Read the Beforeitsnews.com story here. Advertise at Before It's News here.
Profile image
By MILLENNIUM Reporter
Contributor profile | More stories
Story Views
Now:
Last hour:
Last 24 hours:
Total:

The Unholy Alliance: DARPA, INTEL and Google --- What You Don't Know May Hurt You!

% of readers think this story is Fact. Add your two cents.


THE MILLENNIUM REPORT: Reporting the Most Important News in the World Today

 

DARPA Vader and the Evil Intel Empire Inside

 

 

Uncovering the DoD Sith Lords that Control Your Laptop

By the Anonymous Patriots
The Millennium Report Exclusive

One of the best ways to describe the U.S. Department of Defense and DARPA (Defense Advanced Research Projects Agency) is to use the Star Wars moniker “Evil Empire” to describe its international, secretive agenda to take over the world and turn all of us into neo-feudal slaves who have no choice but to give allegiance to the controllers of the universe—Darth Vader and the Sith Lords.

DARPA “Vader” has controlled technological innovation since 1958 when it was created by the military-driven Evil Empire, a/k/a Department of Defense. Every emerging technology from the Evil Empire leads humanity into the science fiction fate of machines controlling humans, much like Darth Vader became a weapon that was half man and half machine. There is much wisdom and truth that lies behind the first Star Wars movie, and its story was given to humanity as a warning of how the Evil Empire and its Death Star planned to destroy the entire planet.

Folks, this is no longer science fiction. This battle for Earth is going on now and we, like the Rebel Alliance, must join forces to destroy the imperial forces of Darth Vader.

Aside: Do you know the real back story of Star Wars? If not, see Star Wars: The Secret Weapon and Why George Lucas has Kept It Hidden.

Folks at the DoD should read science fiction so that they can see how their actions—individually and collectively–are leading humanity into the evil destiny commonly found in sci-fi: robot wars, cyborgs turning against humans, computer take-over of the world, endless weapons, and, you guessed it – the Death Star. DARPA is the father of war-fighting, both conventional and digital. And as we all know, Darth Vader took his orders from the Evil Emperor. DARPA Vader is controlled by a man they called “Yoda,” but is in reality the Evil Emperor who leads a group called the Highlands Forum (Evil Empire Imperial Command) that directs all military research and development. 

Who is this Evil Emperor who looks as innocent as Yoda? His name is Andrew Marshall and for decades this single man has driven the Highland Forum (Evil Empire) into creating weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a microprocessor inside – especially the “Evil Intel Empire Inside.”

Intel Inside is found in our private digital devices and is, in fact, collecting “Intelligence” for the Department of Defense, CIA, and NSA who are all members of the Evil Empire. Yes, the one they call “Yoda” is actually the Evil Emperor in disguise who controls DARPA Vader and the evil Sith lords of war. He does not have lightning bolts shooting out of his fingers – unless of course he uses one of his many DARPA inventions to do so. 

Andrew Marshall

Andrew Marshall: Former Head of the Highlands Forum

The Evil Emperor, as we call Andrew Marshall, was the director of the United States Department of Defense‘s Office of Net Assessment from 1973 to 2015. He was appointed by Richard Nixon and remained in office during all successive administrations that followed until his retirement on January 2, 2015. Marshall created the Highlands Forum as a secret think tank for warfare innovation. All meetings are invitation only and not open to the public and no written records are kept. Marshall created this type of secret platform so that no one could prove the Highland Forum exists or has the greatest power over tech warfare on the planet.

DARPA and the Highlands Forum have essentially taken over the world and few people have noticed. From creating the devices that control all nuclear weapons to incubating the technologies that created the Internet (originally ARPANET), Intel microprocessors, Cisco routers, Google search engines, Facebook, the Internet of Things, I-phones, Microsoft software, MacAfee security software, and all conventional and digital warfare devices, among many others. The Highlands Forum has been the headquarters of the Evil Imperial Empire for five decades. The Evil Emperor Andrew Marshall has the blood of millions on his hands and yet he is considered an America hero instead of a warlord criminal.

There’s an Intel Inside

To be truthful, this ad should read:

Intel “LOOKS” Inside

Ever wonder why Intel used to run those warm fuzzy ads letting us know that there was an “Intel Inside,” as if we had a choice of what microprocessor was inside our computer? They had a monopoly on microprocessors for decades and certainly end-use consumers didn’t have a choice of what components were inside their computers. Why would Intel spend money on ads to make us feel good about Intel?  For goodness sake, it is just a microchip in your computer. 

Key Point: What if we were to tell you that inside every Intel microprocessors is a smaller processor that lets the Sith Lords at Intel – who work for the Department of Defense –control every aspect of your computer remotely no matter what encryption codes you use

Yes, the Evil Emperor (Andrew Marshall) was able to retire two years ago at age 94 knowing that the Empire’s control has reached into every digital device in the world through the good work of his best student, DARPA Vader. The only thing left for the Evil Emperor to do is activate the Death Star, which as you will see in the DARPA “future plans” below, has already been built. The question is: “Will Luke Skywalker show up and defeat the Evil Empire?”

Intel-Based PC’s Permanently Hackable

To be truthful, this ad should read:

Intel “Controllers” of Tomorrow

All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC, your PC, through a second physical processor embedded within the main processor which has its own operating system embedded on the chip. It is being advertised as something that will allow IT professionals the ability to remotely troubleshoot a PC. Intel’s latest x86 chips contain a secret backdoor with an embedded subsystem called the Management Engine (ME) that functions as a separate CPU and cannot be disabled, and the code is proprietary

The Management Engine is a dedicated micro-controller on all recent Intel platforms. The first versions were included in the network card and later moved into the chipset where it shares flash with the BIOS but is completely independent of the CPU. It allows IT professionals to view the contents of hard drives, check the memory, hunt for problems on a machine remotely, or take over the system entirely.

Even an encrypted hard drive can be monitored and controlled by the “processor within the processor” that already has your encryption key. There is more than just the NSA monitoring your calls, emails, and transmissions — there is Intel (DARPA) “Inside” your computer. Intel collects “intelligence” but it also provides a backdoor to control, or turn off your computer at will just like it has been demonstrated that Cisco routers have a backdoor open to the NSA. A backdoor is a method of bypassing normal authentication in a cryptosystem used for securing unauthorized remote access to a computer.

Key Point: The word Intel was used for this DARPA product because it is collecting personal INTELLIGENCE from YOU that can be used against YOU anytime the Evil Empire decides it is to be done.

Why does DARPA, through Intel, have open access to all of your files and your computer? DARPA funded all of the original development of microprocessors. Intel is a front for DARPA and the military efforts to create, control, and weaponize all digital platforms through cyber-warfare. DARPA, ARPARNET, DARPANET, the Internet, and microprocessors are military creations that were allowed to come into the public market place only after the Department of Defense, and the CIA through In-Q-Tel, installed backdoors to control these powerful digital platforms of war fighting. 

Some European-made chips used in defense contracts have a built-in “kill switch” that can be accessed remotely to disable a microprocessor remotely on weapons that use the chip. The Pentagon has realized that it no longer controls who manufactures the chips that go into its increasingly complex systems. Nearly every military system today contains some commercial hardware. No entity, no matter how well funded, can afford to manufacture its own safe version of every chip in every piece of equipment

Vetting a chip is nearly impossible and requires a scanning electron microscope to examine the many layers of a chip and the millions or billions of transistors.  Semiconductor chips are made in Singapore, Taiwan, China, Europe, but Intel designs and manufactures all their own chips in their own fabrication plants in America.

Defense Science Board, which advises the DoD on science and technology developments, warned in a report that the continuing shift to overseas chip fabrication would expose the Pentagon’s most mission-critical integrated circuits to sabotage. The board was especially alarmed that no existing tests could detect such compromised chips, which led to the formation of the DARPA Trust in IC program. Each year, secure government computer networks weather thousands of attacks over the Internet from places where most of our electronics are being manufactured. Any malefactor who can penetrate government security can find out what chips are being ordered by the DoD and then target them for sabotage. Continue reading HERE.

In other words, DARPA Vader and the Evil Emperor are in open warfare with the rebellion that has hi-jacked the microprocessing industry in the infiltrated the Imperial Command.

Calling on Rebels of the Alliance to Take Out the Real Death Star  
Continue reading 
HERE.

Fellow Patriots and Rebels of the Alliance, we have taken the plans of the Galactic Empire’s Death Star and trust that you will know what to do with this Intel. Rebels have been preparing themselves since 1977, when the first Star Wars was released, to face the real Evil Empire, Darth Vadar, the Sith Lords, and the Imperial Command. This is no longer a science fiction fantasy or sequel to the next Star Wars. This is the real war and all Rebels of the Alliance are called to save the galaxy, or at least western civilization.

A Citizens Intelligence Report was previously given in a recent article. If you have not armed yourself with this intelligence, please do so now.  The CIA and Deep State Exposed. We need all Alliance Rebels to analyze the Death Star’s plans and identify vulnerable exhaust ports that connect to the main reactor.

