Welcome to the blog of Indian 007

Like a beacon unto the world ...

Thursday, January 26, 2012

Climategate 2.0: New E-Mails Rock The Global Warming Debate

James Taylor, Forbes.com

A new batch of 5,000 emails among scientists central to the assertion that humans are causing a global warming crisis were anonymously released to the public yesterday, igniting a new firestorm of controversy nearly two years to the day after similar emails ignited the Climategate scandal.

Three themes are emerging from the newly released emails: (1) prominent scientists central to the global warming debate are taking measures to conceal rather than disseminate underlying data and discussions; (2) these scientists view global warming as a political “cause” rather than a balanced scientific inquiry and (3) many of these scientists frankly admit to each other that much of the science is weak and dependent on deliberate manipulation of facts and data.

Regarding scientific transparency, a defining characteristic of science is the open sharing of scientific data, theories and procedures so that independent parties, and especially skeptics of a particular theory or hypothesis, can replicate and validate asserted experiments or observations. Emails between Climategate scientists, however, show a concerted effort to hide rather than disseminate underlying evidence and procedures.

“I’ve been told that IPCC is above national FOI [Freedom of Information] Acts. One way to cover yourself and all those working in AR5 would be to delete all emails at the end of the process,”writes Phil Jones, a scientist working with the United Nations Intergovernmental Panel on Climate Change (IPCC), in a newly released email.

“Any work we have done in the past is done on the back of the research grants we get – and has to be well hidden,” Jones writes in another newly released email. “I’ve discussed this with the main funder (U.S. Dept of Energy) in the past and they are happy about not releasing the original station data.”

The original Climategate emails contained similar evidence of destroying information and data that the public would naturally assume would be available according to freedom of information principles. “Mike, can you delete any emails you may have had with Keith [Briffa] re AR4 [UN Intergovernmental Panel on Climate Change 4th Assessment]?” Jones wrote to Penn State University scientist Michael Mann in an email released in Climategate 1.0. “Keith will do likewise. … We will be getting Caspar [Ammann] to do likewise. I see that CA [the Climate Audit Web site] claim they discovered the 1945 problem in the Nature paper!!”

The new emails also reveal the scientists’ attempts to politicize the debate and advance predetermined outcomes.

“The trick may be to decide on the main message and use that to guid[e] what’s included and what is left out” of IPCC reports, writes Jonathan Overpeck, coordinating lead author for the IPCC’s most recent climate assessment.

“I gave up on [Georgia Institute of Technology climate professor] Judith Curry a while ago. I don’t know what she thinks she’s doing, but its not helping the cause,” wrote Mann in another newly released email.

“I have been talking w/ folks in the states about finding an investigative journalist to investigate and expose” skeptical scientist Steve McIntyre, Mann writes in another newly released email.

These new emails add weight to Climategate 1.0 emails revealing efforts to politicize the scientific debate. For example, Tom Wigley, a scientist at the University Corporation for Atmospheric Research, authored a Climategate 1.0 email asserting  that his fellow Climategate scientists “must get rid of” the editor for a peer-reviewed science journal because he published some papers contradicting assertions of a global warming crisis.

More than revealing misconduct and improper motives, the newly released emails additionally reveal frank admissions of the scientific shortcomings of global warming assertions.

“Observations do not show rising temperatures throughout the tropical troposphere unless you accept one single study and approach and discount a wealth of others. This is just downright dangerous. We need to communicate the uncertainty and be honest. Phil, hopefully we can find time to discuss these further if necessary,” writes Peter Thorne of the UK Met Office.

“I also think the science is being manipulated to put a political spin on it which for all our sakes might not be too clever in the long run,” Thorne adds.

“Mike, The Figure you sent is very deceptive … there have been a number of dishonest presentations of model results by individual authors and by IPCC,” Wigley acknowledges.

More damaging emails will likely be uncovered during the next few days as observers pour through the 5,000 emails. What is already clear, however, is the need for more objective research and ethical conduct by the scientists at the heart of the IPCC and the global warming discussion.

James M. Taylor is senior fellow for environment policy at The Heartland Institute and managing editor of Environment & Climate News.

 Source: Forbes.com

Tuesday, January 24, 2012

CDC Increases Pressure on Parents to Vaccinate Kids with Deadly Toxins

Curt Linderman Sr., Infowars.com, January 16, 2012

Recently, the CDC, in coordination with HHS and state health departments, has been increasing the pressure on parents to vaccinate their children. In many cases, pressure has been brought on families with phone calls, school notes sent home and now it seems, knocking on your doors. In this video, Natomas, California school officials and a school nurse are seen going door to door trying to vaccinate school children that have not had one of the many DTaP vaccines recommended by the CDC schedule (1). While these school officials are more than likely, concerned about federal dollars that they will be refused for each child that is not fully vaccinated (2) there is little doubt that there is a far more nefarious agenda at hand.


NORC (National Organization for Research at the University of Chicago) is currently working closely with CDC to ensure that all of America’s children are fully vaccinated with the toxic, sickness inducing and physically and mentally debilitating cocktail of toxins, carcinogens, DNA animal fragments and viruses through the National Immunization Survey (3). Calls to your home will be coming soon if you have young children or even teenagers. These calls will most certainly begin with a nice voice at the end of the line asking questions and perhaps even exhibiting true and deep concern regarding the health of your child. In some cases, the actual operator/survey taker might even feel that they are performing a righteous task for the good of the nation and your children. That is the farthest thing from the truth.

So what is the vaccine agenda all about and why is the CDC “ramping-up” their efforts to vaccinate every American? The notion that vaccines are about preventing disease is the first mistake most people make. This might have been the case back when Jenner originally noted that milk maids exposed to cow pox were seemingly unaffected by the more lethal small pox, but this agenda changed dramatically in the early 1900s. In fact, the change in the underlying reasoning for vaccination was so dramatic and fantastically disturbing that even many of the citizens considered to be “awakened” to the globalist agenda cannot comprehend its diabolical nature. Perhaps this is a defense mechanism, I’m not sure, but you must understand the medical history of the past 100 years to truly see what is going on and where we are headed.

What most American’s in this country call “traditional” medicine today started with the Flexner Report of 1910 (4). Flexner was called on to research and write this report by the Rockefeller and Carnegie eugenics organizations that were also working with the early European Eugenics societies (5). The immediate agenda of this report was to control the citizens and ultimately the population numbers (through the eradication of minorities and the mentally deficient). The way to do this was to turn profits and attention away from the healing traditions of nutrition and homeopathy and swing it 180 degrees towards the petroleum and pharmaceutical industry agenda of sickness, indebtedness and death. The first casualties where the medical schools of the early 1900s: before the Flexner Report, there were 650 medical schools across the United States teaching the true healing arts. By 1918 there were 50 left. These remaining schools were the ones that dropped to their knees and offered to worship at the altar of eugenics, the Rockefeller and Carnegie religion.

Why the history lesson? Because we have to understand that the modern vaccination policies of the western world have never been about healing and protecting the citizens. Most of us understand that things are moving at an increasingly accelerated pace regarding the placement of the New World Order government and vaccines play a crucial role in this agenda. Reports of FEMA camps, TSA checkpoints on our streets and in our shopping malls, commercials encouraging neighbors to turn each other in to the authorities for violations or concerns are daily occurrences now. A strong, healthy and smart citizenry is the most dangerous threat to tyranny and vaccines are a major part of the NWO solution to this problem.

The increase in autism, asthma, juvenile diabetes, juvenile arthritis, ADD, ADHD, Primary Immunodeficiency Syndrome, the staggering numbers of cancers among our children and more, are caused by the industrial medical complex, creating a need for pharmaceuticals that turn our children into walking, sometimes talking, little drug addicted zombies that can be assured to simply walk into the FEMA camps without any hesitation whatsoever. Add to this, the recent heavy push within the CDC to ensure that young adults are getting their booster shots and the elderly are getting their flu / pneumonia and shingles vaccines (6) and you have a populace that will willingly give up their freedoms for relief from the maladies caused by their new masters.

NORC’s involvement with the CDC in the push to vaccinate every American citizen is extremely concerning. The very fact that NORC is a Chicago University based organization simply cannot be coincidental. Our socialist Commander-in-Chief and the horribly corrupt nature of Illinois politics have to play a factor. Further investigation into NORC and their affiliations illustrates the eugenic nature of the vaccine agenda as if we were once again reading from the Rockefeller/Carnegie, eugenics inspired, Flexner Report. 

NORC’s “selected Clients” page on their website(7) reads like a Who’s Who of the corporate greed and eugenics movement. Firms and organizations like; The Bill and Malinda Gates Foundation, JP Morgan Chase Foundation, Kaiser Family Foundation, AMA, Children’s Hospital of Philadelphia, U.S. Dept. of Justice and interestingly enough, foreign partners such as Deutsche Invest und Entwicklungsgesellschaft (DEG), George Soros’ Open Society of Europe, The European Bank for Reconstruction and Development as well as The Global Development Network.

