Author Topic: ***High level DHS Officers use "Electronic Dog Collars" to create Sex Slaves  (Read 13427 times)

0 Members and 1 Guest are viewing this topic.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated

Christopher Clark, Fmr Officer in Department of Homeland Security
Used IBM Electronic Dog Collars to Create a Sex Slave

http://www.courthousenews.com/2010/08/31/29997.htm

"Clark also wanted to see how good plaintiff's tongue was and that he was attracted to the plaintiff," according to the complaint. Dahl claims Clark traveled to Montana on Aug. 8 "under the guise of an official business trip" and asked her to meet him. She says he made her feel "that she did not have a choice but to do whatever he suggested or he would fire her." That night Clark took her back to his hotel room "where he demanded to have sex and forced himself on her and, after initially attempting to fight him off, she gave up and he had his way," the complaint states. It adds: "The sex was not of her free will and was unwelcomed." A week later, she says, Clark e-mailed her the lyrics to Jimmy Buffett's song "Come Monday" and wrote about "loving" her. Dahl claims Clark met her in Minneapolis to join her for her move to Washington and "demanded sex" on each of the four nights they spent on the road. Once in Washington in her new job, she says she tried to refuse to have sex with him, but "Clark exhibited an attitude including body language which conveyed that he was entitled to have sex with the plaintiff if she wanted to maintain her job and it so scared the plaintiff that she backed off her stance and even suggested make-up sex."

Clark also monitored her in Washington, "particularly her movements and communications with other people and he sought to restrict, insulate and isolate the plaintiff so as to maintain and continue his control and dominion over her," she claims. "There was an expectation that the plaintiff would be providing Clark sex and he treated the plaintiff as if she was his sex slave," the complaint states.




“The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. [...] The capacity to assert social and political control over the individual will vastly increase. It will soon be possible to assert almost continuous surveillance over every citizen and to maintain up-to-date, complete files, containing even most personal information about the health or personal behavior of the citizen in addition to more customary data. These files will be subject to instantaneous retrieval by the authorities.”
https://www.mega.nu/ampp/privacy.html
-Zbigniew Brzezinski




Hey DHS...what you are doing right now is so f**king illegal it is not even funny. You guys have gone so far off the reservation, you are creating actual damages to humanity. Same as the Nazis did, same as Mao did, same as Pol Pot did. Wake up and realize what is going on. In the end they will turn the grid on you too. It is in the plans. IBM's system will require no humans, it will be sense and response without any human intervention. You are giving IBM all the data it needs to put the same electronic dog collar that psychopath used automatically. They will not need 500 humans in a room looking at computer screens. You are logging everything you think is suspicious. That is getting fed into IBM's analytics so that they no longer need you. It works on the same principals as Google's Human Tabulation Workshop. Watch this video and you should be able to see what you are doing for the beast behind the scenes: http://video.google.com/videoplay?docid=-8246463980976635143

And of course the psycho used the system to create a continually monitored and stalked sex slave. This was by design, it is so easy to do at that level and there is no oversight so of course he decided to get himself a sex slave, his profile probably showed he would do it, that is why he was hired. Don't you guys notice the type of people hired as your co-workers? Doesn't it freak you the f**k out sometimes?
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Aoss

  • Member
  • ****
  • Posts: 308
    • If Everyone Knew
Do you know where I could find a source for that Brzezinski quote?  I'm working on a project and it would really be helpful. ::)

Googling just found me a bunch of NWO-type sites :(

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Do you know where I could find a source for that Brzezinski quote?  I'm working on a project and it would really be helpful. ::)

Googling just found me a bunch of NWO-type sites :(

Between Two Ages: America's Role in the Technetronic Era
http://www.associatedcontent.com/article/2138781/between_two_ages_americas_role_in_the.html
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline citizenx

  • Member
  • *****
  • Posts: 9,086
Really says it all about Homeland (das Heimat) Security.  It is run by Nazi fu#%s evidently.

Hardly a surprise.

There is a whole department I think we could excise from American government with no great loss.  How ever did we survive without them all those years?

A few thousand people are killed in an unannounced demolition in New York and this is the deal with the devil that was made to make us all feel comfy-cozy.

Disgusting.

Franklin said it all. To paraphrase, "He who is willing to sacrifice his liberty for a little security deserves neither."

Like TSA, we know some of their officers are sick pervs.  Maybe, we shouldn't have given them god-like powers in the first place to protect us from fake Arabs with box-cutters and Nigerian bankers' sons with firecrackers in their underwear.

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Hey DHS/NSA/NRO workers who are feeding anti-American New World Order IBM machines' analytics...

Here is your netflix list for the next few weeks (and they are all approved by your supervisors)...
Killing Room
Eschelon Conspiracy
Eagle Eye
Saturn 3
Minority Report
They Shoot Horses Don't They?
Grapes of Wrath
Good
Queen Margot
Handmaid's Tale
Soylent Green
Man in the Glass Booth
The Road
Goya's Ghosts
Green Zone
The Girl with the Dragon Tattoo
The Killing Fields
Boy and His Dog
Death and the Maiden
And then for some comic relief (also with important messages):
Spies Like Us, Deal of the Century, Moon over Parador, Operation Endgame


But if you really want to obey your oaths of office...

See these:


Critical Info Films for Saving America:
 
Police State 4:  The Rise of FEMA
http://www.youtube.com/watch?v=Klqv9t1zVww
 
Invisible Empire
http://www.youtube.com/watch?v=qTrJQpgf6sE
 
Fall of the Republic
http://www.youtube.com/watch?v=VebOTc-7shU

The Obama Deception
http://www.youtube.com/watch?v=eAaQNACwaLw

The Money Masters.
http://video.google.com/videoplay?docid=-515319560256183936&q=The+money+changers&ei=Zd4QSMjvB47YqAKQtJmzBA

Endgame
http://video.google.com/videoplay?docid=1070329053600562261&q=Endgame+&ei=1t4QSPaoB5q2rAKJzaywBA

Codex Alimentarius
http://video.google.com/videoplay?docid=5800206429960925518

America: Freedom to Fascism
http://video.google.com/videoplay?docid=-1656880303867390173&q=Freedom+to+Fascism&ei=at8QSJPIL52mrALI99GwBA
 
Police State 3:  Total Enslavement
http://video.google.com/videoplay?docid=-448659287463550973
 
Police State 2:  The Takeover
http://video.google.com/videoplay?docid=2758880303660529314#

Police State 2000
http://video.google.com/videoplay?docid=-1551348336255792191&ei=li3YSe2vEInUrQLMhunlAg&q=Police+state+2000

Terrorstorm
http://video.google.com/videoplay?docid=-5948263607579389947

Loose Change Final Cut
http://video.google.com/videoplay?docid=-3719259008768610598&ei=3C3YSYvbKIKwrAKQqqzLAQ&q=Loose+Change+Final+Cut

Fabled Enemies
http://video.google.com/videoplay?docid=-2144933190875239407&ei=Fi7YSf6sAo6YrQL3rcXcAg&q=Fabled+Enemies
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated

Mario Savio: Sproul Hall Steps, December 2, 1964

http://www.youtube.com/watch?v=tcx9BJRadfw


"There is a time when the operation of the machine becomes so odious,
makes you so sick at heart,
that you can't take part;
you can't even passively take part,
and you've got to put your bodies upon the gears and upon the wheels,
upon the levers,
upon all the apparatus,
and you've got to make it stop.
And you've got to indicate to the people who run it,
to the people who own it,
that unless you're free,
the machine will be prevented from working at all!"
All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline agentbluescreen

  • Member
  • *****
  • Posts: 7,435
Really says it all about Homeland (das Heimat) Security.  It is run by Nazi fu#%s evidently.

Hardly a surprise.

There is a whole department I think we could excise from American government with no great loss.  How ever did we survive without them all those years?

A few thousand people are killed in an unannounced demolition in New York and this is the deal with the devil that was made to make us all feel comfy-cozy.

Disgusting.

Franklin said it all. To paraphrase, "He who is willing to sacrifice his liberty for a little security deserves neither."

Like TSA, we know some of their officers are sick pervs.  Maybe, we shouldn't have given them god-like powers in the first place to protect us from fake Arabs with box-cutters and Nigerian bankers' sons with firecrackers in their underwear.

This Reichs SS is an abomination, it is only about the security of the ruling class from the people

What was once America truly has become the Union of Zionist Socialist Republics complete with a single ruling party, dressed up as two of them in drag. (RepublicRATs & DeMOBlicans, Inc)  Either way, they are Satanist-Christainist gangs of marauding cultist robbers hurling advanced Hellfire pitchforks, which are the only things they still manufacture, on borrowed money to help their "buddies" steal the rest of Palestine.

It is truly now the Land of the Slaves and the Home of the Fearful

Offline Dig

  • All eyes are opened, or opening, to the rights of man.
  • Member
  • *****
  • Posts: 63,090
    • Git Ureself Edumacated
Check this out

http://news.teamxbox.com/xbox/19960/Rumor-New-Xbox-Console-in-2010-We-Tell-You-the-Truth/

so im looking for ibm video-based motion sensing and the first thing i get?

