It is currently Mon Apr 29, 2024 5:43 am



Post new topic This topic is locked, you cannot edit posts or make further replies.  [ 916 posts ]  Go to page Previous  1 ... 31, 32, 33, 34, 35, 36, 37  Next
 The Golden Thread, Volume 6.3 2012 
Author Message
GT Truther
User avatar

Joined: Mon Oct 12, 2009 7:54 am
Posts: 1454
Location: London
 Re: The Golden Thread, Volume 6.3 2012
Whistleblower sparks Olympic bomb fear


This evening BBC TV London news included an interview with a lady who has a uniform but still does not know whether she has a job... and last week I heard a radio interview with someone who suggested that with uniforms being given to people who show fake ID entitling them to the uniforms so it will be easier for bombers to enter the Olympic sites than the visitors wishing to watch the games...

Simon

http://uk.eurosport.yahoo.com/news/whistleblower-sparks-olympic-bomb-fear-173817055.html

An Olympic security whistleblower has claimed that there is a '50-50' chance of a bomb attack at one of the London 2012 venues, according to Sky News.


The employee of security firm G4S, who was not named by Sky News, is claimed to have said budget constraints led to the cutting of corners in recruitment, and that he believes some staff are not capable of carrying out their duties.

The employee, who is involved in training staff, claimed a “no fail” policy was in existence for potential recruits, with applicants passing the training course regardless of competence.

He claimed that decommissioned weapons and grenades were passed through X-ray machines and that staff had failed to spot them - only to be told they would still get the job.

The whistleblower, who is said to have extensive experience in weapons and bomb detection with the military, told Sky:

“I can see so many security loopholes for this event. Security staff are given a very short time to achieve their training and there is a very slack approach.

“During my employment I planted pretend IEDs, decommissioned weapons, knives and other large metallic objects on students and sent them through the metal detectors.

“They’re not being seen by X-ray staff and they’re not being picked up during physical searches, so the training is completely insufficient.

“The people making these mistakes are then given a tick in the box at the end of the day, sent round the corner to collect their uniform and sent home to await an email with their start date."

He added that staff had no previous experience, and often struggled to speak or understand English fluently.

“Ninety-nine per cent of personnel coming through have no security background, many have language problems so they won’t be able to communicate with ticketholders and many completely lack confidence.

<snip>

_________________
Citizen of Planet Earth, living in the British Isles.


Thu Jul 12, 2012 2:35 pm
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
=== Silver ION's Not Particles Kill Bacteria ===

All of these Nano Silver and colloidal Silver solutions and generators are SNAKE OIL according to RICE University research. More on this link.

http://news.rice.edu/2012/07/11/ions-no ... acteria-3/

_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Thu Jul 12, 2012 2:42 pm
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
=== ALTERNATIVE THREE ===

Then along comes ALTERNATIVE THREE, which suggested that the world was going to be destroyed, and that if the elite wanted to save themselves and a few hand-picked members of the human race, they must establish self supporting colonies on the moon and Mars, and then come back to earth to repopulate after the EARTH CHANGES are completed and the world has settled down. Hence we have what were called BATCH ASSIGNMENTS, in which large groups of people were simply ABDUCTED, taken to special camps, had their personalities and will DESTROYED, and were made into robotics slaves to carry out the work of colony establishment. That there are reports of large groups of people that have simply vanished during the TIMELINE of Alternative Three should be of no concern, should it?

Of course Alternative Three was declared a hoax, as were the Protocols. ALTERNATIVE THREE was declared to be a hoax, but ALTERNATIVE TWO, the digging of huge underground cities and a tunnel complex has been accomplished. Numerous reports of huge underground cities and underground highways have been given by eyewitnesses. Yet it is all declared a hoax!! Have the space colonies been established? If so, that requires advanced technology and space vehicles capable of high speed travel to be used as shuttle and transportation craft. Was Nazi technology used to establish ALTERNATIVE THREE? Are the numerous UFO sightings of "mother ships" actually ALTERNATIVE THREE VEHICLES? The Bible implies that ALTERNATIVE THREE IS AN ACTUAL REALITY, and points directly to America-Babylon as the chief instigator. It is also interesting that many of the moon mission photos that were given to the public as authentic have problems with "lighting" and the shadows don't fall correctly. The movie CAPRICORN ONE was about this very thing. Could it be that the general public was shown fake pictures because of activity on the moon would have been revealed? Or is "Alternative Three" more disinformation?

Dr. Peter Bater, a top intelligence operative in the CIA and NSA claimed we had colonies on the moon and Mars, and he said that YEARS AGO. He also claimed that the RICH MEN OF THE EARTH WERE BEHIND IT, especially ROCKEFELLER and ROTHCHILDS. He claimed that we had a WAR out there as well, called the WAR OF THE HARVEST MOON!! Bater is dead now, so no one knows. The ENIGMA continues!!!


=== Alternative One ===

- elimination of a huge portion of world population. They are in the process of doing that. -

=== Alternative Two ===

-- Build many deep underground bunkers, as large as small towns, to protect the government in seclusion until the surface population thinning was finished. They have built over 200 such "underground cities". (Mt. Weather) --

Alternative Three - to build a "transfer station" on the backside of the Moon, build an underground base on Mars and remove a certain limited "Noah's Ark" cross section of Earth's population, artists, scientists, engineers, writers, etc., to Mars as a survival colony in the event of "catastrophy" on Earth. They started this project in 1961 and may have accomplished most of this as well.

(This coincides with the YF-55 Manned Moon Mission I just wrote about)

By secret Executive Order of President Eisenhower, the Jason Scholars were ordered to study this scenario and make recommendations from their findings. The Jason Society CONFIRMED the finding of the scientists and made three recommendations called "Alternatives One, Two, and Three."

"Alternative One" was to use nuclear devices to blast holes in the Stratosphere from which the heat and pollution could escape into space. Change the human cultures from that of exploitation into cultures of environmental protection. Of the three this was decided to be the least likely to succeed due to the inherent nature of man and the additional damage the Nuclear explosions would themselves create.

"Alternative Two" was to build a a vast network of underground cities and tunnels in which a select representation of all cultures and occupations would survive and carry on the human race. The rest of humanity would be left to fend for themselves on the surface of the planet.

(We know they are doing this. Million of tons of food and water moving underground. Millions of acre feet of water being moved underground)

"Alternative Three" was to exploit the alien and conventional technology in order for a select few to leave the earth and establish colonies in outer space. I am not able to either confirm or deny the existence of "Batch Consignments" of human slaves, which would be used for the manual labor in the effort as a part of the plan. The Moon, code named "Adam," would be the object of primary interest followed by the planet Mars, code named "Eve."

(1967 first manned mission to Mars, but Mars is has inhabitants underground ! )

During Eisenhower's first year in office, 1953, at least 10 more crashed discs were recovered along with 26 dead and 4 live aliens. Of the 10, 4 were found in Arizona, 2 in Texas, 1 in New Mexico, 1 in Louisiana, 1 in Montana, and 1 in South Africa. There were hundreds of sightings. Eisenhower knew that he had to wrestle and beat the alien problem. He knew that he could not do it by revealing the secret to the Congress. Early in 1953 the new President turned to his friend and fellow member of the Council on Foreign Relations Nelson Rockefeller for help with the alien problem. Eisenhower and Rockefeller began planning the secret structure of alien task supervision which was to become a reality within 1 year. The idea for MJ-12 was thus born. n 1953 Astronomers discovered large objects in space which were moving toward the Earth. It was first believed that they were asteroids. Later evidence proved that the objects could only be Spaceships. Project Sigma intercepted alien radio communications.

(These radio signals are not detectable by Marconi Design Radios. Only transceivers that employ Tesla's Longitudinal Wave technology. )

When the objects reached the Earth they took up a very high orbit around the Equator. There were several huge ships, and their actual intent was unknown. Project Sigma, and a new project, Plato, through radio communications using the computer binary language, was able to arrange a landing that resulted in face to face contact with alien beings from another planet. Project Plato was tasked with establishing diplomatic relations with this race of space aliens. In the meantime a race of human looking aliens contacted the U.S. Government. This alien group warned us against the aliens that were orbiting the Equator and offered to help us with our spiritual development.

(These were the Nordics)

They demanded that we dismantle and destroy our nuclear weapons as the major condition. They refused to exchange technology citing that we were spiritually unable to handle the technology which we then possessed. They believed that we would use any new technology to destroy each other. This race stated that we were on a path of self destruction and we must stop killing each other, stop polluting the Earth, stop raping the Earth's natural resources, and learn to live in harmony. These terms were met with extreme suspicion, especially the major condition of nuclear disarmament. It was believed that meeting that condition would leave us helpless in the face of an obvious alien threat. We also had nothing in history to help with the decision. Nuclear disarmament was not considered to be within the best interest of the United States. The overtures were rejected.

As a delaying action, All THREE ALTERNATIVES included birth control, sterilization, and the introduction of deadly microbes to control or slow the growth of the Earth's population. AIDS is only ONE result of these plans. There are others. It was decided, since the population must be reduced and controlled, that it would be in the best interest of the human race to rid ourselves of the undesirable elements of our society. The joint U.S. and Soviet leadership dismissed "Alternative One," but ordered work to begin on Alternative Two and Three virtually at the same time.

In 1959, the Rand Corporation hosted a Deep Underground Construction Symposium. In the Symposium report, machines are pictured and described which could bore a tunnel 45 feet in diameter at the rate of five feet per hour. It also displays pictures of huge tunnels and underground vaults containing what appear to be complex facilities and possibly even cities. It appears that the previous five years of all-out underground construction had made significant progress by that time.

http://www.greatdreams.com/moon/darkmoon.htm

_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Thu Jul 12, 2012 3:03 pm
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
=== The ED Threat - Infiltration and Takeover ? ===



Propaganda ? Agenda 21... ? Luciferian agenda... ? Shape-shifters ? or... Just part of the plan... ?


_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Thu Jul 12, 2012 3:10 pm
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
=== Gathering Intel - Truth / Disclosure Movement ===

As I once wrote.. The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add boundaries to it..

It is the last part "are not predisposed to add boundaries to it.. " Is the underpinning of how Intelligence Analysts Analyze Data. Just because we don't yet have the key information which allows for a better understanding of how to examine the information.. doesn't mean that we don't have enough to go on. It is the mosaic of information which yields this KEY which decrypts the mosaic if we are to stand back from the picture to examine what we have.

Lets examine some aspects of what people are not able to believe because of predisposition. This might give us some insights as to how to better examine information. Many people have never heard of the term ED's or Extra-Dimensional beings. Others who are associated with the Occult immediately recognize ED beings as being spirits. Those who understand that ED's have needs too from the occult standpoint realize they can be worked with. This bit of information only identifies one aspect of ED's which is the dark side. Are their ED's which are of the Light ? Yes.. at least I believe this from my experience. Are their yet other ED's which occupy some middle ground. Yes.. I believe that there may be many planes which ED occupy.

Why would ED want to occupy the realm of the physical / of flesh ? I has been said that some miss the trappings of flesh and they descend backwards to either possess, cohabitate or have the ability to become flesh as they WILL IT. This can be called transfiguration. There are many biblical accounts of possession as their are also transfiguration. So from that standpoint there are those who can account for ED's but they are not called ED obviously.. in the biblical account. Much like the ED's who are in a flying vehicle described in the book of Ezekiel 5:..

My point in all of this is not to loose perspective. Just because we can't see this as yet. The big picture... We must stand back and mull over all the bits to see what they mean.

For instance.. The Nazi's used ED's to gain technology.. What did the ED's get in return. This is key to understanding ED's that they worked.

Another would be.. ED's are shape shifters who has taken on the form of flesh for some reason. What this agenda is seems at the outset to be illusive. Remembering this KEY.. Look at the outcome.. The outcome of what is generated by huge change.. The outcome helps us identify what is happening.

Here is the BIG question.. What feeds ED's needs ? Motivation.. This will tell us why they are here and what their agenda is.. Who collaborates with ED's as a result tells us of their agenda..

Dissecting motivation yields possible information as to goals. The goals tell us what they are after and how they work.

Reading about the occult workings of Crowley and the Babylon Working.. was to bring about total destruction and chaos by opening the very gates of hell to bring in the "old ones" "the destroyers". Why do they want to destroy ? If they are of darkness anything of the LIGHT is an anathema to them. There will.. is not of peace but of destruction. There are elements in the BLACK GOVERNMENT who believe they can get what they want if they sacrifice the chattel. They can ascend to that higher plain to become ED's. Interesting isn't it.. They would sacrificed everyone for ascension.

On the other hand, Christ who we could say is an ED who was transfigured many times in the sight of men wanted to give instead of take. It was more important to provide a path to ascension we also call salvation. So from what we know about ED's, or from what we now know about ED's their are at least two types we can draw information from. I assure you their are other ED's with other motivations but most I would say would not give us the time of day.

This is my mosaic of what ED's mean to me thus far. I could be wrong but I attempt not to pass judgment on the information with preconceptions from my frame of reference.

:candle :candle :candle

_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Thu Jul 12, 2012 4:13 pm
Profile
GT Truther
User avatar

Joined: Sun Mar 25, 2007 9:38 pm
Posts: 3209
Location: "Consulting the Oracles"
Post Re: The Golden Thread, Volume 6.3 2012
(Note: Someday soon, people will balance out...Dex)

The motorman allegedly made the comments Wednesday morning as several officers from the Special Operations Division discussed threats against the Obamas. It was not immediately clear where the alleged conversation took place or exactly how many officers took part in the conversation.

During that conversation, the officials said, the officer allegedly said he would shoot the First Lady and then used his phone to retrieve a picture of the firearm he said he would use. It was not immediately clear what type of firearm was allegedly shown.



http://www.washingtonpost.com/local/cri ... print.html

_________________
Extraterrestrial's said to Alex..."The love that you withhold is the pain that you carry lifetime after lifetime".


Thu Jul 12, 2012 4:20 pm
Profile
GT Truther
User avatar

Joined: Sun Mar 25, 2007 9:38 pm
Posts: 3209
Location: "Consulting the Oracles"
Post Re: The Golden Thread, Volume 6.3 2012
Phatman wrote:
=== Gathering Intel - Truth / Disclosure Movement ===

As I once wrote.. The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add boundaries to it..

It is the last part "are not predisposed to add boundaries to it.. " Is the underpinning of how Intelligence Analysts Analyze Data. Just because we don't yet have the key information which allows for a better understanding of how to examine the information.. doesn't mean that we don't have enough to go on. It is the mosaic of information which yields this KEY which decrypts the mosaic if we are to stand back from the picture to examine what we have.

Lets examine some aspects of what people are not able to believe because of predisposition. This might give us some insights as to how to better examine information. Many people have never heard of the term ED's or Extra-Dimensional beings. Others who are associated with the Occult immediately recognize ED beings as being spirits. Those who understand that ED's have needs too from the occult standpoint realize they can be worked with. This bit of information only identifies one aspect of ED's which is the dark side. Are their ED's which are of the Light ? Yes.. at least I believe this from my experience. Are their yet other ED's which occupy some middle ground. Yes.. I believe that there may be many planes which ED occupy.

Why would ED want to occupy the realm of the physical / of flesh ? I has been said that some miss the trappings of flesh and they descend backwards to either possess, cohabitate or have the ability to become flesh as they WILL IT. This can be called transfiguration. There are many biblical accounts of possession as their are also transfiguration. So from that standpoint there are those who can account for ED's but they are not called ED obviously.. in the biblical account. Much like the ED's who are in a flying vehicle described in the book of Ezekiel 5:..

My point in all of this is not to loose perspective. Just because we can't see this as yet. The big picture... We must stand back and mull over all the bits to see what they mean.

For instance.. The Nazi's used ED's to gain technology.. What did the ED's get in return. This is key to understanding ED's that they worked.

Another would be.. ED's are shape shifters who has taken on the form of flesh for some reason. What this agenda is seems at the outset to be illusive. Remembering this KEY.. Look at the outcome.. The outcome of what is generated by huge change.. The outcome helps us identify what is happening.

Here is the BIG question.. What feeds ED's needs ? Motivation.. This will tell us why they are here and what their agenda is.. Who collaborates with ED's as a result tells us of their agenda..

Dissecting motivation yields possible information as to goals. The goals tell us what they are after and how they work.

Reading about the occult workings of Crowley and the Babylon Working.. was to bring about total destruction and chaos by opening the very gates of hell to bring in the "old ones" "the destroyers". Why do they want to destroy ? If they are of darkness anything of the LIGHT is an anathema to them. There will.. is not of peace but of destruction. There are elements in the BLACK GOVERNMENT who believe they can get what they want if they sacrifice the chattel. They can ascend to that higher plain to become ED's. Interesting isn't it.. They would sacrificed everyone for ascension.

On the other hand, Christ who we could say is an ED who was transfigured many times in the sight of men wanted to give instead of take. It was more important to provide a path to ascension we also call salvation. So from what we know about ED's, or from what we now know about ED's their are at least two types we can draw information from. I assure you their are other ED's with other motivations but most I would say would not give us the time of day.

This is my mosaic of what ED's mean to me thus far. I could be wrong but I attempt not to pass judgment on the information with preconceptions from my frame of reference.

:candle :candle :candle


Can you provide the link to who wrote this Phatz?

Dex

_________________
Extraterrestrial's said to Alex..."The love that you withhold is the pain that you carry lifetime after lifetime".


Thu Jul 12, 2012 4:26 pm
Profile
GT Truther
User avatar

Joined: Sun May 03, 2009 11:57 pm
Posts: 1561
Post Re: The Golden Thread, Volume 6.3 2012
Quote:
Thursday, July 12, 2012 - July 12, 2012 - WHITE HATS REPORT #45

LINK: http://tdarkcabal.blogspot.com/2012/07/ ... rt-45.html


Nomenclature of Financial Thievery

Quote:
President:
"I don't understand, where does all this come from? How do you get funding for something like this?"

Response:
"You don't actually think they spend $20,000 on a hammer, $30,000 on a toilet seat, do you?"


---From the movie, Independence Day, an exchange between the President and a civilian when the President enters Area 51 for the first time after the alien invasion.


Thu Jul 12, 2012 4:30 pm
Profile
GT Truther
User avatar

Joined: Sun May 03, 2009 11:57 pm
Posts: 1561
Post Re: The Golden Thread, Volume 6.3 2012
Here's something else I think we should do as a group:

Get Internet Access When Your Government Shuts It Down

http://www.pcworld.com/article/218155/g ... _down.html
..."Does your government have an Internet kill-switch? Read our guide to Guerrilla Networking and be prepared for when the lines get cut..."


Thu Jul 12, 2012 4:48 pm
Profile
GT Truther
User avatar

Joined: Tue Apr 20, 2010 9:31 pm
Posts: 2831
Location: Fennell bay N.S.W. (AUS)
Post Re: The Golden Thread, Volume 6.3 2012
simple simon wrote:
Since I planned to go online and keep up to date with whats going on I took with me my netbook computer. This is fairly light and ideal for going online when travelling. It worked OK on the flight out (albeit not online as this is not yet permitted whilst flying), but between then and arriving in the hotel it died on me and I am now deciding whether to repair it or sell for spares and replace it. A repair is likely to cost 2/3rds of a replacement.


:hmm Sure it wasn't attacked I'd say repair it, it has all your personal data on it and you don't want that getting into the wrong hands y'know CreditCard details and your other personal data.

_________________
I am a HIGHLY STRUNG PRIMA DONNA (atari)


Thu Jul 12, 2012 8:11 pm
Profile YIM
GT Truther
User avatar

Joined: Tue Apr 20, 2010 9:31 pm
Posts: 2831
Location: Fennell bay N.S.W. (AUS)
Post Re: The Golden Thread, Volume 6.3 2012
Warning::



According to a forecast track prepared by analysts at the Goddard Space Weather Lab, the CME will hit Earth on July 14th around 10:20 UT (+/- 7 hours) and could spark strong geomagnetic storms.

_________________
I am a HIGHLY STRUNG PRIMA DONNA (atari)


Fri Jul 13, 2012 2:08 am
Profile YIM
GT Truther
User avatar

Joined: Sun May 03, 2009 11:57 pm
Posts: 1561
Post Re: The Golden Thread, Volume 6.3 2012
Dex wrote:
Phatman wrote:
=== Gathering Intel - Truth / Disclosure Movement ===

As I once wrote.. The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add boundaries to it..

It is the last part "are not predisposed to add boundaries to it.. " Is the underpinning of how Intelligence Analysts Analyze Data. Just because we don't yet have the key information which allows for a better understanding of how to examine the information.. doesn't mean that we don't have enough to go on. It is the mosaic of information which yields this KEY which decrypts the mosaic if we are to stand back from the picture to examine what we have.

Lets examine some aspects of what people are not able to believe because of predisposition. This might give us some insights as to how to better examine information. Many people have never heard of the term ED's or Extra-Dimensional beings. Others who are associated with the....

REDACTED FOR SPACE

This is my mosaic of what ED's mean to me thus far. I could be wrong but I attempt not to pass judgment on the information with preconceptions from my frame of reference.

:candle :candle :candle


Can you provide the link to who wrote this Phatz?

Dex


Dex,

That's the very cool thing about virtually ALL of Phat's posts, - They're HIS writing. No copy/paste unless he is referencing something. When Phat writes in the first person, he is spilling his own -- personal insights, experiences, knowledge, inside information, opinions, hopes and fears, injustices, and thoughts.


Fri Jul 13, 2012 6:32 am
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
Dex wrote:
Phatman wrote:
=== Gathering Intel - Truth / Disclosure Movement ===

As I once wrote.. The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add boundaries to it..

Snip

:candle :candle :candle


Can you provide the link to who wrote this Phatz?

Dex


I wrote this Dex.. I thought I would touch on a subject which for the most part is taboo. ED's, I believe are many shades from black to white. When speaking of ED's some might call spirits, one must take into perspective wide variety. Some obviously, have great abilities to affect other dimensions.

Are some ED's also called demons, dread lords of darkness ? Yes, it is my belief that they have an agenda and that agenda is to destroy all ED's who are of the LIGHT.

Are we, people ED's ? Yes.. It is my belief that we are both flesh and spirit whose connection to the ED realms is through a silver cord which extents from us in a hyper dimensional ribbon which extends both forward and back ward in time to its extents. We are connected to the beginning and the end. Once the golden bowl be broken or the silver cord is cut we return from whence we came. Can more than one ED occupy the same flesh body ?

Yes, one submits and allows the ED to come in... or in some cases the ED comes in without permission. When one submits to the LIGHT some call this the holy spirit and to be filled with this spirit is uplifting and positive event. Submission to a dark ED one is subjected to their will and their agenda. Those who are taken by force sometimes undergo ritual exorcism in which the LIGHT replaces the DARK ED. In all exorcism the one who is possessed must call upon the LIGHT to replace the DARK.

When I reference, hybrid humans and address them as serpents.. It is their coldblooded killing nature which predicates their demands and takes the LIGHT from the living. Their darkness condemns all who are of the LIGHT. They wish to be sacrificed to, so that the little ones have their light forcibly taken from them. From this, we see those who are the authors of chaos and destruction, whose craft of cunning and deceit run demands to be fed until their is nothing to feed on anymore. They prey on the weak and the innocent who are unable to defend themselves. They often times eat the flesh and drink the blood and are pederasts of the young.

