Category Archives: Targeted Individuals
How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.
What is a Web Troll?
by H. Michael Sweeney
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How does being a web troll work?
UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.
Are you being targeted by online government trolls
How Social Network Trolls Target, Track, and Psychologically Profile You
Reading this post you will learn…• That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU; • That there are troll profiling and tracking tools or methods which can be recognized; • That there are ways to protect yourself without drawing more unwanted attention; • That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting. Is social media infiltrated by government trolls?
Government and Commercial Trolls
Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.
These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.
The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.
Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.
And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.
How can you spot a social media troll?
Differentiating an innocent graphic from a potential spy tool…
There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.
So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.
Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic. YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:
So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?
When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.
Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”
Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.
Are social media trolls sociopaths or psychopaths?
More Direct Trolls; Psyops and Sociopaths
The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.
Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.
Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.
But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?
Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.
Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).
It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.
Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.
This is also true of the sociopathic/psychopathic ‘cause’ trolls.
Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.
Can trolls lead to real-world targeting?
Dangerous escalations; why we dare not ignore trolls
The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.
And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.
But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’
What should I do if I encounter a social media troll?
What to do with a Troll
I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.
But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.
My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.
Are social media trolls dangerous?
Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it. The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.
And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.
It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.
What you believe determines how you react under and are able to defend against targeting. That’s a key reason that targets are psychologically profiled before targeting even begins; the enemy needs to know what chains best to jerk. Turns out, there’s a simple way to jerk back.
Free will: a Tis greatest asset, oft hardest to employby H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What can you do if you are a targeted individual?
What you will learn reading this in-depth post…
- That belief structures define us, establish our psychology, and our responses to stimuli;
- There are many ways targeting both takes advantage of and yet alters beliefs to weaken the will to resist;
- Will power equates to Free Will, the greatest gift of God to Man short of salvation through Christ and life, itself;
- The pitfalls of targeting psychology as it relates to Free Will, and;
- How to use Free Will to thwart targeting and run psyops on the perps.
Where do you get help if you are a targeted individual?
Challenge][ As author, lecturer, and consultant on personal privacy and security, and abuse of power, I invite the reader, especially if a Targeted Individual (TI), to make a comparison. Compare the nature and content of this post with the typical posts or emailed materials by other persons offering insight into targeting methods or technology, and/or defensive tactics. Then decide which closer resembles the reality of your experience, and which plays instead to the very fears and results ascribed herein to be unexpected weapons. You become what you believe: let's take an in-depth and lengthy examination, and see...
Is the information offered insightful and helpful, or more likely to lead the victim deeper into the proverbial Rabbit Hole of dread. There is a difference between education and helpful advice through understanding (what a consultant or educator tries to provide), and the rhetoric and trivial dialogs of technospeak or psychobabble offered with questionable veracity, something closer to beliefs and opinions, or even mis- or disintormation than well-sourced facts — regardless of if offered with good intent, or ill.
Topic][ We are talking about TI’s, Targeted Individuals, of course; persons harassed endlessly by organized groups using Political Control Technology (PCT), which can mean any number of things from gang stalking to electronic weapons, and much, much more. PCT is military and intelligence community developed technology, so if one is targeted, the perpetrators (‘Perps’) are almost always from those quarters, or from parties with whom they interact, undertaken for political or criminal purposes.
We should be grateful, in a way, for PCT. Prior to advances in PCT made since WW II, when a person became a roadblock or threat to a political agenda or criminal plot, they were simply done away with; murdered, typically a ‘wet job’ assassination or, if time allowed, dealt ‘an accident,’ or what we call ‘heart attacked.’ PCT, however, allows a whole new way of dealing with ‘inconvenient’ person who are not quite an immediate threat, thus avoiding the pitfalls of murder investigations and unwanted publicity they entail, and dangerous questions they raise.
When the target is a person of wealth and power, or public influence, it is less likely to be used. PCT works best on those unable to afford exotic defenses which would render it near useless, if not completely pointless. Those in the public eye may be too well observed already to risk deployment of useful PCT methods without risking detection by third parties. PCT only works when no one believes it is being used except the target. So unless they can first financially destroy or socially discredit such persons, they may elect instead a good old fashioned murder. Ask Vince Foster, Ron Brown, or even Marilyn Monroe or Princess Di. People with high credulity working for them can’t answer hurtful questions once they are dead.
Perps often fear victims][ It is fear that such questions might be answered by the target which drives any consideration for either assassination or PCT. When someone is thus targeted, it can be said they actually fear the target, fear them enough to justify ‘self defense’ and pre-emptive action. Thus the TI may actually hold an ace up their sleeve and simply not know it.
Part of my job as consultant is to seek to see if that is the case, identify it, and wield it as offensive weapon. For such victims, PCT was elected as a preferred method not just because it seems safer, but because of the way it works; the goal of PCT is to render the target into a social, financial, and political zero. No one pays attention to a zero, it is nothing of value to them.
This targeting achieves by making the victim seem crazy; no one wants to believe in the Boogeyman, so when they start talking about being targeted, they are presumed paranoiac and/or schizophrenic, and discounted. Once they achieve this status, of course, neither will anyone believe any information they may offer which caused them to be feared in the first place, even if they have evidence which might otherwise raise eyebrows. But that does not mean the information has no power over perps, if realized and properly used.
Other reasons for targeting][ This is not the only reason for targeting, however. One cannot deploy technology without training users on the methods and devices involved, and that requires live, unwitting subjects. In like manner, one cannot develop devices and improve method without experimenting on human Guinea Pigs. This is all fact, and even found in the Congressional Record (Church and Rockefeller Commission Reports), but for some reason, we still can’t quite believe in the Boogeyman enough to consider the possibility that someone is telling the truth when they complain of targeting. Finally, one can also be targeted for joy riding (psychopathic pleasures) or vendetta — both forms essentially an abuse of power through access to the technology for personal reasons.
The reason one is targeted often defines the entire game, including best defense strategy. But that is beyond the scope of this post, and indeed, inappropriate — because every situation, though perhaps similar in generic description to another, will have sufficient variables in play such that strategies should be tailored to the individual circumstance. Environmental, social, and personal matters all come into play, and more.
Why won't people believe it when someone says they are being targeted?
It gets tricky
Self as a weapon][ The first step in targeting is surveillance from afar and the development of a psychological profile, which is the definitive ‘self.’ The goal is to calculate the victim’s likelihood of being responsive to an array of attack options. It also seeks to uncover some key 'theme' for the attack psychology. For some it will be guilt, trying to make the person feel they are targeted because they are bad. Others might come to think the theme is to suicide, or to undertake a specific course of action. It can be almost anything, or it may be completely generic harassment without a theme, because we all different psychological makeups.