In this additional intelligence report to fellow Alliance Rebels, we will show you the following to assist in your planning efforts in analyzing the Death Star:

Microprocessors, the Internet, Cisco Systems, Google, and Intel were all DARPA projects that were allowed to flourish with new technologies created and funded by the military for cyberwarfare.

Most high-tech moguls are simply “front men” selling DARPA and In-Q-Tel (the CIA’s DARPA) products that control our lives and spy on us continually.

Intel processors have a backdoor built into the microprocessor that allows complete monitoring and control over your personal computer.

Cisco Systems is a front for DARPA routers that were created with a backdoor for the NSA to spy on “virtually every exchange on the Internet.”

Cisco System’s “Internet of Things” plants net-bots in all devices under its control that can be activated remotely and used for cyber-attacks.

The Internet was first a DARPA project called the ARPANET which was created as an information technology weapon for cyberwarfare.

DARPA, the Inventors of Warfare Technology

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum (Group). The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA’s In-Q-Tel in the development of high-tech network-based cyber-warfare.

In-Q-Tel contracts almost all of its work through SAIC (Science Applications International Corporation) which changed its name to Leidos in 2013. Leidos is among the top 10 largest defense contractors in the U. S. and has a symbiotic relationship with the NSA and U. S. intelligence agencies.

The Highland Forum, DARPA, and In-Q-Tel are secret multi-national high-tech think tanks for inventing and controlling innovations that can be turned into weapons. Military and information technology experts gather at the Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of “network-centric warfare” which is now a top concern of the military and the corporations that serve it.

DARPANET = Internet

In 1973, DARPA initiated a research program to investigate techniques and technologies for interlinking packet networks of various kinds. The objective was to develop communication protocols which would allow networked computers to communicate transparently across multiple, linked packet networks for the use of defense contractors. This was called the “Internetting Project” and the system of networks which emerged from the research was known as ARPANET, later to be called Internet.

In 1986, the U.S. National Science Foundation (NSF) initiated the development of the NSFNET which, today, provides a major backbone communication service for the Internet. The National Aeronautics and Space Administration (NASA) and the U.S. Department of Energy contributed additional backbone facilities in the form of the NSINET and ESNET respectively. Thus, the electronic connectivity of the Internet was advanced with government funding.

A great deal of support for the Internet community has come from the U.S. Federal Government, since the Internet was originally part of a federally-funded research program and, subsequently, has become a major part of the U.S. research infrastructure.

Cisco Systems – DARPA Routers

Once the ARPANET proved to be effective, routers were created that could handle exchanges between systems and computers. In 1998, virtually every Internet exchange went through a Cisco router. In 2010, a researcher at IBM publicly revealed a flaw in a Cisco operating system that allows a hacker to use a backdoor that was supposed to be available only to law enforcement agencies. The intruder could hi-jack the Cisco device and use it to spy on all communications passing through it, including the content of e-mails, leaving products vulnerable to attack, particularly ubiquitous software programs like those produced by Microsoft. These backdoors put millions of customers and their private information at risk and jeopardizes the security of electrical power facilities, public utilities, and transportation systems.

Cisco has been accused of remotely monitoring users’ connections through Cisco’s Linksys E2700, E3500, E4500 devices. They have been reported to be remotely updated to a firmware version that forces users to register for a cloud service which allows Cisco to monitor their network use and ultimately shut down the cloud service account and render the affected router unusable.

Cisco has also been accused of building into their routers a firewall backdoor developed by NSA. The Tailored Access Operations (TAO) unit and other NSA employees intercept servers, routers and other network gear being shipped to organizations targeted for surveillance and install covert firmware onto them before they’re delivered. These Trojan horse systems were described by an NSA manager as being “some of the most productive operations in TAO because they pre-position access points into hard target networks around the world.”

The Creation of DARPA’s Google

The United States intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC), Google was one among a group of private sector start-ups co-opted by U.S. intelligence to control information warfare.

In 1994 (the same year the Highlands Forum  –DARPA’s boss — was founded under the stewardship of the Office of the Secretary of Defense, the ONA, and DARPA)  two PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.

The NSA needed to control and monitor digital information, particularly the data flowing over the Internet. With its millions of customers around the world, Google is effectively a directory of people using the Internet. It stores users e-mail addresses and knows where they’re physically located, when they log in, and what they search for on the web. Google has a profile on every user. The government can “command” that any company must turn over that information, and it does so as part of the NSA’s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.

