The Devil Inside You!

Photos Extra Multiple Eyes ( httpscity-arcadia.co.uk20150109revisualise-a-cult-film-screening-with-city-arcadiametropolis-metropolis-1927-15539846-1594-1216 ) metropolis-metropolis-1927-

https://www.pinterest.com/explore/metropolis-fritz-lang/

.

The World of Targeted Mind Control

This article in a similar format can be found at https://ufospotlight.wordpress.com/2020/01/10/the-hidden-world/
Quotes by journalist and reviewers are permitted with full credits
COPYRIGHT, C, Watchers.com and Stephen Erdmann 

Another version of this article can be seen at The Global Mind Controllers! – https://wordpresscom507.wordpress.com/2020/06/07/

https://itunes.apple.com/us/album/the-devil-inside-you-from-the-movie-dont-sleep-single/1299338487

.

 THE DEVIL INSIDE YOU
There on the edge
of a lonely abyss
When the monster in your head
Leaves you shaking in your bed
Whenever you fear the darkness burn
…..I will bring you back from death…..
From the devil inside you.

.

Stacy Earl Stacy Earl CD album (CDLP) Japanese S17CDST446099

.

Stacy Earl, John Truscelli & Skipp Whitman
  Released: Oct 20, 2017
℗ 2017 AMOM Music ASCAP Andrew Mendelson

.

Watchers.com, Omar Faizi, Travis Smith, Clarence Mitchell, Stephen Erdmann, and Leland Reibling speak out. 

.

Photos Extra Watchers 28168565_10155234862547703_7769337695049648963_n

.

.

We are under attack!  Not just from hidden elements within our government, but many governments!  Worst yet, they are are all part of a Dark Hidden World that we can now see operating behind and at the edges of our societies and private lives!  Evil metastasizes into evil and has a multiplier effort that only deep evil knows.   .  

The Devil Don’t Sleep

Brantley Gilbert

 

Produced by Dann Huff Album The Devil Don’t Sleep

THE DEVIL DON’T SLEEP LYRICS

Lord knows the devil don’t sleep
He never shuts his eyes
You never hear him creepin’
Yeah

Battle scars on my heart
Lord knows this war ain’t over, no
It’s just gettin’ started
Just when you thought you had him beat
He’s on your shoulder
He’s in your ear, he’s whisperin’
Lyin’ again, and again, and again
You tell yourself he’ll leave you alone
You turn your back, and brother man, it’s on

[Chorus]
Lord knows the devil don’t sleep
He never shuts his eyes
You never hear him creepin’
Heaven knows he’s hell-bent on me
Shackles and chains
Thank God that He can break me free
‘Cause Lord knows the devil don’t sleep

He’s at your door, don’t let him in
He’ll lie, he’ll steal, he’ll kill, he’ll win
Just ask me, I’ve been there
All you’ll have left is a desperate prayer
You pray to God He’ll save your soul
Like He has a thousand times before

[Chorus]
Lord knows the devil don’t sleep
He never shuts his eyes
You never hear him creepin’
Heaven knows he’s hellbent on me
Shackles and chains
Thank God that He can break me free
‘Cause Lord knows the devil don’t sleep

The devil don’tsleep, no
Lord knows the devil don’tsleep
He never shuts his eyes
You never hear him creepin’
Heaven knows he’s hellbent on me
Shackles and chains
Thank God that He can break me free

[Chorus]
Lord knows the devil don’t sleep
He never shuts his eyes
You never hear him creepin’
Heaven knows he’s hellbent on me
Shackles and chains
Thank God that He can break me free
‘Cause Lord knows the devil don’t sleep

The devil don’t sleep
The devil don’t sleep, yeah

.

.   © 2018 Genius Media Group Inc. .  . . . . . . 

http://www.wakingtimes.com/2017/08/28/total-individual-control-technology-insider-exposes-dna-targeted/

.

“As I have discussed in previous articles on mind control such as “They” Can’t Read Your Thoughts … Right? the state of current mind control technology is beyond most’s people comprehension and idea of what is possible. Yet, we have had enough out-of-the-closet whistleblowers and leaked or declassified documents to give us a clear idea of the scary extent to which we can be psychically attacked. Whistleblowers such as Dr. Robert Duncan have lectured at length about the capabilities of V2K technology, which is defined as an EM frequency technology that utilizes RF (Radio Frequency) signals to induce sound within the cranial cavity of the target. V2K literally pipes thoughts directly into people’s heads without them knowing it.
“Kofron talks at length about how this technology is fully operational and is already being tested upon those in society who are struggling (such as those who are homeless, poor and who don’t have much family or many friends) since they make the easiest targets. On his website GangstalkerWars.com, he exposes the details of ongoing operations within Seattle (where he used to work for SIS). This social engineering is being done by the Federal Government, the Military Intelligence agencies, private security firms (more on this below), some of the largest US corporations (after all, we live in a corporatocracy), local and state police, and social programs within inner-city America.
“Kofron warns about an alarming trend in American society: the rise of private security companies who mostly employ ex-military and ex-intelligence agents. As I covered in this 2-part series, the US Military Intelligence Complex is completely and utterly out of control. It runs the government and pulls the strings attached to all the puppet politicians, who don’t have the necessary ‘clearance’ to access the truly top-secret information. These security firms, like the MIC itself, appear to operate above and outside the law.”  (Read more in the article.)

https://stillnessinthestorm.com/2017/04/gang-stalking-directed-energy-weapon-mind-control-technology-targeted-individuals/

.

“Of course, something needs to be done about this illegal, immoral governmental electronic terrorism. However, seeing the bigger picture, it may be difficult to incriminate the culprits: As mentioned by former CIA engineer and whistleblower Dr Robert Duncan it would be difficult to take the victimization cases to court, as the gang stalking involves a number of people in very high places who could control the law process… Having said that, there are ways and governments are getting pressurized to do something about it: Not just America, gang stalking is happening all over the world.
“Targeted individuals describing their nightmare experiences have shown us that they don’t necessarily have to be major threats to the new world order agenda to be targeted, just people known for having the already mentioned traits and qualities.”  (Read more in the article.)

https://www.wired.com/story/mind-games-the-tortured-lives-of-targeted-individuals/

“Today, technology is increasingly folded into our everyday lives. Some 8.4 billion ‘connected things’ will be used globally this year, most of which are vulnerable to hacking and surveillance. Early this year, a German regulatory agency labeled a blond, talking doll named My Friend Cayla ‘an illegal espionage apparatus,’ recommending its destruction. The FDA recently approved the first pill that can track whether a patient has taken it. These Big Brotheresque developments are worrying even if you are not a suspicious or paranoid person. For the TIs, these devices are their worst fears realized. The technology doesn’t just spy on them or track them. It attacks them.”  (Read more in the article.)

https://everydayconcerned.wordpress.com/tag/targeted-individuals/page/5/?iframe=true&preview=true%2Ffeed%2F

words-2

.

“The invasion and virtual rape of our lives by covert forces (an activity apparently being given the nod of approval by the U.S. Government) has become a rampant epidemic of sadistic abuse that also appears to be a manipulating tool of augmented fascist indoctrination and conditioning, particularly among those who are recruited to perform these ritualistic acts of torture and psychological terrorism against us. This horrible crime is much more potentially destructive to the inalienable rights of life, liberty, and the pursuit of happiness than any other threat before it, and must be recognized as so.”  (Read more in the article.)
Computer Generated Mind Control Technology – Bing video.

High Tech Brain Computer used for Mind Control?! – Bing video

“Two things must be noted here. Firstly, this can all be done subliminally without you consciously noticing it. Secondly, the idea of pulsed RF signals is exactly what smart meters are doing to destroy your health. Pulsed EM fields are especially dangerous to the human energetic field – and the NWO controllers know it. How will the 5G grid and IoT contribute to all this?
“Interestingly, some have suggested that the TV company Hulu derived its name from Hendricks Loos. Hulu famously released its video ad with Alec Baldwin detailing how they produce programs that turn people’s brains to mush in order to prime the brains up for eating by aliens. Just a coincidence, I’m sure.”  (Read more in the article.)

https://redpillinfowar.com/category/targeted-individuals/
(Not a ‘short’ article)
“That is the delivery of bio-nano-particulates into the environment for all of humanity to breathe in and or ingest as well as absorbed through the skin. These nano-particulates contain all the necessary building blocks for a synthetic DNA conversion or as the powers behind the crime will call it ‘DNA Upgrades.’ The following article explains this process, so if you are not yet familiar with the process then I suggest you read the article linked below by clicking the image:

https://www.redpillinfowar.com/2017/03/29/the-transhuman-control-matrix-is-here-chemtrails-morgellons-neural-lace/

“What needs to be done with 5G WiFi in order for these psychopaths to put it to use for their purposes is to get it distributed all over the planet as much as it is possible for them to do. One way they are currently doing this, and with your help, is to sell the necessary antenna infrastructure as a service you need or ‘must have’ for ‘blazing fast internet speeds everywhere in your home.’”   (Read more in the article.)

.

https://byebyebluesky.com/nanomorgellons-researcher-sofia-smallstorm-living-things-will-be-the-fuel-for-technology/

.

Image result for toxic bumper sticker
https://forums.bohemia.net/forums/topic/202023-logo-in-arma3-not-to-see/

“In my opinion, Morgellons is a Program. It is harnessing the life energy of biology to get it to serve technology”   –Sofia Smallstorm–  (Lisen to a technical video presentation.)

http://www.haciendapub.com/articles/dangers-living-unreal-world-russell-l-blaylock-md

.

“Yet beyond that, we have a more obvious and easily demonstrated escape from reality. In this present age, as I have stated, we have two main groups in a fight to the death: The utopians illusionists of the left and the realists of the traditional American conservative persuasion. The left utopians believe in the basic tenant that man is basically good and those that are not good can be molded by the forces of social engineering into being good citizens — good citizens, that is, in their perverted definition. This utopian view assumes that man has been corrupted by his social and mainly economic institutions, such as “white privilege,” capitalism, racism, class discrimination, homophobia and other social phobias. To correct man’s seemingly decrepit state, one needs merely change the institutions of society as they now exist, and in doing so, one can lead mankind into a utopian world. This utopian world, naturally, is a collectivist one of a socialist design in some manner.
“In this view, all crimes and social problems of modern societies are based on a maldistribution of wealth, a lack of tolerance for previously unacceptable behaviors, ownership of private property and an unwillingness of the individual to surrender his or her independence in favor of the collective. What is rarely discussed by the leftist utopians is the perennial question — who shall make the decisions for the collective? Of course, if pressed, they will admit that highly qualified “elites,” much like Plato’s philosopher-kings, will make these decisions. In today’s world, it will be the elite technocrats who will make the decisions.

RULES of Elite Dangerous – Bing video

“Who will select and choose these elites? We are never told. Have they already been chosen by secret councils — the men in the shadows of the deep state? Who shall these elites answer and how shall they be made accountable? We are never told. Worse yet, the leftist in the streets and the leftist scribblers never even bother to think about such things. Most people assume that they will be asked their opinion. Of course, if they knew anything about collectivist political systems, they would realize that once they help usher in the system, they would be dispensed with, killed in mass numbers, imprisoned or marginalized within the lower ranks of the collective. The elite would no longer tolerate moronic opinion.”  (Read more in the article.)

.

https://chemtrailsaroundtheworld.wordpress.com/2015/07/30/chem-trail-geo-engineering-patents-lab-analysis-united-states-patent-and-trademark-office-by-chris-ma-cdm/

Chemtrails 1
Chemtrails contain many strange elements

.

“Carnicom’s central message is to alert the audience that chemtrails are far more than for the purpose of atmospheric modification.   His research finds that the aerosols also contain bio-engineered filaments that are infecting the global population with exotic, cross-domain bacteria that do not exist in nature.
“Most people infected with the pathogen may exhibit constitutional symptoms of varying intensity but a minority of victims also exhibit skin lesions that can exude visible colored polymer fibers from within the lesions or from under the skin.  Carnicom chooses to call the condition ‘Morgellons syndrome’ since it somewhat mimics this previously described condition.”  (Read more in the article.)

They Decide What Government Does – The New American

https://the-wakeup-call.com/viewtopic.php?t=358

.

“My major concern is that there is evidence that they are spraying tons of nanosized aluminum compounds. It has been demonstrated in the scientific and medical literature that nanosized particles are infinitely more reactive and induce intense inflammation in a number of tissues. Of special concern are the effect of these nanoparticles on the brain and spinal cord, as a growing list of neurodegenerative diseases, including Alzheimer’s dementia, Parkinson’s disease, and Lou Gehrig’s disease (ALS) are strongly related to exposure to environmental aluminum.”

.

Photos Extra Eyes of a Killer ( httpwww.skepticsnightin.comsingle-post20150516Behind-the-eyes-of-a-killer-The-Neuroscience-of-an-aggressive-mind ) 5963bc_7a988518d96f42658b3388b7514c81d

“Who will select and choose these elites? We are never told. Have they already been chosen by secret councils — the men in the shadows of the deep state? Who shall these elites answer and how shall they be made accountable? We are never told.”

********
You can reach Steve Erdmann – at – dissenterdisinter@yahoo.com  – or – independenterdmann@gmail.com.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can friend him at:
Facebook – https://www.facebook.com/stephen.erdmann1 –
Or – visit the Dissenter/Disinter Group – https://www.facebook.com/#!/groups/171577496293504/.
His Facebook email is http://facebook.com/stephen.erdmann1.
You can also visit his articles at the following:
mewe.com/i/stephenerdmann1
http://www.minds.com – TheDissenter,
http://www.ufospotlightwordpress.com,
http://www.ufodigestblog.wordpress.com,
http://www.ufodigest.com,
Alternate Perception Magazine: http://www.apmagazine.info/.
https://www.facebook.com/TheUniversalDigest/?__tn__=%2Cd%2CP-R&eid=ARB3i9eJwirzOvkPMA5RwMhIUX-3xSP69ME1YHZhQjeSqnxoiNgzhKt1WVX8EUlupUgLBVzd_mX-VXAN

.

*******

.

Photos Extra Steve2 34962959_10156520897759595_6984102889039855616_n
Steve Erdmann – Independent Investigative Journalist
This article in a similar motif can be found at
https://ufospotlight.wordpress.com/2020/01/10/the-hidden-world/

Another version of this article can be seen at The Global Mind Controllers! – https://wordpresscom507.wordpress.com/2020/06/07/

The ‘Trick’ is in the Stir!

trickster boy by breath-art on DeviantArt
trickster boy by breath-art on DeviantArt

**********

The Hidden History of the Illuminati with Stephen Erdmann and Omar Faizi – Open Loops (open-loops.com)

A similar article can be seen at The Trickster in Action! – https://wordpresscom507.wordpress.com/2020/06/07/

qanon california

“Alison Hayden, a QAnon believer running for California representative Eric Swalwell’s seat in Congress, told me she is optimistic QAnon will bring ‘cures for cancer’ and halt ‘technologies of light and sound manipulation that make us crazy and angry.’ For a political outsider and conspiracist, Hayden’s bona fides are fairly ‘establishment.’ She was educated at UC Berkeley and the London School of Economics before working in global finance at Citibank and Charles Schwab & Co. and becoming a district-level Republican delegate.”

The above quote from the below article:

https://www.lamag.com/citythinkblog/qanon-gop/

*********

**********

**********

In this image constructed from data collected in the near-infrared wavelengths of light, Saturn's auroral emission is shown in green.

“It’s not just that, like Europe for much of its history, these people have an unpleasant habit of blaming anything they don’t like on the Jews. Medieval scholars would decide that Saturn is cold and dry, and then lay out how everything cold and dry is in some sense governed by Saturn. Conspiracy theorists, meanwhile, derive from Saturn’s hexagon the outline of a cube, and then reason that everything cubical is a secret shrine to Saturn. If Muslims circle around a black cube at Mecca, and Jews plant one on their forehead with the tefillin, it must be because they are worshipping not God, but the final star. If the PlayStation game Mort the Chicken has levels that feature a lot of cubes, it can only be because ‘sadistic manipulators are using the media to program and influence minds to accept the Antichrist system they are constructing.’”

The above quote from the below article:

https://theoutline.com/post/2382/the-sadness-of-saturn

**********

The Engine of Oracles

“In the course of their work, Archons frequently impersonate mortals, other spirits, and even figures of divine status. They are able to perfectly imitate the voices of any other thing in Creation, although they can sometime be unmasked by their awkward and inappropriate behavior. When in mortal form, Archons are fond of claiming to be ‘from the government,’ unless they are impersonating a trusted family member or lover. When Archons impersonate gods, or other spirits, they do so either to manipulate mortals into some course of action, or to directly undermine the power of a cult or religions that threatens to alter the Archon’s inviolate plan of destiny.

“The Archons claim to be the first beings to exist, and that their ruler, the Demiurge, is the Creator himself. Naturally, they regard their work not as imposing an alien order, but purging the last traces of Chaos from Creation. The AngelsDevils, and Fairy Folk are all regarded by the Archons as actually being former Archons, duped and corrupted by the Demons. According the the Archons, the Demons themselves are nothing but the stray thoughts of the Demiurge, twisted into a false existence when they contacted Chaos, and infesting the Outer Darkness like vermin. When dealing openly with mortals, Archons sometimes refer to themselves by misleading terms such as ‘The Cosmic Federation’ or ‘The Planetary Command.’”

