Anti-Terror Software Resurfaces Decades after Theft

An anti-terror ground intelligence gathering microchip program created under former President George W. Bush and developed as a secondary weapons inspection device to supersede the "Olympic Games" project has surfaced outside of the Department of Defense.

Olympic Games, the subject of the 2016 documentary titled, "Zero Days, detailed the development of a malware virus through Stuxnet Computer, that could and did destroy the Iranian nuclear centrifuges, and end the development of Iranian's nuclear capabilities, from the safety of the National Security Agency and other allied clandestine agencies.


Tom Ridge, former Homeland Security Secretary, Headlines Espionage Expert Panel


"Pentagon's Diary Gets Personal," a June 2003, Associated Press news article, detailed the program, which explained the use of the newest intelligence gathering software. As the article reads, the micro-chip had already been put out for contract and had been fast tracked toward use during the height of the War on Terror after the September 11, 2001, attacks on America at The World Trade Center and Pentagon.

The research and development of Anti-Terror fighting tools, which provided exact intelligence and minimized casualty, were fast tracked under President Bill Clinton, those programs remained active, furthering development, into the next presidency.

The Rise in Terror

The last twenty-five years of the 20th century saw an unprecedented rise in large scale terror attacks on Americans and around the world. Suicide bombings become common, dedication unto death to a deranged doctrine presented by a radicalized and magnetic leader, that indoctrinated youth soldiers, men, women, and adolescents, who would lay down their life for the expectation of reward in the next life.

Beginning with the overthrown of the American Embassy in Tehran, in 1979, by Iranian Islamic terrorists, in which 51 Americans were held for 444 days, the rise of targeted terror attacks throughout the world fueled by widespread rage, the disparity of wealth, religious views, and any number of issues, sanctioned by mass crowd or mob mentality and subsequently mob or mass rule, including doctrinal interpretation of religious messages.


Justice Watch: A Failed System The Victim X Story (Part I)


Over the next twenty years, terror groups, jihadists, fringe radical organizations, homegrown domestic terrorists, lone wolf radicalized teens, terror cell groups, birthed larger and more financially independent organizations, leaders who tapped into the terror mentality indoctrinating millions to launch unmatched attacks with the idea of instilling fear and submission into the minds of the masses.

The 1983 Beirut barracks bombing attack in which Islamic Jihad Terror group claimed responsibility, killed 305 including 241 US Marines. The 1993 World Trade Center bombing carried out by Ramzi Ahmed Yousef, and Sheik Omar Abdel Rahman, killed six and injured 1000.

The Irish Republic Army (IRA), in their fight for Independence as a nation, from the crown, in June 1996 detonated a 3,300lb truck bomb, obliterating the City Centre.  The bomb, the largest since World War II injured 212. After an advance warning provided 90 minutes to evacuate. No deaths were reported.

Beginning in 2000, at the turn of the century, the world witnessed a more sophisticated network coming out of the Middle East. Terror networks, wide scale mass casualty, coordinated attacks all financed by oil rich sympathizers and supporters.

The Rise of The Islamic State

The Islamic State of the leviathan, also known as ISIL, ISIS, The Islamic State, emerged from the remans of Al-Qaeda. 

"A U.S.-led coalition began airstrikes against ISIS in Iraq on August 7, 2014 and expanded the campaign to Syria the following month. On October 15, the United States named the campaign "Operation Inherent Resolve," Wilson Center.org reported.

The sixty-nation coalition to defeat ISIS, the first globally unified cause since the world's nations united against Adolf Hitler and Nazi Germany, began the effort to dismantle the terror network.

As ISIS increased their attacks on civilians, the coalition increased their resolve to dismantle and destroy. Over the next year, the United States conducted more than 8,000 airstrikes in Iraq and Syria.

An additional development in the War on Terror was in research and development, it would revolutionize the fight on terror, by providing an exactness in networks, affiliates, training camps, leaders, even down to the smallest detail, would be provided.

Europe and The Rise of Terror

Beginning in 2015, terror attacks again were on the rise and were particularly deadly across Europe as the United Kingdom, France, and Spain each saw a staggering rise in attacks sponsored by the Islamic State and the Leviathan (ISIS).

On November 13, 2015, The Islamic State launched a coordinated attack on Paris, France. Not since World War II had the City of Lights come under siege with this intensity. The coordinated attacks on killed 131 and injured more than 400.


Justice Watch: The Perfect Crime (The Victim X Story Pt. 2)


In May 2017, in Manchester, UK, the Manchester Arena detonated by a 22-year-old radicalized lone wolf killed 22 and injured more than 100. June 2017, The London Bridge and Borough Market attack, August 2017 Barcelona Spain injures more than 100 in coordinated car ramming attack in multiple locations.

Terrorist became more strategic, and manipulative to gain supporters. Promises of caring for families, money, and the great next life reward presented by a persuasive "salesman" with an agenda.

The coordinated Mumbai Attack, in 2008 killed 174, the terror group Lashkar-e-Taiba claimed responsibility.

Wearable What?

The possibility of wearable microchips, which even in the year 2000 seemed impossible to comprehend for the general population has now become common place, and even the idea of smart technology, unheard of twenty years ago is common vernacular and sought after in tech savvy committees.

"Pentagon's Diary Gets Personal," a June 2003, Associated Press article name posting date, detailed the new program, which explained the use of the newest intelligence gathering software. As the article reads, the micro-chip had already been put out for contract and had been fast tracked toward use during the height of the terrorism theft after the September 11, 2001, attacks on America at The World Trade Center and Pentagon.

After the ACLU stopped full usage, claiming a violation of privacy rights, the program was allegedly shelved.

The micro-chip, implanted in a molar, a tooth, of the CIA or other clandestine agency, was theoretically intended to change the playing field of intelligence gathering. The premise and expectation, was that those chosen for the program, would infiltrate on some level foreign governments that were friendly to terrorist, such as Iran, Iraq, Syria, and Afghanistan and others.

At the time Guantanamo Bay was still housing suspected sympathizers from Al Qaeda. The microchip could have vastly changed the war on terror, with implantation in each of these prisoners as the tracking device would have led inspectors to every hideout, every training camp, every cell organizer and group, every European exit pathway of every terror group connected to Al Qaeda including the up and coming Jihadist terror group, ISIL, The Islamic State and Leviathan.

MIA

About one dozen of these chips were made and during the time they shopped for a defense contractor, were presented to the then President George Bush.

While is seems unlikely one microchip could provide the intelligence to dismantle every terror network established throughout Europe and the middle east, the fact is, one microchip used by numerous operatives infiltrating various branches of the terror organizations could have provided the necessary intelligence to dismantle these organizations and others like them long before the wave of terror swept across Europe and America.

The lives lost through coordinated attacks, beheadings, lone wolf attacks, car-ramming's, bombings, machete, and weapons attacks, could have been saved.

The loss of the microchip, in supervised intelligence programs coordinating with allies throughout the world, has cost Americans, and citizens around the world.

Tracing the Technology

As the microchip was put out for contract, several defense contractors were expected to submit bids, like those medical researchers and hospitals seeking a Coronavirus vaccine contract.

The idea that this spyware technology would revolutionize intelligence gathering held great interest for many, including those who have connection with organizations that assist in the research and development, the modernization, transformation, building and rebuilding to provide more in-depth intelligence gathering tools.

Instead of simply providing visual and verbal reconnaissance, surveillance and transmissions, which any external spyware can provide, the technology was upgraded so the same concept of external spyware gathering technologies used in jewelry, glasses, pens, could be used in an implanted device. A non-visual device, hidden from public view and upgraded to include capturing written correspondence, and thought recording.

The program so deeply sensitive that only defense contractors would have limited access. Of course, something as revolutionary as this type of program would have be met with deviant ideas, especially when presented to those outside the intelligence gathering circle.

Sources with knowledge of the situation explained, "a unit was presented to several law firms in Manhattan, all of which rejected the proposal due to its clear Constitutional violations."


Justice Watch: Jealousy, Greed, and The Seven Deadly Sins – The Victim X Story Pt.3


A Wall Street firm was approached, and they agreed to review the proposal, the plan to test the technology and secure the defense contracts through any clandestine agency was put in place. As the partnership knew the mechanics of the technology would provide voyeuristic access to her life, without her permission or consent.

Spy Networks, Sleeper Cells, Domestic Terror and Homeland Security

Spy networks, the kind portrayed in the movies, which during normal times burst with big box office numbers, are alive and well in the United States.