Even if you haven’t looked closely into the numerous vaccine controversies, if you have a fundamental understanding of the New World Order and what they have in store for us, the CDC’s partnership with NORC and their need for ensuring that every American get vaccinated should be enough to do exactly what the woman in the above video clip did when they come to your doorstep: Tell them to &^%$ off and slam the door!
1. http://www.youtube.com/watch?v=38V_31p7jPI
2. http://www.whale.to/vaccines/aaps.html
3. http://www.norc.org/Research/Projects/Pages/national-immunization-survey.aspx
4. http://jama.ama-assn.org/content/291/17/2139.full
5. http://www.eugenics-watch.com/roots/chap12.html
6. http://www.cdc.gov/vaccines/vpd-vac/adult-vpd.htm
7. http://www.norc.org/About/Pages/representative-clients.aspx
 Source: Infowars.com

Sunday, January 22, 2012

The worst thing about SOPA

Have you heard of the Golden Mean Fallacy?  I would link to the Wikipedia page, but they’re blacked out today, so here’s an excerpt from its description:
…a logical fallacy which asserts that given two positions there exists a compromise between them which must be correct.  [It] implies that the positions being considered represent extremes of a continuum of opinions, and that such extremes are always wrong, and the middle ground is always correct. This is not always the case. Sometimes only X or Y is acceptable, with no middle ground possible. Additionally, the middle ground fallacy allows any position to be invalidated, even those that have been reached by previous applications of the same method; all one must do is present yet another, radically opposed position, and the middle-ground compromise will be forced closer to that position.
I added emphasis to a very important part of the explanation.  All you have to do to make something bad look good is come up with something even worse to compare it to.  And given the human capacity for imagination, that’s not such a difficult task.

You’ve probably heard of SOPA and Protect-IP by now.  Pretty much everyone who looks at these bills, outside of the entertainment industry, agrees on a few simple points:
  1. These bills would give private corporations the power to censor the Internet
  2. These bills are unconstitutional, as they violate the 1st amendment
  3. These bills are evil and need to be stopped
Well, there’s some good news, and some bad news.  The good news is that as more and more people are finding out about them, they’re talking to their congressional representatives, and it looks like support for these bills is falling.  It’s looking likely that they won’t pass.

The bad news is the Golden Mean Fallacy.  Take a look at Stop American Censorship, one of the sites that’s working to coordinate the opposition to this legislation.  Check out the quotes down at the bottom, from experts on the subject.  I was a bit horrified to see multiple people saying, in effect, “the DMCA is OK, but this goes too far!”

That’s the Golden Mean Fallacy talking.  If we accept the Digital Millennium Copyright Act as legitimate, we’ve already lost.  It’s every bit as unconstitutional and every bit as evil as SOPA, and to be honest I’m  shocked that it’s apparently never been subject to judicial review on 5th or 14th amendment grounds.  You probably know of the 5th amendment as the one that says you can “take the 5th” in court, meaning that you have the right to not incriminate yourself.  But it also guarantees that you cannot “be deprived of life, liberty, or property, without due process of law.”  The 14th amendment reiterates the whole “due process of law” thing, applying it to the states as well as the federal government.

In layman’s terms, we have a guarantee, repeated twice, in the Bill of Rights that nobody can be punished for a crime without due process of law, which means (among other things) that they have the right to a fair trial.  This is just as important as a foundation for our freedoms as the First Amendment, and the DMCA tramples all over it.

How does a copyright act trample on the right to due process?  I know it sounds strange at first, but the DMCA is a strange law.  It allows copyright owners to send takedown notices to allegedly-infringing Internet sites, claiming that they are hosting infringing material.  Under the law, this material must be removed right away, unless the owner believes that no infringement is taking place and is willing to start a fight over it.

This may not sound too unreasonable, until you realize that it puts the burden of proof on the accused.  It throws one of our most sacred legal traditions, the presumption of innocence (aka “innocent until proven guilty”) out the window.  Now you’re guilty, by default and without a trial, until proven innocent!  You need look no further than chillingeffects.org to see the damage that this is doing, by allowing copyright holders to make false or exaggerated copyright claims and get away with it.  The presumption of innocence and the right to due process exists for a reason!

But the DMCA does even worse than that: it also allows the use of DRM technology.  Have you ever had a problem activating a program that you legitimately bought?  Something goes wrong and you can’t use it even though you’ve paid for it and done everything right?  Then you can see the problem here.  It’s like the takedowns, but even worse, as you have no way to fight it.  The DRM software is unaccountable.  If it has a bug, (and all software has bugs,) you’re not innocent until proven guilty.  You’re not even guilty until proven innocent.  You’re simply guilty, and screw the proof!  It doesn’t matter if you actually broke the law or not, the copyright owner’s interpretation of the law is enforced upon you and there’s nothing you can do about it.

So the worst thing about SOPA is not SOPA at all.  It’s the opportunity it provides for the Golden Mean Fallacy to legitimize another piece of equally-evil legislation.  Until the DMCA is repealed, and not only repealed but reversed, giving DRM technology the legal status it truly deserves, which is that of malware with no legitimate use, problems like SOPA will continue popping up again and again, because it’s built on the foundation of rights abuses codified by the DMCA.

Wikipedia is blacked out today, replacing its articles with a page urging people to contact their Congressmen in opposition to SOPA.  That’s a good gesture, but ultimately meaningless.  SOPA is getting enough opposition now that it’s not going to pass.  We’ve already won this battle.  What people need to contact their congressmen about is rooting out the source of this abuse.  “Repeal and reverse the DMCA,” not “stop SOPA,” needs to be the soundbite on people’s minds if we’re to truly protect our freedom in the Internet Age.

Source: TURBU Tech

Sunday, January 15, 2012

How to Disappear Completely (From the Internet)

Leaving the Web behind might just be the key to your privacy—and sanity.

by John Herrman, Popular Mechanics

If you’ve ever used the Internet, you have an online identity. Maybe it’s slight: a Hotmail account here, a comment on a news story there. Or maybe you’ve been more prolific, leaving a trail of usernames, accounts, messages, and profiles across the digital landscape. In any case, an active internet user owes it to himself to do a bit of self-Googling. What you’ll find will be both enlightening and humbling—even worrying.

Unease about your online identity shouldn’t be limited to how much information is publicly available. Online advertising is the engine that drives the Internet’s largest sites, including Google and Facebook, and it depends on your personal—and allegedly private—data for fuel. "The government, companies, and marketers all want us to share as much information as possible because that’s what’s good for them," says Rebecca Jeschke of the Electronic Frontier Foundation, "and it’s time to think of what’s good for us."

While most Internet users seem fine with privacy tradeoffs, the lack of control will lead some to consider the nuclear option: total Internet evacuation. But taking yourself offline isn’t as simple as logging out—it requires a little bit of work. Here’s how.

Popular Sites

When a website is new, the last thing its creators are thinking about is how to help users leave. Thankfully, many of the Internet’s largest identity properties—Facebook, Google, Amazon, and Microsoft—are fairly mature and have evolved enough to offer well-defined, if well-hidden, escape plans.

If you’ve ever used Gmail, Google Docs, Google+, or Picasa, to name a few, then you have a Google account. Google accounts can contain an astounding amount of personal data—check google.com/dashboard to see exactly how much—but removing it is a straightforward process. Before you hit the switch, be sure to back up any information you want to keep—a Google account can be recovered for only a few months after its deletion. Google doesn’t have a software tool for exporting data from its services, but most services have their own, typically found under the settings menu on the upper-right-hand side of the screen. As with other webmail services, the easiest way to back up your Live or Hotmail messages is to add your account to a mail app such as Outlook or Apple’s Mail before deletion—this will have the added benefit of backing up your contacts.

Once you’ve copied your important data offline, navigate to your Google account dashboard (google.com/accounts). Next go to My Products, and click Edit. Then select Close Account and Delete All Services and Info Associated With It. You’ll be presented with a list of Google services that you’ve used in the past. (In my case, this included three that I didn’t remember signing up for.) Check the box next to each, along with the two are-you-really-sure boxes at the bottom, and select Delete Google Account. The account will be instantly wiped from the public Internet, but the company warns on its website that "residual . . . accounts may take up to 60 days to be deleted from our active servers and may remain in our backup systems," but not be accessible in any way, "for an additional period of time."

Until 2008, there was no obvious way to permanently delete your information from Facebook. Instead, there was a Deactivate option only, which removed your profile from public view but left it on Facebook’s servers indefinitely. Thousands complained, so Facebook built a tool for permanently and instantly deleting user data—then promptly hid it away in the site’s Help section. To access it, log in to Facebook, navigate to facebook.com/help, and type "delete my account" in the search box. The top result will link you to the deletion page. Click Submit and confirm your choice, and you’re done. While Facebook doesn’t offer much help for backing up your data—a particular concern if you use Facebook to hold your photo collection—there are a number of free Facebook apps designed to archive your albums, such as Facebook Exporter for iPhoto and FBPhotoExport.

To pull yourself free from Microsoft’s services, go to account.live.com and scroll to the bottom of the page. Under the Other Options header, click Close Account. On the following page, reenter your account password and press Yes. Unfortunately, there is no account-wide export option.

Closing an Amazon account is a more roundabout process. Click Help in the upper-right-hand corner of any page on amazon.com and search "closing your account." On the resulting page, pick Contact Us, then click on Something Else. Below that, select Account Settings from the menu, then Close My Account. At the bottom of the page, click Send Us an Email, fill out the form, and send.

Smaller Sites

Most reputable websites will offer some sort of account deletion option. Smaller sites that have posted (or more likely, reposted) your data without your permission can prove more difficult; after all, the owners never had your permission to republish your blog posts, photos, or videos in the first place. Finding this type of information—or derogatory and misrepresentative comments about you—is no more difficult than doing a search on Google or Bing. (Be sure to place quotation marks around your name.)

Searching for yourself isn’t about narcissism; it’s not unusual for job recruiters, current employers, or even potential dates to vet new acquaintances on search engines. A misleading search result or libelous information could cause serious distress and do damage to your reputation.

On a smaller site, sending a direct request to a webmaster to pull infringing or upsetting material is your best course of action. if there is no prominently listed con- tact information for the site’s operator, or if you aren’t able to get a response from the listed address or phone number, you can find direct contact information for the site’s administrator by conducting a search on whois.net. Domain owners are required by the internet Corporation for assigned names and numbers to supply contact information for Whois searches, including a phone number. This may at least get you on the phone with someone or give you a working email address. Whether that will be of any help is a different story.

If a site refuses to take down content that belongs to you, you can try sending a takedown notice. Under the Digital Millennium Copyright act (DMCA), you are entitled to have infringing content—images, text, or video that you own, specifically taken down. There are a number of forms available online for submitting DMCA notices to internet hosting companies; there are even forms for asking Google, Yahoo, and Bing to remove content from their search results. While these forms don’t guarantee cooperation, the mere threat of legal action will at least be enough to get a site owner’s attention. if your DMCA notice doesn’t get a response, it might be time to talk to a lawyer.

The Data That Won’t Die

It’s easy to tell when your data has been removed from public display; if you can’t find it anymore, then it’s effectively gone. Finding out whether or not a company is still holding your data privately—or selling it to third parties—may be impossible. "There’s no way to verify that your information has been deleted," Jeschke says, nor is there an overarching law or regulation governing data retention. Some data simply can’t be reclaimed; you relinquished control the moment you hit Submit, after you clicked past that 50-page license agreement.

This is a valuable lesson, and while it might not help you seize full control of your online identity, it’s instructive. When you sign up with a service, make sure you trust its parent company and understand what data you’re giving up. To sign up with Google or Facebook is to sell yourself in a literal way; as an astute (and anonymous) poster on the news site MetaFilter wrote, "if you are not paying for it, you’re not the customer; you’re the product being sold."


Signing up for social media sites is, by design, almost entirely frictionless. Three or four clicks will get you in the door, but finding your way out takes significantly more time and effort. The Web 2.0 Suicide Machine (tagline: Meet Your Real Neighbors Again) is a one-shot tool for deleting your profiles from some of the largest social sites on the Web, including Twitter, Myspace, LinkedIn, and Facebook.

The tool was released last year by the New Media Lab in Rotterdam, the Netherlands, and still lives up to its name—with one exception. Facebook has taken action to disable the site’s “suicide” script, and even sent the creators a stern cease-and-desist letter, demanding that Facebook be exempted from its deletion tools. Among the concerns included in Facebook’s legal letter? “[T]he protection of users’ privacy.”


Private Browsing

This feature is included in most new Internet browsers and goes by a few different titles: Private mode, Incognito mode, and InPrivate. All these names are a bit of an overreach: This mode prevents Web browsers only from collecting history and cookies. It keeps other users of your computer from seeing what you’ve been doing (buying gifts being the most palatable example); it won’t shield your IP address or existing cookies from external sites.

Virtual Private networks

Paid virtual private network (VPN) services route your Internet traffic through an intermediary, masking your computer’s address from the sites you visit. Sites will, however, still be able to deposit tracking cookies on your computer, and your browser will still be prone to exploits and viruses. VPNs reroute all Internet traffic on your computer, not just from Web browsers, which makes them popular with file sharers. Reputable services include WiTopia and Blacklogic.

CoCoon (getCoCoon.Com)

This service is a plug-in for the free Firefox browser that combines the advantages of private browsing and a VPN with extra security features. Traffic is routed through remote servers and made anonymous, and all incoming files—downloads or websites—are scanned for viruses and malware. Other features include throwaway email addresses for spam prevention, and full portability, so you can access your Cocoon account from other computers.

Saturday, January 14, 2012

Cashless Society: India Implements First Biometric ID Program for all of its 1.2 Billion Residents

by Brandon Turbeville, Activist Post

Over the past few months, I have written several articles dealing with the coming cashless society and the developing technological control grid. I also have written about the surge of government attempts to gain access to and force the use of biometric data for the purposes of identification, tracking, tracing, and surveillance.

Unfortunately, the reactions I receive from the general public are almost always the same. While some recognize the danger, most simply deny that governments have the capability or even the desire to create a system in which the population is constantly monitored by virtue of their most private and even biological information. Others, either gripped by apathy or ignorance, cannot believe that the gadgets given to them from the massive tech corporations are designed for anything other than their entertainment and enjoyment.

However, current events in India should serve not just as a warning, but also as a foreshadowing of the events to come in the Western world, specifically the United States.

Recently, India has launched a nationwide program involving the allocation of a Unique Identification Number (UID) to every single one of its 1.2 billion residents. Each of the numbers will be tied to the biometric data of the recipient using three different forms of information – fingerprints, iris scans, and pictures of the face. All ten digits of the hand will be recorded, and both eyes will be scanned.
The project will be directed by the Unique Identification Authority of India (UIDAI) under the premise of preventing identity theft and social welfare fraud. India has rather extensive social welfare and safety net programs, ranging from medical support and heating assistance to others aimed at helping the poor. Fraud is a rampant problem in India, especially in relation to these programs due to a preponderance of corrupt politicians and bureaucrats who often stuff welfare rolls with fake names and take the money for themselves.

Yet, although the justification for the billion person database is the increased ability to accurately disperse social welfare benefits, it will not be just the Indian government’s social welfare programs that have access to and utilize the UIDAI. Indeed, even before the program has been completed, major banks, state/local governments, and other institutions are planning to use the UIDAI for identification verification purposes and, of course, payment  and accessibility.

Yet the UID is going to be used for much more than social welfare programs. The UIDAI is in discussion with many institutions (banks, local/state governments, etc.) to allow them to use the UID as a means of identity verification. These institutions will pay the UIDAI some fee to cover costs and generate revenue. There seems to be little doubt that once it is established, the UID will become a preferred method (if not the preferred method) of identification in India.
Saenz also sees the eventuality of the UIDAI program becoming a means of payment and accessibility. He continues:

Ultimately, I wouldn’t be surprised if the UID, with its biometric data, could be used as a means of payment (when linked to a bank account), or as an access key to homes and cars. Purchase a meal with your fingerprint and unlock your door with the twinkle in your eye. Similar results could be expected in other nations that adopted biometric identification systems.
Saenz, and other proponents of the UID (UIDAI), have been diligent in pointing out that the program “is just a number, not an ID card.” However, this claim is debatable. Saenz himself admits that State issued driver’s licenses and identification cards will reference the UID information.

The question then becomes how much of that information will be referenced, and how that will be accomplished? Will the information be included on the card? Will only part of the information be included on the card? Or will the card reference back to the digital UID information to be then reconciled with the information that is present on the card? Although the UID is obviously going to be utilized by other institutions outside of the social welfare programs, no answers to these questions have been provided.

But, in the end, does it really matter if the information is collated into an ID card format if the government already has access to that information digitally? More than likely, a national ID card will appear as a supplement to the database already created by UID.  Regardless, the private biometric information has still been taken from the individual. The database is still there.

Indeed, government “officials” have already stated that the database will be used by intelligence agencies for the purpose of monitoring “bank transactions, cellphone purchases and the movements of individuals and groups suspected of fomenting terrorism.” This will be very easy to do since the UID number will be entered anytime an individual “accesses services from government departments, driver’s license offices and hospitals, as well as insurance, telecom, and banking companies.”

Nevertheless, proponents have also touted the fact that, at this point, the UID program is optional. But the program will obviously not be optional for very long. As I have discussed in previous articles, the introduction of a program such as a national ID card, biometric data, or cashless payment technologies is always followed by the program becoming mandatory. The ultimate goal of an all-encompassing cashless surveillance program with no opt-out provisions is always introduced by stealth and the Gradualist Technique.

At first, the program is introduced as a way to speed up transactions, increase efficiency, and provide convenience. Soon, however, governments and businesses begin to transition out of the older methods of payment and identification and focus more on the new technology. Identification using the traditional methods remain as an option, but become viewed as cumbersome. Eventually, the alternative methods are phased out completely and mandates replace what was once a personal choice.

As soon as Indian banks, businesses, and government social service offices begin to require identification using the UID, the ability to remain off the system and lead what passes for a normal life will disappear.

