Google "Blue List of Death" President Ronald Reagan was on this list.. carrying out the destruction of the "Red List of Death" and then he himself being tortured and murdered via Electronic Dissolution of MemoryFrom Dr. Robert Duncan-Project Soul Catcher-An Introduction to Information Warfare Theory, Technologies, and Practice.From: R. Duncan
Sent: Thursday, August 13, 2009 8:14 PM
Subject: shieldingSorry for the multiple post.
Look up the materials that the stealth bomber uses to deflect and absorb RADAR energy. Has anyone tried combinations of Teflon, cellophane, etc? High di-electric constant material should help reduce some of the effects usingpassive shielding techniques. Since the military’s system uses adaptivebeamforming technologies, passive shielding will have its limitations. It willadapt to find the maximum entry overtime. More sophisticated methods of activejamming with alterations in the magnetic flux and the expected spectralabsorption lines for the ions of interest would be far more effective.
My book is getting close to completion. Would anyone care to proof read it before it goes to the editor and publisher?

An Introduction to Information Warfare Theory, Technologies, and Practice.
Engineering Intelligence and Designing Gods
Book Contents
Preface.......................................................................................................................................... 13
Introduction by Noam Chomsky and Ray Kurzweil................................................................... 14
Chapter 1 Enemy of theState...............................................................................................14
Chapter 2 Advanced Sensors and Systems forBio-Communications................................. 15
RADAR..................................................................................................................................... 16
Doppler RADAR.................................................................................................................................................................. 17
Signal to Noise Ratio, Gain, and Sensitivity at a Distance Parameters.................................................................. 23
Full Spectrum Radar and Multiresolution Wavelets................................................................................................. 24
Adaptive filtering........................................................................................................................................................... 26
Phased Locked Loops................................................................................................................................................... 27
Phased Arrays and Multi-dynamic RADAR.............................................................................................................. 28
Heterodyning High Frequencies into Low Frequency Sidebands......................................................................... 29
Reflection, Absorption, and Scatter............................................................................................................................ 30
Passive and Active Sensing......................................................................................................................................... 30
Adaptive Beam Forming and Electronic Scanning.................................................................................................... 31
Holography and Interferometry.................................................................................................................................. 32
Electronic Warfare and Radio Frequency Interference........................................................... 34
Directed Energy Weapons........................................................................................................ 34
Communication Warfare........................................................................................................... 36
NSA Encoding and Decoding Techniques..................................................................................................................... 36
Imaging...................................................................................................................................... 40
Spectrograms........................................................................................................................................................................ 41
Magnetic Nuclear Resonance............................................................................................................................................ 41
Electron Spin Resonance.................................................................................................................................................... 41
Scintillation of Organic Molecules Using Free Radicals and Spin Probes................................................................. 41
Viewable Scintillation of Ion Density............................................................................................................................... 42
Ion and Electron Cyclotron Resonance........................................................................................................................... 42
Using Doppler to Scan Ion Current Density with Frequency Spread......................................................................... 42
Filtering, Identification of Signatures, and Tracking Algorithms............................................ 43
Chapter 3 Modes of NeuronInfluence.................................................................................44
Directed Energy........................................................................................................................ 44
Energy Wave Shaping........................................................................................................................................................ 46
Thermal Elastic Expansion.................................................................................................................................................. 47
Thermal Catalytic Reaction Speeds.................................................................................................................................. 48
Heating...................................................................................................................................... 48
Stored Waveform Inverse Fourier Transform (SWIFT).......................................................... 48
The Diode Effect....................................................................................................................... 49
Neurotransmitter Release........................................................................................................ 49
Electron Cyclotron Current Driving......................................................................................... 51
Ion Cyclotron Resonance, Ion Heating.................................................................................... 51
Magnetic Induction................................................................................................................... 52
Quasi-Static High Voltage Electric Fields................................................................................ 52
Ultrasonic energy...................................................................................................................... 53
Colloidal Vibration Potential.............................................................................................................................................. 53
Kinetic Elastic Expansion................................................................................................................................................... 53
Direct under skull electrical probes......................................................................................... 53
Genetic Engineering and TSS Chemical Division Research for the “psi” Gene.................... 53
Chapter 4 Wet and Dry NeuralNetworks............................................................................54
Information Theory................................................................................................................... 54
Data → Information → Knowledge → Wisdom → Enlightenment............................................................................. 54
Memetics and the Mating of Minds......................................................................................... 55
Super Intelligence..................................................................................................................... 55
The Global Brain Project.......................................................................................................... 55
Hive Minds and Swarm Theory of Information........................................................................ 55
Integrated Intelligent Systems................................................................................................. 55
Centralized and Distributed Intelligence................................................................................. 56
The Global Brain Project..................................................................................................................................................... 56
Cybernetic Hive Minds....................................................................................................................................................... 56
Human Networks................................................................................................................................................................. 56
Super-Intelligence................................................................................................................................................................ 57
Cognitive Entities, Networks, and Society of Minds................................................................................................ 57
Harvesting Human Minds and Other Wet Nets........................................................................................................ 58
Think Tanks (Brainstorming)........................................................................................................................................ 58
