Target Profit: Fill & Download for Free

GET FORM

Download the form

How to Edit and sign Target Profit Online

Read the following instructions to use CocoDoc to start editing and completing your Target Profit:

  • To get started, direct to the “Get Form” button and tap it.
  • Wait until Target Profit is ready to use.
  • Customize your document by using the toolbar on the top.
  • Download your customized form and share it as you needed.
Get Form

Download the form

An Easy Editing Tool for Modifying Target Profit on Your Way

Open Your Target Profit with a Single Click

Get Form

Download the form

How to Edit Your PDF Target Profit Online

Editing your form online is quite effortless. There is no need to get any software on your computer or phone to use this feature. CocoDoc offers an easy tool to edit your document directly through any web browser you use. The entire interface is well-organized.

Follow the step-by-step guide below to eidt your PDF files online:

  • Find CocoDoc official website on your computer where you have your file.
  • Seek the ‘Edit PDF Online’ option and tap it.
  • Then you will visit this product page. Just drag and drop the form, or choose the file through the ‘Choose File’ option.
  • Once the document is uploaded, you can edit it using the toolbar as you needed.
  • When the modification is done, press the ‘Download’ icon to save the file.

How to Edit Target Profit on Windows

Windows is the most widespread operating system. However, Windows does not contain any default application that can directly edit PDF. In this case, you can get CocoDoc's desktop software for Windows, which can help you to work on documents productively.

All you have to do is follow the guidelines below:

  • Get CocoDoc software from your Windows Store.
  • Open the software and then upload your PDF document.
  • You can also select the PDF file from URL.
  • After that, edit the document as you needed by using the various tools on the top.
  • Once done, you can now save the customized file to your computer. You can also check more details about how to edit on PDF.

How to Edit Target Profit on Mac

macOS comes with a default feature - Preview, to open PDF files. Although Mac users can view PDF files and even mark text on it, it does not support editing. Using CocoDoc, you can edit your document on Mac without hassle.

Follow the effortless instructions below to start editing:

  • First of All, install CocoDoc desktop app on your Mac computer.
  • Then, upload your PDF file through the app.
  • You can attach the PDF from any cloud storage, such as Dropbox, Google Drive, or OneDrive.
  • Edit, fill and sign your paper by utilizing this tool.
  • Lastly, download the PDF to save it on your device.

How to Edit PDF Target Profit through G Suite

G Suite is a widespread Google's suite of intelligent apps, which is designed to make your work more efficiently and increase collaboration with each other. Integrating CocoDoc's PDF editing tool with G Suite can help to accomplish work effectively.

Here are the guidelines to do it:

  • Open Google WorkPlace Marketplace on your laptop.
  • Seek for CocoDoc PDF Editor and download the add-on.
  • Attach the PDF that you want to edit and find CocoDoc PDF Editor by clicking "Open with" in Drive.
  • Edit and sign your paper using the toolbar.
  • Save the customized PDF file on your laptop.

PDF Editor FAQ

Did the US charge two Chinese spies for a global hacking campaign that targeted COVID-19 research?

US charges two Chinese spies for a global hacking campaign that targeted COVID-19 researchU.S. prosecutors have charged two Chinese nationals, said to be working for China’s state intelligence bureau, for their alleged involvement in a massive global hacking operation that targeted hundreds of companies and governments for more than a decade.The 11-count indictment, unsealed Tuesday, alleges Li Xiaoyu, 34, and Dong Jiazhi, 33, stole terabytes of data from high-technology companies, around the world — including the United States, the prosecutors said.More recently, the prosecutors accused the hackers of targeting the networks of over a dozen U.S. companies in Maryland, Massachusetts and California developing vaccines and treatments for COVID-19.The indictment comes just weeks after both the FBI and Homeland Security warned that China was actively trying to steal U.S. research data related to the coronavirus pandemic.The FBI’s “wanted” poster for Li Xiaoyu and Dong JiazhiThe hackers were first discovered after they targeted a U.S. Department of Energy network in Hanford, Washington, the Justice Department said. The hackers also targeted companies in Australia, South Korea and several European nations. The hackers used known but unpatched vulnerabilities in widely used web server software to break into their victims’ networks. By gaining a foothold onto the network, the hackers installed password-stealing software to gain deeper access to their systems. The prosecutors said that the hackers would “frequently” return to the networks — in some cases years later.According to the indictment, the hackers stole “hundreds of millions of dollars” worth of trade secrets and intellectual property. The prosecutors also allege that the hackers stole data related to military satellite programs, military wireless networks and high-powered microwave and laser systems from defense contractors.The hackers are said to have targeted their victims on behalf of China’s intelligence services, but also hacked for personal financial gain. Prosecutors said in one case, the hackers “sought to extort cryptocurrency” from a victim company by threatening to publish the victim’s stolen source code online.John C. Demers, U.S. assistant attorney general for national security, said that the indictments were “concrete examples” of how China used hackers to “rob, replicate and replace” non-Chinese companies in the global marketplace.Demers also accused China of providing a safe-haven for the hackers.“China has now taken its place, alongside Russia, Iran and North Korea, in that shameful club of nations that provide a safe haven for cyber criminals in exchange for those criminals being ‘on call’ to work for the benefit of the state, here to feed the Chinese Communist party’s insatiable hunger for American and other non-Chinese companies’ hard-earned intellectual property, including COVID-19 research,” said Demers.Mandiant, the incident response division of security firm FireEye, said it has tracked the hackers since 2013 and the tactics, techniques and procedures used by the hackers is “consistent” with its findings.“The Chinese government has long relied on contractors to conduct cyber intrusions,” said Ben Read, senior manager of analysis at Mandiant, in an email. “Using these freelancers allows the government to access a wider array of talent, while also providing some deniability in conducting these operations.”“The pattern described in the indictment where the contractors conducted some operations on behalf of their government sponsors, while others were for their own profit is consistent with what we have seen from other China-nexus groups such as APT41,” he said, referring to the Chinese advanced persistent threat group associated with the indictment.If prosecuted, the hackers could each face more than 40 years in prison. But since the hackers are believed to still be in China, any extraditions to the U.S. are unlikely.Source:US charges two Chinese spies for a global hacking campaign that targeted COVID-19 research