This is exactly the intention with India’s new biometric ID program. In fact, the cashless society is a stated goal of the UID program. CEO of MindTree’s IT Services, the company that was awarded the government contract for development and maintenance of the UID, explained in an interview with ComputerWeekly that the “ID scheme will support a cashless society. He said all vendors will have a biometric reader and citizens can pay for things with a fingerprint scan. Even a bag of rice.”

No doubt, even after such an admission by a man who was instrumental in the development of the program, many who read this article will still dismiss it as a “conspiracy theory.”

Nonetheless, this new monumental data mining effort by the Indian government dovetails with recent efforts in the Western world to develop an electronic surveillance grid capable of tracking, tracing, and recording every single movement and communication of every single citizen within a nation’s borders.

New technologies which are being introduced inside the United States, the UK, and Australia such as vein scanners, biometric employee time and attendance systems, voice recognition devices, and behavior analysis systems are all geared toward Total Information Awareness of every human being on the planet.

Only a totalitarian form of government would desire this information; and only a very determined totalitarian government would actively work toward establishing it. India is only the first nation to openly sweep up its entire national population into such a massive biometric database net. We cannot let our nation be the next. 

Brandon Turbeville is an author out of Mullins, South Carolina. He has a Bachelor’s Degree from Francis Marion University where he earned the Pee Dee Electric Scholar’s Award as an undergraduate. He has had numerous articles published dealing with a wide variety of subjects including health, economics, and civil liberties. He also the author of Codex Alimentarius - The End of Health Freedom, 7 Real Conspiracies and Five Sense Solutions. Brandon Turbeville is available for podcast, radio, and TV interviews. Please contact us at activistpost@gmail.com.

Thursday, January 12, 2012

The Secret Origins of AIDS: Facts, Fallacies & Conspiracy Theories

by Allan Cantwell, MD, New Dawn Magazine

In 2006 the AIDS epidemic was a quarter-century old. Officially starting in June 1981 as a mysterious and fatal disease exclusively found in several dozen young white gay men from New York City and Los Angeles, the disease has already killed 20 million people with 40 million more currently infected with the human immunodeficiency virus (HIV), widely accepted as the sole cause of AIDS. One million Americans are now infected with HIV; and almost half of the new cases are African-American.

The disease was first uncovered in homosexual men from Manhattan. “Gay cancer,” in the form of Kaposi’s sarcoma skin tumours, was the most striking telltale sign; and drugs, promiscuity, and anal sex were all thought to play a role in the unprecedented suppression of the immune system. It was soon obvious that the disease was not limited to gays: the mysterious agent was in the national blood supply, and an epidemic of AIDS was also uncovered in Central Africa.

In April 1984 Robert Gallo of the US National Cancer Institute (NCI) announced his discovery of HIV as the cause of AIDS. Subsequently, Luc Montagnier of the Pasteur Institute in Paris filed a lawsuit claiming he had first discovered the AIDS virus at Pasteur, and that Gallo had stolen the French virus after it was sent to his lab for study.

Twenty-five years later, the origin of AIDS still remains a mystery. The disease is widely believed to have originated in Africa when a primate (monkey) virus “jumped species” to first infect Black Africans. However, it is important to note that this belief is theory, not proven fact.

Montagnier has wisely cautioned that it is extremely important to distinguish between the ancestral origin of HIV and the actual beginning of the AIDS epidemic. The animal virus ancestor of HIV may indeed be centuries old, but it is obvious that the epidemic itself is new.

The epidemic did not begin in Africa. The first AIDS cases were uncovered in Manhattan in 1979. At that time there were no reported African cases. In fact, the AIDS epidemic in Africa did not begin until the autumn of 1982 at the earliest.

How was HIV introduced exclusively into the gay community in the late 1970s? The exclusive introduction of HIV into the homosexual population of New York City is an unprecedented event in the history of medicine. This biologic phenomenon has never been fully explained scientifically. There is certainly no evidence to indicate white gay men were the only people exposed to sexual contact with Africans, particularly at a time when the epidemic did not exist in Africa. Furthermore, it is biologically impossible for a purported sexually-transmitted and blood borne “virus out of Africa” to infect only young, white, healthy men in Manhattan! Yet, the impossible did happen. Despite these facts, we are repeatedly told that AIDS began in Africa, even though the American epidemic began before the African epidemic.

The mixing of AIDS facts and fallacies has long been apparent to researchers like myself who are convinced that HIV did not come from Mother Nature and “species jumping,” but was most likely introduced via contaminated vaccine experiments exclusively targeting the Black African and the American Gay community.

Before exploring the man-made theory of AIDS, it is important to note a small but highly vocal group who believes the cause of AIDS is still unknown, that the AIDS blood test is worthless, and that HIV is a harmless virus that is not sexually transmitted. This group, headed by retrovirologist Peter Duesberg and other well-credentialed scientific “dissidents,” believes AIDS is a toxic and nutritional syndrome. They blame AIDS on recreational drug use among gays – and poverty and malnutrition in Africa for the disease.

As a medical doctor and AIDS and cancer researcher, I am certainly not in accord with this group, but they have been quite successful politically, influencing world leaders like President Thabo Mbeki of South Africa, much to the chagrin of the World Health Organisation. For more information, go to www.google.com and type in “VirusMyth” or “The Perth Group”.

Genetic Engineering and the AIDS Epidemic

There is a close connection between the rise of genetic engineering and mixing of viruses in the early 1970s and the outbreak of HIV in the late 1970s. This connection persists in the form of the many unprecedented “emerging diseases” caused by “new viruses” that continue up to the present time.

In 1970 the discovery of a cell enzyme, called “reverse transcriptase” by Howard Temin and David Baltimore, allowed molecular biologists to detect so-called retroviruses in some animal cancers. It was soon recognised that retroviruses could be found normally in the genes of many animal cells, and that scientists could manipulated these viruses to produce detrimental effects on the immune system. In “species jumping” laboratory experiments, many viruses were transferred between different animal species and were also adapted to human cells.

As part of President Richard Nixon’s “War on Cancer,” genetic engineering of viruses became an integral part of the now largely forgotten Special Virus Cancer Program, conducted under the auspices of the NCI. Nixon also transferred part of the Army’s biological warfare unit at Fort Detrick, Maryland, over to the NCI, thereby allowing secret biowarfare experimentation to be carried out under cover of bona fide cancer research.

All this virus transfer and molecular manipulation was a biologic disaster waiting to happen. What would happen if one of these highly dangerous genetic creations escaped from the laboratory into the public sector? This culminated in a historic conference entitled “Biohazards in Biological Research” held at Asilomar, near Pacific Grove in California in 1973. Despite the biologic dangers, it was decided to continue this research.

By the late-1970s the War against Cancer and the Virus Cancer Program proved a bust with no cancer-causing retroviruses found in humans. The Program was winding down in 1978, at the exact time when government scientists were also enrolling thousands of gay men in New York City to serve as guinea pigs in the hepatitis B experiment that took place that same year at the New York Blood Centre in Manhattan. In 1979 the first cases of AIDS in gay men were reported from Manhattan. Coincidence? I think not.

Five years later, Gallo, who had worked for the Virus Cancer Program (VCP), “discovered” the retrovirus that causes AIDS; and Duesberg, who also worked for the VCP, continues to declare that HIV is harmless.

Is there a connection between the laboratory manipulation of primate retroviruses in the 1970s and the outbreak of AIDS? Or did Mother Nature conveniently pick that exact time to jump monkey genes into gay men to spectacularly revive the science of retrovirology and the careers of virologists like Gallo?

The Gay Vaccine Experiment and the Outbreak of AIDS

The earliest AIDS cases in America can be clearly traced back to the time period when the hepatitis B experiment began at the New York Blood Centre. The Centre began injecting gay men with multiple doses of the experimental vaccine in November 1978. The inoculations ended in October 1979, less than two years before the official start of the epidemic. Most importantly, the vaccine was developed in chimpanzees – the primate now thought to contain the “ancestor” virus of HIV. Also downplayed is the Centre’s pre-AIDS connection to primate research in Africa and also to a primate centre in the New York City area. The final experimental vaccine was also made by Merck and the NIH from the pooled serum specimens of countless gay men who carried the hepatitis B virus in their blood.

The New York Blood Centre (NYBC) is the largest independent blood supplier and distributor in the USA. In 1970, Alfred M Prince, M.D., head of the NYBC Laboratory of Virology, began his hepatitis research with chimps housed at LEMSIP (Laboratory for Experimental Medicine and Surgery) in downstate Tuxedo, NY. Until disbanded in 1997, LEMSIP supplied New York area scientists with primates and primate parts for transplantation and virus research.

Founded in 1965, LEMSIP was affiliated with New York University Medical Centre, where the first cases of AIDS-associated Kaposi’s sarcoma were discovered in 1979. NYU Medical Centre researchers were also heavily involved in the development of the experimental hepatitis B vaccine, and the Centre received government grants and contracts connected with biological warfare research beginning in 1969, according to Dr. Leonard Horowitz, author of Emerging Viruses: AIDS and Ebola (1996).

