Category: Guest Blogger

Mind Control Technology. Ultra Science Ins and Outs.

Whilst Mind Control may sound like Science Fiction… a recent FOI request beams a different approach. Documents reveal a deep and lasting series of Research Experiments designed to transmit… their thoughts… into your Mind. Controlled… or not… these of Our World Legends of a strange Science… are herein. The docs… the vids… Intel and more. gifcredit/thanks:thefreethoughtproject/giphy


Hypnotism and it’s related mechanisms and Tech…

…have been updated.

Our World Legends updated as well it seems.


A recent FOI Request provided documents which detail the strange Science of…

Mind Control Technology.

Ultra Science Ins and Outs…

… are covered by Guest Blogger Aaron Kesel;..

…with a repost from Thanks.



Accidental FOIA Reveals Mind Control Documents;

Here’s Further Evidence This Technology Exists:




By Aaron Kesel

Journalist Curtis Waltman filed a Freedom of Information Act request with the Washington State Fusion Center (which is partnered with Department of Homeland Security) to obtain information about Antifa and white supremacist groups; instead of getting information on how the agency targets the groups, he got way more than the information he was looking for – Curtis was accidentally sent a mysterious file with the label “EM effects on human”

The file included methods of “remote mind control,” MuckRockreported.




According to MuckRock, the mind control documents came from the Department of Homeland Security-linked agency in the form of a file called “EM effects on human”

The file reportedly contained various diagrams detailing the horrors of “psycho-electronic weapon effects.”




One document lists the various forms of torment made possible by using “remote mind control” methods, from “forced memory blanking” and “sudden violent itching inside eyelids” to “wild flailing” followed by “rigor mortis” and a remotely induced “forced orgasm.”

It was not immediately clear how the documents wound up in the agency’s response to a standard FOIA request, but there was reportedly no indication the “remote mind control” files stemmed from any government program.





According to Popular Mechanics, the documents are not official documents but are rather documents captured by the Fusion Center.

The federal government has absolutely experimented with mind control in a variety of methods, but the documents here do not appear to be official.

Waltman had no idea why these documents were included in his request and isn’t sure why the government is holding them. The WSFC did not respond to requests for more information.

The documents themselves are quite bizarre and, honestly, despite reports dismissing them, it is worth remembering that this is exactly what the CIA was working on for years during MKULTRA.

That program was supposed to have been shut down after the Church Hearings and other congressional hearings exposed all of the CIA’s clandestine activities at the time many that violated human rights including experimentation on patients and the American population without their knowledge.

Last year, it was revealed that mainstream science had caught up with the black project world (CIA) and had successfully weakened or strengthened particular memories from the brain or outright deleted inherited memories from mice, Activist Postreported.

There was a series of CIA mind control programs including BLUEBIRD, ARTICHOKE, MKULTRA, MKSEARCH and MKNAOMI during the ’50s to ’90s. The CIA sought to blank-slate test subjects wiping memories through drugs, electric shock, high-pitched sound and other torture techniques.

The Project Bluebird/Artichoke document below was kept hidden and under wraps and distracted from other subprojects in MKULTRA through Operation Dormouse for a reason; just read the documents it’s literally the CIA suggesting to create mind-controlled slaves that can covertly commit murder in the 1950s-’60s.




Although, many suspect that this project involved the South American plant derivative, scopolamine, a dangerous substance known as the “zombie drug.” Documents released only a few weeks ago in the JFK files suggest that the CIA was using electromagnetic weaponry to accomplish this goal.


Well, it started out with using electrodes on a subject’s brain, and I suspect it evolved into tapping into the brain’s own natural frequency over time as the Army documents details on Voice To Skull technology decades later.




In the mid-1950s, neurophysiologist Carl Wilhelm Sem-Jacobsen built his own EEG lab at Gaustad psychiatric hospital in Norway with copious funding from the Rockefeller, Ford, and other “charitable” foundations.  He soon took on multiple U.S. government contracts from the Air Force, Navy, and NASA for research using electrodes implanted in the brains of psych patients to carry out what many have said was unethical research.

These experiments melded over time and were continued under the auspices of a Project MKUltra branch and evolved to what was known as Project Artichoke.

Our government performed various unethical experiments on thousands of Americans for decades on the record exposed by the Church Committee. But before MKULTRA in 1947 the Navy and OSI conducted the first known post-war mind control program, Project Chatter, which continued the drug experiments of the Nazis.

Project Chatter was a highly classified Navy program to search for a truth drug that would get its victim to speak fast. They tested all types of drugs including barbiturates, amphetamines, and heroin. The studies involved “mind control” experiments by hypnosis and narco-hypnosis.

In 1953, Project Chatter was abandoned by the Navy for other projects like the Navy’s project “Perfect Concussion” which was Subproject 54 under MKULTRA. Scientists focused on testing ultrasound signals to create amnesia. In the documents, the Navy sought to create “Sub-aural frequency blasts” which means “below the ear.” Sub-aural frequency would indicate the potential usage of infrasound i.e. sonar.

Around the same time of Project Chatter, another compartmentalized group was running Project Moonstruck which sought to use electronic implants in brain and teeth for tracking, mind and behavior control, conditioning, programming, covert operations through Electronic Stimulation of the Brain, E.S.B. (Auspiciously the documents for Moonstruck are missing, only mere references can be found on sites archiving our history.)

The Army eventually founded Operations Third Chance and Derby Hat which both used LSD; other project names remain unknown though the existence of these programs is unquestionable.

The goals of MKULTRA were to break down human beings both physically and mentally, and modify and control their behavior as well as test chemicals on people for research purposes. These means included but were not limited to, hypnosis, chemical, biological and radioactive exposure.

President Bill Clinton was forced to apologize after parts of these programs were revealed to have been continuing after the Church Committee Hearings and they were caught running experiments on Africans under the Tuskegee experiment.

Dr. Ewen Cameron was partially backed by the CIA during project MKULTRA and used electrodes to zap the memories from his unwitting patients’ brains during the 1950s. This method of torture was called “psychic driving.”

