Kategorie: TimeStealing-TimeCloaking-SecretSpaceWarfare

  • Emery Smith – Ex-Space Programm Whistleblower berichtet über seine Begegnungen mit Aliens und UFOs


    Conspiracy Revelation: 1.10.2019: Bringt das Thema voll in die Öffentlichkeit, genau das will das NWO-Verbrechersyndikat verhindern…gab schon wieder einen Cyberangriff und ein kybernetischer Interventionssabotageversuch, u.a. wegen diesem Thema.
    „Er sagt, dass es am effektivsten ist, die Selbstheilungsprozesse des Körpers zu aktivieren.“
    „So with a small amount of blood that we take from you, we can and concentrate a small amount of concentrating healing properties and inject them into the brain, into the joints and when you have a concentrated amount of your own proteins, your body knows there’s an excess amount and it speeds up the healing twice as fast.“
    „Man benutzt das Blut im Sinne einer Eigenbluttherapie.“
    „Everywhere, all of you, even in Germany, are using the Genesis concentrating system which I invented, I don’t own it anymore but um as if 3 years ago but I’ve been I developed it
    in around in year 2000, 1998-2000 and from there..got it FDA approved and now it’s sold everywhere in the world
    and I’m published at all the major universities here at the US and the military is also using it.“
    „The craft was separate from the body, the body was in the bio- research facility and the craft was in another research
    facility nearby.. 1992-1993.. the reason the surgeon brought me to the crack is we had to take a sample of the craft because the craft has DNA that matches the DNA of the person who was flying it.“
    „The craft was alive.. we noticed that craft when we go to crash-sites on crash retrievals, the craft are sometimes organic and conscious and the craft sometimes tries to
    heal itself once it it crashes and it also, at the same time, is trying to heal the occupants.“
    „They don’t want me talking about stem cells or teaching you how to cure yourselves, they don’t want me talking about zero point energy or free energy devices. If I talk all day about extraterrestrials and underground facilities, because there’s no money being made for me talking about
    extraterrestrials and underground facilities they do not want me talking about the other inventions and stem cells and zeropoint energy.“
    „The Technology is being repressed… to bring technology to the world that was kind of secret, but they wouldn’t let me
    and it was very hard to do. I was lucky to get this this cell concentrator out to the world, much less newer technologies, because Big Pharma was very aggressive with me with new
    technologies.“
    „Many, many different kinds of technologies..my favorite technology is, they have a special bed…it’s just a big flat bed, like it’s like the size of a pool table and when you lay somebody on the bed ..it shifts the holografic image above the body of your whole body…everything…and I can grab the visual and I can zoom in all the way to of your cells. I can locate the cancer in the body..I can send a frequency in to the body on the table just stereo-tactically to that area and eliminate those ten cancer cells…“a specific frequency you can heal…“..it’s coming out, slowly you know ever since I came forward a couple years ago they’re slowly releasing more and more this information and corporations are anxious to get a hold of it so they’re inquiring as well because most of the big corporations get most their stuff from the secret projects, little by little.“
    „so, yes, they’re using frequencies, you’re using scalar interferometry, they’re using harmonics to accomplish
    this…it gives off a different frequency on your own red blood cell…your body as a whole the two trillion cells then are vibrating, all the cells are vibrating and you give off
    one frequency but if you take a cell off of you
    it has its own frequency but working together all the cells make up you which is one ecosystem and one frequency that
    is measured by the you know secret government, so they know where you’re at all the tim,e because your body has a
    fingerprint frequency.“
    „Through my experience I would not have any negative extraterrestrial contact, I only had positive contact, so I am not saying there is not negative out there, because I know there is species that is really bad in the Universe.“
    „I don’t speak German, I have German DNA, I have Indian DNA, in the Universe all the extraterrestrials also intermingle,
    there’s no 100% pure anything, we are all muds, because they came from us.“
    „It´s all about education…we should educate..“
    „Emery Smith – Ex-Space Programm Whistleblower berichtet über seine Begegnungen mit Aliens und UFOs“
    „Im Zuge des 6. Kongresses der vereinten Wissenschaften erzählt uns Emery Smith etwas über seinen Begegnungen der 3ten Art . Er ist ein Veteran der US Air Force mit einer langen Geschichte von Einsätzen in hoch-klassifizierten, tiefschwarz verdeckten Operationen. Er war direkt an der Autopsie und Entnahme von Gewebeproben von über 3000 verschiedenen Arten von Außerirdischen beteiligt. Darüber hinaus habe er persönlich mehrere abgestürzte UFOs im Besitz des Militärs gesehen und deren Zusammensetzung und Einsatzmerkmale untersucht. Es gibt viele faszinierende und direkte Zusammenhänge zwischen Emerys Aussagen und denen anderer Insider, Forscher und Autoren. Er ist ebenfalls in dem Film „Sirius“ und Cosmic Disclosure für Gaia TV erschienen.“

  • Randy Cramer – Super Soldiers. Moon Bases And Mars.