In 1974 Prince, with the support of Aaron Kellner, President of the NYBC, moved the chimp hepatitis research to a new primate centre called Vilab II in Robertsfield, Liberia, in Africa. Chimps were captured from various parts of West Africa and brought to VILAB. The lab also prides itself by releasing “rehabilitated” chimps back into the wild. One cannot help but wonder if some of the purported “ancestors” of HIV in the African bush have their origin in chimpanzees held in African primate labs for vaccine and medical experimentation.

The hepatitis B experiment, which inoculated over 1,000 healthy gay men, was a huge success with 96% of the men developing antibodies again the hepatitis virus. This high rate of success could not have been achieved if the men were immunosuppressed, because immunosuppressed people do not easily form antibodies to the vaccine. The experiment was followed by similar hepatitis B experiments using gay men in Los Angeles, San Francisco, Chicago, Denver and St. Louis, beginning in March 1980 and ending in October 1981, the same year the epidemic became official.

In the mid-1980s the many blood specimens donated by the gay Manhattan men during the experiment were retrospectively examined for HIV infection by researchers at the NYBC. It was determined that 6% of the specimens donated between 1978-1979 were positive for HIV. By 1984 (the end of the study period) over 40% of the men tested positive for HIV.

The final fate of all the men in the experiment has never been revealed. However, the blood donated by these men are the oldest HIV-positive blood tests on record in the United States. The full story of this experiment and its aftermath are contained in my two books on man-made AIDS: AIDS and the Doctors of Death (1988), and Queer Blood (1993). One fact is obvious: There was no AIDS in America until the exact year the government began experimenting with gay men.

There is also a suppressed connection between the outbreak of AIDS in Africa and the widespread vaccine programs conducted by the World Health Organisation (WHO) in the 1970s in Central Africa, particularly the smallpox eradication program. On May 11, 1987, London Times science writer Pearce Wright suggested the smallpox vaccine program could have awakened a “dormant” AIDS virus infection in Africa. Gallo was quoted as saying, “The link between the WHO program and the epidemic is an interesting and important hypothesis. I cannot say that it actually happened, but I have been saying for some years that the use of live vaccines, such as that used for smallpox, can activate a dormant infection such as HIV.”

This explosive story linking AIDS to African vaccines was suppressed and never appeared in the controlled major American media. The genocidal and depopulation implications of this suppressed story can be found on the Internet by googling “WHO Murdered Africa”, by William Campbell Douglas, M.D.

Vaccines, Species Jumping and HIV

There are inherent dangers in vaccine production because vaccines are made on living cells. Contamination with bacteria and viruses are constant problems during the manufacturing process. Laboratory additives used to feed the cell cultures (such as fetal bovine [cow] serum) may also be a source of microbial contamination. Some researchers believe living and killed viruses injected into the body can combine with other viruses normally present in the body, resulting in disease-causing “recombinants.” Vaccines can also contain viral particles, as well as newly recognised tiny bacteria known as “nanobacteria.” Half the 2004 flu vaccine supply was destroyed due to contamination with disease-causing bacteria. The dangers of vaccines are downplayed in an attempt to assure the public that vaccines are safe.

We are repeatedly told that HIV is the first primate virus to “jump species” and produce an epidemic in humans. But, in truth, the AIDS epidemic is the secondinstance in which a monkey virus has been transferred to humans via vaccines.

Rarely-publicised is the fact that a cancer-causing monkey virus jumped species a half century ago when contaminated polio vaccines were injected into millions of people, including half the US population of that era. In the early 1960s it was discovered that some lots of polio vaccine manufactured on rhesus monkey kidney cells during the period 1955 to 1963 were contaminated with a monkey virus called SV40 (Simian virus #40). This primate virus was proven to cause cancer in experimental animals. However, to this day, health officials still insist there is no proof that SV40 causes human cancer.

Despite the lack of government interest, genetic and immunologic studies of SV40 by independent researchers over the past decade indicate this virus is clearly associated with rapidly-fatal cancers of the lung (mesothelioma), bone marrow cancer (multiple myeloma), brain tumours in children, and other forms of cancer.

Washington Times report (September 21, 2003) states, “Some of the polio vaccine given to millions of American children from 1962 until 2000 could have been contaminated with a monkey virus that shows up in some cancers, according to documents and testimony to be delivered to a House committee Wednesday. The vaccine manufacturer said such claims ‘don’t have any validity,’ and the Centres for Disease Control and Prevention (CDC) agrees.” (See the website: www.sv40cancer.com.) For anyone who still believes vaccine makers and health officials always act in your best interest, I would highly recommend a recently published book titled The Virus and the Vaccine: The True Story of a Cancer-Causing Monkey Virus, Contaminated Polio Vaccine, and the Millions of Americans Exposed by Debbie Bookchin and Jim Schumacher.

Medical Experimentation and Biological Warfare

The idea of man-made AIDS is often considered a paranoid belief. Why would scientists introduce a virus to kill millions of people? AIDS experts routinely blame primates and human sexuality for the origin and spread of HIV, but they never consider the possibility that HIV could have originated in an animal cancer virus laboratory.

The sad truth is that governments and the military do indeed experiment on unsuspecting citizens. And Iraqi bioweapons of mass destruction was one of the reasons used to justify the current invasion of Iraq.

It is clear that AIDS started as a “gay disease.” However, yet another downplayed fact is that the HIV “strain” in America is different from the HIV strains found in Africa.

Harvard virologist Max Essex claims the American HIV strain spreads more easily via anal sex; whereas the African strains spread more efficiently via vaginal sex. This could explain why the American epidemic spreads primarily through homosexual activity and anal sex, while in Africa it is primarily heterosexual and spreads through vaginal sex. The “different” HIV strain in America is further evidence that “American AIDS” did not originate in Africa.

The Relationship Between AIDS and Cancer

The relationship between AIDS and cancer is also downplayed, along with the connection between the Special Virus Cancer Program and the ensuing outbreak of HIV. In Gallo’s book he readily admits to a relationship between AIDS and cancer, noting that “many people with AIDS develop one or more cancers.” There is now no doubt that HIV can lead to an increased incidence of cancer, particularly Kaposi’s sarcoma, Hodgkin’s disease, non-Hodgkin’s lymphoma, and cervical cancer.

The purpose of the Virus Cancer Program was two-fold. First, to discover a virus in humans that could cause a form of cancer. Second, to develop immunosuppressive laboratory viruses useful in “making” cancer in experimental animals.

When Gallo discovered HIV in 1984, he called it a cancer-causing “leukemia/lymphoma” virus. The name was quickly changed to a “lymphotropic” virus, thus obscuring the relationship between the new “gay disease” and cancer. Virologists were quickly convinced that the virus came from primates, and both Gallo and Essex heavily promoted the readily accepted African green monkey origin of HIV. A decade later, chimpanzees (rather than monkeys) became the more favoured origin. The primate origin of HIV was further obscured by titling the virus as a “human immunodeficiency virus” (HIV) , rather than calling it “primate immunodeficiency virus” (or PIV) in humans.

Is HIV the Sole Cause of AIDS?

As noted, HIV is believed to be the sole cause of AIDS, although a few AIDS dissidents believe HIV is harmless. Generally disregarded by both groups is the matter of the origin of Kaposi’s sarcoma, the “gay cancer” associated with AIDS.

In 1994 it was reported that KS is actually caused by a new “herpes-8” virus. KS cases were first discovered in the late nineteenth century; and before AIDS it was a rare form of cancer. Before AIDS, KS was a non-transmissible disease that was never seen in young American men.

The finding of a new KS virus indicates that two different viruses were simultaneously introduced into gay men when AIDS began in the late 1970s. No rational explanation has been put forth for this bizarre occurrence; and how this “new” virus could cause a gay epidemic of KS has never been explained satisfactorily. Further complicating the “sole cause” of AIDS scenario is the recent discovery of tiny bacterial forms known as “mycoplasma.” Luc Montagnier believes these microbes are important infectious “co-factors” in the development of AIDS, although most AIDS researchers ignore mycoplasma.

The “Cancer Microbe” Link to AIDS

Although the precise cause of cancer is unknown, there is a century of microbial research linking certain tuberculosis-like bacteria to cancer. This research is ignored as medical heresy, but my own reported cancer studies indicate that “acid-fast” bacteria indeed exist in common forms of cancer and in Kaposi’s sarcoma.

I have written extensively about these bacteria in AIDS; The Mystery & the Solution (1984), The Cancer Microbe (1990), and Four Women Against Cancer(2005). Cancer bacteria have characteristics of both bacteria and viruses. There are also similarities to mycoplasma and to newly-discovered nanobacteria, currently considered to be the smallest forms of life and known to contaminate commercial vaccines. Nanobacteria are ubiquitous and may be involved in the pathology of many diseases currently considered of unknown cause.

Cancer microbe research has been ignored in AIDS and KS. However, Lawrence Broxmeyer, M.D., in AIDS: What the Discoverers of HIV Never Admitted (2003), concludes that the real cause of AIDS is not HIV, but actually tuberculosis-like bacteria. He thinks Gallo and Montagnier found a retrovirus because that was the only thing they were looking for.

