The big media corporations are aware of the mind control program but prevented from disseminating classified information about it by the Espionage act of 1917 …





Saturay, May 5, 2012 9:00 am

In the United States’ worldwide hunt for terrorists, the real criminals are the Intelligence Officers at their computer console ground stations, who use their satellite uplinks to start their next invented event, domestic and international.

There are thousands of interlocking component intelligence (spy) programs. Most of the new ones, created in the last ten years, purport to relate to terrorism or counterterrorism. That is their cover. In actuality, they seek to create from the ground up, with legally obtained intelligence, newly invented centers of phony events of criminal investigation. Everything that is “news” is created by layers of component programs working in tandem with the satellite surveillance mind control program.

Then, surprise of wonders, every nook and cranny they investigate, they find a terrorist or criminal. The terrorists or criminals are being setup and framed. That is because the satellite surveillance mind control program uses the spy agencies’ ground work as a target, to drill down through the layers to start the efforts of mind controlling innocent zombies and their associates into behaving in a criminal manner. Judges and attorneys are also eventually mind controlled.

The Intelligence Officers put their zombies to work behaving in ways that will prove they are guilty. But they are innocent. They are zombies. The United States’ most prestigious intelligence agencies (categorized under the Director for National Intelligence (DNI) with speedy vertical sharing of information,) are trolling for individuals and groups of people to set up and frame as “terrorists” or other assorted criminal types. They flesh out the story.

Most of their efforts end up on the TV news, media shows and newspaper outlets. The big media corporations are aware of the mind control program but prevented from disseminating classified information about it by the Espionage act of 1917 and secret courtroom rulings only their legal staff is aware of. Corporate owners are not interested in spending decades in prison, a life of torture or the death penalty. They keep their mouths shut. They are censored. It is only single victims, such as myself, who can figure out the program and tell an accurate story.


“In The Common Defense,” by James E. Baker, Cambridge University Press 2007

“The US Intelligence Community,” by Jeffrey T. Richelson sixth ed. Westview Press 2012



Espionage act of 1917

The Wilson Administration, June 15, 1917

Congress responded to a growing fear that public criticism of the war effort would make it difficult to conscript the needed manpower for American participation. Also contributing to widespread unease were the actions of labor groups, especially the Industrial Workers of the World (IWW), who proclaimed their sympathy for laborers through the world, including those in Russia.

The Espionage Act, passed in June 1917, provided penalties of 20 years imprisonment and fines up to $10,000 for those convicted of interfering with military recruitment.

The law also authorized the Postmaster General to remove treasonable or seditious material from the mail.

This measure was quickly challenged in the courts. In a controversial Supreme Court decision, Schenck v. United States (1919), the law was upheld. Congress had the power to enact legislation that under ordinary circumstances might not be acceptable, when faced by “a clear and present danger.” The terms of the Espionage Act were strengthened by the enactment of amending legislation, the Sedition Actof 1918.

State and local Committees of Public Safety, although they often did effective work, also at times exceeded legitimate object and left a memory of unjust repression in some communities. No formal censorship existed but the result was the same, through pressure and the mere threat of prosecution under the Espionage Act of 1917.


~ by blombladivinden on May 19, 2012.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Google+ photo

You are commenting using your Google+ account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )


Connecting to %s

%d bloggers like this: