FINAL REPORT OF THE SELECT COMMITTEE TO STUDY GOVERNMENTAL OPERATIONS WITH RESPECT TO INTELLIGENCE ACTIVITIES UNITED STATES SENATE. {APRIL 23 (under authority of the order of April 14), 1976}
NATIONAL SECURITY AGENCY SURVEILLANCE AFFECTING AMERICANS
This report describes the Committee's investigation into certain questionable activities of the National Security Agency (NSA). 1 The Committee's primary focus in this phase of its investigation was on NSA's electronic surveillance practices and capabilities, especially those involving American citizens, groups, and organizations.
NSA has intercepted and disseminated international communications of American citizens whose privacy ought to be protected under our Constitution. For example, from August 1945 to May 1975, NSA obtained copies of many international telegrams sent to, from, or through the United States from three telegraph companies. In addition, from the early 1960s until 1973, NSA targeted the international communications of certain American citizens by placing their names on a "watch list." Intercepted messages were disseminated to the FBI, CIA, Secret Service, Bureau of Narcotics and Dangerous Drugs (BNDD), and the Department of Defense. In neither program were warrants obtained.
The activities that were uncovered 30 years ago by this committe have not stopped, they are still going on with more secrecy and less oversight, all in the name/excuse of National Security. I guess when one hears these words we are all supposed to stop thinking and trust these criminals with whatever they want to do.
This link will take you to the official report written on these activities. Google can get you to the rest of the reports of the whole investigation.
http://www.icdc.com/~paulwolf/cointelpro/churchfinalreportIIIj.htm
Essential Quotes
I have sworn on the altar of God eternal hostility against every form of tyranny over the mind of man.
Thomas Jefferson
Thomas Jefferson
Monday, June 12, 2006
THOUGHT READING CAPACITY
The Bible attributes to God the capacity to know the thoughts of men. Most scientists are unaware that thought reading by electroencephalogram (EEG) was reported as feasible in work begun over 30 years ago, which more recently a number of groups confirm. This review focuses on literature relating to technologic thought reading. The discrimination of more general cognitive states, brainwave capture methods, and evidence of covert thought reading development are also treated.
"Anyone who tells you that 'It Can't Happen Here' is whistling past
the graveyard of history. There is no 'house rule' that bars tyranny
coming to America. History is replete with republics whose people
grew complacent and descended into imperial butchery and chaos." --
Mike Vanderboegh : (1953- ) Alabama Minuteman
The following is an article about the capability of thought reading. This technology exists and is being used in this country by criminals in various intelligence and law enforcement agencies. Developments like these and there uses are kept secret and are created under what is called a SAP which stands for Special Access Program. Two famous SAP programs that were developed in this country and were undetected for years were the creation of the NSA and the NRO. So let us speak no longer of Conspiracy Theories and let's start talking in terms that make sense and are real like SAP's. If the language in the article is to technical then have somebody explain it to you. If the information is not plausible to you,then go back to watching American Idol. Thanks.
http://www.slavery.org.uk/ThoughtReadingCapacity.htm
"Anyone who tells you that 'It Can't Happen Here' is whistling past
the graveyard of history. There is no 'house rule' that bars tyranny
coming to America. History is replete with republics whose people
grew complacent and descended into imperial butchery and chaos." --
Mike Vanderboegh : (1953- ) Alabama Minuteman
The following is an article about the capability of thought reading. This technology exists and is being used in this country by criminals in various intelligence and law enforcement agencies. Developments like these and there uses are kept secret and are created under what is called a SAP which stands for Special Access Program. Two famous SAP programs that were developed in this country and were undetected for years were the creation of the NSA and the NRO. So let us speak no longer of Conspiracy Theories and let's start talking in terms that make sense and are real like SAP's. If the language in the article is to technical then have somebody explain it to you. If the information is not plausible to you,then go back to watching American Idol. Thanks.
http://www.slavery.org.uk/ThoughtReadingCapacity.htm
Propaganda and Haditha
Propaganda and Haditha
In wartime, truth is so precious that she should always be attended by a bodyguard of lies. - Winston Churchill, British Prime Minister during World War II
This piece is a summary of five most commonly deployed crisis management propaganda tactics which the State and Media combine that we can expect to see in relation to the Haditha Massacre. Listed in a loose chronological order of their deployment, the tactics are: Delay, Distract, Discredit, Spotlight and Scapegoat. Each of the five public relations campaigns will here be discussed in the context of the Haditha Massacre.
http://www.informationclearinghouse.info/article13563.htm
In wartime, truth is so precious that she should always be attended by a bodyguard of lies. - Winston Churchill, British Prime Minister during World War II
This piece is a summary of five most commonly deployed crisis management propaganda tactics which the State and Media combine that we can expect to see in relation to the Haditha Massacre. Listed in a loose chronological order of their deployment, the tactics are: Delay, Distract, Discredit, Spotlight and Scapegoat. Each of the five public relations campaigns will here be discussed in the context of the Haditha Massacre.
http://www.informationclearinghouse.info/article13563.htm
Subscribe to:
Posts (Atom)