1:22 / 16:17
1:22 / 16:17
Aug 17, 2017
The United States Government has a long and sordid history of using its own people as guinea pigs and unwitting subjects for experimentation, much of which was done without their knowledge or consent. Some of this came in the form of forced sterilization programs. This article describes a particular program aimed at Native American Indian women:
“During the late 1960s and the early 1970s, a policy of involuntary surgical sterilization was imposed upon Native American women in the United States, usually without their knowledge or consent, by the federally funded Indian Health Service (IHS), then run by the Bureau of Indian Affairs (BIA). It is alleged that the existence of the sterilization program was discovered by members of the American Indian Movement (AIM) during its occupation of the BIA headquarters in 1972. A 1974 study by Women of All Red Nations (WARN), concluded that as many as 42 percent of all American Indian women of childbearing age had, by that point, been sterilized without their consent. A subsequent investigation was conducted by the U.S. General Accounting Office (GAO), though it was restricted to only four of the many IHS facilities nationwide and examined only the years 1973 to 1976. The GAO study showed that 3,406 involuntary sterilizations were performed in these four IHS hospitals during this three-year period. Consequently, the IHS was transferred to the Department of Health and Human Services in 1978.”
You can read the declassified files here.
One of the darkest episodes in the history of the US Government, the Tuskegee syphilis experiment was a nefarious clinical study conducted by the US Public Health Service which began in 1932 and lasted all the way to 1972. The point was to study the natural progression of untreated syphilis in rural African American men who thought they were receiving free health care from the government. It involved knowingly giving the men syphilis without their knowledge, telling them they just had “bad blood”, then watching them as the disease progressed. The researchers (or perhaps better put, sadists) deliberately didn’t treat the men with penicillin which was found in the 1940s to be an effective cure for syphilis. Meanwhile, numerous men in the study died of syphilis, 40 of their wives contracted the disease and subsequently 19 children were born with congenital syphilis. If you feel angry reading about this, or shake your head in disbelief at the sheer level of evil involved, I don’t blame you.
You can read the declassified files here.
Human experimentation has not just been limited to the injection of diseases and sterilization. There have also been tests upon the population which have involved spraying entire areas with pathological agents (sometimes natural, sometimes manmade biological warfare agents). Two examples of this are Operation LAC (Large Area Coverage) and Operation Dew, both carried out by the US Army Chemical Corps in the 1950s, both of which involved dispersing tiny zinc cadmium sulfide (ZnCdS) particles (which were fluorescent) and plant spores (lycopodium) from an aircraft over much of the country. The goal was to ascertain the dispersion and geographic range of the sprayed agents. The Government said it was safe at first, but Wikipedia states that “according to the National Library of Medicine’s TOXNET database, the EPA reported that Cadmium-sulfide was classified as a probable human carcinogen.”
You can read some of the declassified files here.
Body snatching and experimentation upon dead bodies (cadavers) is also a documented fact when it comes to governmental crimes. During the 1950s, the US AEC (Atomic Energy Commission) and US Air Force conducted a study on the global health effects of fallout from nuclear weapons testing. The AEC wanted to learn more about how strontium-90 (a radioactive isotope of strontium) affected human tissue and bones, so they secretly collected (stole) over 1500 tissue samples from the bodies of dead babies and young children from around the globe – without consent. Project Sunshine was declassified in 1959.
All those who are still in denial over the reality of chemtrails, cloud seeding and geoengineering programs may want to take a look at this. Operation Popeye was a weather modification program in Southeast Asia (mainly Laos and Vietnam) from 1967 to 1972. The purpose was to aid US efforts in the Vietnam War. Specifically, it was a cloud seeding operation which aimed to extend the monsoon season (targeted over areas of the Ho Chi Minh Trail) by inducing rain over the “infiltration routes in North Vietnam and southern Laos” and therefore to “interdict or at least interfere with truck traffic between North and South Vietnam” – as written in this memo from the Deputy Under Secretary of State for Political Affairs (Kohler) to Secretary of State Rusk. Remember, this was the 1960s. Imagine what they can do today with HAARP and geoengineering.