After horrendous electric shocks, drugs were given to the test subjects to put them into days of prolonged delirious sleep. Cameron would then subject them to audio tapes he made in which he repeated certain phrases thousands of times with the hope of producing new personalities within them.

A 2012 lawsuit filed by veterans’ groups, against the CIA and the DOD, refers to Cameron’s methods. The suit also states that two researchers, Dr. Louis West and Dr. Jose Delgado, working together under the early CIA MKULTRA subproject 95, utilized two protocols: brain implants (“stimoceivers”) and RHIC-EDOM (Radio Hypnotic Intracerebral Control-Electronic Dissolution of Memory) to program the minds of victims.

Translation: they sought to bury memories, and implant false memories that never happened.

The CIA ultimately found that stress and sleep deprivation can make people more susceptible to false memories as have other researchers.

Although, the new documents are presumed to not be government documents, there are other documents released in 2006 from the U.S. Army Intelligence and Security Command entitled, “Bioeffects of Selected Nonlethal Weapons.”

The document is dated in 1998, over 15 years ago. One of the main topics regards the effects of “radio frequency directed energy.” The document discusses the “incapacitating effect” of “microwave hearing,” exactly like the new document describes.

There is no sound propagated through the air like normal  sound. This technology in its crudest form could be used to distract  individuals; if refined, it could also be used to communicate with  hostages or hostage takers directly by Morse code or other message  systems, possibly even by voice communication.

From that document, the technology is able to be tuned into a single person like a radio station.

The phenomenon is tunable in that the characteristic sounds and  intensities of those sounds depend on the characteristics of the RF  energy as delivered. Because the frequency of the sound heard is  dependent on the pulse characteristics of the RF energy, it  seems possible that this technology could be developed to the point  where words could be transmitted to be heard like the spoken word,  except that it could only be heard within a person’s head. In one experiment, communication of the words from one to ten using ‘speech modulated’ microwave energy was successfully demonstrated. Microphones next to the person experiencing the voice could not pick up the sound. Additional development of this would open up a wide range of possibilities.

Further, the paper discusses using this technology to disrupt neural control, which “activates specific forms of behavior such as sexual, aggressive, ingestive activities.”

Besides implanting memories, the military later attempted to create what it deemed Voice To Skull technology.

Voice To Skull is described in the patent as a “hearing system” where “Sound is induced in the head of a person by radiating the head with microwaves in the range of 100 megahertz to  10,000 megahertz that are modulated with a particular waveform.”

Similar psychotronic technology to Voice To Skull that wasn’t directly beaming frequencies into people but rather using radio stations to broadcast a signal outside of the human hearing range was used by the Pentagon, known as Silent Sound Spread Spectrum (SSSS) or S-quad. U.S. Psychological Operations officers tested this technology on Iraqi troops in Kuwait during Operation Desert Storm in 1991.

A news briefing detailed how American troops would take over the Iraqis’ FM stations and broadcast a silent signal underneath the audible programming:

The clandestine station programming consisted of  patriotic and religious music and intentionally vague, confusing and  contradictory military orders and information to the Iraqi soldiers in  the Kuwaiti Theater of Command (KTO). The size and power of enemy forces  was always intentionally exaggerated. Surrender was encouraged. According to statements made by captured and deserting Iraqi  soldiers, however, the most devastating and demoralizing programming was  the first known military use of the new, high tech, type of subliminal  messages referred to as Ultra-High-Frequency ‘Silent Sounds’ or ‘Silent  Subliminals’. (Newsweek, July 30, 1990, Page 61) Although completely silent to the human ear, the negative  voice messages placed on the tapes alongside the audible programming by  psyops psychologists were clearly perceived by the subconscious minds of  the Iraqi soldiers and the silent messages completely demoralized and  instilled a perpetual feeling of fear and hopelessness in their minds.

Then there is the suggestion of using Voice To Skull technology in Afghanistan under the moniker “Voice Of Allah” a few years back under the George Bush administration. That plan also included the broadcasting of a hologram image of what Allah was depicted to have looked like. Further, there was a plan years prior to do the same thing to other Arab nations.

The Gulf War hologram story might be dismissed were it not the case that learned that a super secret program was established in 1994 to pursue the very technology for application to PSYOPS.  The “Holographic Projector” is described in a classified Air Force document as a system to “project information power from space … for special operations deception missions. (Source: Washington Post)

Steven Corman, writing at the COMOPS journal, described his own encounter with this technology:

At  a government workshop some time ago I head someone describe a new tool that was described as the “voice of Allah.” This was said to be a device  that would operate at a distance and would deliver a message that only a  single person could hear. The story was that it was tested in a conflict situation in Iraq and pointed at one insurgent in a group, who whipped around looking in all directions, and began a heated  conversation with his compatriots, who did not hear the message. At the time I greeted this story with some skepticism.

Holosonic Research Labs and American Technology Corporation both have versions of directed sound, which can allow a single person to hear a message that others around don’t hear. Holosonic sells a technology called “Audio Spot Light” while ATC sells the Long Range Acoustic Device. DARPA also has its own sonic projector. Intriguingly, Strategy Pagereported that troops used LRAD as a modified Voice of God weapon:

It appears  that some of the troops in Iraq are using “spoken” (as opposed to  “screeching”) LRAD to mess with enemy fighters. Islamic terrorists tend  to be superstitious and, of course, very religious. LRAD can put the  “word of God” into their heads. If God, in the form of a voice that only  you can hear, tells you to surrender, or run away, what are you gonna  do?

CNET once reported on the technology, noting that users don’t hear sound through their ears but instead the sound resonates and reverberates inside the person’s head – except in that case it was used for advertising.

The folks who heard the ad for A & E’s TV show “Paranormal State”  emitted from a billboard in New York City’s Greenwich Village must have  thought it was pretty weird. As they walked into the targeted area they  were exposed to highly focused sound, picked up not by their ears, but  by their skulls. The otherwise inaudible sound waves are experienced via  bone conduction–the sound resonates inside the passerby’s head.

The use of mind control technologies was predicted as well in the military publication of Strategic Studies Institute of the U.S. Army War College, published in 1994.




There are also other patents –  (herehere here , here and here.)

And, finally, the most important patent entitled: “Thought transmission unit sends modulated  electromagnetic wave beams to human receiver to influence thoughts and  actions without electronic receiver.”

This is not science fiction. This is, to put it bluntly, mad science driven by insanity. These are declassified black projects or SAPs (special access programs.) Much of what the clear world or civilian population knows about military technology is severely underestimated despite the public nature of certain technologies like the heat ray and sound cannon. If you dig even deeper there is an old reference on the Army’s website for a technology called “Voice To Skull.” (ARMY SITE YANKED WIRED REPORTED) [ARCHIVED COPY OF ARMY PAGE]

Dr. Joseph C. Sharp completed the first successful test of auditory microwave technology which could bypass the ears and beam sound directly into a person’s head at the Walter Reed Army Institute of Research in 1973.

Sharp, strapped inside an isolation chamber, heard “words” beamed at him in a pulsed-microwave audiogram. (An audiogram is a  computerized analog of the spoken voice.) ARPA, now DARPA, researcher Robert O. Becker at the time foresaw “obvious applications in covert operations.”

Becker imagined barrages of “voices” driving an enemy insane, and post-hypnotic suggestion radioed to programmed assassin directing the test subject to kill its target. According  to Naval Captain Paul Tyler in a 1976 essay, “The Electromagnetic  Spectrum in Low-Intensity Conflict,” a “speed-of-light weapons effect”  could be achieved with “the passage of approximately 100 milliamperes  of directed frequency through the myocardium, leading to cardiac standstill and death.”

In 1975, a neuropsychologist Don R. Justesen, the director of  Laboratories of Experimental Neuropsychology at Veterans Administration Hospital in Kansas City, unwittingly leaked National Security Information when he published an article in American Psychologist on the influence of microwaves on living creatures’  behavior. In the article, he quoted the results of  an experiment described to him by his colleague, Joseph C. Sharp, who was working on Pandora, a secret project of the American Navy.

By radiating themselves with these ‘voice modulated’  microwaves, Sharp and Grove were readily able to hear, identify, and  distinguish among the 9 words. The sounds heard were not unlike those  emitted by persons with artificial larynxes (pg. 396).

Dr.  Milton Zaret, a leading microwave scientist was later recruited by  “Pandora,” a CIA project code-named for the study of radio-frequency-directed brain response he stated,

The CIA inquired whether I  thought electromagnetic radiation beamed at the brain from a distance could affect the way a person might act, and if microwaves could be used  to facilitate brainwashing or to break down prisoners under investigation.



It’s long been known that microwaves at certain frequencies can produce an auditory effect that sounds like it’s coming from within someone’s head. Then there’s the question of classified microwave work at Brooks Air Force Base which officials have refused to talk about.

In January 2007, Washington Postwrote on the same subject:

In 2002, the Air Force Research Laboratory patented  precisely such a technology: using microwaves to send words into  someone’s head… Rich Garcia, a spokesman for the research laboratory’s  directed energy directorate, declined to discuss that patent or current  or related research in the field, citing the lab’s policy not to comment  on its microwave work. In response to a Freedom of Information Act  request filed for this article, the Air Force released unclassified  documents surrounding that 2002 patent — records that note that the  patent was based on human experimentation in October 1994 at the Air  Force lab, where scientists were able to transmit phrases into the heads  of human subjects, albeit with marginal intelligibility. Research  appeared to continue at least through 2002. Where this work has gone  since is unclear — the research laboratory, citing classification,  refused to discuss it or release other materials.

Previous research in electromagnetic weapons has shown that low-frequency waves or beams can affect brain cells, alter psychological states and make it possible to transmit commands directly into someone’s thought process making them think it’s their own thoughts. In fact there is even a patent which suggests doing just that.

In the 1940s George Estabrooks, a Harvard University graduate, Rhodes Scholar and chairman of psychology at Colgate University, Canada, acknowledged conducting extensive  hypnosis work on behalf of the CIA, FBI and military intelligence creating Manchurian candidates.

He boasted to Science Digest in 1971: “I can hypnotize a man — without his knowledge or  consent — into committing treason against the United States.” Estabrook (Bowhart. Operation Mind Control.)

Eight years later,  it was reported that a “Man Hallucinates, Says Microwaves Are Murdering Him,” in the March 21, 1979, edition of the Los Angeles Herald Examiner and later New Scientist.  That man was electronics engineer Leonard Kille, who founded the Scientific Engineering Institute (SEI) on behalf of the CIA.

In  July 1968 at South Vietnam’s Bien Hoa Hospital, SEI teams had implanted electrodes in the skulls of Vietcong prisoners of war in experimental attempts to direct the behavior of brain-wired subjects by remote control.

Kille himself was a test subject of the electrodes implanted in his brain.  In 1971, a hospital attendant found Kille holding a metal wastebasket over his head in an attempt to “stop the microwaves.” A sympathetic doctor at Boston’s VA hospital, where Kille was transferred, ordered him “a large sheet of aluminum foil so he may fashion a protective helmet for himself.”

Not informed that Kille had electrodes implanted his head, the VA doctors diagnosed him as a delusional paranoid individual.

In 1965 The New York Timesreported obscure EMR experiments secretly funded by the government under the front-page headline: “Mind Control Coming, Scientist Warns.”  University of California psychology professor Dr.  David Krech is quoted warning, “EMR research may carry with it even more  serious implications than the achievements of the atomic physicists.”

Earlier, a 1963 CIA-issued manual on the study of Radio-Hypnotic Intra-Cerebral Control (RHIC) explained:

When a part of your brain  receives a tiny electrical impulse from outside sources, such as vision,  hearing, etc., an emotion is produced—anger at the sight of a gang of  boys beating an old woman, for example. The same emotions of anger can be created by artificial radio signals sent to your brain by a  controller. You could instantly feel the same white-hot anger without  any apparent reason.