In our world very few have the discernment to see those who are hybrids. Those who have taken within themselves the Enlightenment of the BLACK SUN. They lust for knowledge, power, money, position, drunken with lust they take and take until they can take no more. For some it is easy to see them because they have no LIGHT. They seek the highest positions in all walks of life. Never serving but demand to be served. Those who are the of the LIGHT serve because they enjoy to serve. They serve the greater good because it is from this the children of the LIGHT know that all benefit.

John Nash, a man plagued by paranoid schizophrenia wrote a 27 page thesis which revolutionized economics and trade. In his thesis it demonstrated how when all parties benefit that all benefit and grow financially. Many years after he wrote this paper he was finally recognized and given the Nobel Prize. Nash suffered from hearing voices. He was tormented by voices telling him secret things which promoted his psychosis. Were these voices in his head ? I don't know. Could these voices been ED's ? I don't know. Chemical imbalances can do terrible things to people but some ED's can too.

http://www.u.arizona.edu/~mwalker/NashStory.htm

:candle :candle :candle

_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Fri Jul 13, 2012 8:31 am
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
=== Psychic Vampirism - Evidence of DARK ED's ===

http://psychicvampirism.com/

_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Fri Jul 13, 2012 9:59 am
Profile
GT Truther
User avatar

Joined: Sun Apr 05, 2009 9:25 am
Posts: 6266
Location: Timeline 39, Earth-Moon L1 Lagrange point
Post Re: The Golden Thread, Volume 6.3 2012
Phatman wrote:
=== ALTERNATIVE THREE ===
...
That there are reports of large groups of people that have simply vanished during the TIMELINE of Alternative Three should be of no concern, should it?

Of course Alternative Three was declared a hoax, as were the Protocols.
...


Alternative 3 was called it , cause there was 3 extra-planetary survival Colonies/bases against the Pole Shift of Nibiru : The Moon, Mars and the Dark Twin. THE STS-Aliens given MJ-12 the Transport of the Crews to these destinations...

But These ¨-NAZI- Genetic Selected Humans¨ did not acomodate there, and wanted to return to Earth and speak to the world what happened.

Then the Mil people activate the ¨Protocols¨ ie: the use of VX toxin in the bases, and since then these extra-planetary bases are dead. What a Failure! :headbang

The Coverup of the Generals is for the genocide commited there, against their own Human Race!!!

Meanwhile on Planet Earth: :whistle

_________________
--
Remember: this whole thing is about self-responsibility, self-rule and self choice.
Überm Sternenzelt richtet Gott, wie wir gerichtet.


Fri Jul 13, 2012 11:14 am
Profile WWW
GT Truther
User avatar

Joined: Sun Apr 05, 2009 9:25 am
Posts: 6266
Location: Timeline 39, Earth-Moon L1 Lagrange point
Post Re: The Golden Thread, Volume 6.3 2012
Nancy and Z-Talk July 14- 2012 (1)
:hmm
-To sum up: Can we have a hint on the next "big one"? If not, I understand.

Quote:
The rapidly occurring 7 of 10 pace we predicted in the Fall of 2010 has become what some would consider an agonizingly slow pace, as the plate movements slowly occur in the form of crumbling and mountain building and sinking lands, all without the drama of dramatic earthquakes and mass death. Our prediction, thus, that the 7 of 10 would “shock the world” is missing, and many were hoping for a rude awakening to shake up the stalemate between themselves and others they want to interest in planning for safe survival camps. While the humming black boxes are making the plate movements gentle and gradual, the Council of Worlds is facing off against the cover-up. Who is winning and who losing, and how might this end?

Most of the battle is behind the scenes, in the consciousness of the public and the discussions in smoke filled rooms of the establishment. Contactees, who are now of a number approaching billions, are aware of the presence of Planet X and that their governments and in many cases their religious leaders have been lying to them. Those in charge of the cover-up are becoming increasingly polarized, which was frankly expected in situations like this, so that even as it weakens it appears, on the surface, to be hardening. Meanwhile, the Council of Worlds is keeping the pressure up in ways that affect the establishment rather than the populace at large, as this is the point where a break must occur. Why is that?

Recall that one of the major reasons for the Element of Doubt rule is to prevent panic in the establishment. Determined to keep their perch, their status and power, they would gun the public down during demonstrations and impose draconian rules on the rest, such is their concern only for themselves, and retaining their control over the populace. These are, in the main, not nice people concerned about the common good, but ruthless and greedy individuals who have clawed their way to the top, whether the top be in government, in the military, in corporations, in the markets, or in religious institutions. Thus breaking the cover-up suddenly with undeniable evidence has its risks.

Does this mean that the establishment has only to continue the cover-up in order to win in the standoff with the Council of Worlds? Refuse to budge so the Council of Worlds is reluctant to move forward? Progress in this matter is gradual, as the establishment can see this will not last forever and evidence handed to the common man has an upward and exponential trend. The Earth wobble has been increased so that the Sun almost appears to rise in the North at times, and the Moon Swirls of Planet X are visible naked eye around the Sun, seen by many and captured on video. All this receives no comment by the establishment, who issues forth increasingly ludicrous explanations for the Earth’s magnetic field being twisted and awry, and ignores plate movements and the Earth wobble altogether.

What goes on in the minds of those at the helm in the establishment when they realize the common man can absolutely ascertain the Earth wobble by the position of the Sun, and are doing so! When they realize that Internet chatter about objects between the Earth and the Sun has gone viral, and attempting to stop the chatter would only flame the fires? There has been steadfast erosion in the ranks, who leave their jobs or city residences to head for bunker locations, converting their stocks and bonds and real estate holdings to precious metals and jewels. This trend has pock marked the ranks of the establishment determined to maintain the cover-up so that it looks like Swiss cheese, rather than a wall of solid determination.

All it takes on the part of the Council of Worlds to accelerate the trend is a nudge here or a nudge there, a hint that it would be oh, so easy, to remove the Element of Doubt and allow the common man to speak out. And then the roar of rage, which the establishment so fears would emerge from the populace, would be heard. How often has one seen, in movies or in real life, the bully suddenly groveling and pleading, the tables turned, when they lose control. This point is approaching, and will be seen by a capitulation in the cover-up crowd. They will suddenly decide to clothe themselves as the good guys, announcing the presence of Planet X and providing regular updates on its whereabouts. Meanwhile, the tens of millions who would have been slain or tortured during a panic in the establishment have been spared.


Notes:
(1)
http://poleshift.ning.com/profiles/blogs/cover-up-break

_________________
--
Remember: this whole thing is about self-responsibility, self-rule and self choice.
Überm Sternenzelt richtet Gott, wie wir gerichtet.


Fri Jul 13, 2012 11:19 am
Profile WWW
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
=== Transdimensional ED's ===

Transdimensional ED's are those ED who have the ability to move between dimensions. They have the ability to manipulate time, space, matter and energy. TED's are a unique class of ED's which I believe is necessary to identify. Could they being which at one time ascended ?

Ray Kurzweil one of the leaders in the human -->> human machine -->> god machine -->> ascended being theory believes we will become much more in the future. But not you and I. They will need a slave class for those who cannot afford to become part of the Egregore / Machine. I need not remind you of the Welsh word Hue.. which means serpent.. Human being .. serpent being.. Aspiring to be gods.. ? Kurzweil is on the Pentagon's Must read list. Why would this be ? If you know that the Intelligence community has embraced the ED phenomenon as a means to gain power then you are halfway their. When people like Gen Michael Aquino founder of the Temple of Set and Setian Magic then you start to realize that many of the very top people in the Intelligence Community are aligned in like manner. They are occultists by nature as Intelligence is all about DARK SECRETS. It is a small step to wonder how many of these in power might actually be TED's or Human ED's.

I realize their are those who most likely could not get their mind around this kind of information. They are closed to the idea of ED's in general. They want only to know the realm of the physical and will do anything to maintain this predisposition. When the veil is ripped from their eyes they become traumatized to the degree that indicates that they have become diminished in mind. In the video I posted that was from the Art Bell show, the caller was undone by the experience he had with ED's or maybe TED's.

I broach this subject with some apprehension as I realize many are unable to internalize what this means. I believe I have a certain incite regarding ED's from experiences which I do not want to share at present.

:candle :candle :candle

_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Fri Jul 13, 2012 11:36 am
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
9/11.. Videos and sound manipulation to hide explosions of planned demolition ?


_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Fri Jul 13, 2012 11:42 am
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
=== NSA After 9/11 ===

by David Barth, written 24 June 2009
http://www.barthworks.com/technical/nsaafter911.htm

Source Material: The Shadow Factory
The Ultra-Secret NSA from 9/11 to the Eavesdropping on America
by James Bamford, 2008

The Puzzle Palace
Inside the National Security Agency, America's Most Secret Intelligence Organization
by James Bamford, 1983

Intelligence and the Communications Industry National Security Agency (NSA) Predecessors

Various issues of Wired magazine

Black Chamber
NSA's predecessor was "Black Chamber" located in Manhattan's east side following World War I (WWI) in 1919. During WWI the censorship organization provided communications to the Black Chamber so that it could look for intelligence-related information.

After WWI, censorship ended and privacy was again guaranteed by the Radio Communication Act 1912. The Radio Act of 1927 broadened the privacy stipulated in the 1912 act. The Black Chamber became less effective due to the lack of intercepts and was closed in 1927.
Signal Security Agency In World War II (WWII) the Signal Security Agency was formed to handle censorship and look for intelligence data.

After WWII, in August 1945, the Signal Security Agency got the three communications giants, RCA, Western Union, and International Telephone and Telegraph (ITT) to provide communications transcripts in an effort called Operation Shamrock.

-- Formation of NSA
When the NSA was formed in 1952, it took over Operation Shamrock. In the mid-1970s, Operation Shamrock was discovered by the public, and NSA officials were threatened with jail time if they did not cease these activities.

Congress passed the Foreign Intelligence Surveillance Act (FISA) in 1978 to bolster and refine privacy for Americans. Even so, NSA began to take communications from the telecoms during the midnight shift, copy them, and return them.

-- 1986 Telecommunications Act
This Act mandates that all Telecoms use the same data format. It is believed that NSA had a hand in making this law a reality so that it could electronically handle all Telecom data in the same way.

Qwest
Prior to 9/11, on 27 February 2001, Joe Nacchio, President and CEO of Qwest, the large communication company covering the Western U.S., was asked to meet with Hayden, director NSA (DIRNSA), regarding the possibility of NSA receiving phone call records, bypassing FISA requirements.

Qwest was formed by billionaire Phillip Anchutz to build a fiber optic communications network. He purchased rights of way of abandoned railroads and Qwest buried fiber optic cable coast-to-coast. It was a brilliant strategic move that mystified most observers and analysts. Qwest became the fourth largest telecom in the country, and by 1999 Qwest's network had greater capacity than those of AT&T, MCI Worldcom, and Sprint, combined. Although Qwest's network capacity was large enough to carry all the voice and data traffic in the U.S., its share of telecom traffic never exceeded five percent.

Qwest also built a secure fiber network for NSA that linked listening posts in Europe and the Middle East to a transatlantic cable. Qwest's fiber optic network was chosen by NSA because of its speed and security. NSA used this Qwest network to transmit encrypted messages between 175 U.S. listening posts and NSA headquarters in Fort Meade, Maryland. NSA paid $430 million to Qwest for a ten-year communication contract in 1998.

Due to Qwest's overbuilding of the commercial network, the Qwest debt was $26 billion with insufficient income to service it. In response, Nacchio began layoffs, but it wasn't enough. By 2001, the stock price began a slide from $36 to $2 per share, with Nacchio selling off his portfolio while urging employees not to sell. Most long-time employees had their retirement savings in Qwest stock, and after the stock hit bottom, they were unable to retire for many more years. Eight years later, in 2009, the stock price had risen to only $5.