The US and Iran have been on tense terms for a long time. In 1953, the US decided to target Iran with one of its now famous regime change programs to overthrow the democratically elected Mossadegh and replace him the puppet dictator Shah who was happy to give the US and UK a cut of the Iranian oil profits. Then, during the Iraq-Iran War of the 1980s, the US took the side of Iraq against Iran. Towards the end of the 1980s (July 3rd, 1988 to be exact), Iran Air Flight 655 (a commercial flight) was travelling along a standard flight path through Iranian airspace on the way to Dubai. Just a few minutes after taking off, it was shot down by the US Navy, killing all 290 people on board.
The Navy lied and stated they thought Flight 655 was an attacking fighter plane, and that they had attempted radio contact but received no response. However, declassified documents (here) reveal a different story. The truth was that the US only used emergency radio frequencies but not air traffic control frequencies, and also that the Navy cruiser registered the plane was climbing at the time, not descending as an attacking plane would be. Some of the files were declassified in 1988 and others in 1993.
This one is another shocking event in the annals of governmental crime, although in the case the perpetrator was the Japanese Government. Unit 731 refers to a covert biological and chemical warfare research and development unit of the Japanese Army located in China during World War II. Under the command of General Ishii, the Japanese committed war crimes and lethal human experimentation upon around 300 people, mostly Chinese victims (though there were some Mongolian, Russian, Korean and Allied POWs too).
At the end of the war, the Japanese were caught, but in a familiar tale, the US traded immunity for data (a common theme which also happened with Project Paperclip). The Unit 731 researchers were secretly given immunity by the US in exchange for the data they gathered through human experimentation. Wikipedia quotes Hal Gold on Douglas MacArthur (Supreme Commander of the Allied Forces), who wrote to Washington that “additional data, possibly some statements from Ishii probably can be obtained by informing Japanese involved that information will be retained in intelligence channels and will not be employed as ‘War Crimes’ evidence.”
You can read some of the declassified files here.
It was the war of a generation. It was a war of failure. It was a war that should never have been. It was a war that awoke a mass of peace activists across the US and the world. It was a war that produced swathes of soldiers suffering from PTSD. It was a war that killed millions.
The Vietnam War was brutal, and so was the deception that started it. LBJ, fresh from his role in the Kennedy assassination, decide to plunge the US into war in 1964 by “making shit up.” He claimed that the US ships were being fired upon int he Gulf of Tonkin, but it was an utter lie. In 2005 and 2006, NSA documents were declassified showing that the second Gulf of Tonkin incident, which was used as a justification for the Gulf of Tonkin Resolution (which led to the Vietnam War), never happened.
The Gulf of Tonkin incident is in many ways the epitome of government crime. The whole thing was entirely fabricated (lying, deceit). Although there was no enemy ship, it was designed to frame the enemy (false flag operation). It was only invented to start a war the New World Order already wanted (pretext for war). Then, the truth was hidden afterwards for decades and decades until finally it was decided that enough of the people involved were old, well out of office/power and dead, so that the truth could finally be revealed in 2005 (classifying the truth for 40+ years). The same is going on with other great crimes such as the JFK assassination and 9/11, although perhaps we will have to wait 100 years for all the files to be released with those events.
So much for human experimentation, war crimes and weather modification. For the last 3 declassified projects, we delve deeper down the rabbit hole into strange and mysterious operations, which although far out, are nonetheless proven to have taken place. Project Stargate was the codename for a secret US Army unit established in 1978 at Fort Meade, Maryland, by the Defense Intelligence Agency (DIA) and SRI International (a California contractor). The goal was analyze psychic phenomena (remote viewing, ESP, clairvoyance, astral travel, etc.) and see if they could be weaponized for military and intelligence purposes. The original founders of the program were Russell Targ, Hal Puthoff and Ingo Swann – nicknamed the “Psi Spies” by the late Jim Marrs. The Project had various predecessors and offshoots (such as Gondola Wish, Grill Flame, Center Lane, Sun Streak and Scanate) until 1991 when they were consolidated and renamed under the umbrella term Stargate Project. At one point, the late Major General Albert Stubblebine was in charge, the same one who was outspoken in exposing the 9/11 false flag op, and who was the husband of health and nutrition activist Dr. Rima Laibow.
The CIA terminated Project Stargate in 1995, deeming that it had provided no use. You can read the declassified files here.
There are some who can accept many parts of the worldwide conspiracy, but simply “can’t go there” when it comes to UFOs and ETs. If you or someone you know is such a person, take a look at this. Project 1794 is black-and-white proof that the US military, specifically the USAF (US Air Force), was developing UFOs or flying saucers. In 2012, the USAF revealed that its Aeronautical Systems Division had plans to produce a UFO craft in the 1950s. The craft vehicle was designed to reach speeds of Mach 4, an altitude of 100,000 feet and have a range of over 1,000 nautical miles. The project was abandoned in 1961.
You can read some of the declassified files here.
Finally, we come to one of the biggest and most exciting bunch of declassified documents – those of Majestic 12, also known as MJ-12 or MJ 12. This shadowy group was allegedly given the task of overseeing the “alien question” during the aftermath of WWII, the start of the Cold War and the aftermath of the 1947 UFO Roswell crash. Many researchers and whistleblowers have drawn the conclusion that MJ 12 was the core group within other groups that controlled access to extraterrestrial technology. Some of its members included famous people such as Vannevar Bush, who was also instrumental in the development of weather manipulation programs (as exposed by Peter Kirby in his research on what he calls The New Manhattan Project).
Respected UFO researcher Bob Wood (together with his team including son Ryan Wood, UFO researcher Nick Redfern, UFO researcher Stanton Friedman, Timothy Cooper, Jim Clarkson and the late Jim Marrs) has made a website with many Majestic docs available. You can read these MJ12 files here. They have they own system of rating the documents for authenticity.
Some governmental crimes are difficult to prove conclusively. We have a pretty good idea of what happened in the JFK assassination and on 9/11, but it’s difficult to prove every detail, since so many agents were involved and so many docs are still classified. However, there is little arguing with the declassified docs presented above. They are part of the record of historical fact. Therefore, they are a great thing to show skeptics and those stuck in denial. They are also very important pieces of evidence for those mysteries we are still yet to uncover. They function as clues pointing us in the right direction. If the Government was willing to kill its own innocent citizens to start a war with Cuba (Northwoods), to entirely fabricate an incident that never happened to start a war with Vietnam (Gulf of Tonkin) and to experiment on its own citizens no matter what harmed it caused them (MK Ultra, Midnight Climax, Tuskegee, forced sterilization, etc.), what lengths is it not willing to go to? Are there any limits at all on its behavior or capacity to harm?
Giving deep thought to that last question alone may help those wallowing in the Matrix to free themselves from the cognitive dissonance which entraps them.
Makia Freeman is the editor of alternative media / independent news site The Freedom Articles and senior researcher at ToolsForFreedom.com, writing on many aspects of truth and freedom, from exposing aspects of the worldwide conspiracy to suggesting solutions for how humanity can create a new system of peace and abundance.
Max Igan from Thecrowhouse.com returns to SGT Report to discuss the nature of reality and the rollout of the 5g Beast system. The goal of the 5g rollout is to create the internet of things, a nightmarish total control grid where just about everything you can imagine will be chipped and tracked, including you.
Max says, “The internet of things and the smart grid is blanket control of everything, monitoring of everybody, and underneath that is also the very real possibility of the weaponization of the airwaves because 5g technology is what they use for microwave cannons and active denial systems.”
It helped them conquer the world, three billion years ago.
Senior Lecturer in Biology, Brunel University London
Aug 7, 2017
Creating a huge global network connecting billions of individuals might be one of humanity’s greatest achievements to date, but microbes beat us to it by more than three billion years. These tiny single-celled organisms aren’t just responsible for all life on Earth. They also have their own versions of the World Wide Web and the Internet of Things. Here’s how they work.
Much like our own cells, microbes treat pieces of DNA as coded messages. These messages contain information for assembling proteins into molecular machines that can solve specific problems, such as repairing the cell. But microbes don’t just get these messages from their own DNA. They also swallow pieces of DNA from their dead relatives or exchange them with living mates.
