#PRISM NETWORK: 2020 [REPOST] Credits To Journalist~ Tracy Turner ORIGINAL POSTED 1.26.2019

MossadGate: “NSA Prism” Mossad Spying Cousins Out of the Closet

ORIGINAL FORUM POST / CREATION OF THE BLOG BY TRACY TURNER

GENERAL INFORMATION: THERE IS NO TI PROGRAM OR WHATEVER THESE DISINFO AGENTS POST AND REITERATE. THERE IS ONLY SOMETHING CALLED PRISM WHICH WAS EXPOSED IN 2008 BY MANY INCLUDING THE US NSA AGENCY AND EDWARD SNOWDEN, AND THE COMPLETE OVERTAKE OF OUR SYSTEM PUBLICLY (THE COVERT TAKEOVER HAPPENED DECADES AGO).

ANYONE WHO STATES THEY ARE A TI, DON’T WORRY. IT IS BECAUSE YOU KNOW THE SYSTEM AND WHATS GOING ON. THAT’S IT. THERE IS NOTHING ELSE.

DO NOT EVER POST YOUR OPINIONS BUT RATHER SEARCH THE FAMOUS AND IMPORTANT INDIVIDUALS WHOM HAVE SPOKEN OUT ABOUT THIS AND CREATE A POINT OF REFERENCE.

THE NSA STATED: [PARAPHRASING] WE HAVE BEEN BREACHED. ALL OF OUR EQUIPMENT WAS DOWN FOR DAYS PRIOR TO THE 911 BOMBINGS.

PERSECUTORY ACTIONS ARE ONLY BECAUSE YOU UNDERSTAND AND KNOW. THE PROOF IS IN THE ABILITY TO DISTINGUISH OPINION FROM FACT.

MossadGate: “NSA Prism” Mossad Spying Cousins Out of the Closet

Posted onAuthorEric KarlstromLeave a comment

MossadGate: “NSA Prism” Mossad Spying Cousins Out of the Closet

~ Tracy Turner

Israeli Flag

From: MossadGate: “NSA Prism” Mossad Spying Cousins Out of the Closet

The NSA leaving data harvesting, data mining and data milling activity to the Mossad is leaving a Fox guarding a Henhouse.

Mossad – Prism- Verint, Narus, NICE, Amdocs, Unit-8200, Pioneer, Payonner, Kidon, Thompson Reuters, Oracle, AT&T, Prism Spinoff, Unit 8200 Spinoff, Egypt Telecom, Atlantic Bell, France Telecom, Ministry of Truth, PoP, Cisco, NSA, Spyware, StuxNet, Media (Persian Shepherd w/Great Ape, Dolphin and SuperCharged Craniumtm Monsanto NextGenGWOTtm Brain and her daughter Pentagon), Packet, Flame, Sniffer, Deep Packet Sniffer, European Telephone……xxx

Helpful hints: use * many * alternative search engines, many
Countries use alternative spellings (i.e., Pioneer, Payoneer)

US NSA Prism brief summary: Whistle-Blower’s Evidence, Uncut – WIRED
In San Francisco the “secret room” is Room 641A at 611 Folsom Street, the site of a large SBC phone building, … spy operation is the fact that only people with security clearance from the National Security Agency can enter this room.

Mossad Unit 8200 Prism Spying Scandal longer summary:

The US National Security Agency has an Israeli Mossad cousin or two “wishing” to come out of the Telecom closet. The Israeli Mossad spin-off companies are all over the planet: Verint, Comverse, Unit 8200 (preceding names Mossad synonyms) all Mossad); Brasil Telecom, Orange S.A., formerly France Télécom S.A., Egypt Telecom, AT&T, Microsoft, Apple are all ‘infiltrated/compromised’.

Mossad’s Narus provides AT&T, Brasil Telecom, Egypt Telecom with Deep Packet Inspection equipment (DPI) technology (Spy Ware). Others involved (include but not limited to: Sandvine (Canada), Allot (Israel), Ixia (USA), Advanced IO (Canada) and Procera Networks (USA).

The NSA leaving data harvesting, data mining and data milling activity to the Mossad is leaving a Fox guarding a Henhouse.

I really think many “journalists” with “unconscious sympathy” for poor ol’ Israel have been a Mossad-tail wagging a planetary-dog with disinformation. The Bush/Obama NSA is guilty as sin – probably numerous lives were snuffed keeping this secret. But the Unit 8200 Mossad spin-off “corporations” use the Reuters Cartel to pin all of this on NSA. Few articles have Mossad Unit 8200 Prism Scandal in title or body, making 99% of the “Scandal” nothing but propaganda.

If the US media were monopolized by curious, investigative gentiles, would read: “Earth caught within PRISM Surveillance Program (NSA) caught within Israeli Mossad: Boeing Verint NARUS Palentir NICE PRISM Comserve Pioneer (Oracle?)”.

Telecom, hardware, software, middleware (Oracle?) companies deny involvement, but IT technicians who run cable satellite and microwave, or use packet sniffers, etc. surely knew something was amiss. The Mossad had and still has a backdoor to such entities as: (Narus) Shanghai Telecom.

“Journalist Receives Death Threat for Talking About Israel”. . This article is a few years old, but Anti-Apartheid Activist and Israel is like Glycerin and Potassium Permanganate.

Not surprising considering the Mossad spun off Unit 8200, which spun off Narus, Comverse, AMDOC’s, et al; their “clientele” wink, wink includes major phone/Internet giants in Canada; China; France; Germany; Italy; China & the US. Verint and Narus have telecommunications gear in France; Iran; Turkey; Levant; Syria; Palestine; Israel; Iraq & Jordan.

Note, numerous telecoms seem affiliated with Unit 8200; individual persons may or may not be affiliated. FYI, only, From Linkedin.com:

Yechiam Cohen – General Counsel, AMDOC’s

Tamir Ginat – APAC Vice President of Sales at AMDOCS | EMEA President at NICE

Bernard Heuse = Director of Delivery – AMDOC’s jNetX at AMDOC’s Location Nice Area, France Industry Télécommunications

Senior Oracle DBA at NICE Systems Location Israel Industry Computer Software Avishai Schlesinger’s … AMDOC’s

Johanna Avraham, MBA’s (Canada) professional profile on LinkedIn. Experience: Financial Analyst, NICE Systems; Senior Financial Analyst, AMDOC’s

Judith Polak’s – Controllership of delivery contracts within Enterprise Services in large companies such as Converse, AMDOC’s, ECI, Tnuva, Lumenis, etc. CEO Assistant

Desislava Marinova discover inside connections to recommended job candidates … TELECOM Billing IT Jobs – AMDOC’s, CGI, Comverse, CSG, Intec, MaxBill, Openet, Oracle Billing, NetCracker, Eri, TM Forum.

GSS Div. at AMDOC’s Location Israel Industry Telecommunications Anat Dagan’s Overview … Anat Dagan, Data and Compliance Specialist at Thomson Reuters. Israel.

Thomson Reuters. Israel is neck deep in Mossad’s AMDOC’s and NICE, but will keep you “informed”?

Ranjit Jha’s Overview Current System Lead at Thomson Reuters at Thomson Reuters; Past IT Asset Management Lead at AMDOC’s

Krzysiek Szymczyk –Warszawa, woj. mazowieckie … Head of Technology Control Office at Bank Handlowy w Warszawie S.A., … Internal Communication Specialist at Reuters, Intern at Banca Mediolanum SpA Wykształcenie: Community of European Management Schools (CEMS), Warsaw School of … pl.linkedin.com/pub/dir/Krzysiek/Szymczyk/pl-8172…
The US Lamestream Media report the French are distressed about having their embassy, national telecom systems, etc. “tapped”. De Dallas a Montreal by Maurice Philipps was published at the same time that France is seething with (justifiable) indignation at Israel and the US. The book makes a strong connection between the JFK Assasination and the Mossad. France’s seething rage at the Mossad Kidon, Pioneer and Unit 8200 in palpable to old school Internetphiles.

From RichardSilverstein.com:

The goal is apparently to infiltrate the computers of individuals in Iran, Israel, Palestine and elsewhere who are engaged in activities that interest Israel’s secret police including military intelligence.
Within Israel and the Palestinian territories Flame is implemented by the Shin Bet. No Israeli police officer would ever investigate a case of an Israeli computer infected with Flame since it would lead to exposing Israeli security services.
They have received additional reports from customer machines in Austria, Russia, Hong Kong, and the United Arab Emirates. . . (excerpt) Israel has neither confirmed nor denied being involved with Stuxnet” and Flame.

Ed Clark – Founded Natsam to lead Amdocs into European IT solutions … Cegetel, CGI France, Compaq France, France Telecom, Narus Inc., Thales, UshaComm, XaCCT Technologies • Developed, sold, taught management course in telecom CRM and Billing IT

“Li” is Amdocs vice president, APAC Division, Amdocs company is billing and customer management solutions for leading software … LinkedIn; Google+; More from Business Wire. Blog; Apps; Canada; UK / Ireland; Deutschland; France; Hong Kong; Italy; Japan; EON: Enhanced Online News …

* “Enhanced Online News”? * ‘EON’ Pop-tart toaster-news…

Syed Kamran Gardezi discover inside connections to … International IP Traffic Monitoring System under partnership agreement with NARUS … Japan Hong Kong Taiwan South Korea China Russia India Pakistan Malaysia

The AtlanticWire.com ran a headline, CIA-Funded Startup Palantir Denies Link to NSA — but They Both Make a ‘Prism’… Several “alternative news” entities wrote about Palentir Technologies as being “linked to NSA Prism” but failed to mention the “Unit 8200 Mossad” connection. Many onlookers would follow the money; but packet sniffers, hacks, cracks, “adjustments to daily news, fiances, wars and daily life” via the Mossad Ministry of Truth are done with digital bits and bytes, digital talent, with “permission” of entities that deny involvement – not with money alone. Follow the hardware, software, middleware and backdoors.

“Mossad, the Israeli intelligence force, has an Old Testament motto that is described two ways. Politely as, “For by wise guidance you can wage your war.” Or, from a former agent critical of the agency, “By Way Of Deception, Thou Shalt Do War.”

Your Google Search – Thomson Reuters Mossad- Verint, Narus, NICE, Amdocs, Unit-8200, Pioneer, Payoneer, Kidon, Palantir, Comserve, Natsam … – did not match any documents.
Suggestions:
· Make sure all words are spelled correctly.
· Try different keywords.
· Try more general keywords.
· Try fewer keywords.

The crazy information, Kärcher, and freedom of expression in its essence: “Better to die standing than live on your knees” Dolores Gómez Ibárruri

The Mossad does not object to 9/11 Truth, they just object to all Truth. If Americans are not careful, someday the Mossad Ministry of Truth could allow faux-hero videos, skateboarders breaking bones videos to go viral… And censor, suppress truth and free speech online.

Reuters is involved in this and reporting “the truth”? Someone needs to invent ‘virtual-newr ass-wipe’ for real-life Thomson Reuters outhouses… Compliments Israeli Mossad Unit 8200 “deep-packet-sniffing” half of the Globe, and Reuters cranking out article after article about their bipolar cousin, NSA PRISM!
What evidence of Mossad shooting JFK is in De Dallas a Montreal by Maurice Philipps?
Are both Thomson Reuters and Unit 8200 “Deep Packet Sniffing” to cover it up?
What other Mossad Head of State Assassinations are covered up on phones, pads, laptops, blogs, etc.?
How many failed banks “relied” on Narus, Verint, AMDOC’s, Comverse, etc.?
How many wars, near wars and future wars will originate from Telecom Spinal Taps and lack thereof by Mossad?

