MICROSOFT TRANSLATOR

DISCLAIMERS

Please be advised that this written work of mine is only THEORY. It's theorizing, pondering and amateur research. I have no belief in anything posted here because if I did I would have had legal action taken by now-until that occurs this blog can only be considered theorizing.

For years I've had here a disclaimer that says I'm often sleep deprived when posting due to my lifestyle as a houseless Traveler (and my age as well as health issues). This should be taken into consideration when viewing my posts and vids on the connected YouTube channel.

Forget David Icke..THIS Is The Secret Of How Our World Works!

Well..looks like Mr Show told the truth after all:



Tuesday, June 14, 2011

Cars With No Driver At Wheel-You Did Not Imagine That

Have you ever been terrorized by the perps freaking you out with a car that seems to have a passenger and no driver? Again to drive you crazy and make you appear mentally ill.

Found this article a month ago or so that claims that one of the major MIC (military industrial complex) contractors had created just that a few years ago.

http://en.m.wikipedia.org/wiki/DARPA_Grand_Challenge

Gang stalking is the means of silencing victim witnesses who know.too much or can testify against the MIC. The American public and.other countries are kept poor and in crisis while our taxes and other monies are collected and utilized to pay MIC contractors to manufacture these technologies and machinery for war allegedly.

This is how the scam works. And due to being able to use classified status the factions involved are basically exempt from law for the abuses that go on during actions supposedly in the interest of national security.

2 comments:

Anonymous said...

One piece of disinfo is that this whole operation started with a rumor, and kept growing and growing, until it became a massive operation. I know this is part of their mind game psy-ops. It has to be in reverse. Here is some "evidence" to back it up:

http://www.iahf.com/nsa/20010214.html

How The NSA Harasses Thousands Of Law Abiding Americans Daily By The Usage Of Remote Neural Monitoring (RNM)
John St. Clair Akwei
vs.
NSA, Ft. Meade, MD, USA

As of the early 1960's the most advanced computers in the world were at the NSA, Ft. Meade. Research breakthroughs with these computers were kept for the NSA. At the present time the NSA has nanotechnology computers that are 15 years ahead of present computer technology.

The NSA obtains blanket coverage of information in the U.S. by using advanced computers that use artificial intelligence to screen all communications, irregardless of medium, for key words that should be brought to the attention of NSA agents/cryptologists. These computers monitor all communications at the transmitting and receiving ends. This blanket coverage of the U.S. is a result of the NSA's Signals Intelligence (SIGINT) mission.

The NSA's electronic surveillance network is based on a cellular arrangement of devices that can monitor the entire EMF spectrum. This equipment was developed, implemented, and kept secret in the same manner as other electronic warfare programs.

With this technology NSA personnel can non-obtrusively tap into any communication device in existence. This includes computers, telephones, radio and video-based devices, printers, car electronics, and even the minute electrical fields in humans (for tracking individuals).

--------------
See? Their powerful computers they have can use AI software to know they are monitoring a target's communications.
----------------------------
A subject's bioelectric field can be remotely detected, so subjects can be monitored anywhere they are. With special EMF equipment NSA cryptologists can remotely read evoked potentials (from EEGs). These can be decoded into a person's brain-states and thoughts. The subject is then perfectly monitored from a distance.
----------------------
And OpenBSD has built its reputation as being the most secure operating system in the world. Could this fact be the reason the FBI paid developers to put back doors in (to monitor anyone at will)? They know companies and private individuals use OpenBSD when they are concerned about security. So you know the FBI must be up to something, when it's this direct and obvious and criminal. It's not even covert. Well, it wasn't until a developer exposed this under the table bribery by the FBI. And those reader comments were discrediting the whole story, like why would the FBI care about some private individuals when they are taking care of terrorists?

I know what I see. I know when I am being psy-opped and perped on newscasts. Some of these fuckers are so cocky and arrogant, they think they can get away with this shit because they have so much of the population under their control, and using them as an Army to do their dirty work against the target. So that's how I know. And of course the FBI does pull dirty tricks too, but who knows on whose behalf. That is the question.

Anonymous said...

Another for the "what the fxxx?" files.

http://articles.cnn.com/2006-08-17/politics/domesticspying.lawsuit_1_nsa-federal-court-eavesdropping-program?_s=PM:POLITICS

A federal judge on Thursday ruled that the U.S. government's domestic eavesdropping program is unconstitutional and ordered it ended immediately.

Attorney General Alberto Gonzales said the Bush Administration disagrees with the ruling and has appealed.

"We also believe very strongly that the program is lawful," he said in Washington, adding that the program is "reviewed periodically" by lawyers to determine its effectiveness and ensure lawfulness.

The administration secretly instituted the program after the September 11, 2001, attacks on New York and Washington. It gives the National Security Administration authorization to secretly conduct wiretaps without a court order.
--------------------------

Here, it appears you are proven correct. The Bush Administration even disagreed and said it was lawful and necessary (to carry out its agenda, supposedly).