What conspiracy theories turned out to be true?

MK-ULTRA: In the 1950s to the 1970s, the CIA ran a mind-control project aimed at finding a “truth serum” to use on communist spies. Test subjects were given LSD and other drugs, often without consent, and some were tortured. At least one man, civilian biochemist Frank Olson, who was working for the government, died as a result of the experiments. The project was finally exposed after investigations by the Rockefeller Commission.The Iran-Contra Affair: In 1985 and ’86, the White House authorized government officials to secretly trade weapons with the Israeli government in exchange for the release of U.S. hostages in Iran. The plot was uncovered by Congress in 1987.Operation Mockingbird: Also in the 1950s to ’70s, the CIA paid a number of well-known domestic and foreign journalists (from big-name media outlets like Time, The Washington Post, The New York Times, CBS and others) to publish CIA propaganda. The CIA also reportedly funded at least one movie, the animated “Animal Farm,” by George Orwell. The Church Committee finally exposed the activities in 1975.Watergate: Republican officials spied on the Democratic National Headquarters from the Watergate Hotel in 1972. While conspiracy theories suggested underhanded dealings were taking place, it wasn’t until 1974 that White House tape recordings linked President Nixon to the break-in and forced him to resign.The Tuskegee Syphilis Study: The United States Public Health Service carried out this clinical study on 400 poor, African-American men with syphilis from 1932 to 1972. During the study the men were given false and sometimes dangerous treatments, and adequate treatment was intentionally withheld so the agency could learn more about the disease. While the study was initially supposed to last just six months, it continued for 40 years. Close to 200 of the men died from syphilis or related complications by the end of the study.Operation Northwoods: In the early 1960s, American military leaders drafted plans to create public support for a war against Cuba, to oust Fidel Castro from power. The plans included committing acts of terrorism in U.S. cities, killing innocent people and U.S. soldiers, blowing up a U.S. ship, assassinating Cuban émigrés, sinking boats of Cuban refugees, and hijacking planes. The plans were all approved by the Joint Chiefs of Staff, but were reportedly rejected by the civilian leadership, then kept secret for nearly 40 years.Operation Snow White: Some time during the 1970s, the Church of Scientology decided that they’d had enough. Apparently, the Church of Scientology managed to perform the largest infiltration of the United States government in history. Ever. 5,000 of Scientology’s crack commandos wiretapped and burglarized various agencies. They stole hundreds of documents, mainly from the IRS. No critic was spared, and in the end, 136 organizations, agencies and foreign embassies were infiltrated.Manhattan Project: The Manhattan Project was the codename for a project conducted during World War II to develop the first atomic bomb. The project was led by the United States, and included participation from the United Kingdom and Canada. Formally designated as the Manhattan Engineer District (MED), it refers specifically to the period of the project from 1942–1946 under the control of the U.S. Army Corps of Engineers, under the administration of General Leslie R. Groves. The scientific research was directed by American physicist J. Robert Oppenheimer. The project’s roots lay in scientists’ fears since the 1930s that Nazi Germany was also investigating nuclear weapons of its own. Born out of a small research program in 1939, the Manhattan Project eventually employed more than 130,000 people and cost nearly US$2 billion ($22 billion in current value). It resulted in the creation of multiple production and research sites that operated in secret. With the total involved, this makes it one of the largest conspiracies in history. Entire towns were built for short periods of time, employing people, all under secrecy and top national secrecy at that. The government never admitted to it, the media never reported on it, and people had no idea for over 25 years. Project research took place at over thirty sites across the United States, Canada, and the United Kingdom. The three primary research and production sites of the project were the plutonium-production facility at what is now the Hanford Site, the uranium-enrichment facilities at Oak Ridge, Tennessee, and the weapons research and design laboratory now known as Los Alamos National Laboratory. The MED maintained control over U.S. weapons production until the formation of the Atomic Energy Commission in January 1947.Operation Paperclip: Operation Paperclip was the code name for the 1945 Office of Strategic Services, Joint Intelligence Objectives Agency recruitment of German scientists from Nazi Germany to the U.S. after VE Day. President Truman authorized Operation Paperclip in August 1945; however he expressly ordered that anyone found “to have been a member of the Nazi party and more than a nominal participant in its activities, or an active supporter of Nazi militarism” would be excluded. These included Wernher von Braun, Arthur Rudolph and Hubertus Strughold, who were all officially on record as Nazis and listed as a “menace to the security of the Allied Forces.” All were cleared to work in the U.S. after having their backgrounds “bleached” by the military; false employment histories were provided, and their previous Nazi affiliations were expunged from the record. The paperclips that secured newly-minted background details to their personnel files gave the operation its name.Big Brother or the Shadow Government: It is also called the “Deep State” by Peter Dale Scott, a professor at the University of California, Berkeley. A shadow government is a “government-in-waiting” that remains in waiting with the intention of taking control of a government in response to some event. It turned out this was true on 9/11, when it was told to us by our mainstream media. For years, this was ridiculed as a silly, crazy conspiracy theory and, like the others listed here, turned out to be 100% true. It is also called the Continuity of Government. The Continuity of Government (COG) is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. Since the end of the cold war, the policies and procedures for the COG have been altered according to realistic threats of that time. These include but are not limited to a possible coup or overthrow by right wing terrorist groups, a terrorist attack in general, an assassination, and so on. Believe it or not the COG has been in effect since 2001. After 9/11, it went into action. Now here is the kicker, many of the figures in Iran Contra, the Watergate Scandal, the alleged conspiracy to assassinate Kennedy, and many others listed here are indeed members of the COG. This is its own conspiracy as well.1990 Testimony of Nayirah: A 15-year-old girl named “Nayirah” testified before the U.S. Congress that she had seen Iraqi soldiers pulling Kuwaiti babies from incubators, causing them to die. The testimony helped gain major public support for the 1991 Gulf War, but — despite protests that the dispute of this story was itself a conspiracy theory — it was later discovered that the testimony was false. The public relations firm Hill & Knowlton, which was in the employ of Citizens for a Free Kuwait, had arranged the testimony. It turned out that she had taken acting lessons on request of the CIA and was actually the niece of a major politician in Kuwait. Nayirah was later disclosed to be Nayirah al-Sabah, daughter of Saud bin Nasir Al-Sabah, Kuwaiti ambassador to the USA. The Congressional Human Rights Caucus, of which Congressman Tom Lantos was co-chairman, had been responsible for hosting Nurse Nayirah, and thereby popularizing her allegations. When the girl’s account was later challenged by independent human rights monitors, Lantos replied, “The notion that any of the witnesses brought to the caucus through the Kuwaiti Embassy would not be credible did not cross my mind… I have no basis for assuming that her story is not true, but the point goes beyond that. If one hypothesizes that the woman’s story is fictitious from A to Z, that in no way diminishes the avalanche of human rights violations.” Nevertheless, the senior Republican on the Human Rights Caucus, John Edward Porter, responded to the revelations “by saying that if he had known the girl was the ambassador’s daughter, he would not have allowed her to testify.”Counter Intelligence Programs Against Activists in the 60s: COINTELPRO (an acronym for Counter Intelligence Program) was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at investigating and disrupting dissident political organizations within the United States. The FBI used covert operations from its inception, however formal COINTELPRO operations took place between 1956 and 1971. The FBI’s stated motivation at the time was “protecting national security, preventing violence, and maintaining the existing social and political order.” According to FBI records, 85% of COINTELPRO resources were expended on infiltrating, disrupting, marginalizing, and/or subverting groups suspected of being subversive, such as communist and socialist organizations; the women’s rights movement; militant black nationalist groups, and the non-violent civil rights movement, including individuals such as Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, the National Association for the Advancement of Colored People, the Congress of Racial Equality, the American Indian Movement, and other civil rights groups; a broad range of organizations labeled “New Left”, including Students for a Democratic Society, the National Lawyers Guild, the Weathermen, almost all groups protesting the Vietnam War, and even individual student demonstrators with no group affiliation; and nationalist groups such as those “seeking independence for Puerto Rico.” The other 15% of COINTELPRO resources were expended to marginalize and subvert “white hate groups,” including the Ku Klux Klan and National States’ Rights Party. The directives governing COINTELPRO were issued by FBI Director J. Edgar Hoover, who ordered FBI agents to “expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of these movements and their leaders.The BCCI Scandal: The Bank of Credit and Commerce International (BCCI) was a major international bank founded in 1972 by Agha Hasan Abedi, a Pakistani financier. The Bank was registered in Luxembourg. Within a decade BCCI touched its peak, it operated in 78 countries, had over 400 branches, and had assets in excess of US$ 20 billion making it the 7th largest private bank in the world by assets. In the late 1980’s BCCI became the target of a two year undercover operation conducted by the US Customs Service. This operation concluded with a fake wedding that was attended by BCCI officers and drug dealers from around the world who had established a personal friendship and working relationship with undercover Special Agent Robert Mazur. After a six month trial in Tampa, key bank officers were convicted and received lengthy prison sentences. Bank officers began cooperating with law enforcement authorities and that cooperation caused BCCI’s many crimes to be revealed. BCCI came under the scrutiny of regulatory bodies and intelligence agencies in the 1980s due to its perceived avoidance of falling under one regulatory banking authority, a fact that was later, after extensive investigations, proven to be false. BCCI became the focus of a massive regulatory battle in 1991 and was described as a “$20-billion-plus heist”. Investigators in the U.S. and the UK revealed that BCCI had been “set up deliberately to avoid centralized regulatory review, and operated extensively in bank secrecy jurisdictions. Its affairs were extraordinarily complex. Its officers were sophisticated international bankers whose apparent objective was to keep their affairs secret, to commit fraud on a massive scale, and to avoid detection.”CIA Drug Running in LA: Pulitzer Prize Award winning journalist Gary Webb exposed this alongside LAPD Narcotics Officer turned whislteblower and author Michael Ruppert, CIA Contract Pilot Terry Reed, and many others. In August 1996 the San Jose Mercury News published Webb’s “Dark Alliance”, a 20,000 word, three-part investigative series which alleged that Nicaraguan drug traffickers had sold and distributed crack cocaine in Los Angeles during the 1980s, and that drug profits were used to fund the CIA-supported Nicaraguan Contras. Webb never asserted that the CIA directly aided drug dealers to raise money for the Contras, but he did document that the CIA was aware of the cocaine transactions and the large shipments of cocaine into the U.S. by the Contra personnel. “Dark Alliance” received national attention. At the height of the interest, the web version of it on San Jose Mercury News website received 1.3 million hits a day. According to the Columbia Journalism Review, the series became “the most talked-about piece of journalism in 1996 and arguably the most famous—some would say infamous—set of articles of the decade.”CIA Drug Smuggling in Arkansas: August 23, 1987, in a rural community just south of Little Rock, police officers murdered two teenage boys because they witnessed a police-protected drug drop. The drop was part of a drug smuggling operation based at a small airport in Mena, Arkansas. The Mena operation was set up in the early 1980’s by the notorious drug smuggler, Barry Seal. Facing prison after a drug conviction in Florida, Seal flew to Washington, D.C., where he put together a deal that allowed him to avoid prison by becoming an informant for the government. As a government informant against drug smugglers, Seal testified he worked for the CIA and the DEA. In one federal court case, he testified that his income from March 1984 to August 1985, was between $700,000 and $800,000. This period was AFTER making his deal with the government. Seal testified that nearly $600,000 of this came from smuggling drugs while working for — and with the permission of the DEA. In addition to his duties as an informant, Seal was used by CIA operatives to help finance the Nicaraguan Contras. The CIA connection to the Mena operation was undeniable when a cargo plane given to Seal by the CIA was shot down over Nicaragua with a load of weapons. In spite of the evidence, every investigator who has tried to expose the crimes of Mena has been professionally destroyed, and those involved in drug