NSA wanted access to Qwest's communication databases to do intelligence analysis, and later, to install monitoring equipment in Qwest's Class 5 Switching Facilities, the system that carries most of Qwest's traffic. However, Nacchio wouldn't agree to NSA's requests because it would violate the Electronic Communications Privacy Act of 1986. He said NSA should present Qwest with a FISA warrant. When he was arrested for insider trading due to his activities, Nacchio claimed that the charges were retribution for not allowing NSA access to Qwest databases.

Echelon
This is the code name for an NSA eavesdropping program. This program primarily accessed satellite transmissions for 40 years using four geostationary satellites placed at four points above the equator. This information is shared, at least in part, with the other "Five Eyes" members:
UK
Canada
New Zealand
Australia

Satellite Intercepts Augmented by Fiber Optic Cable Taps
Due to the increase in internet communications and email, in which the satellite delay and limited bandwidth made high-speed, wide bandwidth fiber optics a more desirable transmission mode, satellite communications fell to one percent of all commercial communications. By 2000, 80 to 90 percent of international communications went by undersea cable instead of satellite transmissions.

Satellite delay is 1/4 to 1/2 second, a significant length of time for communications. The delay for transatlantic fiber optic cable is 1/30 second, and it is inexpensive because of overbuilding. Between 1999 and 2000, undersea cable capacity increased 15 times. Where an undersea cable reaches a coast, a landing station is built to transfer the data from undersea cables to the land-based communications network.

Ten Cable Landing Stations On The East Coast, In Four Cities
Tuckerton, New Jersey
Manasquan, New Jersey
Manahawkin, New Jersey
Charleston, Rhode Island

These cable stations carry 80 percent of all international traffic. The Tuckerton, New Jersey site has an AT&T landing station that is one of the busiest in the world. It is the gateway for several undersea cables to Europe, the Caribbean, and South America. One of the cables is trans-Atlantic telephone 14 (TAT-14) with ten million circuits operating at 640 gigabits per second. It is a 9,000 mile loop to Europe and back. Middle East communications flow to and from the Europe landing station by microwave, landline, or satellite, and then back to TAT-14 by undersea cable.

The increased volume of communications due to the internet was supported by the following technologies:
fiber optic cables
wave division multiplexing (WDM)
synchronous digital hierarchy (SDH).

Before fiber optics was available, when satellite delays of 1/4 to 1/2 second were undesirable, microwave transmission was used. To intercept microwave signals, NSA placed a Rhyolite signal intelligence (sigint) satellite into geostationary orbit near the horizon, in the path of the microwave signals.

NSA has equipment at landing stations that captures communications and sends it, encrypted, over fiber optic cable to Fort Meade, Maryland or another NSA analytical facility in the U.S.

NSA Data Collection
NSA intercepts data from the following sources:
Phone calls
Text messages
Credit card receipts
Facebook
Myspace
Twitter
GPS tracking
Cell phone geolocation
Internet searches
Amazon book purchases
E-Z Pass toll records

Three V's of Signals Intelligence (SIGINT)
Volume (how much traffic is on the line?)
Velocity (how fast are messages being sent back and forth?)
Variety (what types of messages are being sent? Internet, text messages, phone conversations, book purchases, etc.

SKYPE
It has been asserted that SKYPE, a Voice Over Internet Protocol (VOIP), bypasses telecom hubs and gateways, provides end-to-end encryption, and is said to be virtually unbuggable. EBay owns SKYPE. Dissidents around the world use SKYPE. However, dependency on SKYPE for secure communications has possible pitfalls.

Blackberry Personal Digital Assistant (PDA)
Like SKYPE messages, Blackberry messages are encrypted. This means that Blackberry messages must be unencrypted in NSA computers before they can be read and analyzed. NSA computers are so advanced and fast, that unencrypting all but the most robust encryption algorithms takes only seconds to complete.

Mexican Human Rights Violations
In 2006 the U.S. State Department reported that Mexico experienced the following human rights violations:
unlawful killings by security forces
kidnappings
kidnappings by police
torture
arbitrary arrests and detentions
corrupt judicial system
censorship of journalists
corruption at all levels of government
trafficking in persons with government involvement
child labor
It is believed that NSA intercepts helped discover and confirm these human rights violations.

Canadian Communications Security Establishment (CSE)
CSE is Canada's equivalent of NSA.

Canadian CSE Intercept Locations
Pennant Point, near Halifax, Nova Scotia (satellite and cable)
Laurentides, Quebec
Lake Cowichan, British Columbia
Masset at the northern end of Graham Island off of British Columbia
Gander, Newfoundland and Labrador (formerly, Newfoundland)

Telecom Intercept Outsourcing
AT&T has a secret room in San Francisco that is staffed by Narus, a company, now owned by Boeing, that has ties to Israel's intelligence service. Verizon built a secret room in Houston run by Verint, a company that has ties to Israel's intelligence service.
NSA provides watch lists to Telecoms who then give them to their contracting companies to enter into the computers.
Contractor intercepts that match the watch lists are sent to the FBI in Sterling, Virginia which forwards them to NSA in Fort Meade, Maryland.

-- Intercept Contractor Ties to Israel
Verint, Narus, Persay, and Checkpoint have ties to Israel's intelligence service. Verint and Narus have tapped the entire American telecom system and much of the planet through their relationships with client countries.

Verint
Verint was founded by a former Israeli intelligence officer. Verint sells the intercept hardware and software to more than 100 countries, including NSA and FBI in the U.S. Verint won the contract to build Mexico's eavesdropping system. Other Verint customers include the U.S. and Vietnam.

Verint's taps can be remotely accessed by Israel, meaning that Verint intercepts in all these countries can be read by Israel. Because of this situation, Israel has a greater intercept capability than the U.S.

Narus
Narus, a subsidiary of Boeing, provides software to China for selective blocking of specific content instead of blocking entire websites. Narus can block VOIP calls (e.g. SKYPE and Vonage) that are made using a computer with an Internet connection. Narus software has VOIP detection capability.

Narus clients include:
China
Pakistan
Egypt
Saudi Arabia
Libya

Persay
Persay, a spinoff of Verint, can provide a voice mining capability to identify speakers in voice intercepts. Persay is financed by Athlone Global Security which is located in NSA's Chesapeake Innovation Center in Annapolis, Maryland.

Checkpoint
Checkpoint is an Israeli company that sells firewalls and other Internet security software. Checkpoint has an office in Redwood City, California.

Shin Bet
Shit Bet is Israel's internal security service.

Unit 8200
Israel's NSA is Unit 8200 which is responsible for worldwide eavesdropping. Israel's intelligence community targets the U.S.

Sourcefire
Sourcefire is a U.S. company with intrusion-prevention technology used by NSA and the Pentagon to prevent hackers from accessing networks in those organizations. Checkpoint, tried to buy Sourcefire, but the U.S. blocked the purchase because Checkpoint is an Israeli company.

Nice
Nice is an Israeli company that provides eavesdropping software. Like Verint and Narus, it keeps its client list secret. Clients include both governments and commercial companies. Nice software provides voice content analysis with the following:
word spotting
emotion detection
talk pattern analysis
Israeli Spy Companies
The following Israeli spy companies provide intercept software, hardware, and consulting services to client countries:
Verint
Narus
Persay
Checkpoint
Nice
Elta Systems
Tadiran
Comverse Technology
Natural Speech Communications (NSC)

Pen-Link
Pen-Link, a U.S. company in Lincoln, Nebraska, provides phone number analysis and Internet eavesdropping software. The CIA is a Pen-Link customer.

Datona
Datona is AT&T's database that contains phone number and Internet records.

Calling Circles
NSA focuses on international calling circles - who called whom.

Natural Speech Communications (NSC)
NSC is a company that provides verbal Key Word Spotting (KWS) software.

Five Eyes Intercepts
Each of the Five Eyes members had to work out secret agreements with its cable companies, including planning the following activities:
build secret intercept rooms with fiber optic cable access cables had to be spliced to place the taps mirrored data had to be backhauled to the country's analysis centers faster processing equipment had to be installed to accommodate the increase in intercepts

Special Collection Service (SCS)
In non-Five Eyes countries where no cooperation between the intelligence services, NSA, and the communications companies exists, NSA or one of its Five Eyes partners recruits an employee at a telecom to install a bug or tap a fiber optic cable. At times in the past, NSA has spent several hundred million dollars to get a cable tapped and then find that the take (the intercept data) was useless. The project of tapping a foreign fiber optic cable is accomplished by a covert organization, the Special Collection Service (SCS), which combines clandestine skills of the CIA with the technical capabilities of the NSA.

SCS is located in a 300 acre compound in Laurel, Maryland, nine miles south of NSA headquarters. The sign in front of the complex says "SSG" which has no known meaning. Inside the main building is a "live room" where the electronic environment of target cities is duplicated to test which antennas and receivers will work best for covert interception. Bugs, receivers, and antennas are incorporated into everyday objects.

Tapping Cables in Hostile Foreign Countries
To obtain access to fiber optic cables in hostile foreign countries, SCS would trace the cable to a remote area, dig a trench, and place a "clip-on coupler" to the cable that would produce a micro-bend in the cable that allows a small light leak through the polymer cladding shell. The light would be captured by a photon detector, converted to electrical signals, and sent to a port on a special laptop with super long-life batteries. The laptop would be buried in the trench with an antenna wire running up a tree and disguised as branches. Signals from the bug would be transmitted from the antenna to a satellite. Instructions can be sent from the satellite back to the laptop to turn the intercept bug on and off, and possibly, to self-destruct itself in the event digging in the vicinity was detected.

Tapping Undersea Cables
To tap undersea cables, the Navy secretly renovated the Seawolf-Class submarine, SSN Jimmy Carter. In December 1989, the Electric Boat Division of General Dynamics in Groton, Connecticut, was awarded an $887 million contract to modify the sub with the insertion of a 45 meter section for surveillance, mine warfare, special warfare, payload recovery, and advanced communications. The mission profile is for the submarine to sit on the bottom, over the cable. An NSA team would pull the cable aboard into the new section of the boat, tap it, and put it back on the bottom with a pod attached. A cable attached to the pod runs along the bottom to Fort Meade, NSA headquarters.

First Transatlantic Intercept Station, WWI
Before the advent of satellite or undersea cable communications, transatlantic communications were by radio. The first transatlantic intercept station was built on Gillin Farm in Houlton, Maine, USA just prior to the end of WWI to pick up radio transmissions to and from Europe.

Information "In Motion" and "At Rest"
As technology makes it increasingly difficult and costly to intercept information "in motion" as it is passed from one location to another, the trend has increasingly turned toward obtaining information "at rest" from computer hard drives or filing cabinets. Bugs can be planted in keyboards and other vulnerable parts of a computer network to intercept messages before they have been encrypted.

Fiber-Optic Link Around the Globe (FLAG)
Flag is the world's largest private undersea cable system, spanning 40,000 miles. The Flag Falcon cable connects Egypt to Mumbai, India, passing through Oman, Bahrain, Kuwait, and Qatar. Of greatest interest to NSA are Iran, Iraq, Sudan, and Yemen. NSA has been targeting Iran's 9 Intelsat and 4 Inmarsat earth stations for a long time.

Mumbai has the central switch for all cables in the Middle East and much of Asia including Flag, Flag Falcon, Sea-Me-We 3, and Sea-Me-We 4. The Mumbai switch is owned by VSNL, an element of the Indian Government.

Research and Analysis Wing (RAW)
The Research and Analysis Wing (RAW) is part of India's NSA. VSNL was privatized through sale to a large Indian company, TATA Group.

Director NSA
Air Force general Hayden became Director NSA in March 1999. Controversy over the Echelon Program caused Hayden to cease tracking communications from the U.S. to overseas. This action helped the 9/11 terrorists succeed.

Home, Director NSA
The Director NSA lives in a house in Ft. Meade, Maryland, about a mile from NSA headquarters. The house has a sensitive compartmented information facility (SCIF), pronounced "skif." It is a bug-proof room with a Secure Telephone Unit (STU).

NSA Computer Crash
On January 24, 2000, all NSA computers went down in 7 PM, EST (midnight GMT, the time that the computers use). NSA suddenly became "deaf." The computer crash was due to an outdated routing protocol and the fix required a massive hardware and software upgrade which required three days. It is not known if there were backup means in place to continue intercept collection, analysis, and storage or if the other Five Eyes members were able and invited to take up the slack. It is believed that this event was classified top secret at the time.

NSA Intercept Volume
The NSA collects millions of intercepts per hour, and the volume of them could fill the Library of Congress every three hours. Needless to say, NSA computers have huge storage capacity to hold all the intercept data.

Laws and Regulations Affecting Eavesdropping Activities
Fourth Amendment
The Fourth Amendment stipulates the right to privacy for U.S. citizens. Prior to 9/11, conversations where a U.S. citizen was on at least one end of the call could not legally be monitored without a FISA warrant, regardless of whether the citizen was in the U.S. or on foreign soil. After 9/11, NSA was mandated to eavesdrop on all communications, domestic and foreign. How this situation relates to the Fourth Amendment may be a point of discussion. The underlying basis for this is protection of the United States and its citizens, not to violate privacy.

Foreign Intelligence Surveillance Act (FISA) of 1978
Before 9/11, to track a terrorist by targeting his communications, NSA needed a warrant from the Foreign Intelligence Surveillance Court (FISC) as provided by the Foreign Intelligence Surveillance Act (FISA). FISA was enacted in 1978. It allowed for eavesdropping without a warrant for up to two days.

After 9/11, NSA bypassed FISA-required warrants for eavesdropping on domestic targets. This action allowed NSA to do warrantless intercepts of communications between domestic and international callers. Following 9/11, at the beginning of warrantless call scanning, 500 Americans were targeted at the beginning of the program in 2001.

Between September 2001 and December 2005, NSA conducted 5,000 warrantless taps. Only ten of these were suspect, and for them, NSA obtained a FISA order to target domestic calls to these taps.

The number of Americans under warrantless call scanning was 100 in 2007 as U.S. citizens were vetted and removed from the list.

As of 2008, the number of people overseas being targeted ranges from 5,000 to 7,000. Occasionally, after the capture of a terrorist or an Al-Qaeda computer, the number jumps as new names and phone numbers are found. As of 2012, it is believed that the current number of people on watch-lists is more than a million.

This top secret document states the prohibition of monitoring calls of Americans, regardless of whether the American is on domestic or international soil. In addition, the 5-Eyes countries agreed that each of them should not listen to conversations of citizens of 5-Eyes. However, eventually, they listened to everyone, regardless of their nationality or location. Unless specifically deleted, all intercepted conversations are stored on NSA computers.

In a phone conversation between British and American aid workers in Iraq at the start of the second Iraqi war, the British person warned the American to be careful of what he said because the American intelligence services are listening. The American responds that American's can't listen to the conversation because USSID 18 prohibits spying on Americans.

This conversation was a breach of security because the American was uncleared American was not supposed to know about NSA's USSID 18.

FISA allowed NSA to eavesdrop on satellite signals, undersea cables, and other communication pathways. A major listening post was in Sugar Grove, West Virginia.

Protect America Act of 2007
In May 2007, following Iraqi insurgent's capture and killing of three U.S. soldiers, NSA blamed FISA for preventing it from locating the terrorists. Public pressure forced Congress to give NSA warrantless wiretap capability as long as the target was outside the U.S. and not a U.S. citizen by passing the Protect America Act on August 4, 2007. The law also forced telecoms to cooperate with NSA spying operations.

United States Signal Intelligence Directive (USSID) 18
This top secret document said that calls with a U.S. Citizen on one end of the call cannot be monitored. This directive was approved by the Five Eyes until after 9/11 when all calls began to be monitored.
Unless manually deleted, all conversations are stored on computers.
The Fourth Amendment, FISA, and Executive Order 12,000 (1981), are translated into the provisions into simple language for NSA employees by U.S. Signals Intelligence Directive (USSID) 18.
NSA Wiretap Process Investigation
In 1977 Attorney General Levi established a top secret task force of FBI agents and Justice Department prosecutors to investigate NSA wiretapping process. The final report was classified "top secret umbra/handle via comint channels only" and was excluded from declassification or from Freedom of Information Act (FOIA) requests.

The report was so sensitive that only two copies were printed. The report concluded that the inquiry be terminated. It indicated that the National Security System, as a whole, granted the agencies too much discretionary authority with too little accountability for 35 years. It also said that the blame lay with the Presidents and the Congress, not the agencies (e.g. CIA, FBI, and NSA).

Terrorist Surveillance Program (TSP)
TSP is an NSA program to track terrorists through the use of intercepts.

National Counter Terrorism Center (NCTC)
This center contains the Terrorist Identities Datamart Environment (TIDE). The DO NOT FLY list is derived from TIDE and has one million names.

There is a hard-core DO NOT FLY sub-list that contains 40,000 names. Thousands of names are added each month. The names reside on an Oracle database running on a Unix operating system. NSA data is incompatible with the TIDE database or the CIA's main computer database, Quantum Leap, located on a computer in Reston, Virginia. Data from Quantum Leap has to be printed out and reentered by hand into the TIDE database. As of 2008, NCTC was building a bigger database called Railhead which will absorb TIDE.

Office of the Director of National Intelligence (ODNI)
The ODNI is over all U.S. Intelligence Agencies including the FBI, CIA, and NSA.

Presidential National Security Directive 16
This directive allows the President to launch a secret preemptive ciber war against any number of foreign countries. A ciber war might mean taking down the Internet for an entire country and blocking all Internet packet transfers.

Google and NSA
NSA tracks every Google search. This may mean that someone who searches for directions to build a nuclear device or for a source for Plutonium might become a target for an NSA tap.

GCHQ
GCHQ is UK's version of NSA. It is commonly referred to as "The Q." In 1962 the British Post Office satellite communication station at Goonhilly Downs in Cornwall came online with a 90 foot diameter dish to track Telstar, the world's first communications satellite. The satellite was in Low Earth Orbit (LEO) and passed over the Goonhilly Downs intercept station every 158 minutes.

First Undersea Cable
In 1963 the first cable, TAT-3, was laid between the U.S. and the U.K. It went from Tuckerton, New Jersey to Widemouth Bay near Bude in Cornwall.

Intelsat 1
In 1965 the first geostationary satellite, Intelsat 1, nicknamed "Early Bird," was launched into a 22,300 mile orbit to provide continuous communications between the U.K. Goonhilly Downs dish and the U.S. satellite ground station in Etam, West Virginia. The U.K. did not need to tap the TAT-3 cable because it was controlled by the U.K. Post Office which gave GCHQ all of the communications from it.

Sugar Grove, West Virginia Intercept Station
For its own satellite intercepts, the U.S. built an intercept facility at Sugar Grove, West Virginia, 50 miles from the Early Bird downlink at Etam, West Virginia. NSA financed and built the satellite intercept station at Bude, Cornwall in the late 1960s, populating it with two 90-foot diameter dishes. Today, Bude is the landing point for a number of fiber optic undersea cables.

By 2005, Bude had about 12 satellite dishes aimed at various geosynchronous satellites, covering the area from the Indian Ocean to the South Atlantic.

In 2008 the Goonhilly Downs station was closed. The satellite gateway was moved to Madley in Herefordshire which became the U.K.'s major satellite intercept point.

New GCHQ Facility in U.K.
In 2003 a new GCHQ site was built in Benhall, consisting of more than 50 buildings on a 176 acre site. The main building resembles a silver doughnut with 1.1 million square feet of space. It has eight inches of blast cladding in the outer walls.

It is also a "green" building. Each office chair is made of from 36 large, recycled plastic soft drink bottles. Desks and tables are 90 percent recycled wood. Steel items are 30 percent recycled metal. The building houses 5,200 workers.

GCHQ Recruited Linguists Fluent in Various Languages
Albanian
Amharic
other Albanian languages
Arabic
Azeri
Baluchi
Basque
Bengali
Brahui
Bulgarian
Chechen
Chinese
Dari
Georgian
Greek
Gujerati
Hindi
Indonesian
Japanese
Kashmiri
Kazakh
Korean
Krudish-Sorani
Macedonian
Malay
Mirpuri
Nepali
Papiamento
Pashto
Patois/Creoles
Persian
Polish
Potohari
Punjabi
Romanian
Serb-Croat
Shona
Somali
Swahili
Tamil
Turkish
Ukrainian
Urdu
Uzbek
Vietnamese

MI5
MI5 is U.K.'s security service, much like the U.S.'s FBI. It uses GCHQ intercepts to monitor 200 domestic extremist groups and 2,000 individuals.

NSA on 9/11
On 9/11, after the second plane hit a World Trade Center tower, the Director NSA cleared the NSA headquarters in Ft. Meade of all non-essential personnel. When a third plane hit the Pentagon, Hayden ordered all 4,000 essential personnel to leave the building. At the time, it was unknown if NSA headquarters was also a terrorist target.

White House Situation Room
This room is one flight down from the Oval Office.

White House Presidential Emergency Operations Center
This center is in a tube-like bunker beneath the East Wing.

NSA Complex
The complex in Fort Meade, Maryland, has 50 buildings with seven million square feet.

National Security Operations Center (NSOC)
This is NSA's war room.

NSA TV Show
NSA has a top secret/codeword closed circuit TV show, "Talk NSA," which updates authorized personnel on the latest world events that affect NSA.

Total Information Awareness (TIA)
This is a project to collect data from public, private, and government databases, both domestic and foreign, including
bookstore visits
online purchases
gas station usage
web searches
web sites visited
parking receipts
credit card purchases
magazine subscriptions
prescriptions filled
emails sent and received
bank transactions
trips booked
events attended
stock transactions
bank transactions
foreign military secrets
foreign diplomatic secrets
events attended
all other collectible information

TIA is designed to vacuum everyone's digital trail and feed it into super computers that run algorithms against it to determine possible terrorist activity. Research for this $200 million project was done by Booz Allen Hamilton, Raytheon, Hicks Associates, Cornell University, Columbia University, and the University of California at Berkeley. In 2002 retired admiral John Poindexter was selected to run this Defense Advanced Research Project Agency (DARPA)-funded program. Subsequent to this assignment, as a result of the Iran Contra affair, Poindexter had received five felony counts for lying to Congress, destroying official documents, and obstructing justice. In August 2002 Poindexter resigned from the project following a New York Times column written by William Safire that leaked information regarding this project.
In 2003 Congress forced DARPA to cease funding the project. TIA was transferred from DARPA to NSA which took it black.

The following information regarding TIA is from an article in the February 2012 issue of Wired magazine, page 78, by James Bamford.
Operation Stellar Wind To support its TIA effort, in 2012 NSA was building a large, $2 billion data warehouse at Camp Williams, a National Guard training site in Bluffdale, Utah. The warehouse is to be called "Utah Data Center" to be used to intercept, decipher, analyze, and store intercepts from domestic and foreign sources, and was to be operational by September 2013.

Background on NSA
NSA was established following the Pearl Harbor attack on 7 December 1941 to gather intelligence to prevent another surprise attack.

In the mid-1970s, due to its involvement in Watergate and the spying on antiwar protesters, the NSA budget was scaled back and Congress prohibited NSA from collecting information on US citizens, effectively crippling the organization, causing it to fall short of the goal of recognizing future attacks:
first World Trade Center bombing
detonation of US Embassys in East Africa
attack on the USS Cole in Yemen
destruction of the World Trade Center on 9 September 2001
attempted attack by the Shoe Bomber
attempted attack by the Underwear Bomber on a flight to Detroit in 2009
attempted car bombing of Times Square, New York in 2010

Data Volume
According to Cisco, the volume of data to be collected at the Utah Data Center will quadruple from 2010 to 2015, reaching 966 exabytes per year. Eric Schmidt, Google's former CEO estimated that the total of all human knowledge created from the dawn of man to 2003 was 5 exabytes. In 2011, more than 2 billion of the world's 7 billion people were connected to the Internet. IDC, a market research firm, estimated that there will be 2.7 billion Internet users by 2015.

It is estimated that there are approximately 1.5 billion domestic phone calls each day. Every call is collected and stored. (The telecoms will not comment on national security matters).

The problem for NSA is to collect and store 20 terabytes of intercepts each minute.

Invisible Web
NSA is particularly interested in the "Invisible Web," also known as the "Deep Web" or "Deepnet," that contains data out of public reach and consisting of password-protected data containing US and foreign government communications, reports, and databases.

Data Collection
Data is collected and when the Utah Data Center is completed, it will be sent from secret rooms in approximately 20 US telecom facilities, including those of phone companies and cable and satellite internet providers. The rooms are in large, windowless buildings called "switches" because they have the electronics to connect calling parties with the person(s) they wish to reach, or in the case of internet providers, all computer communications over the Internet.

In the pre-solid-state electronics era, the phone company buildings contained mechanical, electromagnetically operated switches that made a clicking noise. Now, the switches are all solid-state and very quiet.

NSA also taps into AT&T's powerful earth stations, satellite transceivers that use huge, 105-foot diameter dishes located in remote areas such as Roaring Creek in Catawissa, Pennsylvania. These satellite communications facilities handle much of the communication between the US and Europe and the Middle East. In Salt Creek, in Arbuckle, California the dishes handle communications to and from the Pacific Rim and Asia.

In the secret rooms, NSA taps into US communication networks to record all transmissions, domestic and international, including voice, data, email, Internet searches, etc. When completed, captured data will be sent to the Utah Data Center from the following sites:
NSA Georgia at Fort Gordon, Augusta, Georgia
NSA Texas at Lackland Air Force Base, San Antonio, Texas
NSA Hawaii, Oahu
Domestic NSA listening posts
Overseas listening posts
Satellite communications captured by the Aerospace Data Facility at Buckley Air Force Base, Aurora, Colorado

NSA also collects the domestic and international billing records from the telecoms. As of 2007, AT&T had more than 2.8 trillion records housed in its database in its Florham Park, New Jersey complex.

To allow this collection to occur, unhindered by a requirement for a court order, Congress passed the Foreign Intelligence Surveillance Act (FISA) Amendments Act of 2008 which made intercepts legal and allowed telecoms that agreed to allow NSA to tap into their communications, immune from prosecution and lawsuits.

Processing the Collected Data
To process the huge amount of data that is in the Georgia repository and will be contained in the Utah facility, NSA runs remotely-controlled software provided by Boeing subsidiary Narus from NSA headquarters in Fort Meade, Maryland. This software looks for
who called whom in the US and around the world
target addresses
locations
countries
phone numbers
names on watch-lists (approximately a million people)
keywords and key phrases

EncryptionEncryption Name Abbr. Started
in Obsolete
by Strength
in bits
Data Encryption
Standard DES 1976 2001 56
Advanced Encryption
Standard AES 2001 Not as
of 2012 128
Advanced Encryption
Standard AES 2001 Not as
of 2012 192
Advanced Encryption
Standard AES 2001 Not as
of 2012 256



A "brute-force," trial and error method of breaking 128 bit encryption could require 340 undecillion (340 x 10 to the 36 power) attempts.

To break open encrypted files, in 2004, NSA began building a secret super-computer facility in Oak Ridge, Tennessee, called the "High Productivity Computing Systems" program, in partnership with the Department of Energy (DOE). The high-speed computers would be part of the DOE's "Oak Ridge Leadership Computing Facility" to be shared by multiple agencies. There are two tracks for the program:
one project is an unclassified computer for public scientific work.
the other computer project is classified, to be used by NSA for code-breaking. NSA would take encrypted messages from the Utah Data Center and use algorithms in their classified super computers to break the code. The NSA side of the house is called the "Multiprogram Research Facility (or Building S300), a $41 million, five-story structure, completed in 2006.

super Computer Project Results as of early 2012:
Unclassified computer
Cray XT4 upgraded to a warehouse-size XT5, called Jaguar, running at 1.75 petaflops (1,750,000,000,000,000 or 1.75x10 to the 15 power floating point operations per second), the world's fastest computer in 2009.
By late 2011, the unclassified XT5 had been upgraded to run at 2.33 petaflops, and was the third fastest in the world.
By 2013, Cray expects the unclassified XT5 will be upgraded to the XT6, named "Titan," running at between 10 and 20 petaflops.
NSA's top-secret computer
It is even faster than the Cray XT5 due to a "breakthrough", and modified specifically for cryptanalysis. Its speed has not been publicized.
Cray has a $250 million contract with the Defense Advanced Research Projects Agency (DARPA) to build a massively parallel supercomputer for NSA, called "Cascade," a prototype of which was expected to be completed by the end of 2012.
The NSA computer in Oak Ridge will use about 200 megawatts, enough electricity to operate 200,000 homes.
Cooling the computer will require 60,000 tons of cooling equipment, about the same amount of cooling used to cool the two World Trade Center towers.
Japan's "K Computer" runs at 10.51 petaflops.
China's Tianhe-1A supercomputer runs at 2.57 petaflops.

End of information from the TIA article in the February 2012 issue of Wired magazine, page 78, by James Bamford.

Supercomputer "Breakthrough"
The February 2010 issue of Wired magazine reported on page 25, in "Jargon Watch" by Nishant Choksi, that the first nano-scale laser, called a "Spaser," produces light using surface plasmons instead of photons. A spaser is small enough to fit on a computer chip, and could be the architecture for an optical computer that could run at tremendous speeds. It is possible that the "breakthrough" noted above in the NSA supercomputer description, might be using this methodology.

Evidence Extraction and Link Discovery (EELD)
This project was designed to find links between people, organizations, places, and things. Super computers run that data against algorithms to find possible terrorists.

Scalable Social Network Analysis (SSNA)
This program analyzes of a person's everyday activities such as phone calls, ATM withdrawals, meetings attended, etc.

Activity, Recognition, Monitoring (ARM)
This project captures human activities in surveillance environments (e.g. where cameras are located) to monitor how people act and behave. Part of this project was to develop and install hidden cameras is key locations, worldwide.

NSA Staffing
1990: 20,000
2000: 15,000 (due to downsizing because Congress didn't consider that intercepts were valuable).
2004: 18,000
Eavesdropping Kits
Eavesdropping kits that fit into a suitcase were developed for use in the Middle East to track low-frequency radio transmissions.

Special Collection Programs
These programs are designed to enhance communication intercepts:
Operation Shamrock
Operation Minaret
Operation [name of operation is currently secret]. It was launched 6 October 2001.
Highlander, a top secret program, eavesdropped on Inmarsat satellite communications in the Middle East.

Do Not Fly List
After 9/11, the Do Not Fly List ballooned from about 20 people to more than 40,000. Many of these were generated by NSA's warrantless call scanning.

NSA Language Analysts
Arabic and Farsi linguists were activated after 9/11. Some military reservists, who had learned Arabic at an 18 month course offered at the Defense Language Institute at the Presidio of Monterey in California, were assigned to the 345th Military Intelligence Battalion in Georgia.
Targets of NSA Georgia included communications from North Africa to most of the Middle East, including Israel. Linguist subgroups analyzed communications in Syria, the Levantine Mission (Lebanon and Jordan), North Africa Mission (Egypt, Sudan, and Algeria), and the Iraqi mission.
In the late 1990s, NSA Georgia employed 1200 personnel. Following 9/11, that number doubled to more than 2400. Linguist contractors such as Titan supplied several dozen linguists. In addition, advertisements were placed in several newspapers. By late 2004, conditions in Georgia were crowded and technicians worked in hallways and temporary trailers. The 201st Military Intelligence Battalion specialized in signals intelligence (sigint).

NSA analysts target satellite, cell phone, internet, and undersea cable communications. Languages intercepted include Tajik, Uzbek, Russian, and Chinese. If an intercept was in an uncommon language, NSA Georgia would call NSA headquarters in Ft. Meade, Maryland to request a linguist who could translate it. The location of a call could be triangulated to get the location of the phones. Eventually, the system was able to collect specific phone numbers at each end of a conversation.

-- NSA Operational Centers
By early 2001, there was no state-run enemy, and NSA was looking for a mission and downsizing by one third. After 9/11 the NSA budget ballooned as the agency began to upgrade its systems. The upgrade focus was on migrating away from various foreign intercept stations to analytical teams using supercomputers at the four secret eavesdropping locations in Georgia, Texas, Colorado, and Hawaii. Three of the four operational centers target separate areas of the globe. The fourth facility downloads satellite data and transmits it to the other three intercept sites. The results of these eavesdropping activities are reduced to the important messages and the key information is forwarded to military commanders and other recipients around the world, including members of Five Eyes. By the time the 2004 Iraqi war began, the intercept system was very efficient.

Fort Meade, Maryland. The NSA headquarters in Fort Meade, Maryland has a reflective glass exterior. Behind the glass is copper shielding to prevent electromagnetic radiation from getting out of the building. The code name for this shielding is Tempest. The windows in the building have thin copper wires running through them. To prevent lasers from picking up voice from vibrations in the glass, music is played between the glass panes. After 9/11 the NSA budget ballooned as the agency began to upgrade its systems. The upgrade focus was on migrating away from various foreign intercept stations to analytical teams using supercomputers at the four secret eavesdropping locations in Georgia, Texas, Colorado, and Hawaii. Three of the four operational centers target separate areas of the globe. The fourth facility downloads satellite data and transmits it to the other three intercept sites.

The results of these eavesdropping activities are reduced to the important messages and the key information is forwarded to military commanders and other recipients around the world, including members of Five Eyes. By the time the 2004 Iraqi war began, the intercept system was very efficient.

-- Remote Satellite Intercepts
The remote satellite intercept facility at Cam Doha, Kuwait is located in the spot beam of Inmarsat satellite I-3 F1, launched in 1996 to cover the Middle East and Indian Ocean. The intercept antenna is a mobile array known as a Trojan Remote Receiver-38 (TRR-38). It was staffed by a manager and five intercept experts who intercept both sides of conversations and put them together before relaying these intercepted conversations, called "cuts," in near-real-time to NSA Georgia for analysis.

In Georgia, the intercepts are queued up in super computers until a voice analyst can listen to them. The analysis occurs about five minutes after the actual conversation takes place.

At the end of the cold war in 1990, NSA closed many listening posts around the world and replaced them with smaller, remotely operated facilities. The intercept operators and analysts were moved back to the U.S. and consolidated in the four large operational centers. The reason that NSA had to decentralize their analysis function away from Fort Meade, Maryland is because the massive computers needed to provide intercept and analysis support require more power than the grid can supply at one, centralized location. NSA was unable to unable to install two new super computers in the Tordella building in Fort Meade, Maryland because Baltimore Gas and Electric Company could not supply enough power to the site. The Tordella building currently uses the equivalent of half the power that the city of Annapolis, Maryland consumes. The building has an 8,000 ton chilled water plant to keep the computers cool. The four decentralized NSA computer and analysis centers are:
Georgia - eavesdrops on the Middle East and North Africa. Ground was broken for this NSA analysis facility in northern Georgia, near Leburda, on 26 March 2007. It cost more than $1 billion and is scheduled to be completed in 2012. The construction project is code named Sweet Tea. When completed, the Georgia facility will employ 4,000 workers. It will be second in size only to NSA's Fort Meade, Maryland headquarters. A new computer system to be installed at this site is being developed by IBM and the C4 Systems Division of General Dynamics. The secure computer system is known as the Sectera Edge and will be able to handle top secret voice communications and email. It will be able to handle web access at the secret level and below. For example, the computer system will search for key words spoken on telephones and when it gets a "hit," it will transfer the conversation to an analyst who will determine the nature of the conversation and decide if authorities should be alerted. In a phone conversation in early 2009, a person on one end of the line began a verbal diatribe against the President. Approximately ten minutes later, he said someone was at the door and he would have to hang up and call back. When he called back, about five minutes later, he said a strange thing had happened. When he answered the door, a police woman was at the door. She asked to step into the person's apartment, and he allowed her to enter. She quickly looked around the rooms and then departed. The person called back and related this event to the person he called. After that, the person he called changed the subject each time the caller began a diatribe against the President. This facility in Georgia is designed to filter millions of domestic and international phone conversations and emails each hour. This facility will have the world's largest collection of supercomputers.

Texas - eavesdrops on Central and South America and the Caribbean from Lackland Air Force Base in San Antonio, Texas. To hold large quantities of data, NSA built a massive data warehouse in San Antonio, with 470,000 square feet of space, costing $130 million. The data warehouse stores conversations of persons on a watch list which contains names of people, foreign and domestic, who are believed to pose a threat to the United States. The watch list once contained 20 names. It now has 500,000 names.

Colorado - the Denver Security Operations Center (DSOC) on Buckley Air Force Base will be expanded. Four radomes receive intercepts from eavesdropping satellites. One system is a microwave only system called Vortex or Mercury. A multi-frequency system is called Magnum or Orion. A system consists of a satellite, a radome receiver, and associated electronics and infrastructure. The two geostationary satellites are so large that each one had to be launched by the powerful Titan IV booster. The take from these two satellites is analyzed by the Aerospace Data Facility (ADF).

Hawaii - eavesdrops on Asia and the Pacific. It is about 15 miles from Honolulu on the island of Oahu. On 30 August 2007 ground was broken for a new NSA eavesdropping facility in Wahiawa. The site is the former location of the "Elephant Cage," a large, circular antenna for eavesdropping on the Pacific.

California - Satellite intercepts are prioritized 1 through 9, as follows:
Terrorists = 1. After 9/11, terrorists nearly eliminated their use of satellite phones.
Non-governmental organizations (NGO), which include the Red Cross and businesses, are prioritized 5 through 7.
Journalists = 7.
Intercepts with no linguist to translate them = 8.
Unidentified intercepts = 9.
Originally, intercept analysts did not listen to Americans because it was illegal by the Fourth Amendment. After 9/11, the Patriot Act removed all intercept constraints. (See Communications Satellites).

Microsoft and NSA
On 30 July 2007, Microsoft broke ground in San Antonio, Texas for a large complex that will handles 280 million Hotmail customers and 8 billion email messages per day. Microsoft says that this center is where the Internet lives. The center went live in 2008. It is a mirror image of the Microsoft data center in Quincy, Washington. The facility will have tens of thousands of servers. In the event of a power failure, batteries will automatically provide power for 18 seconds between the power loss and when the backup generators come up to speed to take over. The new center is located in a former Sony chip manufacturing plant. It is believed that secret agreements between NSA and Microsoft have been made to send all communications that flow through this facility to NSA.

NSA Special Communications
Cobra Focus/ This is an NSA Georgia operation that provides sigint support to ground forces in Iraq. (See sigint.)

Zircon
This is a method of making sigint available to battlefield commanders immediately using an instant messaging system.

Klieg Light (KL)
This is the designation for high-priority reports.

Critic Message
This type of message contains critical intelligence of highest importance. Normally, critic messages are sent directly to the National Command Authority (NCA). The NCA is the President and the Secretary of Defense. A critic message is supposed to reach the desk of the President within five minutes of receipt.

Intelligence Collection Types
Sigint
This is the acronym for Signals Intelligence. It refers to the collection of communication transmissions from satellite, cellular, cable, microwave, and other sources. Sigint collection can be made by a remote ground facility receiver, an airborne listening post, a satellite receiver, and by many other means. Unencrypted, uncompressed messages in English are the easiest to analyze. Modern military communications can be encrypted and sent in burst mode where the communication is highly compressed so that it sounds like a single "beep." NSA and CIA must uncompress the signal, unencrypt it, translate it if it is in a foreign language, analyze it, and then, depending on the content, transfer it to the entity that needs that information.

Electronic emissions from business machines can sometimes be sensed. For example, when each letter of certain-types of printers is activated to type the letter, a small, electronic pulse is emitted that can be picked up by a sensitive receiver. Each letter emits a slightly different pulse enabling a receiver to "read" the data as it is being printed. This phenomenon was first identified with electric typewriters and later, impact-type computer printers. To prevent electronic impulses from leaving its buildings, NSA windows are double-paned with wires embedded in at least one of the panes to prevent electronic signals from leaving the building.

One terrorist suspected to be the mastermind of the attack on the USS Cole destroyer carried six satellite phones, each with multiple memory cards so that he could change the phone number of a phone in order to not be identified on a terrorist phone number list. NSA had determined a few of his phone numbers. The system had an alarm that would sound when if a call from one of those numbers was intercepted. Using GPS coordinates, his location was found. On November 3, 2002, NSA alerted the CIA and its Drone Command Center directed a Predator Unpiloted Air Vehicle (UAV) to the location where it was commanded to shoot a Hellfire missile at a car where the terrorist was riding, an event widely reported by the media. See Eavesdropping Kits, Special Collection Programs, and Remote Satellite Intercepts.

Humint
This is the acronym for Human Intelligence. Generally, it refers to persons on the ground in a foreign country who collect intelligence information and pass it on to NSA and/or CIA. Domestic humint is provided by the FBI.

Elint
This is the acronym for Electronic Intelligence. Elint is gathered by radio and radar receivers, ground-based or by aircraft. Aircraft collection is usually accomplished by an aircraft that flies close to the border of the target country to get that country to turn on (light up) its search and tracking radars. The receivers in the plane collect frequency data, transmitter locations, time transmitters were turned on, sequence of various sites going active, etc. This information is used by the military to eliminate these transmitters so that in the event of a conflict, they can be eliminated, effectively "blinding" that country. These methods were used in the 2004 Iraq War to enable targeting radar sites just prior to the air attack.

Volint
Voice Intelligence is received directly from a speaker. The information may be simply heard and remembered by an agent.

There are also electronic means of voice collection, as follows:
Wired person - When it is obtained by a person wearing a recording device, that person is said to be "wired." An agent may be wired with a listening device or a device may be clandestinely planted in a target's luggage, clothing, watch, or jewelry.
Bug Device - Voice intelligence can also be collected by a "bug" installed in a key location that either stores conversations internally or broadcasts them to a remote receiver, either in real-time or at a specified time. Depending on the sophistication of the bug, the data can be encrypted and/or compressed and sent in burst mode.

Laser Reflection - Conversations can also be collected by beaming a laser at the outside surface of window to pick up voices in that room. When a person speaks, vibrations of his voice cause the glass to vibrate. A laser can sense these vibrations and electronic equipment can translate the vibrations into sound, much the way a traditional entertainment system speaker reproduced sound. To thwart laser listening from the outside of its buildings, NSA designates internal rooms that do not have windows to be used for classified conversations. In addition, outer windows are slanted slightly upward to reflect into space any laser beams that might be aimed at them.

National Command Authority (NCA) The NCA consists of two persons: the President and the Secretary of Defense.

Communications Satellites
Inmarsat - This satellite, I-3 F1, was launched in 1996 to cover the Middle East and the Indian Ocean.
Thuraya - This Arab communication satellite, built by Boeing and launched in October 2000, is owned by a company in the United Arab Emirates (UAE).

Encryption
Many satellite communications use encryption greater than 256 bits which takes longer to unencrypt, even using super computers.

Blue Phones
These satellites used small, blue phones that had GPS inside them which NSA was able to use to ascertain their location within a 100 meter radius. (See Remote Satellite Intercepts).

Coded Intercepts at beginning of Second Iraqi War
Some intercepts were coded at the beginning of the second Iraqi war. They consisted of a person reading a long series of numbers and letters. These messages were sent from NSA Georgia to NSA at Fort Meade, Maryland to be deciphered. The decoded message was sent back to Georgia without the key, so NSA Georgia had to send all coded messages of this type to Fort Meade.

Software Intercepted Call Analysis Tools
PatternTracker
Call Chaining Analysis - this is the process of locating of intercepted callers at both ends of a conversation using a software program called PatternTracker written by i2, Inc. in McLean, Virginia.
Agility
AMHS
Anchory
ArcView
FastScope
HighTime
HomBase
IntelLink
Octave
Document Management Center
DishFire
Crest
Anwale
Coastline
Snacks
Cadence
Gamut
Mainway
Marina
Oasis
PuzzleCube
Surrey
Tuningfork
Xkeyscore
Unified Tasking Tool
Address Database - This database is known as "externals" which contains addresses of intercepted calls. The database consists of:
Externals Data Global Exploitation (EDGE) database
External Notation List. Communications Externals Data Repository and Integration Center

Viper
At the beginning of the Iraqi occupation, NSA set up a large antenna farm in the Green Zone, a program code-named Viper, to target cell phones in Baghdad and the surrounding area. Intercepts were collected in one of NSA's four buildings. The intercepts were then transmitted to NSA offices in the Green Zone and NSA Georgia.

Turbulence
This is a program designed to try new ways of making computers help solve international problems such as network attacks.

FLOP
A "FLOP" is a floating point operation. It is a measure of computer speed. The more FLOPs a computer can perform in a second, the faster it is.

Computer Speeds
1971 - CDC 7600 broke the megaflop barrier (1 million floating point operations in one second).
1976 - Cray-1 was built in Cray Research plant in Chippewa Falls, Wisconsin. NSA bought the Cray-1 and a second Cray-1.
1986 - Cray-2 broke the gigaflop limit.
1997 - Intel's ASCI Red broke the teraflop limit (one trillion flops per second - 1,000,000,000,000 floating point operations per second).
1998 - Cray went broke and was purchased by Silicon Graphics, Inc. (SGI).
1999 - NSA funded SGI's Cray SV2 program to develop a new super computer. This followed the realization by NSA that massively parallel computers may not be as efficient as super computers. The peak speed of the Cray SV2 is expected to be in the tens of teraflops (more than ten trillion floating point operations per second).
2000 - SGI gave up on the Cray SV2 project and sold Cray Research to Seattle-based Tera Computer. The Cray SV2 became the Cray X1 with 4,096 processors. In a sense, computers had come full circle, back to massively parallel processors.
2001 - NSA provided specifications for Black Widow, a large Cray computer consisting of 16 black cabinets with a splash of red.
2003 - NSA paid $17.5 million for the Black Widow computer which could run at hundreds of teraflops (trillions of flops) per second (perhaps 2x10 to the 14 power - 200,000,000,000,000 - floating point operations per second). The Black Widow was also known as a Cray XT5h and has 32,000 processors. It was installed at NSA Fort Meade in 2008.
2008 - A military super computer, Roadrunner, broke the petaflop limit (1x10 to the 15 power flops per second). Roadrunner was built by IBM at the Los Alamos National Laboratories in New Mexico. As of 2008, NSA had a Roadrunner on order. The computer uses 3 megawatts of power, about as much as a large shopping mall. Roadrunner does 1.026 quadrillion calculations per second.
2010 - NSA expects the Cray X-3, also known as Cascade, to break the petaflop barrier - more than one quadrillion calculations per second. The computer will cost more than $250 million.
2018 - NSA says that by 2018 it will need a computer that will run at exaflop speed (one quintillion calculations per second). To build this computer for NSA and the Department of Energy (DOE), a new computer research center was established in 2008, known as the institute for advanced Architecture run by Sandia Laboratories and Oak Ridge National Laboratories, Tennessee. Such a computer might require 100 megawatts of power, the output of an entire power plant. One challenge is to reduce the power requirements of such a computer.

Processing Speeds
Kiloflop (1,000 or 1x10 to the 3 power)
Megaflop (1,000,000 or 1x10 to the 6 power)
Gigaflop (1,000,000,000 or 1x10 to the 9 power)
Teraflop (1,000,000,000,000 or 1x10 to the 12 power)
Petaflop (1,000,000,000,000,000 or 1x10 to the 15 power)
Exaflop (1,000,000,000,000,000,000 or 1x10 to the 18 power)
Zettaflop (billion trillion - 1,000,000,000,000,000,000,000 or 1x10 to the 21 power)
Yottaflop (trillion trillion) - 1,000,000,000,000,000,000,000,000 or 1x10 to the 24 power)
Undecillion (1x10 to the 36 power)
no words have been invented to describe speeds beyond Undecillion.

Flophouse
The "Flophouse" is NSA's Computer Facility.

In the 1990s, a move was begun at NSA to move from supercomputers to massively parallel computers with 1,000 or more processors. However, it was found that parallel computers don't work as well as a super vector computer for code-breaking.

Joint Special Operations Command (JSOC)
This command used intercepts to target sites in Iraq to be bombed. NSA rewired Iraq's land line communication infrastructure to provide intercept taps.

Tapping Fiber Optic Cable
In 1996, AT&T research labs in Florham Park, New Jersey developed a method of tapping fiber optic cable passively, called PacketScope. The Bridgeton, Missouri network operations center, and others, was chosen to do the tap. Bridgeton is AT&T's Worldwide Technical Command Center for domestic and international traffic.

Another tap location chosen was the Worldnet Router Center in New York City where domestic and international cables converge. The tap is on T3 (high-speed cable) links. A third tap was placed at AT&T Labs in Florham Park, New Jersey and in San Francisco.

Following 9/11, NSA garnered the cooperation of nearly all telecoms to monitor their traffic. Data picked off at the taps by PacketScope flowed directly to NSA.

Telecom Hubs with PacketScope Taps
AT&T: Bridgeton, Missouri
Qwest: Denver, Colorado
Sprint: St. Louis, Missouri
Vonage: Norway

National Security Agency Advisory Board (NSAAB)
This board consists of top company executives who study certain NSA programs and make recommendations based on their experience and knowledge.

Communication Assistance for Law Enforcement Act (CALEA)
This is a Federal Statute that provides assistance to NSA and law enforcement organizations for tapping communications facilities.

Death of the Foreign Intelligence Surveillance Act (FISA)
In 2002 the Bush administration allowed warrantless surveillance (surveillance without a FISA warrant).

NSA Intercept Volume
The NSA receives 650 million intercepts each day.

NSA Dictionaries
NSA dictionaries consist of phone numbers, names addresses, words, and phrases. These dictionaries are used to match intercept information in the search for intelligence relating to illegal activities and terrorism.

==== NOT MENTIONED ABOVE ====

By early 1990's NSA creates GPS Clandestine Tracking Chips to insert into asset and targeted phones. NSA Lobbies Congress to implement an RFID National Intelligence Tracking ID card for all US Citizens. This does not pass as this constitutes civil rights violations. NSA turns around and creates moving map technology and GIVES THIS TECHNOLOGY AWAY TO PHONE MANUFACTURERS. If they can't get their RFID bill passed they will end run congress and give away moving map technology software so as to be able to track - EVERYONE -

NSA USAP Signal Technology. The NSA employs the only secure undetectable Longitudinal Wave communications technology. They have the only equipment which can transmit and receive LW Mode Signals. They alone are able to transmit data faster than light speed so that their network does not rely upon slow fiber optics.

Their are many more examples of USAP technology which the NSA employs which I will not go into at present. The companies that manufacture such technologies are private companies which are TAX EXEMPT. THEY ARE NOT AUDITABLE BECAUSE THEY CANNOT HAVE A PAPER TRAIL. These are criminal companies who are above the law. It is unknown exactly how many companies their are but when you look at the number of people who are Uber wealthy that becomes a short list.

--

NSA Domestic Spying Continues Under Obama
on April 25, 2012

NSA Whistleblower Makes Explosive Disclosures

(Washington, DC) – On Monday, National Security Agency (NSA) whistleblower and Government Accountability Project (GAP) client William Binney continued publicly revealing massive domestic surveillance beginning under President George W. Bush in the aftermath of 9/11, and continuing rampantly under President Obama.

A senior crypto-mathematician, Binney served at NSA for over forty years, lastly as the Technical Director of the NSA World Geopolitical and Military Analysis Reporting group, made up of thousands of NSA employees charged with analyzing massive volumes of electronic data gathered worldwide. Today, on the day of the annual Ridenhour Prizes that celebrate whistleblowers and truth-telling in the public interest, GAP is lauding Binney for courageously taking a stand and continuing to blow the whistle on NSA’s unconstitutional domestic surveillance.

http://www.whistleblower.org/press/pres ... nder-obama
--

Now.. Mix all of this with ED's / TED's.. and what do we have ? Do you see the connection to the need to know "Their Enemy" ? We have become the enemy by virtue of our rejecting the NWO... and being children of the LIGHT !


_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Fri Jul 13, 2012 12:14 pm
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
=== Deep Underground Military Base - Update ===








_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Fri Jul 13, 2012 3:05 pm
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012


This comes from a need which we all feel..

_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Fri Jul 13, 2012 3:34 pm
Profile
GT Truther
User avatar

Joined: Mon Aug 25, 2008 4:58 pm
Posts: 1195
Location: The Golden State
Post Re: The Golden Thread, Volume 6.3 2012
=== The Unified Field Theory - Transdimensionalism ===

There is a method to my madness. I know it was a circuitous path to bring to this point. Transmatter and Transdimensional Beings, is their a connection ? Are they both transluminal ? No.. and Yes.. Transdimensional beings are Extra Dimensional or outside of time but can also occupy time and space. Are their Non Extra Dimensional Beings that live outside our time line ? Yes.. This is why there is a Yes and no..

Lets first take the case of the Transluminal / Transitive Being. This is one who has the technology to manipulate time and space to become superluminal without moving. How can someone do this ? It is not a question of how far one moves, it is a question of the technology to move ones particles faster than light speed. It is just technology. It is used as a method to cloak ones existence as it puts one in a time reversed frame which is one dimensional to the observer. In other words they are there but,... they are there before you can observe them. TED's on the other hand are beings which do not use that technology but a technology which defy's any explanation as it is paradoxical. It defies causality. Yet TED's exist. This is why Einstein was wrong in regards to Special Relativity. He did not know what I am sharing with you for the very first time in history. Einstein said nothing could go faster than light because of the paradoxical problems in causality.

What does this mean to Unified Field Theory.. It says that we can devise a UFT but, we have to find a way to observe what transpires at the event horizon. Why are their nonlinearities at the event horizon ? What is at the event horizon ? If all time stops we are at / on the event horizon. It is the plane where no time exists. It is an extra dimensional plane. Are their higher and low planes. Yes. But for the sake of brevity I will tell you about our event horizon or light speed as it were. If time stops, then if I were to move from one point to another, it would take no time. So.. all points become one.. Science doesn't like this as it defies explanation. It also says that all energy converges to a single point.. or does it. Is the event horizon something other than what we believe it is. Is their a problem with relativity and the points of all observables. yes. There is a great big problem.. Imagine that point is not a point at all but a circle. Now and only now we have a way to see what the event horizon is. It could be a small circle or a large circle all connected it become as sphere within a sphere within a sphere. It seems paradoxical but it isn't.

Because of the discovery of Dr Richard Gautier and his mapping of the electron as a transluminal particle where this particle comes into the observable plane and then briefly exits.. Does it really exit.. No.. It merely move from one time reference to another. It moves along the sphere from one place to another. This my friends is the being of quantum engineering. It is the beginning of understanding how to use the local event horizon which is in everything and all around us. It is how TED's are able to move from one dimension into another. It is a technology which the PTB's do not want to share because it means that they loose total control.

Is their a UFT in our future.. Yes.. Our future is bright.. IF.. We get these vampires off our backs..

:candle :candle :candle

_________________
-- PhaTz..

The Truth... Is for those who are bold enough to learn it, knowledgeable enough to accept it, stand not in judgment of it and are not predisposed to add
boundaries to it..


Fri Jul 13, 2012 4:08 pm
Profile
GT Truther
User avatar

Joined: Sun May 03, 2009 11:57 pm
Posts: 1561
Post Re: The Golden Thread, Volume 6.3 2012
I saw something very strange yesterday that I just can't get off my mind. I was driving, at a red light. It was a beautiful day, 78 degrees - very warm. Seattle is humid so I can say it was HOT to me. I was wearing a T-shirt and with no AC in the car I had the windows down, I could feel beads of sweat forming below my bra line and in the cleavage area. My son was in the car with me - he pointed across to the sidewalk to 3 odd people.

First, it was right here by this "car lot":
http://goo.gl/maps/kfTl
NOTE THERE IS SOME WEIRD ANOMALY IN THE MAP IMAGE. THE PEOPLE WERE RIGHT BELOW THE STRANGE FUZZYNESS ON THE SIDEWALK BELOW. The map anomaly adds to the uber strangeness of this.

The people were standing there in a circle talking to each other. Kind of moving up the street at the same time, looking at the cars, pointing then talking, taking 2-3 steps, talking again. It was their clothing that was so odd. For descriptive purposes only, they looked like they were maybe from India/Pakistan, had caucasion type features with dark skin than "whites" if that makes sense. They were ALL wearing long coats, long pants, hats and scarves around their necks -- like they were cold. I saw one had on a pair of gloves. I mean, these people had to be HOT HOT HOT. By long coats, I mean 2 of them had full length trench coats, and the third was wearing a knee-length white leather or faux-leather coat, with a big fur collar around the neck and down the lapel... The hats covered their entire head and ears, like stocking caps but they were fabric hats not stocking hats. I was very close to them.

The longer I looked the weirder I felt about it, and I still can't get it off my mind, but the light turned green and I left feeling pretty strange.

I have never seen anyone dress totally against the weather like that, except maybe kids. These were three male adults. I yelled over to them - about 15-18 feet across 2 empty lanes to the sidewalk, ..."HEY! Aren't You HOT?..." But I was ignored as if they didn't hear me. It was very strange almost like they were in different weather then the rest of us. Any idea why people would dress like this on a hot day?


Fri Jul 13, 2012 5:47 pm
Profile
GT Truther
User avatar

Joined: Tue Apr 20, 2010 9:31 pm
Posts: 2831
Location: Fennell bay N.S.W. (AUS)
Post Re: The Golden Thread, Volume 6.3 2012
Lynnwood wrote:
It was very strange almost like they were in different weather then the rest of us. Any idea why people would dress like this on a hot day?


It was either C.I.A. Agents or F.B.I. Agents they usually have RED Cell Phones. Creepy Huh?

_________________
I am a HIGHLY STRUNG PRIMA DONNA (atari)


Fri Jul 13, 2012 6:07 pm
Profile YIM
GT Truther
User avatar

Joined: Sun May 03, 2009 11:57 pm
Posts: 1561
Post Re: The Golden Thread, Volume 6.3 2012
Look at the map link Peter! It's getting weirder by the moment.

Phat, please slow down guy, I can barely keep up with you!


Fri Jul 13, 2012 6:14 pm
Profile
Display posts from previous:  Sort by  
Post new topic This topic is locked, you cannot edit posts or make further replies.  [ 916 posts ]  Go to page Previous  1 ... 31, 32, 33, 34, 35, 36, 37  Next


Who is online

Users browsing this forum: No registered users and 9 guests


You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot post attachments in this forum

Jump to:  
cron
Powered by phpBB © 2000, 2002, 2005, 2007 phpBB Group.
Designed by Vjacheslav Trushkin for Free Forums/DivisionCore.