GEOINT (Geospatial Intelligence) Surveillance For Total C2 (Command And Control of Humanity) System Run by the US Military (DJ Welsh; 5/29/15 youtube and my notes)

Webmaster (ETK) Comment: This 2015 youtube presentation by D.J. Welsh is an invaluable contribution to understanding who runs the Global Government Gangstalking-Genocide Gestapo (G5)/GISTAPWO-666/Global Gangstalking Read More …

Trump’s “Gifting” of Syria’s Golan Heights To Israel Allows Rothschild-Zionist Criminal Syndicate To Steal Its Oil and Gas

https://www.trunews.com/stream/nephilim-energy-trump-administration-helping-israel-release-its-genie Webmaster’s Notes on Trunews.com podcast (3/21/2019): Who are the American and Israeli Robber Barons (aka IZCS- International Zionist Criminal Syndicate) on the Genie (Nephilim) Read More …

Official Torture Documents: CIA’s Kubark Torture Manual (1963), CIA’s Human Resources Exploitation (Torture) Manual (1983), “Torture Definition,” U.S. Code Section 2340, War Crimes Act of 1996, Military Commissions Act of 2006, UN Convention Against Torture (1994)

1) In 1963, the CIA codified their main findings on psychological torture from their MKULTRA mind control experiments (1950-1962) in the Kubark Torture Manual (1963)” Read More …

(FBI) COINTELPRO Rules for and Characteristics of Spies and Disinformation Agents (FBI, CIA, NSA, Community-Based Agents, Private Contractors, and “Change Agents”)

From https://ronaldthomaswest.com/2017/08/21/the-gentlepersons-guide-to-forum-spies/ ETK Introduction: TIs: You have been involuntarily enrolled as a “target” in a complex military-intelligence program designed to destroy your life. Chances are Read More …

Institutions/Programs Behind ¨Gang Stalking:¨ CIA, ¨Counterinsurgency-Lists,¨ Phoenix Program, Department of Homeland Security, the Phony War on Terrorism, and the National Security Enterprise

Institutions/Programs Behind ¨Gang Stalking:¨ CIA, ¨Counterinsurgency-Lists,¨ the Phoenix Program, Department of Homeland Security, the Phony War on Terrorism, and the National Security Enterprise (excerpts from Read More …

Organized Stalking/Virtual Telepathy, the “Terrorism Racket,” and the “Mafia-Terror State” Explained: Intro to Operation Catalyst and Text Transcription

Targeted Individual As Lone Wolf Terrorist (introduction to Op Catalyst) Webmaster’s (ETK) Introduction: This video provides a succinct, insightful, and (it seems) accurate explanations for Read More …

5 Level9News.com (DJ Welsh) Youtubes On Takedown of Humanity: “JADE” in Jade Helm 15 Is A.I. SOFTWARE/ SOCOM’s (Special Operations Command’s) ‘ARSOF’ OPERATING CONCEPT 2022/Militarization of Police (1033 Program & Exec. Order 13684)/2015 GEOINT Symposium

1. The “JADE” In Jade Helm 15 Is An A.I. SOFTWARE Program 2. BIGGER THAN JADE HELM ‘ARSOF’ OPERATING CONCEPT 2022, BORDERS TO BE ERASED Read More …

The CIA’s Phoenix Program Comes Home to Roost (Interview with author Douglas Valentine)

https://www.bitchute.com/video/YXs4VOwNVjA/ https://mx.video.search.yahoo.com/yhs/search?fr=yhs-Lkry-SF01&hsimp=yhs-SF01&hspart=Lkry&p=douglas+valentine+youtube+interviews#id=7&vid=a733ddcd887cf77873601f776879b5c2&action=view Trump Admin Raising Phoenix Program From the Ashes In this January, 2017 Corbett Report interview, Douglas Valentine, author of “The Phoenix Program” and Read More …

CIA’s Phoenix Program/”Computerized Genocide”/CIA As Organized Crime/DHS As New Phoenix Program: Douglas Valentine Interviews

“The CIA As Organized Crime: How Illegal Operations Corrupt America and the World:” Douglas Valentine On Our Interesting Times https://mx.video.search.yahoo.com/yhs/search?fr=yhs-Lkry-SF01&hsimp=yhs-SF01&hspart=Lkry&p=douglas+valentine+youtube+interviews#id=12&vid=60e213742971474ae28c67df26bb5b08&action=view The Phoenix Program Then and Read More …