Taking Back Our Stolen History
HISTORY HEIST
Technology

Technology

There are so many advantages with improved technology in our daily life. With the help of mobile technology we are able to talk to our friends and relatives who are living far from us. With the help of internet, we are able to learn new things and online courses etc. With the help of aviation technology we are able to reach distant places within hours which took years of time to reach in olden days. We are using the all natural resources available for making our life better. With the help of social networking we are able to find our childhood friends, relatives etc. and important events in their life. With the help of information technology we are able to share information to any part of the world with in milliseconds. With progressive technology in the agriculture field, we are able to meet food requirements of people all over the world.

It is a different world than the one in which most of us were raised in, in terms of technology and convenience. Technology is here to stay to make our lives easier. We don’t have to remember phone numbers, look at a map to get where we are going or worry about complaints of “are we there yet?” when we can rely on our devices to inform and entertain us. We can now answer medical questions, get answers to questions like “What does this rash mean?” and make airline reservations, pay bills or compare prices from the convenience of our homes because, “there’s an app for that”.

DARPA  EMFs  Internet  Patents  Smart Technology  Technocracy

Chronological History of Technology and Related Events

KONY 2012: State Propaganda for a New Generation. An Orchestrated Campaign to Justify US Military Intervention in Africa

KONY 2012: State Propaganda for a New Generation. An Orchestrated Campaign to Justify US Military Intervention in Africa

The overnight viral sensation KONY 2012 brought worldwide awareness to the African war criminal Joseph Kony. Beneath this commendable cause, lies however an elaborate agenda that is presented in the video in a very manipulative way. We’ll look at the agenda behind KONY 2012 and how it uses reverse psychology to not only justify a military operation in Africa, but to actually have people demand it ...
The 'Stop Online Piracy Act' (SOPA) and Protect IP Act (PIPA) Bills to End Internet Freedom were Defeated

The ‘Stop Online Piracy Act’ (SOPA) and Protect IP Act (PIPA) Bills to End Internet Freedom were Defeated

The Stop Online Piracy Act (SOPA) (also known as the E-PARASITE Act, House Bill 3261, or H.R. 3261) was a bill that was being considered by the U.S. House of Representatives that was demanded by the wealthy corporations as well as the music and film industry. If passed, this bill would impose a number of controversial measures for dealing with online piracy including the distribution of copyrighted material via ...
Use of Laptop Computers connected to Wi-Fi Decreases Human Sperm Motility & Increases Sperm DNA Fragmentation

Use of Laptop Computers connected to Wi-Fi Decreases Human Sperm Motility & Increases Sperm DNA Fragmentation

Abstract OBJECTIVE: To evaluate the effects of laptop computers connected to local area networks wirelessly (Wi-Fi) on human spermatozoa. DESIGN: Prospective in vitro study. SETTING: Center for reproductive medicine. PATIENT(S): Semen samples from 29 healthy donors. INTERVENTION(S): Motile sperm were selected by swim up. Each sperm suspension was divided into two aliquots. One sperm aliquot (experimental) from each patient was exposed to an internet-connected laptop by Wi-Fi ...
US Funded 'Arab Spring' Protests Begin in Arab World

US Funded ‘Arab Spring’ Protests Begin in Arab World

As American bombs rain down upon Libya on the premise that Qaddafi was brutalizing indigenous pro-democratic demonstrators, the accusing fingers of Libya, Iran, China, Syria, Belarus, and a growing number of other nations are pointing at Washington for funding and plotting regime change against their respective governments. Either in an act of absolute hubris or to spin emerging evidence that the US indeed has been funding and ...
Hacked Hillary emails prove State Dept. Colluded with Obama and Clinton Foundation to give Globalists like IBM, Cisco, Microsoft and Goldman Sachs control of the Internet

Hacked Hillary emails prove State Dept. Colluded with Obama and Clinton Foundation to give Globalists like IBM, Cisco, Microsoft and Goldman Sachs control of the Internet

Christina Sass, Clinton Global Initiative (CGI) program director, sent a 62-page CGI leadership email and briefing to two U.S. State Department ambassadors. The primary recipient was Melanne S. Verveer, Hillary Clinton's first-ever Ambassador-at-large for Global Women's Issues. Verveer's husband, Philip L. Verveer, U.S. State Department Ambassador of Telecommunications also received the email. Also copied on the email were Rachel B. Vogelstein, Dept. of State director of ...
Leader Technologies v. Facebook Patent Infringement Trial Ends in a Split Verdict

Leader Technologies v. Facebook Patent Infringement Trial Ends in a Split Verdict

On March 17, 2010, Barack Obama nominated Leonard P. Stark to the Delaware District Court bench where the Leader v. Facebook case was proceeding. James Chandler evidently recommended Stark. Vice President Joe Biden sponsored Stark who proceeded to pave the way for State Department (Hillary Clinton) and Patent Office (David J. Kappos) use of Facebook. Leader principals were informed that Facebook claimed that earlier versions of ...
Institute for Health and the Environment 10-Year INTERPHONE Cell Phone Study Reports Increased Risk for Brain Cancer

Institute for Health and the Environment 10-Year INTERPHONE Cell Phone Study Reports Increased Risk for Brain Cancer

May 18, 2010: Today’s release of the final results of the ten-year long World Health Organization INTERPHONE Study confirms previous reports showing what many experts have warned – that regular use of a cell phone by adults can significantly increase the risk of glioma by 40% with 1640 hours or more of use (this is about one - half hour per day over ten years). Tumors ...
Wikileaks: INDECT to Build Automatic Dossiers on Individuals and Organizations from Web, Mobile, & Social Networking Data

Wikileaks: INDECT to Build Automatic Dossiers on Individuals and Organizations from Web, Mobile, & Social Networking Data

Wikileaks published a document by the INDECT , the Intelligence Information System Supporting Observation, Searching and Detection for Security of Citizens in Urban Environments of Europe. According to Wikileaks, INDECT's "Work package 4" is designed "to comb web blogs, chat sites, news reports, and social-networking sites in order to build up automatic dossiers on individuals, organizations and their relationships." Mind Your Tweets: The CIA Social Networking ...
The First Bitcoin Block Is Mined by 'Satashi Nakamoto' including within the code a Headline from 'The Times' that read, “Chancellor on Brink of Second Bailout for Banks”

The First Bitcoin Block Is Mined by ‘Satashi Nakamoto’ including within the code a Headline from ‘The Times’ that read, “Chancellor on Brink of Second Bailout for Banks”

In January 2009 the mysterious Satoshi Nakamoto set the Bitcoin revolution in motion by mining the fledgling currency’s first ever block of 50 coins. And Nakamoto presumably intentionally made sure that the moment was fixed in history by including within the code for the block a headline from the January 3, 2009, edition of British newspaper The Times. This read “Chancellor on brink of second bailout ...
The C.I.A. Internally Published NightSkies v1.2 User Guide for Exploiting Apple iPhone 3G v2.1 Granting Remote CIA Command and Control

The C.I.A. Internally Published NightSkies v1.2 User Guide for Exploiting Apple iPhone 3G v2.1 Granting Remote CIA Command and Control

Dec. 01, 2008, the C.I.A. internally published NightSkies v1.2 User Guide for exploiting Apple iPhone 3G v2.1. Whistleblower Source: WikiLeaks Vault 7 DARK MATTER. This program "Grants full remove command and control" ... "The tool operates in the background providing upload, download and execution capability ... will wait for user activity before beaconing. When user activity is detected, NS will attempt to beacon to a preconfigured ...