Jul 242012

From April:

This is not your run-of-the-mill crime of passion. It was a carefully planned, heavily funded and technically advanced attack. Who might be behind all this? The FBI,of course,which has a long history of setting up and staging similar attacks,then stopping them right before they happen.

But all these dramas were facilitated by the F.B.I., whose undercover agents and informers posed as terrorists offering a dummy missile, fake C-4 explosives, a disarmed suicide vest and rudimentary training. Suspects naïvely played their parts until they were arrested.

Full article

I begin where I normally end. With links to show how the government does in fact have their hands in everything that happens.

See four documented stories on these facts:

* NYT openly admits domestic terror plots masterminded by the FBI

* FBI ‘entrapment’ tactics

* FBI intercepts its own terrorist plot against US Capitol, Pentagon

* FBI nabs five mastermind geniuses after teaching them how to blow up a bridge in Cleveland

As you soak all this in,remember that the FBI had admitted to setting up terror plots,providing the weapons and gear,staging the location of the bombings,and even driving the vehicles to pull it off! This is not a conspiracy theory;it’s been admitted by the FBI right out in the open. Even the New York Times openly reports all this in stories like this one:

Inside the CO shooters apt was “device that emits a shock wave and water”.

Was Colorado Shooting Staged By The Government?

And the FBI is certainly not alone:

* DoD Contractors of Private Security Outside US


* DEPARTMENT OF JUSTICE Dosage-Based Probation

* UNMANNED AIRCRAFT SYSTEMS Drones in National Airspace and Role of DHS

Also See: Feds Admit NSA Spying Violated 4th Amendment while FAA Has Authorized 106 Government ‘Entities’ to Fly Domestic Drones

This was sent to me today from Pamm. It is from June 2008 by Julian Assange:

Editor’s note: Most of the tactics described below are now being implemented and used in the United States against the American people.

A MUST Read Manual: U.S. Counterinsurgency Manual Leaked, Calls for False Flag Operations, Suspension of Human Rights

Wikileaks has released a sensitive 219 page US military counterinsurgency manual. The manual, Foreign Internal Defense Tactics Techniques and Procedures for Special Forces (1994, 2004), may be critically described as “what we learned about running death squads and propping up corrupt government in Latin America and how to apply it to other places”. Its contents are both history defining for Latin America and, given the continued role of US Special Forces in the suppression of insurgencies, including in Iraq and Afghanistan, history making.

The leaked manual, which has been verified with military sources, is the official US Special Forces doctrine for Foreign Internal Defense or FID.

A good Offense…So here is a little thing to protect yourself and Side-Step Snoops with These 9 Counter-Surveillance Tools :

There are a whole lot more new ways to spy on a private citizen today than there were a decade ago. And, interestingly enough, there are new counter-surveillance measures that the market has provided as well.

No, I’m not recommending that you actually buy or implement all of the privacy-enhancing options below. But I think it’s more than worth your time to know a bit about them – if for no other reason than to better understand how unscrupulous persons and interests are determined to pry into the lives of others.

Nine Tools To Help You Lose a Surveillance Tail

1. Video Bug Detector

Compact surveillance technology makes it easy to hide a video camera in almost anything: a public bathroom ceiling fan, decoy Coke can, teddy bears, key chain, you name it. If it fits, it records.
Numerous wireless video bug detectors exist on the market. On the low end, a device alerts you that a hidden video camera is near you. On the high-end, equipment pinpoints the exact location of the offending video cameras.

2. Laser-Based Video Camera Finder

These are typically small handheld devices that fit in a pocket or purse. They send out a laser while you look through the special viewfinder. If the laser detects a hidden video camera lens (even less than 1 mm in size), the lens “glows” through the viewfinder, like cat eyes glowing in car headlights. These detectors are especially useful for locating cameras at a further distance or cameras that may not be transmitting wirelessly (not sending an RF signal), but instead are recording to an internal DVR.

3. GPS Monitor Detector

Some GPS monitors send a constant signal and are able to track you on a real-time basis. It has become an ideal weapon of choice for home-invasion specialists. They merely tag the victims’ car and learn their driving habits, as well as arrival and departure times from home and work. Others send periodic signals, perhaps every five or ten minutes, and track your relative position within a window of time and document a record of your whereabouts. Although some detectors are sensitive enough to find a GPS bug even when it’s turned off, it’s best to allow some time for the GPS detector to work by waiting for a potential signal to leave a hidden GPS tracker.

**Note: GPS Jammers or anti-GPS unit disrupt the GPS signal returning to the satellite. They are illegal in the U.S., even though you can find and probably buy one online from overseas.

4. Microphone, Wire, Audio Bug Detectors

Microphones can also be shrunk down to size and hidden in almost any place. Someone wanting to record your conversation could conceal a microphone inside a pen or necklace pendant, for instance.
The bug could be transmitting wirelessly in real time, or recording on an internal memory to be picked up and analyzed later. Audio bug surveillance detectors are an effective countermeasure, picking up RF signals coming out of wireless microphones. However, since RF signals are sent by many types of equipment such as cell phones, cordless phones, microwaves, and Bluetooth appliances, it’s common to get false positives. In any case, Technical Surveillance Counter Measures (TSCM) professionals say RF bugs need to have a direct line of sight to work properly. So sweeping a room or office with a audio bug surveillance detector does work.

5. White-Noise Emitter

If detection isn’t enough, you may prefer to “ruin” audio recordings by transmitting white noise and ambient sounds that interfere with eavesdroppers and don’t allow them to accurately capture what is being said. This counter-surveillance tool is also helpful against laser eavesdroppers, which beam a laser at a window in the room you are in, and can listen to your conversation by measuring the vibrations of the glass. This may sound novel for now, but we’ve seen many examples of once-innovative technology becoming totally commonplace. Creating white noise can defeat this surveillance.

6. Audio Jammers

According to Brickhouse Security, “Audio jammers generate a random masking sound that desensitizes microphones in the area, rendering them completely unable to record. Audio jammers are effective against any wiretapping device with a microphone as a major component, including tape recorders, RF transmitters, hardwired microphones, and shotgun microphones.”

7. Compromised Cell-Phone Jammers

This surveillance technology is simply a microphone jammer tailor-made for the mic on your cell phone. Once activated, hackers have less control over your phone and can’t use it as a recording device.

8. Phone Wiretap Detector

The counter-surveillance technology available to you today is sophisticated. You can buy equipment that analyzes your analog phone lines and detects wiretaps in the phone, the phone jack, outside on the pole, and even in the transformer box!

9. Order a Professional Sweep

Finally, if you have greater needs or dealing with sensitive information, numerous contractors exist who will complete a professional sweep of your home or business.
You can find a local company online by typing in “Technical Surveillance Counter Measures,” “TSCM,” or “counter surveillance” and your city.

Along with these physical surveillance suggestions, remember to have your computer’s counter surveillance tools in good working order, too: firewalls, virus protection, encryption, strong passwords, VPN or proxy server, etc. Using some or all of these security measures will give you a higher level of privacy, anonymity, peace of mind, and freedom compared to the general population.

- source


  One Response to “{ ~ JP Here to Help YOU in Nine Ways } Terrorist Plots, Hatched by the F.B.I.”

  1. […] * JULY 2012 Terrorist Plots, Hatched by the F.B.I. […]

 Leave a Reply



You may use these HTML tags and attributes: <a href="" title=""> <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>