Quantcast
Viewing all 43 articles
Browse latest View live

Snowden reveals HAARP’s Global Assassination Agenda

Snowden reveals HAARP’s Global Assassination Agenda

By Image may be NSFW.
Clik here to view.
Oliver Wilis

Image may be NSFW.
Clik here to view.
Snowden speaking from a Custom Faraday Cage in Sheremetyevo Airport’s Hotel Novotel (Photo: The Internet Chronicle)

Snowden speaking from a Custom Faraday Cage in Sheremetyevo Airport’s Hotel Novotel (Photo: The InternetChronicle)

 

 

MOSCOW, Russia – Edward Snowden, NSA whistleblower and fugitive, released documents Tuesday to Internet Chronicle reporters proving that the High Frequency Active Auroral Research Program, or HAARP, is definitively engaged in a program of assassination and mind control.

While the military prison industrial complex has routinely insisted that the Alaskan-based HAARP is only meant to study natural phenomena in earth’s ionosphere, Snowden has managed to blow open a brutally massive charade.

“The HAARP research station,” he said, “strategically based away from prying eyes near Gakona, Alaska, is actually used to terminate or manipulate would-be dissidents of global capitalism on the scale of millions of people.”

Added Snowden, using finger quotes, “With these terrestrial antennas, NATO [the North Atlantic Treaty Organization] is able to, on a global scale, remotely silence ‘perpetrators’ of ‘deviant or subversive’ strains of thought.”

Unbeknownst to victims or their loved ones, HAARP projects ultra-high-powered radio waves. Those waves operate at the same electronic frequency asthe truncus encephali, or brain stem, selectively inducing deaths seemingly by natural causes  – including by some appearing to coroners as innocuous as strokes or heart attacks.

http://www.chronicle.su/news/snowden-reveals-haarps-global-assassination-agenda/

https://italiaparla.wordpress.com/

http://projectmkultra.altervista.org/

http://mkultragruppolavoro.altervista.org/

http://www.europarl.europa.eu/sides/getDoc.do?pubRef=-//EP//TEXT+REPORT+A4-1999-0005+0+DOC+XML+V0//EN

http://www.un.org/News/Press/docs/2007/gacol3160.doc.htm

http://www.earthpulse.com

http://www.europarl.europa.eu/press/sdp/backg/en/1998/b980209.htm

http://www.publications.parliament.uk/pa/cm200102/cmhansrd/vo021017/debtext/21017-27.htm

http://targetedindividualscanada.wordpress.com/

http://www.freedomfchs.com/

http://www.iahf.com/nsa/20010214.html

http://www.youtube.com/watch?v=O_L-UFzNJws&feature=em-uploademail

http://www.klagemauer.tv/

http://www.youtube.com/user/klagemauerTV

http://www.youtube.com/user/ANTIZENSU...

http://www.dailymotion.com/ANTI-ZENSU...

http://www.panorama-film.ch/

http://anti-zensur.info/

http://s-und-g.info/


CONDROZ : STATE/GOVERNEMENT - ORGANIZED STALKING - ELECTRONIC HARASSMENT

BUZZ-SAW,CENSURE,CORRUPTION,VICTIMES: COMMUNITY TERRORISM en CONDROZ

http://gangstalkingbelgium.net/type/aside/

"Comme Vous 1e souhaitiez, j'en ai pris connaissance et j'ai également consulté tous les dossiers qui ont été ouverts a Votre nom depuis deux ans. Ils sont nombreux et concernent toujours cette problématique de GANG-STALKING. Je me dois d’être franche avec vous et de vous faire savoir que le Parquet ne peut vous suivre dans Vos affirmations et entamer des devoirs d’enquête; aucun indice concret d'infraction n'ayant été relevé. Ne croyez-vous pas que cette certitude d’être harcelé relève davantage d'un sentiment in traiter au niveau psychologique ? Je ne peux que vous conseiller d'aller  consulter un médecin et de lui exposer votre problématique. Il saura peut-être déjà vous apporter certaines réponses."

CHARLOTTE FOSSEUR, PROCUREUR FF DINANT

MADAME FOSSEUR,

LES CHOSES QUE J'AI ENVOYÉS SONT CONTENUES DS CETTE LETTRE LE RESTE EST FAUX:

http://fr.scribd.com/doc/133806106/Police-de-Ciney-Last-Mail-About-Local-Gang-Stalking-Belgium

Procureur-Dinant-Charlotte-Fosseur-et-gang-stalking-et-Benja-simon-26.358P-jt22.100P.pdf by BENJA SIMON

Police de Ciney Last Mail About Local Gang Stalking - Belgium by BENJA SIMON

 

J'AI DEMARCHE DE CETTE FACON UNIQUEMENT PARCE QUE LA POLICE DE CINEY M'A ISOLE DANS CETTE VOIE (tout bas..!).

SANS MEME VOULOIR ME DONNER UN RENDEZ-VOUS OU LE NOM D'UNE PERSONNE DE CONTACT.

ET CECI UN AN APRES M'AVOIR REFUSE MOULTE FOIS UN PREUVE DE DEMARCHE JUDICIAIRE SUITE AU DOSSIER QUE J'AI  REMIS.

CE PAPIER M'AURAIS EVITE DE VOUS FAIRE PERDRE VOTRE TEMPS ET D'EXPOSER CE COURRIER.

21 Janvier 2012

1 - http://www.scribd.com/doc/124898065/Madame­La­Procureur­Du­Roi­de­Dinant­Belgique­21­Janvier­Fax­Gang­Stalking­B­Simon

29 juillet 2012

2 - http://www.scribd.com/doc/102015551/Monsieur­Appart­Procureur­Du­Roi­Dinant­Gang­Stalking­Publique

15 fevrier 2013

3 - https://docs.google.com/file/d/0B-qPPBUqE7YjYWlqeFE3bGdnMTg/
4 - https://docs.google.com/file/d/0B-qPPBUqE7YjSGZ4TnJ1M2hDU1U/edit
5 - https://docs.google.com/file/d/0B-qPPBUqE7YjeUgwYjNFRDcxTlk/edit
6 - https://docs.google.com/file/d/0B-qPPBUqE7YjOVhrblJzc3NfRms/edit
7 - https://docs.google.com/file/d/0B-qPPBUqE7YjTzJyc3RPY3dmZnM/edit

Mes écrits sont controlés par Roberto Scaruffi....qui suit mon travail journalièrement depuis novembre 2011.

Roberto Scaruffi,Rio de Janeiro, RJ, Brazil

• Degree [“doctor”] in Political Sciences [major in Economics] from the University of Turin;
• EAP course by the Essex University (score 7 in IELTS);
• DEA by the UCL in LLN (Belgium);
• completed and finally [Spring 2002] academically perfect Ph.D. research by the UCL in LLN (Belgium) [[formal PhD still not awarded since an annihilation operation (an [failed] operation for producing State/“government” managed terrorism) of Italian Secret Police Bureaux with very active cooperation of NATO Secret Police Bureaux at world level; ask them... http://www.uclouvain.be ; http://www.carabinieri.it ; http://www.comiteri.be ; http://www.sicurezzanazionale.gov.it ; http://www.nato.int ; http://www.interpol.int ; information from here: http://scaruffi.blogspot.com ; the Ph.D. research is academically perfect and it is NOT failed!]];
• Chinese language classes by three universities in China [PRC] and Taiwan [RoC]

http://robertoscaruffi.blogspot.com

Je possède toute les preuves nécessaires pour l’annihilation de ce réseau depuis deux ans. La police de Ciney en rétentionne.

Les flics de la zone Condroz-Famenne et de la zone des Arches  ont participé à mon stalking depuis quatre ans via des faux documents (identifiés)  entre autre, parce qu'il sont hakés,
J'ai tout donné à Ciney en juillet il y a deux ans et ils on continué à me nuire malgré le dossier amplement suffisant à l'arrestation des ordures,

dont les preuves d'usurpation de mes voisins disponibles mais malgré tout réfutées et une accusation d'assassinat. Ils m'ont fait taire à chaque rencontre de manière dégueulasse et honteuse.

http://www.nazis.be


sewing my mouth shut

Image may be NSFW.
Clik here to view.
sewing my mouth - gang-stalking



Je suis maintenant sans argents et sans permisà cause de cette affaire et Je n'ai jamais pu être entendu.
La police m'a acculé

Au niveau physique, j'ai été détecté en chambre anéchoique par des spécialistes internationaux via une technique qu'ils ont spécialement élaborée dans le cadre de la lutte anti-terrorisme international

(Lars Drudgaard, Barrie Trower héros et ex agent spécial du MI5, Jesse Beltram, Dr Hall, ect). http://icaact.org/

Au niveaux informatique, notre réseau d'informateur et self-défenseur est bien implanté et ultra clean.Nous avons énormément ralenti et annihiler l’expansion de la peste. Nous avons les preuves nécessaires de notre hacking.

J'ai le droit de recevoir l'analyse de mon web et c'est urgent depuis longtemps,ce qui représente le découvert la NetOps et des perpétrators, je suis actif et logué sur la plupart des réseaux publics depuis trois ans et uniquement dans ce cadre , je me suis fait hacké et tracké sur chaque réseau et je le suis encore. Tout mes rapports d'erreurs de navigations ont été envoyés depuis toujours. J'ai des disques durs plantés et certainement REMPLIS DE TRACE D'ARMES A ÉNERGIE DIRIGÉE.

Computer Network Opération (CNO)  balancée avant le Bombing de Liège (ce qui à failli me coûter l'asile pr la troisième fois, malgré la recommandations du commissaire sortant, Pol Borlon).

http://gangstalkingbelgium.net/secret-poem/

JE SUIS BLOQUE. Nous sommes plein de victimes et nous avons des choses les uns pour les autres. Nous sommes tous hackés, traqués et isolés. Nos familles ne sont pas en sécurité. J'ai encore les assassins.

Mes moyens de communications sont toujours hackés.

J'avais une entreprise que j'ai monté seul avec l'aide de mon père...ces batards l'on liquidé alors que je fesait 90.000 euros de chiffre seul. Tout mes clients satisfait à 100 %. Je suis assuré.

J'ai gardé  une voiture qui porte sans doute des traces de sabotages à l'arme à énergie dirigée (eprom up-datée chez power plus). J'ai une panoplie de matériel détruits.

J'ai fait des mesures de radioactivité.

Je suis toujours locké au monitor (cfr Darpa, nasa..) des ordures. Et ce n'est pas réversible sans moi.

ect .....

MADAME FOSSEUR VOTRE PARQUET EST CORROMPU.

LA POLICE D'ANDENNE EST CORROMPUE.

LA POLICE DE CINEY EST POURRIE.

LA POLICE DE CINEY EST POURRIE ET INSALUBRE, LES ATTITUDES DE CERTAINS AGENTS ET COMMISSAIRES SONT CRIMINELLES ET DÉFIENT LES DIRECTIVES ET CONCERNANT LES DROITS DE L'HOMME.LES DEVOIRS D’ENQUÊTES NE SONT PAS HONORES. LES PLAINTES NE SONT PAS ACCEPTÉE. LES DÉPOSITIONS NE SONT QUE DICTÉES OU NON ACCEPTÉES.
EN OUTRE CERTAINS PROTÈGENT DES ASSASSINS ET ÉVOLUENT DANS L’ILLÉGALITÉ. LEUR MANIÈRE DE "TRAVAILLER" EST UNE HONTE MAINTE FOIS NUISIBLE A TOUT LE MONDE.