    „Randy Cramer – Super Soldiers. Moon Bases And Mars.
    3.253 Aufrufe•Am 23.06.2019 veröffentlicht“
    „Created A genetically engineered super soldier from the ground up…mostly this is a nocturnal event, where I go to sleep and someone comes into my bedroom via
    localized wormhole technology with some people often refer to as a teleportation technology but you know it’s not exactly like transporter beam so because there’s
    a little portal or a door that has to come open that kind of specify that it’s localized wormhole technology, so one or two people would come through, wake me up,
    escort me through and we would do whatever the training situation was that particular evening now I know it starts to throw a curveball at people when you
    say time-travel as a factor because a lot of people are like: wait a minute, we don’t have that, you know, the Nazis were working on that technology in the 40s, we
    were working on the tech technology in the 40s, so we’ve really been cracking the time travel technology code for decades, it is absolutely some of the
    most classified and compartmentalized technology of all the covert technology, so even among people in the covert space program, the guys in Time Corps who have
    access to the really good time-traveling equipment and…have the time travel maps and have it all mapped out and everything that’s a whole other level
    of secrecy and a whole another level of what’s going on that I know very very little about other than that it exists and the military sections rely on the
    time corps guys to do all that plotting, so anytime you’re transporting personnel vehicles and so forth and there’s a time factor, just like … when you’re in
    a plane you report to the FAA that you’re going somewhere you file a flight plan you do the same thing with the time Corps time or plots are all out on their
    equipment and then…gives you instructions where and when and what way you go and get there and what time frames are allowed to use and how you’re
    able to bend a new time, so that for instance in one singular evening, where as often is the case this occurs between 2:30 and 4:30 a.m. and it is a
    consistent thing. I know a lot of other people who have military abduction experiences and it’s very consistently between like this sort of
    2:30, 3:30, 4:30 a.m. timeframe that lets say..someone comes in at 3 a.m. and then I come back at 3:15, but I’ve been away for a week, 10 days,
    because that was the training period and the time corps guys like I said they plotted that course, so that’s called a quantum dilation when you have that
    extension of time that essentially gets crammed into a shorter frame of time when you’re talking about your main timeline that’s called a quantum
    dilation. (Randy Cramer)“
    „But if I’m to understand the value of that integral of that solar inner solar intergalactic economy the
    covert military space program covert military Mars colony corporations that work there making trillions and
    trillions and trillions of equivalent dollars per year in all of that material so the notion that somehow down here on earth we are poor and we don’t have enough to help feed everybody and we don’t have enough to take care of everybody – it’s garbage – .. the planetary economy itself would be enough if we evened it out but when you include the intra solar in a galactic economy it’s ridiculous we can all be living like princes with if that wealth was you know evenly distributed around the planet which I’m not saying to evenly distribute all the wealth I’m
    saying that to make it so so much of it is concentrated in this very very tiny part right right to say the rest of us there’s scarcity and we don’t have enough for you it’s just lies on top of damn lies. (Randy Cramer)(2019)(23.6.)“
    „yeah… I understand..“
    „Sixteen squads of sixteen person else like 256 soldiers in that division we had a sister division Oh 97 another 256 soldiers plus officers and …other personnel so the division itself is much larger than 256 but the soldier base for each division of the special tactical operations division is 256 people so us our sister division two others supporting division so it was just over a thousand men and women soldier personnel on the ground that engaged in this battle which went very badly for us you’ll forgive me if I brush over some of it I don’t really like talking about it it gets me choked up and emotional and I don’t like you know remembering it too clear because it was an ugly ugly ugly massacre where there were just over a thousand of us that walked into that cave and less than thirty five of us came out of that cave and so uh…I feel very fortunate in ways that I cannot I cannot even describe how fortunate I feel to be alive knowing you know just that particular day what the odds were that I was not going to be alive at the end of that day given what the odds were that not everybody else was going to be alive game of that day and that I still am being alive at the end of that day is nothing less than miraculous to me. (Randy Cramer)(2019)(23.6.) “
    „Why were you going into the cave..?“
    „We were informed that it was we were after an artifact when I say artifact that just means anything that belongs to the native Reptoids or insectoids that could be a piece of technology it could be a piece of pottery it could be a statute could be a clay tablet or a metal you know cylinder that has inscription on it or something it could be a personable material it could be persons it could be a weapon technology or anything so when they say an artifact that’s a list of things that an artifact could be so okay given a location we were told where we needed go we were told where the entrance of this particular cavern was that this was a known sacred location for these reptiles and they kept this particular artifact in this location and that it
    was somehow going to be vulnerable for us to go get it but when we got there was no sign of anything. (Randy Cramer)(2019)(23.6.)“
    „They were jamming the localized wormhole technology that would have been able to sort o… get out, so a large wormhole that they used to sort of transport ships or vehicles through sort of appeared right over the top of us and pulled us right through it and a few people were caught on the event horizon of that and so they were like essentially limbs cut off or cut in half and so we ended up on a medical receiving platform you know with a bunch of people lying on the ground bleeding coming apart a few people standing shocked you know trying to look around
    and try and figure what was happening and all I could do was look down at you know my comrades who were bleeding out to death and calling for medics and kind of had a nervous breakdown you know I kind of wasn’t cool with all of this and and and really just kind of lost it and started swinging my arms pretty wildly and… knocked a couple orderlies .. in the head and the next thing I know like I’m just being tackled by medical technicians and… shot… with tranquilizers, so that …I just kind of faded into black from that experience and woke up in a chemical fog. (Randy Cramer)(2019)(23.6.)“
    „People want to hear that people wanna hear stories… we’re a ceature who loves stories.. we have been telling stories about our collective experiences since time
    immemorial, so people want to hear the stories, they want to know from the person who was there and they want to hear about that, I get it. I just want to emphasize though that this isn’t about me this isn’t about my story, I’m not doing this to get a bunch of personal attention, because I want personal attention I’m not doing this, because I want to sell a bazillion books
    on my story and I want to you know make a bazillion dollars off this that’s not why I’m doing this I am telling my story to gain attention towards the things that are much more important than me and my story which are the fact that we have a Mars colony, a lunar colony, a lunar space station, a covert military space program which is collectively holding on to technology which would have all the green energy technology we need all the clean air clean water renewable fuels technology we would never have to.. drill or frack ever again …we’d be able to clean all of our water clean the air we’d never have to worry about the environmental degradation that we’ve been going through we will have a cleaner process for everything the fact that we have that technology that it’s not a like I said it’s not 20 years of investment and R&D; to get there we have it it’s just a matter of getting it from the programs that have it in order to
    solve this problem so I’m not here to talk about me really I’ll tell my story I’m happy to share but what I really want to emphasize is I’m here so we can blow the lid off of secrecy, hello, let’s get through disclosure let’s get there because then we can actually fix some problems …then we can actually have clean green technology will never have to burn fossil fuels again and we will never have to have another airplane crash ever again, because we won’t have jets anymore , we’ll have vehicles that are traveling on magneto-gravitic-propulsion drives and glide through the air safely, fast and more cheaply that’sthe other interesting thing is that the technology in these programs to build spaceships is actually cheaper than the
    fuel and building jet engines the medical technology that can restore damaged limbs and regrow damaged organs is cheaper and less expensive than all of that pharma research and development
    and all of that making drugs and all of this invasive surgery technology all this other medical expense that we’re spending on is gargantuanly out of control as far as expensive all this other
    cheaper better medical technology is cheaper faster easier so why would we be doing something that’s ineffective expensive wasteful polluting when we have all the options of doing things
    cleaner better cheaper because we got there just there we just have to get those programs so that’s the main thing that I’m here to say it’s like this isn’t just about pipe dream hey we
    should talk about this hey maybe someday know you’ve got this technology you we got in these programs we need to get them to the public sphere so that we can fix the problem I mean we wouldn’t have to be sitting around fighting and screaming at each other about climate change if we could just fix some of the problems that are contributing to that we can fix some of the pollution
    problems we can fix some of the air and water and air quality ozone layer problems or technologically fixable so that’s one thing the second thing that is the most important thing is these
    programs who are acting covertly would like you to believe that they are operating under the covert operations law and that they are legal operating systems of covert military intelligence
    this is not the case they are violating article 1 of the Constitution they are violating the Constitution by not answering to the authority of the legislature and the executive branch and
    the supreme court, so by essentially not answering to the legal apparatus of government in this country they are acting illegally, they are rogue agencies, they are not legal, they are not in the legal authority to say: hey we can do whatever we want, they are criminals. (Randy Cramer)“
    „It is in danger because of this rogue criminal covert system, so we have the technology to fix everything, that’s one, it’s in these covert programs which are acting illegally. (Randy Cramer)“

  • Thomas Jefferson: President, Founding Father, Hemp Pioneer & Hemp defeats Mind Control

    „Politics
    Thomas Jefferson: President, Founding Father, Hemp Pioneer
    James McClure
    Apr 14, 2017
    Before becoming the third U.S. president, Thomas Jefferson – who was born 274 years ago this week – was an industrial hemp cultivator, growing acres of marijuana’s non-psychoactive cousin on his Monticello plantation.
    Jefferson wrote extensively about best cultivation practices for hemp during his life, he invented a tool to improve hemp harvesting, and he even left us with a statement on hemp that has become a rallying cry for the movement to legalize hemp, which was prohibited along with marijuana back in 1937.
    „Hemp is of first necessity to the wealth and protection of the country,“ Jefferson once reportedly said. That’s because it was used to make rope, sails and other textiles that were essential for keeping colonial America’s navy afloat.
    And Jefferson wasn’t the only commander-in-chief to cultivate hemp. President George Washington also grew acres of it at Mount Vernon. And he referred to cultivation practices over 90 times in his personal diaries.
    „I am very glad to hear that the Gardener has saved so much of the St. foin seed, and that of the India Hemp,“ Washington wrote in 1794. „Make the most you can of both, by sowing them again in drills. . . Let the ground be well prepared, and the Seed [St. foin] be sown in April. The Hemp may be sown any where.“
    Ironically, both Washington and Jefferson would be arrested today if they were caught growing hemp in one of the 20 states where it is still illegal. Those include Texas, Florida and New Jersey. But their home state of Virginia legalized hemp cultivation back in 2015, so they would still be allowed to grow it in Mount Vernon and Monticello — unless Attorney General Jeff Sessions raided them for defying federal cannabis prohibition.
    And if anything sums up just how absurd America’s cannabis laws are, it would be the sight of two founding fathers getting cuffed and hauled away by DEA agents for growing a harmless plant.“
    Source: https://www.civilized.life/articles/thomas-jefferson-and-other-founding-fathers-on-hemp/
    „Cannabis Paste BREAKS MIND CONTROL.
    ‚Doc‘ Peter has been sharing the truth that cannabis restructures new pathways in the brain so that they can’t control your mind when you are taking the healing cannabis paste. …They stifled cannabis in 1937 because they did not want 300 million people being conscious.
    August 12, 2003) – According to Cathy O’Brien, a former mind-controlled sex slave for the gov, they would let slaves take all the drugs they wanted, except marijuana. Why? Because marijuana usage made it impossible to mind control them. It doesn’t allow for the compartmentalization of the mind to take place. Since I heard her say that on a video a few years ago, I have understood the „war“ on drugs in a little different way. I think you might find this of interest!
    „Marijuana Disrupts Mind Control Programming: 60.667 Aufrufe“
    „Enjoy doc peter’s link on the healing medicine from mind control and other issues– doc’s paste link at; https://hemppastehealing.com“
    //
    Conspiracy Revelation: 5.9.2019: Nothing new…but the rigged Casino ShadowGov Mafia losers want to make sure to have everything under their rigged and implanted rules, keeping the world in a truman-show-retardation-loop…fearful and cowardly…if they were manly they wouldn´t need tons of traps, implants, bioweapons, predictive weaponized artificial life forms and intelligence, mind control, remote brain espionage, directed energy weapons, brainwashing, mass-hypnosis, neuro-weaponized remote torture, pre-time traveled presidents, totalitarian invasions and complete media censorship, weaponized satellites and asymmetrical warfare…a club of losers in front of the highest holy forces…people who went through this understand exactly why I wrote what I wrote in this harsher form…no respect for these dregs from the bottom of the pit that ruined and/or sabotaged millions of innocent lives in the most cruel and stealthy way.

  • ALCYON PLEYADEN 82 – NACHRICHTEN 2019: ORGANHANDEL, GLOBALER BLACKOUT… BIOPHOTONEN, UFOS"


    „ALCYON PLEYADEN 82 – NACHRICHTEN 2019: ORGANHANDEL, GLOBALER BLACKOUT… BIOPHOTONEN, UFOS“


    „ALCYON PLEIADES NEWS REPORT 82 – 2019: Organ trafficking, Mass blackout, …Biophotons, UFOs“

    News Alcyon Pleiades
    Am 06.06.2019 veröffentlicht
    http://alcyonpleiades.co.uk
    As can be understood by watching the Alcyon Pleiades videos, we are living the most critical moment in the history of mankind, as the planet is in a transformative phase; an extreme change that has never been seen before… and this is also being accompanied by the arrival of large quantities of photonic energy producing an awakening, a profound change, a genetic mutation in people, whilst a myriad of global events, geopolitical, governmental, religious and social changes are taking place everywhere, which are necessary for the deactivation and removal of the elite and their allies of the visible and shadow government, as well as the Alien usurpers who are fighting to keep hold of our planet.
    With these videos we hope to open peoples eyes to the many events that surround us, which the traditional media sources hide from us or misreport, to raise awareness to the natural and climatic imbalances, the increasingly dramatic and critical social situations, the warmongering, crisis and conflicts throughout the planet… Also, the hidden conspiracies and plots, the increasing number of UFO sightings and other subjects, all of which are explained in more depth in the Alcyon Pleiades videos.
    We will continue to periodically report to our followers using a compilation of of news articles, interviews, headlines and documents that will help us to become more aware of the times in which we live.
    Video created by Alcyon“

  • ANALYSIS OF THE ALL SEEING INTERNET EYE / Asepuforensics.blogspot.com 2008 Retro View NeoStormSystem

    Conspiracy Revelation: 23.8.2019: My 2008 IT Forensics Conspiracy Revelations concerning the global NWO Lockdown…11 years ago and more relevant than ever..
    BTW..We know that it is largely the way how the NSA-Tailored Access Operations communicate…who else would use such extreme means to subvert the entire globe…but what are these Crime Syndicate Nazionists against the True God and the True Goddess…they will get shown their limits…and will become restricted in their expansive evilness and their unlimited power hunger by revealing everything of their criminal conspiracy to take over the world.
    „ANALYSIS OF THE ALL SEEING INTERNET EYE
    MORE AND MORE PEOPLE NOTICE THAT THERE IS SOMETHING HIDDEN, SOMETHING THAT SEEMS TO CONTROL OR SURVEY THE WHOLE INTERNET. ANTIVIRUSES AND FIREWALLS REMAIN QUIET, OPERATION SYSTEM LOOKS CLEAN BUT WHEN YOU START ANALYZING INTERNET TRAFFIC SOMETHING BECOMES REALLY ODD AND IT SEEMS AS YOU ARE WATCHING INTO A GLOBAL PANDEMIC SURVEILLANCE SYSTEM. THE ALL SEEING INTERNET EYE.“
    Also check my immense -world record setting- amount of unreal conspiracy revelation work in the archives during the last 20 years..maybe it helps people to bring the Uber-Monster down one day..

    The Real S-Conspiracy – the old CMOS.Rootkit.Virus (Update 2024 in deutsch)

    NSA Attacks citizens with Hardware Rootkits

    Branch – Problem – Reaction – Fake Solution – NWO Zionazi-Pathocratic-Archontification-Corporate-Deception Truman-Show-System Unmasked.

    How Private Contractors Have Created a Shadow NSA, Prism, Facebook Uefi CMOS Malware & CPU Trojans


    http://infinityexpression.com/2017/08/facebooks-federal-trojan-decyphered-aka-zombiehost-aka-pid6-dod-nsa-backdoor-and-firewall-bypass-example/

    Why are most IT security companies insecure or better said in bed with NWO?


    Introduction
    Internet bless on one side ban on the other side.
    Nowadays we have more threats to face then ever when surfing the internet, the more experienced we become the more scepticism may occur. No day goes by without horror news about sophisticated malware and the permanent progression of pests. „Human being the most cunning of all animals“ once was said. In Internet this phrase reaches a new quality. The importance of the web grows day by day and more and more people become dependent on it.
    But the most hidden thing could be located in your net packets. …
    I know that many people have a vague impression about something that is deeply hidden in their systems. They try to protect themselves with antiviruses, firewalls, antispys, antirootkits or security suites, keep their systems examplary up-to-date but they still feel surveilled and this for good reasons.
    Many security forums are not well-disposed if people post things about unknown occurences and possible conspiracy theories about global danger and spy attacks, multiplatform malware from the hidden. In many cases the established forum mob intends to shift all those people into paranoid area and try to kick them out of focus. Unfortunately many voices become silent due to the pressure and attacks they receive for their discoveries. There must be a reason why so many try to run dry the revelations of unknown and hidden things and no the reasons are not because all those claims are invented but because we hit the nerve of something that wanted to stay hidden and now yells out. Events like this are real more real than most might believe. I will try to give a little impression of what I observed.
    POSTED BY NEOSTORMSYSTEM.
    THURSDAY, OCTOBER 2, 2008
    Power Supply
    ASI.Eye also heavily affects the power supply, actually it is unknown to which degree but there is a high probability that it is able to destroy the power supply. The latest trick of Eye that I observed is a 5 second cycle sleep and wake up game of the power supply unit. You set your system into sleep mode then some times later you wake it up but your system remains in a endless sleep and wake up loop at cost to the health of your power supply. You have to pay attention their favorite loop time is 5 seconds you can count that in many situation when they try to manipulate computer systems.
    POSTED BY NEOSTORMSYSTEM AT 2:27 AM NO COMMENTS: LINKS TO THIS POST
    THURSDAY, SEPTEMBER 18, 2008
    More information about A.S.I.Eye
    A.S.I.Eye must use a kind of automatic information management system otherwise it wouldn´t be able to control possibly each and every pc system that connects to the internet. There is one guy who seems to be the chief they simply call him BOSS (original content of network sniff):
    There exists several other typical catchwords everyone might be able to identify them with ease, such as following (the most significant designations, catchwords and names over the past three months):This should prove the existence of all seeing internet eye. Take a closer look this happens to most people everyday when they surf the internet as usual. Most machines will likely be part of a stealth information bot collection system and part of a vicious secret chat community.