Digital Video Surveillance

http://www-935.ibm.com/services/us/gts/pdf/sp_wp_digital-video-surveillance.pdf

( and something is messing with my browser making links go elsewhere.. grr)

anyhow, Digital Video Surveillance:
enhancing physical security with
analytic capabilities

by IBM global services 2008

Today’s Surveillance Challenges
In today’s environment, virtually every municipality, agency, educational
institution, mass transportation center, financial institution, utility plant and
medical center must plan for threats and protect the security of its property,
employees, customers, citizens and IT infrastructure. Additionally, businesses
in every sector face challenges in protecting their customers, employees, and
assets while working to reduce operating costs, improve productivity and
increase profit as well as customer satisfaction. Examples of security risks
and business issues that may be managed more effectively using surveillance
methods include:
• Public Safety/Security: Increased threats have caused many government
agencies to deploy surveillance cameras and sensors, providing situational
awareness around critical facilities. School campuses must deal with pro-
tecting entry and exit points, maintaining IT network security, preventing
vandalism and avoiding authorization issues.
• Airports/Seaports/Railways: Mass transit businesses and agencies
must protect passengers, staff, and physical assets from terrorist threats
and security breaches, and adhere to regulatory requirements.
• Retail Stores: The retail industry monitors establishments to reduce
fraud, theft, and administrative errors. Retail stores also use video and
analytic information to determine the effectiveness of promotional
displays and count people in various areas to optimize store layouts as
well as sale effectiveness.
• Financial Institutions: Many banks have 24—hour human surveillance
requirements for inside operations and Automated Teller Machines (ATMs).
Surveillance and analytics are being used to reduce threats of robbery as
well as fraud. Many banks are consolidating security controls across bank
branches by monitoring video, voice and transactional information from a
central command and control center.

An Evolution of Surveillance
Organizations have used surveillance for decades as a deterrent to criminal
activities such as theft, fraud, and violence. In the last ten years, surveillance
technology has been developed that not only helps organizations detect and
respond to threats sooner, but also helps them focus on improving business
operations. The three generations of surveillance are often described as:
• Analog
• Digital
• Smart or Intelligent
We will explore each of these in greater detail to help you better understand
how we arrived at today’s environment and where we plan to go in the future.
Analog Video Surveillance
Video surveillance has typically involved the placement of analog video
cameras in sensitive or strategic areas of a particular business, coupled with
closed-circuit television (CCTV) for live monitoring. This serves not only as
a deterrent to crime, but also to record the movement of people and property.
Mobile methods of video surveillance, such as mounting cameras in patrol
cars, buses and trains are also often utilized to record events.
The use of analog video cameras results in the creation of hundreds of video-
tapes that then must be viewed by security guards. The cost of employing
security personnel to monitor hundreds of cameras, in addition to storing a
high volume of videotapes can be prohibitive. Additionally, videotapes can
have poor image quality and deteriorate over time.
More importantly, studies have shown that a person assigned to sit in front of
a video monitor for several hours a day and watch for particular events is an
ineffective security system. Tests have demonstrated that after only 20 minutes

of watching and evaluating monitor screens, the attention of most individuals
has degenerated to well below acceptable levels.1 Monitoring video screens is
both boring and mesmerizing. Furthermore, manual searches of tapes can take
too long to provide vital information needed to assist in investigations.
Also, video can often only be viewed from a single end point that is not shared.
This limits the ability to distribute information across an enterprise, which
could help minimize company-wide threats and alerts. Finally, analog video
systems cannot extract business intelligence from security data.
Digital Video Surveillance
Today, video surveillance remains as vital as ever, but it assumes a new role.
The emergence of digital video, IP video cameras, networked video recorders,
web video, consumer cameras and video-based intelligence is opening up a
wide range of applications providing enhanced functionality and business
value to organizations.
Digital video surveillance (DVS) enables clients to establish effective risk
management strategies that will help them manage and safeguard business
information and technology assets, anticipate vulnerabilities and risk, and
maintain timely access to information.
Many organizations have piecemeal solutions, and are challenged by
having multiple systems that do not communicate with each other. Often,
the separation of IT and physical security does not allow organizations to
take advantage of existing IT infrastructures and applications, such as
identification (ID) management and transactional systems that may already
be in place. Operating totally separate, disparate systems for IT and physical
security is not only less effective, but also more labor intensive and costly.

Figure 1. Digital video surveillance drives intelligence through integration, which can
enhance your ability to respond.
Migrating to a DVS solution will help address some of the limitations of a tape-
based analog system. DVS can help organizations achieve better returns on
their security investments by:
• Enabling real-time detection and potential prevention of security incidents
through enhanced intelligence gathering
• Using event-based viewing for investigative purposes, eliminating the need
to chronologically review videotapes
• Reducing the need to monitor video cameras and change tapes
• Increasing product security by deterring potential shoplifters and
monitoring staff
• Providing evidence against fraudulent claims
• Increasing indoor and parking lot security

Smart Surveillance
Smart surveillance, intelligent video surveillance, video analytics, intelligent
video and intelligent analytics are typical names used to describe the concept
of applying automated signal analysis and pattern recognition to video cameras
and sensors, with the goal of automatically extracting “usable information”
from video and sensor streams.