TOUS VOUS PARTICIPEZ A DU "COMMUNITY TERRORISM"(S/G-OS) ET A BIAISEZ LES RELATIONS, ET INSTITUTIONNELLES DE MANIÈRE CRIMINELLE ET SANS FRONTIÈRES.

LA MAISON BLANCHE POURRAIT VOUS LE CONFIRMER SI VOUS FAISIEZ L'EFFORT DE TÉLÉPHONER. VOS IN/ACTIONS ET COUP DANS L'EAU SUITE CE GENRE DE MESATTITUDES COÛTENT ÉNORMÉMENT A TOUS.

J'ai besoin d'une bonne radio,de sous et d'une auto en ordre. Je suis habileté à l'usage d'armes.

Benjamin Simon

Dilplome
Gradué : Eaux et Forêts et Environnement La Reid (2000) Avec Distinction
Mémoire avec Grande Distinction (Ecologie)

Employeurs
AVES, Maison Liégeoise de l'Environnement (J-P. Jacob, T. Kinet)
UCL, Unité des Eaux et Forêts (F. Devillers, C. Vinck, L. Misson)
UCL, Gestion des Ressources en Eaux (E. Persoons, M. Vanclooster, C. Bielders, M. Javaux, B Delvaux)
INDEPENDANT, chauffage industriel, énergies renouvelables (100 % statisfaction clientelle)
AUTO-DIDACTISME permanent. (langues, techniques, théorie)

http://www.facebook.com/bensim23
http://www.nazis.be
http://www.gang-stalking.be/aux-autorites-belges.html
http://gangstalkingenwallonie.blogspot.be/
http://gangstalkingbelgium.wordpress.com
http://gangstalkingbelgique.blogs.dhnet.be/about.html
http://www.gang-stalking.be

Une radio suffirait à entendre  ces bâtards détruire des gens.

BOMBING A LIEGE

Benjamin Simon

http://www.nazis.be/nazis-gang-stalking-Belgique-Benjamin-Simon-NOVEMBRE-DECEMBRE-JANVIER-2013.html

Analyse de ce que je subis (S/G-OS et OS-EH)

GANG-STALKING is stalking by more than one person to a victim, usually involving community harassment, or the “mob”, using people from all backgrounds and vocations to harass, tracking 24/7, sometimes organizing lethal vehicle accidents, poisoinings, electronic harassment, home invasions/property destruction, corrupt or ignorant doctor diagnosis given to stamp the victim as bogus mentally ill with delusions, paranoi, or schizophrenia, etc.

http://www.urbandictionary.com/

Until here, it is State/government organized stalking: “GANG-STALKING is stalking by more than one person to a victim,
usually involving community harassment, or the “mob”, using people from all backgrounds and vocations to harass, tracking 24/7″.

This: “home invasions” can be consistent with the S/G-OS.
This: “property destruction” only if and when they have renounced to induce the target to self-convince that everything be casual. “electronic harassment” is probably and additional program.
This: “sometimes organizing lethal vehicle accidents” certainly is an assassination program. They have a government secret decree to liquidate the target. Conceptually and bureaucratically different from the S/G-OS.

This: “corrupt or ignorant doctor diagnosis given to stamp the victim as bogus, mentally ill, with delusions, paranoia, or schizophrenia, etc” when the S/G-OS is failed, they are eventually unmasked, and so they need to annihilate/liquidate the target.

The S/G-OS is a very old para-police procedure. Its function is to push the target to do something, obstructing all his/her different options. It is the starting of, precondition for, using techniques of hetero-management of the target.

Roberto Scaruffi

http://gangstalkingbelgium.net/2013/02/28/corbion-46b-leignon-ciney-benjamin-simon-vs-stategovernment-organized-stalking/

http://www.nazis.be/nazis-gang-stalking-Belgique-Benjamin-Simon-NOVEMBRE-DECEMBRE-JANVIER-2013.html

http://osinformers.lefora.com/

Image may be NSFW.
Clik here to view.
track-and-report-a-community-terrorism.

track-and-report-a-community-terrorism.

http://www.whitehouse.gov/

[scribd id=153351487 key=key-6clys7jaqf3c1da6zp mode=scroll]
AG INSURANCES
ALLIANZ INSURANCES
BNP  PARIBAS
ING BANK BELGIUM
GILLAIN ASSURANCE WAVRE

Image may be NSFW.
Clik here to view.
Aves est une des deux associations fondatrices de Natagora dont elle constitue le pôle ornithologique.  Elle a pour but d’étudier et de protéger l’avifaune. Les observations d’oiseaux sont récoltées et analysées pour faire l’objet d’exposés et de publications (articles, atlas...).  Des études spécialisées sont aussi réalisées par le réseau des ornithologues amateurs et professionnels, notamment afin de mieux connaître l’évolution des populations de nos oiseaux au fil du temps.

AVES SOCIETE ORNITHOLOGIQUE BELGIQUE

 
http://targetedindividualsworldwide.wordpress.com/

Martin GRAY (HOLOCAUST SURVIVOR) bientot citoyen d'honneur à Ciney

OVER 1400 TORTURE GANG STALKING CASES
Image may be NSFW.
Clik here to view.
OVER 1400 TORTURE GANG STALKING CASES

 

Technological Holocaust Mind Control Steals Hope

Related Articles

Fete Nationale à Ciney ce 21 Juillet : Martin Gray (survivant de l'holocauste) Citoyen d'honneur

GANG-STALKING-300-TEMOIGNAGES-DE-VICTIMES-EUROPEENNES

TO YOU OUR SELECTED WITNESSES

http://www.gang-stalking.be/GANG-STALKING-300-TEMOIGNAGES-DE-VICTIMES-EUROPEENES.html

Image may be NSFW.
Clik here to view.
gang-stalking


http://www.4shared.com/dir/21674443/75538860/sharing.html
or
http://www.freedrive.com/folder/177784
and
 http://rudy2.wordpress.com/

There are MANY, MANY others, all over the world, who are being subjected to similar torture and abuse.

YOU HAVE BEEN CHOSEN TO BE “A SELECTED WITNESS” to these extreme and monstrous CRIMES AGAINST HUMANITY - indescribably terrible in themselves - coupled with the ORWELLIAN secrecy and denial of any support at all that we are experiencing, makes them even more horrendous and monstrous.

We have contacted most Governments, Security/Intelligence Agencies, Religious Organisations, International Organizations, Human Rights Organizations, Universities, Scientific and other Institutions, and the International Media all over the world - over and over and over again – and have had our appeals for assistance, protection and/or publicity almost completely ignored and/or suppressed.

Some TARGETED INDIVIDUALS have been attempting to gain assistance, protection and/or publicity about these crimes since the 1990s - and even earlier - this extends as far back into the history of illegal ‘scientific and medical’ testing and experimentation as MKULTRA, COINTELPRO and the DUPLESSIS ORPHANS - and further.

We are still collecting CASE SUMMARIES from TARGETED INDIVIDUALS all over the world, and we have also advised them to send them to you - “THE SELECTED WITNESSES”- TO WITNESS, RECORD AND OPPOSE so that :-

A. We can be sure that as many people as possible know about these horrendous crimes.

B. We can be sure that these AUTHORITIES and ORGANISATIONS are either trying to uphold the rule of National, International and Human Rights Law, and that we will, sooner or later, be protected by these laws.

C. Or that we can be sure these AUTHORITIES and ORGANISATIONS are complicit and/or acquiescent to these CRIMES AGAINST HUMANITY and that National, International and Human Rights Law no longer apply - in which case our task will be to get the rule of these laws restored.

Later these records should become an information source - such as the INTERNATIONAL TRACING OFFICE set up to record the fates and whereabouts of Jews (and others?) after WW11. The information collected can then be used by the appropriate people for LEGAL, MEDICAL, WELFARE, HISTORICAL etc. records.

As well as being illegal the crimes being committed against us are contrary to the Principles and Values of all the major religions and ethical systems - so we will also be demonstrating to all of these people and AUTHORITIES AND ORGANISATIONS the huge disconnect between their professed Principles and Values and the reality. We will be showing their monstrous Doublespeak Doublethink Doubledo ignorance, stupidity and/or hypocrisy.

It is our responsibility to record and alert the world to these horrendous crimes - and the extreme danger that these technologies, powers and tendencies pose to human rights, liberty, democracy, privacy and the mental and physical freedom, individuality, integrity, health and growth of all people – in all their “infinite?” richness, degrees, dimensions, aspects, qualities and diversity!

Make no mistake these are the most horrendous totalitarian weapons and crimes imaginable and the people and organizations using them are mass-murdering conspirators pursuing totalitarian fundamentalist schemes.

Beware of the brain and gene phrenologists/determinists/reductionists, and those who seek to control and reduce the range, quality and diversity of human thoughts, imaginations, senses, sensibilities, moods, attitudes, speech and psycho-physiologies – the would-be socio-economic, cultural AND PSYCHOLOGICAL/INTELLECTUAL/ PHYSIOLOGICAL monopolists, monoculturalists, police and prosecutors who are already literally and physically actively at work amongst us!! Both monstrously and criminally, and also far more insidiously.

And beware of this dumbing-down, disenfranchisement, degradation and monoculturalisation caused by the paucity and total degradation of public information and discourse, and the subsequent and consequent degradation and “Fahrenheit 451-ing” of previously autonomous cultures, professions, fields of human endeavour, memories, languages and intelligences.

It is no exaggeration to say our cases are as horrendous and urgent as people fleeing Nazi or Pol Pot concentration camps – specifically Dr Mengele-type torturers and butchers.

PLEASE ASSIST US URGENTLY!!!

Yours in the search for openness and respect for universal human rights
John Finch, 5/8 Kemp St, Thornbury, Vic 3071, Australia, TEL: 0424009627


EMAIL: tijohnfinch@gmail.com,MCmailteam@gmail.com
FACEBOOK: http://www.facebook.com/john.finch.16547?ref=profile

TARGETED INDIVIDUAL and a member of THE WORLDWIDE CAMPAIGN AGAINST ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION

over 300 ELECTRONIC TORTURE, ABUSE AND EXPERIMENTATION, AND ORGANISED STALKING, CASES from EUROPE


LINKS


http://www.yoziki.wordpress.com/
http://www.yoziki.blogspot.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=6511
http://www.mindcontrolforums.com/v/anatolij.htm
http://www.lacoctelera.com/presentation-de-la-situation
http://informationdossier.wordpress.com/
http://www.vitaspiata.blogspot.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=4242
http://www.humantele.com/
http://peacepink.ning.com/profile/AtlantiTeo
http://peacepink.ning.com/profiles/blogs/adjournment-mcmailteam
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
http://web.iol.cz/mhzzrz/
http://nonlethal.e3b.org/
http://www.totalitaer.de/
http://www.associazionevittimearmielettroniche-mentali.org/
http://www.hellradio.org/?p=665
http://peacepink.ning.com/profiles/blogs/darrim-daoud-ti-suicides-and
http://www.fedame.org/phpBB2/viewtopic.php?t=1268
http://www.avae-m.org/
http://www.associazionevittimearmielettroniche-mentali.org/index-links-1.htm
http://www.associazionevittimearmielettroniche-mentali.org/
http://dbabou.blogspot.fr/
http://www.lesdove.blogspot.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=3768
http://altnews.jigsy.com/
http://www.facebook.com/paolo.fiora.1?ref=profile
http://www.lacote.ch/
http://www.accrochages.ch/
http://informationdossier.wordpress.com/
http://www.lacoctelera.com/presentation-de-la-situation
http://stopptmindcontrol.lima-city.de/
http://www.volkstribune.de.tl/
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
Http://www.simonhayes.net/
www.enoch.blog.is
http://www.hearingvoices-is-voicetoskull.com/,
http://www.implant-victims.com/
http://www.gangstalkerdown.com/,
http://www.gangstalkingwiki.com/,
http://www.v2krobot.com/,
http://www.os923.com/
http://www.splitjudas.blogspot.com/
http://www.facebook.com/oguzicsoz?group_id=0
http://zugoo.tumblr.com/
http://www.stopeg.com/
http://electronicharassment.weebly.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=3004
http://www.strahlenfolter.blogspot.com/
http://www.brittaleiajaccard.com/
http://www.avae-m.org/www.associazionevittimearmielettroniche-mentali.org/index-links-1.htm
http://www.associazionevittimearmielettroniche-mentali.org/stat.html
http://www.worldgathering.net/
http://www.fedame.org/phpBB2/viewtopic.php?t=6443
http://www.fedame.org/phpBB2/viewtopic.php?t=6443
http://www.fedame.org/phpBB2/viewtopic.php?t=174
http://www.davidicke.com/forum/showthread.php?t=617
http://www.avantgarde-verlag.de/
http://www.gestaltungfmenschen.com/
http://hansahas.blogg.de/
http://mindcontrol.twoday.net
http://bruleparlesillumines.skyrock.com/
http://www.eharassment.ca/stories/fernando.htm
http://oacossogrupalnagalizadoseculoxxi.blogspot.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
http://www.fedame.org/phpBB2/viewtopic.php?t=5835
http://www.fedame.org/phpBB2/viewtopic.php?t=3203
http://www.fedame.org/phpBB2/viewtopic.php?t=3664
http://ciaandbritainssecretdeathsquads.blogspot.com/
http://crimenesopus.blogspot.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
http://www.fedame.org/phpBB2/viewtopic.php?t=2573
http://video.google.com/videoplay?docid=-86926225312642413&q&hl=en
http://www.freedrive.com/folder/177784
http://www.mikrowellenterror.de/
http://home.scarlet.be/hexagonal
http://vicmongr.wordpress.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
http://www.davidicke.com/index.php/
http://frequenceharcele.canalblog.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
http://www.fedame.org/phpBB2/viewtopic.php?t=6431&sid=1eda64d7122df4de5fd74d9e62788d7a
http://rudy2.wordpress.com/en-memoria-de-nuestro-amigo-alfredo-nieto/
http://www.youtube.com/watch?v=J0Qu6eyyr4c
http://home.vicnet.net.au/~johnf/defence.htm
http://peacepink.ning.com/profile/DavidOtto
http://beatthenazi.blogspot.com/
http://www.fedame.org/phpBB2/posting.php?mode=quote&p=8528
http://www.fedame.org/phpBB2/privmsg.php?folder=inbox&mode=read&p=2318
http://www.geocities.com/dutchintelvictim
http://eumc.wik.is/
http://www.eumindcontrol.blogspot.com/
http://peacepink.ning.com/profiles/blog/show?id=2351430%3ABlogPost%3A8572&xgs=1
http://www.acoso-organizado.com/
http://www.acoso-organizado.com/
http://randolfsordeal.blogspot.com/
http://groups.yahoo.com/group/MCVictimsEU/messages
http://informationdossier.wordpress.com/
http://psychophysischer-terror.de.tl/
http://www.volkstribune.de.tl/
http://www.youtube.com/watch?v=C72Vd1806W0
http://peacepink.ning.com/profiles/blog/show?id=2351430%3ABlogPost%3A8572&xgs=1
http://www.acoso-organizado.com/
http://www.acoso-organizado.com/
http://randolfsordeal.blogspot.com/
http://groups.yahoo.com/group/MCVictimsEU/messages
http://www.klinamen.org/contralatorturapolicial/menu.htm
http://www.fedame.org/phpBB2/viewtopic.php?t=3719
http://www.fedame.org/phpBB2/viewtopic.php?t=3876
http://www.youtube.com/watch?v=zNAUCySurkA
http://scaruffi.blogspot.com/2008/07/you-are-insane-you-are-criminals.html
http://www.fedame.org/phpBB2/posting.php?mode=quote&p=8528
http://beatthenazi.blogspot.com/
http://www.angelfire.com/or/mctrl/NewCrit-JPSS-CS2.htm
http://www.youtube.com/watch?v=zNAUCySurkA
http://scaruffi.blogspot.com/2008/07/you-are-insane-you-are-criminals.html
http://www.mindcontrol-victims.eu/
http:// mindcontrolexperimenten.blogspot.com/2008/09/my-mail-to-dr-steve-wright.html
http://groups.google.de/group/harassment-victims/browse_thread/thread/ac3f07c6f0471a94?hl=en#
http://www.it.up.ac.za/documentation/governance/disclaimer/
http://www.fedame.org/phpBB2/viewtopic.php?t=1662
http://www.youtube.com/watch?v=iJMRG9btAAc&feature=youtu.be
http://www.youtube.com/watch?v=iJMRG9btAAc&feature=youtu.be
http://www.youtube.com/user/motahani?feature=mhee
http://www.maryam-rajavi.com/ ,
http://www.ncr-iran.org/ ,
http://www.iranfocus.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
http://www.strahlenfolter.oyla.de/
http://www.psychophysical-torture.de.tl/
http://www.peacepink.ning.com/
http://www.mindcontrolforums.com/victm-hm.htm
http://www.fedame.org/phpBB2/viewtopic.php?t=5635 (Torture Case in Spanish)
http://www.4shared.com/file/158027202/b20c2acb/deconstructing_planet_7.html
http://www.wowouj.com/
http://www.didierverhille.com/tortures/
http://www.mindcontrolforums.com/victm-hm.htm
http://www.fedame.org/phpBB2/viewtopic.php?t=5635 (Torture Case in Spanish)
http://www.avae-m.org/
http://www.associazionevittimearmielettroniche-mentali.org/index-links-1.htm
http://www.associazionevittimearmielettroniche-mentali.org/stat.html
http://www.facebook.com/group.php?gid=91047851866&ref=ts
http://www.facebook.com/notes/l-adige-e-il-trentino/mind-kontrol-in-italia-tra-fantascienza-e-realta/344278799541
http://groups.yahoo.com/group/MCVictimsEU/
http://mairewolf.blogspot.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=1615
http://serge-labreze.blogspot.com/,
http://picasaweb.google.fr/serge.labreze
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
http://www.facebook.com/oguzicsoz?group_id=0
http://zugoo.tumblr.com/
http://www.stopeg.com/
http://electronicharassment.weebly.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=3004



 

"The Sound of Silence" : Lyrics to the pop song by Paul Kane (aka Paul Simon) 1963

Lyrics to the pop song"The Sound of Silence" by Paul Kane (aka Paul Simon) 1963



Hello, darkness, my old friend
I’ve come to talk with you again
Because a vision softly creeping
Left its seeds while I was sleeping
And the vision that was planted in my brain
Still remains within the Sound of Silence.

In restless dreams I walked alone
Narrow streets of cobblestone
Beneath the halo of a street lamp
I turned my collar to the cold and damp
When my eyes were stabbed by the flash of a neon light
That split the night and touched the Sound of Silence.

And in the naked light I saw
Ten thousand people, maybe more
People talking without speaking
People hearing without listening
People writing songs that voices never share…
And no one dare disturb the Sound of Silence.


“Fools,” said I, “you do not know
Silence like a cancer grows.”
“Hear my words that I might teach you,
Take my arms that I might reach you.”
But my words like silent raindrops fell,
And echoed in the wells of silence.

And the people bowed and prayed
To the neon god they made.
And the sign flashed out its warning
In the words that it was forming.


And the signs said: “The words of the prophets
Are written on the subway walls
And tenement halls,
And whisper’d in the Sound of Silence.”


Paul Simon/Paul Kane’s musical work in the early

1960’s was primarily as a contracted songwriter in the famed “Brill Building

machine.”

He would write songs for other artists to record. He did try his

hand at performing, however. He wrote many ballads and rockabilly tunes

which were recorded, both by Paul and his mildly-successful

Tico and the Triumphs.

Paul also had a famous collaborator, Carole Kane (who changed her

name to Carol King).

Image may be NSFW.
Clik here to view.
Paul Simon
Paul Simon (Photo credit: Wikipedia)

Paul Simon, whose family was part of the military-industrialist complex, was very likely a product of the early 1960s military experimentation in Silent Sound mind control,

which is clearly what the lyrics of “The Sound of Silence” convey to those “in the know”.

 


 

 

 


Stories of Organized Stalking and Electronic Harassment

LINKS : FAITS DIVERS

New World Order NWO - Peter Vereecke, Belgium

New World Order NWO - Peter Vereecke, Belgium

In this informative and surprisingly uplifting video, Lilou Mace interviews Peter Vereecke, a former mayor of Evergem in Belgium, who awakened 10 years ago to conspiracies such as chemtrails, vaccines, GMO, and other agendas of the New World Order (NWO). Since his awakening, he has become an activist.
In 2009, he co-founded The Belfort Group -- Citizens In Action in Belgium. In 2010, his group hosted an international symposium on the illegal spraying of chemtrails, and produced the "Case Orange" report.

Watch as Peter talks about the conspiracies, what our role is, and what we can do about it.
Peter's email peter@belfort-group.eu

To support the juicy living tour and to watch more video interviews, visit http://www.JuicyLivingTour

Donate now to support the Juicy Living Tour at http://juicylivingtour.com/support-th...

Stay tuned on the Juicy Living Tour and where it is right now in the world from Lilou's facebook fan page at http://facebook.com/liloumacewebtv

Dream Vortex Radio with Chris Vortex with Melanie Vritschan and Peter Vereecke

Striving for Freedom: Are you being controlled?

This show was about social control on all levels from romote control technologies used for mind control, then the conversation expanding to cover mind control as a general social practice.

This show was aired on REVOLUTION RADIO @ http://www.freedomslips.com/ 2-4pm EST

http://icaact.org/

Peter Vereecke founder of the civil rights group Belfort Group http://www.belfort-group.eu/

http://morgellonsresearchgroup.com/

http://targeted-individuals-europe.com/

Melanie Vritschan: An overview and introduction to Morgellons, Mind Control and Governmental Experimentation http://targeted-individuals-europe.co...