smuggling operations have received continued protection from state and federal authorities.The CIA Assassinates A Lot Of People (Church Committee): The Church Committee is the common term referring to the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, a U.S. Senate committee chaired by Senator Frank Church in 1975. A precursor to the U.S. Senate Select Committee on Intelligence, the committee investigated intelligence gathering for illegality by the CIA and FBI after certain activities had been revealed by the Watergate affair. The Committee uncovered, among many other things, that the CIA had violated its charter to perform only gathering of intelligence. For example, the assassinations of Allende in Chile and Mossadegh in Iran. Assassinations against Central and South American leaders and revolutionaries, as well as Africa, Middle East and East Asia. The list was tremendous. They even declassified a “Heart Attack Gun” the Agency had made for the use of killing someone without it being detected. Cancer, car accidents, skiing accidents, suicide, boating accidents, heart attacks, and just plain being shot were common assassination methods. The hearings, although recorded in full in congressional record, the mainstream media and official policies, is still largely not taught in American schools on recent history. The American public still has no idea this was ever actually confirmed or even took place. It is common for people to still refer to any of these assassinations as a joke or made up conspiracy.Gulf of Tonkin Never Happened: The Gulf of Tonkin Incident is the name given to two separate incidents involving the Democratic Republic of Vietnam and the United States in the waters of the Gulf of Tonkin. On August 2, 1964 two American destroyers engaged three North Vietnamese torpedo boats, resulting in the sinking of one of the torpedo boats. This was also the single most important reason for the escalation of the Vietnam War. After Kennedy was assassinated, the Gulf of Tonkin gave the country the sweeping support for aggressive military action against the North Vietnamese. The outcome of the incident was the passage by Congress of the Gulf of Tonkin Resolution, which granted President Lyndon B. Johnson the authority to assist any Southeast Asian country whose government was considered to be jeopardized by “communist aggression”. In 2005, an internal National Security Agency historical study was declassified; it concluded that USS Maddox had engaged the North Vietnamese on August 2, but that there may not have been any North Vietnamese vessels present during the engagement of August 4. The report stated “It is not simply that there is a different story as to what happened; it is that no attack happened that night…” In truth, Hanoi’s navy was engaged in nothing that night but the salvage of two of the boats damaged on August 2. In 1965, President Johnson commented privately: “For all I know, our Navy was shooting at whales out there.” In 1981, Captain Herrick and journalist Robert Scheer re-examined Herrick’s ship’s log and determined that the first torpedo report from August 4, which Herrick had maintained had occurred—the “apparent ambush”—was in fact unfounded. In 1995, retired Vietnamese Defense Minister Vo Nguyen Giap, meeting with former Secretary of Defense McNamara, categorically denied that Vietnamese gunboats had attacked American destroyers on August 4, while admitting to the attack on August 2. In the Fall of 1999, retired senior CIA engineering executive S. Eugene Poteat wrote that he was asked in early August 1964 to determine if the radar operator’s report showed a real torpedo boat attack or an imagined one. In October, 2005 the New York Times reported that Robert J. Hanyok, a historian for the U.S. National Security Agency, had concluded that the NSA deliberately distorted the intelligence reports that it had passed on to policy-makers regarding the August 4, 1964 incident. He concluded that the motive was not political but was probably to cover up honest intelligence errors.Operation Gladio: Gladio is a code name denoting the clandestine NATO “stay-behind” operation in Italy after World War II, intended to continue anti-communist resistance in the event of a Warsaw Pact invasion of Western Europe. Although Gladio specifically refers to the Italian branch of the NATO stay-behind organizations, “Operation Gladio” is used as an informal name for all stay-behind organizations, sometimes called “Super NATO”. The role of the Central Intelligence Agency (CIA) in sponsoring Gladio and the extent of its activities during the Cold War era, and its relationship to right-wing terrorist attacks perpetrated in Italy during the Years of Lead and other similar clandestine operations is the subject of ongoing debate and investigation. Italy, Switzerland and Belgium have had parliamentary inquiries into the matter. What can we prove about that role? Thousands of documents, depositions and testimony as well as recorded conversations and admission by the highest levels of government in Italy. That’s about as credible as it gets, regardless of the CIA’s adamant denial it ever happened. What took place? The shooting of innocent civilians, terrorism and assassinations all blamed on leftist communists were actually apart of well coordinated, “black operations.” Black operations are typically involving activities that are highly clandestine and, often, outside of standard military protocol.“The right hand doesn’t know what the left hand is doing.” Black ops missions often fit into the deniable category, a situation in which there is no claim of responsibility for the action, and/or a false flag operation is used to give the appearance that another actor was responsible, or – most often – black operations involve extensive arrangements so as to be able to hide the fact that the black operation ever occurred. Black military operations, or paramilitary operations, can be used by various secret services to achieve or attempt to achieve an unusually sensitive goal. The methods used in black operations are also used in unconventional warfare. Depending on the precise situation in a given case, and the level of authoritarianism of the national government or other responsible party, some tasks will be conducted as black operations, while there are usually other activities that can be admitted openly. Black operations may include such things as assassination, sabotage, extortion, spying on allied countries or one’s own citizens, kidnapping, supporting resistance movements, torture, use of fraud to obtain funds, use of child soldiers, human experimentation, trafficking in contraband items, etc. Since 9/11, many black operations and long time unethical standings have been approved for legality in the war on terror. In other words, since September 11th, 2001, it is no a longer conspiracy for any of this to occur, a simple decision by a top level military or CIA official is enough, without oversight or even one thread of admission by the Government or Private conspirators. Much of the Black operations today are performed by private contract companies like Blackwater (now Xe).[1]Footnotes[1] 33 Conspiracy Theories That Turned Out To Be True, What Every Person Should Know... » Alex Jones' Infowars: There's a war on for your mind!

What is the biggest government conspiracy that ended up being true or becoming unclassified?

Take your pick:[1]MK-ULTRA: In the 1950s to the 1970s, the CIA ran a mind-control project aimed at finding a “truth serum” to use on communist spies. Test subjects were given LSD and other drugs, often without consent, and some were tortured. At least one man, civilian biochemist Frank Olson, who was working for the government, died as a result of the experiments. The project was finally exposed after investigations by the Rockefeller Commission.The Iran-Contra Affair: In 1985 and ’86, the White House authorized government officials to secretly trade weapons with the Israeli government in exchange for the release of U.S. hostages in Iran. The plot was uncovered by Congress in 1987.Operation Mockingbird: Also in the 1950s to ’70s, the CIA paid a number of well-known domestic and foreign journalists (from big-name media outlets like Time, The Washington Post, The New York Times, CBS and others) to publish CIA propaganda. The CIA also reportedly funded at least one movie, the animated “Animal Farm,” by George Orwell. The Church Committee finally exposed the activities in 1975.Watergate: Republican officials spied on the Democratic National Headquarters from the Watergate Hotel in 1972. While conspiracy theories suggested underhanded dealings were taking place, it wasn’t until 1974 that White House tape recordings linked President Nixon to the break-in and forced him to resign.The Tuskegee Syphilis Study: The United States Public Health Service carried out this clinical study on 400 poor, African-American men with syphilis from 1932 to 1972. During the study the men were given false and sometimes dangerous treatments, and adequate treatment was intentionally withheld so the agency could learn more about the disease. While the study was initially supposed to last just six months, it continued for 40 years. Close to 200 of the men died from syphilis or related complications by the end of the study.Operation Northwoods: In the early 1960s, American military leaders drafted plans to create public support for a war against Cuba, to oust Fidel Castro from power. The plans included committing acts of terrorism in U.S. cities, killing innocent people and U.S. soldiers, blowing up a U.S. ship, assassinating Cuban émigrés, sinking boats of Cuban refugees, and hijacking planes. The plans were all approved by the Joint Chiefs of Staff, but were reportedly rejected by the civilian leadership, then kept secret for nearly 40 years.Operation Snow White: Some time during the 1970s, the Church of Scientology decided that they’d had enough. Apparently, the Church of Scientology managed to perform the largest infiltration of the United States government in history. Ever. 5,000 of Scientology’s crack commandos wiretapped and burglarized various agencies. They stole hundreds of documents, mainly from the IRS. No critic was spared, and in the end, 136 organizations, agencies and foreign embassies were infiltrated.Manhattan Project: The Manhattan Project was the codename for a project conducted during World War II to develop the first atomic bomb. The project was led by the United States, and included participation from the United Kingdom and Canada. Formally designated as the Manhattan Engineer District (MED), it refers specifically to the period of the project from 1942–1946 under the control of the U.S. Army Corps of Engineers, under the administration of General Leslie R. Groves. The scientific research was directed by American physicist J. Robert Oppenheimer. The project’s roots lay in scientists’ fears since the 1930s that Nazi Germany was also investigating nuclear weapons of its own. Born out of a small research program in 1939, the Manhattan Project eventually employed more than 130,000 people and cost nearly US$2 billion ($22 billion in current value). It resulted in the creation of multiple production and research sites that operated in secret. With the total involved, this makes it one of the largest conspiracies in history. Entire towns were built for short periods of time, employing people, all under secrecy and top national secrecy at that. The government never admitted to it, the media never reported on it, and people had no idea for over 25 years. Project research took place at over thirty sites across the United States, Canada, and the United Kingdom. The three primary research and production sites of the project were the plutonium-production facility at what is now the Hanford Site, the uranium-enrichment facilities at Oak Ridge, Tennessee, and the weapons research and design laboratory now known as Los Alamos National Laboratory. The MED maintained control over U.S. weapons production until the formation of the Atomic Energy Commission in January 1947.Operation Paperclip: Operation Paperclip was the code name for the 1945 Office of Strategic Services, Joint Intelligence Objectives Agency recruitment of German scientists from Nazi Germany to the U.S. after VE Day. President Truman authorized Operation Paperclip in August 1945; however he expressly ordered that anyone found “to have been a member of the Nazi party and more than a nominal participant in its activities, or an active supporter of Nazi militarism” would be excluded. These included Wernher von Braun, Arthur Rudolph and Hubertus Strughold, who were all officially on record as Nazis and listed as a “menace to the security of the Allied Forces.” All were cleared to work in the U.S. after having their backgrounds “bleached” by the military; false employment histories were provided, and their previous