Under Google’s terms of service, the company advises its users that it may share their personal information with outside organizations, including government agencies, in order to “detect, prevent, or otherwise address fraud, security or technical issues” and to “protect against harm to the rights, property or safety of Google.”

Intelligence Agencies Control Industry

No intelligence organization can survive if it doesn’t know its enemy. As expansive as the NSA’s network of sensors is, it’s sometimes easier to get precise intelligence about hacking campaigns from the targets themselves. That’s why the NSA partnered with Google. Google’s Sergey Brin is just one of hundreds of CEOs who have been brought into the NSA’s circle of secrecy. Starting in 2008, the agency began offering executives temporary security clearances, some good for only one day, so they could sit in on classified threat briefings.

Private high-level meetings are just one way the NSA has forged alliances with corporations. Several classified programs allow companies to share the designs of their products with the agency so it can inspect them for flaws and, in some instances, install backdoors or other forms of privileged access. The types of companies that have shown the NSA their products include computer, server, and router manufacturers; makers of popular software products, including Microsoft; Internet and e-mail service providers; telecommunications companies; satellite manufacturers; antivirus and Internet security companies; and makers of encryption algorithms.

The NSA helps the companies find weaknesses in their products. But it also pays the companies not to fix some of them. Those weak spots give the agency an entry point for spying or attacking foreign governments that install the products in their intelligence agencies, their militaries, and their critical infrastructure. Microsoft, for instance, shares zero day vulnerabilities in its products with the NSA before releasing a public alert or a software patch. McAfee, the Internet security company owned by Intel, provides the NSA, the CIA, and the FBI with network traffic flows, analysis of malware, and information about hacking trends.

Companies that promise to disclose holes in their products only to the spy agencies are paid for their silence. To an extent, these openings for government surveillance are required by law. Telecommunications companies in particular must build their equipment in such a way that it can be tapped by a law enforcement agency presenting a court order. But when the NSA is gathering intelligence abroad, it is not bound by the same laws. The surveillance it conducts via backdoors and secret flaws in hardware and software would be illegal in most of the countries where it occurs.

AT&T is Controlled by Homeland Security

The Homeland Security Department conducts meetings with companies through its “cross sector working groups” initiative. These sessions are a chance for representatives from the large group of companies with which the government shares intelligence to meet with one another and hear from U.S. officials. The attendees at these meetings often have security clearances and have undergone background checks and interviews. Between January 2010 and October 2013, the period for which public records are available, the government held at least 168 meetings with companies just in the cross sector working group. There have been hundreds more meetings broken out by specific industry categories, such as energy, telecommunications, and transportation.

Through this exchange of intelligence, the government has created a cyber security business. AT&T and CenturyLink are in effect its private sentries, selling protection to select corporations and industries. AT&T has one of the longest histories of any company participating in government surveillance. Most phone calls in the United States pass through AT&T equipment at some point, regardless of which carrier initiates them. The company’s infrastructure is one of the most important and frequently tapped repositories of electronic intelligence for the NSA and U.S. law enforcement agencies.

CenturyLink, which has its headquarters in Monroe, Louisiana, has been a less familiar name in intelligence circles over the years. In 2011, the company acquired Qwest Communications, which is now a part of the NSA’s extended security apparatus.

DARPA’s History

DARPA’s history is littered with death and destruction. DARPA and In-Q-Tel, through the Highlands Forum (Group), have driven research and development for the military that has cost American taxpayers trillions. This same technology is also shared with countries throughout the world through open source sharing. The U. S. military wants our enemies to have the technology so that they can be spied upon with ever more sophisticated technology and attacked with ever-better weapons.

Key Point: If both sides have the same technology and weapons, then the Military-Industrial Complex always needs more money to spend on bigger and better weapons, continually.

Areas of focus and discovery for DARPA over its history include: NASA space projects, information processing, ARPANET (Internet), ballistic missile defensenuclear test detection, counterinsurgency, computer processing, behavioral sciences, materials sciences, sensors, surveillanceradarinfrared sensing, x-ray/gamma ray detection, global positioning satellites, information processing, tactical technologies, time-sharing systems, wide-area packet switching networks, packet radio networks, packet satellite networks, artificial intelligence, speech recognition, signal processing, robotics, hypermedia systems, virtual reality, personal computing, space technology, tactical armor, anti-armor programs, infrared sensing for space-based surveillance, high-energy laser technology, antisubmarine warfare, advanced cruise missiles, advanced aircraft, defense applications of advanced computing, integrated circuit research, submicrometer electronic technology and electron devices, very large-scale integration, charged particle beams, automatic target recognition, space based sensing, propulsion, aerospace planes, hypersonic research, strategic computing, advanced processing, networking technologies, lightweight satellites, interstellar travel, X-planes, computer security, and cyberwarfare, to name a few that have come into the public domain.

The list above is only the tip of the iceberg for DARPA projects. We do not know of the projects that are still classified, which could potentially be a much greater list. Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the “front” for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoors so that they can always attempt to control the military weapons that have been released into the corporate world for public use. 

Below is a list of DARPA projects on the drawing board, or at least the ones that we know about.  You might notice that the ideas are completely insane and only perpetuate continuous warfare.

Aircraft Carriers in the Sky: Using large manned aircraft to launch and recover small UAVs

ACTUV: A project to build an unmanned anti-submarine warfare vessel

Adaptive Execution Office: Robust connections to the war-fighter community

Air Dominance Initiative: Sixth-generation jet fighters

Atlas: A humanoid robot

Battlefield Illusion

Captive Air Amphibious Transporter

Clean-Slate Design of Resilient, Adaptive, Secure Hosts (CRASH)

Cognitive Technology Threat Warning System

Collaborative Operations in Denied Environment: Modular software architecture for UAVs

Combat Zones That See: “Track everything that moves”

Computational Weapon Optic: Computer rifle scope

DARPA XG: Technology for Dynamic Spectrum Access for assured military communications

Experimental Spaceplane 1: First stage of a reusable space transport

Gremlins: Air-launched and recoverable UAVs

Ground X-Vehicle Technology

Fast Lightweight Autonomy: Software algorithms that enable UAVs to fly anywhere

High Energy Liquid Laser Area Defense System

High Productivity Computing Systems

Human Universal Load Carrier: Battery-powered human exoskeleton

Hydra: Undersea network of mobile unmanned sensors

Long Range Anti-Ship Missile

MAHEM: Molten penetrating munition

MEMS Exchange: Microelectromechanical Systems Implementation Environment

MeshWorm: An earthworm-like robot

Mind’s Eye: A visual intelligence system for detecting and analyzing activity from video feeds

Near Zero Power RF and Sensor Operations 

Next Generation Tactical Wearable Night Vision

One Shot: Sniper scope that automatically measures crosswind and range

Persistent Close Air Support

Phoenix: A satellite project with the aim to recycle retired satellite parts

Remote-controlled Insects

Satellite Remote Listening System: A satellite mounted system that can eavesdrop on a targeted area

DARPA Silent Talk: Identify EEG patterns for words and transmit these for covert communications

System of Systems Integration Technology and Experimentation: Distribute air warfare capabilities

Squad X Core Technologies: Digitized, integrated technologies that improve infantry awareness

SyNAPSE: Systems of Neuromorphic Adaptive Plastic Scalable Electronics

XOS: Powered military exoskeleton

SIGMA Devices: A network of mobile devices the size of smart phones

Tactical Boost Glide: Air-launched hypersonic boost glide missile

Tactically Exploited Reconnaissance Node: Ship-based long-range ISR UAV

(Urban Leader Tactical Response, Awareness and Visualization): Heads-up display

VTOL X-Plane

Warrior Web: Soft exosuit

WolfPack

XDATA: Processing and analyzing vast amounts of information

We think it fair to say that any reasonable person would agree that DARPA Vader is simply evil and focused on killing, warfare, and manipulation science. 

Just the list above shows the insanity driving this agency that is not being controlled by any governmental agency outside of the military. There is no limit to research and development for warfare and any idea that advances warfare is funded and put into production before anyone can object. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers – the military.

What the Rebel Alliance Can Do to Stop the Evil Empire

Investigate, audit and then defund DARPA, In-Q-Tel and the Highlands Forum.

End the Highlands Forum and investigate all participants for industrial and military espionage.

Stop using integrated circuits, chips, and microprocessors from foreign countries.

Investigate Cisco, Google, Intel, Facebook, Microsoft, Apple, and other DARPA sponsored and funded technology companies and seize ownership of the companies for the U. S. taxpayers whose tax dollars created these fronts.

Seize the assets of all companies found to use backdoors in their products for any reason.

Stop the NSA from using backdoors on routers, microchips, and processors and close those avenues of manipulation and surveillance.

There may be other strategies and tactics that we haven’t listed, and we welcome your ideas and call to action to your community of Rebels and Patriots. We ask that citizens around the world call on their inner Hans, Luke and Leia. The story of Star Wars is more than a science fiction movie. The characters and plot are deeply embedded memes that actually point to the truth about forces in the world that wish to destroy humanity.

Guided by the spirit of Obi-Wan, we can each find the FORCE within us to destroy the Death Star created by DARPA and the DoD…and, yes, save the world. 

Rebel Alliance Unite!

Originally posted at: http://themillenniumreport.com/2017/01/darpa-vader-and-the-evil-intel-empire-inside/

*Permission granted to repost with full attribution

___
DARPA Vader and the Evil Intel Empire Inside | SOTN: Alternative News & Commentary


THE MILLENNIUM REPORT: Reporting the Most Important News in the World Today



Before It’s News® is a community of individuals who report on what’s going on around them, from all around the world.

Anyone can join.
Anyone can contribute.
Anyone can become informed about their world.

"United We Stand" Click Here To Create Your Personal Citizen Journalist Account Today, Be Sure To Invite Your Friends.

Please Help Support BeforeitsNews by trying our Natural Health Products below!


Order by Phone at 888-809-8385 or online at https://mitocopper.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomic.com M - F 9am to 5pm EST

Order by Phone at 866-388-7003 or online at https://www.herbanomics.com M - F 9am to 5pm EST


Humic & Fulvic Trace Minerals Complex - Nature's most important supplement! Vivid Dreams again!

HNEX HydroNano EXtracellular Water - Improve immune system health and reduce inflammation.

Ultimate Clinical Potency Curcumin - Natural pain relief, reduce inflammation and so much more.

MitoCopper - Bioavailable Copper destroys pathogens and gives you more energy. (See Blood Video)

Oxy Powder - Natural Colon Cleanser!  Cleans out toxic buildup with oxygen!

Nascent Iodine - Promotes detoxification, mental focus and thyroid health.

Smart Meter Cover -  Reduces Smart Meter radiation by 96%! (See Video).

Report abuse

    Comments

    Your Comments
    Question   Razz  Sad   Evil  Exclaim  Smile  Redface  Biggrin  Surprised  Eek   Confused   Cool  LOL   Mad   Twisted  Rolleyes   Wink  Idea  Arrow  Neutral  Cry   Mr. Green

    Total 14 comments
    • Man

      sponsored article by Apple

      • American Intelligence Media

        Do your homework, Man, and you would know that there is an Intel inside Apple, too. https://en.m.wikipedia.org/wiki/Apple%27s_transition_to_Intel_processors

      • sitrep

        Upfront: This is not written in a Technical format, some of the info is repeated, so you can grasp how massive this is.
        This is good information.
        Please read it, distribute this, because this is one that will eventually go down in the history books as the Most Massive deception, and theft aimed at the American Public.
        Thank You.

        The Silicon Valley Sultans (SVS), Have totally installed Illegal Operating Systems (OS) on Computers/Smart Devices.

        No need to get into specifics, or tech info, Bottom line they control your systems.
        They do not even hide it, why should they have to hide it, Everyone claims to be a Computer/Smart Device Genius Right!!! So why would the average user complain, or even ask questions, and take a chance of being a retard computer/device person!!!!!
        The average user kinda knows something is going on, although cannot figure it, and sure not going to ask questions to be labeled a retard.

        My gosh, the SVS has direct links to the mass Users bank accounts. Yes they also Require credit card numbers to setup accounts, Then the users find they like the ROKU home Internet TV Device has did the dirty crap by so called “Recommend” for you, and have put a bunch of crap PAY channels in the shopping cart without your permission.

        People these Silicon Valley Sultan(SVS) Jerks are criminals in every way, Obamma let them run free, so now they are out in the open, and very aggressive.
        Look at Apple bragging about how much money they stole from the Mass Public!!!!!!!!-
        (It was on Drudgereport)
        The SVS are trying to Meet with President Trump, so the SVS can continue delivering updates to you laced with malware,worms,Trojans,virus,Morphing programs that are designed to steal your info.
        They have links straight to your back/card accounts, they know your balance!!!!!
        People this is not about some little application!!!! This is Massive!!!!!!!!
        They have these programs, and OS designed so you cannot uninstall their Crap, and if you do they just re-install it.

        The so Called Assistance BOT in Micro-Shaft WIN-10 can not be uninstalled without corrupting the operating system (OS).
        The Silicon Valley Sultans (SVS), Have totally installed Illegal Operating Systems (OS) on Computers/Smart Devices.

        No need to get into specifics, or tech info, Bottom line they control your systems.
        They do not even hide it, why should they have to hide it, Everyone claims to be a Computer/Smart Device Genius Right!!! So why would the average user complain, or even ask questions, and take a chance of being a retard computer/device person!!!!!
        The average user kinda knows something is going on, although cannot figure it, and sure not going to ask questions to be labeled a retard.

        My gosh, the SVS has direct links to the mass Users bank accounts. Yes they also Require credit card numbers to setup accounts, Then the users find they like the ROKU home Internet TV Device has did the dirty crap by so called “Recommend” for you, and have put a bunch of crap PAY channels in the shopping cart without your permission.

        People these Silicon Valley Sultan(SVS) Jerks are criminals in every way, Obamma let them run free, so now they are out in the open, and very aggressive.
        Look at Apple bragging about how much money they stole from the Mass Public!!!!!!!!-
        (It was on Drudgereport)
        The SVS are trying to Meet with President Trump, so the SVS can continue delivering updates to you laced with malware,worms,Trojans,virus,Morphing programs that are designed to steal your info.
        They have links straight to your back/card accounts, they know your balance!!!!!
        People this is not about some little application!!!! This is Massive!!!!!!!!
        They have these programs, and OS designed so you cannot uninstall their Crap, and if you do they just re-install it.

        The so Called Assistance BOT in Micro-Shaft WIN-10 can not be uninstalled without corrupting the operating system (OS).
        They record your actions, your private info 24/7, and store it on there systems. If you Go deep, and try to setup security you will run into many web-pages with digital switches to turn on/off security features, Then they Pop up the “Got it” button, that goes behind you, and aggressively deactivates your settings.
        They have external switches that are not on your device!!!!!! stored on their web-servers, clouds etc.

        ***********ALERT
        The Last Security Update/Patch Totally deactivated the security on the Smart Phone.
        Also they go deeper into the Operating System (OS), and installed, and or changed other programs that you probably never use. Yes their Malware-Bots, search the dates on your device to find programs/apps that you do not use. They write code to search the Time Stamps/Dates to identify these programs/apps, Then the SVS will activate the digital switch within that program/app to do things like allow web-sites to collect your Payment Info, yes your Bank Accounts/Cards.
        The SVS are criminals bragging, and laughing at how they are fooling you.
        Remember the Smart Phone is actually a computer.
        Yes all the technology in these devices is Old tech, they just packed it into a Slick case,and hyped it up.
        There is nothing wrong with making Legal Money, although there is nothing Legal about what the SVS are doing.Your Microphones,Cameras,anything connected to your device, The SVS controls all devices,and records 24/7.
        Yes, in Windows 10 they have embedded layers of BS programs, that look to be advertisement that you cannot uninstall, You No longer Have Permission on your Own Systems, Are these really just simple advert programs? NO they are not.

        This Is A National Emergency, and Congress Needs to Immediately Hold a Security Session, and Have the CEO,s of these Tech Companies swear in under Oath, and if they are found Guilty, Put The Leg Irons/Shackles on them, and So they can feel the Humiliation,and Pain they have caused others, Yes let them do the Leg Iron-Shackle Duck walk on Live TV.
        These SVS jerks will try have the mass Public believe they Invented, or worked from the bottom up…..No Go back read these individuals History Most of them are Liars,and Thieves.
        The SVS are a tight group, and in some form, or fashion have connections to all the Major Corrupt Web-Sites. They have their secret Meetings, and Do everything in their power to prevent any legal Tech startup companies so they have no competition.
        50% or more of the SVS employees are Foriegn, many are straight up Illegal, and they sure do not mind, they enjoy stealing from you, and putting the corrupt Operating Systems on your devices, This is just a huge Massive infiltration of ISIS, and other Mid-East Countries doing what they do best, ultimately they will penetrate deeper,or have they already!!!. The SVS Hires Cyber Attackers.
        People I tried to write this in a very non-technical manner hoping some will understand, how massive the SVS Cyber Attack is.
        Alert Others, Write your Congressmen,and Senators, Speak up, Let President Trump Know what is going on.
        The SVS is also Siding with ISIS, just like Obamma, and are supporting Riots Across America.
        Just yesterday, Google was publicly supporting Rioters, whom are supporting the mass infiltration Of Criminal Foreign Infiltrators, and ISIS supports all of it, along with Obama.
        The SVS has stolen your Money they are rich, with headquarters in China,and other Countries.
        China pays huge sums of money for your Private Information, Do your research!!!!!! inform yourself. It is OK to Question, It is OK not to know everything about the computers/Smart Devices
        The SVS trick you, and Humiliate people whom Question, do not fall for their dis-info.
        The Can jet to any foreign country, Stand Up Now for yourself, and to Help the USA
        The SVS is laughing all the way to the bank.
        May God Help Us, The USA

    • Antique White

      very interesting forth Reich article mr bond, to think that dod and darpa violate the forth amendment with out any resistance is very interesting in deed!

      just what can we do with all this personel info? how can we use it to get our way?

      world domination ?

      spectra the spy within the spy! :cool:

      up her back door! :shock:

      • Wity

        Not to much brain power here….