US NSA Prism affiliates – the right word eludes me… Think of Mossad as both basement heater and Thermostatic Controls. Think of all the major backbone systems worldwide – TV, phone, Internet more and more converged on the same network background. This least is major incomplete: Allot (Israel), France Telecom, AT&T, Verizon, Russia Telecom, India Telecom, Century Link, Brasil Telecom, Egypt Telecom, Sandvine (Canada), et al aka Global Telecommunications. Israel has Unit 8200 employees everywhere in these systems. All of these companies hire contractors, permanent staff, analysts, billing agents who have Linkedin resumes online bragging about their “sought after” Deep Packet Inspection equipment (DPI) technology (Spy Ware) skills.

This is an addition 1/5/2014 to original. Prism is a tiny part of the spy network; Americans all hate Prism. Think of a man, anatomically. Prism is like the dumbest part of a man’s brain, the NSA brain stem. Everything else is the other parts, Kidin the right arm, NICE the left arm, etc.

Hold that thought in mind. Contracts for telecom billing. DPI services are contracted, subcontracted, the same way Hollywood stars have 6-7 husbands by age 40. The companies, the employees, are digital “incest”… Cut Kidon out of your nations phone services, no one can make a phone call. Cut out AMDOCs. no billing gets done. When Facebook says Prism is “gone” it is the most wishful of thinking. You can see it in Obama’s face. America has a virii reaching into the Congress and White House; is it NSA or is it Unit 8200’s or both?

Want your TV/Phone and Internet as robust and dependable as 1980’s Dial Tone? Just hire techs, Tech-savvy-managers, IDF and MDF techs with diplomas from Unit 8200, Narus, Reuters experience in house, Kidon, Verint, Comverse, Unit 8200, Ixia (USA), Advanced IO (Canada) and Procera Network, NICE, Pioneer (spelled Payoneer elsewhere) (gathers everyone’s credit card dirt – can be used to coerce persons), Lumenis, CSG, Intec, MaxBill, Openet, Oracle Billing, NetCracker, ECI, Tnuva, Eri, TM Forum. GSS Div, Kidon, Palentir, Comserve, Natsam, AT&T, AMDOC’s.

FLAME and STUXNET bear repeated web searches. Companies most or all of us in America should be angry at: Boeing, Microsoft, Apple, Google, Bing, FaceBook, Yahoo – also all major TV networks. The victims here are not CEO’s, not multibillion dollar multinationals; victims are everyone old enough to use a pad, phone, computer or TV. Someone in your family like a certain flavor of TV porn. Both what was watched, what it cost and all that persons digital user habits are stored in Israel, probably for posterity.

Most things one can research today 1) Is like a Salmon climbing fish ladders at extreme spring melt, via censorship . 2) Once the researcher gets a good picture of the research – humankind should be grounded, humans themselves arrange into sheeple followers and devouring wolves. Space would be happier without Earthlings in it. 3) Always the denial – America, 26 million genocides, we are the white-hat cowboys. Israel, 4-7 million dead from genocide, we did it for God, remember the holocaust industry, buy now. Before researching body counts and Prism, I wished to be a tourist in Israel. It is more Racist than 1975 South Africa. I’ve gotten harassed for my writing; do not understand, why read and critice rather than reading propaganda in WSJ? On 1/5/2014, asked point blank if I hate or wish to see any race killed – go ask the Jews that question.

Are you an activist? Portray politicians as warmongering, energy gluttons, money mongering and cops with guns come, telling you that “you have free speech right”; cop with gun in your face, saying you have free speech rights. The intent always is the same: 1) Shut up activist chill free speech, 2) Get war crime photos “sources”, who is your source. When I find war crime photos, I blind myself to all, make no notes, leave it to gun toting storm troopers to find my forgotten source. Nobody remembers a long url 2-3 days later. 3) Stop writing text that flails politicians worst habits and hypocrisy. Do 1,2,3 look “free” to you. I’m sure Langstroth hives were invented while a cop with a gun stood nearby. Same with Radium, Relativity, Polio Vaccine and Pasteurization – all had Narus, Prism, NICE and AMDOC’s summoning armed police to help humans progress.

Edward Snowden is the Red Leather Book in Orwells 1984 Novel, another false hero. The NSA has been performing corpseless-summary executions in the U.S.and abroad since 1989 or perhaps even longer; Edward Snowden and his “Prism Leak: are a smokescreen. Snowden is one more false hero, a bone thrown to the people by the NSA and CIA.


 Palestine Cry: The Faithful of God and the Judgement of God …
5 sent. 2015 g. – For all Jews wishing to convert sincerely from the heart to Jesus Christ now, here ….. centers” – part of the extensive post-9/11 homeland security infrastructure. ….. Along with DSAC chairmen from the FBI and U.S. DHS I&A, DSAC is …… people to participate in organized harassment of targeted individuals.
http://stepalestinecryfreedom.blogspot.com/2015/09/the-faithful-of-god-and-j…
|Google

 MONARCH: The New Phoenix Program (9/22/2011 4th edition)
10 sent. 2011 g. – The targeted individuals (TI’s) fit a common profile. …… The toll of Eugenics Laws would fall heavily on non-Jewish Germans as well. …… Craig, became chief of the NSA’s military arm, the Army Security Agency.7 …… Total Information Awareness (TIA): The Department of Homeland Security (DHS) will be …
http://monarchnewphoenix.blogspot.com/2011/09/monarch-new-phoenix-program-91…
|Google

Показаны результаты для Вашингтона
1
Homeland Security’s Deadly Ammo Plan | Real Jew News
realzionistnews.com›?p=749
Homeland Security Articles. How The Jews Prompted A German Backlash. … Mossad Articles. Neo-Nazi Rise In Germany Frightens Jews. Neocon Jews & Kosovo.
2
Homeland Security Finally Vows… | The Huffington Post
huffingtonpost.com›entry/homeland-security-jcc…
Homeland Security Secretary John F. Kelly, in a Thursday statement, condemned the rise of what he called “apparent hate-inspired attacks and harassment against individuals and communities,” calling them “unacceptable.”
3
DHS = DEPARTMENT OF HEBREW SECURTY | Smoloko
smoloko.com›?p=13723
Organized Stalking and Organized Religion: among gang stalking groups, only the Jewish Federation and Jewish religion is federally funded to stalk and harass targeted … the jews behind dhs jeh johnson. The Israel/Homeland Security Connection.
4
A late night visit from the Department of Homeland Security
theuglytruth.wordpress.com›…a…department…homeland…
That’s right, ladies and gents, none other than the Department of Homeland Security run by Uncle Sam. … If in fact DHS is staffed by individuals with obviously racist, anti-Arab … Here we are, in 2013, 50 years after MOSSAD killed JFK, the last president to resist Israel.
5
Republic Broadcasting Network » “Homeland Security”…
republicbroadcasting.org›news/homeland…jewish…
“Homeland Security”: another Jewish racket. … In fact, the entire “Arab Spring” was largely a CIA-Mossad-MI6 (read: Jewish) instigated and financed … Zionist stooge Tom Ridge was the director of “Homeland Security” for about two years, paving the way for…
6
Turning America Into Gaza | Veterans Today
veteranstoday.com›2013/06/09/turning-america-into…
Mrs. Homeland Security. The True boss of DHS ? … And as a growing percentage of Americans now realize 911 was an inside job, done by Zionist NeoCons, the Mossad, and a cabal within the high command of the USAF (1).
7
Zionist Jews Plot to Corrupt America’s Gun’s Rights through…
nodisinfo.com›jews-plot-corrupt-americas-guns…tv…
This zionist Jew is Husein Ruslan Tsarni son of CIA/DHS/MOSSAD SLIMEBALL … Exhibit 2) Bratayley NSA, Mossad & DHS PsyOp Hoax Family Fraudsters & Criminal … Homeland Security has billions & Billions to commit these treasonous PsyOps towards…
8
jews zionists nsa dhs homeland security mossad “targeted individuals”… — смотрите картинки
yandex.ru/images›jews zionists nsa dhs homeland security mossad “targeted individuals” “organized harassment”
Description: ews zionists nsa dhs homeland security mossad “targeted individuals” “organized harassment”
Description: ews zionists nsa dhs homeland security mossad “targeted individuals” “organized harassment”
Description: ews zionists nsa dhs homeland security mossad “targeted individuals” “organized harassment”
Пожаловаться
9
Leadership | Homeland Security
dhs.gov›leadership
Official website of the Department of Homeland Security.
Assistant Secretary, Threat Prevention and Security Policy (acting), Kelli Ann Burriesci
Assistant Secretary, Strategy, Planning, Analysis & Risk (Vacant)
10
Lesbian-Gate Is Unelectable Loser Hillary Huma Abedin-Gate…
fourwinds10.com›siterun_data/government/fraud/…
…of California, Bushfraud CIA Chief Michael Hayden and Department of Homeland Security Secretary MOSSAD agent Michael Chertoff. … Patriotic, God-loving, peaceful Jewish People are NOT the same as the war mongering ZIONIST KHAZARIAN Jews.
Israel and the NSA Scandal | The Occidental Observer – White…
theoccidentalobserver.net›2013/06/israel-and…nsa…
…in providing information and pursuing targeted political groups and individuals. … secret police (MOSSAD), have provided the spy software for the NSA and this, of course … former IDF officer, to head that state’s ‘Homeland Security Department and later resigned…
Показаны результаты для Вашингтона
By Zander C. Fuerza
educate-yourself.org›cn/MastersOfDeception.pdf
This analysis of the Jewish-Israeli-Mossad security nexus which orchestrated and coordinated 9/11 would not be … Two other Zionist Jews from Belgium, Jehuda Saar and Nathan Fruchter, were placed in the company to manage its international trading division.
Description: DF128 КБ

 Mossad Threatening Americans On American Soil Again?
rense.com›general52/mosd.htm
For its purposes, Mossad relies upon Zionist Americans living in proximity to a particular target to play a role. … Most if not all of these individuals choose Florida over Israel, however, to call their home, but are reminded by Israelis and Zionist Jews to remember…
 The Zionist Protection Racket – henrymakow.com
savethemales.ca›000889.html
The head of the Department of Homeland Security is Israeli dual citizen and Zionist Michael Chertoff. He was the New Jersey State Attorney when five Mossad agents were arrested after … Zionist betrayal is the reason Jews went passively to their deaths, says…
 President of Northern California
stopthecrime.net›ninawh.pdf
The corrupted pro-Israeli leaders of Homeland Security and FBI with the Washington-based Jewish Institute … Jews Did 9/11 Proven Part 4. Israeli Mossad Agents Confessing To 9/11 On Israeli TV Inside Israel. … 5. I am a targeted individual by Mossad and NSA.
Description: DF12 КБ

 Iranian General Accuses US of Organizing 9/11 Terror Attacks…
thedailysheeple.com›iranian-general-accuses-us-of…
4. Zionist Jew Ronald S. Lauder was key individual who lobbied for the privatization of the WTC. Lauder has funded a school for the Mossad in Herzliya, Israel. 5. Airline Security Company at BOTH the Boston & Newark airports on 9-11 was a…
 Missing Links – The Definitive Truth About 9-11
bibliotecapleyades.net›sociopolitica/esp_sociopol…
…are all Zionist Jew loyal to Israel the apartheid state for Jews only. … the Defense Policy Board and advisory council for the Department of Homeland Security (DHS). … working for Mossad penetrated NSA security through two programs initiated by the Reagan…
 Snowden: Leak Of NSA Hacking Tools Are Russia’s ‘Warning…
mintpressnews.com›snowden-leak-nsa-hacking-tools…
A reflection of the Department of Homeland Security logo in the eyeglasses of a cybersecurity analyst at the watch and warning … In 2013, The Washington Post revealed that the NSA spends millions of dollars purchasing security holes on the black market.
 Zionism | General Jewish Info/Links
newsfollowup.com›zionist2.htm
Mossad, Shin Bet. Jews against Zionism list. … The junket was Ortiz’s second organized trip to Israel: last year, Bexar County footed the bill to send him to an international conference on homeland security, he said.
Показаны результаты для Вашингтона
New Bill Calls For ‘De-militarization’ of DHS, IRS, FDA, FBI…
politicalvelcraft.org›2014/08/11…dhs…department…
The Department of Homeland Security (DHS) put out a solicitation to manufacturers for 63,000,000 rounds of .40 S&W … Pederast Zionist ‘Orgy Island’ Back In The News: From Prime Minister Of Israel Ehud Barak, Kevin Spacey, Mossad, Jeffery Epstein, Bill Clinton…
9-11/Israel did it – Wikispooks | Airport Security In Israeli Hands
wikispooks.com›wiki/9-11/Israel_did_it
3.3 Anomalous trading in the Securities Markets. 3.4 Other forewarnings. 4 Mossad connections. … 7 Zionist 9/11 Personalities. 7.1 Zionist Jews in all the Right Positions! 8 Who was on board flight 11?
‘Homeland Stupidity’ creator sues NSA, DHS — RT America
rt.com›America›homeland-stupidity-nsa…
A designer from Minnesota is suing the National Security Agency and the Department of Homeland Security for attempting to take down his parody products. … Eventually, it was discovered that the NSA and DHS had sent a cease-and-desist order to Zazzle in 2011…
Conspiracy Planet – Israel/ Zionism – Mossad: RSA Security…
conspiracyplanet.com›channel.cfm…
Mossad: RSA Security & Ptech Run US Govt Computers (continued) … The NSA/Central Security Service defines itself as America’s cryptologic … Before joining DHS, Yoran had been vice president for worldwide managed security services at Symantec.
Mossad & Kosher Nostra | Israel Did 911
rediscover911.com›israel-ally…enemy/mossad-kosher…
Former Italian President, Francesco Cossiga accuses Mossad and the “Zionist World” … Hundreds of notable individuals around the world have joined the fold and expressed … Jew Jews Joe Lieberman Judaism Judas goat Marxism National Security Agency NSA…
Israel and the NSA Scandal – Intifada Palestine
intifada-palestine.com›2013/06/israel-and-the-nsa…
…in providing information and pursuing targeted political groups and individuals. … secret police (MOSSAD), have provided the spy software for the NSA and this, of course … former IDF officer, to head that state’s ‘Homeland Security Department and later resigned…
Homeland Security Made in Israel by — Antiwar.com
original.antiwar.com›giraldi…homeland-security…in…
Homeland Security Made in Israel. by Philip Giraldi, August 22, 2013. … Exposure to that dubious technique is often paid for by the U.S. taxpayer as much of the travel to Israel is funded by the Department of Homeland Security (DHS), which provides billions of…
September 11: Inside Job or Mossad Job?, by Laurent Guyénot
voltairenet.org›article179295.html
In 2003, he was appointed to head the new Department of Homeland Security in … The DEA report concluded that “the nature of the behavior of these individuals […] leads us … As the Mossad had hoped, the NSA caught and deciphered the transmissions, which…
Department of Homeland Security | Facebook
ru-ru.facebook.com›homelandsecurity
Department of Homeland Security. Отметки «Нравится»: 466 687 · Обсуждают: 3 821. … Today, DHS bids farewell to Deputy Secretary of Homeland Security Ali Mayorkas.
01 | October | 2014 | YOUR PERCEPTION IS NOT REALITY
matrixbob.wordpress.com›2014/10/01/
4. Zionist Jew Ronald S. Lauder was key individual who lobbied for the privatization of the WTC. Lauder has funded a school for the Mossad in Herzliya, Israel. 5. Airline Security Company at BOTH the Boston & Newark airports on 9-11 was a…
Tags: Thomson Reuters Mossad – Verint, Narus, NICE, AMDOC’s, Unit-8200, Pioneer, Payoneer, Kidon, Palentir, Comserve, Natsam, AT&T Back Door, Bamford, DGSE, Dragnet, France, Intelligence, ISNU, Israel, Mark Klein, Mossad, Narus, Nicolas Sarkozy, NIE, NSA PRISM, Sigint, Snowden, Surveillance, Verint, Verizon, Deep Packet Inspection DPI, FLAME, STUXNET, Boeing, Microsoft, Apple, Google, Bing, Facebook, NSA

Sources: By Gilles Munier (Africa Asia – October 2013) From: Israel and the NSA: Partners in Crime 2 weeks ago by Censoo in Intelligence

http://talesfromthelou.wordpress.com/2012/07/14/911-mossad-and-the-deception/

http://allainjules.com/2013/07/04/espionnage-hypocrisie-comme-aux-etats-unis-la-france-espionne-tous-ses-citoyens/

Israel and the NSA: Partners in Crime

http://original.antiwar.com/justin/2013/10/27/israel-and-the-nsa-partners-in-crime/embed/#?secret=WP1DqEzEXD

Verint Systems _Follow The White Rabbit……

https://privacysos.org/verint_comverse/embed/#?secret=u4CS0cZHq8

Israel’s Connection to the NSA Surveillance Scandal

http://mideastposts.com/middle-east-politics-analysis/israels-connection-to-the-nsa-surveillance-scandal/embed/#?secret=T44hRNXNyZ

http://www.volunia.com/resolver?rid=aHR0cDovL3d3dy5uZXdzZm9sbG93dXAuY29tLw%2AaHR0cDovL3d3dy5uZXdzZm9sbG93dXAuY29tL2FtZG9jcy5odG0&s=_C_
NewsFollowUp
http://www.newsfollowup.com/amdocs.htm
· http://www.volunia.com/resolver?rid=aHR0cDovL3d3dy5waHVtcGguY29tLw%2AaHR0cDovL3d3dy5waHVtcGguY29tL3Rob3VnaHRwb2xpY2UuaHRtbA&s=_C_
Media (Press,TV, Cinema & Internet) – Who controls the Media?
http://www.phumph.com/thoughtpolice.html
· http://www.volunia.com/resolver?rid=aHR0cDovL2pvbmVzcmVwb3J0LmNvbS8%2AaHR0cDovL2pvbmVzcmVwb3J0LmNvbS9hcnRpY2xlLzAxXzA5LzA1bnNhLmh0bWw&s=_C_
Israeli Wiretappers, the NSA, and 9/11 – JONES REPORT
jonesreport.com/article/01_09/05nsa.html
· http://www.volunia.com/resolver?rid=aHR0cDovL2xhcm91Y2hlcGFjLmNvbS8%2AaHR0cDovL2xhcm91Y2hlcGFjLmNvbS9ub2RlLzI2OTIz&s=_C_

You-Tube-We-DMCA-Censor Videos:https://www.youtube.com/embed/6CI8N7h2CiU?feature=oembedhttps://www.youtube.com/embed/90vzNvTUK3M?feature=oembedhttps://www.youtube.com/embed/spXA7GrOcLU?feature=oembedhttps://www.youtube.com/embed/spXA7GrOcLU?feature=oembedhttps://www.youtube.com/embed/JhS6B9U13aY?feature=oembedhttps://www.youtube.com/embed/sSkWbsDqrPc?feature=oembedhttps://player.vimeo.com/video/2444686

Orwell vs. Huxley
Peak Oil, Try Peak Everything
Analyst Ratings: CNN, FoxNews, MSNBC, Huffington Post & Salon, etc.
Karl Grossman 40-years Nuke Media Manipulation
Syria’s Bashar al Assad Dead or Alive, Your Water’s Comin’ With Me
Author’s Page for Tracy Turner
West Bank Gaza Palestine & Israel
Clean, Green 2013 Fukushima Plumegate Machine II

TPP Trans Pacific Partnership Treason

“AMERICAN ARMY”…. You’ve Never Heard Of (OathKeepers)

DIME White Phosphorus WMD

Will You Die From Fukushima?
Organized Criminality 4th Estate Hypocritical Media

US Violations of Our 3D Printer Rights

NATO, Flesh Eating Bacteria of Freedom

CIA Drug Dealing, Torture, Milgram Experimentation
Bradley Manning
…Deaf population absent-mindedly registers the condemnation of a man ~ Camus
Monsanto Occupied Government

Search
This Site Web
FAIR USE NOTICE: This site contains copyrighted articles and information about environmental, political, human rights, economic, duopolic, scientific, and social injustice issues; local, national and global apartheid laws, (anti-homeless laws), etc. This news and information is displayed without profit for educational purposes, in accordance with, Title 17 U.S.C. Section 107 of the US Copyright Law.

1. Alexander, NSA General Michael Aquino, Maj (33)
2. Brain Rape and General Michael Aquino | The Story Behind The Story (31)
3. HOW DID MICHAEL Aquino, BECOME NSA General (31)

 NSA Atrocities – Part III – Brain Rape and General Michael Aquino
atrueott.wordpress.com/2013/07/31/nsa-atrocities-part… – more
… it is without a doubt TARGETING AMERICA for totally tyranny and mass mind control … Brain Rape and General Michael Aquino. Filed … TORTURE OF ITS …
 HOW DID MICHAEL AQUINO, BECOME NSA GENERAL ?
http://www.sodahead.com/…michael-aquino-become-nsa-general/… – more
HOW DID MICHAEL AQUINO, BECOME NSA GENERAL ? … OLD / TORTURE OF CHILDREN … Aquino Child Sex Slavery / Aquino NSA Mind War / Aquino Child …
 Satanic subversion of the U.S. Military – You’ll never think …
theforbiddenknowledge.com/hardtruth/satanic_subversion.htm – more
… Noreen Gosch stunned the court with sworn testimony linking U.S. Army Lt. Col. Michael Aquino … scene of a brutal rape of a … and General Staff College, the …
 MIND CONTROL IN AMERICA! US ARMY COLONEL MICHAEL AQUINO IS A …
http://www.godlikeproductions.com/forum1/message361633/pg1 – more
… NSA General Michael Aquino, Maj. General Albert … to learn from their techniques of torture, drugs, hypnosis, mind … torture and child-rape are …
 Aquino, Satan and the U.S. military – Inicio
http://www.bibliotecapleyades.net/vatican/esp_vatican16a.htm – more
The raid was in response to allegations that the house had been the scene of a brutal rape … Aquino and his wife were … He is a graduate of the Command

