Dave Mustaine: “Obama staged Aurora Shooting”

By LUIS MIRANDA | THE REAL AGENDA | AUGUST 16, 2012

UPDATE  – 4:00 pm: Dave Mustaine issued a statement on the Alex Jones Radio Show clarifying that his statement sought to mirror an existent opinion given by Larry Pratt, head of Gun Owners of America, who said that if the US government had carried out Fast and Furious, people had to be open to believe that the mass shootings in Wisconsin and Colorado could have also been conducted by the same corrupt people.

Original Article:

Megadeth lead singer, Dave Mustaine had no contemplation during a recent concert in Singapore regarding Barack Obama’s action in the United States. While he was taking a break between songs, Mustaine said that Obama’s wish to impose new rules about gun ownership went as far as staging shootings such as the ones that took place in Colorado and Wisconsin.

Mustaine thanked the audience and then began talking about his opinion on current events in the United States and how Obama and his government were transforming the U.S. into a Nazi country. “So he’s staging all of these murders, like the ‘Fast And Furious’ thing down at the border, Aurora, Colorado, all the people that were killed there, and now the beautiful people at the Sikh temple,” said Mustaine, before adding, “I don’t know where I’m gonna live if America keeps going the way it’s going because it looks like it’s turning into Nazi America.”

The singer also mentioned US government corruption related to the not so secret gun running scheme known as Fast and Furious, under which the US government shipped guns to Mexican Drug Cartels in order to blame the second amendment and issue more regulations on gun ownership.

The race to impose limitation on the second amendment became even stronger this year, after the alternative media unveiled the corrupt gun dealing secret program ran by the US Justice Department. Since it was revealed the the US government was involved in the shipping of firearms to Mexico, three mass shootings conveniently occurred to give the very same gun running government the opportunity to call for the erosion of the right to own and bear arms.

See Mustaine’s comments below:

As we reported on The Real Agenda, both shooters in Aurora and Wisconsin had very close ties to the US government. In the case of Holmes, he was the recipient of a $26,000 government grant — offered to him through the National Institutes for Health — for the specific purpose of studying Neuroscience. The National Institutes of Health is a component agency of the U.S. Department of Health and Human Services. This relationship makes Holmes’ mass killing a painful example of taxpayer-funded homicide.

But the details about Holmes get even stranger. According to Journalist Wayne Madsen, there are more links between James Holmes and American government research, such as the the Salk Institute, a place involved with neurologically enhancing soldiers’ abilities on the battlefield, which also has connections with the US Defense Advance Research Projects Agency (DARPA).

In the case of Wade Michael Page, his connections to government programs are also clear and very direct. Up until 1998, Page was a US Army Psy-Op specialist. Psychological Operations are an important part of the US Army. In fact, they are conducted all the time. Page held his position at Fort Bragg until he was given a less-than-honorable discharge.

All Fast and Furious as well as the Colorado and Wisconsin shootings have also given international organizations such as the UN, the opportunity to call for more worldwide gun control, to a point where the globalist organization has proposed a ban on the Constitutional right to own firearms. The UN intends to be the sole owner of most of the powerful weaponry now available to countries around the world to become the referee in any international dispute while nations and their citizens are banned from owning firearms to defend themselves.

Dave Mustaine adds his name to the long list of celebrities and other public figures who seem to be waking up to government corruption and tyranny. Other known people who have come out to talk about Fast and Furious, staged shootings and other issues include Former Atlanta Braves player,John Rocker, TV and movie actor Charlie Sheen, former governor Jesse Ventura, former presidential candidate, Ron Paul, Judge Andrew Napolitano and many more.

Internet Dictatorship Begins in Singapore

A “new” system that records every move, stores all passwords and homogenizes software and that will control the net from 3 major hubs.

by John Markoff
NYTimes
June 25, 2011

A small group of Internet security specialists gathered in Singapore this week to start up a global system to make e-mail and e-commerce more secure, end the proliferation of passwords and raise the bar significantly for Internet scam artists, spies and troublemakers.

“It won’t matter where you are in the world or who you are in the world, you’re going to be able to authenticate everyone and everything,” said Dan Kaminsky, an independent network security researcher who is one of the engineers involved in the project.

The Singapore event included an elaborate technical ceremony to create and then securely store numerical keys that will be kept in three hardened data centers there, in Zurich and in San Jose, Calif. The keys and data centers are working parts of a technology known as Secure DNS, or DNSSEC. DNS refers to the Domain Name System, which is a directory that connects names to numerical Internet addresses. Preliminary work on the security system had been going on for more than a year, but this was the first time the system went into operation, even though it is not quite complete.

The three centers are fortresses made up of five layers of physical, electronic and cryptographic security, making it virtually impossible to tamper with the system. Four layers are active now. The fifth, a physical barrier, is being built inside the data center.

The technology is viewed by many computer security specialists as a ray of hope amid the recent cascade of data thefts, attacks, disruptions and scandals, including break-ins at Citibank, Sony, Lockheed Martin, RSA Security and elsewhere. It allows users to communicate via the Internet with high confidence that the identity of the person or organization they are communicating with is not being spoofed or forged.

Internet engineers like Mr. Kaminsky want to counteract three major deficiencies in today’s Internet. There is no mechanism for ensuring trust, the quality of software is uneven, and it is difficult to track down bad actors.

One reason for these flaws is that from the 1960s through the 1980s the engineers who designed the network’s underlying technology were concerned about reliable, rather than secure, communications. That is starting to change with the introduction of Secure DNS by governments and other organizations.

The event in Singapore capped a process that began more than a year ago and is expected to be complete after 300 so-called top-level domains have been digitally signed, around the end of the year. Before the Singapore event, 70 countries had adopted the technology, and 14 more were added as part of the event. While large countries are generally doing the technical work to include their own domains in the system, the consortium of Internet security specialists is helping smaller countries and organizations with the process.

The United States government was initially divided over the technology. The Department of Homeland Security included the .gov domain early in 2009, while the Department of Commerce initially resisted including the .us domain because some large Internet corporations opposed the deployment of the technology, which is incompatible with some older security protocols.

Internet security specialists said the new security protocol would initially affect Web traffic and e-mail. Most users should be mostly protected by the end of the year, but the effectiveness for a user depends on the participation of the government, Internet providers and organizations and businesses visited online. Eventually the system is expected to have a broad effect on all kinds of communications, including voice calls that travel over the Internet, known as voice-over-Internet protocol.

“In the very long term it will be voice-over-I.P. that will benefit the most,” said Bill Woodcock, research director at the Packet Clearing House, a group based in Berkeley, Calif., that is assisting Icann, the Internet governance organization, in deploying Secure DNS.

Secure DNS makes it possible to make phone calls over the Internet secure from eavesdropping and other kinds of snooping, he said.

Security specialists are hopeful that the new Secure DNS system will enable a global authentication scheme that will be more impenetrable and less expensive than an earlier system of commercial digital certificates that proved vulnerable in a series of prominent compromises.

The first notable case of a compromise of the digital certificates — electronic documents that establish a user’s credentials in business or other transactions on the Web — occurred a decade ago when VeriSign, a prominent vendor of the certificates, mistakenly issued two of them to a person who falsely claimed to represent Microsoft.

Last year, the authors of the Stuxnet computer worm that was used to attack the Iranian uranium processing facility at Natanz were able to steal authentic digital certificates from Taiwanese technology companies. The certificates were used to help the worm evade digital defenses intended to block malware.

In March, Comodo, a firm that markets digital certificates, said it had been attacked by a hacker based in Iran who was trying to use the stolen documents to masquerade as companies like Google, Microsoft, Skype and Yahoo.

“At some point the trust gets diluted, and it’s just not as good as it used to be,” said Rick Lamb, the manager of Icann’s Secure DNS program.

The deployment of Secure DNS will significantly lower the cost of adding a layer of security, making it more likely that services built on the technology will be widely available, according to computer network security specialists. It will also potentially serve as a foundation technology for an ambitious United States government effort begun this spring to create a system to ensure “trusted identities” in cyberspace.

Fluoride is a Toxic Industrial Waste Product

NaturalNews.com
April 1, 2011

Since the 1940’s fluoride is used in toothpaste and is added to drinking water in many countries around the world. The dental profession claims that fluoride is safe and necessary for good dental health.

Fluoride is actually toxic waste from the aluminium, phosphoric acid and phosphate fertilizer industries. Millions of tons of fluoride are produced each year.

Up until the 1930’s, fluoride was discharged directly into the air and waterways, causing great damage. Lawsuits were mounting as more and more victims learned that their problems were caused by fluoride poisoning. The industry’s response was to change the public’s perception of fluoride.

Many ‘scientific’ studies were presented to convince the public that fluoride was safe. Lucrative positions were created for ‘research’ and ‘education’ with the express purpose of promoting the use of fluoride in toothpaste and in drinking water. Instead of paying millions for disposal of this toxic waste, fluoride was now being sold to toothpaste and water companies!

Drinking water is now fluoridated in many countries, including the United States, Canada, New Zealand, Australia, Singapore, Hong Kong, United Kingdom, Ireland, Spain, Turkey, Italy, India and Chile. http://en.wikipedia.org/wiki/Fluoridation_by_country

Most toothpaste brands contain fluoride as the main active ingredient. Procter and Gamble, manufacturer of Colgate toothpaste, admitted in 1984 that a small tube of toothpaste contains enough fluoride to kill a child! Toothpaste now carries a warning label that if more than a pea-sized amount is swallowed, to get medical help immediately.

Up to 80 percent of young people in some U.S. cities have dental fluorosis, which is the first visible sign of excessive fluoride exposure. Fluoride also causes calcium deficiency, which can lead to osteoporosis, skeletal thinning, fractures, anemia and rickets.

Fluoride causes premature aging since it damages enzymes. This affects the immune system, digestive system, respiratory system, blood circulation, liver, kidneys, thyroid and brain function. Fluoride can also cause hyperactivity and a lower IQ in children.

South Wales Government recording citizens’ facial features

Daily Telegraph

The New South Wales Government is quietly compiling a mathematical map of almost every adult’s face, sharing

Face recognition technology used to spy on citizens in South Wales.

information that allows law enforcement to track people by CCTV.

Experts said yesterday few people realised their facial features were being recorded in an RTA database of drivers licence photos that the Government has allowed both state and federal police to access, The Daily Telegraph reports.

The federal body CrimTrac has asked NSW for its database so it can be mined nationally by police using the facial recognition information contained in it.

University experts in facial recognition said the correct match rate was as low as 90 per cent, meaning the names of people with faces sharing a similar structure to criminals could be returned in searches.

Dr Carolyn Semmler from the University of Adelaide said police wanted to eventually use facial recognition in smart CCTV cameras allowing people to be tracked anywhere there was a camera.

Some airports, such as Singapore, employ facial recognition technology and the US is considering using it at border crossings.

“Police hope that at some point an individual can be tracked,” Dr Semmler said yesterday.

Professor Sowmya Arcot from the University of NSW said a “matrix of numbers” based on features and the distance between facial structures was derived using an algorithm applied to a photograph of a face.

That could then be matched to other faces stored in a database.

NSW Opposition police spokesman Mike Gallacher said most people were unaware their face had been mapped when they applied for or had their licences renewed, allowing them to potentially be tracked.

“Over 20 years ago we had a debate about the Australia card and the people of this country showed where they stood in relation to the government knowing people’s movements,” he said.

“The push for this into the future has far greater ramifications than some old Australia card.

“I have a concern about a lack of public debate.”

The RTA began compiling its facial recognition database last December.

Roads Minister David Borger said it would be shared with other government agencies.

“While the facial recognition system is in its early stages, the RTA will co-operate with other agencies wherever possible,” he said.

“The RTA already provides information to the police, and will co-operate with other state or federal law enforcement agencies.”

He said the technology was also preventing fraud and stopping people obtaining multiple licences.

A spokeswoman for CrimTrac said its board of management had granted approval for a project proposal for a nation facial recognition capability.

The Navy’s, Air Force’s and Darpa’s Programs to Control Your Mind

Through the Use of Electromagnetic Waves, a Town, a City or a Whole Country Can Be Controlled to Be Pacified or Exacerbated

by Luis R. Miranda
The Real Agenda
May 5, 2010

Just like a few years ago computer and information technology companies started working on microchip technology, just like DARPAmind control created the Intranet and later the Internet, non-profits surrogate to government agencies such as the Army, Navy and Air Force are now implementing radio frequency technology to affect people’s thoughts and behaviors.

The history of mind control begins with Hypnotism. In the 1920’s the Harvard Labs started a project for the creation of a “Manchurian candidate”. George Esterbrooks, a scientist in the Laboratory, worked along colleagues in a project to implement the idea of submitting a person into a deep state of hypnosis so they could fracture the human personality into two different individuals, one with full knowledge of himself and the environment, and the other with no knowledge whatsoever. Such individuals would be used as super spies in the Soviet Union and Germany. Should an individual get caught he would not be able to remember anything of their true identity.

Esterbrooks wrote books on hypnotism, spiritism and minds control through the use of LSD. On the publication MK Ultra in June 1975, from page 225 on it is clear that LSD and other hallucinogenics were used to mold the mind of individuals in order to create a double personality, which can be switched and manipulated with spoken commands. These were scientists working at psychiatric facilities who were in charge of programs working with mental patients, who they said could take advantage of the good effects of LSD and other substances for their cure, but in reality, they were lab rats who were experienced upon. In a project headed by Ewing Cameron and directed by the CIA, American mental patients and Canadian as well, were transported to private facilities in Canada for periods of six months-sometimes as many as 80 people at the time- where they were abused and injected with PCP/LSD cocktails, as well as experimented with radio frequency waves. In one case, a mental patient -a former Army officer- was brought to New York and pushed off a building to keep him from speaking out on what he was subject to during those experiments. At least 150 pages were blackened out or lost while investigations concerning mental patients abuse were conducted in the United States.

Cases of mental patients abuses abound in history with many non-profit organizations working as heads of the experiments. A group called The Mankind Research Group, in Silversprings Maryland, was one of the surrogate institutions that worked behind the scenes with the Navy and other mainstream institutions who wanted to maintain experiments of the mind as far from the light as possible. But at the head of all these non-profits were mainstream doctors and military personnel, who could not carry the experiments in public facilities due to the inhuman techniques that were used at the time.

More recently, the Navy openly published its new Manual or Protocol for Human Mental Experimentation, dated from November 6th, 2006. On page 9, it boldly states that it is the undersecretary of the Navy who is in charge of authorizing all human experimentation conducted by the institution, before they can be carried out on mental patients or prisoners. In addition, there is a request for proposal from the Air force Research Laboratory, open until September of 2009 which reads: “the ultimate goal of such a research is to develop a fully articulated theory with supporting predictive models which will facilitate the inducement of desired behavioral effects in individuals and groups in the use of non-lethal weapons.” This adds to the latest admissions by DARPA members, who have accepted the notion they have been working on programs of mass control through the use of waves. The admissions were made on an article in the Baltimore Sun.

An Air Force Research Laboratory publication named Technology Horizons from June 2004 clearly states the advanced stages which many mind control projects have achieved. “With the advent of directed energy and other revolutionary technologies, the ability to project very precise amounts of many types of energy anywhere in the world is now a reality. Controlled personnel effects, investigates technologies to make selected adversaries think and act according to our needs. Dominant remote controls seek at a distance to manipulate its vehicles, sensors, communications, and information systems and manipulate them for military purposes. Bystudying and modeling the human brain and nervous system, the ability to mentally influence or control personnel is also possible. Through sensory deception it is also possible to create synthetic images to confuse an individual’s sense of sound taste, tact and vision. All this experimentation with mind control is also used to learn how to unleash the powers of human consciousness that do not manifest very often. According to Dr. Nick Begich, what the government agencies and private corporations are looking for is how to get access to the most basic but more explosive code of the species for survival; a huge leap in human development. Begich says it is all about what we as humans are capable of and how nothing on this earth would be able to stop it. Begich sustains that the continuous bombardment of fear in today’s society towards the populations, is a way to maintain those mental powers hidden; powers which would break free otherwise.

In the 1980’s agreements between the Department of Justice and the Department of Defense, detailed what elements of mind control could be used against foreign adversaries and domestically on the people of the United States. Documents from one of the meetings at John Hopkins University, which was declared “classified”, talked about how to control human beings as the ultimate way to pacify communities. Through the use of technologies like Magnetic Induction, which is a transfer of energy through space, the government planned to maintain GPS systems and cell phones active to carry out wiretappings on citizens. Although it was first presented as an option to wirelessly charge cell phone and GPS system’s batteries, it can also be used to modulate the electromagnetic frequencies to influence human organs such as the brain, the liver, the heart, etc. The transmission of specific frequencies would be achieved through the use of cell phone towers, which would transmit those frequencies to selected areas of the world, a country, a city or a town so you could target populations at specific times.

In an article titled: The Mind has no Firewalls, the US Army War College makes clear what their goals are as far as controlling the mind of individuals and communities. “The new cutting edge of 21st Century strategic warfare will involve targeting and elimination of the enemy’s biophysical field (mind) so that the wetware – brain – has no firewalls for the mind (biophysical field) and can be taken over and/or destroyed by the biophysical field of a remote influencing adept. The development of remote viewing using Soviet protocols can enable remote influencing adepts to scan the minds of the NSA and find out, in detail, the secrets of their research into anti-gravity, inertia-less drives, beam weapons-Since the NSA use mind controlled psychics who have been implanted and subject to severe trauma to cause a multiple personality, targeting the chip in the NSA remote viewing zombies renders these creatures inoperable; one can also project into these creatures’ minds false remote viewing images so they see what you want them to see – they enter a ‘Matrix’ where you are the AI.” In Singapore, there is today a massive program for testing mind control through electromagnetic waves in very specific zones. The projects in that part of the world focus on keeping people on a lower brain wave level. The effects of the experiments are the same caused by fluoride in water and mercury in vaccines. Those two substances among many others diminish the brain capacity to use its power and all the skills that come with it.

Another technology currently used in mind control programs is quantum computers. Computers have the capacity to map every item you purchase in the supermarket through the use of a Radio Frequency Identification (RFID), just like the ones people are already implanting in them. Quantum modeling of the brain clearly shows how powerful this organ really is. The most capable current super computers available to anybody, which can equal performances equivalent to 6.6 billion people doing calculations every five seconds for a total of 60 hours do those very operations in one second. The human brain -a quantum computer itself- in comparison, can take the same calculations those people could do in a trillion years, and complete them in one hour. That’s just how powerful the human brain is. Those who now work in quantum computing are looking for a way to develop something like our brain power -if it hasn’t already been found- in computers which will be capable, for example, to break any encryption that ever existed. It will be a new form of intelligence that surpasses any imaginable idea anyone has ever had. With this technology, thoughts will be manipulated to say the least. Images, ideas, dreams and the deepest feelings in a human being will be open to be molded.

Now you may be asking what are the odds that an unscrupulous mind or person takes this technology to harm us all. Well, for starters, the government has approved, through the Departments of Defense and Justice the use of other technologies as experimental programs on citizens in order to later make them part of our daily lives. Another case is Monsanto’s genetically modified corn and other vegetables that are in part responsible for the extinction of at least 60 percent of the honeybee population in the Unites States. In addition, the use of other technologies like cell phones radiation, which causes brain cancer and fluoride in the water we drink which scars our body’s internal tissue are just a few examples of how new technologies bring more trouble than solutions to our daily lives.

In the case of mind control, solutions must be found before this technology is implemented widely. Mind Control programs cannot fall into the hands of private citizens or corporations, which will clearly use them as forms of manipulation. The ways in which these technologies are put into action must be kept secret. The levels of information regarding this and other ways of mass control must be spread out to the populations so they are aware of the potential use of substances and electromagnetic waves as instruments of mind control. Read and watch the bibliographical material listed below and give it to as many people as possible in order to raise awareness. The key as in most cases is education. Passionate discussions are good, but passionate discussions with education are better. The process should take us to find complete and absolute transparency from our government and other entities that are in possession of mind control and other technologies that may potentially harm us as supposed to enlighten us.


Bibliography:

“Mind Control: The Ultimate Brave New World”

“Controlling the Human Mind”. Dr. Nick Begich.

“Advanced Neural Implants and Control”. Daryl R. Kipke. Department of Bioengeneering, Arizona State University

Biophysical Warfare – The Mind Has No Firewalls. www.Rense.com

Darpatech 2002 Symposium – Transforming Fantasy.

USSR Hypnosis at a Distance Defense Intelligence Agency

DEPARTMENT OF THE NAVY ~ OFFICE OF THE SECRETARY SECNAVINST 3900.39D _ HUMAN RESEARCH PROTECTION PROGRAM