Unlike Broxmeyer, I believe HIV came out of animal cancer research and dangerous vaccine and biological warfare experimentation – and that HIV made its way into vaccines injected into African Blacks and American Gays. If unrecognised cancer microbes are proven to be an unrecognised infectious factor in cancer and AIDS, as I believe they are, this would certainly add to the dangers of genetic engineering of cancer viruses and new bio-warfare agents.

I believe HIV is essential to produce the immunodeficiency characteristic of AIDS, but I consider HIV plus unrecognised “cancer bacteria” to be the causes of AIDS.

The Origin of Gallo’s HIV Virus

Could HIV be related to reported virus-like forms of cancer bacteria? A careful reading of how Gallo “isolated” HIV indicates possible derivation from cancerous cells harbouring unrecognised bacteria.

Unlike most bacteria which can be grown on artificial laboratory culture media, viruses need living cells to grow and survive. Pulitzer Prize-winning author John Crewdson provides a detailed analysis of the discovery of HIV in Science Fictions: A Scientific Mystery, A Massive Cover-Up, and the Dark Legacy of Robert Gallo (2002), a highly unflattering portrait of Gallo and an account of the lawsuit initiated by the Pasteur Institute, accusing Gallo of stealing the AIDS virus.

According to Crewdson, HIV was finally isolated in Gallo’s lab by isolating the virus in pooled blood T-cells from ten patients with AIDS. From that brew, the virus was cultured in larger amounts for commercial purposes by growing HIV on “cell lines” derived from the white blood cells (T-cells) of patients with lymphoma cancer. This particular strain of HIV became the basis for Gallo’s patented HIV blood test and the resulting lawsuit.

Montagnier claimed that he first discovered HIV at Pasteur and when he sent the virus to Gallo’s lab for testing, he believes Gallo stole the virus and made it his own discovery. Gallo repeatedly declared his virus was not the French virus.

It was eventually proven that Montagnier’s virus somehow made its way into Gallo’s HIV culture. Just as everyone’s fingerprints are different, so too is every HIV virus. Gallo’s virus was molecularly identical to Montagnier’s in every respect. With the intervention of President Ronald Reagan and the French Premier, the lawsuit was settled out of court in 1987 , with the two researchers agreeing to split the royalties from the AIDS blood test.

Despite all this, the scientific controversy continued, resulting in additional investigations by the National Academy of Sciences and the NIH Office of Scientific Integrity. In 1991, Gallo finally conceded that Montagnier’s virus had most likely contaminated his laboratory and that his AIDS patented blood test was indeed based on the Pasteur virus. In 1992, the National Academy of Sciences’ panel completed its investigation, producing a report critical of Gallo.

All these scientific irregularities surrounding the precise lab origin of HIV point to serious problems in virology. For example, for several years Gallo was unable or unwilling to admit his virus was identical to Montagnier’s virus, even though they proved as identical as any two HIV virus strains could be. Furthermore, the controversy proves how easily virus laboratories can be contaminated by “outside” viruses.

One of the contentions of the man-made theory of AIDS is that the experimental hepatitis B vaccine was contaminated with an immunosuppressive AIDS-causing agent and/or the Kaposi’s sarcoma virus. This theory is condemned as conspiracy theory. Certainly the vaccine was unlike any other in that it was made from the blood of gay men who were hepatitis B virus carriers. During the gay experiment at the NYBC there was concern that something was wrong with the vaccine and that it might be contaminated. According to June Goodfield’sQuest for the Killers, p 86, “This was no theoretical fear, contamination having been suspected in one batch made by the National Institutes of Health, though never in Merck’s.”

Four years before AIDS in 1975, Gallo also reported a “human virus” (HL-23) that subsequently proved to be three contaminating laboratory cancer-causing primate viruses (gibbon ape virus, simian sarcoma virus, and baboon endogenous virus). Gallo claims he has no idea how these animal viruses contaminated his lab. In 1986 Essex also reported a “new AIDS virus” that eventually turned out to be a monkey virus traced back to his own lab. Despite these contaminations, Gallo and Essex both blamed AIDS on monkeys in the jungle and heavily promoted the “out of Africa” origin of American AIDS.

After AIDS began there were instances where a strain of HIV isolated from a particular AIDS patient inadvertently contaminated HIV specimens from other AIDS patients – and where HIV strains sent to other laboratories accidentally contaminated additional specimens.

For years Montagnier insisted that Gallo’s virus was isolated from a French patient named Brugiere. In 1991 the two foremost AIDS experts were astonished to learn that Gallo’s strain of HIV actually belonged to a patient named Laillier. Unbeknownst to Montagnier, the “Bru” culture had somehow contaminated the “Lai” culture at the Pasteur lab.

Is AIDS Genocide Against Gays and Blacks?

Why is there a blackout of the man-made theory of AIDS in the scientific literature and in the corporate-controlled media? Although some evidence is presented here, it is a fraction of the documentation presented in my two books on the man-made epidemic, and in books by Dr. Leonard Horowitz, and Professor Robert E Lee, and in Dr. Robert Strecker’s video “The Strecker Memorandum”, and in other sources.

I do not believe the exclusive introduction of HIV into the most hated minority in America was caused by monkeys in the African bush, particularly when AIDS appeared immediately after the gay experiment. Why are primates in the African wild blamed when tens of thousands of captive primates in virus labs all over the world have been injected with infectious viruses and cancerous tissue for more than a century?

Why were African Blacks targeted? Many Africans and African-Americans believe AIDS is an experiment to rid the world of Black people, as part of a government-sanctioned world depopulation program.

American gays were the perfect target to test a new retrovirus. A largely homophobic public would easily accept HIV infection in gays, due to their purported promiscuity and drug use. Few people would believe the US government would secretly test biologic agents on its civilians, although there is a well-documented history of secret unethical experimentation extending back to the Cold War of the 1950s which includes the government’s horrendous “radiation experiments.”

I cannot explain the silence and apathy on these issues from the Black and the Gay communities. People don’t seem to care much about genocide unless their own group is affected; and even so, most people are in denial and don’t want to know about man-made AIDS. Many AIDS activists simply dismiss the man-made theory as a “distraction” which interferes with HIV testing and treatment, and the search for a cure.

The Secret History of AIDS

The history of AIDS has been deliberately white-washed to obscure its man-made origin. Knowledge of HIV and other retroviruses came directly out of the little-known and secret Special Virus Cancer Program of the 1970s. More than one virus was introduced into American gays in the late 1970s, and mycoplasma and “cancer bacteria” are additional infectious agents that have been ignored in proclaiming HIV as the “sole cause of AIDS.”

Secret bio-warfare research co-mingled with bona fide cancer research at the NCI in the decade before AIDS, and that association continues up to the present time. AIDS in America erupted when government researchers began experimenting with gays, using an experimental vaccine developed in primates – the animals purported to contain the “ancestor virus” of HIV. AIDS in America did not come from Africa. HIV occurred exclusively in the gay community because the virus was put there by the “hand of man.”

Mother Nature wisely separated the species but, in the decade before AIDS, genetic researchers repeatedly violated the “species barrier” by transferring cancer-causing viruses between various animal species, ostensibly to improve our health.

The man-made theory of AIDS is not based on conspiracy theory. The theory warrants a full scientific investigation – and the secret history of HIV and AIDS needs to come out of the closet.

ALAN CANTWELL MD is a retired physician and cancer researcher who believes cancer is caused by bacteria and AIDS is man-made. There is probably no other physician on the planet whose publications are as controversial. Dr. Cantwell is a frequent contributor to New Dawn. Much of his research can be found on google.com, and thirty of his published papers can be accessed at www.ncbi.nlm.nih.gov/PubMed/ (type in Cantwell AR). He is the author of two books on the man-made epidemic of AIDS: AIDS and the Doctors of Death, and Queer Blood, and a book on the microbiology of cancer, The Cancer Microbe. His latest book is called Four Women Against Cancer. Dr. Cantwell is now happily retired from the clinical practice of dermatology, and lives in Hollywood, California. Web site: www.ariesrisingpress.com Email: AlanRCan@aol.com.

© Copyright New Dawn Magazine, http://www.newdawnmagazine.com. Permission granted to freely distribute this article for non-commercial purposes if unedited and copied in full, including this notice.
© Copyright New Dawn Magazine, http://www.newdawnmagazine.com. Permission to re-send, post and place on web sites for non-commercial purposes, and if shown only in its entirety with no changes or additions. This notice must accompany all re-posting.

Wednesday, January 11, 2012

Origins and Techniques of Monarch Mind Control


Monarch Programming is a method of mind control used by numerous organizations for covert purposes. It is a continuation of project MK-ULTRA, a mind-control program developed by the CIA, and tested on the military  and civilians. The methods are astonishingly sadistic (its entire purpose is to traumatize the victim)  and  the expected results are horrifying: The creation of a mind-controlled slave who can be triggered at anytime to perform any action required by the handler.  While mass media ignores this issue, over 2 million Americans have gone through the horrors of this program. This article looks at the origins of Monarch programming and some of its methods and symbolism.

NOTE: This article contains disturbing elements and might trigger Monarch survivors.

Monarch programming is a mind-control technique comprising elements of Satanic Ritual Abuse (SRA) and Multiple Personality Disorder (MPD). It utilizes a combination of psychology, neuroscience and occult rituals to create within the slaves an alter persona that can be triggered and programmed by the handlers. Monarch slaves are used by several organizations connected with the world elite in fields such as the military, sex slavery and the entertainment industry. This article will look at the origins of Monarch programming, its techniques and its symbolism.


Throughout the course of history, several accounts have been recorded describing rituals and practices resembling mind control. One of the earliest writings giving reference to the use of occultism to manipulate the mind can be found in the Egyptian Book of the Dead. It is a compilation of rituals, heavily studied by today’s secret societies, which describes methods of torture and intimidation (to create trauma), the use of potions (drugs) and the casting of spells (hypnotism), ultimately resulting in the total enslavement of the initiate. Other events ascribed to black magic, sorcery and demon possession (where the victim is animated by an outside force) are also ancestors of Monarch programming.

It is, however, during the 20th century that mind control became a science in the modern sense of the term, where thousands of subjects have been systematically observed, documented and experimented on.

One of the first methodical studies on trauma-based mind control were conducted by Josef Mengele, a physician working in Nazi concentration camps. He initially gained notoriety for being one of the SS physicians who supervised the selection of arriving prisoners, determining who was to be killed and who was to become a forced labourer. However, he is mostly known for performing grisly human experiments on camp inmates, including children, for which Mengele was called the “Angel of Death”.

Joseph Mengele, 1935
Mengele is infamous for his sordid human experiments on concentration camps prisoners, especially on twins. A part of his work that is rarely mentioned  however, is his research on mind control. Much of his research in this field was confiscated by the Allies and is still classified to this day.
“DR. GREEN (Dr. Joseph Mengele): The most significant programmer, perhaps one could give him the title of the father of Monarch Programming was Joseph Mengele, an ex-Nazi Concentration Camp doctor. Thousands of Monarch mindcontrolled slaves in the U.S. had “Dr. Green” as their chief programmer. “1
“Dr. Joseph Mengele of Auschwitz notoriety was the principle developer of the trauma-based Monarch Project and the CIA’s MK Ultra mind control programs. Mengele and approximately 5, 000 other high ranking Nazis were secretly moved into the United States and South America in the aftermath of World War II in an Operation designated Paperclip. The Nazis continued their work in developing mind control and rocketry technologies in secret underground military bases. The only thing we were told about was the rocketry work with former Nazi star celebrities like Warner Von Braun. The killers, torturers, and mutilators of innocent human beings were kept discretely out of sight, but busy in U.S. underground military facilities which gradually became home to thousands upon thousands of  kidnapped American children snatched off the streets (about one million per year) and placed into iron bar cages stacked from floor to ceiling as part of the ‘training’. These children would be used to further refine and perfect Mengele’s mind control technologies. Certain selected children (at least the ones who survived the ‘training’) would become future mind controlled slaves who could be used for thousands of different jobs ranging anywhere from sexual slavery to assassinations. A substantial portion of these children, who were considered expendable, were intentionally slaughtered in front of (and by) the other children in order to traumatize the selected trainee into total compliance and submission 2.
Mengele’s research served as a basis for the covert, illegal CIA human research program named MK-ULTRA.


Declassified MK-Ultra document
Project MK-ULTRA ran from the early 1950s to at least the late 1960s, using American and Canadian citizens as its test subjects. The published evidence indicates that Project MK-ULTRA involved the use of many methodologies to manipulate individual mental states and alter brain functions, including the surreptitious administration of drugs and other chemicals, sensory deprivation, isolation, and verbal and physical abuse.

The most publicized experiments conducted by MK-ULTRA involved the administration of LSD on unwitting human subjects, including CIA employees, military personnel, doctors, other government agents, prostitutes, mentally ill patients, and members of the general public, in order to study their reactions.

However, the scope of MK-ULTRA does not however stop. Experiments involving violent electroshocks, physical and mental torture and abuse were used in a systematic matter on many subjects, including children.

Declassified picture of a young MK-ULTRA subject, 1961.
Although the admitted goals of the projects were to develop torture and interrogation methods to use on the country’s enemies, some historians asserted that the project aimed to create “Manchurian Candidates”, programmed to perform various acts such as assassinations and other covert missions.

MK-ULTRA was brought to light by various commissions in the 1970s, including the Rockefeller Commission of 1975. Although it is claimed that the CIA stopped such experiments after these commissions, some whistle-blowers have come forth stating that the project simply went “underground” and Monarch Programming has become the classified successor of MK-ULTRA.

The most incriminating statement to date made by a government official as to the possible existence of Project MONARCH was extracted by Anton Chaitkin, a writer for the publication The New Federalist. When former CIA Director William Colby was asked directly, “What about monarch?” he replied angrily and ambiguously, “We stopped that between the late 1960s and the early 1970s.” 3.


Although there has never been any official admittance of the existence  of Monarch programming, prominent researchers have documented the systematic use of trauma on subjects for mind-control purposes. Some survivors, with the help of dedicated therapists, were able to “deprogram” themselves to then go on record and disclose the horrifying details of their ordeals.

Monarch slaves are mainly used by organizations to carry out operations using patsies trained to perform specific tasks, who do not question orders, who do not remember their actions and, if discovered, who automatically commit suicide. They are the perfect scapegoats for high-profile assassinations (see Sirhan Sirhan), the ideal candidates for prostitution, slavery and private movie productions. They are also the perfect puppet performers for the entertainment industry.
“What I can say is I now believe that ritual-abuse programming is widespread, is systematic, is very organized from highly esoteric information which is published no-where, has not been on any book or talk show, that we have found it all around this country and at least one foreign country.

People say, “What’s the purpose of it?” My best guess is that the purpose of it is that they want an army of Manchurian Candidates, ten of thousands of mental robots who will do prostitution, do movies, smuggle narcotics, engage in international arms smuggling, all sorts of very lucrative things, and do their bidding and eventually the megalomaniacs at the top believe they’ll create a Satanic Order that will rule the world”. 4
Monarch programmers cause intense trauma to subjects through the use of electroshock, torture, abuse and mind games in order to force them to dissociate from reality – a natural response in  some people when then are faced with unbearable pain. The subject’s ability to dissociate is a major requirement and it is ,apparently, most readily found in children that come from families with multiple generations of abuse. Mental dissociation enables the handlers to create walled-off personas in the subject’s psyche, which can then be programmed and triggered at will.
“Trauma-based mind control programming can be defined as systematic torture that blocks the victim’s capacity for conscious processing (through pain, terror, drugs, illusion, sensory deprivation, sensory over-stimulation, oxygen deprivation, cold, heat, spinning, brain stimulation, and often, near-death), and then employs suggestion and/or classical and operant conditioning (consistent with well-established behavioral modification principles) to implant thoughts, directives, and perceptions in the unconscious mind, often in newly-formed trauma-induced dissociated identities, that force the victim to do, feel, think, or perceive things for the purposes of the programmer. The objective is for the victim to follow directives with no conscious awareness, including execution of acts in clear violation of the victim’s moral principles, spiritual convictions, and volition.

Installation of mind control programming relies on the victim’s capacity to dissociate, which permits the creation of new walled-off personalities to “hold” and “hide” programming. Already dissociative children are prime “candidates” for programming”. 5
Monarch mind control is covertly used by various groups and organizations for various purposes. According to Fritz Springmeier, these groups are known as “The Network” and form the backbone of the New World Order.


Monarch mind control is named after the Monarch butterfly – an insect who begins its life as a worm (representing undeveloped potential) and, after a period of cocooning (programming) is reborn as a beautiful butterflies (the Monarch slave). Some characteristics specific to the Monarch butterfly are also applicable to mind control.
“One of the primary reasons that the Monarch mind-control programming was named Monarch programming was because of the Monarch butterfly. The Monarch butterfly learns where it was born (its roots) and it passes this knowledge via genetics on to its offspring (from generation to generation). This was one of the key animals that tipped scientists off, that knowledge can be passed genetically. The Monarch program is based upon Illuminati and Nazi goals to create a Master race in part through genetics. If knowledge can be passed genetically (which it is), then it is important that parents be found that can pass the correct knowledge onto those victims selected for the Monarch mind control.” 6
“When a person is undergoing trauma induced by electroshock, a feeling of light-headedness is evidenced; as if one is floating or fluttering like a butterfly. There is also a symbolic representation pertaining to the transformation or metamorphosis of this beautiful insect: from a caterpillar to a cocoon (dormancy, inactivity), to a butterfly (new creation) which will return to its point of origin. Such is the migratory pattern that makes this species unique.” 7


The victim/survivor is called a “slave” by the programmer/handler, who in turn is perceived as “master” or “god.” About 75% are female, since they possess a higher tolerance for pain and tend to dissociate more easily than males. Monarch handlers seek the compartmentalization of their subject’s psyche in multiple and separate alter personas using trauma to cause dissociation.