“Confessions of a Gang Stalker” AKA Life in the Syndicate

· NSA Brass/Buckeyball Extermination Vacuum Shell …

olivebiodiesel.com/NSA_National-Security-Agency_Extrapolate-Postmo…
Sep 4, 2014 – Numerous articles about the NSA have been circulated. …. The http://olivebiodiesel.com/ page has been updated many times; what the concept …
· American US Mossad Operatives Operations – Olive Biodiesel

olivebiodiesel.com/Gentilian-Americans-US-Mossad.html
Sep 30, 2014 – NSA Prism Mossad Spying “Cousins” Out of the Closet Mossad – Verin, Narus, NICE, Amdocs, Unit-8200, Pioneer and Kidon · ‘Senator’ Dianne …
· Psychotic Land ~ Conflict America – 1 – Olive Biodiesel

olivebiodiesel.com/PsychoticLand.html
Oct 6, 2014 – NDAA National Defense Authorization Act PAT ACT Patriot Act NSA Syndicate National Security Agency Crime Syndicate. Image art by author.
· America/Israeli Colonialization by Nuclear Blackmail

olivebiodiesel.com/America-Israeli-Colonialization-by-Nuclear-Blackmai…
Sep 29, 2014 – … and expand control: NSA-Prism/5-US-Telecoms/Unit 8200 Mossad… Pentagon/Israeli Syria-Iraq-Yemen-Afghanistan Industrial Complex…
· NSA Drones – Nano UAV – Micro UAV – Insect Spider Beetle …

olivebiodiesel.com/NSADroneInsectWeapons.html
NSA Insect Drones, bugs spiders Long Beach, California -borg micro uav Vanessa AlarconVanessa Alarcon, Bernard Crane, Gary Anderson, intellihub.com …

· Obama NSA and the Rise of Statism – Olive Biodiesel

olivebiodiesel.com/ObamaNSAandtheRiseofStatism.html
Oct 6, 2014 – Obama NSA and the Rise of Statism. Image from Google Images. ~ Tracy Turner. Under the Obama National Security Agency, the rise of …
· NSA Crime Syndicate – Olive Biodiesel

olivebiodiesel.com/NSA-Crime-Syndicate-aka-The-Syndicate-aka-The-P…
Sep 23, 2014 – The NSA has no budget, or rather look around you and imagine every third phone you see today having the NSA pad the bill or txt themselves …
· Obama NSA Kill Lists – Olive Biodiesel

olivebiodiesel.com/ObamaNSAKillLists.html
Sep 10, 2014 – Obama NSA Kill Lists ~ Devil In Details ~ Who’s Killed and Why scaife … a local copy of http://www.olivebiodiesel.com/censortest/ and use deep web …
· NSA Government Over Reach – Olive Biodiesel

http://www.olivebiodiesel.com/NSAOverReach.htmTranslate this page
NSA Government Over Reach vs. Privacy Rights. Img frm: http://tiny.cc/4h26nx ~ Tracy Turner. Whether it is ALPR (Automatic License Plate Recognition) …

https://www.youtube.com/watch?v=3nT15aCMfF4
Monarch the New Phoenix Program – 1

https://www.youtube.com/watch?v=WNVrIG-_YDs
Monarch the New Phoenix Program – 2

https://www.youtube.com/watch?v=-lfmkOSyaGo
Monarch the New Phoenix Program – 3

https://www.youtube.com/watch?v=yJ0C1tsSUgs
Monarch the New Phoenix Program – 4

https://www.youtube.com/watch?v=SDBMdboarLk
Monarch the New Phoenix Program – 5

Biosphere Biocide by Racism & Denial – Unibomber Analysis
NSA Drone Insects
Previous News
Female Sociopaths
US Pyrrhic Victory War On Terror
Israel’s Jaffa Tel Aviv Mass Graves Genocide
Mirror Dr. Rebeca Carley Page – Her Pages Censored
Web Hidden Internet “Uncensored?” Search Engines
Plastic America, Makers of a Plastic World
NSA Brass/Buckeyball Extermination Vacuum Shell
PlumeGate 2 Fukushima
NSA Crime Syndicate aka The Syndicate aka The Program

https://www.youtube.com/watch?v=3nT15aCMfF4
Monarch the New Phoenix Program – 1

https://www.youtube.com/watch?v=WNVrIG-_YDs
Monarch the New Phoenix Program – 2

https://www.youtube.com/watch?v=-lfmkOSyaGo
Monarch the New Phoenix Program – 3

https://www.youtube.com/watch?v=yJ0C1tsSUgs
Monarch the New Phoenix Program – 4

https://www.youtube.com/watch?v=SDBMdboarLk
Monarch the New Phoenix Program – 5

tags: Mossad – Prism- Verint, Narus, NICE, Amdocs, Unit-8200, Pioneer, Payonner, Kidon, Thompson Reuters, Oracle, AT&T, Prism Spinoff, Unit 8200 Spinoff, Egypt Telecom, Atlantic Bell, France Telecom, Ministry of Truth, PoP, Cisco, NSA, Spyware, StuxNet, Media, Brain, Pentagon, Packet, Flame, Sniffer, Deep Packet Sniffer, European Telephone…… Canada Telecom, Brasil Telecom, Linkedin, Russia Telecom, Mossadi, Palentir, White Light, Data, Telecom Employees, MPoP, Packet Switched, Billing Agent, Administrator, IT, Companies, Affiliated, Police, Specialist, Middleware, Iran Telecom, Deny, Italy Telecom, Denial, China Telecommunications Industry, Spy Victims, Amdoc, Hong Kong, Connection, Remote Access, Back Door, Physical Access USA America NSA Prism, mossad, israel, telecom, narus, israeli, france, security, reuters, kidon, Brasil Telecom, Egypt Telecom with Deep Packet Inspection equipment (DPI) technology (Spy Ware), Room 641A, US National Security Agency, Verint, Comverse, Unit 8200,Sandvine (Canada), Allot (Israel), Ixia (USA), Advanced IO (Canada) and Procera Network, Reuters Cartel, NICE, Pioneer, Oracle, ECI, Tnuva, Lumenis, CSG, Intec, MaxBill, Openet, Oracle Billing, NetCracker, Eri, TM Forum. GSS Div, Thomson Reuters Mossad – Verint, Narus, NICE, AMDOC’s, Unit-8200, Pioneer, Payoneer, Kidon, Palentir, Comserve, Natsam, AT&T Back Door, Bamford, DGSE, Dragnet, France, Intelligence, ISNU, Israel, Mark Klein, Mossad, Narus, Nicolas Sarkozy, NIE, NSA PRISM, Sigint, Snowden, Surveillance, Verint, Verizon, Deep Packet Inspection DPI, FLAME, STUXNET, Boeing, Microsoft, Apple, Google, Bing, FaceBook, NSA, AMDOC’s, Hayden, De Dallas a Montreal by Maurice Philipps, JFK Mossad Assasination, Palestinian territories Flame , Shin Bet, International IP Traffic Monitoring System, For by wise guidance you can wage your war, By Way Of Deception, Thou Shalt Do War, Ed Clark Natsam, Cegetel, CGI France, Compaq France, France Telecom, Narus Inc., Amdocs APAC Division verint, companies, software, linkedin, nice, data, prism, amdocs, telecommunications, flame, news, entities, secret, billing, pioneer, packet, thomson reuters, amdoc’s, room, agency, national, comverse, media, jobs, location, business, systems, caught, cartel, monopoly, affiliated, italy, canada, china, oracle, palentir, packet sniffers, iran, online, computer, amdoc, oracle, comserve, boeing, palestine, hardware, middleware, espionage, discover, palantir, intelligence, european, egypt, (usa), police, digital, brasil, french, at&t, mossad’s, school, technology, lead, customer, hong kong, privacy

Summary borrowed from fourwinds10.com – “The US National Security Agency has an Israeli Mossad cousin or two “wishing” to come out of the Telecom closet. The Israeli Mossad spin-off companies are all over the planet: Verint, Comverse, Unit 8200(preceding names Mossad synonyms)… Brasil Telecom, Orange S.A., formerly FranceTélécomS.A., Egypt Telecom, AT&T, Microsoft, Apple – Thank you, thank you, thank you…

MossadGate: “NSA Prism” Mossad Spying Cousins Out of the Closet

CategoriesGang StalkingThe Controllers

Post navigation

← PreviousPrevious post:Jeffrey Epstein-Israeli Mossad Child Sex Operation: How International Zionist Crime Syndicate (IZCS) Controls America (Trunews.com 3/7/19)Next →Next post:The (Jewish) “Controllers” And Their Destructive Mission

Leave a Reply

Your email address will not be published. Required fields are marked *

Comment

Name *

Email *

Website

CORONAVIRUS Insects: Temperature AND COVID [Cooling Systems And Airborne Transmissions] 8.18.2020

Coronavirus: Past [ Present], Future: An Overview

From Small Beginnings: Insects and The Minuscule World in Relation to Pathogens, Viruses, and New Diseases.

8.18.2020.

‘The Insectoids and the Crown”

Genetic Mutations and Genome Sequences: December 2019 – Present Day

Insects -> Animals ->Humans ->??????

Intro: [Media / Non-Hypothetical Abstracts] : AIRBORNE TRANSMISSIONS

Over the past few months, the coronavirus has garnered the attention of many scientists, individuals and countries worldwide. To put things in perspective and not just reiterates feedback loops, one thing is certain: the pandemic was itself live as early as November 2019. The disease/virus has undergone [at the very least] mutations of sorts.

The disease is airborne for sure, it has been discussed. That said, humans lose skin cells and other particles that latch onto them throughout the day without realizing. In reference to the CORONAVIRUS we are now being told that this virus / pathogen is in fact airborne. As such the means of transmission has just increased [I would presume] from the original model to a 90% infection rate due to the fact that air carries these things like pollen for MILES. Something as minuscule and invisible to the naked eye can certainly be hard to describe and analyze unless samples of water, air, body, temperature are properly collected and looked at closely.

Considering THAT, it is quite easy to study the reactions in something like insects, animals, and of course people.

Everyone has analyzed people, since this pandemic went LIVE.

However, the academia and scientific community have neglected to include the very fact that the insects and animals [upon review of past literature] have in the PAST transmitted diseases like this to humans.

That said, these very means prove one thing. The infection means for these aforementioned species have certainly one thing in common. Possible mutations depending on the HOSTS genetic and cellular makeup.

Given the current state of modern science, this IS possible, as evidenced by medical and scholarly journals that detail and talk about this occurrence in reference to karyotypes and genome sequencing.

CONSIDERING ALL OF THAT, nobody has discussed the following-> how does the mutation from an insect, animal and humans vary when cross contamination occurs?

The virus is different in molecular structures, but how about when analyzed in terms of SPECIES ONLY?

We live in an eco-system, as such we are ALL part of it, In reference to COVID, this opens up room for scientific speculation with scientific literature and basis.

 

Experiment: Insects and AC Units ‘[Recycled AIR”]

Many credible media sources have stated [such as ABC news/the CDC and other foreign and national NGOs] the following: Air conditioning units are recycling air from outside in relation to the pandemic. That is a given, however after many reports and credible sources have advised to wear masks INDOORS …The following MUST BE TRUE:

AIRBORNE – that this method of transmission is dangerous, and AIRBORNE covers EVERY area within a location, city, STATE, REGION, COUNTRY, WORLD.

Does COVID recycled AIR crystallize and freeze the airways? Does that transmit quicker after in an airborne trial?

IF SO, how FAST/ does transmission spread among the individuals around?  [Considering that droplets ad air that we breathe in and out is also “RECYCLED’. That said, we are either, “walking air purifiers or walking toxic units, as a metaphor for how individuals vary in their processing of oxygen and pollutants.

NOTE:

In scientific terms: either we can process more oxygen rich air after breathing in, or we walk around multiplying the airborne element of COVID. These are all subject to change / dependent on factors: Temperature, location, region, genomes, etc et al.

 

 

 

[MEDIA]

 

 

 

Transcript: Experiment #1 – Minuscule Bugs.

Video starts with a zoomed in version of the Air Systems “COLD”.

*Pans camera to the insect that is seemingly frozen in place and does not moved when vibrations are made by tapping the wall. Most insects would generally move quickly if not immediately when presented with a foreign object such as a thumb that is bigger in comparison to the insect itself. *

Check it. [tapping sounds] insect does not move.

“its getting hit by the cold air, it does not move, almost goes into a docile hibernating state.

Check this out.

*produces wind by blowing*

Does NOT move.

Zooms in to the insect in question that is being hit by the cold air very closely and in comparison, to animals and humans, is quite small.

“Does not appear to be moving, THAT CLOSE.”

Oh, there it is, it appears to be moving.

VERY, very Different in response…only because there is light right there.

This is the weirdest phenomena I have ever seen.

What does THAT tell you?

Upon analysis.

[apart from the fact that you can see everything is bad, in relation to region of film.]

Blows warm air at the insect.

What does THAT tell you, look at how close my hand is.

DOES NOT MOVE.

IT MOVES BUT IT DOES NOT MOVE WHEN ITS BEING…. LOOK AT THAT.

That is NOT normal behavior; if you are ALL familiar with insectoids and the insect world, in terms of ecosystems…this is NOT typical behavior for this type of uh, its not even an arachnids, what would you call it, this type of insectoid.

THAT IS NOT NORMAL BEHAVIOR

First and foremost, they DO NOT GO NOT GO COLD PLACES.

 They frequent light. This one seems to be exhibiting behavior that has never before been seen.

These flock around light, not COLD dark areas, as stated.

This experiment has been tried with other animals…

[Film Passed to Channels.] Contacted other affiliates to analyze their own respective flora and fauna.

 

 

 

 

MEDIA

Transcript # 2

What’s going on tech hobbyists, activists, journalists, media, really anybody, individuals.

So it’s been about, roughly twenty to thirty minutes, [from prior posting]

This is still the room; this is in reference to the coronavirus report from many mediums.

Basically, –[interruption—im sorry for that]

So anyways, as you are all aware, they have been basically talking about the air conditioning and AIRBORNE transmissions worldwide. How that can spread particles of coronavirus because if you do not have any ventilation systems, that is a bad thing.

Alright, so, there have been many experiments.: for those of you out there that have dogs, cats, birds [reptiles]…what have you, any animal, and let us not forget people, we ourselves are very much like animals.

We are distinctively very different. Yet at base, that is what we are.

This small insect should serve as a means to prove – and not even prove only but exemplify! –this very phenomenon—if its TRUE [im not a scientist, this is JUST inquiry.]

Its as easy as taking your camera and recording a set OF things.

*pans camera*

Okay so right there, that’s where the air conditioning and all of this air is going—keep in mind its summer, we have the cold air—as stated, we do not put that on. Never seen it ever be cleaned. [breeding ground for bacteria as stated by the CDC and reports, even with clean filters.] the air comes from OUTSIDE. And back into the atmosphere it goes.

Okay, so that animal [insect] right there is not moving.

Irrelevant, regardless, after everything weve been dealing with.

I put my hand right here, the air is coming straight at it. This is a small animal,m an insectoid, so for it to have any reaction to this, would be very different in terms of it being compared to a human, bird dog, cat, etc.

The reactions would be different.

As it being very smaller, of course it would be crystallized and frozen in place way easier than all of these animals.

Now look at this

*taps and hits the wall producing sound waves to make it reactive*

Im literally hitting, touching around, look at how close my fucking finger is… and its not moving.

It appears to be docile, okay there it moved, but I had to touch is antenna.

Its not moving.

Is almost like its frozen in place.

IT IS.

You see its not moving, there is no response from its antennas, it doesn’t appear to be moving them at all.

This was already done in dogs and cats, by many people. Worldwide.

Animals would produce an effect that was sluggish, delayed response, obvisouly body temperature decrease. And this was all done worldwide.

This is merely a report, not even a report, merely an observation if you will.

Im by no means an expert, I just get information that Is Credible.

I see something that is interesting or beneficial and I showcase it.

This is the easiest experiment. There is not, literally—im not doing anything that is THAT intricate.

Anyways, BEWARE—they have been talking about electromagnetics, temperature controls, global warming, all of this stuff is interconnected to COVID, we are dealing with this stuff in the current decade.

In reference to that: there have been countless reports where they advocate for wearing MASKS AT HOME.

Why?

IT IS VERY CLEAR THAT NOBODY HAS A CONCISE IDEA BUT COVID IS IN FACT AIRBORNE.

PEOPLE WAKE THE FUCK UP; THIS STUFF IS AIRBORNE.

THEY’RE NOT GOING TO TRY TO SCARE YOU WITH IT AND TELL YOU THE TRUTH

BUT THIS IS ALLLLLLLL AIRBORNE

AND IF YOU THINK EVERYONE IS LIKE ‘OH NOT ME MAN, NOT ME, ITS ONLY YOU’…WAKE THE FUCK UP

HOW ARE OTHER COUNTRIES DEALING WITH THE SAME THING REPORTING AND SPEAKING ON THE SAME THING?

THERE ARE TOO MANY STEADY PEOPLE, REPORTING THE SAME DAMN THINGS…

 

PANS TO INSECT

ITS NOT MOVING, BUT ITS ALIVE.

WILL UPDATE LATER ON.

 IF THESE ARE THE EFFECTS ON BUGS, one has to question, what is the effect ON US? [side note: we do not have a temperature gauge on OUR floor but it is cold that my own glasses are fogging up indoors. Just a  side note. Imagine that insect and what it must be feeling. ]

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

UPDATES: Interceptions In The USA / #Setups —Everyone Contacted / Friends Aware / #Safety

FOR THE MEDIA

I’ve been tried to be setup as a spy in my country the United States — they used either @APPLE customer support used me to spy on my country through customer support OR my country #USA did this to those countries. (Ireland, UAE, China, Singapore, ETC ET AL)

Now for some reason I can’t even talk to global advisors in reference to my phone troubles…

I was able to get callbacks from  Apple support through their customer support team to my landline 7732827928 a few days ago…and now I can’t? My country allowed these calls to come in, and now they’re rerouting calls.

The real problem is it’s been proven that the local chapters of surveillance engaged in deliberate tracking (Chicago Police Department) And corruption. On July 15Th 2020 they asked me if I spoke other languages and told them I did but did not disclose what.

AND NOW it reroutes the call to the USA only instead of the Global support network that I talked on for one week? #apple

What is this?

On July 15th, 2020

The Chicago Police Department engaged in corruption versus me directly by overstepping 42 CFR and basic laws in place for the protection of confidentiality and failure to basically hold anyone’s countable but since I was the one that was on the phone with the FBI that day as well…it’s a weird situation.

A few days ago I received a package in the mail from a seller called “PLANNERDUCK” in the mail through eBay.  The interesting thing is that I detailed extensively what could go wrong or be wrong with that purchase (consumer awareness) and lo and behold…when the phone arrived the SAME things I described in that document (IE: SIM card, network, PLANNERDUCK being code for PD, or “Police Department”) were the very things that were wrong. (This was on July 14th 2020 and the early hours of July 15th 2020 when I made the purchase.) through open source technology and other subsidiaries and NGOs as well as Apple, Samsung Etc et al, it has already been proven through screen access they had and SAW the interceptions occurring locally. Therefore a small local surveillance organization like the CPD (Chicago Police Department) has no right to breach foreign countries law and international clauses.

That said, it already happened.

In relation to the package, due to my support of NGOs and admiration of the global political power dynamics I have become subjected and so has my immediate family to intrusion and intimidation as well as corruption.

(Extra Bonus: My United Nations flag arrived exactly one day after this phone. I sail it and opened it in front of everyone as well to show my solidarity and unity with the world.)

That said: the FBI agent I spoke to when contacted on the 28th of July was the same agent I spoke to on July 30th @ 11:10PM CST in front of my house 5434 West Grace St Chicago, IL. It was in plain view of all.

THE AGENT TOLD ME TO GIVE THE PHONE BACK TO THE POLICE DEPARTMENT. With my prints on it?

Setup.

How odd…FBI was called the day of the cops presence on the 15th of July and then the package arrives suspiciously after being passed around between other locations on Chicago Illinois.

The cops knew I spoke other languages and I did not tell them what.

I look middle eastern and they attempted to affiliate me with a terror group/organization.  The phone in question ordered from eBay came with a SIM card that said ISIS in purple letters.

https://youtu.be/5GSLoqOjgOY

This is a video of all of this. The phone came with fingerprints, and weird smudges and THAT SIM card which ALL SUBSIDIARIES CONTACTED / NGOS agree seems like a deliberate setup to make me seem like an enemy/have affiliation.

I contacted the DNC and they told me to go to the media because quote “that is scary”. Everyone has said this.

Given the fact that I have a few open legal matters in which I am the plaintiff (16 WC 37220 —corruption in that workers compensation claim too, and a few other instances of human and civil rights abuses), and do journalism like THIS, it is clear that this situation is bad and many want me gone.

But now the situation is as follows:

Everyone knows.

I know.

NGOS know.

Governments know.

The US is not exactly being helpful directly and that poses concerns.

To wrap things up…the customer support aspect of Apple as an asset to these situations— is that Apple knows and so do other countries, this means that the US breached international through its lowest form of agency— the Chicago police department. And the country allowed it to happen!

In the process while rerouting my calls, communications, etc et al..

They also targeted everyone within a five mile radius. Therefore it would be safe to say that these levels of surveillance setup everyone as “spies” in the area.

You know how much of a threat that poses to global security? Cooperation? Cyber SECURITY?  The USA assures transparency and accountability…however, it seems that someone fucked up majorly and ruined it for EVERYONE.

Amnesty International is aware.

In doing this, the US almost immediately surrendered all rights to the international community and countries named therein. They breached first, now counties have exclusivity as detailed in international law and foreign policy.

My family members are also:

<<redacted but given to these entities>>

I live at 5434 West Grace St, Chicago, IL 60641-3211

My name is Anthony Brito —Independent Media.

UPDATES: August 1st, 2020 — Within one day of these events happening and being discussed with Apple, I was able to contact global support AGAIN after not being able to for a day. It was someone in Europe this time.
This was during 2AM CST —4AM CST. They took note of ALL OF THESE SITUATIONS EVERY TIME I CALLED AND ARE AWARE APART FROM OTHER MENTIONED ENTITIES THEREIN.

These logs serve as a time stamp for everything occurring and happening within this area. In terms of CyberSecurity and Security.

