Ad

Tuesday, July 14, 2009

All In the Name of Research...What Am I Into Now?!

In talking with my husband, I theorized that the beached squid from the incident in California might be found to be the result of the ElectroMagnetic Field changes. With recent theories that include the changes ocurring, not only in the various atmosphere layers, but also in the Earth's core, it would logically cause an animal of habit and instinct to become disoriented and therefore beached. This would also explain the Earthquake activity to some degree.

Well, I decided to look into this further. Not to bore you with scientific research and documentation, I wound up in a research area that I didn't expect. I wound up in warfare and terrorism.

Therefore, I will give you a couple of my findings in tonights post and continue to research this issue further. For some reason, it is extremely fascinating to me to try to put together this puzzle.

"...Former US defence secretary William Cohen warns: "Terrorists are engaging even in an eco-type of terrorism whereby they can alter the climate, set off earthquakes and volcanoes remotely through the use of electromagnetic waves. It's real, and that's the reason why we have to intensify our efforts."

Owen Greene, director of research at Bradford University's department of Peace Studies, believes efforts are continuing in secret to develop weapons that harness nature."

Global Research

If the above statement doesn't start getting your curiosity going, try looking at this link for HAARP. It is interesting that there is this statement about this site...

"This is a U.S. Government Computer System
This computer system operates as a world wide web server to provide information to the public concerning unclassified programs only. You may freely access all of the files and images that have been made available on the various home pages hosted by this server. Spend as much or as little time as you wish but remember that this is a U. S. Government computer system. This system is monitored to ensure proper operation, to verify the functioning of applicable security features, and for other like purposes. Use of this service constitutes consent to such monitoring. Unauthorized attempts to upload or change information; to defeat or circumvent security features; or to utilize this system for other than its intended purposes are prohibited and may result in prosecution under the Computer Fraud and Abuse Act of 1986 or other applicable statutes and regulations."

More to come.

No comments: