Category: Media, Propaganda and Thought Control
-
Biological weapons, Chemical weapons, Brain machine interfaces … and that’s just the Covid-19 injections
Brain science technologies can be categorised in two groups: neuro assessment and neuro interventional. Neuro assessment technologies include: neuroimaging; neurophysiological recording; neurogenomics and genetics; neuroproteomics; and, neuro-cyber informatics. “The more I know about what makes you tick the more my interactions with you can be geared to make you tick the way I want you Read more
-
Save Human Beings From the Abuse of Neurotechnologies
In November 2000, the Russian State Duma Committee for Security recommended to the Russian State Duma to enact the law prohibiting the use of electromagnetic weapons on Russian territory. It argued: “The achievements of contemporary science and technology made possible the development of informational and psychophysiological technologies which allow for the creation of means and Read more
-
What everyone should know about mainstream dogma
The State of The World Earlier this year, I [Nick Hudson, of PANDA] wrote the following about … It does not matter whether this situation reflects planning on the part of a shadowy elite or is emergent from the decline of your civilisation. No matter whom you vote for or what gloss your preferred candidate Read more
-
Qatar behind antisemitic influencers like Dan Bilzerian, Chikli tells ‘Post’
Chikli spoke about the Diaspora Ministry’s launch of a new tool two months ago, which aims to combat antisemitism. The AI-based system allows the ministry to monitor every social network and provide key details that prevent terror attacks against Jewish communities, as well as give indications of the level of antisemitism in various countries. Speaking on allegations by Read more
-
Case Study on Smearing: Dr Rashid A. Buttar
Dr. Buttar passed away on May 18th, 2023, at his home, while spending time with his family. Dr. Rashid A. Buttar became an Eagle Scout at the age of 14, becoming the youngest person in the US to get his Eagle in 1980. He then graduated from high school at age 17 and received his Read more
-
Eritrea in the Empire’s Crosshairs: “Regime Change Operations”. Propaganda.
Eritrea is a key player in the West Asian/North African strategic theater, controlling a long swathe of the southwestern Red Sea. It staunchly refuses to collaborate with US/EU/NATO security architectures, leading Western propagandists to denounce it as “the North Korea of Africa.” As if that weren’t enough to make it a regime-change target, Eritrea eschews Read more
-
The military-intel foundations of social media
… the evidence which details the creation of today’s mainstream social media platforms by the U.S. military (DARPA) and intelligence community, of which Mark Zuckerberg and Facebook played a crucial role, though the full story extends beyond U.S. borders. Some of the key players in this story include Michael McKibben, CEO of Leader Technologies, Doug Read more
-
Who can survive the AI apocalypse? A crisis expert explains
… you need to divide humans into two broad categories: the harnesser — a term I coined — and the herd. Notice that one can be both singular and plural, while the other is always plural. This is natural, as 99% of humanity is driven by herd instincts. They have consistently surrendered their critical faculties to accommodate the herd Read more
-
How the West Was Won: Counterinsurgency, PSYOPS and the Military Origins of the Internet
There was another DARPA program that also ‘disappeared’ one year before Facebook made its debut. Often cited as the precursor to Facebook. The Information Awareness Office (IAO) brought together several DARPA surveillance and information technology projects including MDDS which provided Google’s seed funding. The stated aim of the IAO was to gather and store the Read more
-
Idiot’s Guide to Cooking Data for Aspiring Propagandists
This manual is divided into the following sections:Section I. Definitions – How to redefine words, terms, and metrics to keep them inline with the regime narrative Section II. Curating Data – How to hijack the processes of recording, reporting, and publishing data Section III. Vetting which data are considered to be part of Official Science Read more