    POSTED BY NEOSTORMSYSTEM AT 8:59 PM 2 COMMENTS: LINKS TO THIS POST
    SUNDAY, AUGUST 17, 2008
    Core Problem: static http/s tunneling
    One of the core problem that allows A.S.E to do his job quite effective is what I call static http/s tunneling. You can´t evade a primary static tunnel system like that because you need a browser to surf the internet. IMHO, there are actually not many possibilities to prevent static http/s tunneling. ALF (application level firewall) was a try worth but couldn´t prevent the information flow of A.S.E for long. Apparently it used kind of http exploit or http request smuggling to circumvent the proxy wall, further disadvantages might be slow down of general internet activities and errors of several services. What about SPI (stateful packet inspection) mostly found in nowadays routers, blocks outside potential harmful traffic and ddos but is vulnerable against http tunnels. If http traffic adapts to standards and is encrypted and embedded in http, firewalls remain powerless. This can be considered as one of the key vulnerabilities of the internet. All bypassing Eye could use hidden tunnel streams to evade all security setups.
    POSTED BY NEOSTORMSYSTEM AT 7:06 AM NO COMMENTS: LINKS TO THIS POST
    Ethernet and Router as gates?
    The question is can we explain this phenomenon with the latest threats like direct attack of network and ethernet cards and manipulation of routers? Probably at least partially. One thing that never should come out of focus is the direct cpu or microcode manipulation this seems to be very close to the attack of the bios and soon also to efi. Several people reported and even proved that such occurances are more than real. Also more reports talk about special prepared udp packets that virtually replace the usual executable malware which means while connecting to internet you could be directly affected without doing much wrong. That means the problem exists not behind the computer the mistake is inside your computer in combination with the vulnerable and unsecure structure of the internet.
    It is crucial to create awareness, so that many people don´t waste their time trying to hit the evil on the wrong side. Visualize about a Zombie (Exploit, Virus) that always stands up no matter how hard you hit him (security tools) he will always come back. It won´t help if you bash him (regular updates, system hardening, backups) it also won´t help if you start using haphazardly weapons (antivirus, antispy..) you may blast him away a part of his body but he will stand up again and again. You must analyze how it is constituted to get a possibility to punch evil on the right side.
    POSTED BY NEOSTORMSYSTEM AT 5:00 AM NO COMMENTS: LINKS TO THIS POST
    SUNDAY, AUGUST 10, 2008
    The ultimate tunnel?

    I made some experiments trying to see how the assumed all seeing and all bypassing internet eye would react on restrictions. I started to install top of the notch firewall, using latest updates, 64 bit, windows vista, restriction/block of java, javascript, images, animations, referrers, cookies, ads, frames, surfing to google, in short I blocked quasi all.
    Usually one should expect not much traffic at all and repetitive traffic but what happens? We see variable byte traffic can we now conclude a all bypassing tunnel?
    Check yourself what do you think?
    POSTED BY NEOSTORMSYSTEM AT 7:20 AM NO COMMENTS: LINKS TO THIS POST
    THURSDAY, AUGUST 7, 2008
    Why no full encryption?
    The first question you may ask is why they do not fully encrypt their transmission channels? Why do they let us take a look inside their All Seeing Eye?
    This question can´t be answered directly, but I can give you hints and impulses for their reasons. One cause could be the paradigm of nature, they simply copy the system of nature, because they assume that nothing can be more perfect than that what nature has done. They took a look into DNA and RNA and simply thought it could be a good idea to use it as paradigm. The All Seeing Internet Eye wants to be the root of the root and what is the root of the root? The genomic structure especially Deoxyribonucleic Acid the repository of the genetic information. What we see if we take a fast look into it? We see two things coding and decoding, encryption and decryption.
    Expressed regions and intervening regions and what is the catalytic effect to create a encryption that is the new buzzword of it security scene: Splicing. Unencrypted information (intron) and encrypted material (exon), catalyzer (splicing). I am no bio scientist I only compared some parts of biology with things that happens when taking a look into net packets and saw a common denominator. Remember the question? Now you have one possible idea. Think about something that wants to dominate everything on this planet it has to go to the deepest root of being and change its structure to fit the needs of this hidden thing. If we would carry on this thought The All Seeing Internet Eye could be invented for only one aim: World Domination or World Control.
    POSTED BY NEOSTORMSYSTEM AT 3:07 AM NO COMMENTS: LINKS TO THIS POST
    WEDNESDAY, AUGUST 6, 2008
    A short view inside the Eye
    I give you one possible way of interpretation, again I emphasize that it is a subjective and intuitive point of view I cannot guarantee for accuracy. I watched for catchwords and chars that could be relevant in my opinion. Let us take a closer look into the deep abysm of the All Seeing Internet Eye. Check your network packets and watch out for following things: (especially for relevant packets which happen spontaneous and extraordinary) There is a lot of space for conjecture but that lies in the nature of network analysis.
    @ = Behind this you´ll find mostly the addressee within a covert channel communication but it could be also something like a directed command. Don´t expect the name always displayed immediately behind or before this sign.
    EAU, H2O, AQA, AGUA (obfuscated: E/A#U, A°Q~A, A#G*„U+A, ÆÅÛ, ËÄÚ, ÀÊÛ(permutated)) = Reason for this secret word could be the omnipotent power of water that trams its way through all barriers.
    SPY = If you find this word you will be alerted, I think there is no need for further explainations.;-)
    NL, UK, RU, JP, CZ, PL, FI, SE, SVE, USA, BR… = Specification of countries probably to assign the regions.
    EYE obfuscated variant 1. “( S\ɲ¥Ë variant 2. ®‘Ê*ÿè. variant 3.”È ”.°Ÿ.Ê = The All Seeing Internet Eye? Naturally?!
    AV = A.V. = Check if Antivirus is present or not.
    FW = Check if Firewall is present or not.
    PU obfuscated ‘¤P‰.Ù, P.–®U = I am not sure about its meaning but it is used since the beginning. (Conspiracy Revelation: 26.8.2019: Processing Unit, Central Processor Unit e.g.)
    AM, FM, UKW = Possible radio frequencies that might be used.
    AM, PM (..P›m­.) = ante/post meridiem (time for their actions)
    ON, OFF = someone who signed on or off and is tracked by the All Seeing Internet Eye.
    OS = Operation System
    EPO, ËPÔ? = Entrypoint Obscuring.
    PI = Several possibilities e.g. Private Investigator, Process Integration, PI, principal inv.
    PI:0 or PI0 = PID 0 = possible System Idle Process Walker // (Conspiracy Revelation: 26.8.2019 : Process Identification Number 0 = System)
    OP = Operation (possible commands)
    GO = Go, Start (possible commands)
    SAY = possible command
    AXE = Location axe of the tracked system
    ASE aka àŠÉ aka ä.S°.E = All Seeing Eye
    ? = some times questioning to other users of this hidden system
    ACL = Access control list
    <> = not present, not available, not there
    AES, ÆS = AES encryption algorithm
    CU, C-Y, see U = see you (possible chat comments)
    OK = Okay (possible chat comments or command)
    Vca, Vco = voltage controlled amplifier/oscillator
    Cd, Iso, Raw, Rau = probably filesystem or transmission level
    bye, by, ByE = Bye (possible chat comments or command)
    Jeu = Game, Vx = Virus, Rue
    Rñ41, Rn41 = Bluetooth DIP Module, Metall Resistors, Vpn, VoIP
    VM, VM5 = possible parts of their virtual machine network
    PW = Password lookup
    Z = Zombies, Z0-14 e.g. probably their way to assign Zombie PCs.
    Hel = HE¦L*.!¡„.. = original meaning of: to hide something
    BB = B.B = BigBrother: ultimate symbol for espionage
    BOT = BÔT = BOTHZ = naturally? Keyword for mass remote control of computers.
    FOE = F0Ë. = FO = naturally?!
    HQ = H.Q. = Headquarter of their experiments.
    WÒ = WO = Where
    I post this point of view in the hope it will help others to partially decipher a potential or possible underestimated global and pandemic internet threat. Soon, more news.
    POSTED BY NEOSTORMSYSTEM AT 4:12 PM NO COMMENTS: LINKS TO THIS POST
    Port 80
    When you surf a webside this happens in most situations on Port 80 now turn your net sniffer on and watch the traffic. Did you expect all the results or did you find something that caught your attention?
    Surf a simple page that does not change its content several times and always catch the traffic you may notice that the substance is not always the same despite the fact that you did everything like before. How is that possible?
    One explaination could be the All Seeing Internet Eye. Something that stands in the middle between you and your destination something that tracks everything you do and contemporaneous seems to operate as autonomous system controlled either artificially or by human being.
    POSTED BY NEOSTORMSYSTEM AT 3:49 PM LINKS TO THIS POST
    http://asepuforensics.blogspot.com/2008/
    http://subversionhack.blogspot.com/
    „FRIDAY, AUGUST 29, 2008
    Annoyances from the Hidden
    This blog will be dedicated to informations and screens of annoyances and intrusions from the hidden area of computers and what I observed during the last years.
    The following spooky screens I saw them the first time in 2005 when I bought a new computer and tried to install a new windows, then they reoccured in 2008 when I burned a linux live cd and tried to use this CD on two other systems. I call it the purple-white-turquoise vga wall.
    POSTED BY NEOSTORMSYSTEM AT 7:29 AM NO COMMENTS:“


    MONDAY, FEBRUARY 16, 2009
    S – Syndrome and Sysinternals Conspiracy
    The S Virus how people call it brings many minds in turmoil. But the barrels overflow is a rude censorship at sysinternals forum. If you tell anything about S they cut off and erase all informations. So it must have something to do with a ms secret. The S is high likely nothing else than a experiment of microsoft and nsa. This experiment takes place for maybe 20-25 years but came in mind specially for the last 2,3,4,5,6,7,8 years to the world (especially since the publication of Windows XP) due to several software errors, emotional outbreaks and inattentions from ms members. The S was implemented in many tools and software of ms.
    Anyone remembered Messenger? Once microsoft used to store the user information at HKEY_CURRENT_USER\S. Then there occured a error in file system and you could see many S directories in System32 folder with a tool called rkdetector. It was summarized altogether as Revelation of The Old Rootkit. A 45 page long topic that was erased by forum admins to fog the truth. Then there is a appreciated tool called procexp it generates under unusual conditions a S driver which can be only seen from cd rom windows or with special forensic tools. Are we all in Cyberspace nothing else than part of a devilish matrix experiment, sponsored by ms? What are you thinking?
    Check also: http://subversionhack.blogspot.com it manifests the impression.
    POSTED BY NEOSTORMSYSTEM AT 4:45 AM NO COMMENTS:
    UNVEIL ALL SEEING INTERNET EYE
    SATURDAY, MAY 30, 2009
    Sideeffects of the Matrix?
    POSTED BY NEOSTORMSYSTEM AT 5:45 AM NO COMMENTS:
    THURSDAY, SEPTEMBER 18, 2008
    New Insights
    When you surf the internet the ideal „peace of mind“ traffic has to look this way:

    Like a steady cycle with the same data size (assumed the content of the webside remains equal) but unfortunately in most cases this steady flow is only reachable through ssl aka port 443. Usually in most situations people surf on port 80 and then everything looks totally different and A.S.I.Eye comes into the game like I described here.
    All Seeing Eye is a pretty static monster in most cases you are the trigger when you push the mouse button or the enter key to surf the next webside. If you would not let go the key A.S.I.Eye probably could not transmit its informations, I found out that its viral function relies „on key release“ specifically if you push F5 to renew the web content. Try it out yourself catch explicitly http traffic push F5 and don´t release your key that is the first weakpoint of this devilish global monster control system.
    POSTED BY NEOSTORMSYSTEM AT 11:17 PM NO COMMENTS:
    SATURDAY, AUGUST 30, 2008
    The Time Mutation Story of Evil Eye
    It has made the round that this devilish eye mutates the time of windows you can also observe this action when you start analyzing network packets and when you take a look to the cookie dates. If you see 1990 something is wrong, I don´t know why they have such a affinity to this year as well as to dates that lies far in the future like 2015, 2038, 2096, 2100. One possibility could be their hidden filesystem that probably relies on that date mutation. The other possibility for 1990 is the establishment date of All Seeing Internet Eye according to „MatrixArch“, for 18 years in existence. Their allusions to the movie Matrix is clearly to see, as they seem to have chosen me as (one of their) Neo(s;)) there is no wonder that you will see the name many times in this hidden mutant filesystem which also affects advapi32 (known as the ultimate cia backdoor), probably also a sort of HPA(Hidden/Host Protected Area) some may also call it (S-)ATA protected area. FYI: It affects USB drives and sticks too. Beside according to wikipedia DBAN does not delete HPA! Originator of HPA is Phoenix and it is unavailable for all operating systems, such as Windows and Linux, if secure mode is enabled by whatsoever. (usually by bios)


