Posts Tagged ‘Carnivore’
Our modern world is a technopticon where all travel, trade and sacred trusts are targeted, tracked and treated with the threat of force from tyranny. Omnipotence is the purview of god and not government. These total information awareness (TIA) programs are illegal, unconstitutional and immoral; Carnivore, Project ECHELON, XKeyscore, PRISM
We must rise up to end these ‘safety’ programs and hold those creating and using them accountable or surrender to a total slavery of technocratic feudalism never before seen by man.
Sovereignthink Technopticon Articles (up-to 8/2013)
|An Intelligent Prison, is this Smart Grid||-Black Box Big Brother Will See All!
Barrack Obama has Launched Sister National Cyber-Transformation Actions In the United States with the Announcement of the Commerce Department’s New Division of The National Strategy for Trusted Identities in Cyberspace NSTIC Announced at Stanford University Jan 2011The United States Executive Using STUXNET, WIKILEAKS, CYBERATTACK, Identity Theft as well as Venezuela’s National Security Rationale of Denouncing Out rage toward public authorities, inciting hatred, engender Resistance among the general public or endanger public order.
|DARPA, the CIA, FBI, NSA, DHS, CPS, ATF, ICE, Private Corporate Spies and Open Access to Your Email What Could Go Wrong?||-A.D.A.M.S., for Anomaly Detection at Multiple Scales.
A Research Division of the Pentagon has now Openly announced that its Computer Scientists will be working on the Project for Anomaly Detection At Multiple Scales. Under this Project they are looking for improved and consolidated ways to scan billions of e-mails a day to identify ‘suspects’ in advance so that individuals can be monitored and crimes can be stopped before they are committed.
|Department of Homeland Security Mind Reading Division – Malintentions Future Attribute Screening Technology (FAST)||-Most preventive screenings look for explosives or items that pose a threat.
This Phillip K Dick ‘Blade Runner’ machine proposes to detect the person — not the device — that may pose a threat.
Not Someone Carrying a Bomb Rather Someone that May Want to Carry a Bomb.
|Malintent Profiling – Malintentions Future Attribute Screening Technology (MFAST)||-Mind Reading Division(Mr.D)
Big Sis Wants Mal-Intent Behavior Scanners At Sports Events, Malls
DHS – DIRECTORATE FOR SCIENCE AND TECHNOLOGY – HUMAN FACTORS DIVISION – Malintentions Future Attribute Screening Technology (FAST)Most preventive screenings look for explosives or items that pose a threat. This Orwellian machine proposes to detect the person — not the device — that may pose a threat. Not Someone Carrying a Bomb Rather Someone that May Want to Carry a Bomb.
|Obama Unleashes Cyber NSTIC||-Obama is planning to Grant the U.S. Commerce Department Authority over cybersecurity efforts to create an Internet NSTIC TrustMark IDentity for Americans||1/11/2011||Targeting|
|Political Witch Hunt Begins Are You a TrustMarked NSTIC Registed Citizen or an Enemy Belligerent||-Political Witch Hunt Begins Are You TrustMarked in the Ecosystem Governance Authority
Those that Oppose ANY STATE ACTIVITY, Including and Especially State Tyranny
|National CyberSecurity Operation Perfect Citizen – Trustmark Citizenship||-Perfect Citizen, TrustMark Identity and the SmartGrid CyberSecurity Agenda
The National Security Agency has Deployed Multiple Levels of Surveillance Sensors Within Strategic Computer Networks and Critical Infrastructure Hubs. As Part of Operation PERFECT CITIZEN these sensors will be triggered and database any Unusual and Anomalous Activity that is suggesting an impended Cyber Attack, Extremist Activity or Domestic Threat.
|Citizen Spy Immunity Under New Bill||-What is the Citizen Spy Network?
Doctors, cable man, realtors, teachers, meter readers, carpet cleaners, priests, etc. have all been given infra guard training for a citizen Spy Network that is integrated into the Smart Grid Fusion Center System.
|DHS HITS US with NSTIC! HIDE, HIDE!!||-DHS HITS US with NSTIC. HIDE, HIDE!
D.H.S. (Department of Homeland Security)
H.I.T.S. (High Impact Technological Solution)
U.S. (United States)
N.S.T.I.C. (National Strategy for Trusted Identities in Cyberspace)
H.I.D.E. (Homeland Identification & Detection Ethics)
H.I.D.E. (Hostile Intent Detection Enforcement)
|Privacy Compliance Review of the Social Media Monitoring and Situational Awareness Initiative of 2011 FULL TEXT||-The Department of Homeland Security (DHS) Office of Operations Coordination and Planning (OPS), including the National Operations Center (NOC), launched the Social Networking/Media Capability (SNMC) to assist DHS and its components involved in the security, safety, and border control associated with the 2010 Winter Olympics as well as the response, recovery, and rebuilding effort resulting from the earthquake and after-effects in Haiti. This limited purpose was expanded in June to meet the operational needs of the Department. Since then, and to meet its statutory requirements, OPS, through SNMC analysts, monitors publicly available online forums, blogs, public websites, and message boards to collect information used in providing situational awareness and establishing a common operating picture.||1/13/2012||Targeting|
|Federal Judge Finds N.S.A. Wiretapping Program Illegal||-It will have to be made retro-active, just like the Bush administration’s police state protectionist laws.
When the other branches of government have gotten in the way of executive branches illegal unconstitutional actions the executive branch will just change the law to allow a standing federal police army, warrentless spying, torture of family members to gain information, indefinite unappealable detention and flat out secret assassinations of citizens.
|The Smart Grid and Privacy||-Introduction
On December 19, 2007, the Energy Independence and Security Act of 2007 was enacted as Public Law 110-140. The bill, among other things, directed that Smart Grid technology be studied for its potential “to maintain a reliable and secure electricity infrastructure that can meet future demand growth”. “Smart” is often used to describe new features or capabilities found in inanimate applications or technologies. These technologies are not human smart, but innovative in that they often provide multi-directional real-time or near real time communication with the user device and provider(s) of a benefit or service(s).
|Google Gate – An Intelligent Prison is this Smart Grid||-Barrack Obama has launched National Cyber-Transformation actions in the United States with the announcement of the Commerce Department’s new division of The National Strategy for Trusted Identities in Cyberspace NSTIC, announced at Stanford University Jan 2011.||3/22/2011||Tracking|
|Relocated to Mountains and Found Rural People Living Under Federal Camera Control||-I moved back to Utah and found a fully federally integrated policy state in action; The county imprisonment system (known as purgatory prison) is a privately owned and operated corporation; the I15, ‘interstate corridors’ and even the stoplights of the very smallest towns, are all under constant federal and police enforcement surveillance cameras, (the Threat Fusion Eye sees all, guilt is presumed, your activity will be held and used against you). The federal government and multinational corporations, via federal regulation and international corporate law, have taken over the private and public domain of Utah.A federal surveillance camera on every street corner.||6/28/2011||Tracking|
|News Corp Spying Operations Small Time Compared with Giant Google||-The Murdock News Corp company, News of the World, stole personal electronic information from private citizens and government officials. Murdock closed the 168 year old paper, News of the World, for misconduct while google is getting away scott-free. Americans seem to eat ‘don’t be evil’ by the truck load, in as much as, Google street view sweep steals everyone’s information. (not just from those that will sell newspapers and not just in London but in nations throughout the world)||7/31/2011||Tracking|
|Publicly Available Social Media Monitoring and Situational Awareness Initiative of 2010 FULL TEXT||-The Office of Operations Coordination and Planning (OPS), National Operations Center (NOC), will launch and lead the Publicly Available Social Media Monitoring and Situational Awareness (Initiative) to assist the Department of Homeland Security (DHS) and its components involved in fulfilling OPS statutory responsibility (Section 515 of the Homeland Security Act (6 U.S.C. § 321d(b)(1)) to provide situational awareness and establish a common operating picture for the federal government, and for those state, local, and tribal governments, as appropriate.||1/13/2012||Tracking|
|Headline Update the NSTIC of Things and the NSTICing of everyone||-NSTIC-ing everyone with everything ever said or done ever. Total Information Awareness (TIA) is Total Justification of Judgment (TJJ) not justice.||7/22/2012||Tracking|
|Senate Bill 773 and 778 ‘‘Cybersecurity Act of 2009’’||-S. 773To ensure the continued free flow of commerce within the United States and with its global trading partners through secure cyber communications, to provide for the continued development and exploitation of the Internet and intranet communications for such purposes, to provide for the development of a cadre of information technology specialists to improve and maintain effective cyber security defenses against disruption, and for other purposes.||3/7/2010||Tyranny|
|`Cybersecurity Enhancement Act of 2010′ TXT||-To advance cybersecurity research, development, and technical standards, and for other purposes.||3/7/2010||Tyranny|
|Internet Kill Switch||-The New ‘Cyber Security’ Act is Death of Internet Freedom
or Destruction of the Gutenberg World Wide Free Press.