The following is a partial list of these forms of torture:
1. Abuse and torture
2. Confinement in boxes, cages, coffins, etc, or burial (often with an opening or air-tube for oxygen)
3. Restraint with ropes, chains, cuffs, etc.
4. Near-drowning
5. Extremes of heat and cold, including submersion in ice water and burning chemicals
6. Skinning (only top layers of the skin are removed in victims intended to survive)
7. Spinning
8. Blinding light
9. Electric shock
10. Forced ingestion of offensive body fluids and matter, such as blood, urine, feces, flesh, etc.
11. Hung in painful positions or upside down
12. Hunger and thirst
13. Sleep deprivation
14 Compression with weights and devices
15. Sensory deprivation
16. Drugs to create illusion, confusion, and amnesia, often given by injection or intravenously
17. Ingestion or intravenous toxic chemicals to create pain or illness, including chemotherapy agents
18. Limbs pulled or dislocated
19. Application of snakes, spiders, maggots, rats, and other animals to induce fear and disgust
20. Near-death experiences, commonly asphyxiation by choking or drowning, with immediate resuscitation
22. Forced to perform or witness abuse, torture and sacrifice of people and animals, usually with knives
23. Forced participation in slavery
24. Abuse to become pregnant; the fetus is then aborted for ritual use, or the baby is taken for sacrifice or enslavement
25. Spiritual abuse to cause victim to feel possessed, harassed, and controlled internally by spirits or demons
26. Desecration of Judeo-Christian beliefs and forms of worship; dedication to Satan or other deities
27. Abuse and illusion to convince victims that God is evil, such as convincing a child that God has abused her
28. Surgery to torture, experiment, or cause the perception of physical or spiritual bombs or implants
29. Harm or threats of harm to family, friends, loved ones, pets, and other victims, to force compliance
30. Use of illusion and virtual reality to confuse and create non-credible disclosure 8.
“The basis for the success of the Monarch mind-control programming is that different personalities or personality parts called alters can be created who do not know each other, but who can take the body at different times. The amnesia walls that are built by traumas, form a protective shield of secrecy that protects the abusers from being found out, and prevents the front personalities who hold the body much of the time to know how their System of alters is being used. The shield of secrecy allows cult members to live and work around other people and remain totally undetected. The front alters can be wonderful Christians, and the deeper alters can be the worst type of Satanic monster imaginable–a Dr. Jekyll/Mr. Hyde effect. A great deal is at stake in maintaining the secrecy of the intelligence agency or the occult group which is controlling the slave. The success rate of this type of programming is high but when it fails, the failures are discarded through death. Each trauma and torture serves a purpose. A great deal of experimentation and research went into finding out what can and can’t be done. Charts were made showing how much torture a given body weight at a given age can handle without death.” 9
“Due to the severe trauma induced through ECT, abuse and other methods, the mind splits off into alternate personalities from the core. Formerly referred to as Multiple Personality Disorder, it is presently recognized as Dissociative Identity Disorder and is the basis for MONARCH programming. Further conditioning of the victim’s mind is enhanced through hypnotism, double-bind coercion, pleasure-pain reversals, food, water, sleep and sensory deprivation, along with various drugs which alter certain cerebral functions”. 10
Dissociation is thus achieved by traumatizing the subject, using systematic abuse and using terrifying occult rituals. Once a split in the core personality occurs, an “internal world” can be created and alter personas can be programmed using tools such as music, movies (especially Disney productions) and fairy tales. These visual and audio aids enhance the programming process using images, symbols, meanings and concepts. Created alters can then be accessed using trigger words or symbols programmed into the subject’s psyche by the handler. Some of the most common internal images seen by mind control slaves are trees, Cabalistic Tree of life, infinity loops, ancient symbols and letters, spider webs, mirrors, glass shattering, masks, castles, mazes, demons, butterflies, hour glasses, clocks and robots. These symbols are commonly inserted in popular culture movies and videos for two reasons: to desensitize the majority of the population, using subliminals and neuro-linguistic programming and to deliberately construct specific triggers and keys for base programming of highly-impressionable MONARCH children. 11 Some of the movies used in Monarch programming include The Wizard of Oz, Alice in Wonderland, Pinocchio and Sleeping Beauty .

The movie The Wizard of Oz is used by Monarch handlers to program their slaves. Symbols and meanings in the movie become triggers in the slave’s mind enabling easy access to the slave’s mind by the handler. In popular culture, veiled references to Monarch programming often use analogies to The Wizard of Oz and Alice in Wonderland.
In each case, the slave is given a particular interpretation of the movie’s storyline in order to enhance programming. For example, a slave watching The Wizard of Oz is taught that “somewhere over the rainbow” is the “happy place” dissociative trauma slaves must go to in order to escape the unbearable pain being inflicted upon them. Using the movie, programmers encourage slaves to go “over the rainbow” and dissociate, effectively separating their minds from their bodies.
“As mentioned before, the hypnotist will find children easier to hypnotize if they know how to do it with small children. One method that is effective is to say to the small children, “Imagine you are watching a favorite television show.” This is why the Disney movies and the other shows are so important to the programmers. They are the perfect hypnotic tool to get the child’s mind to dissociate in the right direction. The programmers have been using movies since almost day one to help children learn the hypnotic scripts. For children they need to be part of the hypnotic process. If the hypnotist allows the child to make up his own imagery, the hypnotic suggestions will be stronger. Rather than telling the child the color of a dog, the programmer can ask the child. This is where the books and films shown the child assist in steering its mind in the right direction. If the hypnotist talks to a child, he must take extra precaution not to change the tone of his voice and to have smooth transitions. Most of the Disney films are used for programming purposes. Some of them are specifically designed for mind-control.” 12


The levels of Monarch Programming identify the slave’s “functions” and are named after the Electroencephalography (EEG) brainwaves associated with them.

Types of brain waves in EEG

Monitoring brain waves through the scalp
Regarded as “general” or regular programming,  ALPHA is within the base control personality. It characterized by extremely pronounced memory retention, along with substantially increased physical strength and visual acuity. Alpha programming is accomplished through deliberately subdividing the victims personality which, in essence, causes a left brain-right brain division, allowing for a programmed union of Left and Right through neuron pathway stimulation.

BETA is referred to as “sexual” programming (slaves). This programming eliminates all learned moral convictions and stimulates the primitive instinct, devoid of inhibitions. “Cat” alters may come out at this level. Known as Kitten programming, it is the most visible kind of programming as some female celebrities, models, actresses and singers have been subjected to this kind of programming. In popular culture, clothing with feline prints often denote Kitten programming.

DELTA is known as “killer” programming and was originally developed for training special agents or elite soldiers (i.e. Delta Force, First Earth Battalion, Mossad, etc.) in covert operations. Optimal adrenal output and controlled aggression is evident. Subjects are devoid of fear and very systematic in carrying out their assignment. Self-destruct or suicide instructions are layered in at this level.

THETA – Considered to the “psychic” programming. Bloodliners (those coming from multi-generational Satanic families) were determined to exhibit a greater propensity for having telepathic abilities than did non-bloodliners. Due to its evident limitations, however, various forms of electronic mind control systems were developed and introduced, namely, bio-medical human telemetry devices (brain implants), directed-energy lasers using microwaves and/or electromagnetics. It is reported these are used in conjunction with highly-advanced computers and sophisticated satellite tracking systems. 13


It is difficult to remain objective when describing the horrors endured by Monarch slaves. The extreme violence, the abuse, the mental torture and sadistic games inflicted on victims by “notable scientists” and high-level officials prove the existence of a true “dark side” in the powers that be. Despite the revelations, the documents and the whistle-blowers, a great majority of the population ignores, dismisses or avoids the issue altogether. Over two million Americans have been programmed by trauma mind-control since 1947 and the CIA publicly admitted its mind control projects in 1970. Movies such as The Manchurian Candidate have directly referred to the subject, even depicting actual  techniques, such as electroshock, the use of trigger words and microchip implementation. Several public figures we see on our TV and movie screens are mind control slaves. Famous people such as Candy Jones, Celia Imrie and Sirhan Sirhan have gone on record and disclosed their mind control experiences…and yet the general public claims that it “cannot exist”.

The research and funds invested in project Monarch do not however only apply to mind control slaves. Many of the programming techniques perfected in these experiments are applied on a mass scale through mass media. Mainstream news, movies, music videos, advertisements and television shows are conceived using the most advanced data on human behavior ever compiled. A lot of this comes from Monarch programming.
  1. Fritz Springmeier, The Illuminati Formula to Create a Mind Control Slave
  2. Ken Adachi, Mind Control the Ultimate Terror
  3. Anton Chaitkin, “Franklin Witnesses Implicate FBI and U.S. Elites in Torture and Murder of Children”, The New Federalist
  4. D. Corydon Hammond, Ph.D.
  5. Ellen P. Lacter, Ph.D., The Relationship Between Mind Control Programming and Ritual Abuse
  6. Ibid.
  7. Ron Patton, Project Monarch
  8. Ellen P. Lacter, Ph.D., Kinds of Torture Endured in Ritual Abuse and Trauma-Based Mind Control
  9. Springmeier, op. cit.
  10. Patton, op. cit.
  11. Ibid.
  12. Springmeier, op. cit.
  13. Patton, op. cit.