Data Processing Addendum: WordPress / Media / Data Collection Disclaimer/ Corporate HQ DPA / Counsel For Posts And Subject Matter 7.23.2020 [Officiated 7.24.2020]

 

WP Media Authorization

 

 

Data Processing Addendum
In providing the services described in our Terms of Service [https://en.wordpress.com/tos/]
1
(“Terms of Service” or “Agreement”), we (the folks at Automattic) process Personal Data on
behalf of the users of those services (“Users”), for which we act as the processor under applicable
Data Protection Laws and our users act as the controllers. That Personal Data is referred to as
“Controller Data,” as further described below.
“Data Protection Laws” means any and all privacy, security and data protection laws and
regulations that apply to the Personal Data processed by processor under the Agreement, including,
as applicable, the GDPR, Member State laws implementing the GDPR, and the California
Consumer Privacy Act of 2018, as amended.
“Personal Data” means any information relating to an identified or identifiable natural person or
that is otherwise deemed personal information or personal data (or similar variations of those
terms) under Data Protection Laws.
This Data Processing Addendum (“Addendum”) to our Terms of Service explains our data
protection obligations and rights as a processor of the Controller Data, as well as the data protection
obligations and rights of our Users as the controllers. Except in respect of the data protection
obligations and rights of the parties set out in this Addendum, the provisions of the Agreement
shall remain unchanged and shall continue in force.
For Users who reside in the United States or Brazil, this Addendum is between the User and
Automattic Inc. (US), and for all other Users, this Addendum is between the User and Aut
O’Mattic Ltd. (Ireland) (each, “Automattic” or “we”).
1. Role of the Parties
Automattic and the User agree that with regard to the processing of the Controller Data, Automattic
is the processor and the User is the controller.
2. Scope of the Processing
2.1. Automattic shall process the Controller Data on behalf of and in accordance with
the instructions of the User. If Automattic is legally required to process Controller
Data for another purpose, Automattic will inform the User of that legal requirement
unless the law prohibits Automattic from doing so.

1
If you use our Crowdsignal service, the Crowdsignal Terms and Conditions at
https://crowdsignal.com/terms/ also apply. If you use Akismet, the Akismet Terms of Use at
https://akismet.com/tos/ also apply. And if you use WooCommerce, the WooCommerce Use
Terms at https://woocommerce.com/terms-conditions also apply.
DocuSign Envelope ID: 6893D262-08CE-4875-95C0-C6E451E668DD
Page 2 of 9
2.2. Automattic will not: (a) collect, retain, use, disclose or otherwise process the
Controller Data for any purpose other than as necessary for the specific purpose of
performing the services on behalf of the User; (b) collect, retain, use or disclose the
Controller Data for a commercial purpose other than providing the services on
behalf of the User; or (c) sell the Controller Data.
2.3. The processing of Controller Data by Automattic occurs for the purpose of
providing Automattic’s website creation and management services to our Users,
and Controller Data is comprised exclusively of personal data relating to data
subjects who use a User’s website, which may include a User’s customers,
subscribers, followers, employees or other administrative users. Controller Data
does not include content or personal data provided by any of the foregoing persons
to Automattic in that person’s capacity as a user of WordPress.com or another
service provided directly to the person by Automattic.
The type of Controller Data processed by Automattic depends on the services and
features that the User decides to implement for the User’s website, and may include
username and credentials; name; contact information, such as e-mail address,
physical address, and telephone number; billing information, such as credit card
data and billing address; website usage information, IP address, and other technical
data such as browser type, unique device identifiers, language preference, referring
site, the date and time of access, operating system, and mobile network information;
approximate location data (from IP address); information regarding interactions
with the website, such as “comments,” poll responses, “ratings,” and “likes”; and
other information directly provided to the User’s website by a visitor to the website,
such as contact form submissions.
The duration of processing corresponds to the duration of the Agreement, which is
described in the Terms of Service.
2.4. The instructions of the User are in principle conclusively stipulated and
documented in the provisions of this Addendum. Individual instructions which
deviate from the stipulations of this Addendum or which impose additional
requirements shall require Automattic’s consent.
2.5. The User is responsible for the lawfulness of the processing of the Controller Data.
In case third parties assert a claim against Automattic based on the unlawfulness of
processing Controller Data, the User shall release Automattic of any and all such
claims.
2.6. Automattic reserves the right to anonymize the Controller Data or to aggregate data
in a way which does not permit the identification of a natural person, as well as the
right to use the data in this form for purposes of designing, further developing,
optimizing, and providing its services to the User as well as to other users of the
service. The parties agree that the Controller Data rendered anonymous or
aggregated as above-mentioned are no longer classified as Controller Data in terms
of this Addendum.
DocuSign Envelope ID: 6893D262-08CE-4875-95C0-C6E451E668DD
Page 3 of 9
2.7. Automattic has the right to collect, use, and disclose any WordPress.com User Data
in accordance with the Automattic privacy policy, which is available at
https://automattic.com/privacy/. “WordPress.com User Data” means any
information collected by Automattic from or about a visitor to User’s website
(including any contributor or editor), while that visitor is logged into a
WordPress.com account. The Parties agree that Automattic’s processing of
WordPress.com User Data is independent of the services that Automattic provides
to User for the User’s website, and is not subject to this Addendum.
2.8. The parties further agree that Automattic’s processing of data to deliver interestbased ads to the User’s website, when such ads are enabled for free WordPress.com
websites or on a website through WordAds or Jetpack Ads, is not subject to this
Addendum.
3. Automattic’s Personnel Requirements
3.1. Automattic shall require all personnel engaged in the processing of Controller Data
to treat Controller Data as confidential.
3.2. Automattic shall ensure that natural persons acting under Automattic’s authority
who have access to Controller Data shall process such data only on Automattic’s
instructions.
4. Security of Processing
4.1. Automattic shall secure Controller Data in accordance with requirements under
Data Protection Law. Automattic takes all appropriate technical and organisational
measures, taking into account the state of the art, the implementation costs, and the
nature, the scope, circumstances, and purposes of the processing of Controller Data,
as well as the different likelihood and severity of the risk to the rights and freedoms
of the data subject, in order to ensure a level of protection appropriate to the risk of
Controller Data.
4.2. In particular, Automattic shall establish prior to the beginning of the processing of
Controller Data and maintain throughout the term the technical and organisational
measures as specified in Annex 1 to this Addendum and ensure that the processing
of Controller Data is carried out in accordance with those measures.
4.3. Automattic shall have the right to modify technical and organisational measures
during the term of the Agreement, as long as they continue to comply with the
statutory requirements.
DocuSign Envelope ID: 6893D262-08CE-4875-95C0-C6E451E668DD
Page 4 of 9
5. Further processors
5.1. The User hereby authorizes Automattic to engage further processors in a general
manner in order to provide its services to the User. For Users whose Agreement is
with Aut O’Mattic Ltd. (Ireland), the further processors currently engaged by Aut
O’Mattic Ltd. (Ireland) include its related companies Automattic Inc. (US) and
Bubblestorm Management Proprietary Limited (WooCommerce). The User may
request a complete list of further processors from Automattic. In general, no
authorization is required for contractual relationships with service providers that
are not actively processing Controller Data but are only concerned with the
examination or maintenance of data processing procedures or systems by third
parties or that involve other additional services, even if access to Controller Data
cannot be excluded, as long as Automattic takes reasonable steps to protect the
confidentiality of the Controller Data.
5.2. Automattic shall make available to the User the current list of subprocessors at the
following link: automattic.com/subprocessor-list. User should check this website
regularly for updates. Through this link, Automattic shall provide notice to the
User of any intended changes concerning the addition or replacement of further
processors. The User is entitled to object to any intended change. An objection may
only be raised by the User for important reasons which have to be proven to
Automattic. If the User objects, Automattic is prohibited from making the intended
change. Insofar as the User does not object within 14 days after the notification
date, the User’s right to object to the corresponding engagement lapses. If the User
objects, Automattic is entitled to terminate the Agreement on reasonable notice.
5.3. The agreement between Automattic and further processors must impose the same
obligations on the latter as those incumbent upon Automattic under this Addendum.
The parties agree that this requirement is fulfilled if the contract has a level of
protection corresponding to this Addendum and if the obligations laid down in
applicable data protection laws are imposed on the further processor. In case
Automattic engages a further processor outside of the EU, the User hereby
authorises Automattic to conclude an agreement with another processor on behalf
of the User based on the standard contractual clauses for the transfer of personal
data to processors in third countries pursuant to the decision of the European
Commission of February 5, 2010 (“SCC”) and to specify the content of the SCC in
accordance with this Addendum. The User hereby authorizes and instructs
Automattic to exercise the User’s rights under any SCC towards the further
processors on its behalf in accordance with the instructions in this Addendum.
Notwithstanding, Automattic may safeguard an adequate level of protection in a
third country also by other means including binding corporate rules and other
appropriate safeguards.
5.4. Automattic shall monitor the technical and organisational measures taken by the
further processors.
DocuSign Envelope ID: 6893D262-08CE-4875-95C0-C6E451E668DD
Page 5 of 9
6. Support obligations of Automattic
6.1. Automattic shall to a reasonable extent support the User with technical and
organisational measures in fulfilling the User’s obligation to respond to requests
for exercising data subjects’ rights.
6.2. Automattic shall notify the User promptly after becoming aware of any breach of
the security of Controller Data, in particular any incidents that lead to the
destruction, loss, alteration, or unauthorized disclosure of or access to or use of
Controller Data (each, a “Security Incident”). The notification shall contain a
description of:
– the nature of the breach of Controller Data, indicating, as far as possible,
the categories and the approximate number of affected data subjects, the categories
and the approximate number of affected personal data sets;
– the likely consequences of the breach of Controller Data;
– the measures taken or proposed by Automattic to remedy the breach of
Controller Data and, where appropriate, measures to mitigate their potential adverse
effects.
6.3. The above details may be provided in multiple notifications as the information
becomes available. In the event that the User is obligated to inform the supervisory
authorities and/or data subjects of a Security Incident, Automattic shall, at the
request of the User, assist the User to comply with these obligations.
6.4. Automattic will take appropriate steps to promptly remediate the cause of any
Security Incident and will reasonably cooperate with the User with respect to the
investigation and remediation of such incident, including providing such assistance
as required to enable User to notify and cure an alleged violation of Data Protection
Law related to a Security Incident. Automattic will not engage in any action or
inaction that unreasonably prevents the User from curing an alleged violation of
Data Protection Law.
7. Deletion and return of Controller Data
Upon termination of the Terms of Service Automattic shall delete all Controller Data, unless
Automattic is obligated by law to further store Controller Data.
8. Evidence and audits
8.1. Automattic shall ensure that the processing of Controller Data is consistent with
this Addendum.
8.2. Automattic shall document the implementations of the obligations under this
Addendum in an appropriate manner and provide the User with appropriate
evidence at the latter’s reasonable request.
DocuSign Envelope ID: 6893D262-08CE-4875-95C0-C6E451E668DD
Page 6 of 9
8.3. At the User’s reasonable request, Automattic shall demonstrate compliance with
the obligations under this Addendum by submitting an opinion or report from an
independent authority (e.g. an auditor) or a suitable certification by IT security or
data protection audit relating to an inspection carried out in relation to Automattic’s
data processing systems (“audit report”).
[Signatures on the following page]
DocuSign Envelope ID: 6893D262-08CE-4875-95C0-C6E451E668DD
Page 7 of 9
USER
User Legal Name: _____________________
____________________________________
Signatory Name: _______________________
Title: _______________________________
Date: _______________________________
AUTOMATTIC INC.
____________________________________
Signatory Name: Paul Sieminski
Title: General Counsel
Date: _______________________________
AUT O’MATTIC LTD. (IRELAND)
____________________________________
Signatory Name: Paul Sieminski
Title: Director
Date: _______________________________
DocuSign Envelope ID: 6893D262-08CE-4875-95C0-C6E451E668DD
December 6, 2019
December 6, 2019
Page 8 of 9
Annex 1
Automattic maintains commercially reasonable safeguards designed to protect Controller Data
from unauthorised access, use and disclosure. Automattic currently abides by the security
standards below. Automattic may update or modify these security standards from time to time,
provided that such updates and modifications will not result in a degradation of the overall security
of Automattic’s services during the term of the User’s Agreement with Automattic.
1. Information Security Organisational Measures
● Automattic has a dedicated security team committed to protecting Controller Data which
works with our product teams to address potential security risks.
● Automattic performs regular internal security testing and engages with third parties to
perform application and network vulnerability assessments.
● Automattic requires all employees with access to Controller Data to observe the
confidentiality of that data, and trains employees on confidentiality and security.
● Automattic uses commercially reasonable measures for software, services, and application
development, including routine dynamic testing and training personnel on coding
techniques that promote security.
2. Physical Security
● Automattic’s servers are co-located in data centers designed to meet the regulatory
demands of multiple industries. All servers are housed in dedicated cages to separate our
equipment from other tenants.
● Automattic’s origin servers and/or data centers, as applicable, currently meet the
International Organization of Standardization (ISO), International Electrotechnical
Commission (IEC) 27001 certification, Standards for Attestation Engagements (SSAE)
No. 18 (SOC1) and SOC2 Type 2, and ongoing surveillance reviews.
● Automattic limits access to facilities where information systems that process Controller
Data are located to identified, authorized individuals via measures which may include
identity cards, security locks, key restrictions, logging of access, security alarm systems,
and surveillance cameras.
3. Access Controls
● Automattic runs network firewalls and host based firewalls (if applicable) and has real time
processes designed to provide alerts for unauthorized access attempts. Automattic also has
commercially reasonable security measures in place to help protect against denial of
service (DDos) attacks.
● Automattic maintains commercially reasonable access control procedures designed to limit
access to Controller Data, including processes addressing password and account
DocuSign Envelope ID: 6893D262-08CE-4875-95C0-C6E451E668DD
Page 9 of 9
management for employees with access to Controller Data, virus scanning, and logging
access to Controller Data.
● Automattic encrypts (serve over SSL) all WordPress.com websites, including custom
domains hosted on WordPress.com.
4. Data Backup and Recovery
● Automattic uses industry standard systems to help protect against loss of Controller Data
due to power supply failure or line interference, which may include fire protection and
warning measures, emergency power generators, and data recovery procedures.dpa_15558_46909646622WORDPRESS