In July 2010, "The accused spies were able to get close to a scientist working with "bunker-buster" nuclear bombs and a New York financier with powerful political ties. But the intercepts do not suggest they were successful at uncovering valuable information and some of the exchanges with Moscow appear almost laughable in their simplicity, including advice to one agent to "build up little by little relations" with the financier," The Guardian reported.

Former Homeland Security Secretary Tom Ridge

During a 2010 Espionage Expert Panel in Washington, D.C, , then Homeland Security Secretary Tom Ridge provided insight into the domestic war on terror, sleeper cells.

In repose to this question posed by this author to the Secretary Tom Ridge, "You, mentioned, both of you Secretary Ridge and Mr. Whitworth, September 11th and how we established the Department of Homeland Security Office (DHS).  Are we safer today, after September 11th then we were before? And if we are, you just mentioned we live in a free society; we have eleven sleeper spies arrested; three bomb attempts in Times Square (NY) repeated problems, domestic home cells and terror threats everywhere. Are we safer today then we were before September 11th?"

Secretary Tom Ridge said, I'm going to say, absolutely we are. But the reality is we have a different threat. We not only have a traditional threat from governments opposed to us just think back to the years of the cold war when we had thousands of nuclear missiles pointed at us and we had thousands nuclear missiles pointed at someone else and the basic strategy was called  "mutual assured destruction." If you pushed the button; we pushed the button so neither one of us better push the button.

"Our two challenges are: Be aware of your surroundings be aware of that norm, be aware of that new reality; ie: terrorism is going to be part of the 21st century war on this country and elsewhere but don't surrender to fear. It's still America and we're not going to let these terrorists and the possibility of a potential action intimidate us or change us. And the big challenge is our society is balancing our desire to be secure with our desire to be free.  That will be a challenge for this and for all administrations of the 21st century," Haute-Lifestyle.com reported.

Former Bush Administration Director of Communications and Analysis Kirk Whitworth

Janet Walker: Do you feel that there is an increase in Domestic Terror cells, citizens, American citizens, disgruntled, acting out in what would be considered international terrorist activity ways?

Kirk Whitworth, Director of Communications and Analysis under the Bush Administration said, "An increase, that's a good question. To some degree, there is. Overseas we have dealt, I think, very well with many of the threats. Al Qaeda has been in many ways dismantled, and so though it remains dangerous it's not the threat it was. Al Qaeda's on the run. The policies of the Bush Administration were really carried on by the Obama Administration and have really been effective at minimizing the threat of their ability to coordinate operations such as 9/11," Haute-Lifestyle.com reported.

The Chinese Connection

Chinese Nationals are very much a part of non-violent domestic spying, using the persuasive "salesmanship" perfected by slick televangelists, Islamic jihadists leaders, and con artists the Chinese have entered the U.S. domestic spy service.

Many former CIA and FBI agents have been exposed for selling secrets to the Chinese. As recently as August 2020 a former CIA Officer and FBI linguist, Alexander Yuk Ching Ma, 67, was arrested for espionage that Justice Department officials said, "spanned a decade."

"This serious act of espionage is another example in a long string of illicit activities that the​ People's Republic of China is conducting within and against the United States," Alan Kohler Jr., assistant director of the FBI's Counterintelligence Division said in a statement, echoing recently increasing sentiments of government and Trump administration officials accusing China of national and trade secret theft," reported nextgov.com.

The "Lifelog Project" which became the palatable name for the technology described in the "Pentagon's Diary Gets Person" Associated Press article was dressed up through a slick public relations campaign was introduced to American Universities. This allowed for the cover-up, to become part of the vernacular of the east coast academic communities who pride themselves on superior intellect.

According to sources, a Chinese lawyer, known only by his first name, Chan, who introduced himself to a congregation as a corporate lawyer in a mid-town law firm; a Chinese dentist and the leaders in the religious organization who agreed to test the technology for the Chinese for payment, effectively becoming a member of a sleeper cell, turning on their country.

The Lifelog project became the foundation for the technology's introduction into mainstream society, and the perfect front for this sleeper cell to build a layered existence. This front became a financial lifeline to multiple organizations and individuals who understood the technology violated the Constitution of the United States and provided intelligence to China.

Haute Tease