Richard Helms oversaw military-oriented EMR research into the transmission of strategic subliminal messages into the aggregate minds of enemy populations. In a 1964 memo to the Warren Commission regarding the possibility that Lee Harvey Oswald had been a mind-controlled assassin, Helms outlined the existence  of “biological radio communication.” “Cybernetics science of communication and control theory that is concerned with  the study of automatic control systems, such as the brain and  mechanical-electrical communications,”

Helms admitted, “can be used in  molding of a child’s character, the inculcation of knowledge and  techniques, the amassing of experience, the establishment of social  behavior patterns … all functions which can be summarized as control  of the growth processes of the individual.”

A subsequent CIA directive, summarized in a brochure on “cybernetic  technique” distributed by Mankind Research Unlimited, an EMR study facility in Washington, D.C., detailed the deep state’s development of a “means by which information of modest rate can be fed to humans utilizing  other senses than sight or hearing.”

According to the brochure, the CIA’s cybernetic technique, “based on Eastern European research,” involved beaming information via radio frequencies to individual human nerve cells. The purpose, the directive stated, was for “the enhancement of a subject’s mental and physical performance.”

“Recently researchers from the University of Washington showed that they could send one person’s thoughts through a computer to control the hand motion of a person sitting half a mile away. The team first demonstrated this brain-to-brain connection was possible back in August 2013.

But now the researchers have put the technology through more rigorous testing and are close to making it usable in real-world scenarios,” Live Science reported.

Neuroscientists in France implanted false memories into the brains of sleeping mice in 2015. Using electrodes to directly stimulate and record the activity of nerve cells, they created artificial associative memories that persisted while the animals snoozed and then influenced their behavior when they finally woke up. MIT scientist also achieved the same result using mice in a similar experiment prior in 2013.

Meanwhile, Japanese researchers have developed a trick to implant false visions into people’s brains, altering the way they experience the world and potentially even the way they think.

In 2016, Dailymail reported that scientists had discovered a disturbing trick to plant false experiences into people’s brains.

As Huffington Postreported in 2014, “Mind control is becoming a reality,” in the clear science world, while black project scientists are far ahead of these advances as this article illustrates.

Knowing all this information and seeing all the cited times in history that a shooter has heard voices in their head, one has to question if all the shootings were legitimate or if some of them were deep state CIA operations. (See my article: “I HEAR VOICES: MKUltra? A Worrying Trend Of Mass Shooting Suspects Throughout History Before Committing Horrific Murders.“)

With the inadvertent release of suspicious files talking about mind control it seemed like no better time to put this article out. Will the disclosure of this technology allow for the acceptance that it exists rather than constant ridicule with tinfoil hats?

This entire article is cited to its teeth — your move CIA.

Electromagnetic Weapons are Being Used to Torture and Subjugate Countless American Citizens…:

Top image credit: Truthstream Media




The above discourse is of a Topic that infringes on many basic Rights.

Disguising fear as ignorance… many boo-hoo this Topic.


Science,.. in particular the Strange Sciences do lil’ to correct this mis-conception.

Intentionally… or not… unknown.


Technology has the Power to set us Free… or enslave.

A need for full and proper discourse and disclosure… obvious.

When such,.. revealed and open… Control is…

…shared by ALL those concerned.


Your Mind… and/or mine… deserve no less.

Tis Your Mind… after all.


Are You… still in Control.?.


Meditation… State of MIND changes, NDE, OBE, REMOTE VIEWING, Tunnel of Light… Balancing by Inner Gods. Our World LEGENDS. Join Shiro using Shamanic Concepts combined with Meditational Approach,.. with add-ons…add-ins as well. Mood music.



(… 😎 Late Admin Add-in… Recently in:

Economics and Finance Intel Report.


For… those with an… Interest in and of,..



Do You… Understand the inner Nature…

of Money.?. Yay… or Nay… here… then…


What Happens When A Hurricane Meets

Wind Turbines & Solar Panels:..


…may be of Interest Indeed.

In deed… and in fact… too.

To see where Yours and Public Monies…



Goeth and… Follow the… link…

to the Money… Trail thereof and therein.)


Till next…


The Isis On The Cake.

Behind the scenes of many world stories… lies INTEL. The reblog overview herein presents researchers with refs and more on how such as ISIS forms. Investigations lead into many avenues and Shiro has left these starting connections therein too. There are many who see more of the whys and hows. Some of them are herein. Truth hurts… perhaps indeed.


(Video Link)


The machinations of those behind several world events lie unseen in the world of Mass Media.

The following reblog overview… with all links and refs therein… may fill in some gaps.


In particular, the VT investigative crew has much to offer.


A chunk of raw INTEL… for researchers to indulge.

Historien om svikerne Gen. Allen og Petraeus og de terrorister de skapte…

Norsk pedofiliskandale knyttet til Bilderberger…

Norway pedophile scandal: Politicians, police reportedly among 20 arrested suspects

By GPD on November 21, 2016

Editor’ note:  Ties have been found to the Belgian/Netherlands PESN/Wiki pedophile groups tied to the Scalia/Hubertus/Bilderberger group whose data networks were managed by Sterling Allan, former Rense radio host.

At least 20 people have been arrested in Norway on pedophile charges, officials say, adding that the suspects include lawyers, economists and even a primary schoolteacher. Reports claim the case also involves politicians and a police officer.

Thirty-one people are also currently under investigation, Deputy Police Chief Gunnar Fløystad said.