Nazi affiliations were expunged from the record. The paperclips that secured newly-minted background details to their personnel files gave the operation its name.Big Brother or the Shadow Government: It is also called the “Deep State” by Peter Dale Scott, a professor at the University of California, Berkeley. A shadow government is a “government-in-waiting” that remains in waiting with the intention of taking control of a government in response to some event. It turned out this was true on 9/11, when it was told to us by our mainstream media. For years, this was ridiculed as a silly, crazy conspiracy theory and, like the others listed here, turned out to be 100% true. It is also called the Continuity of Government. The Continuity of Government (COG) is the principle of establishing defined procedures that allow a government to continue its essential operations in case of nuclear war or other catastrophic event. Since the end of the cold war, the policies and procedures for the COG have been altered according to realistic threats of that time. These include but are not limited to a possible coup or overthrow by right wing terrorist groups, a terrorist attack in general, an assassination, and so on. Believe it or not the COG has been in effect since 2001. After 9/11, it went into action. Now here is the kicker, many of the figures in Iran Contra, the Watergate Scandal, the alleged conspiracy to assassinate Kennedy, and many others listed here are indeed members of the COG. This is its own conspiracy as well.1990 Testimony of Nayirah: A 15-year-old girl named “Nayirah” testified before the U.S. Congress that she had seen Iraqi soldiers pulling Kuwaiti babies from incubators, causing them to die. The testimony helped gain major public support for the 1991 Gulf War, but — despite protests that the dispute of this story was itself a conspiracy theory — it was later discovered that the testimony was false. The public relations firm Hill & Knowlton, which was in the employ of Citizens for a Free Kuwait, had arranged the testimony. It turned out that she had taken acting lessons on request of the CIA and was actually the niece of a major politician in Kuwait. Nayirah was later disclosed to be Nayirah al-Sabah, daughter of Saud bin Nasir Al-Sabah, Kuwaiti ambassador to the USA. The Congressional Human Rights Caucus, of which Congressman Tom Lantos was co-chairman, had been responsible for hosting Nurse Nayirah, and thereby popularizing her allegations. When the girl’s account was later challenged by independent human rights monitors, Lantos replied, “The notion that any of the witnesses brought to the caucus through the Kuwaiti Embassy would not be credible did not cross my mind… I have no basis for assuming that her story is not true, but the point goes beyond that. If one hypothesizes that the woman’s story is fictitious from A to Z, that in no way diminishes the avalanche of human rights violations.” Nevertheless, the senior Republican on the Human Rights Caucus, John Edward Porter, responded to the revelations “by saying that if he had known the girl was the ambassador’s daughter, he would not have allowed her to testify.”Counter Intelligence Programs Against Activists in the 60s: COINTELPRO (an acronym for Counter Intelligence Program) was a series of covert, and often illegal, projects conducted by the United States Federal Bureau of Investigation (FBI) aimed at investigating and disrupting dissident political organizations within the United States. The FBI used covert operations from its inception, however formal COINTELPRO operations took place between 1956 and 1971. The FBI’s stated motivation at the time was “protecting national security, preventing violence, and maintaining the existing social and political order.” According to FBI records, 85% of COINTELPRO resources were expended on infiltrating, disrupting, marginalizing, and/or subverting groups suspected of being subversive, such as communist and socialist organizations; the women’s rights movement; militant black nationalist groups, and the non-violent civil rights movement, including individuals such as Martin Luther King, Jr. and others associated with the Southern Christian Leadership Conference, the National Association for the Advancement of Colored People, the Congress of Racial Equality, the American Indian Movement, and other civil rights groups; a broad range of organizations labeled “New Left”, including Students for a Democratic Society, the National Lawyers Guild, the Weathermen, almost all groups protesting the Vietnam War, and even individual student demonstrators with no group affiliation; and nationalist groups such as those “seeking independence for Puerto Rico.” The other 15% of COINTELPRO resources were expended to marginalize and subvert “white hate groups,” including the Ku Klux Klan and National States’ Rights Party. The directives governing COINTELPRO were issued by FBI Director J. Edgar Hoover, who ordered FBI agents to “expose, disrupt, misdirect, discredit, or otherwise neutralize” the activities of these movements and their leaders.The BCCI Scandal: The Bank of Credit and Commerce International (BCCI) was a major international bank founded in 1972 by Agha Hasan Abedi, a Pakistani financier. The Bank was registered in Luxembourg. Within a decade BCCI touched its peak, it operated in 78 countries, had over 400 branches, and had assets in excess of US$ 20 billion making it the 7th largest private bank in the world by assets. In the late 1980’s BCCI became the target of a two year undercover operation conducted by the US Customs Service. This operation concluded with