    POSTED BY NEOSTORMSYSTEM AT 7:20 AM NO COMMENTS:
    FRIDAY, AUGUST 29, 2008
    Favicon and Gif Exploit?
    Another speciality of the A.S.I.E. criminals seems to be a kind of favicon exploit.
    Another simple example of pure internet evil from a few bestialities:
    Looks like gif exploitation stego:
    POSTED BY NEOSTORMSYSTEM AT 6:37 AM NO COMMENTS:
    THURSDAY, AUGUST 28, 2008
    Revelation continues: The „S“ and some chars.
    I want to show some remarkable chars that I caught while analyzing internet traffic which may stand in a very close relation to A.S.I.Eye, A.S.Eye or S.Eye how some also call it. The S could have several meanings: Seeing, Secret, Shark, Secure. You may have noticed that there exists some specific malware that uses „S“. I have seen this „S“ in several situations as non existent file, as hidden window, as phantom process, which indicates us that it is not only a hidden interceptor of the internet but stands in several cases in direct relation to a very aggressive remote administration malware. Recent discoveries have shown that a widely appreciated tool called Process Explorer does create such a „S“ module too if driver´s directory is locked. How far or if this stands in relation to ASI.Eye is not clear, so beware ambiguity errors. For all who are interested in both picture shown above were made in december 2007 and they appear to be either a sideeffect of A.S.Eye, a kind of subproject of All Seeing Internet Eye or a possible install failure of legitimate Process Explorer´s kernel driver if driver directory is locked down by protection tools.
    Remarkable chars and covert info channels that I caught while simply triggering the static vpn tunnel of A.S.E. just by surfing a webside:
    ..-;Spy~à.”, T.ª.\tãÒ, Ĥ/È¥ED>B, ÐÁT.~�àÀK’£, XécÞâA, 8AM, ‹ž]ËPx7Â0, ÓÄLI“‘, .@.PM5áš, Z­+bõ.Z, Ñ..ÈÓ., RÙˆåšÒ, .B’݉òE, h..lÑFxj, QJ)åŠS, ƒÊÓÑ, ­çNÆÓö¶k., €ÎÉ.Í.ŸE.¡, ñòN?„, .ZRù\.¬., GgCëm, ×JR.!.‚à•v„., Z®‘.$CÔp., .8…Åm., „Hm..²­!…, ¼“L;ªS“à}%.RÓ]., VhÐ.äémÜ, >]êûôë’H�., ….Õ„Ü], .T˜À-RÑÒ?LÀª�Ò.ßD..&, †.Ñ¸ÆØ=Q.²XÁ.$Á.YC, ¢@�C~pŠy.:Щ,
    3—Šâö, EÑå„QRÅTå.´F ó”·, Vàl/òn€, „O±„!·j­ÛFo>�€], £.È´Þˆžku.Ǫã, ÇeHmu¡.$(â.. , @SE‡.².€?, � gÖ‰@D, ..S.u.b.C.A0…U, Š6Áë~ép], ..–òš.C/{, }‘©ÈÏRQ7, „,�F^+ôù¦Æw, Lé™´d;šP1.$, Z0X03, ›ÇZ.–QRX@HÌ#*ñ , 6dLEÔ, 1Wdú>¤§�G‘À:vZ, Ð�ÌÓ.QÐNA.›±.vÁgáÕ5, ÖÝÇ..„‚r»-TaÏlÀ@Þ–½`, Ø ÙSé.C.FGBòA.;€nRS…n�~...E.….‹P“.�E, )ünÐy>nÊö@E.,Â, „ÁÑͨ.О, 1÷¢èZâÈ#, D¹@ŽÁ.‹ÙM, R˜UQ„æ:Pž¥.;, .®ŸËÑ.„, •-BðTý¸ ´˜Áqæ¨::lQ, $:ÂU.ÐðÀÛM‘.à, .ÔïLø?W?, cì Gè.N , n[n7t®T>�9 ÍDIR¯ñêíу¥, !.Ë).î.®Lp�>벉þb., OÑÎVÔC¿, °Ê¶§Æã�.
    Furthermore they seem to use kind of coordinate system for „S“: ˜s:5970:4:198..,l, s:5972:4:45., s:5973:4:2931, s:5974:4:148, š{*°*.a:22404:4:45., s:20106:4:91…
    There you see how they associate enormous importance to the „S“ symbol. Did you notice something? The 4 remains static all others change. Conclusion: 4 is a key. Could be e.g. Pid 4 for System and hidden threads inside system sent via udp channels or something like this.
    Another significant thing is that they seem to hide messages in images or at least it appears to be an image you will also notice: NETSCAPE2.0…..! and GIF89a…. strings with hidden informations.
    POSTED BY NEOSTORMSYSTEM AT 7:31 PM NO COMMENTS:
    SUNDAY, AUGUST 17, 2008
    Unveil All Seeing Internet Eye
    All Seeing Internet Eye use a multilayered method of obfuscations and commands, sometimes it partially and/or randomly encrypts its multi layered obfuscation so that my offers of de-obfuscation or illumination can´t be set up in all events but they fit in several situations. Let´s start to shed some light by unveiling these little all-pervasive (be like water) network packets. By the way this method can also be used to decipher some subhack related windows internal phenomenons which you find at the end of many executables, drivers and dlls in windows operation system.
    Some typical methods of obfuscation:
    1. I am here = I/A/M/H/E/R/E
    2. Specific codewords like: Exodus = ÈXÐØXŽUŽ,
    3. Short messages like: We at ram = WÊ@rA¨m
    4. Names like Ru0, Á“Lï, .ÐR.EÜRð, Fu2NL, E;!ÔF¡P, Róñ
    5. Permutation in the lines e.g.: Hello lloeH
    6. Allocation chars to individuals and/or locations like A <> B
    7. Letter replacements through chars: S = $
    8. Letter associations to numbers: A=1, B=2,C=3,D=4,E=5,F=6,G=7,H=8,I=9, J=10….
    9. Multiple use of different languages such as german, french, english, spanish, italian, turkish, arabic, yugoslav, latin …
    10. Psychopathic, eccentric use of anagrams
    There is also a high and excessive use of other words e.g.: DÁÕ›U probably has a relation to TAO, a frequent use of SÚS = SUS. Some know it also as SUS Malware.
    Anagrams often refer to bioscience, genetic studies and vet medicine, e.g.: VLdãLd
    Other discovered codewords: Pnì^¹, JªVHÛB (evtl relation to Java)
    A lot of analyzed packets refer to a japanese network of Tokyo: trip.orz.hm.
    POSTED BY NEOSTORMSYSTEM AT 8:18 AM NO COMMENTS:
    http://unveilasieye.blogspot.com/

  • DARPA Cortical Modem connects brain directly to computer for "electronic telepathy and telekinesis"

    Conspiracy Revelation: 17.8.2019: Its original mission was always a Truman-Retardation-Loop-Show joke (nowadays, since 2005/2010, mixed with Fake-Exorcism-Simulation-Implants (aka criminal BCI-Interfaces and Neuro-Weapons, Bioweapons (how weak or „soulless“ (cut off from the spiritual and natural world) one must be – in divine terms – to use such technocratic cunningness, military malice against billions of unwitting natural organisms), because USA and Russia were all one NWO Conglomerate from the very beginning…
    Instead it mutated into the biggest Earth Infiltration Archontic Terror-Invasion Command and Control Monster in the history of the Universe, to plague humanity with 24/7/365 PPAI Surveillance/MK Ultra/MK Naomi/MK Medusa, Synthetic Dream Reshaping. Dream Conferences, Dream Intrusion and Telekinetic Demon-Simulation Implants that restrict freedom by zero privacy policy, preemptive sabotage cointelpro2 of most successful or enlightened liberation avatar heroes and geniuses in the world (to secure the rule of dumbing-down idiocy by corporate mediocrity and block „competition“ (in their paranoid militarized panic terms and envious views) that are 1000 times more capable) and complete overriding of so called „Human Rights“, instead people became militarized cyborgs…all because of their illicit Chemtrail implant smart dust parasitization demonic nanodust plague…instigated by the ZOG GOG Deep State Shadow Gov New World Order Corporate Crime Conglomerate of the Pentagon / Alphabet Inc. Mafiosis.
    Conspiracy Revelation: 17.8.2019: People who didn´t experience the negative aspects of this inhuman torture tech and the satanic ritual abuse, surely can´t understand why I use such heavy wordings to demonstrate the malicious potential of these smart dust technologies against the unwitting civilian population.
    The Pentagon Think Tanks made sure that less than 3 or 5 % of the world experience these technologies in their most evil and demonic aspects to have the masses of people on their side and let SRAbused people look foolish who were subjected to their hideous human rights nullifying cruel projects…but what they do to the minorities or some tech geniuses – who work better than twenty 3 billion dollar (pseudo (if they were really antivirus they would produce non-dod-infected hardware or hardware firewalls without dod-infected intel/amd chips)) av-corporations together (a little exaggeration (but eventually it merges with reality) must be – to reach the minds of the sleeping hypnozized mass) – might later hit all people in a totalitarian world shadow government..remember.. We can estimate that globally 1 up to 80 million people were hit and abused directly by space weapons (I heard that UK and US Alphabet Agencies are even more cruel because they let AI do the torture for the most part) and abusive eeg cloning technologies without them having done anything wrong, just normal, peaceful people. Attacked, tortured and abused by corrupt USAF/Navy/ARPA/DOD/Lockheed Martin/NWO Global Crime Cartel/ZOG/GOG/Big Pharma/MIC/Big Oil/Big Bank/Big Corporate Alphabet Inc. personal.
    Conspiracy Revelation: 17. August 2016: oh okay…that explains a lot….of what happened during the last 5-6 years…we are all their guinea pigs…
    „Technology: DARPA Cortical Modem connects brain directly to computer for ‚electronic telepathy and telekinesis’“
    „February 18, 2015
    DARPA’s cortical modem implant could restore sight loss and provide eyes with a heads-up display Getty Images
    A brain-computer interface has been developed by the US Defence Research Projects Agency (DARPA) that is capable of laying a heads-up display over a user’s natural vision.
    The „cortical modem“ also holds the potential to cure sight loss and enable „electronic telepathy and telekinesis“ according to noted futurist Peter Rothman, writing for H+ Magazine.
    While still a long way from production, the direct neural interface (DNI) chip would be shaped like a coin, around 1cm wide, and could conceivably cost as little as $10 (£6.50).
    As outlined at the Biology is Technology conference in Silicon Valley last week, the interface provides a direct link between the brain and an external device or software through manipulation of the visual cortex.
    Phillip Alvelda, chief of DARPA’s Biological Technologies, told the conference how the device could replace all virtual reality glasses, such as the Oculus Rift, by bypassing the visual sensory system entirely
    DARPA Projects
    ‚Flying insect‘ drones
    Satellite launch from fighter jet
    Superhuman ’self-healing‘ implant
    Search engine more powerful than Google
    The project builds on the work of Karl Deisseroth in the field of optogenetics, according to H+ Magazine which was in attendance at the California conference.
    Optogenetics involves the controlling of light-responsive proteins within the brain through targeted light emission.
    DARPA has led the way in a number of futurist and transhumanist projects, including a tiny implant that assists the body’s organs in healing themselves when injured.
    The secretive agency was established by the US Government in 1958 in response to the launch of Sputnik by the USSR.
    DARPA described its purpose in a 2005 document as follows: „DARPA’s original mission, established in 1958, was to prevent technological surprise like the launch of Sputnik, which signalled that the Soviets had beaten the US into space.
    The mission statement has evolved over time. Today, DARPA’s mission is still to prevent technological surprise to the US, but also to create technological surprise for our enemies.“
    Related topics : Artificial Intelligence Oculus Rift“
    Source: https://www.ibtimes.co.uk/darpa-cortical-modem-connects-brain-directly-computer-electronic-telepathy-telekinesis-1488476

  • NS-VERGANGENHEIT DES BKA

    Conspiracy Revelation: 13.8.2019: Ihr entkommt eurem Nazionistischen-Karma nicht…Gott sieht alles…die Jahrzehntelangen Bestrahlungen, ich habe über 200 /300/400 Fälle im Internet gesammelt, mit quasi identischem Muster, bei allen Folteropfern…und auch die brutalsten Fern-Folterattacken gegen mich 2011 (3 Wochen inkl. Schlafentzugsfolter, Brandmarkungsfolter, Satellitenfolter, Skalarwellenfolter, Fernwürgungsfolter), 2015 und 2018, auch wenn dabei wahrscheinlich die U.S. Nazionistischen-Geheimdienste und das U.S. Space Command, Lockheed Martin, USSOC, Council on Foreign Relations, ARPA-Motorola-Goo-Dugan-Obama-Merkel, die Rockefeller NWO U.N. und die U.S. Schriever Airforce Base und die Air Force Base Ramstein hier wohl einige Hauptrollen übernommen haben, ist doch sehr wohl bekannt, dass das BKA eine Folterabteilung hat, wo es tonnenweise unschuldige Zivilisten hat foltern lassen…insbesondere unschuldige wehrlose deutschstämmige, was die Endschande schlechthin repräsentiert!!! Alle Bundesbehörden wissen über diese gezielten Folteraktionen bescheid und es wird Zeit, dass die ganze Welt über eure grausamen Machenschaften Wind bekommt.
    Wieviel Feigheit, Ulta-Faschismus und Versagertum muss existieren, dass man tausende wehrlose Menschen in ihren Wohnungen angreift und dann noch in der Stadt der Menschenrechte. Die Zivilbevölkerung muss die Arbeiten der Polizei übernehmen, weil die (Geheim) Polizei in der Vergangenheit stellenweise zu unmündigen, verbrecherischen, hochrkiminellen Handlangern der Neuen Weltordnung geworden ist.


    Ihr habt euch nicht in die Privatsphäre von Zivilisten einzumischen…Nur weil ihr jetzt durch die Nanotechnologie und HAARP Technologie glaubt Gott und die Göttin ersetzen zu können und alles und jeden beobachten zu können… ihr habt die Nanoimplantate auch im Hirn… auch ihr werdet komplett überwacht…und zwar von ganz anderen Dimensionen…
    „NS-VERGANGENHEIT DES BKA“
    „Nach dem Vorbild des Reichskriminalamtes.. 22.09.2007“
    „Nach über 50 Jahren stellt sich das BKA seiner NS-Vergangenheit. Die Selbstauskünfte kommen, so sagte Ziercke letztens, „spät, aber nicht zu spät“. Man kann das anders sehen. Eine Analyse von Peter Carstens.“
    „Was Saevecke im Dritten Reich gewesen war, nämlich ein mörderischer Polizeichef und Vollstrecker des SS-Staates, wurde auf diese Weise immerhin bekannt. Doch verschwiegen blieb, dass Saevecke und mit ihm Dutzende andere SS-Führer jahrzehntelang im Bundeskriminalamt (BKA) in oftmals den gleichen Funktionen gedient hatten wie zuvor bei der Kripo im Reichssicherheitshauptamt, bei der Geheimen Feldpolizei, in Dienststellen der SS.

    Sechsundfünfzig Jahre hat es gedauert, bis das Bundeskriminalamt sich seiner Vergangenheit stellt und mit einer Reihe von Veranstaltungen öffentlich macht, was bislang nur von einer kleinen Fachöffentlichkeit erörtert wurde. Der Präsident des BKA, Ziercke… Unter dem Titel „Die Historie des BKA: Verbindungslinien zum NS-Regime“ wird nun erstmals offen und öffentlich über die Entstehungsgeschichte des BKA gesprochen. „“
    „Aus Judenverfolgern wurden so Kommunisten-Jäger“
    „Dass dabei „Ochsenziemer“ und Tauchbecken für die Folteropfer auf den Beschaffungslisten der BKA-Haushälter nicht mehr auftauchten, zeigte Schritte auf dem Weg zur Zivilisierung einer Polizei, die in der Wiesbadener BKA-Zentrale wohl zum ersten Mal so öffentlich als „Tötungsverband“ beschrieben wurde. Zwischen 1933 und 1945 habe sich die deutsche Polizei zu einer „Folter- und Tötungsorganisation“ verwandelt, sagte Heuer.
    Vieles von dem, was deutsche Polizisten im Einzelnen oder als Teil von Polizeiverbänden in der Sowjetunion anrichteten, ist erst später im Detail bekanntgeworden. Allerdings längst nicht so spät, dass man die ranghohen Täter nicht noch hätte belangen können. Aus Judenverfolgern wurden so Kommunisten-Jäger, etwa bei der Bonner Sicherungsgruppe, die sich selbst als Opfer der Verhältnisse beschrieb. „Altkriminalisten“ nannten sich die BKA-Leute mit Vergangenheit und bedienten einander mit Posten und Verantwortung im neuen Staat.“
    „„Alle Maßnahmen brachen den Lebenswillen nicht“
    Angehörige der Sinti und Roma blieben unverändert im Nazi-Jargon stigmatisiert. Im erwähnten „Leitfaden für Kriminalbeamte“ des Bundeskriminalamtes hieß es: „Die Zigeuner leben in Sippen und Horden, haben einen ,Häuptling‘, dem sie bedingungslosen Gehorsam schulden, und eine Stammesmutter, die als Hüterin der Stammessitte gilt… Die Zigeuner haben weder einen festen Wohnsitz, noch gehen sie einer geregelten Berufstätigkeit nach. Der Hang zu einem ungebundenen Wanderleben und eine ausgeprägte Arbeitsscheu gehören zu den besonderen Merkmalen eines Zigeuners.““
    „Das Schweigen und das Fortleben des alten Denkens…“
    „Aus dem Blickwinkel der Strafverfolgung oder zumindest der Übernahme von Verantwortung kann man das allerdings auch anders sehen. Immerhin hat das Bundeskriminalamt eine juristische Aufarbeitung so lange verhindert, bis auch der beinahe Letzte der „Charlottenburger“, der „Gleiwitzer“ sowie der früheren Angehörigen der Feldpolizei nicht nur aus dem Dienst ausgeschieden war (also seit etwa dreißig Jahren), sondern gestorben. Wenn es mal etwas enger wurde, dann habe man, so berichtete einer der Referenten, einen Mann schon mal in noch besser abgeschirmte Ecken der Sicherheitsbehörden versetzt: zum Bundesnachrichtendienst, zum Verfassungsschutz. Von dort darf man also demnächst auch einige späte Selbstauskünfte erwarten. Verurteilt wurde niemand, entlassen fast keiner.“
    Quelle: https://www.faz.net/aktuell/politik/inland/ns-vergangenheit-des-bka-nach-dem-vorbild-des-reichskriminalamtes-1462630.html

