We’re dealing with a NATION of Treasonous Murderous Cavalier TRAITORS using SKYNET AI (NSA CIA DOD) Soulless Men/Spiritual Machines for the Federal Reserve to Survive the coming Catastrophes

“For we are opposed around the world by a monolithic and ruthless conspiracy that relies on covert means for expanding its sphere of influence–on infiltration instead of invasion, on subversion instead of elections, on intimidation instead of free choice, on guerrillas by night instead of armies by day.

We’re dealing with a NATION of Treasonous Murderous Cavalier TRAITORS using SKYNET AI (NSA CIA DOD) Soulless Men/Spiritual Machines for the Federal Reserve to Survive the coming Catastrophes

This treasonous act reportedly signed by TRUMP (what a laugh — he handed the country over to PENCE months ago and resigned the NDAA and Patriot Act, like all the other fake Presidents since the NAZI war machine killed our last authentic President, John F. Kennedy and his brother Robert Kennedy) was already enacted in secret years ago. From Dr. Robert Duncan, a former CIA Scientist turned whistleblower who worked and developed all weapons for these so called acts (of TREASON MURDER THIEVERY) for the already super rich Freemasonic Rosicrucian Swiss Banksters of the treasonous Federal Reserve by Rockefeller’s grandfather 1913).

Horrendous weapons are used with the CYBERNET WARFARE, the US military.

These horrendous weapons (yes weapons) are being used with the integrated global surveillance grid and direct energy weapons on innocent civilians, mostly ladies… 1000s of us and whistleblowers, activists (after attacked for help), dissidents and random (they need the numbers) and a lot of former military members — all attacked with cybernetic warfare US criminal DOD and corrupt behind belief CIA NSA who are On the Take and loving it (See here, here and here). Cybernetic Warfare was started on my in the fall of 2005, 2 weeks prior as a highly litigated lawsuit was about to commence after 7+ long years. They killed my husband on a military industrial site owned thru Wall Street hiring one of the top 10 law firms in the country out of Washington, DC.

We are dealing with a nation of treasonous murderers using SKYNET AI (NSA CIA DOD).

As a detective informed me regarding who’s chasing me down, who hacked into my computer as I prepared for justice, who’s slow killing me… He said “its a Nation of Traitors to my Constitution and Bill of Rights,” my human rights be damn. The CIA DOD are committing murderous, torturous weapon and biological chemical testings on the American people and other innocents abroad.

I vowed that as I’m being slow killed, after they killed off my entire family tragically and horrendously with their AI SKYNET weapon system, and as they do the same to me, I will stand by my Constitution, my Bill of Rights, my alienated rights under my Creator and with the upmost respect for life, especially my own, after they robbed me blind, pyscho terrorized me and continue to, to warn as many as possible, regardless. The US military and CIA do not KNOW my kind of courage and tenacity. And never will nor their cybernetic AI psycho-warrior machine that’s chasing me down mind controlling everyone to do its and the the CIA DOD’s dirty filthy work.

Like Dr. Duncan, our goal is to and in Duncan’s words: “…to awaken Americans to the continued horrific acts of military and CIA weapons testers in this country and the other branches of government’s inability to stop them and hold them accountable.” — The Matrix Deciphered — https://thoughtlessness23.blogspot.com/.

By Dr. Robert Duncan — Project: Soul Catcher: Secrets of Cyber and Cybernetic Warfare Revealed Paperback – September 27, 2010 https://www.amazon.com/Project-Catcher-Secrets-Cybernetic-Revealed/dp/1452804087.

Volume 2 details the CIA’s practices of interrogation and cybernetic mind control in their pursuit to weaponize neuropsychology. It covers the art of bio-communication war. Human beings are complex machines but their inner workings have been deciphered. Mind control and brainwashing have been perfected in the last 60 years. Hacking computers and hacking into individual minds are similar. The 21st century will be known as the age of spiritual machines and soulless men.

Written by the Marshall Report — keep in mind, Duncan wrote of this and worked on it prior to 2010 and I was attacked with their AI machine in 2005 and seen it released onto the public as early as 1972.

They all work for the Federal Reserve Rockefeller Rothschild Jesuit Black nobility top of pyramid families and kept it secret by having (quoting JFK) secret meetings, secret oaths, secret sessions with diplomatic cover as a monolithic conspiracy (Freemasons) Wall Street as a new (old) world order and would silence dissent and enslave every man woman and child in America — JFK.

Its all on the back of our one dollar bill: Order out of chaos & new world order Bush Sr states this here and here 1991.

Everyone of them, Trump included are a disgrace and dishonor to themselves.

Begin

President Trump Invokes 2018 executive order, authorizing military response to cyber warfare, see NSPM 13! – THE MARSHALL REPORT
https://themarshallreport.wordpress.com/2020/12/05/president-trump-invokes-2018-executive-order-authorizing-military-response-to-cyber-warfare-see-nspm-13/comment-page-1/#comment-36996

10 USC 394: Authorities concerning military cyber operations

In case you’re wondering whether the U.S. military under Trump really has the authorization to respond to acts of cyber warfare with coordinated conventional military actions, read 10 USC, Section 394. Subtitle A, Part 1, Chapter 19, which is available via uscode.house.gov: (I’m bolding the especially important sections): §394. Authorities concerning military cyber operations (a) In General.-The Secretary of Defense shall develop, prepare, and coordinate; make ready all armed forces for purposes of; and, when appropriately authorized to do so, conduct, military cyber activities or operations in cyberspace, including clandestine military activities or operations in cyberspace, to defend the United States and its allies, including in response to malicious cyber activity carried out against the United States or a United States person by a foreign power. (b) Affirmation of Authority.- Congress affirms that the activities or operations referred to in subsection (a), when appropriately authorized, include the conduct of military activities or operations in cyberspace short of hostilities (as such term is used in the War Powers Resolution (Public Law 93–148; 50 U.S.C. 1541 et seq.)) or in areas in which hostilities are not occurring, including for the purpose of preparation of the environment, information operations, force protection, and deterrence of hostilities, or counterterrorism operations involving the Armed Forces of the United States. (c) Clandestine Activities or Operations.- A clandestine military activity or operation in cyberspace shall be considered a traditional military activity for the purposes of section 503(e)(2) of the National Security Act of 1947 (50 U.S.C. 3093(e)(2)). f) Definitions.-In this section: (1) The term “clandestine military activity or operation in cyberspace” means a military activity or military operation carried out in cyberspace, or associated preparatory actions, authorized by the President or the Secretary that- (A) is marked by, held in, or conducted with secrecy, where the intent is that the activity or operation will not be apparent or acknowledged publicly; and (B) is to be carried out- (i) as part of a military operation plan approved by the President or the Secretary in anticipation of hostilities or as directed by the President or the Secretary; (ii) to deter, safeguard, or defend against attacks or malicious cyber activities against the United States or Department of Defense information, networks, systems, installations, facilities, or other assets; or (iii) in support of information related capabilities.

Trump announced “offensive cyber operations” just one week after signing his September 12, 2018 Executive Order!

https://merrileebeazley.org/situation-update-dec-3rd-trump-invokes-foreign-interference-provision-of-his-2018-executive-order-authorizing-military-response-to-cyber-warfare-see-nspm-13/?fbclid=IwAR3ZC2ufMlKqJxlFMaYFlyqz6cUDuyxjcHjmKii84OGqjBn_MvHxfbY5tGg


The CIA TORTURERS, w/Over 3,000 NSA & over 100 DIA Research Funded Papers — All research roads lead to DARPA HARPA & now IARPA w/FEISTA in JAPAN (Cite: Whistleblower Aaron McCollum, 3rd Generation Super Soldier from the projects in the Deep underground military milab bases) See bottom of post for references.THE CULPRITS — Doctors

COVID-19 Seedling Research Topics
https://www.iarpa.gov/index.php/working-with-iarpa/287-research/current-research/covid-19/covid-19-baa/1201-covid-19-seedling-research-topics

Dr’s names — beta.SAM.gov
https://beta.sam.gov/opp/7aa04cbfcd8d4c6395e8f858b18d2eb6/view?keywords=IARPA&sort=-relevance&index=&is_active=true&page=1

‘THE” File — Assange released these –

Wikileaks: On the Taken and Loving It https://wikileaks.org/wiki/On_the_take_and_loving_it

On the take and loving it

A science is said to be useful if its development tends to accentuate the existing inequalities in the distribution of wealth, or more directly promotes the destruction of human life…

Academic recipients of the U.S. intelligence budget. By Julian Assange (ja@iq.org – Advisory Board) Date October 7, 2007

Over the last decade, U.S intelligence funding of academic research has taken on cavalier, even brazen qualities. This article reveals over 3,000 National Security Agency and over 100 Defense Intelligence Agency funded papers and draws attention to recent unreported revelations of CIA funding for torture research.