IBM Smart Surveillance Solution (SSS) helps optimize security by integrating
hardware, software and services within an organization, thereby enabling the
convergence of physical and IT security. An integral part of SSS is a software
component developed by IBM Research known as IBM Smart Surveillance
Analytics (SSA), which provides capabilities that enable real-time decision
making and post-event correlation of people and activities.
Usage Scenarios
IBM Smart Surveillance Analytics has many unique features to help clients
manage security issues and prevent problems before they occur, such as:
• Open framework—A comprehensive security and surveillance plan may
involve multiple modalities of events captured from various video analytic
technologies, non-video sensors and event systems like TLOG in the retail
environment. SSA has been designed with an open framework that enables
event-based surveillance and can make the integration of events simple
and easy.
• Behavior factory—Many vendors provide a set of behaviors, such as
“large fast vehicle” and “stopped vehicle.” These behaviors have been
designed with a limited customer set in mind. SSA’s ability to alert based
on “database indexed metadata” of all events occurring across a series of
camera feeds allows the user to customize behaviors to their environment
through an easy-to-use interface.
• Attribute search—The intelligent video industry has approached surveil-
lance based on a limited set of known threat models; hence, the emphasis
on “tripwires and abandoned objects” and very limited functionality
to support investigation of “unknown threats.” SSA, through its unique
and patent pending metadata search, supports a wide range of queries on
events that may or may not have been previously defined as alerts. This is
possible because SSA is capturing metadata on event activity, not just on
pre-defined alerts.

AND THAT INCLUDES

• Entertainment solutions—The capability of SSA to track people can be
used at sporting events to generate enhanced statistics, visualizations
and interactive gaming. Clients that may be interested in this capability
include casinos, sporting leagues and television stations.
IBM Smart Surveillance Solution Architecture
As stated above, the integral software component of SSS is IBM Smart
Surveillance Analytics. The analytic framework of SSA is comprised of
two core components: Middleware for Large Scale Surveillance (MILS)
and Smart Surveillance Engine (SSE). They will be discussed later in
this paper.
SSA provides the unique capability to carry out efficient data analysis of
video sequences, either in real-time or recorded video. Based on open
standards-based middleware, the open standards-based software platform
is designed to allow monitoring and analysis of real-world events via sensors
(like video cameras, radar or audio inputs).
All SSA functionality is Web-based, allowing virtually “anytime, any-
where” access to both real-time and historical event data from the system.
Figure 2 shows the high-level conceptual architecture of IBM Smart
Surveillance Solution. It illustrates how Smart Surveillance Analytics
integrates with existing video cameras and capture systems to provide:
• Video/sensor analytics capabilities
• A framework for integrating event information from multiple
related sources
• A framework for building client-specific solutions drawing upon the video
and sensor events and integrating these into the client’s business process

Figure 2. IBM Smart Surveillance Solution—a conceptual architecture
SSA provides the following types of functions to the end user:
• Real-time alerts: Users can specify “alert definitions” that include multiple
conditions from a single camera/sensor or across multiple cameras and
sensors. SSA uses its analytics capabilities to evaluate events occurring
in relevant sensors against the alert definition. Each time the “alert
definition” is triggered, SSA can provide the user with prompt notification
of the event.
• User-driven queries: Users (both human and applications) can use SSA to
perform content-based queries against event metadata that is archived by
SSA. For example, SSA can retrieve all events from a camera where “a red
car” was driving across the parking lot.

Figure 3. SSA Functionality
• SSA Functionality: There are several types of video analysis technologies
that are part of SSA. Typically, each of these analytics involves sophisti-
cated algorithms that process the video/sensor signals to extract
information and structure the information to support the real-time alert
and search functionalities of SSA. The video analysis technologies are:
– Behavior analysis: These analytics are intended to analyze the move-
ment of objects within the field of view of a camera. This is based on the
ability to detect and track multiple moving objects across the camera,
classify these objects, and extract various object attributes like color,
shape and size. The extracted information is used to provide a variety of
alerts while recording information from all events (for example, motion
detection, tripwire, abandoned object) and search functions
(for example, find red cars).

– License plate recognition (LPR): This analysis capability is tailored to
detect the presence of text within a given video frame, and apply optical
character recognition technology to extract the license plate number.
LPR needs to be customized to the character set (for example, English,
Arabic), style, format and appearance of the license plate, which varies
significantly across geographies. In order to correctly operate, LPR
requires a minimum resolution across the license plate and adequate
illumination and viewing angle.
– Face detection: This analysis capability is designed to automatically
detect images of human faces from the video. The face detection
capability creates an index in the video and marks the time at which
the face was present in the video. The system generates a key frame to
represent the face, thus producing a catalog of faces for all the people
who appeared within a camera field of view (approaching the camera.)
– Event integration: This capability allows the integration of events
from the analysis of other sensors (like automatic door sensors, HVAC
sensors, audio) with event streams from other IT systems (like point-of-
sale, telephone call logs). Once integrated, the event information can be
cross-correlated to video-based events like behavior analysis, LPR
and face detection.

Figure 4. SSA Software Architecture
SSA has the following core components:
1. Smart Surveillance Engine (SSE): The Smart Surveillance Engine (SSE)
is a C++ framework for capturing events that are observed by sensors such
as cameras. Every physical camera in your environment is assigned to an
analytic engine running on an SSE server. One SSE Server can handle
multiple cameras. In general, SSE is designed to process streams of video
in real-time, automatically extracting event (activity in the camera’s field

of view) metadata and evaluating user-defined alerts. The specific user
functionality associated with each camera is based on the profile which is
configured for use by the analytic engine associated with the camera. The
following profile types are available:
• Behavior analysis (Outdoor Far-field, Outdoor Near-field, Indoor
Tracking)
• Face detection (Face Tracking, Sensitive Face Tracking)
• License plate analysis (via integrated IBM Business Partner technology)
The information extracted by SSE from the camera’s field of view is used to
classify objects according to the profile type, providing metadata on object
type, object size, object speed, etc.
SSE alerts are conditions which have been specified by the user as being
of interest. SSE supports both basic video alerts and compound metadata-
based alerts. Currently, we support the following basic video alerts:
• Motion detection-detects motion within a specified region of view
• Tripwire-detects directional crossing of user-defined tripwire
• Region-detects certain specified behavior within a specified zone,
such as entering, leaving, starting and stopping
• Abandoned object-detects when an object has been left behind
• Object removal-detects when an object has been taken away
• Directional movement-detects when objects are moving in a user-
specified direction
• Camera move/blind-detects changes in camera state such as movement
or obstruction
• Camera movement stop-detects when a pan-tilt-zoom (PTZ) camera
stops moving

2. Middleware for Large Scale Surveillance (MILS): Each installation of
the IBM Smart Surveillance Solution, which includes SSA, has a MILS
Server. MILS is a J2EE framework application built around IBM’s DB2®,
WebSphere® application server and MQ platforms. In addition to metadata
management, MILS provides system management, user management
and various extensibility services, including a web services application
programming interface (API).
MILS can help provide consolidated backend data management capabilities
and store metadata that describes key activities discovered while ingesting
video data. It can also create and manage a full index of the ingested video
data. This index has a full set of event attributes that can be searched to
support forensic analysis. The index attributes can also be used to define
composite metadata-based alerts by combining the metadata in various
ways to define complex behavioral patterns.
MILS operates on top of a software middleware stack, either IBM Web-
Sphere Remote Server (WRS) or IBM Central Site Server. Both provide
a middleware platform with a J2EE application server called WebSphere
Application Server Network Deployment, integrated with:
– WebSphere MQ for an assured message delivery component
– DB2 Workgroup Server Edition as a relational database
management system
3. Applications: These are mainly web applications (HTML, Java, JSP, applets,
Javascript) which use the web services enabled by MILS to provide the
functionality needed by the user.

IBM Smart Surveillance Analytics can also allow administrators to add
new metadata schemas to the system, thus enabling new analytic engines
to send sensor/event metadata. The metadata from all analytic engines
can be consolidated allowing users to search across modalities. These
advanced indexing capabilities offer a unique and powerful differentiator
from virtually all other available surveillance solutions.
Return on Investment (ROI) by Industry
Implementing IBM Smart Surveillance Solution, which includes Smart
Surveillance Analytics, offers many benefits, including the potential to
increase return on investment (ROI). ROI successes fit into three cate-
gories: managing risk, growing the bottom line and growing the top line.
ROI highlights in various industries include the following scenarios:
1. Retail
In today’s retail environment, product shrink dramatically affects the
top and bottom line. Globally, on average, 1% to 3% of all retail sales are
affected by product shrink, due to conditions including crime, employee
fraud, and damaged goods.2 This results in a significant impact on retail
margins, especially for those businesses running on a 1% to 3% margin.
IBM Smart Surveillance Solution can serve as a loss prevention tool as
well as a source of retail intelligence data. It can provide video techno-
logy to help manage profit and loss at the cash registers, under the
cash registers and throughout the store. Retailers can implement SSS
to determine promotion effectiveness, cashier monitoring and people
counting. Grocers can use the technology to help reduce Bottom of Basket
(BOB) losses. One grocer has reduced BOB by more than 80%, integrating
IBM’s optical recognition and an IBM Business Partner Point-of-Sale
(POS) system.3


all for profit.. but what do you expect when you find this, searching for the next xbox


All eyes are opened, or opening, to the rights of man. The general spread of the light of science has already laid open to every view the palpable truth, that the mass of mankind has not been born with saddles on their backs, nor a favored few booted and spurred, ready to ride them legitimately

Offline al0152

  • Member
  • *****
  • Posts: 584

Christopher Clark, Fmr Officer in Department of Homeland Security
Used IBM Electronic Dog Collars to Create a Sex Slave

http://www.courthousenews.com/2010/08/31/29997.htm

"Clark also wanted to see how good plaintiff's tongue was and that he was attracted to the plaintiff," according to the complaint. Dahl claims Clark traveled to Montana on Aug. 8 "under the guise of an official business trip" and asked her to meet him. She says he made her feel "that she did not have a choice but to do whatever he suggested or he would fire her." That night Clark took her back to his hotel room "where he demanded to have sex and forced himself on her and, after initially attempting to fight him off, she gave up and he had his way," the complaint states. It adds: "The sex was not of her free will and was unwelcomed." A week later, she says, Clark e-mailed her the lyrics to Jimmy Buffett's song "Come Monday" and wrote about "loving" her. Dahl claims Clark met her in Minneapolis to join her for her move to Washington and "demanded sex" on each of the four nights they spent on the road. Once in Washington in her new job, she says she tried to refuse to have sex with him, but "Clark exhibited an attitude including body language which conveyed that he was entitled to have sex with the plaintiff if she wanted to maintain her job and it so scared the plaintiff that she backed off her stance and even suggested make-up sex."

Clark also monitored her in Washington, "particularly her movements and communications with other people and he sought to restrict, insulate and isolate the plaintiff so as to maintain and continue his control and dominion over her," she claims. "There was an expectation that the plaintiff would be providing Clark sex and he treated the plaintiff as if she was his sex slave," the complaint states.




“The technotronic era involves the gradual appearance of a more controlled society. Such a society would be dominated by an elite, unrestrained by traditional values. [...] The capacity to assert social and political control over the individual will vastly increase. It will soon be possible to assert almost continuous surveillance over every citizen and to maintain up-to-date, complete files, containing even most personal information about the health or personal behavior of the citizen in addition to more customary data. These files will be subject to instantaneous retrieval by the authorities.”
https://www.mega.nu/ampp/privacy.html
-Zbigniew Brzezinski




Hey DHS...what you are doing right now is so f**king illegal it is not even funny. You guys have gone so far off the reservation, you are creating actual damages to humanity. Same as the Nazis did, same as Mao did, same as Pol Pot did. Wake up and realize what is going on. In the end they will turn the grid on you too. It is in the plans. IBM's system will require no humans, it will be sense and response without any human intervention. You are giving IBM all the data it needs to put the same electronic dog collar that psychopath used automatically. They will not need 500 humans in a room looking at computer screens. You are logging everything you think is suspicious. That is getting fed into IBM's analytics so that they no longer need you. It works on the same principals as Google's Human Tabulation Workshop. Watch this video and you should be able to see what you are doing for the beast behind the scenes: http://video.google.com/videoplay?docid=-8246463980976635143

And of course the psycho used the system to create a continually monitored and stalked sex slave. This was by design, it is so easy to do at that level and there is no oversight so of course he decided to get himself a sex slave, his profile probably showed he would do it, that is why he was hired. Don't you guys notice the type of people hired as your co-workers? Doesn't it freak you the f**k out sometimes?

Department of Homeland "Security".....
Live free....or DIE HARD!!!

There is no right in war.....only one that is left - Bertrand Russell

What goes up does not necessarily go down, and vice versa.......

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 19,734
Is this the same Christopher Clark ?

http://www.linkedin.com/in/christopherclark

Christopher Clark’s Summary
I have designed and managed the development of 16 commercial videogames, 12 Immersive environments for training, 28 user interfaces, 250 digital avatars, 3 cognitive A.I. systems, and led the technical design of 35 Federal proposals. I have been a video game expert for Sandia National Laboratories, Oak Ridge National Laboratories, ADL Co-Laboratory, Institute for Defense Analysis, JFCOM, J7, J9, Defense Language Institute, Justice Department, DLCC, Marine Corps, Air Force Education and Training Command, the Office of Naval Research, the University of Central Florida, and the University of Texas Austin.

I have designed, and or, deployed Gaming, Simulation, and Training solutions for Naval Education and Training Command, Center for Homeland Security and Defense, Special Operations Command, Naval Postgraduate School, the MOVES Institute, Consumer Electronics Association of America, Booz Allen Hamilton, American Telephone and Telegraph, Northrop Grumman Mission Systems, American Systems, Hopelab, IDSI, Microsoft, Nintendo, Vivendi, Universal/Sierra, Sony, Infograms Atari, and Hasbro.

I have developed solutions for Windows, XBOX, XBOX360, Playstation 3, Flash, Wild Tangent, Unreal, Quake, Umbra, Big World, Half Life, Source, Second life, Virtual BattleSpace 2, and DirectX 1 through 11. I am the author of the Principles of Game Based Learning and Dynamic Adaptability in Instructional Simulations models.

My work has been cited by Ohio University, University of Baltimore, Naval Education and Training Command, the U.S. Army, the Brazilian Army, and the Australian Army. I am a University of Baltimore Adjunct Professor, and a former Naval Postgraduate School Faculty Member. I have received "Best of E3 Awards from IGN, Gamespot”, a European Multimedia Association Award, a Naval Commendation, and the Simulation Innovation and Design Award for lifetime achievement in game design and have appeared on the covers of the Baltimore Daily Record and the Baltimore Business Journal.

Christopher Clark’s Specialties:
Game based learning model designer, Highly experienced game and simulation designer, product design and development professional, professional public speaker, executive manager, corporate liaison, philanthropist, National Professional Paintball League player,I have a full understanding of SCORM and 508 compliance requirements and of LMS integration of games with both SCORM and 508 compliant Learning Management Systems.
...
Technical Director Business Development
BreakAway, Ltd.
(Computer Games industry)

February 2002 — July 2005 (3 years 6 months)

Leading DOD Digital Game Developer/Interactive Technologies Developer. Successfully merged XI Interactive with Breakaway, Ltd. Responsible for Market and Project Identification, Designed 35 Game and Simulation Solutions, Customer Relationship Management Development of all Sales presentations. Wrote 16 Government Technical Proposals, Provided Technical Counsel to the New Business Development Team. Within a 17-month period, was instrumental in establishing strategic partnerships with Lockheed Martin, General Dynamics, Titan, Boeing, PEOSTRI, RDECOM, and Sandia National Laboratory, and Northrop Grumman.

Presented before Vice Admiral Harms, Vice Admiral Moran, Joint Forces Command, Air Force University, Naval Post Graduate School, Office of the Secretary of Defense Advanced Distributed Co-Laboratory, Naval Education and Training Command, the Navy’s Learning Strategies Consortium and the Association for Business Simulation and Experiential Learning among others. During my tenure at BreakAway Federal Systems Division sales were increased 300 percent.

President/CEO/Chairman of the Board of Directors
XI Interactive, Inc.
(Privately Held; 11-50 employees; Computer Games industry)

March 2001 — February 2003 (2 years )

Founder of XI Interactive, Inc., Which Developed Digital Products for Entertainment, Product Education and Marketing/Interactive Technologies. Provided educational consulting services for customers that included the Consumer Electronics Association of America. Managed the day-to-day business operations and corporate officers and guided the board of directors in creating and implementing all strategic planning initiatives. Responsible for all new business development initiatives, including identifying markets, planning projects, negotiating contracts and managing customer relationships. Formed and Maintained Strategic Partnerships with Companies Such As Microsoft, Intel, Nintendo, Sega, Revolution Studios, Sony Entertainment, Paramount Pictures, Universal Interactive, Acclaim Entertainment, Carton Donofrio Partners, Eisner Communications and Others.

Another Christopher Clark:
http://www.acousticmonitoring.org/materials/bios.html
Christopher Clark
Imogene P. Johnson Director
Bioacoustics Research Program, Cornell University

Dr. Christopher W. Clark is the Imogene P. Johnson Director of the Bioacoustics Research Program at the Cornell Lab and Senior Scientist in the Department of Neurobiology & Behavior at Cornell University.  He holds advanced degrees in electrical engineering (M.S.E.E., SUNY-Stony Brook, 1974) and biology (Ph.D., SUNY -Stony Brook, 1980).

As an NIH postdoctoral fellow and assistant professor at The Rockefeller University he conducted research on vocal learning in songbirds. His research interests concentrate on animal acoustic communication with a particular focus on the development and application of advanced acoustic methods for scientific conservation of marine mammals.  He leads the Bioacoustics Research Program in the design, development and application of computer-based systems for quantitative analysis of animal vocalizations, and acoustic techniques to detect, locate, track and census free-ranging animals. Scientists and engineers in the Bioacoustics Research Program (http://www.birds.cornell.edu/brp/) conduct a multitude of basic scientific and applied research projects around the globe (Africa, Australia, Europe, North America, Central America, South America; Arctic, Atlantic, Pacific, and Southern Oceans) on a diversity of species and taxonomic groups.

These efforts are directed at understanding the hows and whys of animal acoustic communication, often with a special focus on determining the impacts of human sound-generating activities on individuals and populations over a wide variety of spatial, spectral and temporal scales.
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Online TahoeBlue

  • Global Moderator
  • Member
  • *****
  • Posts: 19,734
Re: ***High level DHS Officers use "Electronic Dog Collars" to create Sex Slaves
« Reply #10 on: September 09, 2010, 08:21:54 pm »
According to http://www.courthousenews.com/2010/08/31/DHSSexSlave.pdf

the plaintif's name is Christopher J Clark

http://www.dailykos.com/story/2010/9/1/74418/58064
Young Bush Administration DHS Official Kept A "Sex Slave"
by citizen92
...
So who is Christopher J. Clark?

Well, he was Deputy Chief of Staff to the Commissioner of Customs and Border Proection W. Ralph Basham. Clark was the #4 most senior in that office.  Although his name does not appear in the Plum Book, he was likely paid at a GS-15 rate or higher as a political appointee.

Clark today works for Alutiiq, LLC, an "Alaskan Native Corporation" (aka Beltway Bandit) that has lucrative contracts with the Department of Homeland Security.  Clark works in Alutiiq's Vienna, VA office, which is their main place of business.  

Alutiiq as an "Alaskan Native Corporation" gets Federal contracting preferences because it is supposedly owned by a minority group. (But this is a subject for another post).  Clark's LinkedIn profile is noticeably silent on his work for the DHS, probably out of embarrassment of the lawsuit.

Clark recently poppped up at DHS' Tactical Infrastructure/Border Fence Industry Day on April 14, 2009 as Alutiiq's representative.  Still sucking at the teat of his former employer... or trying to.  

Wait?  The Border Fence?  That Fiasco?  The Border Fence was a "virtual" fence project started during the Bush Administration supposedly able to deter illegal immigrants. The fence turned out to be a bottomless pit of waste and failure.  Should we be reassured that someone like Chris Clark was consulting on this failure of a project?  Or was he too busy harassing his subordinates to even know what was going on?

But Wait, There's More, Another Compromised Bush Political Operative Was His Boss...

While in his Deputy Chief of Staff role, Clark reported to politically-appointed Chief of Staff Steve Atkiss, who in turn reported to Commissioner of Customs and Border Protection W. Ralph Basham.

Atkiss was a Bush White House loyalist and Texas operative - and before becoming a Senior Executive Service employee at DHS ($140k + a year), the twenty-something Atkiss was managing Bush's photo ops at the White House.  

But back then Atkiss was probably most notable for being a White House Official who likely violated the Constitutional rights of three Denver citizens by throwing them out of a taxpayer-funded event, because they arrived in a car with a "no blood for oil" bumpersticker as the result of a printed White House Policy.  In 2005, the case was known as the Denver Three.  The case is presently petitioning for review by the Supreme Court...
http://www.denverpost.com/ci_5341085#ixzz0yFE2ugtM
...

All Comes Full Circle

Chris Clarke had his payday, and so did Atkiss and Basham.  They too are now sucking at the government teat, based on their prior positions at DHS, as part of Command Consulting Group another Beltway Bandit.

http://www.commandcg.com/index.php/team
Behold, happy is the man whom God correcteth: therefore despise not thou the chastening of the Almighty: For he maketh sore, and bindeth up: he woundeth, and his hands make whole ; He shall deliver thee in six troubles: yea, in seven there shall no evil touch thee. - Job 5

Offline Overcast

  • Member
  • *****
  • Posts: 4,133
Re: ***High level DHS Officers use "Electronic Dog Collars" to create Sex Slaves
« Reply #11 on: September 17, 2010, 10:23:28 am »
So this is the 'Brave New World' huh?

Sounds more like an old used toilet.

The irony of the 'New World Order' - is that it's not 'new' by any means. It's really a reversion to the days of feudalism. Evidenced by what happens - history clearly shows this. Any who disagree, are simply denying it.
And dying in your beds, many years from now, would you be willin' to trade ALL the days, from this day to that, for one chance, just one chance, to come back here and tell our enemies that they may take our lives, but they'll never take... OUR FREEDOM!

Offline usefulidiot,uselesseater

  • Member
  • *****
  • Posts: 1,016
  • Useful Idiot/Useless Eater
Re: ***High level DHS Officers use "Electronic Dog Collars" to create Sex Slaves
« Reply #12 on: September 20, 2010, 02:20:30 am »
Hey DHS/NSA/NRO workers who are feeding anti-American New World Order IBM machines' analytics...

Here is your netflix list for the next few weeks (and they are all approved by your supervisors)...
Killing Room
Eschelon Conspiracy
Eagle Eye
Saturn 3
Minority Report
They Shoot Horses Don't They?
Grapes of Wrath
Good
Queen Margot
Handmaid's Tale
Soylent Green
Man in the Glass Booth
The Road
Goya's Ghosts
Green Zone
The Girl with the Dragon Tattoo
The Killing Fields
Boy and His Dog
Death and the Maiden
And then for some comic relief (also with important messages):
Spies Like Us, Deal of the Century, Moon over Parador, Operation Endgame


But if you really want to obey your oaths of office...

See these:


I would add A Serbian Film to the list even tho it is hideously graphic and nasty.
http://www.imdb.com/title/tt1273235/
Trailer (WARNING: Nudity and Graphic Content):
http://www.imdb.com/video/wab/vi4283040793/
A 'retired' porn star is hired by a fishy character to make an adult film for an extremely large amount of money but they won't tell him the details of it. So he asks his brother (a police officer) to investigate this guy Vukmir who hired him to do the film. His brother uncovers that this guy Vukmir is a high level official in the public health service specializing in mental health and child services. They try to get him to perform sexual acts while being watched by an underage girl, when he refuses they drug him. He finds out that this underage girl's mother is being held in  prison and is being used as a sex slave with the head prison official  complicit in Vukmir's illegal actions. When he is horrified by their depravity and tries to escape they have a health services doctor drug him.
Under heavy mind control and drugging they manipulate him into making a pornographic snuff film with this woman while her daughter watches. It emerges that they have been abusing this young girl for quite some time after imprisoning her mother on prostitution charges.
If I give away anymore of the plot it would be a spoiler.
Topics this extremely upsetting film explores:
Illuminati Mind Control
Luciferian Pedophilia/sexual abuse
Luciferian Elites Network of abuse
"The central challenge of our time is posed not by global terrorism, but rather by the intensifying turbulence caused by the phenomenon of global political awakening. That awakening is socially massive and politically radicalizing."-Zbigniew Brzezinski