a fake wedding that was attended by BCCI officers and drug dealers from around the world who had established a personal friendship and working relationship with undercover Special Agent Robert Mazur. After a six month trial in Tampa, key bank officers were convicted and received lengthy prison sentences. Bank officers began cooperating with law enforcement authorities and that cooperation caused BCCI’s many crimes to be revealed. BCCI came under the scrutiny of regulatory bodies and intelligence agencies in the 1980s due to its perceived avoidance of falling under one regulatory banking authority, a fact that was later, after extensive investigations, proven to be false. BCCI became the focus of a massive regulatory battle in 1991 and was described as a “$20-billion-plus heist”. Investigators in the U.S. and the UK revealed that BCCI had been “set up deliberately to avoid centralized regulatory review, and operated extensively in bank secrecy jurisdictions. Its affairs were extraordinarily complex. Its officers were sophisticated international bankers whose apparent objective was to keep their affairs secret, to commit fraud on a massive scale, and to avoid detection.”CIA Drug Running in LA: Pulitzer Prize Award winning journalist Gary Webb exposed this alongside LAPD Narcotics Officer turned whislteblower and author Michael Ruppert, CIA Contract Pilot Terry Reed, and many others. In August 1996 the San Jose Mercury News published Webb’s “Dark Alliance”, a 20,000 word, three-part investigative series which alleged that Nicaraguan drug traffickers had sold and distributed crack cocaine in Los Angeles during the 1980s, and that drug profits were used to fund the CIA-supported Nicaraguan Contras. Webb never asserted that the CIA directly aided drug dealers to raise money for the Contras, but he did document that the CIA was aware of the cocaine transactions and the large shipments of cocaine into the U.S. by the Contra personnel. “Dark Alliance” received national attention. At the height of the interest, the web version of it on San Jose Mercury News website received 1.3 million hits a day. According to the Columbia Journalism Review, the series became “the most talked-about piece of journalism in 1996 and arguably the most famous—some would say infamous—set of articles of the decade.”CIA Drug Smuggling in Arkansas: August 23, 1987, in a rural community just south of Little Rock, police officers murdered two teenage boys because they witnessed a police-protected drug drop. The drop was part of a drug smuggling operation based at a small airport in Mena, Arkansas. The Mena operation was set up in the early 1980’s by the notorious drug smuggler, Barry Seal. Facing prison after a drug conviction in Florida, Seal flew to Washington, D.C., where he put together a deal that allowed him to avoid prison by becoming an informant for the government. As a government informant against drug smugglers, Seal testified he worked for the CIA and the DEA. In one federal court case, he testified that his income from March 1984 to August 1985, was between $700,000 and $800,000. This period was AFTER making his deal with the government. Seal testified that nearly $600,000 of this came from smuggling drugs while working for — and with the permission of the DEA. In addition to his duties as an informant, Seal was used by CIA operatives to help finance the Nicaraguan Contras. The CIA connection to the Mena operation was undeniable when a cargo plane given to Seal by the CIA was shot down over Nicaragua with a load of weapons. In spite of the evidence, every investigator who has tried to expose the crimes of Mena has been professionally destroyed, and those involved in drug smuggling operations have received continued protection from state and federal authorities.The CIA Assassinates A Lot Of People (Church Committee): The Church Committee is the common term referring to the United States Senate Select Committee to Study Governmental Operations with Respect to Intelligence Activities, a U.S. Senate committee chaired by Senator Frank Church in 1975. A precursor to the U.S. Senate Select Committee on Intelligence, the committee investigated intelligence gathering for illegality by the CIA and FBI after certain activities had been revealed by the Watergate affair. The Committee uncovered, among many other things, that the CIA had violated its charter to perform only gathering of intelligence. For example, the assassinations of Allende in Chile and Mossadegh in Iran. Assassinations against Central and South American leaders and revolutionaries, as well as Africa, Middle East and East Asia. The list was tremendous. They even declassified a “Heart Attack Gun” the Agency had made for the use of killing someone without it being detected. Cancer, car accidents, skiing accidents, suicide, boating accidents, heart attacks, and just plain being shot were common assassination methods. The hearings, although recorded in full in congressional record, the mainstream media and official policies, is still largely not taught in American schools on recent history. The American public still has no idea this was ever actually confirmed or even took place. It is common for people to still refer to any of these assassinations as a joke or made up conspiracy.Gulf of Tonkin Never Happened: The Gulf of Tonkin Incident is the name given to two separate incidents involving the Democratic Republic of Vietnam and the United States in the waters of the Gulf of Tonkin. On August 2, 1964 two American destroyers engaged three North Vietnamese torpedo boats, resulting in the sinking of one of the torpedo boats. This was also the single most important reason for the escalation of the Vietnam War. After Kennedy was assassinated, the Gulf of Tonkin gave the country the sweeping support for aggressive military action against the North Vietnamese. The outcome of the incident was the passage by Congress of the Gulf of Tonkin Resolution, which granted President Lyndon B. Johnson the authority to assist any Southeast Asian country whose government was considered to be jeopardized by “communist aggression”. In 2005, an internal National Security Agency historical study was declassified; it concluded that USS Maddox had engaged the North Vietnamese on August 2, but that there may not have been any North Vietnamese vessels present during the engagement of August 4. The report stated “It is not simply that there is a different story as to what happened; it is that no attack happened that night…” In truth, Hanoi’s navy was engaged in nothing that night but the salvage of two of the boats damaged on August 2. In 1965, President Johnson commented privately: “For all I know, our Navy was shooting at whales out there.” In 1981, Captain Herrick and journalist Robert Scheer re-examined Herrick’s ship’s log and determined that the first torpedo report from August 4, which Herrick had maintained had occurred—the “apparent ambush”—was in fact unfounded. In 1995, retired Vietnamese Defense Minister Vo Nguyen Giap, meeting with former Secretary of Defense McNamara, categorically denied that Vietnamese gunboats had attacked American destroyers on August 4, while admitting to the attack on August 2. In the Fall of 1999, retired senior CIA engineering executive S. Eugene Poteat wrote that he was asked in early August 1964 to determine if the radar operator’s report showed a real torpedo boat attack or an imagined one. In October, 2005 the New York Times reported that Robert J. Hanyok, a historian for the U.S. National Security Agency, had concluded that the NSA deliberately distorted the intelligence reports that it had passed on to policy-makers regarding the August 4, 1964 incident. He concluded that the motive was not political but was probably to cover up honest intelligence errors.Operation Gladio: Gladio is a code name denoting the clandestine NATO “stay-behind” operation in Italy after World War II, intended to continue anti-communist resistance in the event of a Warsaw Pact invasion of Western Europe. Although Gladio specifically refers to the Italian branch of the NATO stay-behind organizations, “Operation Gladio” is used as an informal name for all stay-behind organizations, sometimes called “Super NATO”. The role of the Central Intelligence Agency (CIA) in sponsoring Gladio and the extent of its activities during the Cold War era, and its relationship to right-wing terrorist attacks perpetrated in Italy during the Years of Lead and other similar clandestine operations is the subject of ongoing debate and investigation. Italy, Switzerland and Belgium have had parliamentary inquiries into the matter. What can we prove about that role? Thousands of documents, depositions and testimony as well as recorded conversations and admission by the highest levels of government in Italy. That’s about as credible as it gets, regardless of the CIA’s adamant denial it ever happened. What took place? The shooting of innocent civilians, terrorism and assassinations all blamed on leftist communists were actually apart of well coordinated, “black operations.” Black operations are typically involving activities that are highly clandestine and, often, outside of standard military protocol.“The right hand doesn’t know what the left hand is doing.” Black ops missions often fit into the deniable category, a situation in which there is no claim of responsibility for the action, and/or a false flag operation is used to give the appearance that another actor was responsible, or – most often – black operations involve extensive arrangements so as to be able to hide the fact that the black operation ever occurred. Black military operations, or paramilitary operations, can be used by various secret services to achieve or attempt to achieve an unusually sensitive goal. The methods used in black operations are also used in unconventional warfare. Depending on the precise situation in a given case, and the level of authoritarianism of the national government or other responsible party, some tasks will be conducted as black operations, while there are usually other activities that can be admitted openly. Black operations may include such things as assassination, sabotage, extortion, spying on allied countries or one’s own citizens, kidnapping, supporting resistance movements, torture, use of fraud to obtain funds, use of child soldiers, human experimentation, trafficking in contraband items, etc. Since 9/11, many black operations and long time unethical standings have been approved for legality in the war on terror. In other words, since September 11th, 2001, it is no a longer conspiracy for any of this to occur, a simple decision by a top level military or CIA official is enough, without oversight or even one thread of admission by the Government or Private conspirators. Much of the Black operations today are performed by private contract companies like Blackwater (now Xe).Footnotes[1] 33 Conspiracy Theories That Turned Out To Be True, What Every Person Should Know... » Alex Jones' Infowars: There's a war on for your mind!

View Our Customer Reviews

I have had some requests regarding my Filmora CocoDoc license and have experienced their fantastic customer service. I'm impressed!

Justin Miller