Covert CIA-funded torture research

The June 2007 edition of Anthropology Today contains a paper Buying a piece of anthropology, Part 1: Human Ecology and unwitting anthropological research for the CIA by David H. Price, an Associate Professor of anthropology and sociology at St. Martin’s University. The article details how during the 1960s the CIA used the Human Ecology Fund to push a covert research agenda into torture and interrogation techniques.

Alan Howard and Robert Scott, two recipients of covert CIA grants who developed a theoretical model for “stress in humans”, were given an opportunity to respond:

As David Price points out in his article, we were deeply dismayed to learn that the Human Ecology Fund, which provided a summer stipend to write our article on stress, was a front for the CIA, and that the paper might have been used to generate torture procedures. We are firmly opposed to any actions that are degrading to human dignity under any circumstances, including warfare. All of our contributions to the health and welfare literature have been written with the goal of alleviating human suffering, not using it to gain hegemonic advantage.

While the exposure of the Human Ecology Fund is important in light of the active use of torture by the Bush administration, it leaves the impression that such funding is cold war history. However, as we shall see, current intelligence funding of the academy is pervasive.

The National Security Agency

World telecommunications traffic flows. Many countries communicate phone calls and internet traffic with each other by passing traffic through the United States where the traffic is intercepted in bulk by the National Security Agency

In 1999 I reviewed all National Security Agency patents in order to understand a mystery. Here was the premier spy agency, with bases all over the world and a budget larger than that of the FBI and CIA combined yet it was the subject of a solitary — and vaguely hagiographic — work from 1982, James Bamford’s “The Puzzle Palace”.

For several years the consensus among NSA watchers such as the Guardian’s Duncan Campbell (the C in the ABC trial) was that the NSA had failed in its quest for “the grail” despite over two decades of research. What was this “grail”?

Consider the following joke, popular in U.S university mathematics departments where for several years the NSA had hired half of all new maths Phds:

The NSA offers exciting and interesting work for recent college graduates in mathematics and computer science. Pick up the phone, call your mom, and ask for an application.

The NSA, not known for its sense of humor, was pained that this joke was not a universal reality. While its bases, spy satellites, undersea cable taps and secret deals with telcos could mass-intercept the world’s voice calls, the NSA would need millions of employees to listen for “NSA”, “application” and whatever else the agency or its political masters were interested in. What the NSA needed was a way to automate both listening and interception.

Removing the human element would permit the NSA to leap from millions of daily voice intercepts, with a few thousand human transcriptions, to millions of daily voice intercepts with millions of transcriptions, archived and “googleable” for eternity. Historically the two primary checks on NSA powers have not been Congressional oversight nor even the economic costs of bulk interception, but of costs of bulk transcription and translation. By 1999 translation had been partially automated (enough for search) and transcription remained as the final barrier to the agency’s goal of being the universal spy with an ear in every international (and now every domestic) phone call.

I followed a trail from two of the patents to other sources and front companies such as the “Maryland Speech Research Agency” and showed in the London Independent that the NSA had found its grail.

But this isn’t a story about universal hegemonic spying. It is a story about “academic” research.

NSA funding of academic research

During my investigation I discovered that many of the NSA’s research funding covers were essentially transparent. U.S intelligence agencies, in finding the ideological playing field to themselves, have little need of complex funding concealment. Efforts to hide the true source of intelligence derived academic funding are now minimal. Research funding cover names, at least for the NSA, are not directed at counter-intelligence, they are shields against cursory third-party social opprobium and apparently largely voluntary. I will mention a specific example.

Grant code ‘MDA904’ – National Security Agency

The NSA has pushed tens or hundreds of millions into the academy through research grants using one particular grant code. NSA funding sources are often nakedly, even proudly, declared in research papers (“I may be nothing, but look, a big gang threw me a sovereign”). Some researchers try to conceal or otherwise downplay the source using accepted covers, weasel words and acronyms, yet commonality in the NSA grant code prefix makes all these attempts transparent. The primary NSA grant-code prefix is MDA904.

[try it — http://www.google.com/ MDA904″ orMDA-904″  https://www.startpage.com/, or use https://www.duckduckgo.com/.%5D

Googling for this grant code yields 49,900 references (Oct, 2007) although some refer to non-academic contracts (scholar.google.com 3,100). From this one can see the board sweep of academic research interests being driven by the NSA.