#Vlog: #Examples of “#Gangstalking”/#PsyOps” #Safety #LiveUpdates – In #Chicago #IL

The #tactics being used in this #video are reflective of the ones being used to make people “psyched out” within the contexts of a situation that i commonly referred to as “#gangstalking
I do NOT call this gang-stalking, this is blatant #espionage on a #LOCAL level and tied to the criminally minded.
Case and point: I made a video talking about every situation that I am involved in.
Fortunately this has been detailed for the past few years and everything has been referenced in applicable reports, understanding THIS concept I have also informed multiple people/contacts/departments and other associates overall.
The situation changed this past weekend [7/10/2020 – 7/14/2020] when I took pictures of our cars and my immediate family for safety reasons and sent them to other contacts and in the process the #national and #international chapters of security…[#MilitaryIndustrialComplex/#SurveillanceChapters]
Once they saw THAT (documenting ourselves and our cars and property) [these people are here 24/7 and barely leave the house.]
All of a sudden they started calling us more often and there was an increase in the amount of calls being placed form their phones as well. In contrast: before any of this was done this past weekend these family members would NOT CALL AND THEY KEPT TO THEMSELVES.
Now they [identity cloners] seem to be integrating themselves into our life so as to not arouse suspicion of their activities [the individuals living on the first floor and basement levels under MULTIPLE IDENTITIES.]
#PSA Once again: this ALL happened after we took pictures of everything and sent them to our contacts. ALSO TOLD THEM OF EVERY SITUATION, BUT THEY HAVE KNOWN THAT FROM THE BEGINNING. 
The following is an overview of the TACTICS commonly used: These would involve the use of the covert tracking of individuals, interference of communications, triggering situations and stimuli, threats, physical assaults, lies, manipulation, sound manipulation, as well as the use of other technologies that serve the purpose of these stalkers.

NOTE:

There is a part two to this #Vlog, which details the system in the #IWCC with my #WorkersCompensationCase 16 WC 37220 , as well as the situation with #MethodistHospital @ 5025 N Paulina St Chicago IL [#HumanRights and #CivilRights abuses]. Everything that I stated in THIS video also applies to the entities described here: IWCC, Attorneys, Methodist Hospital, Hospitals in general
[On January 3rd/4th 2020, I was told by hospital staff that I would be “PUT DOWN” and this was documented and the police know about this situation, and so do other agencies. There are multiple witnesses for this situation, and the area was very public, and there were many people there that day.
.
If ANYTHING: DUE TO UNDERSTANDING THE LAW AND STANDING UP FOR MY RIGHTS AND THOSE OF OTHERS, I HAVE BEEN THREATENED WITH DEATH. 
MY CONTACTS ARE AWARE AND SO ARE MY CLOSE FRIENDS, AND OTHER AGENCIES AMONG OTHERS. 
By neighbors, corporations, non related family members, personnel, etc et al. MORE THAN ONCE. 
THERE IS ONE THING I ASSURE YOU ALL, YOU ARE ALL BEING WATCHED AND I HAVE NO CONTROL OVER THAT.
FOR SAFETY REASONS, AS WELL AS PRACTICAL REASONS. 

 

#Vlog #SurveillanceInAmerica | #ModernDayMilitantStandings – Civilians Targeted Over #FreeSpeech!? 7.7.2020

 

Программы по выживанию в #США очень реальны, и они уже известны и подробно обсуждаются. Однако моя ситуация немного отличается. Меня зовут Энтони Брито, я живу в #США, и с тех пор, как я начал изучать закон и психологические подходы, которые военные используют в повседневной жизни, стало ясно, что эта страна коррумпирована. Немного предыстории: Так что я говорю о системе здесь и не извергаю ерунду или пропагандистскую риторику. Я цитирую статистику и обзоры нашей собственной страны нашей собственной страной. Они не будут показывать это по телевизору, они просто смотрят в обратном направлении, в котором никогда не обсуждается реальность Запада, возможно, чтобы поднять настроение проамериканцев, что не удалось, как вы можете видеть из недавнего набора ситуаций, в которых #США были заголовком: IE: #GeorgeFloyd, #COVID #WHO, Санкции против стран и т. Д. И др. Как указано, я говорю об этих темах и психологических подходах. У меня нет никаких связей с правительством #США, и я никогда не принимал работу здесь с каким-либо отделом, поэтому я могу говорить по этим вопросам. Это повлияло на мою жизнь во многих отношениях. У меня несколько правовых ситуаций: одна – дело о компенсации работникам с 10 ноября 2016 года – адвокаты не помогали и пытались сорвать и саботировать мое дело. Очень прямо сказал мне это. (Смотрите мои другие видео.) Костюм verus #JewelOsco. Много злоупотреблений и коррупции. У меня также есть ситуация с несколькими больницами, которые нарушили права человека и гражданские права в #2017 году. Методистская больница. Кроме того, ситуация с кражей личных данных в наших помещениях – это отдельная, но повторяющаяся проблема, возникающая с #2003 года. Очень немногие сектора этой страны хотели помочь, когда их спросили / когда отчеты были представлены в соответствующие департаменты, которые работают на налогоплательщика. Мало кто хотел помочь. Даже адвокаты чмо … Неслучайно рассмотрение всех этих ситуаций лишь подтверждает тот факт, что эта страна рассматривает любого, кто понимает закон о текстах и подходы к противодействию им, как угрозу. Зачем? Потому что вы не согласны с обманным путем, а также четко понимаете законы и главы государства, которое к ним относится. В моей ситуации Иллинойс. С тех пор подача заявок на работу и программы отсюда откатывалась назад и сознательно делалась таким образом, чтобы попытаться остановить меня. Невозможно, потому что обучение ничего не стоит. Тем не менее, я знаю, что выполнение этого на нескольких платформах привлекает внимание ко мне, но мне все равно, в этом суть. Зачем фокусироваться на больших нишах, когда все наше общество здесь – обычный человек? В любом случае, все эти вещи, которые я здесь изучил, являются правдой, продолжаются, и департаменты теперь не хотят помогать. Вы знаете, как это называется? Это называется препятствием на пути справедливости и несоблюдением закона. Вот почему я делаю #vlogs, это может случиться с каждым, кто не видит его так же, как дроны на ТВ хотят, чтобы это выглядело так, как будто они это делают. Основные СМИ здесь шутка. В настоящее время это мирное время во время отметки военного времени в наших текущих взаимосвязанных историях. Тем не менее, я живу в #США, но не согласен с ерундой или системой, потому что эй, половина людей в этой системе не так хорошо. Кроме того, страны мира также смотрят на страну таким же образом. Если именно так они относятся к гражданскому населению, представьте, что они думают о других странах, в которых также есть гражданские лица с противоположными идеалами в отношении США! Я даже не начал углубляться в программы слежения и шпионажа, но не ошибаюсь, они работают 24 часа в сутки, и, похоже, они отслеживают только высокоприоритетных людей, которые возмущаются взглядами Запада. Похожи на дипломатов и то, как они нацелены из-за похожих ситуаций. Дело латиноамериканских стран. Хотя это тема для другого времени.

Future #Vlogs Will Be In Another Language / Presentations Will Be Translated. #StayTuned.

“What #Time Is It?”: A Mini Overview of #TimeModels /QP & #ImaginaryTime As A Constant For #HawkingTheory / Thoughts 6.24.2020

Many are claiming that the Gregorian calendar [among other records of “time keeping”] are incorrect and have left out years from the [our collective] timeline –the events/years happened but they were never recorded in #history.
This means that although man is the “creator” of our #ModernDay constructs of “#Time” there are intentional seconds, minutes, hours, etc et al that have been left out.
This has been the case throughout #history
With the advancements in the fields of #AI and #technological endeavors– as well as the fact that technology will exponentially KEEP advancing… we as a species are able to discern and understand that maybe we were wrong about everything to this point in time, collectively.
We learn from books, [now digital mediums mostly; #print seems to be at a premium these days.] the doctrine in the #US is different than other #countries account of historical events [specifically where #wars are concerned] and history is molded by the ‘winners’ even if the losers won, etc et al.
Recognition versus Reality.
With #QuantumPhysics undergoing radical changes / new abstracts and ideologies being presented worldwide, this is truly something amazing.
Many new age / philosophical / #religious sets are stating that they believe we are living in “#2012”. How did this idea come to be?
Your guess is as good as mine; its all subjective anyway. Even this current ‘time stamp’. #Static and #Dynamic.
Fun Fact: there is no one singular instrument to accurately gauge what time it is, [overall] even the most finely tuned watch is prone to error.
Why? It was created by man.
It is a interesting to ponder but hey, I can dig it. Going toward 2013 again?
ALSO
https://www.youtube.com/watch?v=Sm8idDb3B00 Skip to @2:40 – -PEEP The Aprocalypse /// PeeP The A-PROcollapse.