Shut Down of Online Freedom of Speech and Online Press in (majority) Side Stream Web Media. All in the Name of National Security, this is their offer; Give us your freedom a we will keep you safe.
|Global Elite Fear Internet’s Power||-Elite’s Social Scientists Provide Most Limited Options within Margin of Exposure in Almost 50 years.
‘Not since 1963 have we been so close to total exposure’, says global elite leader at critical Conference!
|US State Department trained Egyptian Bloggers for Revolution||-Private Spy for Pentagon to Avoid Constitution Stumbling Block – Elite Fear Exposure and Awakening.
Project Vigilant is a Private organization that tracks 250 million IP addresses a day, and there are only around 300 million people in the USA. If you remove most of the Governments Employees and those that don’t have internet access every private citizen could be tracked.
|Private Spy Corporation works for Pentagon to Avoid Constitution Stumbling Block of Liberty and Freedom||-Iraq was a good war – it sparked the Arab spring or did it? The Sunday Times in London by Colleen Graffy’…public diplomacy that was used during the cold war was shifted to harness the 21st-century power of the internet and mobile phones. In 2008 the State Department joined forces with Google, Facebook and others to teach social activists around the world how to use social media to advance positive changes for civil society.||8/3/2010||Tyranny|
|Private Spy Corporation works for Pentagon to Avoid Constitution Stumbling Block of Liberty and Freedom||-Private Corporation, Project Vigilant, Spying on Citizens for Federal Secret Police
Private Spy for Pentagon to Avoid Constitution Stumbling Block – Elite Fear Exposure and Awakening Project Vigilant is a Private organization that tracks 250 million IP addresses a day, and there are only around 300 million people in the USA. If you remove most of the Governments Employees and those that don’t have internet access every private citizen could be tracked.
|Combating Online Infringement and Counterfeits Act – Text||-SECTION 1. SHORT TITLE.
This Act may be cited as the ‘Combating Online Infringement and Counterfeits Act’.
SEC. 2. INTERNET SITES DEDICATED TO INFRINGING ACTIVITIES.
|Rigged Lame Duck Congress – Takes Flight Against Internet with Total Censorship Controls||-Lame Duck Targets Small Online Muckrakers and Alternative Information Sites Under; Operation In Our Sites and 2010 Combating Online Counterfeits Act
Part of the Agenda for the Global Elite is to Continue to rein the Information Exposure that the Internet has unleashed.
|COICA Gives Federal Police Editing Power of the Internet – Goodbye Guttenberg||-Senate Judiciary Committee unanimously approved HR 3804
The Combating Online Infringement and Counterfeits Act (COICA)
The bill gives the Attorney General the Right and Power to shut down websites whether the website/owner has actually committed a crime. This is allows a Total Unilateral Police State of Authority Over the Individual’s Digital Guttenberg Press Access.
|Internet Censorship COICA, Food Modernization, Population Relocation, Forced Medication, Total Population Controls||-EPA Water Fowl and River Zoning, Wildlife Superhighway (Wilderness Corridors) and Industrial Work Zone (Smart Growth Cities), Club of Rome, EU, NATO, NAFTA, GATT, IMF, WORLD BANK, Agenda 21 Now at Cancun Agenda Festival.