An examination of academic papers referencing the code gives the impression that most or all research grantees know the true source of their funding. These are not academics who have been fooled. These are willing, even eager, participants.

Various levels of funding concealment can be seen when we subtract out the naked NSA references (from Google search results) and look at what remains.

Googling for ‘MDA-904 -“National Security Agency”‘ reveals the first level of cursory concealment from social sanction — just use the acronym. This ploy is not so effective anymore, but it must be remembered that it is only in the last few years that the acronym has come into common political or social parlance. Insiders used to joke that NSA stood for “No Such Agency”.

‘MDA-904 -NSA -“National Security Agency”‘, shows that many are fond of using the light cover Maryland Procurement Office or the umbrella cover “Department of Defence” or “DoD”

‘MDA-904 -NSA -“National Security Agency” -Maryland -DoD -“Defence”‘, shows that many more light covers abound, e.g Advanced Research and Development Activity (ARDA).

Finally, some researchers are inclined to use the grant code alone without any revealing context.

Example documents

Mass surveillance research is not academic

One may look at an intelligence funded paper such as Geometric Hyperplanes of Lie Incidence Geometries, ostensibly a matter of pure mathematics and ask what the connection is with surveillance powers. It may be hard for us to see the connection, but we know that the paper’s funders think there is one. The NSA and other intelligences agencies do not fund research capriciously. There is no NSA funding for HIV education or tastier ice cream cones. Intelligence agencies fund research that they think will give them an edge or establish a closer relationship with the researchers concerned, gradually co-opting them into financial dependency.

In the example of Geometric Hyperplanes of Lie Incidence Geometries, this work is likely related to dimensionality reduction. Massive interception databases of who talked to who and when and about what have high dimensionality. Dimensionality reduction is needed to simplify the complexity until intelligence officers can understand the social relationships they are interested in. Additionally, privacy protecting algorithms used on the internet and elsewhere are designed to be of high dimensionality — and so hard to crack.

In the same way that CIA sponsored research into stress models were used by the CIA to design torture and interrogation techniques, NSA sponsored research into branches of what seem to be pure mathematics are used for global surveillance of communications — the end result of which is to further general U.S. war and intelligence objectives, including handing people over to the CIA for interrogation or torture.

We should not let our lack of imagination about the abstract or arcane deceive us. When a tobacco company funds research into cancer, we may not understand the details, but we know the tocacco company saw something in it for them.

Here is a brief guide to understanding the connection between the major activities of the NSA and research into what appear to be obscure branches of engineering or mathematics.

  1. Interception of communications (collection)
    1. Sensitive antennas
    2. Sensitive microphones
    3. Satellite technology
    4. Video processing
    5. Fiber optic
    6. Internet routing
    7. Computer hacking
  2. Decoding intercepted communications
    1. Signal processing
    2. Protocol conversions
    3. Cryptanalysis (breaking codes)
      1. Mathematics
      2. Quantum computation
      3. Parallel computation
  3. Transformation of intercepted communications
    1. Automated speech transcription
    2. Automated translation
    3. Additional protocol conversions
  4. Analysis of intercepted communications
    1. Speaker identification
    2. Tracking
    3. Clustering
    4. Pattern detection & data mining
    5. Massive databases
  5. Counter-intelligence
    1. Computer security
    2. Cryptography
      1. Mathematics

Additional documents

Grant code ‘MDA908’ – Defense Intelligence Agency

Similarly, the DIA uses the Virginia Contracting Activity as its contracting and grant making light cover.

Example documents

Additional documents

Conclusion

Far from the “deep dismay” expressed by some academics on being informed about covert CIA grants in the 1960s, modern academic recipients of the intelligence budget are “on the take and loving it”.

Educated, intelligent people have many opportunities in life. Those who out-source their minds to secretive and abusive organizations demonstrate to us either a lack of intellectual ability or an impoverished moral standard. They do not earn my respect as scholars or as human beings.

See also

Questionable Practices Concerning the Navy’s Acquisition of ADP Equipment … – United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommittee – Google Books

von United States. Congress. House. Committee on Government Operations. Legislation and National Security Subcommitteehttps://books.google.de/books?id=nIYV_MkT0OQC&lpg=PA470&ots=TzAh1msnKY&dq=MDA-908&hl=de&pg=PA468#v=onepage&q=MDA-908&f=false