#Updates Of Our Situation In #America – #WorkersCompensation, #IDPH, #CivilSuit, #SSI, #Property, #BeingAMinorityInAmerica

♿️I have been dealing with a stalled #WorkersCompensation case since November 10th, 2016 that has left me with permanent limitations. Have not received any money and the case is relying on dated information.
The attorneys hired NEVER HELPED arguably. (They were all pro bono, now I am representing myself apparently.)
‼️Attorneys:
[—Karmel Law Firm—Joshua Karmel, Filed the case until December 2016, had direct connection to the company through the #Union, was a conflict of interest.
James P McHargue—
Joshua Turner—Told me to my face “it sounds like you got played”. WHO SAYS THAT?
Horrible attorneys that sat on my case for a while and kept switching between them , probably waiting on me to settle and take nothing while they knew/know that #DDD /#DegenerativeDiscDisease is a lifelong painful condition.
Jason P Carroll—2018.
This man used to work at a law firm called KFEEJ: Katz, Friedman, Eagle, Eisenstein, Johnson & Bareck.
He seemed genuine at first but he never sent me to any doctor, has still NOT filed the motions to get my payments reinstated, and the weirdest thing was he went to a different law firm while on my case— called Aleksy Belcher & Associates.
🔔I have applied to #SocialSecurity/ SSI for roughly the same amount of time and they are denying it for no reason only because the landlords do not know how to fill out property forms. (Which is why I reached out to agencies and other associates a while back, still nothing.)
At the same time these mentioned entities ALL had/have these medical files in #possession and #SSI stated they can’t reach out to them? But before they had told me they could. I included all these people there anyways. Social Security has everything as they have a valid authorization to reach out to EVERY location I’ve visited and acquire the medical files.
‼️Even the hospital (Methodist Hospital Of Chicago —5025 N Paulina, Chicago IL) with the #CivilRights & #HumanRights.
I had help from Lisa Reynolds and other branches / departments of government that helped / are helping. #IDPH, #ADA, #DoJ. Some were more willing to help than others.
I received files (over hundreds of pages) from Mrs Reynolds that shows how bad the hospital was; which I already knew due to what I underwent. It also showed a long history of health and safety breaches.
There was an attorney (Oppenheimer) that was going to take my case but he was uninterested if it meant that it was a #ClassActionLawsuit to help everyone and shutdown the hospital. This MAN HAS A PAPER THAT HE SCANNED (Report /IDPH also have this) THAT WAS THE ENTIRETY OF WHAT HAPPENED TO ME. Didn’t take the case due to the Class Suit…
After that I began to research and reach out to people and also get in touch with these agencies / government departments.
Pursuant to #42CFR there is NO WAY or reason why the Workers Compensation Commission would be using unrelated files out of the scope of the workers comp case.‼️
I have attempted to apply for #medicalcannabis since I cannot keep taking these narcotics and pills prescribed for my work injury / anxiety / PTSD ; my PCP is of little help and that’s probably because of conflicts of interest within my case. (Work Comp) —a multitude of dispensaries and even the IDPH states that any physician can certify that to apply. My medical records vouch for that.
Every time I move it is very painful. When I’m standing, sitting, laying down, etc.
When I turn my head or any body part it cracks and clicks. Any movement hurts and causes this. This has gotten worse since I got off of my pills but they did not fix the problem.
I have applied for a lot of employment opportunities but they do not offer much.
The Jewel Osco on Broadway (5343 N Broadway— The accident was the result of #OSHA violations which I made reports for during those times and they keep denying that. But the reports were filed nonetheless. My work injury was the result of leaking pipes overhead our work area that were taped up, and a few days prior to my injury they had all burst EVERYWHERE in the store. On the sales floor and in the EMPLOYEE WORK AREA. EVERYTHING IN THAT AREA WAS RUINED AND SO WERE ITEMS.FOOD. EVERYTHING. IT TOOK THIS LOCATION DAYS TO FIX THIS, and they fixed it by taping up pipes and taking shortcuts. The worst Jewel Osco ever.
can’t even apply for #Unemployment because of a situation that involves identity theft/identity cloners living on our property occupying the basement (haven’t paid rent in 17 YEARS) and the first floor. We live in the attic. They only rent, we own the house.
That’s a separate matter but also impacts my family’s ability to apply for assistance and other programs. We were seriously being questioned if we were Citizens when we went to apply for benefits at a location near Humboldt Park. Why?—because the identity cloners using multiple names and aliases occupy the lower levels of the house through scamming my elderly
parents and The state doesnt know those people live there under pseudonyms. Certain departments told me to report them and submit proofs of their aliases. So I did and opened up a US POSTAL SERVICE investigation (among others: #IRS, #IDPH, #SSI, #FTC etc. This issue started in 2003 — but has impacted us severely and I brought it to the attention of counsel and another broker in 2018/2019.
Where we live has a ton of hazards, once I contacted an exterminator / inspector the tenants downstairs started making renovations. (March 2020–Present Day)
Everything that the homeowner is responsible for is literally in the lower levels: Water control, Central cooling systems control, electricity controls, etc.
Much more that’s going on as well. My posts and sites delve deeper into these ordeals, thanks for your time all!
This is the way my life has been since 11/10/2016. Impacting my ability to find employment, health, family, schooling and dealing with serious legal matters.
Update 6/18/2020 – I have been in severe pain and have relied on pain medications which I have tapered off of; the pain has gotten worse and I am worried by that as well as have pending trials in workers comp and the civil suit versus Methodist, property issues, etc.
The fact that I am a minority and disabled further shows how corrupt this system and country is. If I were white there would have been action and I wouldn’t have had to do all this in the manner which I had to. Everything has been proven. All issues I have delved into on here.
#America is a racist country that is very broken and I do not want to live in this country; i have been trying to move to a different country. This one favors corruption, whites, and discrimination.

#PSA #USAInterception of #Connections @SONY / #@YouTube [Example:#OnlineGamingCommunity #USA/Abroad] 5.23.2020

 

 

The widespread use of #Espionage due to the lack of reliable #intelligence being given to the #USGovernment is reflective of the #TaxPayer and the evolving state of “Intelligence” overall.

When you have a $100Billion dollar industry that fails to obtain actual intel on subsidiaries, businesses, nations etc, it is clear that not only do we fail to coordinate with the #international sectors of security but that we are losing money / failing to bridge connections within the contexts of the #Intel Community at large.

This presents a problem within the current administration(s) and is why #OpenSource intelligence is more rational than to sink so much money into an outdated model.

“Secret intelligence is costing the #US #taxpayer $60 billion dollars a year.” -Robert Steele, CIA

For THAT price which has now gone up to ~ $100 Billion dollars for the taxpayer /#Systems in the #Local/#National sectors …there is less than 10% of #reliable/#credible intel. —Do YOU really trust #NewsOutlets in #America / a #Country that conducts #Espionage 24/7? IE:The #USA.

#GovernmentInterception of #Connections @SONY / #@YouTube [Example:#Online #Gaming #Community #USA

For those of you that have complete faith in this #Country, you need to re-evaluate where you stand and realize that many #politicians are ALSO taking an open PUBLIC stance to ensure protecting the #PrivacyRights of all those involved.

The general #civilian DOES not have ANY contractual agreement with the #US #Government therefore this presents a gray area in terms of #connections, #Government #interceptions, and the right to #Privacy within the contexts of the #DigitalMediums pursuant to APPLICABLE LAW [Considering #InternationalClauses.]

In this example I will be using one the most major mediums known to date, which is the #OnlineGamingCommunity.
Over time, the standard of #livestreaming has seen an increase overall, that said EVERY #business with direct or indirect affiliation to these very mediums have their own set of #PrivacyClauses as well as #TermsOfUSe within the legal writings of our #Nation – The #USA.

ESPECIALLY once we get into #InternationalLaw and #ForeignPolicies.

I contacted @Ubisoft : Interceptions/DataBreaches while Playing a title Called #TomClancysTheDivision just to bring awareness to this issue affecting not just the consumer/#entrepreneur playing said game but the business itself. [IE: Ubisoft, EA, KONAMI, etc et al. ]

How exactly does this affect #business interests?
The #USA uses civilians and the [worldwide] #gamers as proxies to intercept, divert, or connect through covert methods to the other side of the connection [IE: Fake Cell Towers to Trick you into giving ‘them’ #DataClusters.].
This has been proven with the use of #OpenSourceTechnologies as well as due to the many people that work in #IT.
This does not ONLY affect the #Privacy of the #Gamers but extends toward another area of the platforms being used, #abroad.
Whether you are a #PCGamer, #XboxGamer, #PlaystationGamer, #NintendoGamer, #WiiGamer, etc et al. We can all agree that we have a diverse community of creators and as such their data – through proxy their affiliates and ultimately business as a whole – MATTERS!
This is how the act of #Espionage is used to gather intelligence on other #Nations. That is quoted directly from the #USA statutes themselves. [Look up the #Federal, #National and #Local statues of your respective states / #Countries.]

NOTES / #DigitalLogs
Interceptions still ongoing right now, #DDoS attack on IP address [In the past #SONY helped me figure out who was DDoS’ing ,me during competitive games] applying this same methodology to the #Privacy aspect of Society and #Games we can track the ways in which the #USA does this while breaching the #Rights of #Citizens at home and abroad.

During a live-stream connection appears to be directly targeting device and devices in the entire area of this community in #Chicago,#Illinois.

Logs supplemented by applicable affiliates IE: #@YouTube/#@Twitter/#@Ubisoft/#@EA/#@SONY/ etc et al.
As gamers from very diverse backgrounds it is important to understand where #transparency and #Privacy merge on a #personal, #individual and #general level.

We ALL play games, but that does NOT give the #USA any right to intercept the #transmissions of those we join lobbies with, play with, and collaborate with.
This is especially important in the age of #YouTubeCreators. Esepcially during #COVID where many are out of employment and have no other means by which to make money other than to live stream ANYTHING.

Especially if they happen to be situated abroad; this presents a serious #DataBreach problem at home as well as abroad / This is why there is a coalition of #AntiEspionage #gamers, #communities, and #civilians at large. [Even certain key #politicians see the necessity for this to be addressed and to stop this from happening EVERYWHERE IN THE #USA.]

To put this all in perspective:
IF the most basic levels of #Privacy are breached through something so mundane/’basic’ as #gaming; imagine what the higher levels of #Government are dealing with. [Case and point: #RussianCollusion / #ComeyTrial / #FISAWarrants, etc et al; just to name a few instances of our UN-Democratic society.]

Many #Senators are also becoming involved in this stand against #Espionage versus our own #People, #Citizens, and #Nation at large.

#Illinois does not seem to be taking the same stance as other states, while we are #democratic per se, this State DOES NOT represent the #People and certainly fails to uphold the #Law.

Notes: The #InternationalSectors of Security are ALWAYS involved, that makes this priority number one.

I speak on behalf of ALL when I say “#Espionage has no place in the #USA.”