Les resten:

Norway pedophile scandal: Politicians, police reportedly among 20 arrested suspects

Dommer Scalia myrdet etter Obama-møte (oppdatert)

Scalia Murdered After Obama Meeting (updated) | Veterans Today

Ex-CIA chief: Trump will usher in new age in US-Israel relations

MORE Islam (not less) can stop ISIS! -West Point study

Syria & Iraq War Report – November 21, 2016: ISIS Suffer Losses in Syria and Iraq

Russland kommer til å ta i bruk Iskander-raketter i Kalingrad “ekslave” på grunn av USAs missil-trussel

Russia to deploy Iskander rockets in Kaliningrad exclave over US cruise missile threat

Russland krever kriminaletterforskning av USA-støttet giftgassangrep på Syria

Russia Demands Investigation of US Backed Poison Gas Attack on Syria

US senators promise to act against Trump on Russia ties

UK Navy losing ability to deal with potential threats: MPs



UPDATED: Idlib ‘Gas Attack’ is same old BS as before

By Ian Greenhalgh on April 4, 2017

[Editor’s note: The sense of Deja Vu is overwhelming, this story is a full repeat of the ‘Assad used poison gas on civilians in Ghouta’ fairytale of 2013.

VT has thoroughly debunked that story, we exposed the role of Israel, Turkey, Qatar, Saudi Arabia, the Ukraine , the CIA and the Russian Mafia, all of whom had a hand in the supply of the gas to the Syrian “rebels” who were the ones who used it on innocent Syrian civilians.

The story that blamed it on Assad came from the Syrian Human Rights Observatory, a one man disinfo op in the suburbs of Coventry, England run by Rami Abdul Rehman. Once again, as in 2013, it is the tubby little liar Rehman and his SHRO that is behind the lies, once again the ‘Assad did it’ meme is being used to hide the true guilty party – the ISIS and FSA Mercenaries.

In 2014, Serena Shim stumbled upon a safehouse run by Jared Cohen and Google Idea Groups, a short distance from a border crossing into Syria between Hatay, Turkey and Aleppo province in Syria. In the safehouse were three Ukrainian secret service who had just buried a load of sarin gas shells from the Republic of Georgia. VT Bureau Chief and former US Army chemical weapons expert Jeffrey Silverman had followed the transit of these WMDs from Lugar Labs, a CIA facility near the Tblisi airport in Georgia. Silverman, working with TV network Russia24, VT and Russia Today, had exposed this facility, funded as a US Agricultural Research Station under the direct supervision of the US Army Biological and Chemical Warfare Facility at Fort Dietrich, Maryland.

Les resten:

Googles “Gas-man” Jared Cohen (mer nederst på siden)

———- Forwarded message ———-
Date: 2016-09-09 19:24 GMT+02:00
Subject: Fwd: Viktige nyheter, del 67 – USAs klarerte ruter for å forsyne IS med våpen

———- Forwarded message ———-


Date: 2016-08-30 17:33 GMT+02:00

Subject: Viktige nyheter, del 67 – USAs klarerte ruter for å forsyne IS med våpen



A tale of two traitors and the terrorists they created

By Ian Greenhalgh on April 6, 2016

… by Gordon Duff and Ian Greenhalgh

Never have two less qualified individuals, we are talking Generals Petraeus and Allen, duplicated what this pair has done.  “Honeytrapped” by allowing the “little brain” to think in place of the only slightly larger one located a short distance higher, each combined moral flexibility, inferior intellect and hubris.  These are the parents of the ISIS bastard child as much as anyone, no Saudi price, not madman Erdogan or scheming Netanyahu, not “Hanoi Songbird,” John McCain, Paul Vallely or Googles “Gas-man” Jared Cohen (recently outed in a Hillary email, now tying him to sarin deaths across Syria in 2012 and 2013).


Gen. John Allen, the US General compromised after being caught in an Israeli honeytrap along with CIA director Gen. David Petraeus. Allen & Petraeus were the senior US commanders during the Afghanistan and Iraq wars.
Today we seen another in a series of assaults on reason and reality in the propaganda war on Russia.  Reaching the bottom of the proverbial barrel, the UK Guardian constructs a polemic on Russian failures in Syria of all things, perhaps the first time a major nation state has effectively moved against terrorism, unless you want to count the US fiasco in Vietnam as a victory.

The Guardian runs to the Atlantic Council of all things, where, in March 2015, General John Allen, fresh from a resignation scandal tied to an affair with a Florida housewife/call girl/Mossad agent, is given control of America’s efforts in Syria.

As the real story progresses, Allen resigns in disgrace, again mind you, and the White House turns to Russia and Iran, awakened to the betrayal by the Atlantic Council, a cheap CIA front, and General Allen, longtime associate of his thinner clone, Petraeus, read “betray us,” also burned by sophomoric sexual antics.

One could note how America’s service academies, seeking out rubes, losers and mama’s boys, then promoting them beyond their already very limited capabilities, has left America defenseless.  One could point out how easy it has been for Israel to throw girls, boys, aging hags and even cross dressing arm wrestlers at the Pentagon’s endless supply of ass kissing nerds.  One could say that and more but we choose to take the high road, sure we do.

Petraeus with ‘Florida Socialite’ Jill Kelley, who befriended a number of top officers at MacDill Air Force Base in Tampa, played a starring role in the soap opera surrounding the extramarital affair of Gen. David Petraeus. Kelley received threatening emails from Petraeus’ mistress, Paula Broadwell, who appeared to perceive Kelley as a threat. Petraeus resigned as CIA director, and the FBI later discovered thousands of pages of email exchanges between the 37-year-old Kelley and Gen. John Allen, the top U.S. commander in Afghanistan, who once served at MacDill.

Three hundred million times two – a tale of two traitors

2007 – 300 million US dollars to Petraeus who then went into the prisons of Iraq and recruited individuals for 300 bucks a month to go to Ramadhi, become the command structure of the future ‘ISIS’ and split Iraq in two; creating an ‘Islamic State’ in the north where raping, looting and pillaging became the norm and where the cultural wealth, the oil wealth, almost anything of value that could be trucked north to Turkey was stolen on behalf of international corporations owned by the same group of criminals who control the intelligence agencies that blackmail generals and politicians into starting these conflicts.

Petraeus told us tales of creating ‘Sunni militias’; in reality, he created ISIS.