These DNA pieces are then incorporated into their genomes, which are like computers overseeing the work of the entire protein machinery. In this way, the tiny microbe is a flexible learning machine that intelligently searches for resources in its environment. If one protein machine doesn’t work, the microbe tries another one. Trial and error solve all the problems.
But microbes are too small to act on their own. Instead, they form societies. Microbes have been living as giant colonies, containing trillions of members, from the dawn of life. These colonies have even left behind mineral structures known as stromatolites. These are microbial metropolises, frozen in time like Pompeii, that provide evidence of life from billions of years ago.
Microbial colonies are constantly learning and adapting. They emerged in the oceans and gradually conquered the land – and at the heart of their exploration strategy was information exchange. As we’ve seen, individual members communicate by exchanging chemical messages in a highly coordinated fashion. In this way, microbial society effectively constructs a collective “mind”.
This collective mind directs pieces of software, written in DNA code, back and forth between trillions of microbes with a single aim: to fully explore the local environment for resources using protein machines.
When resources are exhausted in one place, microbial expedition forces advance to find new lands of plenty. They transmit their discoveries back to base using different kinds of chemical signals, calling for microbial society to transform from settlers to colonisers.
In this way, microbes eventually conquered the entire planet, creating a global microbial network that resembles our own World Wide Web but using biocehmical signals instead of electronic digital ones. In theory, a signal emitted in waters around the South Pole could effectively travel fast to waters around the North Pole.
The similarities with human technology don’t stop there. Scientists and engineers are now working on expanding our own information network into the Internet of Things, integrating all manner of devices by equipping them with microchips to sense and communicate. Your fridge will be able to alert you when it is out of milk. Your house will be able to tell you when it is being burgled.
Microbes built their version of the Internet of Things a long time ago. We can call it the “Internet of Living Things”, although it’s more often known as the biosphere. Every organism on the planet is linked in this complex network that depends on microbes for its survival.
More than a billion years ago, one microbe found its way inside another microbe that became its host. These two microbes became a symbiotic hybrid known as the eukaryotic cell, the basis for most of the lifeforms we are commonly familiar with today. All plants and animals are descended from this microbial merger and so they contain the biological “plug-in” software that connects them to the Internet of Living Things.
For example, humans are designed in a way that means we cannot function without the trillions of microbes inside our bodies (our microbiome) that help us do things like digest food and develop immunity to germs. We are so overwhelmed by microbes that we imprint personal microbial signatures on every surface we touch.
The Internet of Living Things is a neat and beautifully functioning system. Plants and animals live on the ecological waste created by microbes. While to microbes, all plants and animals are, as author Howard Bloom puts it, “mere cattle on whose flesh they dine”, whose bodies will be digested and recycled one day.
Microbes are even potential cosmic tourists. If humans travel into deep space, our microbes will travel with us. The Internet of Living Things may have a long cosmic reach.
The paradox is that we still perceive microbes as inferior organisms. The reality is that microbes are the invisible and intelligent rulers of the biosphere. Their global biomass exceeds our own. They are the original inventors of the information-based society. Our internet is merely a by-product of the microbial information game initiated three billion years ago.
Some big corporations don’t want a free market. They want a protected market with barriers. Lawmakers seem hungry to regulate the Internet. It’s dangerous!
By Vin Armani
In this video, Vin Armani explains why you’ve been tricked into supporting net neutrality. Some big corporations don’t want a free market. They want a protected market with barriers. Lawmakers seem hungry to regulate the Internet. It’s a dangerous combination that infects most industries. Don’t let it happen to the Internet.
Vin Armani is the host of The Vin Armani Show on Activist Post, agorist entrepreneur and co-founder of Counter Markets. Follow Vin on Twitter and subscribe on YouTube. Get the weekly podcast on iTunes or Stitcher. Vin is available for interviews at email – Vin (at) VinArmani.com.
Net neutrality is the principle that the internet is free, open, and accessible, meaning internet users can access any sites they want, and internet service providers (ISPs) can’t block or slow down content and websites as they choose.
The Federal Communications Commission (FCC) wants to reverse net neutrality rules it passed in 2015, which prevent ISPs from blocking and prioritizing certain content online over others.
The public comment period ended on Monday and a one-month rebuttal period is underway. To date, 10.94 million filings have been made on the FCC’s site. This is a record number of comments made and is twice as many as in 2015 when the current rules were being discussed, according to CNET.
Who’s in favor of net neutrality?
Privacy rights groups, tech companies, and internet activists are against lessening regulations, fearing it will destroy what the internet is at its core, a free information source for everyone.
There are concerns that reversing regulations would damage innovation and the value provided by the internet. Government influence on access to information could also be an issue, as internet service providers could slow down websites or block ones they don’t agree with. ISPs are large donors in US politics.
The likes of Google and Apple support the regulations, fearing a rollback would give ISPs freedom to favor different content over others.
An umbrella group of tech companies, Internet Association, wrote a letter calling for “strong and enforceable net neutrality rules.”
The Electronic Frontier Foundation, along with 200 internet scientists and engineers, penned a 53-page comment highlighting their “fundamental understanding of what the Internet’s technology promises to provide… (and) how the Internet actually works.”
Who’s against net neutrality?
Telecom and cable companies want to get rid of regulations, saying they unfairly target internet providers, which leads to them not investing in broadband in rural areas.
AT&T and Comcast filed comments in support of rolling back the regulations. “We support the FCC returning internet access to the light-touch regulatory framework in place for more than two decades that kept up with the speed of innovation,” it said.
US President Donald Trump has criticized the 2015 rules, and FCC chair Ajit Pai, who was named to the post by Trump days after his inauguration, said he would consider overturning them. Pai says the regulations have led to reduced investment in network expansion.
The commission approved the proposal in May. It hopes to reclassify broadband internet service as information service instead of a telecommunications service.
The 2015 regulations invoked Title II of the Communications Act of 1934 to enable the FCC to oversee ISPs as “common carriers” and the internet itself as a public utility.
Pai told the Senate Commerce it “will make a full and fair review of the record.”
July 17, 2017
Following today’s breaking news about U.S. and international authorities taking down the competing Dark Web drug bazaars AlphaBay and Hansa Market, KrebsOnSecurity caught up with the Dutch investigators who took over Hansa on June 20, 2017. When U.S. authorities shuttered AlphaBay on July 5, police in The Netherlands saw a massive influx of AlphaBay refugees who were unwittingly fleeing directly into the arms of investigators. What follows are snippets from an exclusive interview with Petra Haandrikman, team leader of the Dutch police unit that infiltrated Hansa.
Vendors on both AlphaBay and Hansa sold a range of black market items — most especially controlled substances like heroin. According to the U.S. Justice Department, AlphaBay alone had some 40,000 vendors who marketed a quarter-million sales listings for illegal drugs to more than 200,000 customers. The DOJ said that as of earlier this year, AlphaBay had 238 vendors selling heroin. Another 122 vendors advertised Fentanyl, an extremely potent synthetic opioid that has been linked to countless overdoses and deaths.
In our interview, Haandrikman detailed the dual challenges of simultaneously dealing with the exodus of AlphaBay users to Hansa and keeping tabs on the giant increase in new illicit drug orders that were coming in daily as a result.
KrebsOnSecurity (K): Talk a bit about how your team was able to seize control over Hansa.
Haandrikman (H): When we knew the FBI was working on AlphaBay, we thought ‘What’s better than if they come to us?’ The FBI wanted [the AlphaBay takedown] to look like an exit scam [where the proprietors of a dark web marketplace suddenly abscond with everyone’s money]. And we knew a lot of vendors on AlphaBay would probably come over to Hansa when AlphaBay was closed.
K: Where was Hansa physically based?
H: We knew the Hansa servers were in Lithuania, so we sent an MLAT (mutual legal assistance treaty) request to Lithuania and requested if we could proceed with our planned actions in their country. They were very willing to help us in our investigations.
K: So you made a copy of the Hansa servers?
H: We gained physical access to the machines in Lithuania, and were able to set up some clustering between the [Hansa] database servers in Lithuania and servers we were running in our country. With that, we were able to get a real time copy of the Hansa database, and then copy over the Web site code itself.
K: Did you have to take Hansa offline for a while during this process?
H: No, it didn’t really go offline. We were able to create our own copy of the site that was running on servers in the Netherlands. So there were two copies of the site running simultaneously.