The above quote from the below article:

https://engineoforacles.wordpress.com/2011/02/04/an-overview-of-the-cosmic-archons/

**********

Image without a caption

He’s a former QAnon believer. He doesn’t want to tell his story, but thinks it might help

“Much of QAnon devotees’ energy has in recent months flooded to false allegations that Trump had been robbed of an election victory. The QAnon-boosting attorneys Sidney Powell and L. Lin Wood led a failing pro-Trump attempt to overturn the election.

“The QAnon conversation online had pivoted from taking down a global cabal to targeting a more specific mission: “Stop the Steal.” So when Trump invited supporters to Washington for mass demonstrations on Jan. 6, the day Congress was set to certify Biden’s victory, researchers said pro-Trump agitators and QAnon believers saw it as a demand for action.”

https://www.washingtonpost.com/technology/2021/01/13/qanon-capitol-siege-trump/

**********

“’It’s a global power structure that is responsible for the economic decisions that have robbed our working class, stripped our country of its wealth, and put that money into the pockets of a handful of large corporations and political entities,’ Trump continued. ‘We’ve seen this firsthand in the WikiLeaks documents in which Hillary Clinton meets in secret with international banks to plot the destruction of U.S. sovereignty in order to enrich these global financial powers, her special-interest friends, and her donors.’

“Thus, Trump reasoned, ‘It’s no coincidence these attacks come at the exact same moment, and all together at the same time as WikiLeaks releases documents exposing the massive international corruption of the Clinton machine.’”

Above quote from below article:

https://nymag.com/intelligencer/2016/10/trump-my-accusers-are-part-of-a-global-plot-to-end-the-u-s.html

**********

Christ rejects the devil’s offer to give him power over all the world if he will ...

“The Christian Bible devotes only a few passages to the devil and does not describe his appearance. In Genesis the serpent who tempts Eve is strongly associated with Satan, but many theologians think the composition of Genesis predates the concept of the devil. Passages alluding to Lucifer’s fall can be found in the books of Isaiah and Ezekiel. The Old Testament’s Satan is not the opponent of God, but rather an adversary as exemplified by his role in the Book of Job. (See also: Halloween: costumes, history, myths and more)

“In the New Testament Satan has become a force of evil. He tempts Jesus to abandon his mission: “All these I will give you, if you will fall down and worship me” (Matthew 4:9). He is described as a hunter of souls. The First Epistle of Peter warns: “Discipline yourselves, keep alert. Like a roaring lion your adversary the devil prowls around, looking for someone to devour” (I Peter 5:8). By the Book of Revelation, Satan has become an apocalyptic beast, determined to overthrow god and heaven.”

The above quote from the below article:

https://www.nationalgeographic.co.uk/history-and-civilisation/2018/10/horns-hooves-and-hell-devil-medieval-times

**********

“Fourth Reich

“Conspiracy theorists often use the term ‘Fourth Reich’ simply as a pejorative synonym for the ‘New World Order’ to imply that its state ideology and government will be similar to Germany’s Third Reich or that globalists who plot on behalf of the New World Order are Jewish fascists. However, some conspiracy theorists take the research findings of American journalist Edwin Black, author of the 2009 book Nazi Nexus, to claim that some American corporations and philanthropic foundations – whose complicity was pivotal to the Third Reich’s war effort, Nazi eugenics and the Holocaust – are now conspiring to build a Fourth Reich.

“Furthermore, conspiracy theorists, such as American writer Jim Marrs, claim that some ex-Nazis, who survived the fall of the Greater German Empire, along with sympathizers in the United States and elsewhere, given safe haven by organizations like ODESSA and Die Spinne, have been working behind the scenes since the end of World War II to enact at least some of the principles of Nazism (e.g. militarism, imperialism, widespread spying on citizens, use of corporations and propaganda to control national interests and ideas) into culture, government, and business worldwide, but primarily in the U.S. They cite the influence of ex-Nazi scientists brought in under Operation Paperclip to help advance aerospace manufacturing in the U.S. with technological principles from Nazi UFOs, and the acquisition and creation of conglomerates by ex-Nazis and their sympathizers after the war, in both Europe and the U.S.

“This neo-Nazi conspiracy is said to be animated by an ‘Iron Dream’ in which the American Empire, having overthrown its Zionist Occupation Government, gradually establishes the Fourth Reich, formally known as the ‘Western Imperium,’ a pan-Aryan world empire modeled after Adolf Hitler’s New Order and the religious aspects of Nazism, as the best hope for the survival of Western civilization under the threat of the Judeo-Masonic conspiracy. Conspiracy theorists therefore see history as a ‘war between secret societies’ for control of a New World Order.”

Above quote from the below article:

https://evil.fandom.com/wiki/New_World_Order

**********

CONTROVERSIAL TOPIC ALERT! WARNING WARNING! 

Independent Journalists Stephen Erdmann and Omar Faizi join Greg to discuss (and debate) the hidden history of secret societies, Earth’s true origins, why all religion is false, and the horrendous acts of abuse throughout the centuries. 

Who are the Illuminati? Why were they formed? 

What is the battle between Dark and Light? 

Is QAnon for real? 

And most importantly…is there proof of any of it? 

Greg wanted to know. 

This is a polarizing episode that will certainly shake up your foundational beliefs about the people and institutions you take for granted. 

Be warned. 

Learn more about Stephen’s work here:  https://wordpresscom507.wordpress.com/

For more of Omar: 

His event on Feb 20th: https://www.eventbrite.ca/e/saturn-moon-matrix-expose-workshop-tickets-137211329781?fbclid=IwAR0yuQMnaLEoJPLxYvYypmyVrw5gXuAp-LoBu0CxTARImaLv_laEvlc4Cg8

Watchers Talk on YouTubehttps://www.youtube.com/channel/UCRT6vstUj2Xecvfk6Uf1SxA?fbclid=IwAR1glLLVDs7D0po7gLGSkQ9cMcmBdM_tW37F4XbFFBgida9ZpIdyf0UcuVk

Watchers Talk Podcasthttps://anchor.fm/watchers-talk?fbclid=IwAR1X4ujpHHU0XB9NaCaTIH8Yi-YSmGfwMkkTv17uAU7xdIRIiPFFkIQBDOc

Observing Humanity Outside The Cube Facebook Page: https://www.facebook.com/Observing-Humanity-Outside-Of-The-Cube-301444403810857/

Observing Humanity Outside the Cube Facebook Grouphttps://www.facebook.com/groups/watcherskiziuzinommo

If you enjoyed this podcast, please leave a review! even a sentence can help! Please go to ratethispodcast.com/openloops

**********

“The central theme developed in this book is that psi, the paranormal, and the supernatural are fundamentally linked to destructuring, change, transition, disorder, marginality, the ephemeral, fluidity, ambiguity, and blurring of boundaries.  In contrast, the phenomena are repressed or excluded with order, structure, routine, stasis, regularity, precision, rigidity, and clear demarcation.  I hesitate to offer this very general statement because, by itself, it will almost certainly be misinterpreted; much of the book is devoted to explaining it.  I will present some brief examples here.

“When entire cultures undergo profound change, there is often an upsurge of interest in the paranormal.  During the breakup of the former U.S.S.R. there was an explosion of paranormal activity throughout eastern Europe.  Healers and psychics featured prominently in the media.  This should not have been a surprise because anthropologists have shown that the supernatural has figured in thousands of cultural revitalization movements.

“Numerous mystics have displayed extraordinary paranormal powers, but many of them were outsiders, marginal characters whose lives were exceedingly odd.  St. Francis of Assisi performed many miracles, but he was mistrusted by church authorities and caused them many headaches.”

The above quote is from the below article:

http://www.tricksterbook.com/Intro.htm

**********

Steve Erdmann, 1980s photo

Steve Erdmann – Independent Investigative Journalist – 1980s Photo.

**********

Photos Extra Steve1 34934490_10156520897824595_8244253719684710400_n

Steve Erdmann – Independent  Investigative Journalist

**********

The Joker as the Trickster

A similar article can be seen at The Trickster in Action! – https://wordpresscom507.wordpress.com/2020/06/07/

The Hidden History of the Illuminati with Stephen Erdmann and Omar Faizi – Open Loops (open-loops.com)

http://www.open-loops.com/podcast/the-hidden-history-of-the-illuminati-with-stephen-erdmann-and-omar-faizi/?fbclid=IwAR3Tklv0yWOzbyKifHSqOAClGkXClLOrOLInHuh_tTjCA1jcInRpLeP7nbk

http://www.open-loops.com/podcast/the-hidden-history-of-the-illuminati-with-stephen-erdmann-and-omar-faizi/?fbclid=IwAR0DqZYXUM74qPcxR19KDKzON-DHBAm8pEY9X-cDyzc5ssHmkWCD36gMf7I

The Covid-19 Pandemic as a Psychological Coup d’Etat

The Covid-19 Pandemic as a Psychological Coup d’Etat

By Richard Gale & Gary Null (Ph.D.)

Progressive Radio Network

January 25, 2021

We have almost reached a full year since the spread of SARS-Cov2 was proclaimed a pandemic.  If we are to believe the World Health Organization’s and individual governments’ official statistics, the number of confirmed cases is reaching 100 million with over 2 million deaths. Indeed, if these numbers can be relied upon, we can surely acknowledge there is a real pandemic. It would be common sense, therefore, to expect, in fact demand, international health agencies and governments to make every effort to identify the virus’ origin.  

SARS_virion

Suspicions that the virus, now responsible for the spectrum of medical symptoms known as Covid-19, may have been bioengineered and escaped from a maximum security BSL-4 Lab in Wuhan, China, were already voiced within a month after its identification was first reported.   
Several highly respected medical experts, including Dr. David Relman at Stanford University, have suggested there is a strong likelihood that the virus escaped the Wuhan facility. To date, early queries about its origins remain unanswered and new questions are mounting. 
Jamie Metzl, a W.H.O. advisor served under Joe Biden in the Senate

Recently, Jamie Metzl, a W.H.O. advisor who earlier served under Biden in the Senate and in Bill Clinton’s National Security Council and State Department, told the Toronto Sun that the hypothesis of the virus’ natural origin in a Wuhan wet market is “a lie.”  It is no secret, Metzl noted, that the Wuhan Institute of Virology was heavily engaged in “gain of function” research to “amplify the virility of viruses.”

That there is very reasonable evidence that coronaviruses were being engineered in a laboratory goes back to 2003 and perhaps earlier.  That year, many Russian medical scientists, including Moscow’s head epidemiologist Dr. Nikolai Filatov, shared their opinions that the first SARS outbreak originated from a bioweapons lab.

In January 2020, less than a month since the first reported case in Wuhan, Dr. Igor Nikulin, a former member of the United Nation’s Commission on Biological and Chemical Weapons, stated in an interview that the US has been funding biolaboratories throughout the world, such as Kazakhstan, Afghanistan, Pakistan, Taiwan, Philippines, etc, and “wherever there are these American biolaboratories, or near them, there are outbreaks of new diseases, often unknown.” This was also confirmed by the founding president of EcoHealth Alliance, Dr. Peter Daszak, a fundamental player in the saga of “gain of function” research on coronavirus and other viral pathogens.  During an interview at a scientific conference in Singapore in early December 2019, Daszak, less than a month before the first Covid-19 case in Wuhan, stated,

“You can manipulate them in the lab pretty easily… Spike protein drives a lot of what happens with the coronavirus. Zoonotic risk. So you can get the sequence, you can build the protein — and we work with Ralph Baric at [the University of North Carolina] to do this — and insert the backbone of another virus and do some work in the lab.”

Baric, by the way, told New York Magazine:

 “Can you rule out a laboratory escape? The answer in this case is probably not.” 

Baric has first hand knowledge of this probability. In 2016, one of the researchers in his University of North Carolina biosafety Level 3 lab was bitten by a mouse infected with a bioengineered SARS coronavirus strain.  

Worse, according to records obtained by ProPublica, the scientist was permitted to resume her life without quarantine.   Baric’s lab also encountered other incidents that could have potentially released its engineered viruses upon the American public, however the university has refused to provide details.  Back in 2015, Baric had warned that a bat virus could jump species and infect humans. 

In a study published in October 2003 for the Proceedings of the National Academy of Sciences, Baric and his colleagues had “assembled a full-length cDNA of the SARS-CoV Urbani strain, and have rescued molecularly cloned SARS viruses (infectious clone SARS-CoV) that contained the expected marker mutations inserted into their component clones.”  

This infectious coronavirus clone was subsequently patented but only after the CDC overruled the US Patent Office’s denial of issuance. That same year, Bill Gates appointed Anthony Fauci to serve on his foundation’s Global Grand Challenges Scientific Advisory Board.  Shortly thereafter efforts commenced to develop a SARS-CoV vaccine, which included Moderna and Johnson and Johnson.

To date, Moderna has been granted over 130 Federal US patents to develop a vaccine against SARSCoV-2, including a military DARPA grant for mRNA vaccine technology in 2013.

EcoHealth Alliance, according to Alexis Baden-Mayer, lead attorney and director for the Organic Consumers Association, has conducted remarkable investigative research into the “gain of function” studies and the primary individuals behind the overseeing and funding this research. She has discovered that the majority of EcoHealth’s funding derives from the US Department of Defense, the National Institutes of Health and Anthony Fauci.  

Baden-Mayer’s probing inquiries uncovered a cabal of controversial figures, including Daszak, Baric and his Chinese colleague Dr. Shi Zheng-li at the Wuhan Institute of Virology, Bill Gate’s Foundation director, Scott Dowell, former Human and Health Services’ director, Dr. Robert Kadlec, and Anthony Fauci.  

The Pandemic Industrial Complex Exposed

Together this group – a part of what journalist Brian Berletic has called “The Pandemic Industrial Complex” has been engaged in private contracts with military bioweapons projects and virus hunting in the wild for “gain of function” studies for a couple decades. 

On EcoHealth’s Criminal Bioweaponized Gain of Function Studies

Curiously, there is another character deeply connected with Daszak and the “gain of function” studies sponsored by EcoHealth: David R Franz.  

David R. Franz serves as EcoHealth’s policy health advisor. 

https://wmdcenter.ndu.edu/Media/Biographies/Bio-View/Article/910063/david-r-franz-dvm-phd/

According to Baden-Mayer, who has investigated Franz’s history and background, he was formally a commander at Ft. Detrick’s bioweapons laboratory that was working on “gain of function” studies on pathogens for developing bioweapons. He was also involved in the anthrax investigations shortly after 911, and was a colleague of Dr. Bruce Ivin who was accused for the release of encapsulated anthrax aerosol mailed to Congressional legislators shortly after his mysterious death. 

Dr. Bruce e. Ivins

Recently, Dr. David Martin – founder of the company M-CAM and a fellow at the University of Virginia’s School of Business Management – released his dossier on Anthony Fauci summarizing over two decades of investigations into the very disturbing research and patents filed for “synthetically altering the Coronaviridae (the coronavirus family) for the express purpose of general research, pathogenic enhancement, detection, manipulation and potential therapeutic interventions.”

Before the first SARS outbreak in 2003, Baric filed a patent for producing “an infectious, replication defective, coronavirus.” In other words, the University the North Carolina, with federal grants, was amplifying a coronavirus to make it more infectious. 

Despite the questionable nature of this patent’s and others’ filing status by the CDC, and because patent law forbids patenting any life form, the government and its laboratories sealed under contract, cornered the coronavirus market. In the event of a coronavirus outbreak, only those corporations or institutions that acquired licensure from the NIH would be permitted to work with these bioengineered viruses for developing therapeutic drugs and vaccines.

Controversy has arisen over the confusion about the actual number of Covid-19 deaths and whether or not many if not most deaths are due to other causes.  Deaths in the presence of SARS2 are not the same as deaths due to the virus.  We heard this narrative repeated before and stated directly by the CDC back in 2003.  During the first SARS outbreak, the CDC in its Morbidity and Mortality Weekly Report dated April 4, 2003 stated that “anyone showing signs of fever or respiratory symptoms who travelled in or near areas affected by the virus would be labeled a SARS patient despite many of these individuals being diagnosed with other respiratory illnesses.” 

Dr. David Martin has released his “The Fauci/Covid-19 Dossier,” a 205 page document citing specific charges against the CDC, Dr. Anthony Fauci and his National Institute of Allergies and Infectious Disease, as well as, individuals engaged in coronavirus “gain of function” research for funding and allegedly conspiring to commit acts of terror, lying to Congress, conspiring to engage in criminal commercial activity, illegal clinical trials and market manipulation and allocation.

These are serious charges and the data Martin has collated is nearly conclusive and deeply disturbing.  The Dossier has been filed with the US Attorney General, and is essential reading for everyone to understand the details about how the current pandemic may be an orchestrated strategy unraveling over the course of twenty years.  

During a recent video appearance, Dr. Martin condensed the background of alleged corruption, illegal patents and preparatory planning for the pandemic long before the outbreak. Speaking at the February 2016 Forum on Medical and Public Health Preparedness for Catastrophic Events, Daszak stated,

“… until an infectious disease crisis is very real, present, and at an emergency threshold, it is often largely ignored. To sustain the funding base beyond the crisis, we need to increase public understanding of the need for MCMs [Medical Counter Measures] such as a pan-influenza or pan-coronavirus vaccine. A key driver is the media, and the economics follow the hype. We need to use that hype to our advantage to get to the real issues. Investors will respond if they see profit at the end of process.” 

It is important to observe how Daszak lays out a strategy for a coronavirus or influenza pandemic to be framed as a commercial opportunity for the benefit of corporations and their investors, and the role the media will play in maximizing such profit.  

In retrospect, Daszak’s scenario has played out accurately according to plan. Worse, the pandemic is now being manipulated by the World Economic Forum, the IMF, Bill Gates and the transnational class of corporate and banking elites, as well as the Biden administration and the Chinese, British, Canadian and German governments, as an opportunity to completely restructure the global economy. This will necessitate a thorough overall of the entire economic system thereby strengthening the global institutionalization of commercial oversight that will eventually nullify the independence of the modern nation state.

Martin’s Dossier continues to outline a series of purportedly illegal actions to deal with the pandemic that Anthony Fauci has undertaken as head of NIAID (National Institute of Allergies & Infectious Diseases). 

Dr. Anthony Fauci

These illegal actions would include: 

1) Acting against the American Medical Association’s April 2020 recommendation that “face masks should not be worn by healthy individuals from acquiring respiratory infections because there is no evidence to suggest that face masks worn by healthy individuals are effective in preventing people from becoming ill.”

2) Acting against existing published studies that show “to date, not a single study has confirmed that social distancing of any population prevented the transmission of, or the infection by SARS CoV-2.”

3) Acting in violation of FTC Act 15 U.S.C. 41, as no product or service can be advertised to “prevent, treat or cure human disease unless you possess competent and reliable evidence substantiating that the claims are true at the time they are made.”  

This third point applies to NIAID’s promotion of face masks as well as Fauci’s aggressive push to make the drug, Remdesivir, in which Fauci is personally financially invested, as a first line for treatment. 

If these charges of illegal activity against sound scientific evidence, are true, they warrant a thorough investigation in an international criminal court to determine their motivations.  

The mishandling of the pandemic has caused enormous suffering and deaths for billions of people. Lives and livelihoods have been completely upended and our leaders are telling us things will never return to the old normal. In the meantime, the dominant forces of capitalism, aside from profiting over this catastrophe, are now framing the pandemic as an opportunity that will further reconfigure all of our social structures, including commerce, education, transportation and monitoring healthcare.

This global pandemic is a coup d’état against civilization’s collective psyche, intended to foment a regime change in human behavior that will eventually turn humanity into the slaves of technology as a means for social conditioning.

Our only weapon against the likes of Fauci, Gates, and the transnational class of elites is educating ourselves of the damning investigations being conducted by individuals such as Dr. David Martin, Alexis Baden-Mayer, Reiner Fuellmich, Robert Kennedy Jr and others who are making every effort to shed light on the darkness in Washington and governments around the world determined to launch a Brave New World.  

By Richard Gale & Gary Null (Ph.D.)

Progressive Radio Network

January 25, 2021

Edited by Robert D. Morningstar

Appendix

Dr. Fauci’s COVID-19 Treachery
With Chilling Ties to the Chinese Military
by Peter R. Breggin MD and Ginger R. Breggin1

EXECUTIVE SUMMARY

This report documents in detail how Dr. Anthony Fauci, head of the National Institute for Allergy and Infectious Diseases (NIAID), has been the major force behind a series of research activities and other government actions that enabled the Chinese Communist Party to create lethal SARS coronaviruses, leading to the release of SARS-CoV-2 from the Wuhan Institute of Virology. Fauci continues to cover for the Chinese and for himself, denying the origin of SARSCoV-2, and delaying and thwarting worldwide attempts to deal rationally with the pandemic.

This report documents with more than 100 linked citations the following activities by Dr. Fauci. Click the link below to access the entire 62-page article listing the multifarious medical crimes of Dr. Anthony Fauci.

https://breggin.com/coronavirus/COVID-19-the-blog-TREACHERY-WITH-ANTHONY-FAUCI.pdf


Intelligence Information

Publications

BILLS-116s3905rs.pdf

Contact Information and Site Map

                                                      Calendar No. 477
116th Congress      }                                   {       Report
                                 SENATE
 2d Session         }                                   {      116-233

======================================================================



 
                  INTELLIGENCE AUTHORIZATION ACT FOR 
                            FISCAL YEAR 2021

                                _______
                                

                 June 17, 2020.--Ordered to be printed

                                _______
                                

         Mr. Rubio, from the Select Committee on Intelligence,
                        submitted the following

                              R E P O R T

                             together with

                             MINORITY VIEWS

                         [To accompany S. 3905]

    The Select Committee on Intelligence, having considered an 
original bill (S. 3905) to authorize appropriations for fiscal 
year 2021 for intelligence and intelligence-related activities 
of the United States Government, the Intelligence Community 
Management Account, and the Central Intelligence Agency 
Retirement and Disability System, and for other purposes, 
reports favorably thereon and recommends that the bill do pass.

               Classified Annexes to the Committee Report

    Pursuant to Section 364 of the Intelligence Authorization 
Act for Fiscal Year 2010 (Public Law 111-259), the Director of 
National Intelligence (DNI) publicly disclosed on February 11, 
2020, that the request for the National Intelligence Program 
(NIP) for Fiscal Year 2021 was $61.9 billion. Other than for 
limited unclassified appropriations, primarily the Intelligence 
Community Management Account, the classified nature of United 
States intelligence activities precludes any further 
disclosure, including by the Committee, of the details of its 
budgetary recommendations. Accordingly, the Committee has 
prepared a classified annex to this report that contains a 
classified Schedule of Authorizations. The classified Schedule 
of Authorizations is incorporated by reference in the 
Intelligence Authorization Act and has the legal status of 
public law. The classified annex is made available to the 
Committees on Appropriations of the Senate and the House of 
Representatives and to the President. It is also available for 
review by any Member of the Senate subject to the provisions of 
Senate Resolution 400 of the 94th Congress (1976).

              Section-by-Section Analysis and Explanation

    The following is a section-by-section analysis and 
explanation of the Intelligence Authorization Act for Fiscal 
Year 2021 (the ``Act'') that was reported by the Committee.

                    TITLE I--INTELLIGENCE ACTIVITIES

Section 101. Authorization of appropriations

    Section 101 lists the United States Government departments, 
agencies, and other elements for which the Act authorizes 
appropriations for intelligence and intelligence-related 
activities for Fiscal Year 2021.

Section 102. Classified schedule of authorizations

    Section 102 provides that the details of the amounts 
authorized to be appropriated for intelligence and 
intelligence-related activities for Fiscal Year 2021 are 
contained in the classified Schedule of Authorizations and that 
the classified Schedule of Authorizations shall be made 
available to the Committees on Appropriations of the Senate and 
House of Representatives and to the President.

Section 103. Intelligence community management account

    Section 103 authorizes appropriations for the Intelligence 
Community Management Account (ICMA) of the ODNI for Fiscal Year 
2021.

 TITLE II--CENTRAL INTELLIGENCE AGENCY RETIREMENT AND DISABILITY SYSTEM

Section 201. Authorization of appropriations

    Section 201 authorizes appropriations for the CIA 
Retirement and Disability Fund for Fiscal Year 2021.

               TITLE III--INTELLIGENCE COMMUNITY MATTERS

           SUBTITLE A--GENERAL INTELLIGENCE COMMUNITY MATTERS

Section 301. Restriction on conduct of intelligence activities

    Section 301 provides that the authorization of 
appropriations by the Act shall not be deemed to constitute 
authority for the conduct of any intelligence activity that is 
not otherwise authorized by the Constitution or laws of the 
United States.

Section 302. Increase in employee compensation and benefits authorized 
        by law

    Section 302 provides that funds authorized to be 
appropriated by the Act for salary, pay, retirement, and other 
benefits for federal employees may be increased by such 
additional or supplemental amounts as may be necessary for 
increases in compensation or benefits authorized by law.

Section 303. Clarification of authorities and responsibilities of 
        National Manager for National Security Telecommunications and 
        Information Systems Security

    Section 303 permits the National Manager for National 
Security Telecommunications and Information Systems Security, 
as designated by National Security Directive 42 (NSD-42), to 
delegate NSD-42 authorities to a Deputy National Manager, 
without further delegation. Section 303 further reinforces the 
National Security Agency's (NSA's) mission regarding 
authorities and funding programs by ensuring that the National 
Manager--when carrying out NSD-42 authorities--may supervise, 
oversee, or execute (directly or indirectly) the Information 
Systems Security Program (ISSP), but shall not supervise, 
oversee, or execute any aspect of the National Intelligence 
Program (NIP) or Military Intelligence Program (MIP), except as 
necessary to supervise, oversee, or execute the ISSP. Section 
303 also provides that, upon such delegation of authority, the 
Deputy National Manager may supervise, oversee, or execute 
(directly or indirectly) the ISSP, but shall not supervise, 
oversee, or execute any aspect of the NIP or MIP, except as 
necessary to supervise, oversee, or execute the ISSP.

Section 304. Continuity of operations plans for certain elements of the 
        intelligence community in the case of a national emergency

    Section 304 requires the Directors of the Office of the 
Director of National Intelligence (ODNI), Central Intelligence 
Agency (CIA), National Reconnaissance Office (NRO), Defense 
Intelligence Agency (DIA), NSA, and National Geospatial-
Intelligence Agency (NGA) to establish continuity of operations 
plans for use in the case of certain national emergencies as 
defined in statute, and share those with the congressional 
intelligence committees within 7 days of a national emergency 
being declared. Furthermore, Section 304 requires these 
agencies to provide the committees with any updates to those 
plans as the conditions of the national emergency require.

Section 305. Application of Executive Schedule level III to positions 
        of Director of National Security Agency and Director of 
        National Reconnaissance Office

    Section 305 provides that the Director of the NRO and the 
Director of the NSA shall be designated as Level III on the 
Executive Schedule, the equivalent of an Under Secretary. The 
Committee recognizes that this provision does not affect the 
current Director of the NSA's military rank or pay. Section 305 
is intended to provide the Committee's view as to the 
Director's stature in the interagency; it is not intended to 
signal support for a civilian nominee. The Committee further 
clarifies that this provision shall apply to a successor 
civilian occupying the position of Director of the NRO.

Section 306. National Intelligence University

    Section 306 provides the National Intelligence University 
(NIU) with the authorities that the Department of Defense War 
Colleges have regarding faculty member hiring and compensation, 
and the acceptance of faculty research grants. Section 306 also 
sustains an independent, external board of visitors to provide 
oversight of the NIU.

Section 307. Requiring facilitation of establishment of Social Media 
        Data and Threat Analysis Center

    Section 307 provides a requirement regarding Section 5323 
of the National Defense Authorization Act for Fiscal Year 2020 
by requiring that the Social Media Data and Threat Analysis 
Center be established not later than 180 days after enhancement 
of this Act.

Section 308. Data collection on attrition in intelligence community

    Section 308 requires the DNI to set standards and issue an 
annual report on the reasons why different categories of 
Intelligence Community (IC) employees separate from service or 
applicants to IC positions withdraw from the hiring process 
after they have been issued a conditional offer of employment. 
Data on workforce attrition should include demographics, 
specialties, and length of service. Such reasons may include an 
alternative job opportunity, a loss of interest in joining the 
IC, or the length of time to complete the clearance process.

Section 309. Limitation on delegation of responsibility for program 
        management of information-sharing environment

    Section 309 stipulates that the President must delegate 
responsibilities under Section 1016(b) of the Intelligence 
Reform and Terrorism Prevention Act of 2004 to an official 
other than the ODNI on or after October 1, 2020.

Section 310. Improvements to provisions relating to intelligence 
        community information technology environment

    Section 310 streamlines current reporting requirements by 
requiring the Director of National Intelligence (DNI) to 
develop and maintain a long-term roadmap for the Intelligence 
Community Information Technology Environment (IC ITE). Section 
310 further requires the DNI to develop and maintain a business 
plan to implement the long-term IC ITE roadmap.

Section 311. Requirements and authorities for Director of the Central 
        Intelligence Agency to improve education in science, 
        technology, engineering, arts, and mathematics

    Section 311 ensures that the Director of the CIA has the 
legal authorities required to improve the skills in science, 
technology, engineering, arts, and mathematics (known as STEAM) 
necessary to meet long-term national security needs.

      SUBTITLE B--INSPECTOR GENERAL OF THE INTELLIGENCE COMMUNITY

Section 321. Prohibition against disclosure of whistleblower identity 
        as reprisal against whistleblower disclosure by employees and 
        contractors in the intelligence community

    Section 321 adds to prohibited personnel practices a 
knowing, willful or negligent disclosure that reveals an IC 
Whistleblower's identifying information without consent. 
Section 321 further provides an IC Whistleblower with a private 
right of action if such disclosure is taken as a reprisal 
against the IC Whistleblower for bringing a complaint.

Section 322. Clarification of standards regarding whistleblower 
        complaints and information of urgent concern received by 
        Inspector General of the Intelligence Community

    Section 322 clarifies the definition of ``urgent concern'' 
regarding whistleblower complaints and ensures that the 
Inspector General of the Intelligence Community (IC IG) has 
authority over determining whether a matter falls within the 
``urgent concern'' definition.

Section 323. Clarification regarding submittal of complaints and 
        information by whistleblowers in the intelligence community to 
        Congress

    Section 323 clarifies that IC Whistleblowers can give their 
complaints to the intelligence committees--as long as the 
complaint is provided to both Chairman and Vice Chairman or 
Ranking Member or designated nonpartisan staff--regardless of 
whether they are determined to be urgent concerns. Section 323 
further provides new security protocols in the instances where 
complaints include classified information.

Section 324. Limitation on sharing of intelligence community 
        whistleblower complaints with persons named in such complaints

    Section 324 prohibits Federal government agents and 
employees from sharing an IC Whistleblower complaint that has 
been submitted to an IC element's IG with a named subject of 
the complaint, unless the IC Whistleblower provides written 
consent or information sharing is required as part of the 
investigation. Section 324 further provides that any violation 
is subject to criminal fines and/or two-year imprisonment and 
requires notification to the congressional intelligence 
committees.

  SUBTITLE C--REPORTS AND ASSESSMENTS PERTAINING TO THE INTELLIGENCE 
                               COMMUNITY

Section 331. Assessment by the Comptroller General of the United States 
        on efforts of the Intelligence Community and the Department of 
        Defense to identify and mitigate risks posed to the 
        Intelligence Community and the Department of Defense by the use 
        of direct-to-consumer genetic testing by the Government of the 
        People's Republic of China

    Section 331 directs the Comptroller General to assess 
efforts in the IC and Department of Defense (DoD) to identify 
and mitigate the risks posed to the IC and DoD by direct-to-
consumer genetic testing by the Government of the People's 
Republic of China. Section 331 further requires the report to 
include key national security risks and vulnerabilities, an 
assessment of the IC's and DoD's identification and mitigation 
of such risks and vulnerabilities, and recommendations for the 
IC and DoD to improve identification and mitigation of such 
risks and vulnerabilities.

Section 332. Report on use by intelligence community of hiring 
        flexibilities and expedited human resources practices to assure 
        quality and diversity in the workforce of the intelligence 
        community

    Section 332 requires the DNI to submit a report describing 
how IC elements are exercising hiring flexibilities and 
expedited human resources practices afforded under 5 U.S.C. 
Sec. 3326 and related regulations, including the identification 
of any obstacles encountered by the IC in exercising such 
authorities.

Section 333. Report on signals intelligence priorities and requirements

    Section 333 requires the DNI to submit a report detailing 
signals intelligence priorities and requirements subject to 
Presidential Policy Directive-28 that stipulates ``why, 
whether, when, and how the United States conducts signals 
intelligence activities.'' This report shall be submitted in 
unclassified form, but may include a classified annex.

Section 334. Assessment of demand for student loan repayment program 
        benefit

    Section 334 requires the head of each IC element to 
calculate the number of personnel who qualify for a student 
loan repayment program benefit, and compare it to the number of 
personnel who apply for such a benefit. The information 
provided will include recommendations for how to optimize 
participation and enhance the effectiveness of the benefit as a 
retention tool, to identify any shortfall in funds or 
authorities needed to provide such benefit, and to include such 
materials with the budget request for Fiscal Year 2022.

Section 335. Assessment of intelligence community demand for child care

    Section 335 requires the DNI in coordination with the heads 
of other IC elements to provide a report that includes: a 
calculation of the total annual demand for child care by 
employees at NSA, NGA, DIA, NRO, CIA, and ODNI; an 
identification of any shortfalls between demand and the child 
care support by these IC elements; an assessment of options for 
addressing any such shortfall; an identification of the 
advantages, disadvantages, security requirements, and costs 
associated with each option; a plan to meet, within five years 
after the date of the report, the demand for childcare, and an 
assessment of specific considerations that impact the 
alternatives available to these IC elements.

Section 336. Open source intelligence strategies and plans for the 
        intelligence community

    Section 336 requires the DNI in coordination with the heads 
of each IC element, to conduct a survey of the open source 
intelligence requirements, goals, investments, and capabilities 
for each element of the IC and to evaluate the usability of the 
Open Source Enterprise (OSE). Based on such findings, it 
further mandates the DNI shall develop, in coordination with 
the heads of each IC element, a strategy for open source 
intelligence collection, analysis, and production across the 
IC; create a plan for improving usability of the OSE; and 
conduct a risk and benefit analysis of creating an independent 
open source center.
    Using the findings above, Section 336 further requires the 
DNI to develop a plan for a centralized data repository of open 
source intelligence. Finally, it mandates the DNI develop a 
cost-sharing model that leverages the open source intelligence 
investments of each IC element for the beneficial use of the 
entire IC. It also requires the heads of ODNI, CIA, DIA, NGA, 
and NSA to jointly brief the congressional intelligence 
committees on the progress developing the aforementioned plans.

Section 337. Plan for establishing an element of the intelligence 
        community within the United States Space Force

    Section 337 requires the DNI and the Under Secretary of 
Defense for Intelligence and Security, in coordination with the 
Secretary of the Air Force and the Chief of Space Operations, 
to submit a plan for establishing an element of the IC within 
the United States Space Force.

          TITLE IV--SECURITY CLEARANCES AND TRUSTED WORKFORCE

Section 401. Exclusivity, consistency, and transparency in security 
        clearance procedures, and right to appeal

    Section 401 requires the Executive Branch to publish 
adjudicative guidelines for determining eligibility to access 
classified information and makes these guidelines the exclusive 
basis for granting, denying, and revoking clearances in order 
to increase transparency and accountability, and ensure due 
process. Section 401 further codifies the right of government 
employees to appeal unfavorable eligibility determinations to 
an agency-level panel. Section 401 also creates a higher level 
review by a government-wide appeals panel, chaired by the DNI 
as the government's Security Executive Agent, to review certain 
agency-level panel determinations involving allegations of 
constitutional violations or discrimination. This DNI-led panel 
can remand decisions to the employing agency for reevaluation 
if the panel finds valid cause.

Section 402. Establishing process parity for security clearance 
        revocations

    Section 402 requires an agency, in justifying an adverse 
security clearance or access determination against a 
whistleblower, to demonstrate by clear and convincing evidence 
that the agency would have made the same security clearance or 
access determination in the absence of the whistleblower's 
disclosure. Section 402 establishes parity in the legal 
standards applied to IC Whistleblower matters.

Section 403. Federal policy on sharing of derogatory information 
        pertaining to contractor employees in the trusted workforce

    Section 403 requires the DNI to issue a policy within 180 
days of enactment that facilitates sharing of derogatory 
information the government obtains on cleared contractors 
(along with any mitigation measures put in place) with Federal 
contractor employers' chief security officers, to help 
companies maintain robust insider threat programs. The policy 
must comport with privacy rights, allow individuals to verify 
the information, and stipulate that such sharing is only for 
purposes of security risk mitigation.

                   TITLE V--REPORTS AND OTHER MATTERS

Section 501. Secure and trusted technology

    Section 501 establishes a Communications Technology 
Security and Innovation Fund to support the development and 
deployment of open standards-based compatible, interoperable 
equipment for fifth-generation wireless networks to create a 
more secure and diverse telecommunications vendor market. It 
also establishes a Multilateral Telecommunications Security 
Fund to support the adoption of secure and trusted 
communications technologies in key markets globally. Section 
501 authorizes up to $750,000,000 for each fund and requires 
the administrators of each fund to provide annual reports to 
Congress detailing the use of proceeds.
    Section 501 further requires the DNI to submit a report on 
political influence by adversarial nations within international 
forums that set standards for fifth-generation and future 
generations of wireless networks, including International 
Telecommunication Union (ITU), International Organization for 
Standardization (ISO), Inter-American Telecommunication 
Commission (CITEL), and 3rd Generation Partnership Project 
(3GPP). Section 501 also requires the DNI and Secretary of 
Defense to jointly submit a report on developing federal 
wireless network testbeds for development of fifth-generation 
technologies for U.S. military and dual-use applications using 
open interface standards-based compatible, interoperable 
equipment. This report should include an assessment of efforts 
by foreign governments to build wireless network testbeds for 
virtualized telecommunication technologies. Both reports shall 
be in unclassified form with a classified annex, if required.

Section 502. Report on attempts by foreign adversaries to build 
        telecommunications and cybersecurity equipment and services 
        for, or to provide such equipment and services to, certain 
        allies of the United States

    Section 502 requires the CIA, NSA, and DIA to submit to the 
congressional intelligence and armed services committees a 
joint report that describes the United States intelligence 
sharing and military posture in Five Eyes countries that 
currently have or intend to use adversary telecommunications or 
cybersecurity equipment, especially as provided by China or 
Russia, with a description of potential vulnerabilities of that 
information and assessment of mitigation options.

Section 503. Report on threats posed by use by foreign governments and 
        entities of commercially available cyber intrusion and 
        surveillance technology

    Section 503 requires the DNI to submit a report to the 
congressional intelligence committees on the threats posed by 
foreign governments and foreign entities using and 
appropriating commercially available cyber intrusion and other 
surveillance technology.

Section 504. Reports on recommendation of the Cyberspace Solarium 
        Commission

    Section 504 requires the ODNI, Department of Homeland 
Security (acting through the Under Secretary of Homeland 
Security for Intelligence and Analysis), Department of Energy 
(acting through the Director of Intelligence and 
Counterintelligence of the Department of Energy), Department of 
Commerce, and DoD to report to Congress their assessment of the 
recommendations submitted by the Cyberspace Solarium Commission 
pursuant to Section 1652(j) of the John S. McCain National 
Defense Authorization Act (NDAA) for Fiscal Year 2019, and to 
describe actions that each agency expects to take to implement 
these recommendations.

Section 505. Assessment of critical technology trends relating to 
        artificial intelligence, microchips, and semiconductors and 
        related supply chains

    Section 505 requires the DNI to complete an assessment of 
export controls related to artificial intelligence (AI), 
microchips, advanced manufacturing equipment, and other AI-
enabled technologies, including the identification of 
opportunities for further cooperation with international 
partners.

Section 506. Duty to report counterintelligence threats to campaigns

    Section 506 requires that Federal presidential campaigns 
must report to the Federal Bureau of Investigation (FBI) within 
one week any offers to contribute, donate, expend, disburse, or 
solicit as prohibited under 50 U.S.C. Sec. 30121 by the 
following individuals: a foreign principal as defined in the 
Foreign Agent Registration Act; a person acting at the 
direction of a foreign principal; or a person included in the 
list of specially designated nationals or blocked person by the 
Treasury Department's Office of Foreign Asset Control. Section 
506 further requires Federal campaigns to establish a policy to 
retain and preserve records related to reportable foreign 
contacts for not less than three years, and enacts criminal 
penalties for willful violations of this section.

Section 507. Combating Chinese influence operations in the United 
        States and strengthening civil liberties protections

    Section 507 provides additional requirements to annual 
reports in 50 U.S.C. Sec.  3237(B) on Influence Operations and 
Campaigns in the United States by the Chinese Communist Party 
(CCP) by mandating an identification of influence operations by 
the CCP against the science and technology sector in the United 
States. Section 507 also requires the FBI to create a plan, in 
consultation with stakeholders outside the Intelligence 
Community to increase public awareness and detection of 
influence activities by the CCP. Finally, Section 507 requires 
the FBI, in consultation with the Assistant Attorney General 
for the Civil Rights and the Chief Privacy and Civil Liberties 
Officer of the Department of Justice, to develop 
recommendations to strengthen relationships with communities 
targeted by the CCP and to build trust with such communities 
through local and regional grassroots outreach.

Section 508. Annual report on corrupt activities of senior officials of 
        the Chinese Communist Party

    Section 508 requires the CIA, in coordination with the 
Department of Treasury's Office of Intelligence and Analysis 
and the FBI, to submit to designated congressional committees 
annually through 2025 a report that describes and assesses the 
wealth and corruption of senior officials of the Chinese 
Communist Party (CCP), as well as targeted financial measures, 
including potential targets for sanctions designation. Section 
508 further expresses the Sense of Congress that the United 
States should undertake every effort and pursue every 
opportunity to expose the corruption and illicit practices of 
senior officials of the CCP, including President Xi Jinping.

Section 509. Report on corrupt activities of Russian and other Eastern 
        European oligarchs

    Section 509 requires the CIA, in coordination with the 
Department of the Treasury's Office of Intelligence and 
Analysis and the FBI, to submit to designated congressional 
committees and the Under Secretary of State for Public 
Diplomacy, a report that describes the corruption and corrupt 
or illegal activities among Russian and other Eastern European 
oligarchs who support the Russian government and Russian 
President Vladimir Putin, and the impact of those activities on 
the economy and citizens of Russia. Section 509 further 
requires the CIA, in coordination with the Department of 
Treasury's Office of Intelligence and Analysis, to describe 
potential sanctions that could be imposed for such activities.

Section 510. Report on biosecurity risk and disinformation by the 
        Chinese Communist Party and the Government of the People's 
        Republic of China

    Section 510 requires the DNI to submit to the designated 
congressional committees a report identifying whether and how 
CCP officials and the Government of the People's Republic of 
China may have sought to suppress or exploit for national 
advantage information regarding the novel coronavirus pandemic, 
including specific related assessments. Section 510 further 
provides that the report shall be submitted in unclassified 
form, but may have a classified annex.

Section 511. Report on effect of lifting of United Nations arms embargo 
        on Islamic Republic of Iran

    Section 511 requires the DIA to submit to designated 
congressional committees a report on the Government of the 
Islamic Republic of Iran's plans to acquire military arms if 
the United Nations Security Council's resolutions' ban on arms 
transfers to or from the Government of the Islamic Republic of 
Iran is lifted, as well as the effects such arms acquisitions 
may have on regional security and stability.

Section 512. Report on Iranian activities relating to nuclear 
        nonproliferation

    Section 512 directs the DNI to submit a report on any 
relevant activities relating to nuclear weapons research and 
development by the Islamic Republic of Iran and any relevant 
efforts to afford or deny international access to related 
facilities in accordance with international non-proliferation 
agreements.

Section 513. Sense of Congress on Third Option Foundation

    Section 513 expresses the sense of Congress that the Third 
Option Foundation's work on behalf of the CIA's special 
operations community and their families is invaluable, such 
that the Director of the CIA should work with the Foundation to 
implement section 6412 of the Damon Paul Nelson and Matthew 
Young Pollard Intelligence Authorization Act for Fiscal Years 
2018, 2019, and 2020, which provided special rules for certain 
monthly workers' compensation payments and other payments to 
CIA personnel.

                           Committee Comments


Equitable Treatment of Relocation Costs for Intelligence Community 
        Civilians

    As demonstrated in The Intelligence Community Workforce 
Agility Protection Act of 2020, S. 3675, introduced by Senators 
Burr and Warner, the Committee strongly supports IC personnel 
who must make a permanent change of station to accept an IC 
position. The Committee recognizes such relocations pose 
significant financial hardships for the IC civilians who move 
their families to serve their country. Current law provides 
military members with exemptions from effective tax penalties 
for such relocations, but IC civilians have no similar 
exemptions, thus undermining the IC's ability to recruit and 
maintain a highly qualified and motivated workforce. The 
Intelligence Community Workforce Agility Protection Act of 2020 
would provide equitable tax treatment for IC civilians who are 
subject to similar permanent change of station orders. The 
Committee looks forward to expeditious congressional action on 
this matter.

Advanced Aerial Threats

    The Committee supports the efforts of the Unidentified 
Aerial Phenomenon Task Force at the Office of Naval 
Intelligence to standardize collection and reporting on 
unidentified aerial phenomenon, any links they have to 
adversarial foreign governments, and the threat they pose to 
U.S. military assets and installations. However, the Committee 
remains concerned that there is no unified, comprehensive 
process within the Federal Government for collecting and 
analyzing intelligence on unidentified aerial phenomena, 
despite the potential threat. The Committee understands that 
the relevant intelligence may be sensitive; nevertheless, the 
Committee finds that the information sharing and coordination 
across the Intelligence Community has been inconsistent, and 
this issue has lacked attention from senior leaders.
    Therefore, the Committee directs the DNI, in consultation 
with the Secretary of Defense and the heads of such other 
agencies as the Director and Secretary jointly consider 
relevant, to submit a report within 180 days of the date of 
enactment of the Act, to the congressional intelligence and 
armed services committees on unidentified aerial phenomena 
(also known as ``anomalous aerial vehicles''), including 
observed airborne objects that have not been identified.
    The Committee further directs the report to include:
          1. A detailed analysis of unidentified aerial 
        phenomena data and intelligence reporting collected or 
        held by the Office of Naval Intelligence, including 
        data and intelligence reporting held by the 
        Unidentified Aerial Phenomena Task Force;
          2. A detailed analysis of unidentified phenomena data 
        collected by:
            a. geospatial intelligence;
            b. signals intelligence;
            c. human intelligence; and
            d. measurement and signals intelligence;
          3. A detailed analysis of data of the FBI, which was 
        derived from investigations of intrusions of 
        unidentified aerial phenomena data over restricted 
        United States airspace;
          4. A detailed description of an interagency process 
        for ensuring timely data collection and centralized 
        analysis of all unidentified aerial phenomena reporting 
        for the Federal Government, regardless of which service 
        or agency acquired the information;
          5. Identification of an official accountable for the 
        process described in paragraph 4;
          6. Identification of potential aerospace or other 
        threats posed by the unidentified aerial phenomena to 
        national security, and an assessment of whether this 
        unidentified aerial phenomena activity may be 
        attributed to one or more foreign adversaries;
          7. Identification of any incidents or patterns that 
        indicate a potential adversary may have achieved 
        breakthrough aerospace capabilities that could put 
        United States strategic or conventional forces at risk; 
        and
          8. Recommendations regarding increased collection of 
        data, enhanced research and development, and additional 
        funding and other resources.
    The report shall be submitted in unclassified form, but may 
include a classified annex.

Coordination of Security for Domestic Military Installations and Other 
        Facilities

    The Committee is concerned that, as a result of several 
recent incidents of attempted unauthorized access to Naval Air 
Station Key West and Fort Story, Virginia by Chinese nationals, 
several security vulnerabilities have been discovered. Foreign 
adversaries may be systematically probing military 
installations and facilities, and it is important that the 
Department of Defense take responsibility for ensuring security 
measures are adequate, unauthorized accesses are tracked, and 
uniform reporting requirements for attempted unauthorized 
accesses are established.
    Therefore, the Committee directs the Under Secretary of 
Defense for Intelligence and Security (USD(I&S)), in 
coordination with the DNI and the Director of the FBI, to 
establish within the Office of the USD(I&S) a designee 
responsible for coordination of security for domestic military 
installations and other domestic military facilities. 
Specifically, the designee's responsibilities shall include 
tracking unauthorized incursions into domestic military 
installations and facilities and attempts at such incursions.
    The Committee further directs that, within 180 days of 
enactment of this Act, such individual shall develop a strategy 
for security and counterintelligence collection that defines 
the capability requirements, responsibilities, and processes 
for security and counterintelligence for domestic military 
installations and other domestic military facilities. In 
addition, not less frequently than once each year, the Under 
Secretary shall, in consultation with the heads of other 
appropriate elements of the DoD and the IC, brief the 
intelligence and armed services committees on the:
          1. Activities of the designee; and
          2. Current and anticipated trends and developments in 
        connection with security for domestic military 
        installations and other domestic military facilities.

Processing, Exploitation, and Dissemination Modernization and 
        Integration Efforts of the Algorithmic Warfare Cross-functional 
        Team of the Department of Defense

    The Committee is concerned with the intelligence silos that 
have resulted from isolated procurement programs that store 
data in individual repositories, each with its own set of 
cataloging procedures and proprietary technologies. This, in 
turn, potentially limits advantageous communications among 
databases, causes vital intelligence to go undetected, and 
causes duplication of separately-located analysts' efforts in 
reviewing other, less vital, intelligence information.
    Therefore, the Committee directs the head of the 
Algorithmic Warfare Cross-Functional Team, as established in 
the Department of Defense by memorandum dated April 26, 2017, 
to submit to the congressional intelligence and armed services 
committees within 180 days of enactment of the Act, a report 
that includes:
          1. Recommendations for the delineation of efforts 
        between the Team and the Joint Artificial Intelligence 
        Center, especially with respect to data labeling, 
        testing and evaluation;
          2. Recommendations for resource sharing across the 
        intelligence community for test and evaluation as 
        Project Maven transitions its independent lines of 
        effort;
          3. The plan of the Team to integrate unsupervised 
        artificial intelligence algorithms (e.g., algorithms 
        that learn from data without being trained, allowing 
        the artificial intelligence to self-improve) into 
        Project Maven;
          4. The plan of the Team to incorporate independent 
        data repositories located across the intelligence 
        community, irrespective of the element providing the 
        data or the domain they are resident to, into Project 
        Maven; and
          5. The plan of the Team to ensure that development of 
        Processing, Exploitation, and Dissemination technology 
        that will facilitate and enhance the capability of 
        analysts to rapidly search across near real-time 
        sensors, leverage historical data, and identify 
        valuable intelligence is incorporated into the Defense 
        Intelligence Agency Machine-assisted Analytic Rapid-
        repository System.

Plan for Assessing Government Agency Counterintelligence Programs

    Adversary intelligence and security service efforts to 
monitor, access, penetrate, and/or manipulate government 
facilities, personnel, networks, and supply chains have become 
increasingly more sophisticated, as described in the National 
Counterintelligence Strategy of the United States. Many 
national security agencies, to include those in the DoD and IC, 
have mature and robust counterintelligence programs to preserve 
the integrity of their systems. However, many agencies' 
programs lag behind, either because they do not believe they 
are at risk or because of internal funding challenges. 
Therefore, the Committee directs the Director of the National 
Counterintelligence and Security Center to develop a plan 
within 90 days of enactment of this Act for assessing the 
effectiveness of all government agency counterintelligence 
programs. This plan should address the standards and methods of 
assessment that may apply for different categories of executive 
agencies; phasing of implementation over a five-year timeframe 
to cover all government counterintelligence; the periodicity 
for updated assessments; and annual costs to conduct these 
assessment and any recommendation for a cost recovery 
mechanism.

Security Clearance Procedures and Rights to Appeal

    Section 401 of the Act provides appeal rights and 
procedures for security clearance eligibility determinations. 
This provision is not intended to impede agency decisions 
regarding access to classified information for a limited 
purpose or duration (e.g., regarding an election or one-time 
read-ins for a specific event or threat). The Committee does, 
however, expect agencies to keep Congress fully and currently 
informed of any limited purpose or duration grants of access. 
Finally, the Committee expects the DNI-level appeals panel to 
exercise judgment and review only those appeals that the panel 
concludes have evidentiary and jurisdictional merit.

Supporting Industry during Coronavirus

    Congress passed the Coronavirus Aid, Relief, and Economic 
Security Act (CARES Act) in March 2020 to provide necessary 
assistance to the American economy during the coronavirus 
pandemic. An important element of that Act was Section 3610, 
which provided agencies authorities to modify contracts for 
companies supporting the government. This provision was 
critical to the defense industrial base. The Committee believes 
that consistent interpretation of Section 3610, particularly as 
it relates to work conducted at contractor facilities, cost 
reimbursement methodology, adjustments in payment plans, and 
adjustments in contract periods of performance, is essential to 
reducing uncertainty and sustaining a vibrant national security 
sector. The Committee looks forward to working with the IC 
elements in identifying if any additional authorities or 
resources are necessary and identifying lessons learned for any 
future national emergency.

Efficient Use of Sensitive Compartmented Information Facilities

    The Committee is concerned that there are unnecessary 
challenges to the utilization of Sensitive Compartmented 
Information Facility (SCIF) spaces by multiple programs among 
IC and Department of Defense components and their appropriately 
cleared government contractors. These challenges result in 
inefficient use of SCIFs and classified networks. The Committee 
finds that it is important to support collaboration and related 
efficiencies by sharing SCIF spaces.
    Therefore, the Committee directs the DNI, in consultation 
with the Secretary of Defense, to issue, within 180 days after 
enactment of this Act, revised guidance authorizing and 
directing government agencies and their appropriately cleared 
contractors to process, store, use, and discuss sensitive 
compartmented information (SCI) at facilities previously 
approved to handle SCI, without need for further approval by 
agency or by site. This guidance shall apply to both IC-
controlled access programs and DoD special access programs.

                            Committee Action

    On June 3, 2020, a quorum being present, the Committee met 
to consider the bill and amendments. The Committee took the 
following actions:

Votes on amendments to the committee bill and the classified annex

    By unanimous consent, the Committee made the Acting 
Chairman and Vice Chairman's bill, together with the classified 
annex for Fiscal Year 2021, the base text for purposes of 
amendment.
    By voice vote, the Committee adopted en bloc three 
amendments to the classified annex, as follows: (1) a second-
degree amendment by Acting Chairman Rubio; (2) an amendment by 
Acting Chairman Rubio; and (3) a second-degree amendment by 
Senator Sasse.
    By voice vote, the Committee adopted en bloc five 
amendments to the bill, as follows: (1) an amendment by Senator 
Burr and cosponsored by Vice Chairman Warner, to improve 
provisions relating to the IC Information Technology 
Environment; (2) an amendment by Senator Risch and cosponsored 
by Senator King, to require reporting on Cyberspace Solarium 
Commission recommendations; (3) a second-degree amendment by 
Acting Chairman Rubio and cosponsored by Senators Risch, Blunt, 
Cotton, Cornyn, and Sasse, to improve Section 322; (4) an 
amendment by Senator Bennet and cosponsored by Vice Chairman 
Warner and Senators Cotton and Cornyn, to require an assessment 
of critical technology trends related to artificial 
intelligence; and (5) an amendment by Senator Cotton to require 
a report on Iranian activities relating to nuclear 
nonproliferation.
    By voice vote, the Committee adopted an amendment by 
Senator Burr and cosponsored by Vice Chairman Warner, which 
provides the legal authorities required for the Director of the 
CIA to improve recruitment in the areas of science, technology, 
engineering, arts, and mathematics (known as STEAM) necessary 
to meet long-term national security needs.
    By voice vote, the Committee adopted a second-degree 
amendment by Vice Chairman Warner and cosponsored by Senators 
Collins and Bennet, to an amendment by Vice Chairman Warner, 
and cosponsored by Senators Collins and Bennet, that requires 
Federal presidential campaigns to report to the FBI illegal 
offers of assistance by known foreign agents. The second-degree 
amendment exempted unpaid volunteers from such reporting 
requirements and reduced the criminal penalties. By a vote of 8 
ayes and 7 noes, the Committee adopted the amendment by Vice 
Chairman Warner, and cosponsored by Senators Collins and 
Bennet, as modified by the second-degree amendment. The votes 
in person were as follows: Acting Chairman Rubio--no; Senator 
Burr--no; Senator Risch--no; Senator Collins--aye; Senator 
Blunt--no; Senator Cotton--no; Senator Cornyn--no; Senator 
Sasse--no; Vice Chairman Warner--aye; Senator Feinstein--aye; 
Senator Wyden--aye; Senator Heinrich--aye; Senator King--aye; 
Senator Harris--aye; and Senator Bennet--aye.
    By a vote of 7 ayes and 8 noes, the Committee did not adopt 
an amendment by Senator Wyden to establish the DNI as the 
Executive Agent for Federal government-wide declassification 
processes and requirements. The votes in person were as 
follows: Acting Chairman Rubio--no; Senator Burr--no; Senator 
Risch--no; Senator Collins--no; Senator Blunt--no; Senator 
Cotton--no; Senator Cornyn--no; Senator Sasse--no; Vice 
Chairman Warner--aye; Senator Feinstein--aye; Senator Wyden--
aye; Senator Heinrich--aye; Senator King--aye; Senator Harris--
aye; and Senator Bennet--aye.

Votes to report the committee bill

    On June 3, 2020, the Committee voted to report the bill, as 
amended, by a vote of 14 ayes and one no. The votes in person 
or by proxy were as follows: Acting Chairman Rubio--aye; 
Senator Burr--aye; Senator Risch--aye; Senator Collins--aye; 
Senator Blunt--aye; Senator Cotton--aye; Senator Cornyn--aye; 
Senator Sasse--aye; Vice Chairman Warner--aye; Senator 
Feinstein--aye; Senator Wyden--no; Senator Heinrich--aye; 
Senator King--aye; Senator Harris--aye; and Senator Bennet--
aye.
    By unanimous consent, the Committee authorized the staff to 
make technical and conforming changes to the bill and 
classified annex.

                       Compliance With Rule XLIV

    Rule XLIV of the Standing Rules of the Senate requires 
publication of a list of any ``congressionally directed 
spending item, limited tax benefit, and limited tariff 
benefit'' that is included in the bill or the committee report 
accompanying the bill. Consistent with the determination of the 
Committee not to create any congressionally directed spending 
items or earmarks, none have been included in the bill, the 
report to accompany it, or the classified schedule of 
authorizations. The bill, report, and classified schedule of 
authorizations also contain no limited tax benefits or limited 
tariff benefits.

                           Estimate of Costs

    Pursuant to paragraph 11(a)(3) of rule XXVI of the Standing 
Rules of the Senate, the Committee deems it impractical to 
include an estimate of the costs incurred in carrying out the 
provisions of this report due to the classified nature of the 
operations conducted pursuant to this legislation. On June 8, 
2020, the Committee transmitted this bill to the Congressional 
Budget Office and requested an estimate of the costs incurred 
in carrying out the unclassified provisions.

                    Evaluation of Regulatory Impact

    In accordance with paragraph 11(b) of rule XXVI of the 
Standing Rules of the Senate, the Committee finds that no 
substantial regulatory impact will be incurred by implementing 
the provisions of this legislation.

                        Changes to Existing Law

    In compliance with paragraph 12 of rule XXVI of the 
Standing Rules of the Senate, the Committee finds that it is 
necessary to dispense with the requirement of paragraph 12 to 
expedite the business of the Senate.

                    MINORITY VIEWS OF SENATOR WYDEN

    Despite its strong provisions, I voted against the Fiscal 
Year 2021 Intelligence Authorization Act because the 
legislation failed to reform a broken, costly declassification 
system. Years of reports, from the Information Security 
Oversight Office (ISOO) and the Public Interest 
Declassification Board (PIDB), have documented how a flood of 
digital classification has overwhelmed the federal government's 
obsolete declassification system. There is a consensus, inside 
and outside government, that the system is unsustainable.
    The ISOO has determined that the cost of classification 
continues to increase and now exceeds $18 billion annually. A 
dysfunctional system that lets more and more classified records 
pile up wastes a significant portion of that amount, while 
undermining transparency and doing nothing to protect national 
security.
    There is no dispute about the severity of the problem, nor 
about the solution--modernization of the declassification 
system. Senator Jerry Moran and I have introduced bipartisan 
legislation (S. 3733) to charge the Director of National 
Intelligence with modernizing declassification, a 
recommendation also made by the PIDB. I am disappointed that 
the Committee rejected efforts to adopt this commonsense 
bipartisan reform and address this ever-growing crisis.
    The bill includes a number of important Intelligence 
Community whistleblower protection provisions, four of which 
were included at the behest of Vice Chairman Warner and myself. 
Those provisions protect from outside interference the 
Inspector General's determinations about what whistleblower 
complaints to submit to Congress, prohibit the public 
disclosure of whistleblowers' identities, prohibit 
whistleblower complaints from being shared with the subjects of 
those complaints, and provide a channel for whistleblowers to 
come directly to Congress without interference from the DNI.
    Unnecessarily restrictive language was added to the 
provision facilitating direct whistleblower communications with 
Congress. The Intelligence Community Whistleblower Protection 
Act created a process for whistleblowers to communicate with 
the ``intelligence committees,'' whereas the bill appears to 
limit such communication to the Chairman and Vice Chairman, or 
certain nonpartisan staff. To the extent the bill creates new 
limitations on efforts by whistleblowers to convey concerns to 
members of Congress, the language in the bill should be 
modified or clarified.
    The bill includes a fifth whistleblower provision I 
proposed that protects whistleblowers whose security clearances 
are revoked or who face an adverse access determination by 
requiring that the government demonstrate by clear and 
convincing evidence that the agency would have made the same 
security clearance or access determination in the absence of 
the whistleblower's disclosure.
    It also includes my provision requiring a report on the 
threat posed by the proliferation of commercial spyware as well 
as U.S. government efforts to counter that threat.
    Finally, I am pleased that the Classified Annex requires a 
report with information that Senator Heinrich and I have been 
seeking related to collection conducted pursuant to Executive 
Order 12333.

                                                         Ron Wyden.

                                  [all]

211 Hart Senate Office Building
Washington, D.C. 20510
Phone: (202) 224-1700

Site Map

The UFO Spotlight on: Senator Ted Cruz & Colleagues Submit Amicus Brief To Supreme Court

Senator Ted Cruz

& Colleagues Submit Amicus Brief To Supreme Court in Brnovich v. DNCRIEF SEEKS TO PROTECT STATES’ AUTHORITY TO ENSURE THE INTEGRITY OF THEIR ELECTIONS

December 7, 2020  |  

WASHINGTON, D.C. – U.S. Sens. Ted Cruz (R-Texas), Tom Cotton (R-Ark.), Rick Scott, (R-Fla.), Mitch McConnell (R-Ky.), Thom Tillis (R-N.C.), James Inhofe (R-Okla.), Mike Lee (R-Utah), James Lankford (R-Okla.), Marsha Blackburn (R-Tenn.), John Cornyn (R-Texas), and Mike Braun (R-Ind.) today submitted a joint amicus brief to the Supreme Court of the United States in support of the petitioners in the case of Brnovich v. Democratic National Committee and in defense of laws that combat election fraud.

The amicus brief argues that the Voting Rights Act does not prevent states from enacting neutral election integrity measures like Arizona’s ban on ballot-harvesting, or other measures such as in-precinct voting requirements, voter ID requirements, election observer zones, and straight-ticket voting.

The full text of the amicus brief may be viewed here. Excerpts are below.

“‘The risk of voter fraud [is] real.’ As this Court has repeatedly confirmed, States have the authority and responsibility to ensure the integrity of their elections. These measures do not deny anyone the equal ‘opportunity’ to vote ‘on account of race or color.’ […]

“In the past decade, plaintiffs have pushed an aggressive Section 2 of the Voting Rights Act theory seeking to invalidate voting laws regulating absentee voting, precinct voting, early voting, voter identification, election observer zones, voter registration, durational residency, and straight-ticket voting. […]

“In the past few years, many recommended election-integrity regulations–which impose no more than ‘the usual burdens of voting,’–have been challenged in a wave of novel Voting Rights Act litigation. […]

“Were this Court to adopt the sweeping interpretation […] advocated by Respondents, these recommended laws and other neutral time, place, and manner voting laws would be put in grave danger across the country.” 

Senator Ted Cruz

202-228-7561

HOME  /  PRESS OFFICE  /  PRESS RELEASES

The False Flag Mass Media-Aided Attacks Against the Right

 

Image:

The False Flag Mass Media-Aided Attacks

Against The Right

By

Last week the New York Times released a cartoon showing Netanyahu as a seeing-eye dog leading a blind President Trump of course with the Star of David displayed on the Jewish character.

https://www.timesofisrael.com/ny-times-apologizes-for-printing-netanyahu-cartoon-with-anti-semitic-tropes/
http://www.foxnews.com/entertainment/new-york-times-apologizes-again-for-offensive-trump-netanyahu-cartoon-anti-semitic-tropes

Three days later, a supposed 19 year-old US Border Patrol Agent walks into the Chabad of Poway Synagogue, a Jewish synagogue in Poway, CA and begins shooting at the Rabbi and the congregation!

Is there any correlation between the NY Times article and the shooting?

Question: How did President Trump have any possible part in the insane murders of people under these conditions a continent away?

Yet, the US media can be counted upon to make some kind of a connection and assign blame to our President.

The question is, would such a circumstance ever have been attributed to President Obama as he led America through 8 years of intended decline (by malign neglect)?

Of course not! Never!

Modus operandi

But, let’s get down to the bottom of what is really happening.

The Democrats who have lost in every gambit they have fabricated and who stand to lose big time once the FISA Courts who have already ruled that there was illegal surveillance ordered by the FBI and members of the Obama executive branch, not to mention a report due shortly from Inspector General Michael Horowitz, and the results of an ongoing investigation into former FBI Director James Comey who leaked classified information out of the White House to the press.

Their only hope and last ditch effort will be their typical false allegations and slander.  Just as the Brown Shirts and the Nazis denounced the Jews and all of their political opponents prior to World War II, the Democrats have used ANTIFAto attack Trump supporters, violent protesters to shut down conservative lectures on college campuses, and have denied 1st Amendment and 2nd Amendment rights anyway they can.

The Media “Set-up”

History repeats itself sadly enough when factions like the Left and the Democrats are busy (as they always do) destroying the very country they live in while enjoy their freedoms within.

That being said let use examine just what or who stood to gain from another senseless massacre of innocents at a Jewish congregation in San Diego of all places in the state of California, a Leftist compromised sanctuary state that has allowed a killer to escape justice after the shooting death of Kate Steinle just because the murderer was a 5 time deported illegal alien and regardless of the fact that he was a drug dealer.

What a perfect environment for a false flag operation!

Tactics

With the well-known CIA mind control programs such as MK Ultra, the hostile political environment of California, and the peculiar events that occurred aided by the typical dereliction of duty by the US media, we can see several factions working together, and they always do.

Why was it only Fox News who gave the complete story that an ex-Iraq War veteran actually assailed the attacker, chasing him out of the synagogue after his rifle jammed?

The first news reports omitted many facts.  Why was the fact that the doctor who was present when his wife was shot trying to shield the Rabbi ,that the assailant tried to kill, fainted while attempting to administer to his own wife alongside the war veteran?

Why did the news media go on a tangent saying the shooting was the President’s fault yet fail to mention that Donald J. Trump contacted the Mayor, the Governor, and the Rabbi.

The grieving Rabbi even admitting that his conversation with the President had been very soothing and reassuring,

They generally left his out too:

“The shooter claims in the Q-and-A section to eschew political ideology, saying he does not support Donald Trump because of his support for Israel. The writer also complains that conservatives aren’t violent enough in support of their politics.”

Why not tell the public?  Why not emphasize the important facts that:

  1. He does not support Donald Trump!
  2. He complains that conservatives aren’t violent enough in support of their politics.” 
  3. (While he, a Leftist Jihadi is violent enough, in support of his own “Bernished” politics)

Victims!

until a concerted effort is made by authorities to begin connecting the dots and investigate thoroughly these insane shootings will continue. There are tworeasons why:

1. Media spin to distract the public

2. Police ineptitude in identifying the source of this insanity;

3. The “Authorities” refusal to recognize these acts as being linked to a              transparently conspiratorialeffort by a “Hidden Hand.”

The Democrats will stoop low enough and even commit murder in order to achieve their twisted agenda.

Why not ask Seth Rich, Michael Hastings, and Dean Lorich, each of them made the mistake of crossing Clinton, the DNC, or the military under the Obama Administration, but then there are other deeper, ulterior motives.

Ask yourself in the case of the good doctor who renounced the Clintons over issues in Haiti, How and why would a successful doctor commit suicide with a knife?

It just doesn’t make sense.

Mass Media Mass Omissions

Worldwide we are seeing attacks against Christians in Africa, France, the US, and the Middle East, Africa and South Asia.  China too is persecuting both Christians and Muslims on a mass scale.

The US media covered the attack on a Muslim Mosque in New Zealand, but they conveniently failed to mention an even more vicious attack upon Christians in Africa.

Why?

Are African Christians less worthy of media coverage or is it simply part of their agenda?

Notre Dame, along with a series of church attacks in the weeks that preceded the fire, including other fires, the smearing human excrement over Christian churches, the bombings in Sri Lanka are merely the deaths of “Easter worshippers” according to Obama and Hillary Clinton.

Do we not see a two-fold pattern here?

Here again is the Time-tested Media Disclaimer

The shootings by the typically “disturbed lone gunmen,” the classic findings of the US media ever since the Kennedy assassination uncovers the true motive and the perpetrators behind the shooting.

Image: John Earnest, the alleged shooter at the synagogue in Poway, California.

“John T Earnest”

https://www.nbcnews.com/news/us-news/anti-semitic-open-letter-posted-online-under-name-chabad-synagogue-n999211

Ask yourself why the shooter, a 19 year-old kid, working with the U.S. Border Patrol, in the state of California is somehow a “White Nationalist”?

Breaking News!

Fox News Reveals Shooter to be Muslim Convert

The fact is, as revealed bu Fox News Laura Ingraham on April 28th, 2019, that John T. Earnest, “ex-Iraq War Veteran is actually a convert to Islam.  John T. Earnest had become a Muslim

(Editor’s Note: Just like Obama’s ex- CIA chief, John Brennan)

Why, after he was chased out of the synagogue by the US war veteran, did he then call 9-11 to be “picked up”?

Was there a sudden tinge of regret?

Was he fearing for his life> My God, he had an AR-15 and he had been shooting as he drove away?

What kind of insane news story was this?

It doesn’t make sense and neither do the omissions of the news media with the exception of Fox News!

Yet, these are the kinds of contradictory stories that we run into when these inexplicable events take human lives and are covered with a slant angle by the fake news networks.

Interdiction

These false flags will continue until gun control has given the Left and the Democrats what they want, i.e., the end of private gun ownership!

Using these attacks to fabricate in support of their “White Nationalist” rhetoric, they create new talking points, a new villain to accuse and associate with the president.   The media talking heads spawn and spin a new narrative that they can bring to the 2020 election in another of their lying attempts at trying to get a Democrat Presidential win!

But, here’s the thing.  The Democrats are much too insane and desperate to realize that the longer they keep hammering away at the Russian collusion “obstruction allegations, the more they continue to lie and fabricate distractions” allegations.

However, it won’t stop the inevitable flood of criminal referrals issued and already handed to the Justice Department by Devin Nunez, including the unredacted FISA Court  applications, plus the charges that will be filed against Hillary Clinton, Sally Yates, Peter Strzrok, James Clapper, John Brennan, James Comey, and more!

Their rationale and desperation will justify the murders that will, in all likelihood continue!

The Big Lie:

It’s Just  Another “Coincidence”

A well-known tactic for keeping secrets in military style operations is known as “compartmentalization.”

All factions cooperating in a mission must minimize cross talk and the exchange of intelligence between each other particularly when the DNC, the US media, and the hired killers are all working under the same tent.

To minimize guilt by association, revealing conspirators, or the collusion of the acting elements the operation to foil Trump’s bid for re-election to foil the private ownership of guns, and to continue to demonize conservatives the machinery must operate seamlessly as though all events are merely “coincidental.”  

Doc Vega

*******

(Copyright 2019, Doc Vega – All Rights Reserved)
<Edited by Robert D.Morningstar>

A VERY BRIEF LIST OF DEAD UFO RESEARCHERS WHO DIED IN STRANGE WAYS

Image result for Cherry Hinkle photos

By Cherry Hinkle

A VERY BRIEF LIST OF DEAD UFO RESEARCHERS WHO DIED

IN STRANGE WAYS

 (Copyright 2017, Cherry Hinkle – All Rights Reserved)

In memoriam

Captain Thomas E. Castello (USAF)
Phil Schneider
William Cooper
Ron Johnson
Ann Livingston
Karla Turner
Ron Rummel
Danny Casolaro,
Mae Brussell
Brian Lynch
Capt. Don Elkin
Roger Hill
Jonathan Walsh
Ashad Sharif
Trevor Knight
Peter Ferry
Alistair Beckham
Andrew Hall
Frank Edwards
Arthur Bryan
Stanley Kubrick
Richard Church
Willie Ley
James Forrestal
Damon Runyon, Jr.
Dr. B. Noel Opan
Edgar Jarrold
H. T. Wilkins
Henry E Kock
Frank Scully
George Adamski
Rev. Della Larson
Gloria Lee (Byrd)
Marie Ford
Doug Hancock
Feron Hicks
Wilber B. Smith
Dr. Olavo Fontes
Ivan Sanderson
James A. Hynek
Dean Stonier
Jim Keith
Ron Bonds
Philip K. Dick
Otto Bender
Ron Johnson
Danny Casolaro
Coral Lorenzen
Jim Lorenzen
Ivan T. Sanderson
William Cooper
Dorothy Kilgallen
M.K.Jessup
Dr. James McDonald

And hundreds of other UFO researchers & witnesses

I repeat:

The MIB do not allow their dirty secrets to be exposed.

Cherry Hinkle

*******

<Edited by Robert D. Morningstar>

CIO dirty secrets exposed | The Standard

007- Henchmen of James Bond Villains … & How They Died!

 

Image result for james bond villains quiz

Ian Fleming’s James Bond novels and films are notable for their memorable villains and henchmen.  Each Bond villain has numerous henchmen to do their bidding.

There is typically one particularly privileged henchman who poses a formidable physical threat to Bond and must be defeated in order to reach the employer.  These range from simply adept and tough fighters, such as Donald ‘Red’ Grant, to henchmen whose physical characteristics are seemingly superhuman, such as Jaws.

Image result for James Bond composite

Contents

Eon Productions henchmen 

Sean Connery Era

(1962–67, 1971)

Dr. No

  • Professor R. J. Dent (Anthony Dawson) – Shot by Bond
  • Miss Taro (Zena Marshall) – Arrested
  • Mr. Jones (Reginald Carter) – Poisons self
  • Annabel Chung (Marguerite LeWars) – Alive
  • Sister Lily (Yvonne Shima) – Unknown
  • Sister Rose (Michel Mok) – Unknown
  • “Three Blind Mice” (Eric Coverley, Charles Edghill and Henry Lopez) – Die in car crash
  • Chen (Anthony Chinn) – Strangled by Bond

Related image

KGB Colonel Rosa Kleb

Soviet Traitor – Spectre Operative 

From Russia with Love 

  • Donovan ‘Red’ Grant (Robert Shaw) – Garrotted by Bond
  • Kronsteen (Vladek Sheybal) – Poisoned by Morzeny
  • Morzeny (Walter Gotell) – Blown up by Bond
  • Krilencu (Fred Haggerty) – Shot by Kerim Bey
  • Rhoda (Peter Brayham) – Unknown
  • Commissar Benz (Peter Bayliss) – Shot by Grant
  • General Vassili (Unknown) – Unknown
  • Koslovoski (Unknown) – Unknown

Image result for Gert Fröbe as Goldfinger

Gert Fröbe

Goldfinger 

Emilio Largo (Adolfo Celi)

Thunderball 

  • Fiona Volpe (Luciana Paluzzi) – Accidentally shot by henchman
  • Count Lippe (Guy Doleman) – Blown up by a masked Fiona using a motorcycle equipped with a rocket launcher.
  • Mr. Vargas (Philip Locke) – Harpooned by Bond
  • Mr. Janni (Michael Brennan) – Knocked out by Bond, implied killed when Disco Volante runs aground and explodes
  • Pr. Ladislav Kutze (George Pravda) – Changes sides, unknown
  • Angelo Palazzi (Paul Stassino) – Drowned by Largo
  • Quist (Bill Cummings) – Fed to sharks by Largo
  • Ricardo (Ian Bulloch) – Unknown
  • Colonel Jacques Bouvar (Rose Alba and Bob Simmons) – Strangled by Bond
  • SPECTRE Agent No. 5 (Philip Stone) – Survives
  • SPECTRE Agent No. 7 (Cecil Cheng) – Survives
  • SPECTRE Agent No. 9 (Clive Cazes) – Electrocuted by Blofeld after being found guilty of embezzlement
  • SPECTRE Agent No. 10 (André Maranne) – Survives
  • SPECTRE Agent No. 11 (Murray Kash) – Survives

You Only Live Twice 

  • Mr. Osato (Teru Shimada) – Shot by Blofeld
  • Helga Brandt (Karin Dor) – Fed to piranhas by Blofeld for her failure to kill Bond
  • Hans (Ronald Rich) – Fed to piranhas by Bond
  • SPECTRE Agent No. 3 (Burt Kwouk) – Killed through unknown means
  • SPECTRE Agent No. 4 (Michael Chow) – Unknown
  • Henderson Assassin (Unknown) – Stabbed by Bond
  • Bedroom Assassin (David Toguri) – Shot by Bond
  • Bamboo Assassin (Unknown) – Stabbed with his own weapon by Bond
  • Security Guard (Unknown) – Shot by Bond

Diamonds Are Forever 

George Lazenby era (1969) 

On Her Majesty’s Secret Service

  • Fräulein Irma Bunt (Ilse Steppat) – Thought to have died in car crash, later survives
  • Grunther (Yuri Borienko) – Pushed against nail bed by Tracy Bond
  • Gumbold (James Bree) – Unknown
  • Braun (George Lane Cooper) – Shot by Bond
  • Felsen (Leslie Crawford) – Unknown
  • Josef (Joseph Vasa) – Unknown
  • Ruby Bartlett (Angela Scoular) – Unknown
  • Nancy (Catherine Schell) – Unknown
  • Helen (Julie Ege) – Unknown
  • Strangled SPECTRE Skier (George Leech) – Fell to his death

Roger Moore era (1973–85)

Live and Let Die

Tee Hee Johnson (Julius W. Harris) – Thrown from train by Bond

Related image

  • Geoffrey Holder

  • Baron Samedi

  • Pushed into coffin full of snakes, later shown to have survived

  • Whisper (Earl Jolly Brown) – Bond locks him into a capsule, unknown
  • Simone Latrelle (Solitaire) (Jane Seymour) – Changed sides, loses her powers, survived
  • Rosie Carver (Gloria Hendry) – Shot by one of Kananga’s scarecrows
  • Adam (Tommy Lane) – Blown up inside a ship
  • Sales Girl (Kubi Chaza) – Alive
  • Dambala (Michael Ebbin) – Shot by Bond
  • Cab Driver (Arnold Williams) – Alive
  • New Orleans Assassin (Alvin Alcorn) – Alive
  • Jazz Funeral Procession (Olympia Brass Band) – Alive

Image result for man with the golden gun

The Man with the Golden Gun

  • Nick Nack (Hervé Villechaize) – Arrested
  • Andrea Anders (Maud Adams) – Changed sides, shot by Scaramanga
  • Hai Fat (Richard Loo) – Hired Scaramanga; later shot by Scaramanga
  • Kra (Sonny Caldinez) – Fell into vat of liquid helium after Goodnight hit him with a spanner
  • Chula (Chan Yiu Lam) – Alive
  • Lazar (Marne Maitland) – Alive

Image result for james bond villains quiz

The Spy Who Loved Me

Image result for moonraker 007

 Hugo Drax 

        Michael Lonsdale

Moonraker

  • Jaws (Richard Kiel) – Changed sides, survived
  • Chang (Toshiro Suga) – Thrown through a clockface and crash lands on a piano
  • Blonde Beauty (Irka Bochenko) – Dies when Space Base blows up
  • Museum Guide (Anne Lonnberg) – Dies when Space Base blows up
  • La Signorina del Mateo (Chichinou Kaeppler) – Dies when Space Base blows up
  • Lady Victoria Devon (Françoise Gayat) – Dies when Space Base blows up
  • Countess Labinsky (Catherine Serre) – Dies when Space Base blows up
  • Mademoiselle Deladier (Béatrice Libert) – Dies when Space Base blows up
  • Apollo Jet Hostess (Leila Shenna) – Unknown
  • Apollo Jet Pilot (Jean-Pierre Castaldi) – Fell to his death
  • Tree assassin (Guy Delorme) – Shot by Bond
  • Corinne Dufour (Corinne Clery) – Torn apart by Drax’s dogs

Image result for 007 for your eyes only cast

For Your Eyes Only

  • Emile Leopold Locque (Michael Gothard) – Pushed off cliff in his car after being shot in the shoulder
  • Erich Kriegler (John Wyman) – Defenestrated by Bond
  • Hector Gonzales (Stefan Kalipha) – Killed by Melina Havelock
  • Claus (Charles Dance) – Harpooned by Columbo’s man
  • Apostis (Jack Klaff) – stabbed with pike by Bond and falls off mountain
  • Countess Lisl von Schlaf (Cassandra Harris) – Ran over by Locque
  • Helicopter Pilot (George Sweeney)- electrocuted through headset by his employer
  • Mantis Man (Graham Hawkes) – Vehicle exploded
  • Kristatos’ Henchman (George Leech) – Eaten by sharks

Image result for octopussy

Octopussy

  • Gobinda (Kabir Bedi) – Falls off plane
  • Mischka (David Meyer) – Killed by Bond
  • Grischka (Anthony Meyer) – Killed by Bond
  • Lenkin (Peter Porteous) – Arrested
  • Magda (Kristina Wayborn) – Changes sides, alive
  • Octopussy (Maud Adams) – Changes sides, survives
  • Colonel Luis Toro (Ken Norris) – Killed by explosion
  • Thug with Yo Yo (William Derrick) – Killed by crocodile
  • Mufti (Tony Arjuna)- Unknown

Image result for a view to a kill

A View to a Kill

Timothy Dalton era (1987–89)

Image result for the living daylights

The Living Daylights

  • Necros (Andreas Wisniewski) – Fell to his death
  • Colonel Feyador (John Bowe) – Blown up by grenade
  • Kara Milovy (Maryam D’Abo) – Changed sides, survived
  • Imposter 00 (Carl Rigg) – Dies in a car explosion
  • Sergeant Stagg (Derek Hoxby) – Shot by Pushkin

Licence to Kill

  • Milton Krest (Anthony Zerbe) – Killed inside a pressure chamber by Sanchez
  • Dario (Benicio del Toro) – Shot by Pam Bouvier and fell into a shredder
  • Ed Killifer (Everett McGill) – Bond pushes him into a shark pool
  • William Truman-Lodge (Anthony Starke) – Shot by Sanchez
  • Colonel Heller (Don Stroud) – Braun impales him with a forklift
  • Perez (Alejandro Bracho) – Falls to his death in a jeep
  • Braun (Guy De Saint Cyr) – Falls to his death in a jeep
  • Professor Joe Butcher (Wayne Newton) – Survived
  • Clive (Eddie Edenfield) – Harpooned by Bond
  • Bill (Carl Ciarfalio) – Killed by Bond
  • Warehouse Guard (Jeff Moldovan) – Electrocuted by Bond
  • President Hector Lopez (Pedro Armendáriz Jr.) – Alive
  • Lupe Lamora (Talisa Soto) – Changed sides, survived
  • Honorato (Honorato Magaloni) – Alive

Image result for goldeneye 007

Pierce Brosnan era (1995–2002)

GoldenEye 

Tomorrow Never Dies

  • Richard Stamper (Götz Otto) – Incinerated by sabotaged cruise missile
  • Dr. Kaufman (Vincent Schiavelli) – Shot by Bond after being electrocuted
  • Henry Gupta (Ricky Jay) – Shot by Carver
  • General Chang (Philip Kwok) – Unknown
  • Captain Scott (Mark Spalding) – Shot by Bond
  • Paris Carver (Teri Hatcher) – Changes sides; Shot
  • Tamara Steel (Nina Young) – Unknown
  • PR Lady (Daphne Deckers) – Unkown
  • Timblin (Unknown) – Unknown

The World Is Not Enough

  • Giulietta da Vinci (Cigar Girl) (Maria Grazia Cucinotta) – Blew up her own hot air balloon
  • Mister Bullion (Goldie) – Shot by Valentin Zukovsky
  • Gabor (John Seru) – Shot by Bond
  • Sasha Davidov (Ulrich Thomsen) – Shot by Bond
  • Dr. Mikhail Arkov (Jeff Nuttall) – Shot by Renard’s Bodyguard
  • Trukhin (Carl McCrystal) – Unknown
  • Renard’s Bodyguard (Sean Cronin) – Unknown
  • Mr. Lachaise (Patrick Malahide) – Stabbed by Cigar Girl
  • Captain Nikolai (Justus von Dohnányi) – Poisoned by Renard’s men

Die Another Day

  • Miranda Frost (Rosamund Pike) – Stabbed with sword by Jinx
  • Zao (Rick Yune) – Crushed by an ice chandelier
  • Vlad (Mikhail Gorevoy) – Sucked out from Graves’ plane
  • Mister Kil (Lawrence Makoare) – Jinx kills him with a laser
  • General Moon (Kenneth Tsang) – Shot by Gustav Graves after electrocuting him
  • Dr. Alvarez (Simon Andreu) – Shot by Jinx
  • Mr. Van Bierk (Mark Dymond) – Arrested by Bond
  • General Han (Daryl Kwan) – Sucked out from Graves’ plane
  • General Li (Vincent Wong) – Sucked out of Graves’ plane
  • General Dong (Sai-Kit Yung) – Sucked out of Graves’ plane

Image result for casino royale donald craig

Daniel Craig era (2006–present)

Casino Royale

  • Mollaka (Sébastien Foucan) – Shot by Bond
  • Valenka (Ivana Miličević) – Shot by Mr. White
  • Vesper Lynd (Eva Green) – Drowned
  • Alex Dimitrios (Simon Abkarian) – Stabbed by Bond
  • Adolph Gettler (Richard Sammel) – Shot by nail gun
  • Fisher (Daud Shah) – Drowned, then shot by Bond
  • Carlos (Claudio Santamaria) – Blown up by Bond
  • Kratt (Clemens Schick) – Shot by Mr. White
  • Leo (Emmanuel Avena) – Arrested
  • Tall Man (Leos Stransky) – Crushed by elevator
  • Obanno’s Lieutenant (Michael Offei) – Unknown
  • Obanno’s Liaison (Makhoudia Diaw) – Fell to his death
  • Gettler’s Henchman (Glenn Foster) – Shot by Bond

Quantum of Solace

  • General Medrano (Joaquín Cosio) – Shot by Camille
  • Elvis (Anatole Taubman) – Incinerated
  • Craig Mitchell (Glenn Foster) – Shot by Bond
  • Edmund Slate (Neil Jackson) – Stabbed in neck with scissors by Bond
  • Guy Haines (Paul Ritter) – Unknown
  • Carlos (Fernando Guillen Cuervo) – Shot by Bond
  • Lieutenant Orso (Jesus Ochoa) – Fell to his death
  • Gregor Karakov (Gustavo Nanez) – Unknown
  • Greene’s Driver (Carl von Malaisé) – Shot by Bond
  • Haines’ bodyguard (Derek Lea) – Shot by Greene’s Driver
  • Motorcycle Cop #1 (Mike Pérez) – Shot by Bond
  • Motorcycle Cop #2 (Juan Carlos Avendaño) – Shot by Bond
  • Moishe Soref (Tsedor Gyalzur) – Unknown
  • Yusef Kabira (Simon Kassianides) – Arrested
  • Gift Bag Man (Christian Heller) – Unknown

Skyfall

  • Patrice (Ola Rapace) – Fell off of skyscraper to his death
  • Sévérine (Bérénice Marlohe) – Shot by Silva
  • Boat Captain (Milorad Kapor) – Shot by Bond
  • Sévérine’s Bodyguard (Tank Dong) – Eaten by Komodo dragon
  • Sévérine’s Bodyguard (Roger Yuan) – Knocked unconscious by Eve
  • Sévérine’s Bodyguard (Liang Yang) – Unknown
  • Silva’s Mercenary (Jens Hultén) – Drowned by Bond in a frozen lake
  • Silva’s Mercenary (Michael Pink) – Knocked unconscious by Bond
  • Boat Silva’s Mercenary (Adebayo Bolaji) – Shot by Bond
  • Boat Silva’s Mercenary (Amir Boutrous) – Shot by Bond
  • Boat Silva’s Mercenary (Elia Lo Tauro) – Shot by Bond

Spectre

  • Mr. Hinx (Dave Bautista) – Pulled off the train
  • Max Denbigh/C (Andrew Scott) – Fell to his death after a fight with M
  • Marco Sciarra (Alessandro Cremona) – Kicked out of helicopter by Bond
  • Dr. Vogel (Brigitte Millar) – Alive
  • Moreau (Marc Zinga) – Alive
  • Lorenzo (Peppe Lanzetta) – Fell to his death
  • Mr. Guerra (Benito Sagredo) – Neck snapped by Mr. Hinx
  • Marco (Matteo Taranto) – Shot by Bond
  • Francesco (Francesco Arca) – Shot by Bond
  • Gallo (Domenico Fortunato) – Shot by Bond
  • Gallo’s Accomplice #1 (Marco Zingaro) – Shot by Bond
  • Gallo’s Accomplice #2 (Stefano Elfi Di Claudia) – Incinerated by Bond
  • Blofeld’s Right Hand Man (Gediminas Adomaitis) – Killed in helicopter crash
  • Blofeld’s London Helicopter Pilot (Richard Banham) – Killed in helicopter crash
  • Abrika (Adel Bencherif) – Alive
  • Marshall (Erick Hayden) – Alive
  • Valerian (Oleg Mirochnikov) – Alive
  • Blofeld (Christoph Waltz) – Unknown

Henchmen outside Eon Productions

First appearance: Climax! Series: Casino Royale, 1954

Barry Nelson as James Bond in a 1954 episode of Climax! called Casino Royale (Picture: CBS)

                                Barry Nelson as James Bond
                In a 1954 episode of Climax! called Casino Royale
                                                (Photo: CBS)

Casino Royale (1954 TV special)

Image result for casino royale (1967 film)

Casino Royale (1967 film)

Image result for never say never again

Never Say Never Again

  • Lippe (Pat Roach) – hit in face with Bond’s urine sample; killed by glass shards
  • Jack Petachi – wrecks his car after Fatima Blush throws a snake in his lap
  • Domino Petachi (Kim Basinger) – changes sides, survives
  • Fatima Blush (Barbara Carrera) – shot by Bond’s explosive pen & blown up
  • Arab slave-traders – variously shot, defenestrated, and shelled by submarine deck-gun
  • “Tears of Allah” personnel – variously shot, set on fire, and grenaded by Felix Leiter’s Navy team
  • Dr. Kovacs (Milow Kirek) – survives

007 Novel Henchmen

Ian Fleming

Casino Royale

  • Basil
  • Kratt
  • Adolph Gettler
  • Vesper Lynd – shot herself

Live and Let Die 

  • The Whisper
  • Tee-Hee Johnson – knocked down stairs by Bond
  • MoThing
  • Sam Miami
  • The Flannel
  • Blabbermouth Foley

Moonraker

  • Krebs
  • Dr. Walter

Diamonds Are Forever

  • Mr. Kidds and Mr. Wint – both shot by Bond, then made to look like a murder-suicide
  • Shady Tree

From Russia, with Love

  • Red Grant
  • Krilencu

Dr. No

  • Annabelle Chung
  • Miss Taro

Goldfinger

  • Oddjob – sucked out of a broken airplane window
  • Pussy Galore – changes sides, survives
  • Jack Strap
  • Helmut Springer

Thunderball

  • Count Lippe
  • Giuseppe Petacchi
  • Kotze

The Spy Who Loved Me

  • “Sluggsy” Morant – shot by Bond
  • Sol “Horror” Horowitz – shot by Bond

On Her Majesty’s Secret Service

You Only Live Twice

The Man with the Golden Gun

  • Hendriks

Kingsley Amis

Colonel Sun

  • Von Richter

John Gardner

Licence Renewed

  • Caber
  • Mary Jane Mashkin
  • Franco

For Special Services

  • Markus Bismaquer
  • Walter Luxor
  • Mike Mazzard

Role of Honour

  • Rolling Joe Zwingli
  • Peter Amadeus
  • Simon

Nobody Lives Forever

  • Nannie Norrich
  • Doktor Kirchtum
  • Heinrich Osten

No Deals, Mr. Bond

  • Heather Dare
  • Norman Murray
  • Mischa

Scorpius

  • Bailey
  • Pearlman

Win, Lose or Die

  • Clover Pennington – shot by one of her own thugs
  • Abou – arrested

Never Send Flowers

  • Maeve Horton

Raymond Benson

Zero Minus Ten

  • General Wong
  • Sunni

SeaFire

  • Mrs Tarn

Doubleshot

  • Nadir Yassasin
  • Jimmy Powers
  • Margareta Piel

Video game henchmen

007: Agent Under Fire

  • Nigel Bloch (Denny Delk, voice)–Blown away by a rocket fired by Bond.
  • Carla the Jackal (Roxana Ortega, voice)–Shoved into an industrial fan by Bond.

007: Nightfire

  • Armitage Rook (Richard Whiten, voice)–Shot to death by Bond.
  • Makiko “Kiko” Hayashi (Tamlyn Tomita, voice)–Incinerated by space shuttle exhaust.

007: Everything or Nothing

  • Katya Nadanova (Heidi Klum)–Plunges to her death in a disabled Harrier jet.
  • Jean Le Rouge (Marc Graue)–Shot to death by Bond.
  • Jaws (Richard Kiel)–Electrocuted, nearly drowns, and set on fire by Bond, ultimate fate unknown.
  • Arkady Yayakov–Metallic sphere falls onto him after his machinery is sabotaged by Bond.

GoldenEye: Rogue Agent

  • Oddjob–Vaporized.
  • Pussy Galore–Survives.
  • Xenia Onatopp–Dies in a VTOL explosion.
  • Francisco Scaramanga–Survives.

007: From Russia with Love

  • Eva (Maria Menounos)–Shot dead in her jetpack.
  • OCTOPUS Commando Team–Killed by Bond.

James Bond 007: Blood Stone

Notes

A similar ending for a James Bond henchmen appears in Thunderball, while in You Only Live Twice two Bond henchmen are killed in a piranha tank

References

THE SUBVERSIONS OF THE ECONOMIC ROYALISTS – Part I

THE SUBVERSIONS OF THE ECONOMIC ROYALISTS

Part I

By Steve Erdmann

(Copyright 2016, Steve Erdmann-All Rights Reserved)

<Edited by Robert D. Morningstar>

(Permission to quote for review and educational purposes granted)

“Thomas Jefferson laid out in an 1816 letter to Samuel Kercheval ‘…a totally ‘free’ market, where corporations reign supreme just like the oppressive government of old, could transform America ‘until the bulk of the society is reduced to be mere automations of misery, to have no sensibilities left but for sinning and suffering.   Then begins, indeed, the bellum omnium in Omnia, which some philosophers observing to be so general in this world, have mistaken it for the natural, instead of the abusive state of man.’”   (p. 63, The Crash of 2016)

(The Crash of 2016: The Plot to Destroy America – and What We Can Do to Stop It, Thom Hartmann, Hachette Book Group, 237 Park Avenue, New York, N.Y. 10017, 2013, 291 pages, $28.00.)

Thom Hartmann, no stranger to writing on the “abusive states of man,” takes us on a trek of those “stages” where “in the real world, humans must confront both nature and other humans” (p. 63)

THE ROYALISTS

Hartmann takes us on a trek through the formative years of the American Revolution and how the colonists conducted what could be termed “corporate vandalism” (which included the famous Boston Tea Party) against Britain and against political factions such as John Adams’ Federalists and Congressional Acts and the Alien and Sedition Act to lock up political dissenters that were called “the rabble”—Hartmann, comparing a faction known as the Royalists, speaks of a 1786 letter in which Thomas Jefferson gave “his most explicit warning about this threat from plutocracy within, and advocating unwavering vigilance against it.”

boston-tea-party-as-indiansuner1

The Boston Tea Party – Serina Vang on Mezi

https://prezi.com/xkq0jpxseb9k/the-boston-tea-party/

Hartmann gives multiple examples of how The Royalists (in the form of the East India Company, the North and South expansion in the American Civil War, the crash of 1893, others) exploded and grew.   Hartmann quotes President Grover Cleveland in 1888:

“Corporations, which should be carefully restrained creatures of the law and the servants of the people, are fast becoming the peoples’ masters.”

Thom_Hartmann_at_Santa_Fe,_2004

.Thom Hartmann’s Biography (below)

https://en.wikipedia.org/wiki/Thom_Hartmann

In 1907, Teddy Roosevelt passed the Tillman Act which banned corporate contributions in political elections, which was quickly countered by two dark eras of economic Royalist Rule by “Corporate behemoths” which resulted in a Gilded Age after the Great Crash of 1857 and the Civil War.

Hartmann explains the stages in which economic “bubbles” arise and how they interact with war, market crashes, the Economic Royalists, and the Great Forgettings.   Teddy Roosevelt acknowledged what had been referred to as the “Robber Baron Economic Royalists.”  President Franklin Roosevelt said in 1936:

“Here in America we are waging a great and successful war.  It is a war for the survival of democracy.   We are fighting to save a precious form of government for ourselves and for the world.”

CO-CONSPIRATORS

Gerald MacGuire and General Smedley Butler spoke of a “Business Plot” to oust FDR to maintain Royalist Rule. In testimony before the house Un-American Activities Committee, co-conspirators were named, ranging from the Rockefellers, the Mellons, the Morgons, the DuPonts, and the Remingtons.

General Smedley Butlerb1eb9a1fb3a801a093ee07e7435c8bc3

General Smedley Butler

http://www.polyconomics.com/gallery/WSJ.jpg

“In the 1960s, a solid middle class had emerged,” says Hartmann, “the Royalists were horrified.   The conservative intellectual base, such as Russell Kirk and W. F. Buckley, genuinely feared that if a middle class grew large enough___and politically and economically powerful enough___it would inevitably lead to social chaos.” (p. 29)

Thom Hartmann on his Show

Tom Hartman on his TV Program

http://www.politico.com/story/2013/07/thom-hartmann-view-from-the-left-093753

http://media-cache-ak0.pinimg.com/736x/b1/eb/9a/b1eb9a1fb3a801a093ee07e7435c8bc3.jpg

DECLARATION OF WAR

Lewis F. Powell, Jr., as a Supreme Court Justice, wrote a Declaration of War “memo” on behalf of the Economic Royalists against both democracy and, what they judged to be an overgrown middle-class.   The “confidential” Powell Memo, urging the courts to be used as a “social, economic, and political instrument,” aimed at the Chamber of Commerce and other Royalist-controlled-so-called ‘free market’ systems, and the instilling of “pro-plutocratic perspectives.”

..Lewis F. Powell, Jr.    https://api.oyez.org/sites/default/files/images/people/lewis_f_powell_jr/lewis_f_powell_jr.jpg

http://media-cache-ak0.pinimg.com/736x/b1/eb/9a/b1eb9a1fb3a801a093ee07e7435c8bc3.jpg

The Economic-Royalists continued in spades in the Richard Nixon, Ronald Reagan, and the George Bush’s, and assorted Presidencies and associations.    FDR proposed a Second Bill of Rights (which included eight “Rights.”   One of which said there should be “the Right to adequate protection from the economic fears of old age, sickness, accident and unemployment”), but it never came to fruition.  The Wagner Act of 1935 guaranteed Americans the right to form a union and bargain collectively with their corporate employers.   These new protections allowed the middle-class to thrive.  Unfortunately, at times, “even attempting to unionize in the workplace,” says Hartmann, “would get you fired, at best.   At worst, it could get you killed.” (p. 70)

CUNNING POLITICAL STRATEGY

In 1981, the national debt was a bit under $1 trillion; Ronald Reagan tripled the debt to about $3 trillion:   more than any single president before him and one of his stated, biggest regrets.  President George H. W. Bush added a trillion dollars more.   George W. Bush added more than $6 Trillion to date, and nearly $16 trillion has been added to the actual debt.   Most politicians promised to lower deficits and reduce the national debt.

“This could be written off as run-of-the-mill political-flip-flopping and pandering,” says Hartmann, “but it’s not.  There’s a cunning political strategy behind it.”

Jude Wanniski

Hartmann describes economist Jude Wanniski as a “Republican strategist/faux” in which Wanniski patterned the “Two-Santa Claus Theory”:   Democrats concentrating on ‘gifts’ such as Social Security and Medicare, and the Republicans centered on “massive tax cuts.”

It was a double-edged sword, in which Republicans would Santa Claus their way into tax cuts and eventually force the Democrats to reverse roles, “play Scrooge, and eventually shoot Santa Claus.”

(Jude Wanniski:   “Taxes and a two-Santa Theory,” National Observer, March 6, 1976 [http://capitalgainandgames/blog/bruce-bartlett/1701/jude-wanniski-taxes-and-two-santa-theory].)

IDEOLOGICAL MATRIX

In the matrix of the ideologues, it was Democrat President Bill Clinton, besieged by Royalist Robert Rubin (Goldman Sachs) and Alan Greenspan (Federal Reserve), who signed in the Personal Responsibility and Work Opportunity Reconciliation Act of 1996 (upholding the fraudulent myth of the ‘Welfare Queens’), and disregarded Ross Perot and allowed America to grow from a modest $15 billion deficit in 1981 to an enormous $539 billion in 2012.

“A Democrat just elected to the Presidency made no difference to the shadow government of lobbyist, corporate-funded think tanks and political fund-raiser,” says Hartmann.  “Clinton chose political expediency.   He chose to carry the Royalist agenda forward.”

Clinton signed the free-trade death warrant for the middle class.   The Democrats turned into Eisenhower Republicans, as the Republicans turned into something completely different:  they stepped up their assault, they culled a no Leisure Society; instead, just a “cataclysmic crash.”

PSYCHOPATHS

Hartmann quotes economist John Kenneth Galbraith about the on-going psychopathic “madness”:   “The sense of responsibility in the financial community for the community as a whole…is nearly nil. Perhaps this is inherent…in a community where the primary concern is making money, one of the necessary rules is to live and let live…to speak out against madness may be ruin those who have succumbed to it.”

Thom Hartman

Hartmann quotes journalist Chris Hodges who described such modern-day oligopolies as Worldwide Royalists: “It’s similar to the age of the Robber Barons but in fact worse because there is no loyalty to the nation-state. The corporations are actually hollowing the country out from the inside…we’re creating a kind of neofeudalism” (p. 98)

Hartmann speaks about the tentacles of this worldwide, growing control and the looting of America by Global Psychopaths:

“American transnational corporations have historically cavorted with nations whose interests were similarly opposed to the United States – morally, at least.”

In Jeff Bercovici’s article for Forbes (“Why (some) Psychopaths Make Great CEOs,” June 14, 2011), Jon Ronson is quoted on millionaire psychopaths:   “The way that capitalism is structured really is a physical manifestation of the brain anomaly known as psychopathy.”

TO BE CONTINUED in Part II

*******

(In the following continuation, Thom Hartmann continues to delve into the fatalistic madness of our politicians and economists who mask themselves behind hidden agendas.  We also explore what Hartmann’s critics say and how he defends his beliefs).

*******

You can reach Steve Erdmann at dissenterdisinter@yahoo.com or independenterdmann@gmail.com.

You can friend him at Facebook:  https://www.facebook.com/stephen.erdmann1 —or —

Visit the Dissenter/Disinter Group — at —https://www.facebook.com/#!/groups/171577496293504/.

His Facebook email is http://facebook.com/stephen.erdmann1/.

*******

ANOTHER INDEPENDENCE DAY IS COMING

 ANOTHER INDEPENDENCE DAY IS COMING

Independence Day: Resurgence | Official Trailer 2 [HD] | 20th Century FOX – YouTube

ANOTHER INDEPENDENCE DAY IS COMING

By Bruce Maccabee, Phd. 

(Copyright 2016, Bruce Maccabee – All Rights Reserved)

<Edited by Robert D. Morningstar>

*******

This describes my experience with the NIGHTLINE TV show that occurred before the first “INDEPENDENCE DAY (ID4)”

FOR THE RECORD:

During the late spring of 1996 many people were anticipating the early July opening of the blockbuster UFO “epic” film, INDEPENDENCE DAY .

It was during this time that I was contacted by the ABC Nightline show and asked to appear on a special documentary “SETI and UFO” show they planned to do in early July.

I was told that they had a video of “strange lights” obtained from a telescope in Hawaii which normally did classified research.  They wanted me to view and analyze the video “live” on camera. They would not let me see it first.

I disliked this requirement that I couldn’t view the video first because I suspected they were going to try to make me look like a fool (for claiming the lights were related to ET), but I did it anyway. Probably few people even recall this rather good documentary and fewer still recall the video of strange lights.

Robert Morningstar & Bruce Maccabee Nov 12-07 Washington DC.JPGRobert Morningstar & Dr. Bruce Maccabee at the National Press Club  with USAF Colonel Charles Halt (background left) at Leslie Kean’s Generals, Pilots, and Government Officials’ UFO Press Conference Washington, DC – Nov. 12, 2007

Nevertheless, because ABC News, in 2007, released this documentary (available from Amazon) I feel that I should “set the record straight” regarding the “UFO video.” To learn about the difficulties of this sort of research and to learn what “it” probably was, go to my web site. Note, by the way, that I reported to Nightline the final result of my research but Nightline never reported that to the television audience.

Gulf Breeze UFO 4

Gulf Breeze UFO – Polaroid photo by Ed Walter

*******

The Nightline UFO Video:

No Longer a Question Mark

The spring of 1996 was characterized by, among other things, the “run up” to the opening of the “blockbuster” UFO movie, INDEPENDENCE DAY. It was in this context that I received a late June phone from Jay LaMonica, the producer of ABC’s “Nightline” show which was hosted by well-known newsman and commentator Ted Koppel. He called to tell me that he had a video of some strange lights that had been recorded by a special “GEODS” telescope system on Mt. Haleakala which is on the Island of Maui in Hawaii. He wondered if I would be willing to analyze it. He said there were three bright lights which crossed the field of view and that initially it was thought these were lights on an airplane, but then the people who first saw the video noticed that star images passed between the lights without blinking so they thought that perhaps it wasn’t a plane after all. Sometime, he didn’t say when, after the video was first seen in early December, 1993, someone, he wouldn’t say who, had passed along a copy of the unclassified video to ABC.

Jay went on to say that Nightline was going to do a show on UFOs and SETI (Search for Extraterrestrial Life). (I immediately assumed that this was to be a “tie-in” with the opening of the movie.) He wondered if I would be willing to appear in the show. I said “sure” and “when can I see the video,” or words to that effect. He responded that I couldn’t see the video until the taping of my segment because he wanted to get my reaction to seeing the video for the first time. I was a bit irked at that because I knew he would be asking me to base a conclusion on “instantaneous analysis,” hardly a scientific way to approach the situation. Since I couldn’t see the video I asked him for as many details as he knew. He did not know much. He said it took several seconds for the lights to cross the field of view which he thought was about 2 degrees. He also said that the telescope was pointed at or near the horizon. I asked for the name of a person to call so I could learn more details, but he wouldn’t give me a name. I therefore asked him to recontact his source and find out everything he could about the telescope and where it was pointed.

We had some difficulty in setting up the exact date and time for the interview. In subsequent conversations, as we tried to specify the interview date, Jay told me that he had contacted someone involved with the project which took the video. He now believed that the field of view was probably 5 1/2 degrees rather than the originally mentioned value of 2 degrees, but he couldn’t be certain because there are several telescopes on Maui and he didn’t know which one had taken the video.

The big day came over a week later, on July 11, 1996. I arrived at the ABC studio in Washington. D.C. equipped with a ruler, a calculator and a pad of paper. Although I had only sparse information I was determined to do the best analysis I could under the circumstances. From what Jay had told me I knew I would be able to estimate the angular velocity and angular spacing of the lights. Knowledge of these angular quantities might allow me to reject, or at least set limits on, the various potential explanations.

As soon as the camera crew set up the TV monitor and video machine I began running the video over and over. Text at the beginning of the video stated that it was taken by a GEODS telescope during the year 1993 on day 335 at 032444Z (335th day of the year, December 1, at Greenwich Mean Time of 3:22:24 AM which corresponds to 5:22:24 PM, November 30 in Hawaii).

I determined that it took almost exactly 3 seconds for the lights to cross the FOV (assumed to be 5.5 deg), from left to right, in a straight line tilted slightly upward. This corresponded to an angular rate of 1.83 degrees/sec or 0.032 rad/sec. (Note: 1 degree = 0.0174 radians or 0.0174 rad. Multiply the angle in rad or the angular rate in rad/sec by the distance to get size or speed as measured perpendicular to the line of sight.) There were three lights, equally spaced and traveling in parallel with the central light a bit ahead of the lights above and below. I measured the length of the image of each bright light and found it corresponded to an angular size of about 0.005 rad while the angular spacing between the upper and lower lights was about 0.01 rad. Close to the central bright light were two much fainter lights, one above and one below. Hence there were a total of five lights (3 strong, 2 weak) traveling through the FOV of the telescope. If I had known the distance to the lights I could have calculated the actual size and velocity (perpendicular to the line of sight) from the measurements I had made. Unfortunately there was no way to determine the distance from the available information.

After watching the video several times and thinking about it I gained the distinct impression that if the information I had been given were correct (5.5 degree FOV; telescope pointed at or close to the horizon), then both the airplane and meteor hypotheses had problems. The images of the lights were spaced too far apart to be from an airplane near the horizon unless it was extremely close to the telescope and had a very large wingspan, but in this case it would also be traveling very slowly. On the other hand, if the images were meteors the angular speed was too low unless they were so far away that they might be outside the sensible atmosphere, in which case they wouldn’t glow.

Whether either of these potential explanations was correct, or if neither was, depended upon the actual angle of elevation of the telescope: was it pointed exactly at the horizon? Was it pointed 5 or 10 degrees or more above the horizon? Unfortunately I didn’t learn the answer to this important question until many weeks later.

Dr. Michael Guillen, the science correspondent for ABC TV, was the interviewer. The first thing I said to him after being introduced and well before the cameras were rolling, was “This is the worst investigation I have ever done.” I said that because I had never before made a public statement about a potential UFO case without first carrying out an investigation that at least included talking to the witnesses. (I realized that no one had actually seen the objects at the time of the taping since the video had been recorded automatically, but I knew that someone associated with the project could answer the technical questions.) I then let Michael wait a bit while I did some calculations of angular sizes and speeds. At the bottom of my note pad I wrote “Distance not actually known, nor (angular) elevation of camera (telescope). Hence can do no more than make educated guesses.”

Michael spent 30 minutes or more trying to get me to identify the lights. We played the video over and over as we both watched. The failure of one star image in particular to disappear when it passed between the upper and middle bright lights (where the wing of an aircraft would block the star) was obvious to both of us, as it had been to Jay. This seemed to be strong evidence that the lights were not connected by an opaque body, namely, the wing of an airplane. However, I pointed out that we couldn’t be certain because the failure of the star image to dim very briefly might have been some artifact of the camera electronics or the recording mechanism about which we knew next to nothing. As an example of the possible effect of the camera operation on the recording of a star that is momentarily blocked by a wing, imagine a 10 ft wide wing and a wing speed of 300 mph which is 440 ft/sec. The star image could be blocked by the wing for about 10/440 = 0.023 sec. The typical camera frame rate is 0.03 sec per frame. Thus the blockage would occur during one frame time which was too short to be observed under the circumstances – viewing on a (analogue) TV monitor with electronic noise and “twinkling” of the star causing brightness fluctuations at all times.

Michael told me that he had shown the video to Dr. Robert Nathan, formerly of the Jet Propulsion Laboratory, and a long-time UFO analyst with whom I have worked on UFO photos and videos during the 1970’s and 1980’s. Jay and Michael had been rather surprised when Robert had immediately identified the lights as meteors without any analysis other than viewing the video. I told Michael I was suspicious of the meteor explanation (for the reason given above), but that I could not be sure whether or not it was correct without knowing the angular elevation of the telescope. Furthermore, I doubted that a meteor which had broken into three parts before entering the FOV would have three nearly equally sized pieces that could travel in parallel at exactly the same rate and could travel without creating a trail of burning particles.

For many minutes he seemed be “browbeating” me into making some positive identification. It seemed to me that he wanted me to say I thought it was a real UFO or Extraterrestrial Craft. However, I refused such an identification and repeatedly stated that more investigation was needed before any answer was to be proposed. Finally, Michael asked me how I ranked the video in terms of credibility and strangeness and I said that the video had a high degree of both but that it would have to remain a big question mark. At least I would not provide any speculative explanation.

After I left the ABC TV station I began the real investigation. I hoped to have a definite answer before the video was shown nationally on Nightline. Unfortunately, that was not to be.

After a more careful theoretical analysis I was able to put more specific restrictions on the potential explanations. It became apparent that if the telescope were within 10 degrees of the horizon the meteor hypothesis could explain the angular velocity, although it still couldn’t explain the constant speed along parallel tracks without any sign of a meteor trail. Similarly, if the telescope were within 10 degrees of the horizon the airplane hypothesis was unlikely because the angular size and angular speed would only be consistent with a very large aircraft (well over 100 ft wingspan) flying at a very low speed (100 mph or lower) at a short distance from the telescope (a mile or less). The upshot of this analysis was that if the telescope were pointed close to the horizon the suggested explanations were severely strained if not simply unacceptable. Hence the possibility that one — or three — or five — UFOs were involved had to be considered. It all depended upon the angular elevation of the telescope, which I did not know and which I was not able to learn before Nightline showed the video on July 16, 1996.

Because I had to locate the telescope operators by asking for help from other people, it took well over a month to get the “real data.” The crucial information turned out to be far different from what I had been led to believe. I had been told by LaMonica that the angular elevation was low, maybe several degrees (“near the horizon”). However, I learned from the operators that the actual angular elevation was much greater and, in fact, was nearly straight up (85 degrees). I also learned that the telescope was about 10,000 ft above mean sea level (AMSL).

This put a whole new light on the matter. It took me all of five minutes (or less) to determine that under this circumstance the lights could be on an aircraft of some nominal wingspan traveling at several hundred mph at a reasonable cruising altitude above the telescope. In fact, any combination of wingspan, W in ft, speed S in ft/sec and height H in ft AMSL which obeys the relations S/(H-10,000) = 0.032 rad/sec and W/[H-10,000] = 0.01 rad would work. (Note: since the telescope is at 10,000 ft AMSL, the assumed H should be no lower than, say, 11,000 ft. Also, the assumed H should be no greater than 45,000 ft which is an upper altitude for typical aircraft). For example, if H = 20,000 ft AMSL the wingspan could be W = 0.01 x (20,000 – 10,000) = 100 ft and the speed could be S = 0.032 (20,000 – 10,000) = 320 ft/sec or 220 mph. Similarly, the video would be consistent with a plane having a wingspan of W = 40 ft and a speed of S = 128 ft/sec = 87 mph providing it were flying only about 4,000 ft above the telescope at H = 14,000 ft AMSL. Naturally there are many (an infinite) number of possible combinations of W, S and H that would satisfy the requirements of the video.

The telescope operators told me that, upon seeing the video, they had immediately suspected that it was an airplane, but then they questioned that explanation because they rarely, if ever, see an airplane overflying the telescope installation. One of the men called the FAA to find out if there was any record of an airplane scheduled to fly over Mt. Haleakala at the time of the video. He was told there was no such record (no air route passes over the mountain). Of course, an aircraft could have flown over the mountain without the FAA having a record of its exact flight path.

One aspect of the imagery seemed to directly contradict the airplane hypothesis: at one time a star image appears to pass “through” the space between the bright central lights and the upper “wing” light. This had been pointed out to me by LaMonica as evidence against the aircraft hypothesis because one would expect the star to be momentarily blocked by a solid wing. When I first saw the video I wondered whether or not that could be explained as an artifact of the electronics. Subsequently I learned from the telescope operators that the nature of the image forming and capturing electronics (RCA ISIT microchannel plate and image scan device — like a vidicon — plus a scan converter to make an ordinary VHS video) could have failed to record a brief blockage of the starlight, that should have resulted in a momentary “turning off” of the star image, because of time delay (integration time) in the processing devices.

CONCLUSION:

A UFO is as a UFO does. If a UFO does nothing that an IFO (identified flying object) could not do, then there is no reason to call it a UFO. In this case it appears that an airplane would be consistent with the observational evidence. Although I can not prove there was an airplane flying over the telescope, there is no reason to believe that an airplane could not have done so. Since there is no evidence in the video which conclusively contradicts the airplane hypothesis there is no good reason to claim that the lights were something else. Weeks after the show I reported to LaMonica that the lights were probably on an airplane. So far as I know, this information was never conveyed to the audience of Nightline.

Gulf Breeze UFO 1 Photo
Polaroid photo taken close-up to a craft hovering over the road.

An example of the opposite situation, where an unidentified object does something a conventional object could not do under the conditions of observation, is recorded in a daylight video taken July 21, 1995 in Gulf Breeze, Florida. This video shows an oddly shaped object, nearly rectangular in outline and brownish colored, of roughly 30 ft width, looking nothing like an airplane or a helicopter or a balloon/blimp, which reverses its direction of travel from roughly 500 mph rightward to about the same speed leftward (a 1,000 mph velocity change) in about 1/3 of a second (over 100 g’s of acceleration!). There is no man-made or naturally occurring object in the sky which can accomplish such a feat under the conditions of this observation. Hence that object remains a true UFO.

Bruce Maccabee, Phd.

Independence Day

July 4th, 2016

*******

Bruce Maccabee's picture

Gulf Breeze UFO Polaroids by Ed Walter