 

http://www.theguardian.com/world/2013/jul/31/nsa-top-secret-program-online-data


REPORT ON RF SCANNING IN A SHIELDED ENVIRONMENT FOR HUMAN BRAIN IMPLANT

REPORT ON RF SCANNING IN A SHIELDED ENVIRONMENT FOR HUMAN BRAIN IMPLANT

Image may be NSFW.
Clik here to view.
Reblogged from Brain-Computer:

 

REPORT ON RF SCANNING IN A SHIELDED ENVIRONMENT

ICAACT Phase III Testing

ICAACT is an Independent evidence gathering Non Profit Human Rights Organization.

This report details the findings of the ICAACT phase III testing procedure. The ICAACT Phase III testing is about testing the human body for RF (Radio Frequency) emission, in a shielded environment. A Faraday cage was utilized to conduct the testing.

Read more… 266 more words


300 Gang-stalking, Organised-stalking Cases From Europe by BENJA SIMON

dangerous radiation everywhere: MI5 agent Dr Barrie Trower

MI5 agent Dr Barrie Trower: dangerous radiation everywhere

No Copyright infringement intended; All Rights Reserved; In the title, We are being bombarded with microwave and other frequencies, ignorant, unlike the government, of the dangers involved, as Barrie Trower says, '' The scientists at the end of ww2 were hanged for what scientists and governments are getting away with today'' You won't get your child a mobile for xmas because i bet they already have one, right? Come help make some noise......be a voice.

 

 

Interview with Barrie Trower November 13, 2010.

Barrie Trower is a former Royal Navy microwave weapons expert and former cold-war captured spy debriefer for the UK Intelligence Services. Mr Trower is a conscionable whistle-blower who lectures around the world on hidden dangers from microwave weapons and every-day microwave technologies such as mobile-phones and WiFi. Mr Trower has also repeatedly assisted the UK Police Fedration in their struggle to protect police officers from Tetra/Air-Band radio-communications systems that are harmful to health.

 

 

300 Gang-stalking, Organised-stalking Cases From Europe by BENJA SIMON

 

Procureur-Dinant-Charlotte-Fosseur-et-gang-stalking-et-Benja-simon-26.358P-jt22.100P.pdf by BENJA SIMON

 

http://gangstalkingbelgium.net/media-release-in-15-languages-john-finch/

http://peacepink.ning.com/profiles/blogs/an-unwilling-and-unwitting-mind-control-victim

http://gangstalkingbelgium.net/2013/07/30/sub-vocal-speech-targeted-individuals-oseh/

http://gangstalkingbelgique.blogs.dhnet.be/archive/2013/07/24/gang-stalking-300-temoignages-de-victimes-europeennes-567264.html

http://gangstalkingbelgium.net/2013/08/06/daniel-e-shaffer-jr-letter-6-of-8-in-series-the-diseased-animal-see-no-evil-jew-baitingchristian-cointelpro-community-based-gang-rape-victim-of-illegal-surveillance-intense-harassment/

http://icaact.org/

http://eucach.wordpress.com/

http://sigint.wordpress.com/2008/02/

http://marekkultys.blogspot.com.au/2011/05/end-of-hearing-voices-inside-my-head.html

http://dirtywhitegoy247.wordpress.com/2013/07/27/germans-protest-against-us-surveillance/

http://gangstalkingbelgium.net/media-release-in-15-languages-john-finch/

http://peacepink.ning.com/profiles/blogs/an-unwilling-and-unwitting-mind-control-victim

http://gangstalkingbelgium.net/2013/07/30/sub-vocal-speech-targeted-individuals-oseh/

http://gangstalkingbelgique.blogs.dhnet.be/archive/2013/07/24/gang-stalking-300-temoignages-de-victimes-europeennes-567264.html

http://gangstalkingbelgium.net/2013/08/06/daniel-e-shaffer-jr-letter-6-of-8-in-series-the-diseased-animal-see-no-evil-jew-baitingchristian-cointelpro-community-based-gang-rape-victim-of-illegal-surveillance-intense-harassment/

http://icaact.org/

http://eucach.wordpress.com/

http://sigint.wordpress.com/2008/02/

http://marekkultys.blogspot.com.au/2011/05/end-of-hearing-voices-inside-my-head.html

http://dirtywhitegoy247.wordpress.com/2013/07/27/germans-protest-against-us-surveillance/

Image may be NSFW.
Clik here to view.
barrie trower,icaact,magnus olson,m15,mother earth,faraday cage,targeted individuals,scientifics evedences

BELGIQUE .......Pour la NSA? L'alerte terroriste tombe à point nommé....

Les policiers ne seront plus sanctionnés par une suspension avec maintien de 75 % de leur salaire

Les ministres de l'Intérieur et de la Justice souhaitent mettre fin à la suspension des agents de police avec maintien de 75 % de leur salaire, telle que le prévoit actuellement une loi disciplinaire, lit-on mercredi dans les colonnes du Morgen et du Het Laatste Nieuws.

 

 

En lieu et place de cette suspension, Joëlle Milquet (CDH) et Annemie Turtelboom (OpenVLD) proposent de mettre en place une pénalité mensuelle et de les obliger à continuer de travailler.

"Quelle entreprise moderne punit-elle encore aujourd'hui les membres de son personnel par des vacances forcées et payées?", s'interrogent les deux ministres, estimant qu'une suspension en tant que sanction disciplinaire est une pratique dépassée. Elles se demandent en outre si le but de la suspension - inciter le membre du personnel suspendu à se remettre en question en le mettant de côté temporairement - est encore atteint.

Joëlle Milquet et Annemie Turtelboom préconisent plutôt de mettre notamment en place une pénalité mensuelle, allant de 2 à 10 % des revenus bruts du policier concerné, et cela pour une période maximale de six mois, et de l'obliger à continuer de travailler.

http://www.levif.be/info/actualite/belgique/les-policiers-ne-seront-plus-sanctionnes-par-une-suspension-avec-maintien-de-75--de-leur-salaire/article-4000378685668.htm

Fete Nationale à Ciney ce 21 Juillet dernier : Martin Gray (survivant de l'holocauste) ...

gangstalkingbelgique.blogs.dhnet.be/.../fete-nationale-ciney-ce-21-juillet...‎
De noreply@blogs.dhnet.be (bensim)

19 juil. 2013 - Fete Nationale Ciney ce 21 Juillet : Martin Gray Citoyen d'honneur Martin Gray (Holocaust Survivor) Citoyen D Honneur Fete Nationale Ciney by BENJA...

 
 
 
 

http://www.gang-stalking.be/GANG-STALKING-300-TEMOIGNAGES-DE-VICTIMES-EUROPEENES.html

Procureur-Dinant-Charlotte-Fosseur-et-gang-stalking-et-Benja-simon-26.358P-jt22.100P.pdf
by BENJA SIMON

 
 
 

Image may be NSFW.
Clik here to view.
The-New-Terrorism-of-the-21st-Century-ICAACT.ORG


Pour la NSA
, l'alerte terroriste tombe à point nommé - Le Vif L'Express

www.levif.be › Le Vif  Levif blog  Opinions

6 août 2013 - Est-il sérieux de décréter l'alerte terroriste dans notre pays suite aux informations de la NSA américaine alors qu'aux Pays-Bas aucune alerte ... !!!!!!!!

mardi 06 août 2013 à 16h33

Est-il sérieux de décréter l’alerte terroriste dans notre pays suite aux informations de la NSA américaine alors qu’aux Pays-Bas aucune alerte n’a été déclenchée sur base de ces mêmes données ? Et quelle est la part de hasard dans le fait que la NSA décrète un niveau de vigilance jamais vu, un jour après qu’ Edward Snowden ait trouvé asile politique en Russie?

Image may be NSFW.
Clik here to view.
Le service américain de renseignements, NSA.

Le service américain de renseignements, NSA.

 

Lockheed Martin also has operational command and control over a U.S. government microwave radio frequencywe... by BENJA SIMON


http://www.lockheedmartin.com/us/contact.html

http://www.lockheedmartin.com/us/who-we-are/ethics.html

Image may be NSFW.
Clik here to view.
http://www.lockheedmartin.com

http://www.lockheedmartin.com

Publication de Benjamin Simon.

Image may be NSFW.
Clik here to view.
Conjoux-place Lefevre-Hamitiaux-conneux

Conjoux-place Lefevre-Hamitiaux-conneux
 
 

what I show to you is not great...but it's necessarily useful...thx for your kind attention

Once a target is flagged a marker is placed markers are spatially deployed in function of professional personal relational agenda.  Markers are unerasables like the entire warfare thatcriminalswill never have access.

Nullification and non formalization off evidences permit criminals produce more deaths and lots of enormous suffering for more innocents victims.

Benjamin Simon

http://www.gang-stalking.be/GANG-STALKING-300-TEMOIGNAGES-DE-VICTIMES-EUROPEENES.html

CETTE LISTE N' EST Q' UN PETIT ECHANTILLON, CERTAINES DE CES VICTIMES ONT ETE EXECUTEES ET LES CIRCONSTANCES RESTENT SOUS COUVERT, LE PLUS SOUVENTS LEURS FAMILLES SONT DETRUITES ET/OU ISOLEES....LES PARTICIPANTS AU BUZZ-SAW , BUZZSAW  http://urlink.fr/6CdSONT DES CRIMINELS AVERTIS (stay behind networks)....

http://fr.scribd.com/doc/153307235/What-Happened-to-Eileen

http://fr.scribd.com/doc/151706587/Gang-Stalking-DOJ-FOIA-NowPublic-News-pdf







fema camps, gangstalkers, head locker, holocaust program, life hackers, psyops, mindwar, perpetrators, psyops, rapists, slow killers, stasi system, state terror, sufe zwei, terrorisme, war on, psywar, elf-haarp, state commanders, battelfield, wave theory, new world war, political control, paperclip, troughts, inside vision, electrovision, closing, bridging the gap, surete, spiral waves, octopus, analog blue bath, psionic, emp, targeted individuals, indigo ribbon, bombing, weather change, wireless, ring, optical, cointelpro, 24/7, harassment, patterns, nullification,

stalking-organisationnel, directed energy weapons, 300 victimes EUROPE by BENJA SIMON



POURRIEZ VOUS ETRE NOS TEMOINS ET JOUER LES INTERMEDIAIRES, NOUS PERMETTRE DE DETRUIRE NOS ASSASSINS? CE N'EST PAS DANGEREUX... NOUS SOMMES DEVENUS DES AMIS EN NOUS PROTEGEANTS ET CERTAINS D'ENTRE NOUS SONT MORTS ..NOUS AVIONS DE L'ARGENT !!! NOS ORDURES SAVENT QU'ILS SONT PERDUS DEPUIS LONGTEMPS.


http://www.nazis.be/nazis-gang-stalking-Belgique-Benjamin-Simon-FEVRIER-MARS-AVRIL-2013.html

NSA-Eavesdropping-Historical Guide to Western Communications Intelligence and the Holocaust by BENJA SIMON

 
 
https://duckduckgo.com/about

Image may be NSFW.
Clik here to view.
logo_feedback.help.png


Image may be NSFW.
Clik here to view.
http://www.imdb.com/video/wab/vi204971545/





 

Das Phänomen « Projekt X ». Wenn die Realität die Fiktion überholt !

 

 

14 Januar 2013

Da ich selber 17 Jahre alt bin, gehe ich auch auf soziale Netzwerke, mache ich auch Party, habe ich auch den Film « Projekt X » gesehen. Aber ich verstehe nicht, wie man nicht unterscheiden kann zwischen einem Film und der Realität, dass man Menschen besuchen will um alles kleinzuschlagen.

 

Von Audrey Fardel, Praktikantin Internationales Institut der Rechte des Kindes

 


Image may be NSFW.
Clik here to view.

« Projekt X » oder « The Hangover» auf Englisch ist der Name einer amerikanischen Komödie welche die Geschichte von drei Gymnasiasten (Costa, Jb und Thomas) erzählt, welche nicht mehr als „Looser“ gelten wollen und deshalb entschliessen, die „grösste Party aller Zeiten“ zu organisieren. Die Gäste erschein wesentlich zahlreicher als vorgesehen und das Fest entartet rasch, indem es sich zu einem überdimensionalen Anlass entwickelt… Dieser Film ist geprägt durch die Geschichte von Corey Worthington, einem 16jährigen Australier (2008), welcher von der Abwesenheit seiner Eltern profitierte um 500 Personen via Facebook bei sich einzuladen. Das Wochenende endete mit der Zerstörung des Hauses der Familie und mit Beschädigungen in der ganzen Nachbarschaft. Ein Interview des Jugendlichen in dem lokalen Fernsehsender hat anschliessend diese Begebenheit in den Vereinigten Staaten und Australien bekannt gemacht.

Dieser Film, der nach Art eines Dokumentarfilmes gedreht wurde, erschafft die Illusion, an diesem Abend anwesend zu sein, Teil des Filmes zu sein, dass alles wirklich ist … und es scheint, dass bestimmte Jugendliche nicht in der Lage sind, zwischen Realität und Fiktion zu unterscheiden.

Quellen :

(1) – 50.000 invités Facebook à la fête d’anniversaire d’un ado, Article le  Figaro , 26.04.2012

- Anniversaire de Benjamin – L’épilogue (France 3 Auvergne et National), Reportage France 3, 12.05.2012

- Quand les fêtes «Facebook» dégénèrent, Article le Figaro, 28.05.2012

(2) Chaos” aux Pays Bas lors d’une soirée “Projet X” ayant rassemblé des milliers de personnes, Article de M Europe, 22.09.2012

(3) Un étudiant abattu en imitant le film «Projet X», Article de la Tribune de Genève, 20.03.2012

(4) – Projet X: villa vandalisée dans le Var au cours d’une soirée Facebook,  Reportage du Le journal France 3, 22.05.12

- Prison pour avoir organisé une soirée Projet X via Facebook, Article du Figaro,  25.06.2012


 

300 dépositions et temoingnages de victimes européennes du cyber stalking et d'armes a énergie dirigées by BENJA SIMON

Image may be NSFW.
Clik here to view.
shim.gif

Image may be NSFW.
Clik here to view.
shim.gif

 

LIFEHACKERS

LIFEHACKERS

Top 10 Ways to Beef Up Your Custom-Built PC

BENJAMIN SIMON Shared a Post by WHITSON GORDON 4 minutes agog 25,888

 

Building your own computer is the best way to get the perfect PC for your needs. Want to take your custom build even further? Beef it up with these 10 projects.

Read on Lifehacker

 
 
 

YOU NEED ALSO A EXTRACTOR HOOD IF NOT YOU HAVE PROBLEMS TO MAKE YOUR SILENT SOUND......

...ALMOST FIVE YEARS ....

Benja

 
 

JUIN 2013 ABOUT S/G-OS FROM BELGIUM
Read…

 

Germanneo-Nazi inquiry urges reform of police and intelligence - FT.com

Image may be NSFW.
Clik here to view.

A German parliamentary inquiry has called for radical reforms of the police and domestic intelligence services after their failure to track down and arrest a neo-Nazi terror cell following the serial killings of nine immigrants and a policewoman

Read more at www.ft.com

 

http://gangstalkingbelgique.blogs.dhnet.be/about.html

 

other links

 

http://video.google.com/videoplay?docid=-86926225312642413&q&hl=en
http://www.freedrive.com/folder/177784
http://www.mikrowellenterror.de/
http://home.scarlet.be/hexagonal
http://vicmongr.wordpress.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
http://www.davidicke.com/index.php/
http://frequenceharcele.canalblog.com/
http://www.fedame.org/phpBB2/viewtopic.php?t=5635
http://www.fedame.org/phpBB2/viewtopic.php?t=6431&sid=1eda64d7122df4de5fd74d9e62788d7a
http://rudy2.wordpress.com/en-memoria-de-nuestro-amigo-alfredo-nieto/
http://www.youtube.com/watch?v=J0Qu6eyyr4c
http://home.vicnet.net.au/~johnf/defence.htm
http://peacepink.ning.com/profile/DavidOtto
http://beatthenazi.blogspot.com/
http://www.fedame.org/phpBB2/posting.php?mode=quote&p=8528
http://www.fedame.org/phpBB2/privmsg.php?folder=inbox&mode=read&p=2318
http://www.geocities.com/dutchintelvictim
http://eumc.wik.is/
http://www.eumindcontrol.blogspot.com/
http://peacepink.ning.com/profiles/blog/show?id=2351430%3ABlogPost%3A8572&xgs=1
http://www.acoso-organizado.com/
http://www.acoso-organizado.com/
http://randolfsordeal.blogspot.com/
http://groups.yahoo.com/group/MCVictimsEU/messages
http://informationdossier.wordpress.com/
http://psychophysischer-terror.de.tl/
http://www.volkstribune.de.tl/
http://www.youtube.com/watch?v=C72Vd1806W0
http://peacepink.ning.com/profiles/blog/show?id=2351430%3ABlogPost%3A8572&xgs=1
http://www.acoso-organizado.com/
http://www.acoso-organizado.com/
http://randolfsordeal.blogspot.com/
http://groups.yahoo.com/group/MCVictimsEU/messages
http://www.klinamen.org/contralatorturapolicial/menu.htm

Creeper, le premier virus informatique à 42 ans

Primeiro vírus informático criado há 40 anos (2011)

"Eu sou o Creeper, apanha-me se és capaz!". Era com esta frase provocatória que o primeiro vírus informático aparecia em 1971 nos ecrãs dos primitivos computadores da Arpanet, a rede informática norte-americana que está na origem da Internet.

Image may be NSFW.
Clik here to view.
how-to-stop-virus-into-computer
how-to-stop-virus-into-computer

Mas, o Creeper não passava de uma inocente brincadeira de um programador que apenas quis provar que era possível introduzir programas numa rede informática sem autorização. Ao longo de quatro décadas o cibercrime disparou exponencialmente: em 1990 foram detetados 1300 vírus, em 2000 existiam 50 mil e 2010 foram identificados 200 milhões. Nos últimos cinco anos, estes programas informáticos maliciosos passaram a ter como objetivo o lucro, através de modelos de negócio mais ou menos sofisticados e passaram a fazer parte da guerra industrial entre Estados. Em 2010, Stuxnet danificou seriamente o sistema industrial da Siemens que equipava uma central nuclear no Irão. Já este ano, o Governo francês sofreu um ataque sem precedentes, por ter sido o organizador da cimeira do G20. Quais são agora os principais alvos do cibercrime? Os especialistas defendem que deverão ser os smartphones. Não só porque são um tipo de equipamento móvel cuja utilização  está a crescer exponencialmente, como também porque no futuro deverão ter funções de micro-pagamento. E também porque incorporam um sistema de localização (GPS) e têm câmara fotográfica, o que os torna potencialmente intrusivos para os seus proprietários. No passado mês de Fevereiro, a Kaspersky, especialista em segurança, informou ter detetado em simultâneo vários novos programas maliciosos para a plataforma móvel Android (Google). Veja quais são os principais vírus da história da informática:

1971: Creeper

Foi criado em laboratório por um programador que trabalhava no desenvolvimento da Arpanet (rede precursora da Internet).

1982: Elk Cloner

Foi escrito por um adolescente de 15 anos. Propagava-se através de disquetes do Apple II e era uma forma de ter acesso a acesso a informação dos computadores dos amigos, sem que estes dessem por isso.

[youtube=http://www.youtube.com/watch?v=UO_84C3fpuI&w=420&h=315]

1987: Jerusalém

Foi o primeiro vírus destruidor a ter um impacto global. Em cada 6ª feira, dia 13, este vírus apagava os programas que estivessem em funcionamento no computador. O nome deve-se aio facto de ter sido detetado pela primeira vez na Universidade Hebraica de Jerusalém.

1992: Michelangelo

Pertence à categoria dos vírus adormecidos que acordava no dia 6 de março (dia de nascimento de do artista renascentista) e apagava informação essencial do computador e infetava discos rígidos. Não causou muitos estragos porque os computadores pessoais eram desligados nesse dia.

1999: Melissa

Foi criado em homenagem a uma streaper da Florida. O autor foi identificado e passou 20 meses na prisão e teve que pagar uma multa de 5 mil dólares. Infetava os ficheiros Microsoft Word  e enviava-se a si próprio através do Outlook. Era suficientemente poderoso para paralisar os sistemas de correio eletrónico da Internet. Foram criadas variantes e havia quem pedisse 100 dólares 8 partir de paraísos ficais) para anular o vírus.

2000: I love you

Era um vírus tipo worm  (que se auto replica) que afetou dezenas de milhões de computadores pessoais. Aparecia através de uma mensagem de correio eletrónico com o assunto "I love you" e infetava o computador quando o ficheiro em anexo era aberto. Depois o vírus auto propagava-se a todos os endereços do programa de mail. Terá provocado prejuízos superiores a 5 mil milhões de dólares em todo o mundo por levar muito tempo "limpar" as máquinas infetadas.

2001: Code Red

Numa semana atacou 400 mil servidores com tecnologia Microsoft. Tal como o I Love You, atacava também os utilizadores finais. Substituía a página inicial dos sítios web com a mensagem "Hacked by chinese".

2004: Sasser 

Infetou mais de um milhão de computadores e provocou prejuízos de 18 mil milhões de dólares. Explorava uma vulnerabilidade do Microsoft Windows para se espalhar de uma forma muito rápida. Os computadores ficavam inoperacionais em poucos minutos. A Delta Airlines foi forçada a cancelar voos e a guarda costeira britânica teve que voltar a usar mapas em papel. Descobriu-se que o autor tinha sido um rapaz alemão de 18 anos que seria processado pela Microsoft em 250 mil dólares. O jovem alegou que tinha criado o vírus para ajudar a mãe a arranjar emprego numa empresa de segurança informática.

2005: My Tob

Significou o início na era dos Botnets (agentes de software que funcionam autonomamente) e do cibercrime. Era um worm que combinava as características de zombie (programa controlado remotamente) e de mass-mailer (envio massivo de mensagens de correio eletrónico). Com My Tob, os vírus tornaram-se um negócio para desenvolver atividades de espionagem (spyware), difusão de correio indesejado (spam), hospedagem nos servidores de conteúdo indesejado, interceção de códigos bancários, chantagem, etc.. As receitas deste tipo de atividade atingem milhares de milhões de euros e continuam a crescer até hoje.

 2007: Storm botnet

Já com modelos de negócio a funcionar, os cibercriminosos passar a ter estratégias de defesa (dos contra-ataques das empresas de segurança) através de centros de comando descentralizados. O Storm infetou muitos milhões de computadores.

2008: Koobface

Numa analogia ao Facebook, este vírus usava as redes sociais para se espalhar. Ainda hoje deverá haver 500 mil Koobfaces on line ao mesmo tempo.

2009: Conficker

É um vírus muito sofisticado e resistente. É ao mesmo tempo worm e uma botnet súper robusto. Infetou mais de 7 milhões de sistemas informáticos no mundo inteiro, incluindo hospitais e bases militares (obrigou aviões de guerra franceses a ficarem em terra). Curiosamente, o Conficker não afetava os IP (Internet Protocol) ucranianos. Respeitava uma das regras de ouro do cribercrime. "Não ataques o teu próprio país e o braço da justioça não re atingirá".

2010: Stuxnet

Significou o advento da ciberguerra. Ou seja, é a era dos vírus tão sofisticados que apenas os Estados parecem ter recursos para os criar. Tira partido de uma vulnerabilidade do Windows e atacou o sistema de gestão industrial da Siemens.

http://www.gang-stalking.be/GANG-STALKING-300-DEPOSITIONS-DE-VICTIMES-EUROPEENNES.html

petit echantillon..... 

http://umolharsobreomundo.blogs.sapo.pt/60325.html

Metallica - The Call Of Ktulu - LIVE - Amneville, France - MetOnTour from ArgentallicA on Vimeo.

http://vidasroubadasccc.blogspot.com.br/

 


Un serveur d'hebergement web belge est arrêté après que le cheval de Troie "Duqu" ai été détecté !!!

Un serveur d'hebergement web belge est arrêté après que le cheval de Troie "Duqu" ai été détecté !!!

http://fr.scribd.com/bensim23

http://fr.scribd.com/bensim24


Researchers at Symantec (www.symantec.com) have identified a sample of the Duqu virus configured to communicate with a specific server at Belgiumweb hosting company Combell Group (www.combell.com/en).

According to a report by Reuters on Thursday, Symantec notified Combell that one of its servers was being used for malicious activity on Tuesday. TWo days later, Combell shut down that server.

This latest development comes a week after Indian authorities seized servers from a data center in Mumbai belonging to web hosting provider Web Werks. Its server was also communicating with computers infected with Duqu.

Duqu was detected in October and experts believe it may be the precurser to a future Stuxnet-like attack. Duqu shares a lot of the same code with Stuxnet, and its purpose is to gather intelligence data and assets from entities like industrial control system manufacturers.

“We investigated the case,” Combell business development manager Tom Blast told Reuters. “We decided to shut down the server immediately.”

An unnamed Combell employee said that the server had been running continuously for about a week and was leased through the end of October 2012, according to the report.

John Bumgarner, chief technology officer of the US Cyber Consequences Unit, said that when the hackers moved thier server from India to Belgium, they modified the original technique used to communicate with computers infected by Duqu.

Many experts believe that Stuxnet has changed the nature of cyberwarfare in that viruses, like Duqu, are more broad and complex than ever.

Image may be NSFW.
Clik here to view.
Nicole Henderson

About Nicole Henderson

Nicole Henderson is the Editor in Chief of the Web Host Industry Review where she covers daily news and features online, as well as in print. She has a bachelor of journalism from Ryerson University in Toronto. You can find her on Twitter@NicoleHenderson.

Duqu - Wikipédia

fr.wikipedia.org/wiki/Duqu

Duqu est un ver informatique découvert le 1 septembre 2011 et que l'on présume lié à Stuxnet. Le Laboratoire de Cryptographie et de Sécurité Système ...

www.crazyws.fr/

http://www.gang-stalking.be/

Watch, Link my links on Facebook

Siemens Simatic S7-300 (Photo credit: Wikipedia)

Le 13 mars 2013 : CINEY - Une maison abritant huit personnes s'est enflamée,

Le 13 mars 2013 : CINEY - Une maison abritant huit personnes s'est enflamée, samedi matin, à Corbion dans la commune de Ciney

Les flammes ont dévoré sauvagement, samedi matin, une maison abritant huit personnes d’une même famille, à Corbion-Leignon. Il était 8h31 quand l’appel a été lancé aux pompiers. Ceux-ci sont arrivés sur les lieux aux ordres du commandant Lallemand avec un imposant matériel. Le feu avait déjà fait pas mal de dégâts. Pour les huit personnes qui y habitaient, c’est en plus d’un toit, des tas de souvenirs qui sont partis en flammes. Et le vent assez fort qui régnait à ce moment a joué un grand rôle. Heureusement, tout le monde a pu sortir à temps et indemne de la maison.

Un pompier de Namur, voisin de la maison sinistrée qui passait, à ce moment, a même aidé, en attendant les pompiers, à sortir une bonbonne de gaz du brasier. Les causes du sinistre sont accidentelles. La police de Ciney a dressé le constat. Le bourgmestre de Ciney, M. Cheffert, voisin également de la maison, est descendu sur les lieux où est aussi arrivé le commissaire de garde, M. Liégeois. Les pompiers ont éprouvé pas mal de difficultés pour éteindre intégralement les flammes, le toit s’étant abattu dans l’intérieur comme un château de cartes. Ils ne quittaient les lieux que vers 17h. Ils ont dû encore aller arroser les ruines, dimanche matin. Sinistre total dont pour les habitants qui ont été, pour certains, relogés par le CPAS, pour d’autres,, en famille. Anciennement, cette maison était aussi maison de repos…

Image may be NSFW.
Clik here to view.
Corbion-Leignon-Incendie-messagerie-8-habitants-13-mars-2013-pompiers-retard

« On a attendu longtemps »

Certains membres de la famille "reprochaient" aux pompiers la longueur de temps pour arriver sur les lieux. En effet, l’appel a été lancé à 8h31 et ils ne sont arrivés sur les lieux qu’à 8h52. Le service 100 a-t-il confondu Corbion, près de Bouillon et Corbion-Leignon?

Il y a certainement eu un problème de dispatch. Ajouté à cela la situation de l’arsenal de Ciney, au beau milieu de la ville, voilà un incendie qui remet en cause la construction d’un nouvel arsenal sur un zoning proche des grandes voies d’accès. Cette construction serait assez urgente.  http://www.lavenir.net/article/detail.aspx?articleid=DMF20130318_00283485

 

http://schuldnervereinigung.wordpress.com/
http://mywakenews.wordpress.com/

Image may be NSFW.
Clik here to view.
Tous Ensemble à Emptinne

Tous Ensemble à Emptinne

 

 

http://vincent.detarle.perso.sfr.fr/catho/climat.html

http://sboisse.free.fr/technique/haarp.php

http://fr.wikipedia.org/wiki/Starfish_Prime

http://www.alterinfo.net/Tesla-ou-l-origine-du-projet-HAARP-1ere-partie_a59266.html

http://quantumfuture.net/

http://www.futurquantique.org/category/les-series/onde/

http://www.futurquantique.org/tag/haarp/

http://www.mecanopolis.org/

http://libertesinternets.wordpress.com/

http://newsoftomorrow.org/

http://www.educatinghumanity.com/2011/03/is-haarp-playing-role-with-natural.html

http://www.distance-healer.com/Chemtrails.html

http://www.geoengineeringwatch.org/geoengineering-is-destroying-the-ozone-layer/

http://alerte-la.blogspot.be/2013/04/haarp-le-climat-sous-controle.html

http://wiki.labomedia.org/index.php/VLF_Very_Low_Frequency

Image may be NSFW.
Clik here to view.
track and report a community terrorism

COMMAND AND CONTROL, CORPORATISM, TERRORISM, WAR ON, IN THE NAME OF ...

Security policies: misuse of resources


Kirill Kruglov

Kaspersky Lab Expert

Posted July 10, 13:00  GMT
Tags: Targeted Attacks, Security Policies

Image may be NSFW.
Clik here to view.

https://www.securelist.com/en/blog/8109/Security_policies_misuse_of_resources

According to surveys conducted in Europe and the United States, company employees spend up to 30% of their working hours on private affairs.
By multiplying the hours spent on non-business-related things by the average cost of the working hour, the analysts estimate the costs to companies amounting to millions of dollars a year.
Indirect losses may be even higher. If these employees – inadvertently or otherwise – assist hack attacks or identity theft, cause reputational damage or infringe copyright, the costs could be even greater.

The fact is that employees often use office computers to communicate on social networking sites, share links to online entertainment,
or download files from suspicious resources. At the same time cybercriminals are actively using social networking sites for phishing and the distribution of malware.
Many personal blogs, entertainment sites, file sharing services, torrent trackers, and files downloaded from them are infected. Passwords to email accounts are regularly hacked or stolen.

This article describes some problems which may arise from the improper use of office computers and demonstrate how to prevent similar incidents in the corporate network.

Targeted attacks

The threats that users face every day usually target mass audiences so the antivirus solution on their computers is enough to prevent most accidents. Targeted attacks are different: they are performed secretly, often using a non-standard approach; they are highly sophisticated and well organized. To achieve their goals the fraudsters use the most effective weapon to exploit any available software or social vulnerability.

Social engineering

In 2009, over 20 major software companies such as Google, Adobe, Juniper and Yahoo fell victim to the Operation Aurora targeted attack.

In one version of this attack, company employees were lured to the malicious sites via social networking sites and IM clients. Using social engineering techniques the scammers got acquainted with their potential victims, gained their confidence and did whatever was necessary to make the recipients open a link. Experience shows that to achieve this it was enough to:

  1. collect widely-available information from social networks about the user, his interests, preferences and contacts
  2. create an account, focusing on the interests of the victim and his personal data (the year and the place of birth, school, college)
  3. become "friends" with the people from the victim’s list of contacts
  4. get in touch with the victim using an established "cover"

When an account has been so thoroughly prepared it has every chance of getting potential victims to click on a suspect link.
If this fails, the scammer can try a more sophisticated trick, hacking the account of a user whom the victim fully trusts and sending links from there. This is often not difficult to do, especially if the victim’s trusted contacts include potentially vulnerable categories of user - elderly people, children or teenagers.

In a targeted attack, the link is likely to lead the victim to a site which contains a set of 0-day exploits that allow criminals to gain access to vulnerable computers.
It is clear that by communicating on social networks from the office computer, employees may unwittingly help hackers penetrate the corporate network.

Watering Hole

In addition to targeted attacks via social networks, so-called Watering Hole attacks are no less dangerous. The basic idea of ​​this type of attack is to find and infect the sites that are most often visited the company's employees.
Recently, the site of the U.S.
Ministry of Labor was infected but it is assumed that the real target of the attack was the Department of Energy: the criminals were trying to infect the computers
of DOE employees who regularly visited the Ministry of Labor’s website.

When a staff member at the company under attack opens the infected site, the code implemented in the body of the page secretly redirects the browser to a malicious site that contains a set of 0-day exploits.
Malware posted on infected websites, for example a server script, often acts selectively to implement malicious code in pages sent to the user who is most
relevant to the targeted company. Thus the scammers can hide the targeted attack from antivirus companies and IT security experts.

The fraudsters try to infect trusted legitimate sites. In these cases, even when users must carry out additional steps to run the exploit –
to turn on JavaScript, to allow execution of the Java applet to confirm the security exception, etc. – they are likely to innocently click "Allow" and "Confirm".

Image may be NSFW.
Clik here to view.

Protection

It’s clear that users play an important role in targeted attacks - they unwittingly allow scammers to attack the system.
Unfortunately, there is currently no technology that can eliminate human error from corporate network security.
However, reinforcing security policies with a few relevant technologies provides effective protection against targeted attacks by combating them at every stage -
from the first attempt to exploit a vulnerability to attempts to compromise the network.

Image may be NSFW.
Clik here to view.

Protection against exploits

Since targeted attacks use unique malware, signature-based detection is not enough to identify the malicious code that is used.
However, antivirus programs have long had more weapons at their disposal than mere signature-based detection.
The AEP technology (automatic protection against exploits) which uses DEP and ASLR mechanisms,
methods of heuristic analysis and control over executable code are able to block the execution of malicious code when it exploits a 0-day vulnerability.

If the fraudsters have managed to attack the system – via an exploit or a malicious program launched by the user –
network traffic control and application control will help to prevent further penetration into the corporate network.

Network traffic control

Once malicious code (a Trojan or exploit shell code) gets in the system, it usually attempts the following (one or more):

  • Establish connection with a command center (outbound connection)
  • Open ports for incoming connections
  • Download additional modules
  • Implement malicious code in other processes to maintain the connection with the command center
  • Gather information about the network, its systems and users
  • Send the harvested information (IP addresses, computer names and accounts, logins, passwords, etc.) to the fraudsters’ server.

Generally, having connected to the system, the scammers try to collect information about it and about the corporate network on which the computer is located. In order to collect local information the fraudsters
do not need extra privileges - the list of the running processes, installed software and patches, connected users, etc. can be found quite easily. Information about the corporate network – searches for other vulnerable systems, protection systems, shared folders, network services, servers, etc. – is collected using special scripts and utilities capable of masking their activity and bypassing security systems. All this information
is sent to the cybercriminals via the Internet for analysis before they prepare the next stage of the attack.

Using network traffic control technology (Firewall, IPS / IDS) system administrators and IT security specialists can
not only block dangerous network activity but also detect any penetration into the corporate network. Firewall and IPS / IDS can:

  • Block incoming/outgoing connections
    • by port
    • by domain name and IP address
    • by protocol
  • Generate statistical analysis of traffic (Net flow) for anomalies
  • Collect suspicious network traffic for further analysis
  • Detect / Block:
    • outgoing commands or similar output sent via the Internet
    • downloads of suspicious files from the Internet (additional malware modules)
    • transmissions of confidential information (IP addresses, logins, computer names, corporate documents, credit cards numbers, etc.)

Firewall and IPS / IDS can detect anomalies in the way network nodes interact as soon as the malicious code tries to contact the command center or actively scans the corporate network for other systems,
open ports, shared folders, etc. This anomaly detection allows IT security experts to promptly respond to the threat, preventing further intrusion which might compromise the corporate network.

Application control

Having accessed the target system, the criminals aim to consolidate their success: additional modules and utilities are downloaded onto the system and malicious code providing connection with the command center is often incorporated into trusted processes like explorer.exe, csrss.exe, smss.exe, etc.

Application Control can block the launch and download of untrusted programs and modules from the scammer’s hacker set and the HIPS policies should be used to block non-standard - and potentially dangerous - behavior from legitimate software. For example, browsers should not open the ports for incoming connections, the system processes (explorer.exe, csrss.exe, smss.exe, etc.) and other applications (calc.exe, notepad.exe, etc.) should not be connected to external servers and deploy malicious code to other trusted processes - this behavior should be prohibited.

To prevent criminals from gaining control of the system, IT security specialists should:

  • Prevent trusted or potentially vulnerable programs from implementing code in other processes
  • Restrict applications’ access to critical system resources and files only
  • Block potentially dangerous functions that are not a default feature of the applications (network access, installation of drivers, creation of screenshots, access to a webcam or microphone, etc.)

Systems which require the highest protection level should be safeguarded by the Default Deny mode which can block any program from starting up if it is not included in the white list stored locally or in the cloud.

File encryption

If the scammers seize control of the system and penetrate the corporate network, they may try to find and upload files which contain information that is potentially important for them:

  • Corporate documents, including security policies
  • Files containing credentials
  • Configuration files
  • Source codes
  • Private keys

This information can be found on the main victim machine as well as in open network folders on other systems. To prevent a confidential data leak,

IT security specialists should use file/disk encryption which can restrict local access to the confidential (protected) information.

Data is also transferred in an encrypted form. Even if the criminals manage to download something, they will not be able to read the content of the encrypted files.

Image may be NSFW.
Clik here to view.

Security policies

In isolation none of the above technologies can effectively prevent a targeted attack. In order to protect the corporate network all these technologies must be well integrated and carefully tuned.

However, system administrators and IT security specialists should also use administrative protection measures:

  • User education. All users must:
    • Know and observe company security policies
    • Understand the ​​possible consequences of the Internet threats, such as phishing, social engineering or malware sites
    • Inform the security service about all incidents.
  • Control over user access rights and privileges:
    • Any rights and privileges should be granted only when necessary
    • All rights and privileges (access) granted to the users should be recorded
  • Scan the systems for vulnerabilities and unused network services:
    • Detect and analyze vulnerable network services and applications
    • Update vulnerable components and applications. If there is no update, vulnerable software should be restricted or banned.

Many of these measures can be automated. For example if security policies are violated, special software shows the user a warning message.
Systems Management technology can be used to search for network services and unauthorized devices, vulnerabilities and automatic updates of vulnerable applications.

Conclusion

Misuse of company resources can lead to both direct financial losses and a serious IT security incident. While communicating on social networking sites or viewing websites on the office computer,
employees can become unwitting victims and involuntary allies of criminals who plan targeted attacks.

In the second part of the article we will describe an incident involving the use of personal email, software and unlicensed content on the corporate network and advise on protection measures to prevent such incidents.

 

Image may be NSFW.
Clik here to view.
Journée du patrimoine à la centrale nucléaire de Chooz
Journée du patrimoine à la centrale nucléaire de Chooz

Why Nullification?

Why Nullification?

by  on August 26, 2013 in NullificationStrategy

The TRUTH about nullification is that it is legitimate, and it is the only way to effect a meaningful check on the federal government when the executive, legislative, and judicial branches unite on an incorrect interpretation of the Constitution, and threaten the independence of the states and the reserved rights of the People.

The federal government CANNOT be permitted to hold a monopoly on constitutional interpretation. If the federal government has the exclusive right to judge the extent of its own powers, as Madison and Jefferson warned in 1798-99, it will continue to grow – regardless of elections, the separation of powers, and other limits on government power. Nullification has always been available to push the government back within the boundaries of the Constitution, but for too long, those hostile to the Constitution have insinuated – FALSELY – that the doctrine was the reason for the Civil War and for segregation, thereby trying to use shame to invalidate it.

We should take a cue from Patrick Henry. While others were celebrating the Constitution and rejoicing that a more effective compact was created, Henry urged them to cool their heads and take a step back  – to look carefully at the document they were asked to ratify.  It was his opinion that the government created by the Constitution would tend to concentrate power, strip power from the states, and become no better than England’s monarchy (“it squints toward monarchy”).  He urged Virginia to reject the Constitution. He reminded the delegates that trade, power, and security should not be the first concerns on their mind.  He said the proper inquiry should be “how your liberties can be better secured, for liberty ought to be the direct end of your government.”

On that first day of the Virginia Ratifying Convention, June 5, 1788, Patrick Henry addressed the delegates with these words:

Liberty, the greatest of all earthly blessing — give us that precious jewel, and you may take everything else!  Guard with jealous attention the public liberty. Suspect everyone who approaches that jewel. Unfortunately, nothing will preserve it but downright force. Whenever you give up that force, you are inevitably ruined.

When the American spirit was in its youth, the language of America was different..  Liberty, sir, was then the primary object. We are descended from a people whose government was founded on liberty: our glorious forefathers of Great Britain made liberty the foundation of everything. That country is become a great, mighty, and splendid nation; not because their government is strong and energetic, but, sir, because liberty is its direct end and foundation. We drew the spirit of liberty from our British ancestors: by that spirit we have triumphed over every difficulty. But now, sir, the American spirit, assisted by the ropes and chains of consolidation, is about to convert this country into a powerful and mighty empire. If you make the citizens of this country agree to become the subjects of one great consolidated empire of America, your government will not have sufficient energy to keep them together. Such a government is incompatible with the genius of republicanism. There will be no checks, no real balances, in this government. What can avail your pecious, imaginary balances, your rope-dancing, chain-rattling, ridiculous ideal checks and contrivances? But, sir, we are not feared by foreigners; we do not make nations tremble. Would this constitute happiness, or secure liberty? I trust, sir, our political hemisphere will ever direct their operations to the security of those objects.”

http://www.gang-stalking.be/GANG-STALKING-300-TEMOIGNAGES-DE-VICTIMES-EUROPEENES.html


The jury is still out on this thing we call the Great American Experiment.

We separated from Great Britain when we insisted on governing ourselves consistent without our own values. Those values were articulated in the Declaration of Independence. Contrary to the “divine right of Kings” which was the system respected in Britain, the American colonies would establish a government “of the people, by the people, and FOR the people.” It would go one step further.. it would establish a government whose powers were derived from the people themselves (so that the people could always take them back when they were fed up with that government).

While the British people had to stand up for their rights many times, Americans have never done so since the Revolutionary War. The British protested and demanded that the King respect their rights in 1100 (resulting in the 1100 Charter of Liberties), in 1215 (the Magna Carta or “Great Charter”), in 1628 (the Petition of Right of 1628), in 1641 (The Grand Remonstrances of 1641), in 1679 (the Habeas Corpus Act), and finally in 1689 (English Bill of Rights of 1689).  [The Grand Remonstrances and The English Bill of Rights, like our Declaration of Independence, set out lists of grievances against the King for usurpation of the rights that were proclaimed in the earlier charters]. The interesting thing about history of the British people in asserting their rights and demanding restraint from their government is that each time they did so, they were able to secure greater freedom. We can take a lesson from British history.

Image may be NSFW.
Clik here to view.
the neverending porch
the neverending porch (Photo credit: loungerie)

There is another great distinction between the British system and ours. When the kings signed those charters, they often did so very reluctantly. For example, almost immediately after  King John (the infamous King John of the Robin Hood legend) signed the Magna Carta, he ignored it. It was ignored on and off until the 17th century. The point is that the rights of the people were enjoyed at the mercy of the king. There was no meaningful way to enforce the charters. Parliament tried to, but as with King Charles I (son of King James I, who granted the charters to the Pilgrims and Puritans to settle in America), when Parliament tried to force his hand, he turned around and dissolved it.

Our Founding Fathers intended that our Constitution and Bill of Rights would be stand the test of time, guarantee the proper relationship between the People and government, and not jeopardize the rights and liberties of the people. That’s why they divided power among two equal sovereigns (power to check power) and why they included so many checks and balances.

To deny nullification is a dangerous decision. To deny it is to: (i) deny the wisdom of our Founders; (ii) trust your rights to a government which is growing more hostile to them by the day; and (iii) submit to the notion that government is capable of restraining itself and capable of divesting itself of all the unconstitutional powers it has already assumed and repealing such laws it has passed.

Liberty must always come first. Liberty is a gift, as KrisAnne Hall says, that we must pay forward. We don’t pay it forward by not second-guessing the actions of the federal government, especially when we know it likes to enlarge its powers at every chance.  We don’t pay it forward by accepting the government’s version that constitutional remedies that were put in place by our founders to preserve the rights on which this country are founded are no longer valid. We pay it forward by preserving it. We do that by using every option we have to limit the intrusion of government in our lives and over our property. Our Constitution is not the living, breathing document that the progressives and federal judges claim it to be. For if that is the case, it can be twisted so completely as to destroy our understanding of it.  The only things that is living and breathing are us, the citizens of the United States, who have inherited a precious gift of freedom to live our lives and raise our families. And so let’s use the common sense and spark of brilliance that God so endowed us with when he also endowed us with free will and inherent rights.

http://blog.tenthamendmentcenter.com/2013/08/why-nullification-2/#.Ui84wK6mI7w

Image may be NSFW.
Clik here to view.
Neverending
Neverending (Photo credit: TinaOable)


ICAACT Phase III testing Mr Benjamin Simon- report on rf scanning in a schielded environment from Benjamin Simon on Vimeo.

BENJAMIN SIMON - VOICE TO SKULL - 24/7 - DETECTION - ANECHOIC CHAMBER - IMPORTANT

https://www.facebook.com/photo.php?v=10201818253525878&l=3294741884236777434

Au niveau physique, je suis detecté par les plus grands spécialistes au monde : Lars Drudgaard, Barrie Trower, Dr Jhon Hall ...regroupés au sein de http:/www.icaact.org pour combattre le terrorisme le plus virulent et ordurier ayant jamais existé !

Ces benevoles ont composé des dossiers pour des milliers de victimes de par le monde qu'ils sillonnent de long en large pour aider des personnes en cours d'assassinats par les ondeurs de cointelpro-gang-stalking, ect

http://fr.scribd.com/doc/157473281/stalking-organisationnel-directed-energy-weapons-300-victimes-EUROPE

https://www.facebook.com/notes/benjamin-simon/local-cops-are-flagged-and-involved-in-the-sg-os-for-four-years-in-many-ways/10201766571273854

RESUME

http://fr.scribd.com/doc/133806106/Police-de-Ciney-Last-Mail-About-Local-Gang-Stalking-Belgium

21 Janvier 2013

1 - http://www.scribd.com/doc/124898065/Madame­La­Procureur­Du­Roi­de­Dinant­Belgique­21­Janvier­Fax­Gang­Stalking­B­Simon

29 juillet 2013

2 - http://www.scribd.com/doc/102015551/Monsieur­Appart­Procureur­Du­Roi­Dinant­Gang­Stalking­Publique

15 fevrier 2013

3 - https://docs.google.com/file/d/0B-qPPBUqE7YjYWlqeFE3bGdnMTg/
4 - https://docs.google.com/file/d/0B-qPPBUqE7YjSGZ4TnJ1M2hDU1U/edit
5 - https://docs.google.com/file/d/0B-qPPBUqE7YjeUgwYjNFRDcxTlk/edit
6 - https://docs.google.com/file/d/0B-qPPBUqE7YjOVhrblJzc3NfRms/edit
7 - https://docs.google.com/file/d/0B-qPPBUqE7YjTzJyc3RPY3dmZnM/edit

Mes ecrtits sont validés par Roberto Scaruffi....qui suit mon travail depuis le debut.

Roberto Scaruffi,Rio de Janeiro, RJ, Brazil• Degree [“doctor”] in Political Sciences [major in Economics] from the University of Turin; • EAP course by the Essex University (score 7 in IELTS); • DEA by the UCL in LLN (Belgium); • completed and finally [Spring 2002] academically perfect Ph.D. research by the UCL in LLN (Belgium) [[formal PhD still not awarded since an annihilation operation (an [failed] operation for producing State/“government” managed terrorism) of Italian Secret Police Bureaux with very active cooperation of NATO Secret Police Bureaux at world level; ask them... http://www.uclouvain.be/ ; http://www.carabinieri.it/ ; http://www.comiteri.be/ ; http://www.sicurezzanazionale.gov.it/ ; http://www.nato.int/ ; http://www.interpol.int/ ; information from here: http://scaruffi.blogspot.com/ ; the Ph.D. research is academically perfect and it is NOT failed!]]; • Chinese language classes by three universities in China [PRC] and Taiwan [RoC]

http://robertoscaruffi.blogspot.com/

Je possède toute les preuves nécessaires pour l’annihilation de ce réseau depuis deux ans.

La police en a. Les flics de Ciney et d'Andenne ont participé à mon stalking depuis quatre ans via des faux documents entre autre (disponible et avérés faux).

J'ai tout donné a la POLICE Ciney en juillet il y a deux ans et ils on continué à me détruire malgré que le dossier les mettait hors cause à mon sujet. Ils m'ont fait taire à chaque rencontre de manière dégueulasse.

Je suis maintenant sans argents et sans voiture à cause de cette affaire et je n'ai jamais pu être entendu.

Au niveaux informatique, j'ai toute les preuves nécessaires de mon hacking depuis plus e trois ans (creeper = stuxnet, le worm d'arpanet) et j'ai le droit de recevoir l'analyse de mon web.

JE SUIS BLOQUES. Nous sommes plein de victimes et nous avons des chose (VITALES) les unes pour les autres.

 

http://neverending1.wordpress.com/2013/09/04/gang-stalking-letting-someone-into-facebook-its-like-letting-someone-into-your-home/

http://lissakr11humane.com/

http://nwsassociates.wordpress.com/2013/09/04/how-to-bank-online-safely/

http://scaruffi.blogspot.com.br/

Image may be NSFW.
Clik here to view.
Corbion-Leignon-carte-postale-la-Corbionnaise-chapelle-a

 

Qui se cache derrière le puissant logiciel espion découvert chez Belgacom ?

LE VIF du mardi 17 septembre 2013 à 11h50

Qui se cache derrière le puissant logiciel espion découvert chez Belgacom ? Accuser les Etats-Unis ou Israël serait prématuré. Mais enfin, le faisceau de présomptions est là.

Image may be NSFW.
Clik here to view.
begacom piraté depuis aux moins 2 ans ...
begacom piraté depuis aux moin 2 ans ...

Didier Bellens, CEO de Belgacom. © Belga

Résumons : pendant au moins deux ans, Belgacom a été victime d'une attaque informatique dont le niveau de perfectionnement laisse penser qu'il s'agit de l'oeuvre d'un Etat. La cyberattaque en question visait surtout à récolter des informations sur les appels téléphoniques émis vers des pays tels le Yémen ou la Syrie. Il ne s'agit pas ici d'un vulgaire virus ni d'un "hacking" exploitant une faille de sécurité, comme certains petits génies de l'informatique sont capables d'en commettre dès l'adolescence. Ni d'attaques extérieures malveillantes à la Anonymous, puissantes, brutales, mais dont la force tient surtout au nombre d'attaquants. Non. On parle ici, selon le parquet fédéral, d'une technique très pointue fondée sur l'emploi d'un logiciel malveillant, lequel se serait propagé sur plusieurs postes du réseau informatique interne de Belgacom. Son but : extraire des informations pour les envoyer à ses commanditaires.

Bref, un botnet. La description lacunaire qu'en ont donnée les autorités ne permet pas de l'identifier, mais il ne serait pas étonnant qu'il s'agisse d'une variante ou d’un cousin de Flame. Découvert en mai 2012 au Moyen-Orient, ce concentré de technologie destiné à l'espionnage avait été décrit par des pointures de la sécurité informatique comme "le logiciel malveillant le plus sophistiqué jamais rencontré". Flame, selon l'éditeur d'antivirus Kaspersky, présentait quelques liens de parenté avec Stuxnet, un autre "malware" hyper perfectionné qui servait, lui, à saboter les centrifugeuses iraniennes. On a su depuis que Stuxnet était le fruit d'une opération conjointe entre les Etats-Unis et Israël. Baptisée "Jeux olympiques", l’opération avait été lancée sous l'ère du président Bush et maintenue sous l'administration Obama. Stuxnet lui-même se rapprochait sous certains points de Duqu, un autre agent 007 informatique qui s'intéressait de très près au programme nucléaire iranien.

Dans tous les cas - Stuxnet, Duqu, Flame ou encore la "chose" découverte chez Belgacom - la ou les cibles visées se situaient au Moyen-Orient. Accuser les Etats-Unis ou Israël serait trop hâtif. Mais enfin, disons que le faisceau de présomptions prend des allures de fagot.

Image may be NSFW.
Clik here to view.
how-to-stop-virus-into-computer
how-to-stop-virus-into-computer

Ce qui étonne surtout, c'est que les méthodes utilisées par ces menaces sont connues. La plupart ont été conçues voilà des années et sont désormais largement documentées, du moins dans leurs grandes lignes. Qu'il ait fallu deux ans à une cible stratégique comme le premier opérateur de téléphonie belge pour découvrir l'infection est révélateur. Soit sur le niveau de technologie mis en oeuvre, soit sur la confiance trop béate accordée à certains pays alliés, soit sur le manque de vigilance ou d'expertise belge en matière de cyberattaques. Qu'il ait fallu confier le nettoyage du système de Belgacom à une entreprise néerlandaise spécialisée ne rassure guère sur la troisième option.

http://www.levif.be/info/levif-blog/le-midi-du-vif/belgacom-piratee-surprenant/

Image may be NSFW.
Clik here to view.
ces-jeunes-devenus-criminels-belgique
ces-jeunes-devenus-criminels-belgique

http://gangstalkingbelgium.wordpress.com/2013/09/10/belgium-web-host-shuts-down-server-after-duqu-virus-detected/

http://gangstalkingbelgium.wordpress.com/2013/09/09/19-de-marco-de-2011-este-ano-assinala-se-o-40o-aniversario-do-creeper-o-primeiro-virus-dos-computadores/

http://gangstalkingbelgium.wordpress.com/2013/09/10/security-policies-misuse-of-resources-by-kirill-kruglov-kaspersky/

http://www.nazis.be/nazis-gang-stalking-Belgique-Benjamin-Simon-NOVEMBRE-2011.html

http://gangstalkingbelgium.wordpress.com/2011/11/27/computer-network-covert-usurpations-computer-network-operations/

Image may be NSFW.
Clik here to view.
Official photographic portrait of US President...

Image may be NSFW.
Clik here to view.
English: Trimaran Belgacom of Jean-Luc Nélias,...
English: Trimaran Belgacom of Jean-Luc Nélias, seen during or close to the Tall Ships' Races 2003. This trimaran is now known under the name Gitana 11. Français : Le trimaran Belgacom de Jean-Luc Nélias photographié durant les Tall Ships' Races 2003. Ce trimaran ORMA est maintenant connu sous le nom de Gitana 11. (Photo credit: Wikipedia)
Image may be NSFW.
Clik here to view.
English: Step7 communicates with a PLC Deutsch...
English: Step7 communicates with a PLC Deutsch: Kopplung von Step7 mit einer SPS (Photo credit: Wikipedia)
Viewing all 43 articles
Browse latest View live