How did we get here?
|Internet Theatre of War WWW Lock Down Due to False Flag WikiLeak CypherPunks and Hacker Provocateur Terror Hype and Propaganda on Info BombShells||-The Internet Is the Frontline of the Information Theatre of War, Will the War be Lost, Side Tracked by WikiLeak Misdirection, Hacking Fear Mongering and Cypherpunk Terrorists? This is Information Warfare, a Bomb of Information, Corporate Information Bombs, Business Intelligence, Military Intelligence, Government Intel, National Security Intel, etc. The Federal Information Intelligence is the Largest Intelligence gather System ever Created. 1984 Big Brother Tele-Screens BBTS and Ministry of TRUTH, Pale by what we live under today but WWW puts Their BBCCTV is under threat||12/10/2010||Tyranny|
|Camera on Camera Crime – Illegal to Take a Picture of Feds Taking Our Picture||-If you see something say something – I See Camera on camera crime and unequal camera protection under the law. When the Criminals Control the Cameras||1/4/2011||Tyranny|
|Forced Relocation and Smart Grid Prison Populations – Global Elite Cancun||-The Global Elite scientists Announce Massive Agenda that stalled in Copenhagen, Due to Climate Data Fraud, Starting with the Renewed call for Mandatory Rationing in Developed World Consumption and Production.||1/10/2011||Tyranny|
|Obama NSTIC Creates Second Class UnTrusted Citizen vs First Class ID Trusted Entity Citizen||-Obama Unleashes N-STIC for Trusted e-Citizen Registry
Individual Citizen Registration for Personal Trusted ID entity Card.
National Strategy for Trusted Identities in Cyberspace (NSTIC)
|Envision It! Trusted ID-entity Citizens and Non-ID-Restistry UnTrusted Citizens||-Envision It! Those that can blog anonymously and those that cannot, those that can bank, sell, gamble, shop and those that cannot.
Envision It! You must Register to do things that you can already do now.
|Stop, Think, Connect the Dots; The Patriot Act, FEMA, DHS, Infra-Guard, TSA, NSTIC and TrustMark Citizenship||-Stop, Think, Connect the DHS Dots to Patriot Act, Infra-Guard, TSA, TIA, NSTIC and TrustMark Citizenship||1/13/2011||Tyranny|
|The United States and Venezuela Launch Chinese Style Hostile Internet Takeover||-The United States and Venezuela Launch Chinese Style Hostile Internet Takeover Speech
Venezuela curbs Internet time for dissent
by CYBER WAR Staff Writers – YOUR WORLD AT WAR
|Egyptian Internet Kill Switch – United States Internet M.A.D. Switch||-Egyptian Internet Kill Switch is turned On – Turning Off the Freedom of Speech and Ensuring the Government Desired Riots to Create Division and Fear.||1/28/2011||Tyranny|
|Internet Kill Switch? DHS Switched Killer Internet – Target Kill Switch Mislabels Over 80,000 Innocent Americans||-Millions more mislabeled as Terrorists, Enemy Combatants, Enemy Belligerents, Domestic Extremists, Dangerous Activists, Persons of Interest and Individuals with MALINTENT.Homeland Security Tries And Fails To Explain Why Seized Domains Are Different From Google – Special Agent James Hayes||2/18/2011||Tyranny|
|Google Gates Jobs gate; The RanD Giants Conspiracy||-Google Gates Jobs gate has seen the 20 year Implementation of a Globally Centralized Big Brother, under an electronic Smart Grid,
An Intelligent Prison Planet and the birth of the Electronic Citizen Rating Eco-system in Determining Individual Trustmarks (e-C.R.E.D.I.T.) System
|The NDAA Kill Switch Police State and the i-9/11 economic event||-With The Kill Switch NSA Domestic Terrortist Police State…
Now that Obama will sign the NDAA of 2011 into law…
In the near future…
There could be an e-9/11 event, in which the stock exchange and major financial institutions have their systems ‘hacked’.
Like a 9/11, a 2008, except this would be hacker ‘terrorist’ driven and justify internet and national takeover.
|Is the Government Watching and Warring with the Public?||-Is there a big brother Media Monitoring Initiative and Situational Awareness Initiative toward the public?
Leaked U.S. Army Document Outlines Plan For Re-Education Camps In America
|Killing the Internet with an NSTIC – Citizen Registry in Corp/Gov ID systems||-Is the Government Watching and Warring with the Public? I used to not be wary of expressing myself or utilizing the internet, however now that there is going to be a centralizing federal/private integration of online identity security measures, in the National Strategy for Trusted Identities in Cyberspace (NSTIC), I am terrorized by the idea.||2/19/2012||Tyranny|
|Government Attacks People’s Rights||-The privacy-invasive bill known as CISPA—the so-called “cybersecurity” bill—was reintroduced in February 2013. It passed, is it dangerous?||4/22/2013||Tyranny|
The United States is Seen throughout the World as a Police State of Mass Criminal Internment of the Public for Policy Violations and Suspicion of Belligerence against State Activity. While the State Activity is often Fraudulent and Criminal in many parts of the World.
