vulnerabilities that could lead to data theft. Acunetix can be used to crawl your web page and automatically analyzes all your web apps and finds perilous SQL injection, Cross site scripting and other vulnerabilities that expose your online business.

 

 

Thanks much for the IOT Tech. explains above.

A TOP 20 indeed.

 

…From the SITE INTEL REPORTS too…

there’s this:

photocredit/thanks:govtech

 

 

With the Christmas Season fast approaching…

and for those who online shop,..

the good folk at the MOZILLA FOUNDATION.

 

Have shared with Shiro… their GUIDE TO GIFTS.

(click)… Good Work indeed.

 

INTERESTING.?. CLICK AND FOLLOW THE BED RIDDEN KUNOICHI TO SHARE THAT INTEREST INDEED.

 

Till next…

 

 

12 Legendary Swords.

12 LEGENDARY SWORDS.The clash of swords is not for the faint-hearted. A favored weapon among those using, studying and collecting such items; many have become Legendary. Truth and Myth combined in a blade.Though the true history and usage of each is sometimes unclear they ALL captivate and charm. LEGENDS. ALL. Stuck in a stone…or not. Shiro selects a slice of 12 of Legend from around the world. photocredit/thanks:kenzealand

 

 

The clash of swords is not for the faint-hearted.

A favored weapon among those using, studying and collecting such items; many have become Legendary.

Our World Legends.

 

Truth and Myth combined in a blade.

Though the true history and usage of each is sometimes unclear they ALL captivate and charm.

 

LEGENDS. ALL.

 

Stuck in a stone…or not,..

…some may indeed have helped shape Civilisation. (click)

 

gifcredit/thanks:meez

12 LEGENDARY SWORDS . 

12 LEGENDARY SWORDS.
Swords of renown are the seeds of legend.
Fueled by tales of bloodshed and conquest, there have been Swords throughout history that have grown to mythical proportions, blending fact and fiction until the two are all but inseparable.
We’ve found Swords that might in fact be legends brought to life; others have tales so bizarre we have to question their truth.
There will never be another weapon that has left a greater impact on history as the Sword––some more than others.
THANKS Guest Blogger @listverse.com Nathan Willey

 10.  The SWORD IN THE STONE . 

 

photocredit/thanks:listverse

 

While the Arthurian legend is mostly a product of folklore and myth, there is evidence that its Sword in the stone tale might be very real. In a chapel in Monte Siepi, Italy lies an ancient Sword embedded in stone that could be the key to deciphering the origin of the legend.

It’s believed that Saint Galgano was a 12th-century Tuscan knight whom Archangel Michael commanded to give up his sinful ways. Arguing that the task would be as difficult as cleaving stone, Galgano attempted to prove his point by breaking his Sword on a nearby rock. Legend says his blade cut into the stone as if it were butter.
The Sword in the stone still rests where Galgano left it behind, along with his worldly ways.After Saint Galgano was canonized, word of his Holy Sword spread quickly.
The legend of Excalibur predates Galgano, but the addition of the sword in the stone arose shortly after Galgano’s time. It’s theorized that his Sword was the true-life inspiration for Arthur’s Sword in the Stone.
Of course, that all depends on the sword’s legitimacy. Whether or not the Sword in Italy belonged to Galgano has been called into question numerous times. Luigi Garlaschelli of the University of Pavia, however, recently carbon dated the Sword to the 12th century––appropriate for Saint Galgano’s lifetime, if not necessarily absolute proof of the story’s legitimacy.

 9.  The KUSANAGI .

 

photocredit/thanks:listverse

 

According to legend, the “Sword in the Snake,” Kusanagi, was found in the body of an eight-headed serpent killed by the God of Storms and Seas. It’s part of the Imperial Regalia of Japan, icons of the ancient Imperial family’s descent from the Sun Goddess––the symbols of their divine right to rule.