Organizational Behaviors.............................................................................................................................................. 60
Network Structures........................................................................................................................................................ 60
Hierarchies and Classism.................................................................................................................................................... 60
Structure, Importance, Relevance, and Meaning............................................................................................................ 61
Defining Human Cognition and the Sense of Self..................................................................... 61
Computational Equivalence and the Conscious Universe....................................................... 62
Chapter 5 NeuralProgramming...........................................................................................63
AutoCorrelograms.................................................................................................................... 64
Mapping.................................................................................................................................... 64
Self-organizing unsupervised learning / reinforcement learning / neurodynamic programming............................. 65
Classification and Brain Printing Identification.............................................................................................................. 65
Port Scanning.................................................................................................................................................................. 66
Brute force hacking........................................................................................................................................................ 67
Compression................................................................................................................................................................... 67
Cataloguing............................................................................................................................... 69
Personality Segmentation................................................................................................................................................... 69
Loyalty Affinities and Belief System Classification.................................................................................................. 69
Personality Simulations................................................................................................................................................. 69
Creating Cogs in the Machine...................................................................................................................................... 69
Data-mining Anomalies...................................................................................................................................................... 70
Counter Terrorism.......................................................................................................................................................... 70
Counter Intelligence....................................................................................................................................................... 70
Censorship and Information Flow Controls............................................................................................................... 70
Cognitive Configurations.......................................................................................................... 71
Virtual Neurons......................................................................................................................... 71
Transformations between Machine and Human Knowledge Storage...................................... 72
Integrating the Internet with Wet and Dry Neural Networks.................................................. 72
Adding Non-biological Sensors to Human Perception............................................................. 72
Chapter 6 Applications..........................................................................................................73
Self Directed Evolution............................................................................................................. 73
Autonomous Modification, “Free Will”, Deterministic Reprogramming, and ‘Bit Twiddling’................................ 73
Diagnostics and Monitoring...................................................................................................... 74
Efficient Communications......................................................................................................... 75
Universal Translators.......................................................................................................................................................... 75
Telepathy and Psychophony............................................................................................................................................ 75
Distributed Knowledge Management...................................................................................... 75
Self Organizing Adaptable Reconfiguration and Swarm Theory................................................................................. 75
Dream Harvesting – Utilizing Down Cycles.................................................................................................................... 76
Beaming and ‘Transporter’ Technology.......................................................................................................................... 76
Enhanced Human Performance................................................................................................ 77
Over-clocking the common fundamental Human Algorithms....................................................................................... 77
Forced Sleep and Adrenaline Boosts............................................................................................................................... 77
Memory Enhancement........................................................................................................................................................ 77
Intelligence and knowledge enhancements..................................................................................................................... 78
Extra Senses and Psi-borgs(Cybernetic biological computer entities)........................................................................ 80
Mood Management............................................................................................................................................................. 81
Enhancing Biological Sensors........................................................................................................................................... 81
Silicon Immortality............................................................................................................................................................... 81
Virtual Heaven and Hell................................................................................................................................................. 81
Crime and Punishment.............................................................................................................. 82
Automating Justice and Preventing Crimes.................................................................................................................... 82
Correctional Alternatives................................................................................................................................................... 83
“Behavioral Training”, Brainwashing, psychic driving and programming............................................................ 83
Secret Prisons................................................................................................................................................................. 83
Big Brother, Aliens, and the Voice of God................................................................................................................. 85
Cultural Engineering and Cultural Normalization.................................................................... 85
Accelerated Education........................................................................................................................................................ 87
Directed Evolution............................................................................................................................................................... 88
Productivity of Society....................................................................................................................................................... 89
Entertainment Applications...................................................................................................... 89
Ego trip.................................................................................................................................................................................. 89
Memory implants................................................................................................................................................................. 90
Virtual vacations.................................................................................................................................................................. 90
Shared interactive movie and music creation.................................................................................................................. 90
Virtual sex.............................................................................................................................................................................. 90
Electromagnetic Psychoactive Drugs and Altered Conscious States......................................................................... 91
War Gaming.......................................................................................................................................................................... 91