Petraus with Paula Broadwell, the author of the biography, “All In: The Education of General David Petraeus.” She was the woman in the extramarital affair that Petraeus cited as the reason for his resignation from the CIA.

2011 – 300 million US dollars to Allen who spent it all on TOW missiles and other US weapons which all ended up in the hands of IS.

Allen stood up in front of the entire world and said he had 50,000 trained ‘moderate’ Syrian fighters ready to go against ISIS. When it was admitted before Congress that the real number of fighters was only 46, Allen’s credibility struck an iceberg and was lost with all hands.

As for those 46 fighters – they immediately went off and joined ISIS. No doubt they proved useful in teaching the other head chopping mercenary scum how to use their shiny new American-made weapons.

Les resten (+ video fra retten):

A tale of two traitors and the terrorists they created | Veterans Today


Zombie Enabler David Petraeus Is Back (sort of)!

By Jonas E. Alexis on January 26, 2016

Whole lotta shakin’ goin’ on here.

Mr. Petraeus, if we are to “unleash America’s airpower in Afghanistan,” does that include passing substantial classified documents to mistresses? Please, proceed with your argument.

Whole lotta shakin’ goin’ on here.

…by Jonas E. Alexis

If you thought that zombie enabler David Petraeus was politically dead, then you will have to rethink things a little. After he was morally wounded in the Paula Broadwell debacle, after it was obviously discovered that this man was an agent working against the interest of America,[1] New World Order agents went work in order to rescue one of their saviors from political oblivion.

Keep in mind that Neocon shill Victor Davis Hanson of the Hoover Institution literally believed that Petraeus was a savior who could save the Iraq debacle.[2] Thomas Sowell of the same institution almost believed the same thing.[3] After the Broadwell debacle, those talking heads stopped mumbling about their dead savior.

Recently, the Washington Post has located Petraeus’ political corpse and sort of resuscitated him. NWO agents seemed to have realized this man can still be used as an asset. What is Petraeus’ recent fire-and-brimstone message? He shouts: “It’s time to unleash America’s airpower in Afghanistan.”[4] Well, who has been saying this for the last five years or so? The Neo-Bolsheviks, who had strong connections with Petraeus.[5] Petraeus is not kidding here at all:

“President Obama’s desire to avoid large new ground commitments in the Middle East is, in many respects, understandable, given the experiences of some 15 years of war.

“At present, however, the modest number of U.S. and coalition troops in Afghanistan operate with one hand tied behind their backs – at a time when Afghan forces, though fighting hard, are struggling. That should be changed. We should unleash our airpower in support of our Afghan partners in the same way that we support our Iraqi and Syrian partners against extremists.

“At present, U.S. and NATO airpower in Afghanistan is used only to attack validated al-Qaeda targets, to counter specific individuals or groups who have attacked coalition forces previously and to respond directly to attacks on coalition forces.”[6]



If we are to “unleash America’s airpower in Afghanistan,” does that include passing substantial classified documents to mistresses?[7] How can we know that Mr. Petraeus is not going to do the same thing? How can we know that he is not going to accumulate more mistresses?

If we have to talk about airpower in Afghanistan, let’s talk about the “kind of cat-fight stuff” with mistresses first.[8] Let’s talk about how America was betrayed in Iraq and Afghanistan. I am waiting for Petraeus to write an article at the Washington Post discussing how he allowed sexual weaknesses to destroy his military career and perhaps his family. Mistress Paula Broadwell wrote All In: The Education of General David Petraeus:

“As we [Petraeus and herself] talked during the run from the Pentagon to the Washington Monument and back, Petraeus progressively increased the pace until the talk turned to heavy breathing and we reached a six-minute-per-mile pace. It was a signature Petraeus move. I think I passed the test?”[9]

What test, Mrs. Broadwell?

In any event, Petraeus should really be ashamed of himself precisely because he has no right to tell the American people to continue perpetual wars in Afghanistan. Most Americans trusted this man to do a decent job in the region, but he ended up selling America to the Dreadful Few.

Les resten:



Jamey Johnson & The Blind Boys Of Alabama – Take The High Road

Live From Daryl’s House – “Boyfriend Jeans”


 Miks – Little Richard – Good Golly Miss Molly (Muhammad Ali’s 50th birthday)

Miks – Ry Cooder – Goodnight Irene

Trombone Shorty – St. James Infirmary – In Performance at the White House: Red, White, and Blues

Trombone Shorty,Blind Boys of Ala.#5″Down By The Riverside” @ Warren’s Xmas Jam 12/15/12

Al Green Gospel! None But The Righteous People Get Ready The Lord Will Make A Way I’ll Fly Away

UPDATED: Idlib ‘Gas Attack’ is same old BS as before | Veterans Today

4. apr. 2017 – The origin of the gas attack fairytale is the White Helmets, the fake … Rights Observatory, a one man disinfo op in the suburbs of Coventry, … In 2014, Serena Shim stumbled upon a safehouse run by Jared Cohen and Google …

Veterans Today endorses Donald Trump | Veterans Today

1. apr. 2017 – This guy knows how to make you an offer you can’t refuse. … Wall Street Journal: Jared Kushner has ties with Goldman Sachs and George …

The Treason Machine, How Israel and Turkey Nearly … – Veterans Today

10. mai 2016 – … penetrated and operated by Israeli intelligence, staged gas attacks in Syria killing thousands. … traced the sarin gas to a Hatay, Turkey safe house run by Jared Cohen’s Google Idea Groups, …. Exactly, very well put man.

Intel Drop, April Fools Day Plus One and We’re all … – Veterans Today

2. apr. 2017 – This is the gang that moved poison gas into Syria, ran assassination teams in Iran, … So Jared Cohen, who was then at State [now at Google], and I … General Michael Flynn is one of these, a man who went to war much as …

Exposing InfoWars and Israel | Veterans Today

7. apr. 2017 – The New York Times is now demonizing everyone who’s calling out the “sarin gas attack” false flag. According to the Times, only ?right wing …


Village People – Go West

(Agenda 21)

#IS #Bilderberger #Pedofili #Petraeus #GeneralAllen #USA #Folkemord #Obama #Stoltenberg


Jens Stoltenberg deltar på møte i lyssky klubb for makteliten – Nettavisen

1. jun. 2017 – Blant de 131 medlemmene i Bilderberg-gruppen er NATOs generalsekretær Jens Stoltenberg og politikerveteran og tidligere utenriksminister i …



Some interesting research points and avenues therein.

Thanks much for the overview to all those concerned.

Good luck with the gaining of knowledge.



Till next…


Top 20 Most Popular Hacking Tools.

Computers and THE IOT… have a Language… ALL IT’S OWN. SEEK AND SEARCH THE IT Our World LEGENDS with Shiro to sort out some useful tools indeed it seems. A TOP 20… WHITEHAT… Shiro STYLE. Scanning, testing, hacking tips galore.



hi and good wishes.
Thanks much for the info in the following post.
As admin of a ninja and Our World LEGENDS storytelling site…
…not IT adept.

e.g. many of the terms we see in the
IoT Threat reports and so forth…
are somewhat meaningless…

till such as this… explains.


TOP 20





Thanks again OP.
Will reblog to

via Most Popular Hacking Tools





In the world of cyber security,

there are many tools available on the internet;

many of them are free and others are not.


1. Aircrack-ng



Aircrack-ng is an 802.11 WEP and WPA-PSK keys breaking program that can resolve keys once enough information regarding the terms stolen. It executes the standard FMS attack alongside a few improvements like KoreK breach and additionally the all-new PTW attack, in this way making the assault much quicker contrasted with other WEP splitting devices. Actually, Aircrack-ng is an arrangement of software for evaluating remote systems.


2. sqlmap



sqlmap is an open source infiltration testing device that robotized the procedure of recognizing and abusing SQL infusion imperfections and assuming control of database servers. Full support for MySQL, Oracle, PostgreSQL, Microsoft SQL Server, Microsoft Access, IBM DB2, SQLite, Firebird, Sybase, SAP MaxDB and HSQLDB database management systems.

It accompanies an effective identification program, numerous corner elements for a definitive infiltration analyzer and an expansive scope of changes enduring from database fingerprinting, to other information getting from the database to getting to the basic record framework and executing orders on the working framework through an out-of-band network.


3. John The Ripper



John the Ripper is a free secret password cracking tool. At first it was created for the Unix working framework, it now keeps running on fifteen distinct stages (eleven of which are building design particular adaptations of Unix, DOS, Win32, BeOS, and OpenVMS).

It is a standout amongst the most mainstream watchword testing and breaking projects as it joins various secret word wafers into one bundle, autodetects watchword hash sorts and incorporates an adjustable. It can be keep running against different scrambled secret word organizations including a few sepulcher watchword hash sorts most usually found on different Unix variants (in view of DES, MD5, or Blowfish), Kerberos AFS, and Windows NT/2000/XP/2003 LM hash.

Extra modules have extended its capacity to incorporate MD4-based secret key hashes and passwords put away in LDAP, MySQL and others.

4. Nmap – Network Mapper



Nmap is a contraction of ‘System Mapper’, just like an exceptionally surely understood free open source programmers device. Nmap is utilized for system disclosure and security examining. Numerous framework administrators use nmap for system stock, open ports, overseeing administration update timetables, and observing host or administration uptime.

The apparatus utilizes crude IP parcels as a part of innovative approaches to figure out what hosts are accessible on the system, what administrations (application name and form) those hosts are putting forth, what working frameworks (and OS renditions and conceivable patches) and what sort and form of bundle channels/firewalls are being utilized by the objective.

Nmap keeps running on all real PC working frameworks, and authority parallel bundles are accessible for Linux, Windows, and Mac OS X. Notwithstanding the fantastic charge line Nmap executable, the Nmap suite incorporates a propelled GUI and results from viewer, an adaptable information exchange, redirection, and investigating apparatus, a utility for looking at output results, and a bundle era and reaction examination device.


5. THC Hydra



THC Hydra is another exemplary watchword splitting apparatus. Entirely speaking Hydra is a system login watchword splitting apparatus, which is very quick. An extraordinary element about Hydra is that you can add modules to expand the usefulness of this hacking instrument.

When you have to savage power break a remote association administration, Hydra is regularly the instrument of a decision. It can perform fast word reference assaults against more than 50 conventions, including telnet, FTP, HTTP, https, smb, a few databases, and considerably more. Like THC Amap this discharge is from the fine people at THC. Other online wafers are Medusa and Ncrack. The Nmap Security Scanner additionally contains numerous online savage power secret key splitting modules.


6. Burp Suite



Burp Suite is an incorporated stage that was fabricated to assault (pentest) web applications. The stage contains many hacking devices with various GUI interfaces that encourage and accelerate the procedure of assaulting an application. As ever, the apparatus is intended to have a similar outlook as a dark cap programmer would.

Burp Suite is a coordinated stage for performing security testing of web applications. Its different instruments work consistently together to bolster the whole testing procedure, from starting mapping and investigation of an application’s assault surface, through to discovering and misusing security vulnerabilities.


7. Cain and Abel



Cain and Abel (regularly abridged to Cain) is a secret key recuperation instrument for Microsoft Windows. It can recuperate numerous sorts of passwords utilizing techniques, for example, system parcel using so as to sniff, breaking different secret key hashes routines, for example, lexicon assaults, animal power, and cryptanalysis assaults.

Cryptanalysis assaults are done by means of rainbow tables which can be created with the winrtgen.exe project gave Cain and Abel. Cain and Abel are kept up by Massimiliano Montoro and Sean Babcock. Recording VoIP discussions, translating mixed passwords, recuperating remote system keys, uncovering secret key boxes, revealing stored passwords and breaking down steering conventions.