The Kusanagi is said to be housed in the Atsuta shrine in Nagano Prefecture, though it isn’t on public display and hasn’t been seen in centuries. The Sword is occasionally brought out for Imperial Coronation ceremonies, but it’s always kept shrouded in wrappings. Even though it has never been seen, and is only recorded in collections of oral history and pseudohistorical documents, authorities have nevertheless succeeded in keeping the world guessing about the Kusanagi by never officially confirming nor denying its existence.The only official mention of the Sword came after World War II—even though the late Emperor Hirohito disavowed any claim to his divinity, he was also recorded as having ordered the divine regalia’s keepers to defend them at all costs.”

 8.  The DURANDAL . 

 

photocredit/thanks:listverse

 

For hundreds of years, a mysterious Sword had been embedded in the cliffs above the Notre Dame chapel in Rocamadour, France. The monks say it is Durandal, Sword of the paladin Roland. According to legend, Roland hurled the holy blade into the side of the cliff to keep it from being captured by his enemies.

Since the 12th century, the chapel has been a destination for sacred pilgrimages. In 2011, the Sword was removed by the local municipality and given to the Cluny Museum in Paris for an exhibit.But is the Sword actually Durandal? While the battle where Roland lost his life is a well-documented event, the first mention of Durandal was in “The Song of Roland,” composed hundreds of years later––about the same time the Notre Dame monks began claiming the Sword was Roland’s. They likely linked their Sword to Durandal since Rocamadour was the starting point for his journey, even though his final battle happened hundreds of miles away in the valley of Roncesvaux. So unfortunately, unless Roland pitched a really good fastball, the Sword in the cliff is likely nothing more than a story conjured up by the monks of the chapel. Still, where the Sword really came from remains a complete mystery.

 7. The MURAMASAS . 

 

photocredit/thanks:listverse

 

Muramasa was an ancient Japanese Swordsmith who, according to legend, prayed that his Swords would be “great destroyers.” Because of the exceptional quality of his blades, the gods granted his request and imbued them with a bloodthirsty spirit that—if not sated with battle—would drive the wielder to murder or suicide.

There are countless stories of the Muramasas’ wielders going mad or being murdered. The Swords were believed to be cursed, and were banned by Imperial Edict.The Edict was made by Shogun Tokugawa Ieyasu, who condemned the Swords after they killed nearly all of his family. His grandfather had fallen to a Muramasa, and both Ieyasu and his father had been wounded by the Swordsmith’s blades. Finally, both his wife and his adopted son were later executed by the supposedly cursed Swords.But were Muramasa’s blades really cursed? Likely, Ieyasu’s trouble with the Swords began simply because they were extremely popular. Muramasa was not the name of one man, but the entire school of Swordsmiths he founded. Quality Muramasa blades had been produced for close to a century and Japan’s warrior class used them often. The fact that Muramasa’s Swords were used in so many killings related to the Shogun, while certainly a coincidence, was not exactly remarkable.

 6. The HONJO MASAMUNE . 

 

photocredit/thanks:listverse

 

In contrast to Muramasa’s cursed Swords are the blades of Legendary Priest and Swordsmith Masamune. Legend has it that Masamune and Muramasa held a competition to decide the superior smith by placing their blades in a stream. While Muramasa’s cut everything it touched, Masamune’s refused to cut anything undeserving, even the air.

While Masamune’s works are valued as Japanese National Treasures, one of the Swords has never been found. Following the  surrender in WWII, the “Honjo Masamune” was given to an American soldier, Sgt. Coldy Bimore, who most likely took it home with him as a war souvenir. As the mysterious G.I. has never been found, the Sword’s whereabouts have likewise been lost.

Despite the Sword’s doubtless worth (it is potentially worth millions), sword collectors are no closer to finding the legendary lost Masamune than they were the day it disappeared.

 

 5. The JOYEUSE .

 

photocredit/thanks:listverse/siren

Photo credit: Siren-Com

Joyeuse, King Charlemagne’s Legendary Sword, was said to change colors 30 times every day, and was so bright it outshone the sun. Since as early as 1271, two Swords called Joyeuse have been part of French Coronation Ceremonies. But since both Swords can’t be the famed Joyeuse, the mystery of which one is the true Sword of the Holy Roman Emperor has lingered for centuries.

The Joyeuse residing in the Louvre has suffered heavy modification over its considerable lifetime. The oldest section is the pommel, which recent tests place sometime between the 10th and 11th centuries. Since Charlemagne died in 813, this puts it just outside the Holy Roman Emperor’s lifetime.

The other contender is the “saber of Charlemagne” housed in the Imperial Treasury in Vienna. It is unknown how the Sword became part of the French Imperial Regalia, but the Saber is dated to the early 10th century—closer than the Joyeuse, but still just after the time of Charlemagne’s Legendary Sword.

The Saber was probably fashioned by Hungarian Swordsmiths, which opened the door for additional legends of it being the famedsword of Attila,” which was said to have been given to Attila the Hun by Mars, the God of War. Sadly, this isn’t really historically plausible either.

 

 4. The SWORD OF ST.PETER . 

 

photocredit/thanks:listverse

 

There are several legends about the Sword used by Saint Peter when he cut off the ear of the servant to the high priest in the garden of Gethsemane. English lore has it brought to England by Joseph of Arimathea along with the Holy Grail.

In 968, however, a Sword was brought to Poland by Bishop Jordan—a Sword which he claimed was the actual Sword of St. Peter. The Bishop’s sword, considered the true relic, remained in Poland and was eventually moved to the Archdiocese Museum in Poznan.

Did the mysterious Sword belong to Saint Peter?

There are claims that the Sword could have been made in the Eastern borderlands of the Roman Empire in the first century, but there is little evidence to substantiate them except the (perhaps misplaced) faith of those who want to believe the sword is a genuine relic. The Sword in Poland is a falchion—a type of sword likely not in use during Saint Peter’s time.

Metallurgy tests have also dated it to long after the saint’s death.

 

 3. The WALLACE SWORD . 

 

photocredit/thanks:listverse

 

Legend has it that William Wallace––the titular character of Mel Gibson’s Braveheart––used human skin for his Sword’s scabbard, hilt, and belt. The flesh’s donor was said to have been Hugh de Cressingham, treasurer of Scotland, whom Wallace had flayed after defeating him in the battle of Stirling Bridge.

One version of the legend speaks of Wallace using one strip of Cressingham for his Sword belt. Other accounts say Wallace and his men used Cressingham’s skin for saddle girths.

The legend spread even further when King James IV sent the Wallace Sword to have its scabbard, belt, and pommel replaced with something more befitting a Sword of such stature. The Sword as it is now, in the National Wallace Monument, bears the replacement parts.

Did Wallace have a Frankensword? While Cressingham was most definitely flayed, accounts have Wallace using the unfortunate tax collector’s skin only for his Sword belt, not the actual Sword. The story also came from the English side, and was likely embellished to make the Scottish hero look like a barbarian.

Still, we can certainly understand Wallace’s grudge against tax collectors. It might not be a stretch to say he used the skin from one to decorate his Sword. As with many legends, the truth has been lost to time.

 

 2. The SWORD OF GOUJIAN . 

 

photocredit/thanks:listverse

 

In 1965, a remarkable Sword was found in a damp tomb in China—despite being over 2,000 years old, there wasn’t a spot of rust on it.

The blade was so untouched by time it even drew blood when one archeologist tested its edge on his finger. Besides its unearthly resilience, the craftsmanship of the etchings was also unbelievably detailed for a Sword forged so long ago. It was, for the time, a complete mystery.

Further study of the etchings concluded that it was a Sword belonging to the Yue king, Goujian, and is believed to be the legendary blade mentioned in The Lost History of Yue. According to the text, when King Goujian had his Sword collection appraised, there was only a single Sword of merit. This Sword was so magnificent it was said to have been made with the combined efforts of Heaven and Earth.

How did the Sword stay in such excellent condition for over 2,000 years? Tests show the Swordsmiths of Yue had reached such a high level of metallurgy they were able to incorporate rust-proof alloys into their blades. Their Swords were also treated with rust-resistant chemicals, helping them survive the ages relatively unblemished.

In addition, and in a stroke of brilliant luck, the scabbard of this particular blade was nearly airtight, which prevented oxidation and allowed the Legendary Sword to be found in such pristine condition—even two millennia after it was enclosed in the tomb.

 

 1. The SEVEN-BRANCHED-SWORD . 

 

photocredit/thanks:listverse

 

In 1945, a mysterious Sword was found in Japan’s Isonokami shrine. The Sword was of exceedingly unusual make, with six protrusions branching out from its sides (the tip is considered its seventh).

The Sword was in poor condition, but a faded inscription could be made out along the blade. The exact translation has been questioned numerous times, but what is clear is that the Sword was a gift from a Korean king to a Japanese monarch.

This matched a Sword found in the Nihon Shoki, a folklore-infused historical document cataloging the early history of Japan. If this was the same seven-branched Sword given to a semi-mythical Shaman Empress, Jingu, it would serve as an important keystone marking where legend became fact.

The dating on the blade matched reliable sources in China, Korea, and Japan. The Isonokami shrine itself was also mentioned in other documents dating from the time of the Nihon Shoki, so the Sword could well have been left there since ancient times.

Scholars now believe the seven-branched Sword is the actual Sword from the legend, giving the shaman Empress Jingu an authentic place in history.

 

 +. The LA TIZONA . 

 

photocredit/thanks:listverse

 

La Tizona was the Sword of legendary hero El Cid, who fought for both Christian and Muslim armies in Spain. In a museum in Burgos, Spain, there is a controversial Sword which the museum claims is none other than El Cid’s own blade.

The Sword was said to have been given to the Marquis of Falces by King Ferdinand in 1516. It was then passed down through his family until it was given to the Madrid Military Museum in 1944. There it remained, its legitimacy unchallenged, for sixty years until the current Marquis sold it to the Castile and Leon region for display in the Museum of Burgos.

Upon its sale, the Culture Ministry––which is connected to the Military Museum––launched a scholarly attack against the Sword, saying it was forged centuries after El Cid’s lifetime. Castile and Leon launched a counterattack, upholding the Sword’s authenticity in a different study and saying the Ministry was only jealous because it lost the Sword.

In the epic poem, the “Lay of El Cid,” La Tizona was said to have terrified unworthy enemies into a swoon at mere sight. The Sword in Burgos may not have made any museum visitors swoon, but it certainly seems to have the power to spark controversy.

The Sword’s authenticity remains a fierce debate.

 

 +. The ULFBERHT . 

 

photocredit/thanks:listverse

 

Though mostly forgotten in modern times, there was a type of Sword prized by Vikings that far exceeded any European weapon of its day. The Ulfberht Swords were a thousand years ahead of their time, and wielded only by the elite of Viking Warriors.

What made the Ulfberht blades so advanced? While most Viking blades were found to have been composed of slag-ridden, low-carbon steel, these blades’ metal was comparable to the strength of modern steel. They were inscribed with the signature “+ULFBERH+T,” and their like would not be seen again in Europe until the industrial revolution. The mystery was how the Vikings created these blades while the rest of Europe was still making steel that could shatter like glass.

Scholars now believe the secret to the Ulfberht blades was crucible steel, which the Vikings imported from Iran and Afghanistan. We can’t be certain who Ulfberht was––or even if he was just one man––but he was the only European smith of his time to work crucible steel.

And that made his swords arguably the most advanced weapons of their time and place, ever.

 

via listverse.com

 

 

For those interested in viewing footage of modern blacksmith reproductions of such

LEGENDARY WEAPONS…

The MAN at ARMS crew is highly recommended.(click)

 

and…for those interested…

JAPANESE SWORD COMPONENTS visual aid.Njoy.

 

photocredit/thanks:pinterest

 

 

photocredit/thanks:geocities

 

 

photocredit/thanks:star-shopsk

 

FOR A LOOK AT 9 UNIQUE NINJA WEAPONS...(click)…or

(click) here for a LEGEND OF A GODDESS.

Thanks for sharing the knowledge of the

12 LEGENDARY SWORDS.

 

(Video Link)

 

 

 

Till next…

 

 

The Chinese Masters Of Yesteryear.

The longevity of the Chinese Culture and the means to secure it has ensured a long list of heroes. From many times and traditions, past and present.The Martial Arts Tradition has produced some of note. The modern/current continuation of such as TAI CHI or the SHAOLIN KUNG FU MONKS an ongoing example. Shiro selects a top group of ten, who in the days of yore… did quite well indeed it seems. Enough to be Our World LEGENDS In Deed and in Fact. Courtesy The Cleveland Museum of Art

 

THE GREAT WALL OF CHINA. photocredit/thanks:twitter

 

 

(Video Link)

 

 

The longevity of the Chinese Culture and the means to secure it has ensured a long list of heroes.

From many times and traditions, past and present.

 

 THE CHINESE MASTERS

  OF YESTERYEAR. 

 

The Martial Arts Tradition has produced some of note. (click)

The modern/current continuation of such as TAI CHI or the SHAOLIN KUNG FU MONKS an ongoing example.(click)

 

Our World LEGENDS AND part of MARTIAL ART HISTORY AND WEAPONRY… 刺股 photocredit/thanks:cephalophore

 

The following historical overview and pics provided by Guest Blogger @ chinawhisper.com records some 10 past Masters of the Martial Ways.

The Chinese Masters of Yesteryear.

 

Njoy.Simple.

 

 THE CHINESE MASTERS:

Nowadays real Kung Fu Masters, or Martial Artists, are difficult to find in China.

Finding a genuine Master is more difficult than finding a gem in a hay stack.

However, actually in ancient China there were many good Kung Fu Masters.

Here is a list of  10 ancient Chinese martial artists.

 

1.   HUA TUO   华佗:

 

HUA TUO. photocredit/thanks:chinawhisper

 

HUA TUO in the Han Dynasty was more famous as a physician. However he was also known for the early QI GONG exercise named Five – Animal Exercises, in which the practitioner imitates the actions of tigers, deer, bears, apes, and birds. These practices later developed into many kinds of martial arts such as TAI CHI.

 

2.   YUE FEI  岳飞;

 

YUE FEI. photocredit/thanks:chinawhisper

 

YUE FEI  was a well-known patriotic general in Southern Song Dynasty (1127–1279). Besides he is widely credited for creating XINGYIQUAN, a kind of Chinese martial arts featuring aggressive, seemingly linear movements and explosive power. Several more martial arts were also attributed to YUE FEI such as EAGLE CLAW, FANZIQUAN AND CHUOJIAO.

 

3.   ZHANG SANFENG  张三丰:

 

ZHANG SANFENG. photocredit/thanks:chinawhisper

 

ZHANG SANFENG was usually regarded as the founder of TAI CHI. The legend goes that he created TAI CHI by observing a fight between a snake and a crane in Wu-dang Mountains.

 

4.   WANG LANG  王朗:

 

WANG LANG. photocredit/thanks:chinawhisper

 

WANG LANG is said to have created the PRAYING MANTIS BOXING during the Northern Song Dynasty (969-1126). He was inspired to develop this special KUNG FU by observing the insects actions and interactions.

 

5.   CHEN WANGTING  陈王廷:

 

CHEN WANGTING. photocredit/thanks:chinawhisper

 

CHEN WANGTING  (1580–1660), a Ming Dynasty General, founded Chen-style TAI CHI at Chenjiagou, Wenxian county, Henan province. CHEN is also said to have helped create the Push Hands exercises often practiced.

 

6.   ZHANG SONG XI  张松溪:

 

ZHANG SONG XI. photocredit/thanks:chinawhisper

 

ZHANG SONG XI  (Ming Dynasty) was  the disciple of martial artist Zhang Sanfeng. He also combined the fundamental WUDANG practices and created the unique Wudang Songxi Internal Style.

 

7.   QI JIGUANG :

 

QI JIGUANG. photocredit/thanks:chinawhisper

 

QI JIGUANG  was well-known as a patriotic military general in the Ming Dynasty. He made great contribution in sorting out and researching folk style KUNG FU, leaving behind a famous book JiXiao Xinshu, a book dedicated to the practice of WUSHU.

 

8.   GAN FENGCHI  甘凤池:

 

GAN FENGCHI. photocredit/thanks:chinawhisper

 

GAN FENGCHI (Qing Dynasty) was a master of HUA QUAN which originated from SHAOLIN KUNGFU. He wrote a book called “ The Essence of Hua Fist ” which gives detailed introduction of this martial art. HUA QUAN  has the speed & power of LONG FIST and softness of TAIJI.

 

9.   DONG HAICHUAN  董海川:

 

DONG HAICHUAN. photocredit/thanks:chinawhisper

 

DONG HAICHUAN is widely regarded to be the founder of BAGUA ZHANG, which features a very effective fighting system. He integrated ideas from the The Book of Changes into martial arts and created the famous BAGUA ZHANG.

 

10.   YANG LUCHAN  杨露蝉:

 

YANG LUCHAN. photocredit/thanks:chinawhisper

 

YANG LUCHAN was an influential TAI CHI master and teacher in the second half of the 19th century. He founded his own style of Tai Chi –  YANG STYLE TAI CHI, which features agreeable movements and actions combining hardness, softness and naturalness.

 

via chinawhisper.com

thanks for…

THE CHINESE MASTERS OF YESTERYEAR.

 

FOR A SWORD LEGEND OF AN EMPEROR

TURNED BLACKSMITH…(click)…or

(click) here for the PLANETARY LEGEND

OF THE GOD OF WAR, MARS.

 

photocredit/thanks:youtube

 

 

Till next…

 

 

Saboteurs Of Sanders Campaign Lead To CLINTON National Security Think Tank.

Hi and good wishes to all.
am aussie ninja blogger with many interests.
the manipulation of elections by ELITE interested parties and lobbyists is a most under reported issue in many so called democracies.
your posts provide a necessary counterbalance to the mainstream media controlled usually by ELITES also.
appreciative thanks…have reblogged to idreamofninja…til next take care shiro

 

 

GUEST BLOGGER BARBARA WITH REPORTS ON U.S.THINK TANK INFLUENCE.

 

COMPUTER SHIRO & DELL SILVER MOON

SHIROBANRYU & SHINY DELL SILVER MOON LAPTOP.

 

 

Wisconsin Citizens Media Cooperative

April 1, 2016 by Barbara With

There is mounting evidence that Hillary Clinton supporters have been sabotaging the Bernie Sanders campaign, and the trail leads to the Democratic National Committee and a “national security” think tank made up of current and former Clinton supporters, staff, and contributors.

In a March 30, 2016 videocast on YouTube (below), “Debbie the Sane Progressive” interviewed Stephen Coyne, a grassroots volunteer for Sanders, about state-level campaign directives that Coyne says sabotaged Sanders’ GOTV and canvassing efforts in Western Massachusetts.

Joe Caiazzo, Bernie Sanders Communications Director, and employee of Clinton Foundation's Truman National Security Foundation. Joe Caiazzo, Bernie Sanders Communications Director, and employee of Clinton Foundation’s Truman National Security Foundation.

In December 2015, the Massachusetts Sanders campaign hired Democratic strategist Joe Caiazzo as State Communications and Political Director. Coyne claims Caiazzo canceled their events, provided out-of-date voter roles, denied them canvassing material, and gave them orders to not open a campaign office. All of this worked against the best interests of the…

View original post 1,271 more words