        Let me help you a little bit :-

        How to control the human race ~ GET AS MUCH INTEL ON INDIVIDUALS AS YOU CAN
        ITS CALLED PROFILE BUILDING….

        Track their movements from social networking… ie political affiliations
        education to employment record , hobbies, life style, favorites likes and dislikes…
        banking and financial information, family and friends, location, all activities etc etc

        This can all be found on the World Wide Web, Google Facebook Skype and so much more….

    • Canderson

      Oh my Intel inside.
      http://static2.hypable.com/wp-content/uploads/2016/08/OAnqJ.jpg

      Anyway isn’t Intel and Microsoft, IBM spinoffs? (Eye Beam)
      http://image.wikifoundry.com/image/1/3sWHSrfYyNZgNUq7EvZzuw13430/GW480H360

      Osiris, Isis, Heru-sa-aset (Horus, son of Isis)
      omnipresence, omniscience, omnipotence
      https://youtu.be/21P-FXXMqQ8?t=1552

      Six (6) is a sacred number, representing the number of the soul of man (Westcott, p. 66). This shows the omnipotent power of God, as this belief parallels Revelation 13:18, where God assigns 666 to man and to the beast. Six is also believed to be “all-sufficient”. This parallels Biblical teaching, which states that man’s great sin is pride in himself.

      The shadow archetype, in itself is not good or bad. Everyone is capable of being loving, and also being violent. What is
      important here is to understand that the darkness, or the shadow needs to be accepted as much as light is accepted.
      For, light cannot exist without darkness. This is the middle path – acceptance of both, equally.

      (I only go as far as to the necessary evil, in total freedom, in space, the self can no longer stick together, too many choices and cold, dark.)

      Quote by Plato; Pro Elitism, but presumes a sane mind, the lowest common denominator.
      Quote by Plato: “In politics we presume that everyone who knows how to get votes knows how to administer a city or a state. When we are ill… we do not ask for the handsomest physician, or the most eloquent one.”

      “And what, Socrates, is the food of the soul? Surely, I said, knowledge is the food of the soul.” — Plato

    • my2pesos

      GOOGLE ~ GOG OLE ~ GO OGLE
      .
      .
      GOOGLE ~ Le! Go-Go ~ GEO LOG

      • nyetyme19

        hey Rainman, you uh getting anywhere unscrambling random words? You been at this for awhile now, just wondering if you have come up with anything useful to share with all of us.

        • my2pesos

          Unscrambling ~ Rumbles Can
          .
          .
          Unscrambles ~ Cables ‘MR’ Sun
          .
          Unscramble ~ Blue ‘MR’ Scans
          .
          .
          The Scramble ~ Master Belch
          .
          The Scrambles ~ Smart Belches
          .
          Then Scramble ~ Smelt Branches…………(12) – AG)…………(Smelt- Melts)

    • Overmind

      You forgot fakebook.

    • caoneil76

      That ranks up there with some of the dumbest shit i’ve read on BIN.

    • Dave 1963

      You know what’s worse than DARPA? The pop up ads on this site!

      There’s not just a DARPA on your computer. There’s also a electronic chip on your cars steering, braking, and acceleration system. All of which can be hacked via bluetooth, cd, or a diagnostic port. This is probably how Michael Hastings was killed. Sound like science fiction? Here’s a link to a lecture by Kathleen Fisher, DARPA’s projects manager, where she explains the vulnerability of ANYTHING operated by a computer chip.

      https://www.youtube.com/watch?v=3D6jxBDy8k8

      Welcome to the real world!

    • DISPENSER

      Lot more truth in this than I want it to be.

      I’m proud to be an American, where at least I know I’m free. ………. L. Greenwood.

    • truthseeker4809

      Just expose whatever truth you come up with. Evil can not survive the light shining on them. If the truth you thought turned out be false, reveal that to the public. No harm will fall upon to you. We are fellable humans and we do whatever we can do to shine lights on everything in the world. Sometimes truth can be mixed with a bunch of lies, it’s our duty to sort out the lies from the truth.

    MOST RECENT
    Load more ...

    SignUp

    Login

    Newsletter

    Email this story
    Email this story

    If you really want to ban this commenter, please write down the reason:

    If you really want to disable all recommended stories, click on OK button. After that, you will be redirect to your options page.