Sensing of desires and fulfilling them.............................................................................................................................. 92
Medical Applications................................................................................................................ 92
A New Medical Instrument that Spin Tags and Monitors Free Radicals................................................................... 92
Accelerated Healing............................................................................................................................................................ 92
Anit-Depression medication, Cure for Post Traumatic Stress Syndrome................................................................... 92
Cure for Loneliness and Broken Hearts........................................................................................................................... 92
Behavioral Modification to Quit Smoking, Lose Weight, Exercise Motivation......................................................... 93
Analgesics and Sensitization............................................................................................................................................. 93
Monitoring of seizures, heart activity.............................................................................................................................. 93
Diagnostics through Pain Sharing.................................................................................................................................... 93
Empathy Creation................................................................................................................................................................ 93
Universal Translator...................................................................................................................................................... 94
Replace Ritalin and many psychoactive pharmaceuticals............................................................................................. 95
Drug Rehabilitation............................................................................................................................................................. 95
Sobriety signal..................................................................................................................................................................... 95
Replace dying brain cells with virtual ones..................................................................................................................... 95
Cures for Blindness and Deafness.................................................................................................................................... 95
Muscular sclerosis (MS), Seizures, Bi-polar, Schizophrenia Cures............................................................................. 96
Bionics and spinal injuries................................................................................................................................................. 96
Biological Cloning and Mental Cloning........................................................................................................................... 97
Immortality............................................................................................................................................................................ 97
Military applications.................................................................................................................. 97
Spying/ESPionage/Remote Viewing................................................................................................................................. 97
Control of enemy................................................................................................................................................................. 98
Control of politics................................................................................................................................................................ 98
Control of civilians opinions.............................................................................................................................................. 99
Remote control soldiers...................................................................................................................................................... 99
Reading of vitals................................................................................................................................................................ 100
Enhanced human performance........................................................................................................................................ 100
Faster reaction times......................................................................................................................................................... 100
Psi-borg extra senses........................................................................................................................................................ 100
EEG control of robotic machines..................................................................................................................................... 101
Current Uses........................................................................................................................... 101
Silencing Dissenters and Government Whistle Blowers............................................................................................. 101
Brain print assassinations........................................................................................................................................... 101
Remote Lobotomies and Remotely Induced Schizophrenia.................................................................................. 102
Finding the outlying thinkers..................................................................................................................................... 105
Controlling Mass Media................................................................................................................................................... 105
Controlling Religions........................................................................................................................................................ 105
Acquiring Black Mail on Politicians............................................................................................................................... 105
Assassinating with plausible denial targets in the US and abroad........................................................................... 105
Controlling World Politics................................................................................................................................................ 106
Controlling Financial Markets......................................................................................................................................... 106
Collapsing Economies like the Former Soviet Union or the United States.......................................................... 106
Cheating at Gambling Games...................................................................................................................................... 106
Brain bugs - Spying, Espionage, and Sabotage............................................................................................................ 106
Human Robots and Psi-Borg Slaves............................................................................................................................... 106
Creating Alter Personalities – Dr. Jekyll and Mr. Hyde.......................................................................................... 106
Passing/failing Polygraphs and Brain Printing fMRI Truth Detectors................................................................ 107
Stress Conditioning..................................................................................................................................................... 107
Remote Interrogations – No-Touch Torture and Mind Probing................................................................................ 108
Dream Programming and Memory Probing.................................................................................................................... 109
Evolving Mind Virus Weapon Effectiveness................................................................................................................ 109
Directed Evolution............................................................................................................................................................. 110
Eugenics, Genocide, and the Silent Holocaust........................................................................................................ 110
Menticide and Silent Warfare..................................................................................................................................... 111
Intelligent Design......................................................................................................................................................... 111
Human animals and machines with souls................................................................................................................. 112
Chapter 7 Hacking Computer and BiologicalSystems..................................................... 113
History of Mind Hacking........................................................................................................ 113
Mind Hacking and The Enemy Within................................................................................... 114
Cognitive and Perception Warfare......................................................................................... 115
Cognitive Modeling and Reverse Engineering the Brain..................................................... 115
Mind Viruses........................................................................................................................... 120
Genetic Algorithms and Directed Evolution.................................................................................................................. 121
Human Experimentation, Brain Knapping, and Food for Thought....................................................................... 121