Human Civil Liberties and Individual Fundamental Natural Rights are Not Granted By Government; Rather they are the Sovereign Domain and Born of the Original Holders of Autonomy in the Nature of Each Individual Child of Man.
They Can Not Be Infringed, Violated, Liened, Regulated, Policed, Certified, Licensed, Censored, Denied, Molested, Searched, Groped, Fondled, Restrained, Detoured, Abused, Forced, Granted, Limited or Encroached under any manner of Action Prevented from One Individual over Any Other.
Congress Shall Make No Law
“If every person has the right to defend – even by force – his person, his liberty, and his property, then it follows that a group of men have the right to organize and support a common force to protect these rights constantly. Thus the principle of collective right -–its reason for existing, its lawfulness — is based on individual right.”
Lame Duck Officials voted out of office are vying for corporate jobs by pushing such legislation as the Food Safety Modernization Act and the Combating Online Infringement and Counterfeits Act which are now on the fast track to becoming law.
Food Safety Modernization Act
- Preclude the public’s right to grow, own, trade, transport, share, feed and eat each and every food that nature makes.
- It will more than likely make Michael Taylor (former Monsanto executive) the Food Czar.
- End U.S. sovereignty over its own food supply by forcing compliance with WTO guidelines.
- Even direct sales of food between individuals could be defined as smuggling under the language of the bill.
- Codex Alimentarius, a global system of control over food and food supplements, would control all U.S. food and supplements. Access to natural food supplements would be removed under Codex rules.
- Control of all seeds would transfer to Monsanto and other global multinationals.
- The National Animal Identification System ( NAIS ) would be enacted, forcing bio-chipping and other identification and tracking methods for all animals, whether food or pets.
- What is left of the American food system would be transferred into total control of Multinational Corporations under the guise of global governance.
Allows Total Black Box Black Listing of Websites from the Federal Bureau of Inter-Intra Electronic Virtual World Censorship. Total Control Switch Power with Impunity and Immunity, U.S. Shuts Down Web Sites in Piracy Crackdown.
From Wired: The content companies have tried suing college students. They’ve tried suing internet startups. Now they want the federal government to act as their private security agents, policing the internet for suspected pirates
From ITWorld: office workers sharing songs on iTunes could get you in trouble if the files are exposed outside the firewall, or if some of your PowerPoint Rangers are a little too free with the quotes or movie clips they use to liven up the presentations, especially if the .PPTs are distributed across the WAN or Internet to branch offices and other divisions.
Written by sovereignthink
2010/11/27 at 10:09 pm
Posted in Federal America Police State
Tagged with agenda 21, alex jones, Anomaly Detection at Multiple Scales, ATF, banker fraud, Big Brother, Body, bombshell feta camps, camps, Carnivore, cia, cia funded, cia funded spy, Cognitive Enhancement, COICA, Combating Online Infringement and Counterfeits Act, Confirmed FEMA Camps, conspiracy, Constitution, Constitutional Democratic Republic, corrupt, CPS, DA San Mateo, darpa, dhs, DHS Source, dollar dead 2010, email tap, endgame, Eschelon, false flag, FBI, Federal Reserve, felony groping investigation, FEMA Camps Bombshell Confirmation, FEMA Camps Confirmation, FEMA Camps Confirmed, FEMA Concentration Camps, feta camp bombshell, Fighting DHS Police State, fraud, global elite, global elite agenda, global elite chart, global elite graph, global elite history, global elite propaganda, global elite timeline, global governance, global governance chart, global governance graph, global governance timeline, Gomorrah, google launches, google spies, government funded spying, Grope Stapo, gropestapo, HLS, hr 645, hr645, ICE, if, infowars, intrusive, investigate dhs groping, Investigate Federal Groping, investigate felony groping, investigate tsa groping, it can happen, it can happen here, it can't happen, it can'y happen here, John Warner National Defense Authorization Act, law, Left Right paradigm, love pat, lovepat, martial, mercenary, military, military industrial complex, Naked, National Emergency Centers Establishment Act, Nazi Germany, now, NSA, nwo, Open Federal Fusion Police State, pad 51, patdowns, police, police state, policestate4, pre crime, precrime, Private Corporate Spies, private spy, Project Vigilant, QE2, Red China, scanners, search warrent, secure in privacy, sexual assault, Sodom, Sovereign States and Individuals, sovereign think, sovereignthink, spy corporation, spy grid, state, Steve Wagstaffe, Steve Wagstaffe tsa, the CIA, TIA, Total information awareness, TSA, tsa backlash, tsa groping investigation, TSA Infuriated, TSA Infuriated With Coverage Of Nationwide Backlash, tsa love pat, tsa lovepat, tsa rape, tsa revolt, tsa sexual battery, two, tyranny chart, tyranny cycle, tyranny graph, tyranny timeline, warrantless
Global Elite – Creating a Global Governance Prison System
A group of individuals gathered in a common land to form collective order and protection is a government of people.
