DARPA’s DARK HISTORY: NSA Internet as Enemy Weapons System on Targeted Civilians

The US Government is committing DEMOICDE on its people, crudely, arrogantly, robbing-barrons, murderously, lying, thieving–horrendously. The US Military as BETRAYED the very civilians and Constitution they’re suppose to protect. — Lissa

Story:

The largest domestic military exercises in US history happened in 2015. They were entitled: “Jade Helm 2015 – Mastering the Human Domain.” This title of the exercises should indicate to you where the US military is focusing its time and energy these days – on US citizens. It also clearly tells us what the intent of the US military is – to Master the Human Domain.

DARPA’s Dark History 

In 2001, under the Total Information Awareness Program, President Bush had secretly authorized the NSA’s domestic surveillance of Americans without court-approved warrants. This was also the year that the Bush administration drew up its Information Operations Roadmap. Describing the internet as a “vulnerable weapons system,” Donald Rumsfeld’s Information Operations roadmap advocated that Pentagon strategy “should be based on the premise that the Department of Defense will ‘fight the net’ as it would an enemy weapons system.” The US should seek “maximum control” of the “full spectrum of globally emerging communications systems, sensors, and weapons systems,” advocated the document.

As of 2006, the CIA’s SAIC (Science Applications International Corporation) had been awarded a multi-million dollar NSA contract to develop a big data-mining project called ExecuteLocus, despite the colossal $1 billion failure of its preceding contract, known as Trailblazer. Core components of Total Information Awareness were being quietly continued under new code names. The new surveillance program was then fully transitioned from DARPA’s jurisdiction to the NSA.

Thus, 100% illegal surveillance was, and now is, possible.

Every project of DARPA and In-Q-Tel have been weaponized before they are shared with the companies who then are the “front” for a DARPA sponsored company. DARPA and In-Q-Tel keep the encryption codes and build in backdoors so that they can always control the military weapons that have been released into the corporate world for public use. According to DARPA and In-Q-Tel, innovation and technological advances must first be a weapon that can be controlled by its makers – the military.

Patrick Oneal.png
Richard ‘Dick’ Patrick O’Neill, founding president of the Pentagon’s Highlands Forum

The Highlands Forum (controls DARPA-In-Q-Tel) directed the creation of weapons of every sort that have been released into the corporate world and now control your laptop, phone, computer, and every other device with a “bugged” microprocessor inside. Intel microprocessors are found in most of our “private” digital devices and are, in fact, collecting “intelligence” for the Department of Defense, CIA, and NSA.

DARPA/In-Q-Tel and the Highlands Forum drive the process of continuous war, from creating the devices that control all nuclear weapons to incubating the technologies that created the Internet, Intel micro-processers, Cisco routers, Google search engines, Facebook-like social networks, the Internet of Things, cell phones, Microsoft software, MacAfee security software, and all other commercial and military warfare devices using their source code.

US Patent Office Works For DARPA/In-Q-Tel

Over five thousand patents have been legal confiscated (stolen) by the US patent office and give to DARPA/In-Q-Tel for further development and weaponization.  Once the patent is used to create a prototype, it has encrypted back-doors installed then it is given out as open source material for corporations and individuals to bring to the market place. If an inventor of a patent that is confiscated by the US Patent Office tries to continue work on the patent, that inventor may end up in jail. There are US patent laws permitting the government to steal and suppress any new technology (and imprison the inventor) which threatens “national security.”

Intel (In-Q-Tel) Inside

Inside every Intel microprocessor is a smaller processor that lets Intel – who works for the Department of Defense – control every aspect of your computer remotely no matter what encryption codes you use. All Intel microprocessor chips have a built-in backdoor that allows complete remote access to a PC through a second physical processor embedded within the main processor which has its own operating system embedded on the chip.

Big Brother is Watching You — For Real – American Intelligence Media
https://aim4truth.org/2017/12/19/big-brother-is-watching-you-for-real/

In-Q-Tel is Warfare Technology

In 1999, the CIA created its own venture capital investment firm, In-Q-Tel, to fund promising start-ups that might create technologies useful for intelligence agencies just as the Department of Defense had years earlier created DARPA. Both groups are controlled by the Highlands Forum (Group). The Highlands Forum provides the ideas and funding for the scientific weaponization of new inventions through cooperation between the military and corporate contractors. Its biggest successes recently have been led by the CIA’s In-Q-Tel in the development of high-tech network-based cyber-warfare.

In-Q-Tel contracts almost all its work through SAIC (Science Applications International Corporation) that changed its name to Leidos in 2013. Leidos is among the top 10 largest defense contractors in the U. S. and has a symbiotic relationship with the NSA and U. S. intelligence agencies.

The Highland Forum, DARPA, and In-Q-Tel are a secret multi-national high-tech think tanks for inventing and the control of innovations that can be turned into weapons. Military and information technology experts gather at the Highlands Forum meetings to consider the impacts of the globalization of IT on U. S. interests and warfare. The Forum developed the idea of “network-centric warfare” which is now a top concern of the military and the corporations that serve it.

DARPA’s Google

The US intelligence community funded, nurtured and incubated Google as a military weapon to control information. Seed-funded by the NSA (DARPA) and CIA (In-Q-Tel & SAIC), Google was one among a group of private sector start-ups co-opted by US intelligence to control information warfare.

In 1994,  two PhD students at Stanford University, Sergey Brin and Larry Page, made their breakthrough on the first automated web crawling and page ranking application built upon the source code given to them by DARPA/In-Q-Tel. That application remains the core component of what eventually became Google’s search service. Brin and Page had performed their work with funding from the Digital Library Initiative (DLI), a multi-agency program of the National Science Foundation (NSF), NASA and DARPA.

The NSA needed to control and monitor digital information, particularly the data flowing over the Internet. The government can “command” that any company must turn over that information, and it does so as part of the NSA’s Prism program, which Google had been participating in for years by the time it signed the cooperative agreement with the NSA.

Under Google’s terms of service, the company advises its users that it may share their “personal information” with outside organizations, including government agencies. Essentially, the United States intelligence community funded, nurtured and incubated Google as part of a drive to dominate the world through control of information.

No one checks whether DARPA inventions are moral, ethical, or humane.  All military inventions, even if they advertise them as helpful, are weaponized.

“…by state and non-state actors to achieve political, military, and economic goals through IO means, including computer network operations (CNO), computer network attack (CNA), computer network exploitation (CNE), computer network defense (CND), psychological operations (PSYOPS), perception management, media manipulation, propaganda, strategic influence, and public diplomacy, among others.”

It is official, every time you are on the internet, you are in a cyber war-zone as defining by the US Department of Defense. You are considered a “hostile actor” until neutralized. 

For more detail on the corruption of the US Patent Office, please see our blockbuster report here: https://is.gd/6Wvvu7

FACEBOOK UNMASKED: HOW THE WORLD’S MOST RELEVANT ENTREPRENEUR WAS SCREWED BY ZUCKERBERG