Malicious Payloads........................................................................................................................................................... 122
Replacing Personalities............................................................................................................................................... 123
Protected Memory, Partitioning, and Cognitive Containment......................................................... 123
Infinite Looping................................................................................................................................................................. 124
Demons............................................................................................................................................................................... 124
Crashing the Operating System Through Error Amplification.............................................. 124
Zombification and Remote Control Attacks........................................................................... 125
Scalable Enslavement and Zombification Strategies.................................................................................................... 126
Spiders................................................................................................................................................................................. 126
Bots...................................................................................................................................................................................... 127
Intelligent Agents.............................................................................................................................................................. 127
Brute Force Hacking – Master/Slave Roles.......................................................................... 127
Queuing Executables - Subliminal and Hypnosis................................................................... 128
Logic and Memory Buffer Overflow....................................................................................... 128
Denial of Service Attacks....................................................................................................... 129
Trojan Horses......................................................................................................................... 130
Triggers and Triggered Payloads...................................................................................................................................................... 131
Personality Overlays.................................................................................................................................................... 131
Psycho-bombs.............................................................................................................................................................. 132
Programmed Assassins............................................................................................................................................... 132
Terrorists....................................................................................................................................................................... 134
Pleasure/Pain principles.......................................................................................................... 134
Spoofing................................................................................................................................... 136
Social Engineering, Identity Theft, and Doppelgangers............................................................................................. 137
Authority, Privilege, Access, and Role Level Hacking................................................................................................ 138
White Noise Generators, Jammers, and scramblers............................................................. 138
Phreaking and mobile phone cloning...................................................................................... 139
Phishing and Brain Scanning – Finding hosts......................................................................... 139
Co-Processor Usurpation....................................................................................................... 139
Inserting Secret Hooks in Device Drivers............................................................................ 140
Worms , Memetic Viruses, and Psychotronic Viruses........................................................... 140
Ghosting the Sensor Systems................................................................................................. 140
Cloaking and Stealth Technologies........................................................................................ 140
Hacking the Variables of Belief Systems............................................................................... 141
Dictionary Attack.............................................................................................................................................................. 141
Purging and Altering Memory......................................................................................................................................... 141
Electronic Dissolution of Memory --- E.D.O.M....................................................................................................... 142
Thought filtering and suppression................................................................................................................................. 142
Hacking Decision Trees.................................................................................................................................................... 144
Psychographic Mapping............................................................................................................................................. 144
Game Theory................................................................................................................................................................. 144
John Nash Equilibriums............................................................................................................................................... 145
Reflashing the BIOS, Infecting Boot Sectors, Substitution of Operating System Files........ 146
Hacking Input Output Ports – The 5 Senses and Motor Cortex.......................................... 148
Spyware................................................................................................................................... 152
Stealing Passwords.................................................................................................................. 154
Key Stroke Loggers........................................................................................................................................................... 154
Soul Catchers and Recording the Entire Life of Every Human.............................................................................. 154
Memory Probing..................................................................................................................... 156
Bi-directional Associative Memory (BAM) Probing................................................................................................... 156
Self Destruct Algorithms........................................................................................................ 157
Suicide bombers / Psycho-bombs................................................................................................................................... 157
Suicide through torture and depression signals........................................................................................................... 158
Amplification of destructive behaviors and addiction pathways.............................................................................. 158
Shutting down and Stressing the Subsystems........................................................................ 158
Heart Failure, blood clots, and Strokes.......................................................................................................................... 159
Secondary and tertiary diseases caused by prolonged stress.............................................................................. 159
Spooking to death............................................................................................................................................................. 160
Context Switching................................................................................................................... 162
Emotional Control.............................................................................................................................................................. 162
Handles, Handlers, and Proxies............................................................................................. 162
Invoking Defensive Algorithms then Redirecting a Counter Attack.................................... 162
Terrorists and Proxy Agent Provocateurs..................................................................................................................... 162
Psycho-Bombs................................................................................................................................................................... 162
Trip Wires and Detection Algorithms.................................................................................... 162
Van Eck Hacking and TEMPEST standards.......................................................................... 163
Network Analyzers and Packet Sniffers................................................................................. 164
Echelon for the mind......................................................................................................................................................... 164
Wireless hacking – electronic warfare, signal and communication intelligence.................... 164
AntiVirus Software.................................................................................................................. 165
Encryption and Protocols........................................................................................................ 165
Firewalls.................................................................................................................................. 165
Thought Stream Filtering.................................................................................................................................................. 167
Trace route and multi levels of indirection............................................................................ 168
Disrupting Human Networks.................................................................................................. 168
Plants and Agent Provocateurs...................................................................................................................................... 169
Hacking the Hackers.............................................................................................................. 170
Scarecrow Effect and Decoys.......................................................................................................................................... 170
Usurping the Eye Tracking Virtual Interface Controls and Audio Commands........................................................ 171
Chapter 8 Resistance is Futile - Counter ResistanceTechniques.................................... 173
Alice in Wonderland................................................................................................................ 174
Wizard of Oz – ‘The Kubark Manual’.................................................................................... 175
Angels and Demons Script............................................................................................... 175
Sleeping Beauty – The Script for sleeper agents and disposable CIA assets....................... 181
Snow White and the Seven Dwarfs................................................................................................................................ 182
The A, B, C’s of Enhanced Interrogation and Torture.......................................................... 182
False Confessions for Staged Courts and Media Events............................................................................................ 190
Brainwashing...................................................................................................................................................................... 191
Neural Linguistic Programming and Psychic Driving.................................................................................................. 192
Plausible Deniability................................................................................................................ 192
GasLighting........................................................................................................................................................................ 193
Framing (Setting up a target to be disposed of)........................................................................................................... 193
Scripts and Dirty Tricks.................................................................................................................................................... 194
The Art of War and the Art of Deception..................................................................................................................... 196
Tricks, Illusions, and the Psychology of Magic........................................................................................................... 197
Chapter 9 Designing Gods - Active DoD, NSA, and CIASystems................................... 198
Global Communication Warfare – code name “Gabriel”................................................. 199
Biometric Recognition And Identification Network – B.R.A.I.N................................................... 200
Remote Hypnotic Intra-cerebralControl ---- R.H.I.C.................................................................. 202
Mentally Integrated Neuron Duplicator ---- M.I.N.D.................................................................... 202
Artificial Linguistic Internet Computer Entity ---- A.L.I.C.E.......................................................... 203
The Ghost in the Machine and Demons of Destruction.............................................................................................. 206
Thought And Memory Interface ---- T.A.M.I.............................................................................. 207
Common Human Routines Inference Software Technology – C.H.R.I.S.T................................... 208
Silent Assassination Through Adapting Networks ---- S.A.T.A.N.................................................. 208
Death Doctors and Angels of Death.............................................................................................................................. 209
Voodoo Doll: No-touch torture subprograms............................................................................................................... 210
Mind Games - Psychic Warfare Training................................................................................ 223
Project “Noah’s Ark”......................................................................................................... 229
Chapter 10 The Politics and Ethics of Controlling HumanBeings................................... 230
Legal Issues............................................................................................................................ 232
The Costs and Benefits.................................................................................................................................................... 233
Appendix of Formulas and Calculations.................................................................................. 234
Other Methods of Spying and Sabotage.................................................................................... 235
Index........................................................................................................................................... 237
CD packet containing viral code, port scanners, Back Orifice, and many other hacking utilities and codesamples........................................................................................................................................247
Chapter 11 About theauthor................................................................................................248
Chapter 12 Review Quotes:...................................................................................................249
August 20th, 2009 at 11:31 am
Why were these people murdered? The article does not mention the relationship between their murder and why this should be news!
Reply
josh Reply:
August 20th, 2009 at 11:46 am
Why is WeAreChange attacking the black man who carried his assault rifle?
http://www.wearechange.org/200.....t-was.html
Calling it a publicity stunt just because the media flips out everytime they see an armed slave… and because they called the police ahead of time to make sure they were going to be there to protect the bill of rights … and not take a hot dump all over it no matter what Secret Service told them…
i like WAC but no reason to attack these guys.
Reply
shut up and fight Reply:
August 20th, 2009 at 1:16 pm
because they think he is a provocateur. wich he might be.
Reply
Private Pile Reply:
August 20th, 2009 at 1:56 pm
My theory is they are killing these guys because they know some very diabolical information and they want to keep them quiet after there work was finished. So then the “ELITE” can keep all the new technology from us slaves and keep it for themselves. As we all know dead men tell no stories.
Reply
sundance Reply:
August 20th, 2009 at 2:27 pm
They are dead because they helped to develope bio weapons, i.e., vaccines! This swine flu
scheme is going to depolulate by way of these vaccines. The first jab will shut down your
immune system, (white blood cells) and then 2-3 weeks later they plan on giving a second
jab that has LIVE viruses. You won’t feel sick and probably won’t have any symptoms
because your immune system will not be working properly and won’t know that the body is
being over run by viruses. The third jab will kick start the immune system and by that time
the viruses will have infested the body and the immune system will not be able to produce
enough white cells to counteract the viruses. I have done alot of research on vaccines,
as I have a friend whose son was paralyzed by pertusis (whooping cough) vaccine in 1987.
I have never been to a doctor in my life and neither has my son and we are very healthy!
My friend has a son that is mentally & physically disabled now. She & I have thrown
ourselves into educating people about ALL vaccines for children & pets.
Please, do not get this swine flu vaccine! We all need to be very diligent and prepared to
refuse this! These scientists are dead because of what they knew and once they developed
the formula for certain things, they automatically became a liability.
Highlanderess Reply:
August 20th, 2009 at 7:11 pm
Exactly Private Pile. My thoughts exactly. The elites are killing off those who know the truth.
FreedomOfSpeech Reply:
August 20th, 2009 at 7:51 pm
there’s something ELSE we should audit, and NO ONE is talking about it!!!
http://www.flickr.com/photos/4…..3840664503
Check it out!
diedaily Reply:
August 22nd, 2009 at 12:32 am
Sundance, almost correct. The third shot causes the cytokyne storm (or large, strong, overwhelming immune response). This is what kills you; the viruses don’t get the chance to.
htwosofour Reply:
August 20th, 2009 at 4:18 pm
this is a great amount of research but remember what happened to the curious cat
Reply
stefan Reply:
August 22nd, 2009 at 1:49 pm
Investigative journalist Jane Burgermeister is preparing criminal charges against Dr Margaret Chan, the Director General of the WHO, for planning and executing genocide.
http://www.theflucase.com
Grad Student Reply:
August 20th, 2009 at 1:20 pm
There was a young budding scientist at the University of Alabama Birmingham who, although was on the precipice of discovery committed suicide recently. A great man, had a wonderful fiance, a solid career outlook…dead. Since the day it happened it seemed there was more to Charlie Bosworth’s death than met the eye. Officially a suicide.
Reply
stone Reply:
August 20th, 2009 at 3:37 pm
if this is the same Charles Bosworth then i think he should be added to Steves list , i just did a search and i found a couple of papers he had worked on (?)
http://en.scientificcommons.org/charles_a_bosworth
any idea what this breakthrough was in ?? very sad for his fiancee and family .
rip
Reply
Shasta Reply:
August 20th, 2009 at 4:28 pm
The mycoplasm! that’s why they kilt him! He was working on the mycoplasm. It’s what really causes the aids – the spooks used it to make the aids virus is what I herd. Plus I heerd its been found in the chemtrail material.
Dale Reply:
August 21st, 2009 at 2:33 pm
Mycoplasma pneumonia is the CAUSE of Rheumatoid Arthritis (RH), Lupus and other rheumatic diseases. Mycoplasma is the smallest living organism known and in the case of Arthritic patients, mycoplasma infects the joint fluid of its victims causing pain, swelling and mental depression. Like Lymes disease, which is a rheumatic disease, Arthritis can be CURED with low doses of the antibiotic Minocin / Tetracycline over long periods (2 years). The body does not build an immunity to this family of antibiotics unlike other antibiotics and so this is why the cure works. There are approximately 168 strains of mycoplasma phenumonia that have been identified using DNA techniques. It is important for everyone reading this to understand that arthritis is A BACTERIAL INFECTION caused by mycoplasma pneumonia in the joint fluid. Dr. Thomas McPherson Brown (1906-1989) was a renowned rheumatologist who, over a medical career spanning 50 years, pioneered antibiotic treatments for rheumatoid arthritis, scleroderma, lupus and other collagen diseases. He used them to treat over ten thousand patients, often inducing remission in their disease. Currently, there are only four facilities in the world that successfully treat these diseases with 87% success. Google ‘Arthritis Center of Riverside’. Why don’t mainstream doctors and hospitals treat this disease with success? The answer is the pharmaceutical industry & FDA. Billions of dollars ($25 Billion) in profits per year ride on band-aid approach whereby a ‘cure’ is not in the cards; rather, pills and expensive treatments keep the investors and drug makers ‘swimming in C notes’. This is how it is today. Profit vs. Cure. Cure loses until now. Now you know are more knowledgeable than previous. Infowars is a great site.
diedaily Reply:
August 22nd, 2009 at 12:41 am
The link between mycoplasma and rheumatism is possible, but not very well supported. It is however, 100X more well supported than the non-existent link between HIV and AIDS. AIDS is definitely NOT mycoplasm related, however!
Kevin Reply:
August 20th, 2009 at 11:49 am
For maximum death results get rid of the people that can figure out where Swine Flue came from or how to cure it. Or they were involved in its making.
Reply
Bigger Bill Reply:
August 20th, 2009 at 11:57 am
Can we get a little more detail?
I have no idea what the relations are here…
I could easily say 340 8th grade teachers died from 2004 till 2009, I hate statistics…
Reply
Mr. Mister Sr. Reply:
August 20th, 2009 at 12:08 pm
The common thread here with these dead/murdered scientists is that everyone of them was an expert in being able to determine the origin of natural and manmade viruses. If a virus is released into the global population by a terrorist government like the United States of Amerika then these scientists would be the only people capable of finding the truth behind any pandemic whether natural or manmade!!!!!!! Their deaths are a precursor to what’s coming soon. BELIEVE ME!!!!!!
Reply
roaddog6 Reply:
August 20th, 2009 at 12:27 pm
mr.—the same thing happened when clinton was pres. The top ten bio scientists were either found dead or not found at all. All within something like 2 weeks.
Jack Reply:
August 20th, 2009 at 12:48 pm
Road Dogg, So what happened when they died during the Clinton administration? Don’t remember any huge pandemic , mass deaths from vaccines or any serious viruses?
Please let me know what happen since its been over ten years since the Clinton administration…
shut up and fight Reply:
August 20th, 2009 at 1:15 pm
im playing prototype and prototype wears well its name. a prototype of whats comming yes. probably far worst.
you know.well….reality surpasses fiction.
zombies? nah. DRONES
roaddog6 Reply:
August 20th, 2009 at 1:18 pm
jack—-There was no pandemic at the time, but it was just a few years before the chemtrails started to appear. coincidence? I don’t have no proof either way. But it was good timing. Maybe it was for something else, like an anthrax attack? All I know for a fact is they were dead along with a lot of other herd members that were acquainted with the clintons.
JANET JUBILEE Reply:
August 20th, 2009 at 10:33 pm
SAVE THIS INFO
-THE ONLY CURE IS TO ELIMINATE POISON FROM YOUR BODY WITH THIS-
1. JUICE/TEA FAST FOR THREE WEEKS-PULLS TOXINS OUT OF THE BLOOD/BODY-KOYFMAN.COM FOR RECIPE
2. DEEP TISSUE MASSAGE-ELIMINATES TOXINS FROM BONE TISSUE ECT
3. FOOT IONIZER -ELIMINATES TOXINS FROM KIDNEY/LIVER ECT
4. SAUNA-ELIMINATES TOXINS THROUGH THE SKIN
5. EAT ONLY ORGANIC WHEN POSSIBLE, USE ONLY NATURAL HOUSE CLEANERS, CHAMPOOS AND DON’T POISON YOUR YARD.
6. NO MEDICATIONS UNLESS YOU ARE GOING TO DIE WITHOUT THEM, TRY ALTERNATIVE FIRST.
7. ALWAYS DETOX AFTER SURGERY OR EVEN DENTAL PROCEDURE.
8. COLONICS ELIMINATE TOXINS FROM THE COLON.
DO THIS, AND ALL SHOTS WILL BE GONE! I KNOW FROM MY OWN EXPERIENCE. THIS INFO IS MORE VALUEBLE THAN ANY SCIENTIST INFO BECAUSE IT WORKS AND POISONS ARE OUT OF THE BODY.
Captain Trips Reply:
August 23rd, 2009 at 1:21 pm
Chemtrails were around before the Clinton administration. They’ve been around since the early to mid eighties.
Tailgunner Reply:
August 20th, 2009 at 12:28 pm
It scares me that you can’t figure this out.
It’s not rocket science… well, almost.
Reply
Maybe more 8th grade teachers died, Reply:
August 20th, 2009 at 1:13 pm
But the number of world class level scientists is far fewer than 8th grade teachers. This is clearly out of proportion. Some are reasonable, even to be expected, but others are questionable & still others are clearly murdered. Consider the # of MD’s who get murdered, or Pluimbers or any profession, then look at the %age of these people who have been clearly killed.
Reply
Miguel Grande Reply:
August 20th, 2009 at 2:01 pm
A classmate of mine, #38B: Dr. David R. Knibbs, age 49. Died: August 5, 2002. Respected pathobiologist specializing in electron microscopy. He is the type of doctor that would expose the swine flu fraud easily. He was a marathon runner and his favorite pastime was to scuba dive to deep water wrecks and photograph them. He was a rock star in his field. He died on a simple jog around his neighborhood. His obituary has been scrubbed from the archives of his hospital’s newsletter. RIP, David, You could have changed the world.
Read what I wrote, Douchebag Reply:
August 21st, 2009 at 10:37 am
The QUALIFIER was World Class scientists. The dead ones that raise questions are not your averag science type, but world class Bio type, read man, read, & learn to comprehend the meanings of what people are saying. Else you prove yourself a dunce.
Olive Farmer Reply:
August 20th, 2009 at 12:47 pm
Correct,
Though many of these are possibly natural, there is almost certainly the smell of fish to some of these inexplicable deaths.
If the Swine flu was developed so that it mutates into a more deadly version…..
If the vaccines are poison……
Be ready for the end times.
Did you know the religious nuts, mind controlled as they are…..
Haven’t got a monopoly on phrophecy…
http://olivefarmercrete.blogspot.com
Reply
diedaily Reply:
August 22nd, 2009 at 12:58 am
Nor have they got a monopoly on lengthy writings with few or no specifics and facts. I visited your site. It’s not that I disagree with what the site endorses, I do agree, but read dozens and dozens of pages there and got a few sentences worth of facts and specifics.
Reply
Tasercrimes Reply:
August 20th, 2009 at 11:54 am
Reasons unknown; However, Steve theorizes it has something to do with the Swine flu.
Reply
sickntired Reply:
August 20th, 2009 at 12:11 pm
They are removing anyone who could have a link to or the ability to help stop a major pandemic.
Reply
shut up and fight Reply:
August 20th, 2009 at 1:13 pm
then i guess im fucked.
Reply
diedaily Reply:
August 22nd, 2009 at 1:02 am
I agree with the point about suspicious nature of many of these deaths, and Quayle rocks, but seriously folks, these dead are maybe a hundredth of a percent of the brain trust, here. Let’s not get carried away! There are still tens of thousands of folks with ample skill to fight on either side of the eugenics war. Biochemists have had extremely high rates of divorce, suicide, and premature death since the 60’s. Maybe all those organic solvents go straight to their heads…
Reply
ScrewyL Reply:
August 20th, 2009 at 12:54 pm
Truthseeker is a debunker. His question is not made in earnest; infact, it’s obtuse.
Reply
slavetothewage Reply:
August 22nd, 2009 at 7:46 pm
Good to see you back!
Reply
shut up and fight Reply:
August 20th, 2009 at 1:04 pm
i have been going throught prototype game a second time just to put my attention at the web of intrique. and they claim the virus is nothing compared to a flu althought it shows to have the same symptoms and as the virus as a direct link to alien ebola virus and the 1916 flu outbreak.
wich make it appear it like a flu but it would be a powerful mutagen literally transforming the host into a mutant monster. —-> see Resident Evil. (for those who don’t know about it. ebola, sars and aids all come from the same chain of protein. and THUS IT IS NOT A FRIGIN VIRUS.
ITS A GOD DAMN MUTAGEN.——-2 thing mutagen can do.
1st: just cause massive internal bleeding resulting in the death of the host.
or
2nd: mutate dna and cell to reprogram the brain and modify skin cells to transform the hole organism into a human monster hybrid moving body.—— by definition a zombie.
zombies are no fucking fiction. WAKE THE FUCK UP!!!
Reply
shut up and fight Reply:
August 20th, 2009 at 1:07 pm
we don’t need vacines!!! we need anti mutagen bacteria. ASAP.
a bacteria that block your host cells dna from being altered. thats what we need.
anti virus works agaisnt virus not against mutagens.
Reply
cylon Reply:
August 20th, 2009 at 9:25 pm
Are you for real?. You need to wake up, your clearly dellusional, where’s your proof?
Reply
diedaily Reply:
August 22nd, 2009 at 1:06 am
shut up and fight, don’t get me wrong, we’re on the same side…but it’s really hard to take when you demonstrate such a total lack of understanding of the basic science here, and then make such strong statements. “ebola, sars and aids all come from the same chain of protein”…are you f’n kidding me? Back to highschool biology for you…or else stick to what you know…many, many of your other posts are very cool. Hate to see you embarrass yourself on the basic science…
Reply
Kystien Reply:
August 20th, 2009 at 1:14 pm
Its obviouse. Look at their fields of work.
All Biologists. working pathogens or quarantine work.
scary crap considering how many and in such short time.
Reply
shut up and fight Reply:
August 20th, 2009 at 1:22 pm
they got murdered because they were paid to develop a monsterous mutagen virus. and those scientist had a heart and just could not keep their mouth shut. this show us how bad the virus is going to be. its going to be a virus far worst then flu. just having same basic symptoms, simply because it use the same chain of protein. but the out come is a much more powerful and imprevisible virus.”im not paid to have feelings” “if any of those virus come out of here, they could literraly wipe out humanity.in matter of days”.
but i suppose that because its a game or and a movie. it means its crap and its not real…
remember the illuminati loves to show us what they have in store for us. and the funniset part is nobody beleive it. simply cause culture told the sheeps to not beleive what you see in games and movies…. well. know your enemy. and you will understand what im talking about.
Reply
Jimbo Reply:
August 20th, 2009 at 1:24 pm
Apparently microbiology is a dangerous profession.
Reply
FightOrFight!!! Reply:
August 20th, 2009 at 2:44 pm
Let’s see: The point might be that the government use you & then kills you so you won’t disclose their secrets. Just my opinion.
Reply
Dirty Bandito Reply:
August 20th, 2009 at 3:19 pm
alot of these are ruled as murders. we all know what this news report is insinuating but is it a feasible conclusion to say the causality of these deaths is somehow linked? no of course not. however, if in some way the scientists deaths do share a motive do you think the link would be so obvious? No
Reply
A Patriot Reply:
August 20th, 2009 at 5:11 pm
Agreed!
We must stay vigilant on this story!
Reply
diedaily Reply:
August 22nd, 2009 at 1:10 am
Exactly! There is every possibility that SOME of these deaths are exactly what he alledges. So A Patriot is exactly right. There is not even a viable sliver of evidence suggesting the entirety of these deaths are related in any way. The soviet and middle eastern deaths are too obviously commonplace for these regions. So Dirtry Bandito is also exactly right.
Reply
m Reply:
August 20th, 2009 at 3:44 pm
The Illuminati want all us good guys dead so they can have their evil utopia.
I bet taters to carrots they are planning another Virginia Tech but at a town hall meeting. They hate liberty and are afraid they are going to get caught.
I’ve got news for them they are already caught and it says in the Bible “ALL will be revealed.” and we are getting closer to that time everyday.
Reply
M C - HAMer Reply:
August 20th, 2009 at 4:14 pm
Its news because they are on the verge of talking, I first heard of this on coast to coast a.m. with Art Bell go there to learn how some were found.One was said of a lady who was found with a dinner dress on hands tied behind her back & a plastic bag tied to her head in two feet of water…..And the police said it was an apparent suicide… Thats whats so important, dig and you will find bizzar murders of these people……!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!!
Reply
powerbar2009 Reply:
August 20th, 2009 at 5:17 pm
Hey Truthseeker.
Does the term “DUH” mean anything to you?? Or do we need to spell that out for you too??
Your name seems appropriate, because the way you are seeking you are not likely to find it.
Schooled in the US, I guess?
Reply
168th Reply:
August 22nd, 2009 at 9:47 am
Yea hes drinkin some of the flouride and merceruy too, and supports the people who give it to him.
STOCKHOLM SYNDROME!!!!
The little power they have gives them the illusion that they are not the tools being used as bad as the civilians