Search

Pinecone Utopia

Comforting the disturbed, disturbing the comfortable

Category

Spy Agencies

HOW THE MOBILE PLATFORM IS USED TO TARGET CIA DIA TRAUMA BASED MIND CONTROL VICTIMS

mobile-platform-targeting.jpg

Remember, a computer multiplexer routes the signal to a Tower, Satellite or MOBILE PLATFORM and the Tower, Satellite or Mobile Platform relays the signal to the digital receiver similar to how cell phone technology works.  The digital receiver is tracked and pinpointed in real time just like a cell phone as CIA/DIA TRAUMA BASED MIND CONTROL depends on two things: Timing & Location.  However with CIA/DIA TRAUMA BASED MIND CONTROL technologies the digital receiver is not a phone.  It is a human brain.  The victims brain has been digitalized by the nanotechnology in the victims brain which adheres to and speaks to and decodes the neurotransmitters of the victims brain.  This is crucial information to understand or you will never understand how you are being attacked. Read the rest

Advertisements

How Long Have They Really Been Listening In?

Published on Aug 8, 2017 by Truthstream Media

Extraordinary CIA Renditions and Arbitrary Detentions, Far Beyond the “War on Terrorism”

The-NewYorker-image-extraordinary-renditions.jpg

Aug 2, 2017  by Prof. Marcello Ferrada de Noli

As a legalized concept of international acceptance, Human Rights is considered a ’modern’ instrument, brought by the United Nations in 1948 after the ‘horrors of the Second World War’. However, the legal protection of individuals under arrest can be traced centuries before. Persian king Cyrus the Great issued 2559 years ago a law establishing civil rights for all, to be applied even to those defeated in war, which included the detainees. The Romans followed suit in its “natural law” codex, then the Magna Carta of 1215, the French Revolution’s ‘Declaration of the Rights of Man and of the Citizen’ of 1789, etc.

Through that historical context, it is difficult to find a more flagrant – and also a more comprehensive– violation to the individuals’ civil rights, than the practice of ‘extraordinary renditions’. In essence, ‘extraordinary rendition’ is about the kidnapping of a foreign citizen by Intelligence or enforcement government agencies, act which is perpetrated in yet another country. This practice was commenced by the US government in 1987, with the abduction of a Lebanese citizen from a yacht that was in Italian waters. Read More

 

Rod Wheeler: “Follow arrest of Imran Awan closely. Connect the dots to “other cases” #SethRich The Outer Light

Published on Jul 26, 2017  by Outer light

Rod Wheeler was a former DC homicide detective, who was hired by the family of Seth Rich, to investigate. He how eludes to the fact, that the Seth Rich investigation is tied to the arrest of Imran Awan.

 

Origins and Techniques of Monarch Mind Control

josef-mengele-1935-e1355331184843.jpg

December 12, 2012 by the Vigilant Citizen

Monarch Programming is a method of mind control used by numerous organizations for covert purposes. It is a continuation of project MK-ULTRA, a mind-control program developed by the CIA, and tested on the military  and civilians. The methods are astonishingly sadistic (its entire purpose is to traumatize the victim)  and  the expected results are horrifying: The creation of a mind-controlled slave who can be triggered at anytime to perform any action required by the handler.  While mass media ignores this issue, over 2 million Americans have gone through the horrors of this program. This article looks at the origins of Monarch programming and some of its methods and symbolism. Read On

The CIA’s six most dangerous FOIA topics

secrets_of_the_cia.png

June 21, 2017 by Emma Best

In a 1978 memo urging the curbing of the newly-empowered Freedom of Information Act, the CIA compiled a list of six FOIA topics considered to be the most potentially dangerous to the Agency’s reputation. Read more

GANG STALKING/TARGETED INDIVIDUALS: The Tew Hypothesis w/Eric Karlstrom & Anthony Patch

Published on Jul 20, 2017   by The Kev Baker Show

Dr Eric Karlstrom is back on the show to continue our series on the MK-ULTRA of the 21st Century – GANG STALKING & CITIZEN HARASSMENT! To add to the conversation we have Anthony Patch joining the conversation & between our two guests they give an extensive breakdown of the techniques, technology & tactics deployed against Targeted Individuals. Dr Karlstrom goes over what he calls “The Tew Hypothesis” which breaks down the finer details of these DoD programs.
http://www.gangstalkingmindcontrolcul…

A List of 20 Ex-Agents Who Have Exposed the US Military Intelligence Complex – Part 2

NSA-eagle-data-surveillance-479x472.jpg

July 22, 2017  by Makia Freeman

The Military Intelligence Complex (MIC), in many ways, is the biggest threat to a free society. Since the Military Intelligence Complex has access to anyone’s personal and private information at will, the potential for bribing, blackmailing, manipulating or otherwise controlling individuals – from the parking inspector to the president – remains intact. This article is the second and final part of the series (click here for part 1). The list of former agents and whistleblowers below, all of whom have exposed the Military Intelligence Complex in some way, includes not only ex-CIA officers, but also ex-NSA, ex-FBI and ex-DIA whistleblowers, as well as whistleblowers from other nations outside the USA. Read More

Data Mining & Alternative Realities with Whistleblower Karen Rodriguez

Published on Jul 17, 2017  by pineconeutopia

An ex-silicon valley white hat hacker and whistle blower, Karen Rodriguez joins the World Beyond Belief in a discussion about data mining, string theory and alternative realities specifically as it applies to the asymetrical war being waged against innocent civilians. She reveals information that links together various AI technology which may play a major role in both physical gang stalking, harassment, and the use of energy weapons to torture and kill the disobedient population of people with open minds.
Sentient World Simulation: A Continuously Running Model of the Real World http://www.krannert.purdue.edu/academics/mis/workshop/ac2_100606.pdf
Karen’s Blog
https://cyberreconnaissanceblog.wordp…

Create a free website or blog at WordPress.com.

Up ↑