The system does not misuse any product vulnerabilities or bugs that couldn’t be altered with little exertion. It covers some security viewpoints/shortcoming present in convention’s norms, verification routines, and reserving components; its primary design is the disentangled recuperation of passwords and qualifications from different sources, on the other hand, it likewise sends some “no standard” utilities for Microsoft Windows clients.


8. OWASP Zed



The OWASP Zed Attack Proxy (ZAP) is a simple to utilize integrated penetration testing tool for finding vulnerabilities in web applications. The Zed Attack Proxy (ZAP) is currently a standout amongst the most mainstream OWASP ventures. This hacking and pentesting instrument is an exceptionally proficient and ‘simple to use’ program that discovers vulnerabilities in web applications.

It is intended to be utilized by individuals with an extensive variety of security experience and as being what is indicated is perfect for designers and useful analyzers who are new to entrance testing. ZAP is a mainstream device on the grounds that it has a ton of bolster and the OWASP group is truly an astounding asset for those that work in Cyber Security. ZAP gives robotized scanners and an arrangement of instruments that permits you to discover security vulnerabilities physically.


9. Maltego



Maltego is a computerized legal sciences stage that was made to convey a digital danger picture to the earth in which an association works. The one of a kind viewpoint that Maltego offers to both system and asset based substances is the accumulation of data posted everywhere throughout the web whether it’s the present arrangement of a switch balanced on the edge of your system or the present whereabouts of your Vice President on his global visits, Maltego can find, total and picture this data.

Maltego is a one of a kind stage created to convey an unmistakable danger picture to the environment that an association possesses and works. Maltego’s interesting leeway is to exhibit the many-sided quality and seriousness of single purposes of disappointment and in addition trust connections that exist presently inside of the extent of your base.


10. Metasploit



The Metasploit is much more popular tool. Cybersecurity allows a penetration tester and hackers to use this tool, its function is to seek the security of the network with making a vulnerability along with system also. What’s more, Metasploit likewise obliges productive administration and testing of Intrusion Detection Systems.

The most well known “division” of this ‘multi reason hacking device’ is the open source Metasploit Framework Project, ordinarily alluded to as essentially ‘Metasploit’.

This apparatus helps the client create and execute (known or generally) adventure code against a remote target machine. Numerous Metasploit clients utilize the apparatus for hostile to criminological and avoidance purposes, a large number of which are incorporated with the Metasploit Framework.




11. Wireshark



Wireshark is perhaps the best known ‘Programmers Tool’ out there. Wireshark has been around for quite a while now and it is utilized by a huge number of security experts to troubleshoot and break down systems. Wireshark is a fabulous programming and correspondences convention improvement and instruction. Initially named Ethereal, in May 2006 the task was renamed Wireshark because of trademark issues. It is free and open-source parcel analyzer.


12. Angry IP Scanner



Angry IP Scanner on the other hand known as ipscan is an open-source and cross-stage system scanner intended to be quick and easy to utilize. It examines IP addresses and ports and has numerous different elements.

It is generally utilized by system executives and simply inquisitive clients around the globe, including huge and little endeavors, banks and government organizations. It keeps running on Linux, Windows and Mac OS X, potentially supporting different stages too.


13. Nessus Remote Security Scanner



At odd times previously this software tool was much more popular simply by the demand of the hacking world. Currently this application source is unavailable for official but users can still use it for free, it usually works with a client-server system, it helps users to find out vulnerability, it has been used by more than  75,000 companies.

Nessus Security Scanner is the most famous of companies, Nessus helped many big companies to analyse their business proportional audit process which is efficiently cost saving.


14. Ettercap



Ettercap is a free and open source system security device for man-in-the-center assaults on LAN. It can be utilized for PC system convention examination and security evaluating.

It keeps running on different Unix-like working frameworks including Linux, Mac OS X, BSD and Solaris and on Microsoft Windows. It is equipped with blocking movement on a system section, catching passwords, and leading dynamic listening stealthily against various normal conventions.

Ettercap meets expectations by putting the system interface into a wanton mode and by ARP harming the objective machines. Along these lines, it can go about as a ‘man in the center’ and unleash different assaults on the casualties. Ettercap has plugin bolster so that the elements can be stretched out by including new plugins.


15. Wapiti



Wapiti is a web application vulnerability scanner tool allows you to audit the security of your web application through scanning the application and program of the web. It works by “black-box” types of scanning that will scan the webpages of the deployed web app but will not study the source code of the web pages and also from the web page, can scan it to inject data.




16. Nikto



Nikto Web Scanner is a Web server scanner that tests Web servers for dangerous files/CGIs, outdated server software, and other problems. It performs generic and server types specific checks. It also captures and prints any cookies received. The Nikto code itself is Open Source (GPL), however the data files it uses to drive the program are not.


17. SuperScan



SuperScan is a Powerful TCP port scanner, pinger, resolver. You can get improved host detection using multiple ICMP methods, TCP SYN scanning. Moreover, you will get a selection of useful tools (ping, traceroute, Whois etc).


18. Yersinia



Yersinia is a network security/hacking tool for Unix-like operating systems, designed to take advantage of some weakness in different network protocols. Yersinia is considered a valuable and widely used security tool. It presents a solid framework for analyzing and testing the deployed networks and systems.


19. Eraser



Most people have some data that they would rather not share with others – passwords, personal information, classified documents from work, financial records, self-written poems and the list continues. An eraser is a security tool for windows which simply allows users to remove sensitive data from their hard drive by overwriting several times with selected patterns.



20. Acunetix Vulnerability Scanner



Over 70% of websites and web applications contain vulnerabilities that could lead to data theft. Acunetix can be used to crawl your web page and automatically analyzes all your web apps and finds perilous SQL injection, Cross site scripting and other vulnerabilities that expose your online business.



Thanks much for the IOT Tech. explains above.

A TOP 20 indeed.



there’s this:




With the Christmas Season fast approaching…

and for those who online shop,..

the good folk at the MOZILLA FOUNDATION.


Have shared with Shiro… their GUIDE TO GIFTS.

(click)… Good Work indeed.




Till next…