What is a Just Government?
A government that Upholds Individual Sovereignty Under Fundamental Natural Rights.
A government that Upholds the Community Trust and Public Domain Under Equity and Justice
Either of these aspects can barely be found in the western civilisation. The Spheres of influence and Government Controls have continued to encroach and blurred the lines of Sovereign Spheres of Authority and Justice established since the Magna Charta.
These are Separate and Inviolate Spheres of Authority, Unalienable Spheres of Sovereign Domain. All Derived From the Voluntary Consent and Authority of the Sovereign Individuals. They are the Original Agents of Authority and the Only Just Holders of Autonomy.
There is a sphere of stewardship, a sphere of self determination, a sphere of sovereignty that every individual Human Being possesses.
This sphere of self is an inviolate and unalienable domain of personal private sovereignty.
There is a sphere of stewardship, a sphere of group determination, a sphere of sovereignty that every voluntary group of Human Beings posses.
This sphere of the voluntary group is a Just and Equitable domain of public community sovereignty.
There is another sphere, a sphere of Rulership, a sphere of other’s determination over others, a sphere of A sovereign over another that every Individual Human Being Opposes.
This sphere of Rulership is an involuntarily distributed and centrally controlled domain of authority under Force and Tyranny.
Any government or act that violates the Sovereign Individual’s Fundamental Natural Rights is Unlawful, Immoral and Evil.
Any government or act that violates the voluntary Public Domain and Community Trust’s Justice, Truth or Equity is Unlawful, Immoral, Evil and outside the Authority of Natural Law the Authority of Our Fundamental Natural Rights.
Fundamental Natural Rights are any rights that every individual can claim simultaneously without forcing someone else to serve their needs.
We give the government Its Authority to act. We can only give the government permission to do those things that we ourselves can lawfully do. Security in Our privacy, papers, effects, anonymity, body, travel and activities is sacred and Sovereign. I can not demand these things of anyone at anytime, only unless there is sworn proof beyond a reasonable doubt that a crime has been committed or is being committed.
We have seen this progression and evolution from the blatant openly admitted Bush Doctrine “It is not illegal when the President Does it or Orders it” and onto the continued Centralizing Control Doctrine of today.
Judge Napolitano; “It is a Religion of Control Freaks that think the Government can do what ever it wants.
53% of Americans believe that the government is operating outside the constitution and aren’t doing anything about it!
“If the Government is operating outside the constitution, it’s time to change the government. I mean, that is about as reckless a thing as you could be. The Constitution equals the Rule of Law. If the Government is not obeying the Rule of Law, how can they impose Laws upon Us?
“But one person isn’t listening and he could stop this with a phone call, and that is the President. Who wants to induce us to conform to his way of behaving and thinking, just… like… his… predecessor.”
That is Barack Obama and George Bush in the seamless B&O Railroading of America.
In less than nine years Over 42,000 factories have closed in the United States
Our World Reserve Currency Status is Lost
Our Economy is Bleeding to Death
The Government is Hiring Police to Prepare for the Problem
The Federal Government and Federal Reserve are unilaterally ‘Spending’ More Than Everything ever spent before every Few Years.
Under the Federal Governments Economic Policy, the Foreign Policy, the War Policy, the Domestic Terror Policy, the War on Drug Policy, the Disclosure Policy, the National Security Policy, the Currency Policy, the Immigration Policy, the Domestic Spying Policy, the Travel Policy, the Family Court Policy, the Suspension of Law Policies.
The People of the United States have come to Learn that the Policey State Under which they live is in many ways Orwell-ian and Wells-ian in Principle and Practice.
It is a total affront to Liberty, Freedom, Rights, Law, Justice, Truth, Integrity or Honor.
This Government of Federal Policy Bureaus are the Alarm Bell of Liberty that is awakening the Sleeping Giant. That Giant is One Force of Unified Protection and Defense For the Individual’s Indivisible Sovereignty of Fundamental Natural Rights Under Freedom, Liberty and Justice for the All.
“I think this is starting to sink in across the board. It knows no ideological, no ethic, no gender line. I think the American Public are saying Enough is Enough.” We are waking up and we see who the Criminals are.
Global Elite – Integrated Global ‘Climate’ Agenda
Even after Climate Change Fraud has been utterly exposed as a farce created by multinational corporations and the Global Elite directed Think tank Universities and after most of the Third world in, light of this and disband the corrupt agenda in Copenhagen, the UN Agenda is still moving full speed ahead in Cancun Mexico.
Top of the list is still population control reductions, relocation into green cities and off the land and the reallocation of industry into green production and ‘living’.
Three Stage Agenda
- The first stage of vulnerability assessment and economic valuation of priority measures corresponds to the enactment of this Special Program in the 2009–2012 period, the main result of which will be the design of an integrated program of adaptation, executed progressively.
- The second stage, strengthening strategic, large-scale adaptation capacities, from 2013 to 2030, includes as priorities: attaining equilibrium between degradation/deforestation and restoration/reforestation; the adoption and implementation of sustainable agriculture and livestock production systems; the eradication of measures that encourage environmental degradation and cause GHG emissions; the implementation of relocation programs for human settlements and infrastructure in high risk areas, and the implementation of policies aimed at climate stability and sustainable development.
- The third stage, the consolidation stage, between 2030 and 2050, will result in attaining a positive balance between reforestation and deforestation, development options that ensure environmental sustainability, and a strengthened national planning system based on criteria to decarbonize the economy and minimize vulnerability to climate change.
This is the Agenda Funded by, muti-nationals, RanD, IMF, World Bank, Rockefeller/Ford Foundations and Endowments and Rothchild/Saxe-Coburg-Gotha Trusts and Groups.
This is just weird. Massive scam or money laundering on the part of the Vatican Bank? Who knows…
This what comes from debt based privately own fiction fiat currency and measurements of human life.
Bailey Savings and Loan were have you gone?
We Must Restore and Reclaim the Local Public Domain to Defend Liberty and the Integrity of our Lives.
Lord James of Blackheath, Speech on Foundation X (House of Lords, 01/11/2010)
Written by sovereignthink
2010/11/25 at 9:18 pm
Posted in Global governance - One World Order
Tagged with agenda 21, alex jones, Anomaly Detection at Multiple Scales, ATF, banker fraud, Big Brother, Body, bombshell feta camps, camps, Carnivore, cia funded, cia funded spy, Cognitive Enhancement, Confirmed FEMA Camps, conspiracy, Constitution, Constitutional Democratic Republic, corrupt, CPS, darpa, dollar dead 2010, email tap, Eschelon, false flag, FBI, Federal Reserve, FEMA Camps Bombshell Confirmation, FEMA Camps Confirmation, FEMA Camps Confirmed, FEMA Concentration Camps, feta camp bombshell, fraud, global elite, global elite agenda, global elite chart, global elite graph, global elite history, global elite propaganda, global elite timeline, global governance, global governance chart, global governance graph, global governance timeline, Gomorrah, google launches, google spies, government funded spying, HLS, hr 645, hr645, ICE, if, it can happen, it can happen here, it can't happen, it can'y happen here, John Warner National Defense Authorization Act, mercenary, military, military industrial complex, National Emergency Centers Establishment Act, Nazi Germany, now, NSA, nwo, Open Federal Fusion Police State, pad 51, police state, policestate4, pre crime, precrime, Private Corporate Spies, private spy, Project Vigilant, QE2, Red China, search warrent, secure in privacy, Sodom, Sovereign States and Individuals, sovereign think, sovereignthink, spy corporation, spy grid, the CIA, TIA, Total information awareness, two, tyranny chart, tyranny cycle, tyranny graph, tyranny timeline, warrantless