  • Wakeup America – Electronic Holocaust Planned in America – It’s a takeover!



    „A secret takeover and electronic holocaust is being planned… Everyone is being silently implanted with electronic particles sprayed into the air. These particles are self replicating in the bodies of all humans. A secret group that is taking over the US military is turning on these electronics in people’s bodies and electrocuting people in their homes. Americans need to wakeup before it’s too late.“

  • Underworld Reptilian Caverns That Exist Deep Beneath The Earths Surface

    https://www.youtube.com/watch?v=OFI4pEgEKvA
    „Underworld Reptilian Caverns That Exist Deep Beneath The Earths Surface“
    „Okay, the Brooklands report said two things: first of all that it was bad for a lower civilization, it is devastating for a lower civilization to come in contact with a higher civilization, because eventually things change and it’s not always better, but this was emphasized very heavily in
    the report the other one was is that they said that science and industry specifically science and engineering the fields of science and engineering would actually be the most hard, hardest impacted groups out of the entire human society, that means all of these guys that run area 51, all these scientists, all these engineers, they’re afraid they may not have a job, when the ET arrives, okay, they’re being professionally protected, they’re are worried, because like the childhoods end , has anybody read, okay, one person, two people in here, did you guys you know arthur c clarke okay did you know his very first book was about reptilian humanoids coming to earth and claiming this planet is not their own and did you know and the in front of his book he writes down that the ideas presented in this book or not those of the author, I’m just saying, I’m just saying, you know and he worked with RAND Corporation and he had all these other privileged positions to be able to speak to scientists and people in the government.“
    „that was a social move that would devastate us economically across the board especially their fields now there’s a lot of other people they’re still gonna go to work because they need
    to pay their paychecks but these guys were worried about their jobs not us okay let’s make that real clear we have narcissists running the intelligence communities in the science
    and engineering communities at the very top and their
    protective professionaly over their own call for their own colleagues so unless they can wrap it it’s almost like saying:
    all you smart guys aren’t so smart anymore, we got the really smart guys coming down and they don’t like that, so what would it do to their world of science well it basically turned it
    upside down they wouldn’t know where to go next and they’re saying just as the childhoods end the book says that coming
    into contact with the higher civilization is not always good because it creates a lull in humanity it makes us kind of depressed because they said that if you’re given all the
    technologies and all your questions are suddenly answered the pressures of and evolution as a society stop because all everything’s here what are we all going to do when
    they decide that they’re going to tell everybody about extraterrestrial life..they’re afraid of all these questions that we have that drive us forward to progress
    ourselves as a society will end and this is the threat that they’ve held over us, so the ramifications for public
    disclosure, I’ve been out there for a number of years doing my talks, but darka is the main agency that runs over everything. Did you know in the last since like I think and I’m gonna misquote this I’m gonna rough it something like between 1996 and 2002 DARPA changed its name no more than four to five times , okay, everybody was catching on with the Internet, they were
    afraid that if people started thinking: I’m not going to use the internet, because actually it was created by the Defense Department DARPA, they started dropping the D off and just having ARPA and then the next year they added the D back on and then two years later they took the D off, these guys
    couldn’t figure out if they wanted to tell the public that ARPA was really.. a defense intelligence agency that would air all their technologies that were made are are the technologies
    of being employed in our current space fleets and yes I do say skirt space fleet. so I believe that we have them. run by the Navy and these are the guys that really are the ones that you have to be careful of this also respect, because they hold all the all the keys, so with pressures, let’s talk a little
    bit about what happens to you as a speaker, what happens to you when you start coming across novel information that may be posing a threat as far as the government’s concerned to our
    society by telling people things they don’t want them to hear and the TV shows would it surprise you to know that a lot
    of television shows will have things happen with the men in black and they won’t report it to the public okay.“
    „UAMN TV
    Am 28.05.2019 veröffentlicht
    John has wide knowledge of Secret Underground Bases and the advanced tunneling technologies used to create them. He will give us a clear view into the secret government and “alien” underworlds that exist beneath our feet. In this vein, John will tell us about the early history of tunnel building under Los Angeles, and the South Bay, in connection with the aerospace industry. During that time, and thereafter, they moved their most sensitive facilities underground, sometimes under gated communities where the companies housed their scientists. Could the tunnels under LA be extensions of early Chinese tunnels, or part of a network of tunnels that may have been built by the Lizard People of Hopi Legend? Rhodes will tell us what the Hopi say about the Lizard People and the “Ant People,” which are said to appear when the world is about to be cyclically cleansed?
    Finally, John will introduce us to the Reptoids 64 key “All is Light” message, which was revealed to a group of humans by alien intelligence. Deciphering the message led Rhodes to explore an ancient and secret numerical sequence–which is found in the game of chess, at the root of many biological forms found in nature and which is deeply embedded in the core of our Digital Age technologies. Did aliens introduce us to this profoundly significant mathematical sequence–and if so, for what purpose?“

  • Linda Moulton Howe The Moon is an Intelligent Machine That See's EVERYTHING!

    Conspiracy Revelation: 22.6.2019: NWO-Ziontube-Exo-ShadowGov-Corporate-Crime Syndicate-Assholes don´t want you to see this…they will freeze your CPU…so watch it.
    Go to the place where they attack…the content is negligible and rather uninteresting, they just attack, because they are military zombie drones and alphabet inc. paranoid psychos.
    https://www.youtube.com/watch?v=fZyTiTAaoyk
    „Linda Moulton Howe The Moon is an Intelligent Machine That See’s EVERYTHING!“
    UAMN TV
    Am 22.03.2019 veröffentlicht
    Linda Moulton Howe explains how the moon is not what we think it is. It is a computer like machine that watches, observes and monitors Earth. What happened to Neil Armstrong, the first man on the moon, whilst he was up there? Did he change after the mission? Was he warned never to talk about the alien presence up there? Linda explains, there is life on the moon and throughout the Universe.
    Kategorie
    Menschen & Blogs