The Invisible Crime: Illegal Microchip Implants and Microwave Technology and Their Use Against Humanity


Book Description

What happens when a typical, upper-middle-class man from a respectable American family becomes the target of a covert organization bent on controlling both mind and body? When that secret organization is armed with high-tech weaponry which includes microchip technology aimed at controlling the minds and actions of its victims, terror reigns. In this chilling, true-life account, writer Michael Fitzhugh Bell is drugged, abducted, raped, and surgically implanted with microchips. Tracked and tortured, Michael's predators can even read his thoughts. In this battle of man versus technology turned against us, Michael must prove his case to the police before his attackers not only eliminate Michael's memory-but eliminate Michael. From the terror of being electronically stalked to the horror of surgical microchip implants and mind control, Michael Fitzhugh Bell's experiences as a victim will leave you shocked and amazed. His uphill battle with doctors, lawyers, police, Government, F.B.I., C.I.A., and a secret criminal underworld begins in Hollywood, races into and through the North Carolina backwoods, and then back to California. As you experience Michael's journey on each horrific page, you will see actual medical photos, X-rays, ultrasound and MRI images, all showing non-therapeutic tracking and torture devices. These instruments and tools are available to anyone on the Internet, including criminal organizations like those which targeted Michael Bell. His battle for survival continues today. Are you prepared?




Free My Son


Book Description

Obama's political of intelligence agencies for criminal activities against Republicans (I am a Republican). Obama also politicized the IRS with audits of many Republicans.




Satana Central


Book Description

This is a collection of my blog full of a bunch of random garbage posts of nonsense about random political and other stuff. Also a decent self-help book.




The Invisible Crime


Book Description

In this expose', author Michael Fitzhugh Bell reveals a new form of Covert Domestic Terrorism being perpetrated on United States citizens and of people around the world. This crime has infiltrated every aspect of society, secretly flourishing at the expense of the U.S. Taxpayer and is being scaled to the entire global population.




Ethics for the Information Age


Book Description

Widely praised for its balanced treatment of computer ethics, Ethics for the Information Age offers a modern presentation of the moral controversies surrounding information technology. Topics such as privacy and intellectual property are explored through multiple ethical theories, encouraging readers to think critically about these issues and to make their own ethical decisions.




Cyber Criminals on Trial


Book Description

As computer-related crime becomes more important globally, both scholarly and journalistic accounts tend to focus on the ways in which the crime has been committed and how it could have been prevented. Very little has been written about what follows: the capture, possible extradition, prosecution, sentencing and incarceration of the cyber criminal. Originally published in 2004, this book provides an international study of the manner in which cyber criminals are dealt with by the judicial process. It is a sequel to the groundbreaking Electronic Theft: Unlawful Acquisition in Cyberspace by Grabosky, Smith and Dempsey (Cambridge University Press, 2001). Some of the most prominent cases from around the world are presented in an attempt to discern trends in the handling of cases, and common factors and problems that emerge during the processes of prosecution, trial and sentencing.




The Soft Cage


Book Description

On a typical day, you might make a call on a cell phone, withdraw money at an ATM, visit the mall, and make a purchase with a credit card. Each of these routine transactions leaves a digital trail for government agencies and businesses to access. As cutting-edge historian and journalist Christian Parenti points out, these everyday intrusions on privacy, while harmless in themselves, are part of a relentless (and clandestine) expansion of routine surveillance in American life over the last two centuries-from controlling slaves in the old South to implementing early criminal justice and tracking immigrants. Parenti explores the role computers are playing in creating a whole new world of seemingly benign technologies-such as credit cards, website "cookies," and electronic toll collection-that have expanded this trend in the twenty-first century. The Soft Cage offers a compelling, vitally important history lesson for every American concerned about the expansion of surveillance into our public and private lives.




The Disappearing Spoon


Book Description

From New York Times bestselling author Sam Kean comes incredible stories of science, history, finance, mythology, the arts, medicine, and more, as told by the Periodic Table. Why did Gandhi hate iodine (I, 53)? How did radium (Ra, 88) nearly ruin Marie Curie's reputation? And why is gallium (Ga, 31) the go-to element for laboratory pranksters? The Periodic Table is a crowning scientific achievement, but it's also a treasure trove of adventure, betrayal, and obsession. These fascinating tales follow every element on the table as they play out their parts in human history, and in the lives of the (frequently) mad scientists who discovered them. The Disappearing Spoon masterfully fuses science with the classic lore of invention, investigation, and discovery -- from the Big Bang through the end of time. Though solid at room temperature, gallium is a moldable metal that melts at 84 degrees Fahrenheit. A classic science prank is to mold gallium spoons, serve them with tea, and watch guests recoil as their utensils disappear.




The Manchurian Candidate


Book Description

The classic thriller about a hostile foreign power infiltrating American politics: “Brilliant . . . wild and exhilarating.” —The New Yorker A war hero and the recipient of the Congressional Medal of Honor, Sgt. Raymond Shaw is keeping a deadly secret—even from himself. During his time as a prisoner of war in North Korea, he was brainwashed by his Communist captors and transformed into a deadly weapon—a sleeper assassin, programmed to kill without question or mercy at his captors’ signal. Now he’s been returned to the United States with a covert mission: to kill a candidate running for US president . . . This “shocking, tense” and sharply satirical novel has become a modern classic, and was the basis for two film adaptations (San Francisco Chronicle). “Crammed with suspense.” —Chicago Tribune “Condon is wickedly skillful.” —Time




Surveillance Valley


Book Description

The internet is the most effective weapon the government has ever built. In this fascinating book, investigative reporter Yasha Levine uncovers the secret origins of the internet, tracing it back to a Pentagon counterinsurgency surveillance project. A visionary intelligence officer, William Godel, realized that the key to winning the war in Vietnam was not outgunning the enemy, but using new information technology to understand their motives and anticipate their movements. This idea -- using computers to spy on people and groups perceived as a threat, both at home and abroad -- drove ARPA to develop the internet in the 1960s, and continues to be at the heart of the modern internet we all know and use today. As Levine shows, surveillance wasn't something that suddenly appeared on the internet; it was woven into the fabric of the technology. But this isn't just a story about the NSA or other domestic programs run by the government. As the book spins forward in time, Levine examines the private surveillance business that powers tech-industry giants like Google, Facebook, and Amazon, revealing how these companies spy on their users for profit, all while doing double duty as military and intelligence contractors. Levine shows that the military and Silicon Valley are effectively inseparable: a military-digital complex that permeates everything connected to the internet, even coopting and weaponizing the antigovernment privacy movement that sprang up in the wake of Edward Snowden. With deep research, skilled storytelling, and provocative arguments, Surveillance Valley will change the way you think about the news -- and the device on which you read it.