Now, while more than one assault method is available, only one will likely be brought to bear at a time, and fostered until it achieves a certain level of success. I call this a calibration phase. Additional targeting methods are brought on line in a sequence designed such that the success in the former better aids the progress of the next, which in turn ideally augments or reinforces the former. While that is not always the case, doing so is a high-value procedural goal; it is important to achieve as prompt a negative impact on the psyche and behavioral responses as possible, so that responses to attack will be seen as being due mental aberrations — rather than the actions of a Boogeyman.
Disbelief as a weapon][ Such disbelief as to true cause by onlookers is, thereby, almost guaranteed. Paranoiac responses (e.g., looking over one’s shoulder to see if being followed) are natural when one is targeted, but do not mean the target is actually paranoid. But they immediately seem paranoid to others, even as the process begins. Yet in time, they wax toward true paranoia, as fear and assault from general targeting starts them to questioning more and more events around them in fears they might be connected to targeting.
Soon enough, even innocent things are indeed so judged. It is this same mechanism which renders professional spies less than useful, in time, because they start to over react to their daily dread of discovery. Intelligence agents are, by retirement age, generally speaking, quite paranoid. But there is more such as this, to come. This is not mental illness as some count paranoia to be, but rote conditioning; paranoia by reflexive repetition.
Imagination as a weapon][ Part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They seek to create a belief that the problems they face are beyond their ability to resist, and other than they really are. Clearly, any onset of paranoiac beliefs will play to this, and create opportunities to put the ploy into full play. Once achieved, when they fight back defensively, they fight the wrong problem with the wrong solution, further cementing the notion that resistance is futile when the effort fails.
This ploy is also used another way; to make them think the wrong people, or at least additional people, are involved, but who are not. Targets are goaded into lashing out, if not verbally, more dangerously, that they might get into trouble, and have key support relationships sabotaged, even face arrest or other legal entanglements — or ideally, be forced into mental evaluation and perhaps even institutionalized ‘for their own protection.’
Mistrust as a weapon][ On the flip side of this tactic, they often approach persons close to the victim and attempt to subvert them with lies hoping to induce actual participation. They may present credentials or badges of trust, and talk of child pornography or other criminal behaviors, even terrorism, and sow seeds of mistrust and ‘patriotism.’ Once a victim begins to experience such mistrust, they in turn, feeling betrayed, begin to mistrust others close to them. The net result is that they can never be sure who the players and helpers really are, again fostering whole new paranoiac fears.
Fear as a weapon][ The above fears are very effective. Yet some PCT is so fearsome, such as bioimplants, that even suspecting it is in use, heightens paranoia. There are many tricks which can cause victims to assume implants in place, or some other dread, when not true. However, this is more commonly the case with long-term victims who have already been well along the paranoiac response path, and have had their beliefs altered well away from the true nature of their enemy. The longer one is targeted, the closer to this state they tend to become.
At such a point, paranoia can naturally grow to the edge of schizophrenia in appearance, perhaps better described as the form of hypochondria in terms of 'sensing' symptoms (such as where the implants are thought to be placed, or whatever the dread may be). Fear and imagination, when combined in an unending onslaught, can manufacture new false realities of any construct.
Once that transpires, or where implants really are in use, it is almost impossible to work one's way out. Doctors will refuse to inspect for implants, and X-rays won’t reveal them because they are set for tissue examination, and not dense matter. The latest generation of low-cost implants are indeed fearsome: they are far too easy to place without the user’s knowledge (thought to be an insect bite) while they sleep, are extremely small in many cases, and are designed to bond with and look like bits of flesh if uncovered with scalpal. It takes a good magnifier to see signs of man-made tech.
Who is responsible for political control technology?
Consequences of false beliefs:
To be a helper first of all and foremost requires no preconceptions of what is true or imagined by the target. For the very reasons described herein (false beliefs), alone. But also because even if truly schizophrenic, that does not mean the person is not ALSO targeted. In point of fact, the class of victim who is a test or training subject is often chosen exactly because they are already schizophrenic; there is no possible way for anyone to believe that they are targeted no matter how badly a trainee or test goes haywire. And paranoia, being natural, is actually closer to a proof of targeting than a reason for disbelief.
This is exactly why it is so hard to get good helps from the very people who should help (e.g., Cops, Lawyers, Doctors, Politicians), and why I do not prejudge based on ‘wild’ or implausible claims or implied clues that something is wrong with their facts. If, in the end, if the person is schizophrenic, I’ll eventually come to understand that, and deal with it. If they are ONLY schizophrenic, I’ll by then be in a better position to guide them to the proper psychiatric helps.
But also, if schizophrenic and actually targeted, the illness will not deter detection of that truth, nor prevent me from addressing it — though it makes it more difficult. And I will still try to help the victim obtain the helps for the chemical imbalance causing their aberration, as well. And that is all it is. It is not being crazy, and if it did not have such a scary sounding name, people would realize it is not that big of a deal to so suffer.
This approach is also critical because it means I can ignore (mostly) any obvious or even inobvious false beliefs held by the victim. They are inconsequential to the true nature of targeting unless I myself also rely on the false facts, but I do not, or at least try not to so rely. Ignorance in this case is bliss. However, at some point, any errors in belief structures must be repaired or, perhaps, tested. It may, for instance, be me who has false perception. A good test can teach whomever is wrong the true nature of things, provided their minds are not sealed to logic (that can be the case).
The logical path][ Were I able to go into a TI's home and install pickproof locks and facilitate true site security, render their computer and phones secure and defeat surveillance devices, make various targeting method tests, set up defenses in response, and do the appropriate investigations and analyze victim history — I can make ALWAYS make progress. It may not be total victory, but if not, the resulting shift will see the targeting closer to an annoyance than a trauma.
I’m talking about all the things I advise my client Tis to do, of course, since I cannot do it for them at distance (while I do offer direct intervention, it is generally too costly for a TI to afford, as it usually involves securing other professional specialists or services, as well). This is what I do: play 20 questions, give assignments, some of which are tests to undertake, and figure it out as we go. Repeat as needed.
Rationalization as weapon][ But victims tend not to follow my advice even after agreeing, or fail to undertake steps correctly, or misconstrue the results, or even reject the advice or conclusions out of hand — all generally because their current belief structures (as to the nature of the beast) will not allow them to yield fully to my advice or to the possibility of another reality. Their minds are closed to logic, and they rationalize an excuse for the subconscious decision.
Strangely, this is often even true when the instruction is a test which would make that very determination. My best successes have only been possible when the victim was relatively new and had as of yet had no such strong false belief structures to struggle with. Long term victims tend to have a ‘been there, done that’ not-going-there again approach even though they haven’t, yet, really (at least not in the manner as prescribed).
And understand, I'm not saying I'm always right, by any means. I'm frequently wrong; since I am not there, I must rely on the information I'm given, but it comes from people who are not consistently capable of giving me the correct information— because it is all filtered through their belief structure born of targeting falsehoods. Even if I were on site, I myself might be misled by clues or symptoms, or miss something key, or simply make wrong conclusions. So imagine how much harder it is for the Victim, alone in a stressful environment.
Desperation as weapon][ It leads to desperation, and in that state, victims do things they ought not. They almost habitually (mix and match) 'hook up' with other Tis, seek sexual encounters with strangers; move into places indefensible, write to authorities in an inappropriate manner, spend serious money on foolish or fraudulent defenses, and more. They rationalize wrong choices via hope instead of choosing carefully with logic, and by that same rationalization, discount failures and thus end up repeating the same error, again.
Speaking to my introduction paragraph, they tend to believe at the drop of a hat most any technical or tactical explanation or offer for help (especially if a new or unusual method, and for too many, even if seeming nonsense) — especially if it in any way reinforces a false belief already held. And they tend to reveal too much information when in dialogs, further aiding perps in psychological profile and targeting fine tuning. These things they do in hopes it will somehow at last lead to something that does help.
The path unwanted][ All this further exaggerates their false beliefs, and then typically in the end they call those same people (with home they hooked up or from whom they obtained information or helps) Perps when things don’t work out as expected. Regardless, seldom will they toss out the newly acquired fears or beliefs about tech. There is such a desire to ‘understand’ the problem, that they consume and eagerly share information constantly, even if there are logical signposts that it is incorrect. Eyes are raised if anyone dares point out such flaws, and their honest appraisal becomes circumspect. Of course, sometimes, the objections are indeed false, perhaps from a perp.
Division as weapon][ Thus in the end, the victim community ends up bickering and fighting and being suspicious of one the other. Even though it is sometimes absolutely true one is a Perp (or just as bad in net result, a true schizophrenic believing themselves a victim), way too many thought to be, are not. For those wrongly accused, help is subsequently even harder to come by, as they tend to isolate themselves defensively. Victims end up torturing victims unwittingly in a mass self-reinforcement of victimization.
This is why I no longer participate in group dialogs, polls, petitions, etc.
And why was false advice given in the first place? When not because the giver was a perp, it is most likely a false belief structure which allowed the giver to sincerely think it would help, perhaps because they used it in their own targeting. But they failed to realize the perps took steps to make it seem like it helped. This takes us back to the opening statement: part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They giveth and taketh away after it has led to more division in the TI community.
How sinister the weapons are][ But even when the advice or information is good, if filtered through false belief structures, it will not be useful to the victim as a rule, and for the reasons cited already. It matters not who is giving the advice; me or a TI, or some third party. False belief structures still get in the way, and perhaps, for some individuals, pride contributes; they do not wish to admit they’ve been wrong all along.
I can sometimes make decent progress with a long-term victim suffering false beliefs, but seldom as much progress as desired. Regardless, and this is almost always true for all clients, when even a small level of progress is made, the victim gains strength and the will to continue fighting. They become a Survivor, and are no long victim, and that alone is worthwhile. If I can get that far, there is hope that more progress can be made, and in time, it usually is, but every new gain tends to be hard earned... but with luck, at some point, there is an opportunity to suddenly break away altogether.
But you often dare not tell a victim they have false beliefs (as I attempt, here) or a key to truly understanding their problems, even once a survivor, because it will probably be rejected along with other advice. They have to somehow come to realize it on their own, and start from zero; that's when good advice and helps can actually work. Even then, they must also have the will power remaining to force themselves to stop the bad practices which deter helps and neuter advice, as well as the bad habits born of desperation.
What is political control technology?
But then there is FREE WILL
Free Will, the Survivor’s weapon][ Exercise of Free Will, the gift of God which no other can take away unless freely given in submission, is the greatest weapon a TI has: only if they CHOOSE to allow an attack method to have emotional impact, will it be so. Street theater, V2S (voice to skull), and even pain generating tech becomes little more than a bad joke when one is able to simply decide it has NOTHING TO DO with their ATTITUDE and emotion, or their psychology and philosophical approach to daily life.
A Cancer victim in constant pain who CHOOSES to continue to live and enjoy life… such a person in such a state is a wondrous thing to behold, because we see they can be truly happy in life, accepting their fate and enjoying life even MORE than someone uninflected because of it. So why cannot a TI do the same? Only because they CHOOSE to suffer the very psychological effects the targeting pushes them reflexively into. But unlike cancer, there is a cure for that.
Never REACT][ Instead STOP, THINK, and consciously ACT; stop yourself from reacting, think what your reflexive instincts were telling you to do — and consider if that was not what was expected of you. With that in mind, then ACT contrary to it in some manner, doing so as if an actor in a play. In the beginning you will have to act like an actor, because it will not seem ‘normal,’ but in time, you will find that things get easier, and eventually, reflexive, such that targeting no longer has any control, not even to force you to stop, think and act. THAT will be true freedom; the day you no longer automatically respond as predicted by your profile — because you have created a whole new profile, one which is targeting resistant, and one they cannot understand or deal with.
To me, the real beauty of this method is that it is mind control in reverse; the perps become confused, and are rendered victims of your psychological warfare upon them. The accuracy of their psychological profile is diluted and eventually becomes useless and meaningless. The lack of progress and success causes underlings to get in trouble with superiors on up the line. People get ‘fired’ and replaced.
They even start replacing equipment, thinking it defective. And from that fact comes a warning: expect attacks to intensify, either as punative response, or in experimentation to see what’s wrong. But they will not want them to get so intense that they damage tissue or leave other physical evidence, so if you start getting microwave burns, for instance, go to a Doctor and get it documented, and photograph them for evidence, and as always, update your log of targeting events with great detail. They will back off if this starts to happen, almost always. If they do not, let me know. I have thoughts on that, too.
- Gang Stalking – We targets are alone. (neverending1.wordpress.com)
We go through life thinking we know who we are and why we do what we do, but like Actors who start believing they are the sum of their Press Clippings and the heroic characters they play, we are frauds. It took a simple but powerful video to teach me the truth, something I once knew, but lost sight of.
I once was lost, but now am found.by H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What you will learn reading this post…
- I’m a fool, and have been offering knowledge as if expert and wise, when in fact, I fall short;
- While my advice and opinions are based on truth and logic, I should have offered a better, more useful message;
- That message does not betray my beliefs and life experiences, but instead, explains them, and gives them meaning;
- That it should be the same for you as it was for me, if you will but open your heart and consider it;
Whre can I get help when no one believes my story?
A note of apology: a technical glitch with wordpress refuses to let me format the document correctly, making it a little difficult to separate paragraphs. No matter what I do, it displays as intended in preview mode, but not in actual URL access. I regret any inconvenience.
I’m talking about me, H. Michael Sweeney, aka the Professional Paranoid, activist author, and consultant on privacy/security, and abuse of power topics. People come to me for help all the time, and I’ve started to believe in the value of my advice as much as they hope it to be of value in their desperation. Well, my advice may be good some of the time (more often than not, I have always thought, based on feedback), but even so, I’ve not quite been offering the best advice, in the best possible way.
This self examination also translates to my abuse of power issues of which I so frequently write, as everything I tend to blog about is so much in parallel to the basic aspects of things now clearly revealed to me because of simple but powerful video, that I’m hoping those who read my blog posts as activists, will see that parallel as well. It’s not just about me, its about everything in the World and how we deal with it. Let me explain by first going back in time. Some of you who have read my material before may know some of this, but as Paul Harvey used to say, its time “For the rest of the story…”
Open Letter of Complaint to the United Nations, by Xin Zhong Qing
Received by H. Michael Sweeney direct via email March 18, 2013
PLEASE REPOST. NO COPYRIGHT NOTICE.
Notes indicated red by H. Michael Sweeney. As you read, unless you are already familiar with political control technology, you will be moved to dismiss the complaint as the rantings of a mentally disturbed individual. While it is certainly possible that is the case, it is also not only possible, but highly probable that the descriptions are true accounts as the victim is best able to relate in conversational English. Please consider such translation issues as well as the following facts before you make any such decision:1) As testimony to the State of Massachusetts Legislature on a Bill to limit use of electronic weapons reveals, there is NO symptom of schizophrenia (imaginary persecution or other unreal events, realities) which cannot be induced electronically; 2) Therefore, most victims of political control technology seldom have a correct understanding of the exact nature and cause of their targeting, and indeed, specific effort is typically undertaken to insure their beliefs are incorrect (you cannot fight a problem if you fight the wrong cause); 3) As one who has worked with hundreds of such victims around the World, I see select clues within the dialog which align with many similar charges from others within Red China, as well as other countries, including America. I am specifically comparing to cases where, after working with the individuals for a considerable time, tests and defensive strategies verified that targeting was real — though generally different than the victim’s original perceptions and understanding. 4) You will note that many of his prior letters were enjoined by other signers, up to 77 persons. 5) Yesterday, I got four hits to my wordpress pages from Red China (rare). One of the pages hit regarded how easy it is to start a revolution, which featured the 1989 failed Tiananmen Sqaure incident. Another features how to outreach as a targeted individual, my also my main page on political control technology, and another was my contact page. I now believe these were Xin’s visitations. Xin Zhong Qing is a fairly common name in China. There is even a Container Vessel operated by the Red Chinese Army of that name.
United Nations Commission on Human Rights:
My name is xin zhong Qing, Is the Chinese Jiangsu province Nanjing city an ordinary law-abiding civilians. Here, I on you accuse China Security Department “secret agencies ” in a group of spies criminals, they abuse “monitoring” privilege, make high-tech “brain control” technique, remote control my body and spirit, the implementation of more than 40 years, The days and nights of continuous uninterrupted secret torture persecution.
In the Chinese Cultural Revolution ” of 1971 , in the 20th century , I was framed for “5.16 counter- revolutionaries “, were subjected to cruel political persecution. This group of ” secretagencies ” in the secret criminals, in order to force me to, admit that they are “5.16 counter-revolutionaries”. At the same time, in order to stop me openly accused Justice voice, they use high-tech ” brain control ” technology means frenzied , day and night, 24 -hour continuous remote control of my body , the implementation of an extremely cruel persecution and assassination plot secretly tormented.
They are a group of secret agents Alcatraz. To me implemented secretly tormented persecution means extremely brutal, shameless, comparable to the German Hitler fascist concentration camp Gestapo and Japan 731 units of bacteria devil evil, their Monstrous evil, just pale into insignificance by comparison!
They control my body, every minute non-stop manufacturing my body, appear all sorts of pain; itching; extreme cold; heat; numb; vertigo; tremble; Extremely uncomfortable; incontinent, frequent cough vomit nasal bleeding paste the nose, as well as the infamous “sexual torture” and other pain. For over 40 years time, wherever I go where, this secret pain never stopped, and I can’t sleep, normal study, work and life, day and night in very suffering pain, like a living dead!
Their Monstrous evil, not only a violation of China’s constitution and laws to “respect and ensure human rights” provisions, also completely violated the Charter of the United Nations and the “Declaration of human rights” and other relevant safeguard basic human life, survival rights provisions.
Therefore, I had to the Communist Party of China and Chinese government post a lot of complaint letters:
• In the December 3, 2007 issued a “President Hu Jintao to collective letter”(the 77 victim joint)；
• In May 5, 2008 issued a “Chinese” secret organization “open letter”.(the 43 victim joint)；
• In September 7, 2008 issued a “ An Announcement to the Whole World by Chinese Victims”.(the 65 victim joint)；
• In March 6, 2009 issued a “Accountability Mr. Geng Huichang, one of the leaders of the national security sector”. (the 76 victim joint)；
• In March 15, 2010 issued a “China’s civilian population, in fact, no protection of human rights! ”
• In August 16, 2010 issued a ” Ten Questions “Politics and Law Committee of the CPC Central Committee , Zhou Yongkang, secretary ;
• In January 1, 2011 issued a “To the CPC Politburo Standing Committee member of the open letter to all”；
• In April 5, 2011 issue “urged China’s security sector, Geng huichang and others pleaded guilty to the letter!”；
• In July 15, 2011 issued a “Geng Huichang, is China’s brain control criminal gang black Protectionumbrella!”；
• In February 24, 2012 issue”Notice to all Chinese compatriots Book”；
• In August 4, 2012 issued a ” Accountability Zhou Yongkang, Politics and Law Committee of the CPC Central Committee! ‘”And so on
However , I have sent the Many letter of complaint, not only did not get any reply. On the contrary, the arrogance of this gang of secret agent criminals more arrogant , more intensified secret remote control of my physical and mental torture persecution . I am still in the” shouting days days should not ; shouting ground ground should not” suffered torment pain life..
Now, I tell you — the UN Human Rights Commission issued this complaint letter, urging you under the Charter of the United Nations and the “Declaration of human rights” and other relevant human rights documents, To as a member of the United Nations of China National Security Department “secret organization” this group of Spy against human criminals are a Monstrous evil, Must be a serious investigation , and the findings made public . At the same time , Will referred the case to the United Nations Criminal Court, Will this group of secret Spy criminal prosecution, for crimes against humanity!
The following annex, is my day and night, in more than 40 years of uninterrupted suffered this group of secret Spy criminal on my body remote suffering persecution, daily live record fact evidence excerpts (January 1, 2012 — November 30, 2012) :
Yours lofty salute!
China’s Jiangsu Province , Nanjing “mindcontrol”victims :
February 28, 2013
Sender: Nanjing victims ZhongQing Xin(screen name Red Master)
Address: Nanjing Xiaguan District # 94-14 Tung Cheng, a village
623962269 @ qq. Com
Note by H. Michael Sweeney: the first link appears to be being blocked in Red China. Attempts to reply by email also fail.
在上个世纪1971年的中国“文化大革命”中，我被莫须有地诬陷为“5。16分子”，遭到了残酷的政治迫害。这伙“秘密机构”中的特工罪犯，为了迫使我就范，承认自己是“5。16分子”。同时，为了捂住我进行公开揭露控诉抗争的正义声音，丧心病狂地使用高科技“ 脑控” 技术手段，昼夜24小时不停地遥控我身体，对我实施令人发指的秘密折磨迫害和阴谋暗害。
Lessons we have ignored from fallen Empires, both in real history, and in popular literatureby H. Michael Sweeney Permission to duplicate granted provided reproduced in full with all links in tact with credit to the author and proparanoid.wordpress.com
government out of control, a fascist Police State
As it happens, there is a Facebook Group named I AM Brandon Raub. I have joined this group and the commentary there has prompted this article. Please consider this an invite to join, as well. In specific, this post is in response to the analogy made in the Group that we should all say “I AM Brandon Raub!” in the manner of “I am Spartacus!” So lets examine that, and other reasonings:
government out of control, a fascist Police State
Who is Brandon Raub?
Brandon, a highly decorated U.S. Marine, is the first to make national news of about 20 ex military persons targeted by the Federal government in their paranoia that We, The People, might choose to replace our government with one that obeys its own laws. That is to say, restore it to a fully Constitutional behavior. Currently, the Federal Government is outlaw not only to the Constitution and Bill of Rights, but in violation of the Magna Carta and many International conventions on behaviors relating to human rights, both in war and in peace. Don’t take my word for it as blogger, even mainstream knows it true.
On Aug. 16th, 2012, a small army of Gestapo Police, Secret Service, and FBI Agents knocked on Brandon’s door and took him into custody. Central to his arrest was Brandon’s Facebook posts, which I assure you, are far less critical of government than my own, and far less suggestive of dire future alternatives. I talk openly of the threat of revolution, Martial Law, and a Police State, where Brandon was more reserved, and says nothing but that which is patriotic and based in truth.
The difference is, Brandon is a recent retired Marine with significant combat skills, and I am not. Not just Brandon and the 20 others, but tens or even hundreds of thousands of recent veterans of Iraq, Afghanistan, and other deployments. You see, our paranoid government officially thinks ex military are going to become a fountainhead of domestic terrorist activities.
Actually, I think they are probably right to fear patriots, and have been trying to warn all concerned: where the actions of government are illegal and in violation of the Constitution, those with the training and skill to defend the Constitution and sworn to so defend it, ARE LIKELY to do so, if pressed to a point of last resort. The government has only two paths: forge ahead on their course toward a Fascist Police State and press the issue to an explosive tumult, or recant and find salvation in the Law of the Land, and restore Liberty to the ‘Land of the Free,’ a land falling well short of living up to the title.
In summary, and as proof of the problem, the following facts of the matter shall serve:
government out of control, a fascist Police State
a) Brandon was NOT arrested for what he said. He was arrested for ‘resisting arrest,’ but video of the event shows no such resistance. You cannot arrest someone for resisting arrest unless you first arrests them for some other charge. He was not given Miranda rights. He was arrested by local Police, and not Federal agencies. There was no other charge filed;
b) A County Judge dismissed the case stating the Petition for his Detention contained NO FACTS – NO REASON FOR HIM TO BE HELD. The Judge stated this was a violation of his civil liberties;
c) Federal agents still insist his posts are ‘terrorist in nature.’ Read his post, here, and you will see that all patriots are terrorists under government’s defective logic;
Note: Here is a remarkable video interview with Brandon by attorney and author, John Whitehead of the Rutherford Institute, so you can hear Brandon’s words, directly. Within it is the key section of the video of his arrest.
d) Regardless, Brandon was ordered placed in a Federal psychiatric ward for 30 days (but has been released short of that). Concerns were that he would be rendered a mental vegetable by chemical and shock therapies intended to neutralize him permanently, or at the very least become officially labeled as ‘mental’. The government believes that if you dare criticize government, you are mentally ill. That’s the same argument made (last paragraph in this link) in Iron Curtain countries to eliminate ‘intellectuals’ who opposed Soviet iron-fist rule. What does that tell you?
e) Family lawyers have been joined by legal council from The Rutherford Institute in seeking his release, pointing out that the legal document used in his rendition is problematic; that Civil Commitment Statutes are being used to silence individuals engaged in lawful expression of Free Speech. But the current outlaw government clearly has no concerns about Constitutional Rights.
government out of control, a fascist Police State
Say “I AM Brandon Raub!” in the manner of “I am Spartacus!”
Spartacus, a Roman Gladiator slave, led a revolt of Gladiators and formed an army of other slaves set free by force in the very heartland of the Roman Empire. In the end, as depicted in the popular film, Spartacus, the revolt was suppressed, and the survivors questioned to find Spartacus to be singled out for special punishment.
Spartacus stood up in arrogant defiance, but for naught. One by one, man after man with him stood in his stead and proclaimed as well, “I am Spartacus!” Their love and loyalty for their leader and their cause (Freedom) drove them, and so thwarted the Roman attempt. Well, “I am Brandon Raub in the manner of ‘I am Spartacus’.” I am as guilty as he of ‘terrorism’ for demanding a just government under the Law. I am as guilty as Spartacus for wanting freedom. What say you?
government out of control, a fascist Police State
Say “I AM Brandon Raub!” it in the manner of “I am John Gault!”
Ayn Rand‘s classic Novel (now a two-part film), Atlas Shrugged, shows the classic struggle between the forces of Socialism and Capitalism in their most simplistic and idealistic forms. Ayn had escaped living under USSR’s Socialist government to the U.S., where she found Socialism creeping into government, and wanted to warn us that ‘value given for value received,’ and ‘a man’s sweat and intellect are his own property’ should be preferred to ‘you didn’t build that’ and ‘those that have should give to the have nots.’
In her massive book, a work which profoundly influenced and changed the lives of many readers (including myself), a fictional plot element was the question found scribbled on walls and posted everywhere at large, “Who is John Gault?” There was no one by that name, in truth, but there was a man who lived the role, and the answer to the question was, he was the man “Who will stop the engine of the World;” to end the madness and restore sanity. In the end, those who understood and sought to right the wrongs joined with him in attempting to do so, each of them earning the right to say, “I am John Gault.” Well, “I am Brandon Raub in the manner of ‘I am John Gault’.” I want to stop the engine of errant government. What say you?
government out of control, a fascist Police State
Say “I am Brandon Raub!” in the manner of “I am a Jew!”
History is rife with examples of martyrdom for faith in the face of oppressive governments. Choose any faith you wish. I choose to focus on the Jews of pre WWII Germany, to make the point most evident in The Diary of Anne Frank. That point is best summed up in the oft quoted wisdom from Martin Niemöller, author of Gestapo Defied and, more subsequently made popular by Milton Mayer in his analysis of what went wrong in Germany, They Thought They Were Free. That book, by the way, with substitution of America for Germany, and various political figures and nomenclatures here in America for those of the Third Reich, could just as easily apply to our country, today. Are you so blind as to think otherwise? Read it if you doubt me, and know that I am not alone in the thought. But this is the quote which makes clear my point:
government out of control, a fascist Police State
First they came for the communists, and I did not speak out—
freedom of speech because I was not a communist;
Then they came for the socialists, and I did not speak out—
freedom of speech because I was not a socialist;
Then they came for the trade unionists, and I did not speak out—
freedom of speech because I was not a trade unionist;
Then they came for the Jews, and I did not speak out—
freedom of speech because I was not a Jew;
Then they came for me—
freedom of speech and there was no one left to speak out for me.
Had people spoke out… in unison… Hitler’s power would have been rendered futile, and his evil would have been exposed for all to see. But we all feel we are but an Ant against a man. But no Man could survive or attempt to war with ants if every ant swarmed as one body to defend their home and their right to exist. Well, I say “I AM Brandon Raub in the manner of ‘I am a Jew’!” I stand with my fellow men of good cause to defend their right to be and do as they deem best for them, as I would deem for myself. As if one of their own I lend my voice in unified SHOUT! What say you?
government out of control, a fascist Police State
I am Brandon Raub in the manner of “I am a TI Survivor.”
A TI is a Targeted Individual, which is to say, someone targeted by Political Control Technology (mind control). That can mean any combination of centuries-old methods such as gas lighting, dogging, and street theater (generally described as organized stalking), to modern methods such as Mob Flashing, Web stalking, and high-tech surveillance. Add to the mix bioimplants and electronic weapons which can simulate every known symptom of Schizophrenia, and you have the ultimate tool for rendering a victim a social, political, and financial zero guaranteed to be ignored by (everyone). This is particularly useful when the person is a whistle blower or otherwise knows something which could expose government corruption or evil deeds.
A TI survivor is someone who not only refuses to succumb to these tactics, tools developed and perfected, and employed by the intelligence community and military, and their corporate and other partners, but someone who stands firm and chooses to fight back as best as they can. I have the honor of saying I have stood with and helped TI survivors to survive for several decades, now. I know of no one more courageous.
Now Brandon Raub is also a TI Survivor, and will likely be subject to more exotic forms of such targeting as time goes on. Well, I say I am Brandon Raub in the manner of “I am a TI Survivor!” I refuse to let government get away with mental torture and to use ‘mental illness’ as a political weapon by ‘creating it’ where it does not naturally exist. What say you?
government out of control, a fascist Police State
Who are you, really?
Who do you want to be? A victim of tyranny left standing alone, or a defender of self and of truths profound standing with others of like mind?
Who have you been waiting for? John Gault? YOU are what you’ve been waiting for. You ARE John Gault!
Do you need a Sparticus to lead your resistance? Or does Sparticus need you? Brandon Raub is your Sparticus, and he needs you! You ARE Spartacus!
Do you need to see a whole class of people targeted before you say anything? Then you are too asleep to the facts; they have already come for religious Davidians in Waco, the trade unions are decimated, the far left and the far right, and even the liberals, the Tea Party, and Ron Paul supporters… and now the ex military. All have been conveniently equated as terrorists for the purpose, and subjected to political targeting and harassment by Federal agents. You ARE of Faith!
Do you need to wait until your very mind is under attack? Again, too late. You are under constant attack through disinformation, dumbing down, and wag-the-dog media manipulation (propaganda is mind control). Worse, Command Solo flies your skies, and other technologies which parallel its capabilities bombard our cities with who-knows-what control signals. When you choose to accept sound bites in lieu of researching for yourself, or, to flip the tables, when you choose to accept some blogger’s commentary (yes, including mine) or some other Web source as valid without checking credibility (e.g., useful verifying links), then you are already a victim of mind control. Recognize the truth: You ARE a TI survivor!
And therefore say I; if you are any of these things, then You ARE also Brandon Raub!
government out of control, a fascist Police State
What say you?
- I AM BRANDON RAUB (and so are you) (resourcemagonline.com)
- Why is Ex-Marine Brandon J. Raub Being Held in a Psych Ward and What Does It Say About Today’s America? (reason.com)
- John Whitehead Interviews Detained Marine Vet Brandon Raub (dprogram.net)
- HOT: Statement from Brandon Raub’s Attorneys (economicpolicyjournal.com)
And why they do, anyway, and almost always regret itCopyright © 2012, all rights reserved. by H. Michael Sweeney, author of MC Realities: Understanding, Detecting,and Defeating Mind Control and Electronic Weapons of Political Control Technology. Permission to duplicate on-line hereby granted provide it is reproduced in full with all links in tact, and links back to proparanoid.wordpress.com
mind control psychotropic weapons DEW voice to skull
The first thing to understand is who we are talking about; Targeted Individuals. The term is military in origin but is used by the intelligence community and law enforcement. That’s apt, because even though the kind of TIs I’m talking about are not a bona fide target of these groups for some justifiable cause (not terrorists, not criminals, not enemy spies), the technology and methods used in their targeting were developed by the military and intelligence communities, and corporate and collegiate partners.
More critically, the attacks they suffer as result by electronic weapons, gas lighting, street theater, dirty tricks, and psychological warfare, and so on, are more often than not at the hands of those self-same developers, as well as members of law enforcement. Not officially of course. There is no such thing as the boogeyman. Ask any Judge, Psychiatrist, Congressman, or Lawman. They seem content to overlook the fact that the whole of the Political Control Technology employed is applied primarily for the purpose of making the victim seem to be a Paranoidal Schizophrenic.
They certainly overlook the mountain of official government documents and other evidence that every symptom of Schizophrenia can be simulated by such technology.
Enough on that. Well, not really, but to get more, read my book, MC Realities, which is the only self-defense book on topic on the market I’m aware of. What we really want to talk about is the tendency of TIs to want to hook up with other TIs for what they hope will provide a means of mutual support and protection. By ‘hook up,’ of course, I mean close interpersonal relationships which include sharing of housing, with or without romantic intentions.
Well, yes and no to that notion. While there is some useful psychological support value in having someone of kindred spirit to share in burdens born of like difficulties, as a rule (there are exceptions), I have long advised against it in the strongest of terms.
mind control psychotropic weapons DEW voice to skull
Here’s why; what I see as the risks involved.
1) It decreases security rather than increasing it, as it can result in each TI gaining as new enemies those involved in the targeting of the other TI(s). But that is not the worst of it, because where that happens, it becomes such a tangle that if someone like myself comes along to try and resolve the issue, there are suddenly too many clues to sift through to determine anything truly useful in defense or offense — a matter which is tough enough to resolve with just one set of attackers.
2) It almost always turns out that one of the TIs is accused of being a perp (perpetrator) disguised as a TI in order to get closer in and do more damage. More likely all will end up accusing each other, even where no one is guilty. It is the nature of the natural paranoia generated by being targeted which fosters such fears, and any such fears, when unfounded, always grow until some bit of circumstance seems to tender hard evidence when it may simply be coincidence. But it is also true that many times, one or more of the parties actually are perps.
3) Any defensive strategies tend to become doubly complex and twice as difficult to mange to good end, which means each TI is neutered somewhat in the effort. There can also develop bickering over the best approach which further hampers such efforts.
mind control psychotropic weapons DEW voice to skull
There are reasons why my advice is ignored, and of course, only a small percentage of TI’s even get to hear my advice. For every TI we hear about, there are many, many more who are afraid to tell anyone out of fear of being termed mentally ill. Too — I’m not exactly a household name, so not all the ones who do come forward know I even exist. But here are the reasons my advice is ignored by those who do get to hear it:
a) They are so emotionally victimized that the temptation to find and leverage some small hope for kindred support and understanding overrides logic. In like manner, they are so depressed by the constant lack of privacy and security that the hope of increased security from a helpmate also overrides logic.
b) They foresee a possible savings of money through shared expenses, money being something all TIs tend to have too little of thanks to the targeting, which commonly involves financial dirty tricks such as repeat sabotage of vehicles, cancelling insurance policies, and worse, including getting them fired with rumor mongering.
c) They often feel they have ‘been around the block’ as a TI long enough to spot a perp and have some confidence they are insulated from risk. Wrong. Almost always.
mind control psychotropic weapons DEW voice to skull
A Simple but Tragic Case Example:
A TI client who had suspended my services for a time elected to hook up with another TI. The basis was that they were both ‘on the run’ in hopes of evading targeting, or so it seemed. My client was already mobile because of a need to travel in work duties (a respected person of useful credentials in their chosen field, as it happens). The other TI claimed to have been forced to vacate a Safe House provided by FFCHS (Freedom From Covert Harassment and Surveillance), claiming it unsafe there, and of poor sanitary condition. That was far from the true reason, but there was no means to check it out, and the client did not even attempt it, presuming in error anyone coming through FFCHS must be a legitimate victim.
So it was concluded of mutual benefit that they might travel together and share expenses, defenses, and information about their individual targeting. The first few days went well enough, but before a week had transpired, it ended in disaster. The short version is that it appears the refugee from FFCHS was not only a perp, but a sadistic psychopathic criminal of another sort: he produced a gun, made threats, and later raped his companion multiple times, and then ran off owing money. This took place immediately after I was invited to meet with them, it perhaps being my presence which spooked the perp into flight. Perhaps not.
But he had also gotten access to her email and sent out email in her name, presumably to sabotage relationships, and there was an incident which seems to have been aimed at thwarting me from providing helps, perhaps intended to scare me away (a third-party companion player showed up at our agreed upon meeting place, and their car was later in the day found in my personal parking spot where I live). It did not frighten me (read my books and you will see I’m quite foolish about things which should perhaps frighten me).
But it did not help my being involved, either, as the refugee also tried to convince my client that she should no longer have anything to do with me. After it was made clear our relationship would continue, it was that same night that it all went sour — as described above.
mind control psychotropic weapons DEW voice to skull
Summary lessons learned (hopefully)
Regardless of good intentions and hope, the risks of hooking up for mutual advantage is generally a risky affair. I only know of one instance where it worked out long term, and there were unusual circumstances which included additional third-party, non victim helps. These acted like a checks and balances to help get them over the rough spots. And to repeat, I’m talking about the natural growth of suspicion of each other which transpires even when one of them is not a perp.
By all means, collaborate and share information on-line. Even meet in groups, large or small, to share information and give emotional support. But please try to avoid commitments to share living space and all that goes along with being targeted. It is a trap no matter how it plays out, one which leaves both sides feeling betrayed, hurt, and more frustrated than before, or one side victimized yet again to the same end.
mind control psychotropic weapons DEW voice to skull
I would also like readers to know about the Free Will Society to Aid Targeted Individuals, organized on Facebook as a Group. Please give it a visit. If it helps, also please know that I offer a free Helps Kit, sample newsletter on Political Control Technology, and free 30 days on-line consulting to Tis. Contact me.
Answering them reveals there was no lone gunmanA careful in-depth review by an author who specializes in crimes of the NWO and Intelligence Community, to include MC, by H. Michael Sweeney, Copyright © 2012 all rights reserved. No reproduction permissions will be granted for the first 90 days. Links only, please.
This in-depth article will reveal dozens of startling new investigative issues for the first time, anywhere. The detail required to make concise arguments on a long list of critical elements forces it to be offered in installments. You may wish to subscribe to be sure you do not miss one along the way. Doing so, you will discover:
- Three motives for making James Holmes a Patsy with Fascism as benefactor, and a possible motive for targeting Century Theaters
- Easy link access to the key-most videos and images for each critical point of evidence presented in a logical, easy to follow order.
- Reasoning there were at least three additional helpers involved in a professional black operation backed up by even more supporting players
- Introduction of an actual political REASON for targeting The Dark Knight Rises (TDKR), a reason which supports one of the proposed motives for choosing James Holmes as Patsy
- 25 key questions missed by almost everyone, the answer to any one of which could easily provide reasonable doubt that it was a lone gunman event, or that James even pulled a trigger
- A walk-through narrative portraying an alternate scenario which fits all conflicting facts into a workable reality.
James Holmes was a patsy Part One
James Holmes was a patsy
Introduction: my credentials and methods
The reader, if to have confidence in my commentary, should know my credentials. I write this as an author of seven books (proparanoidpress.com) generally upon topics which relate directly in any analysis of the matters in Aurora. That includes the topic of Political Control Technology (PCT — mind control), which mainstream media and government still refuses to acknowledge as a real and valid topic. This they do despite the blatantly available facts which abound, even to include evidence uncovered by Congressional Investigation. My full bio is available here.
But before we get into the meat of these matters, I want you to please stop and see this one video which is by far the most emotional and heart tugging (in a good way) of witness accounts: Jamie Rohre, telling how he and his family were under fire, and the frantic events and steps taken while worrying about his infants and their Mother from whom he had become separated. They were apparently not married, but the interview reveals that once reunited in the hospital, he immediately proposed, and she accepted. WORTH A WATCH. Good can overcome tragedy when you let it.
James Holmes was a patsy
Motives and Political Hay vs. Justice
I would hope my feeble efforts would raise serious questions for not just citizens, but also in the minds of officials; questions which a moral person should rightly feel in clear need of answering if justice is to be served. Questions which might lead any legal defense team working for James to a useful defense proving him innocent. Unfortunately, I have no reason to believe that is the goal of either the Court or the Police in this matter, and suspect any defense will be guaranteed to be marginal, at best. As common in all prior mass shooting events, assassination plots, and terrorist events, political hay is more important than a statue of a blindfolded lady, or her set of scales.
Motive 1: The most popular motive talked about the Web is the most obvious; the ‘trade your rights for security’ myth, a key step in order to allow a tighter Police State grip on the people. The hay in mass shootings and assassination plots is gun control, which is the key-most step on the way toward a Police State, and the only way it could long survive or even come to power in America. The proof of these remarks is perhaps easiest to illustrate by the ‘coincidence’ that in every shooting or terror event, Congress just happens to have in hand legislation ready for quick approval (but not reading or due debate) which provides a good deal of such hay for their New World Order horses.
In Aurora, it would be found in three forms, the first of which was, rather than a new law, a need to discuss the United Nations Treaty on Small Arms. Constitutionalists and gun owners fear the Treaty would force the 2nd Amendment to be repealed and guns to be confiscated, the approval of which was scheduled to be determined in a matter of mere days after the shooting. Fortunately, the effort failed and the treaty was not signed, but that does not end the matter; the U.N. has simply rescheduled for reconsideration to give them time to attempt to make the treaty more appealing (the US was not the only country to refuse it), and a new a sales pitch (more mass shootings, perhaps, such as the Temple shooting in Wisconsin?). I have already screamed my warning thoughts on the gun-grab topic in a series of posts cited at the end of this post. For the best overview of the treaty with both sides of view, visit the Judge Ben C. Green Law Library.
Motive 2: Less commonly discussed, but also logical; the Web is flush with stories stating James’ Father is a whistle blower set to testify in a Federal matter which would, if found damaging, be a potential motive for using as Patsy, his son. His father developed software used to monitor banking transactions for fraud, and it is said that his program detected and can prove where the trillion dollar losses really went — as criminal profits. Imagine trading a finding of mental incapacitation instead of a death sentence in exchange for favorable testimony. As result, his Father is said to have been scheduled to appear as a witness in a Federal Court as a whistleblower. At this point I would be remiss if not admitting the factual value as a motive is based on early speculation, as there has been no useful verification of any such court appearance. It would take considerable study of his Father’s situation to find facts before I accept it as factual, but it is sufficient a red flag as to deserve such study. Read about that, here.
Even more interesting, as a related mater, is that TDKR plot line is rather a strong parallel to the financial crimes under consideration. It may be EXACTLY THE REASON why James, and why TDKR. There is an excellent review of the film with that view in mind, here, with some useful background info on the software in question. Later, we will see there is also a potential reason why Century Theaters.
Motive 3: Also a matter to be determined more concretely, the third potential motive remains quite consistent with my findings in case after case when working with targeted individuals. I’m talking about victims of PCT, which is what I fear James Holmes is based on the wealth of clues in the greater picture. Such persons are always targeted for a reason. Almost always, that reason is FEAR of what the individual knows about some covert and illegal or immoral government Agency’s doings.
James Holmes, like so many of my clients, worked in projects associated with such an Agency; in his case, DARPA, the Defense Advance Research Project Agency. The work, in fact, specifically dealt with matters relating to Political Control Technology, though that is certainly not how they choose to describe it publicly. Learn more about his work, here.
What I find particularly interesting is that, in Jame’s case, the location where this work was undertaken was only two main intersections away from the shooting, essentially on the same Street. Just as interesting, is that he lived just ten minutes by foot away from work, only a couple of blocks from the theater, also just off of that same street, again. We will find some significance in that, later.
Being a PCT victim or even a threat to the entire PCT program would not in and of itself be a motive to set up an elaborate ploy to have them put away for life. There would be simpler solutions. However, if considered such a threat, it would make them a more logical candidate for Patsy among other candidates for a project which was slated regardless of if it was to be James, or not. Better to kill two birds with one stone than two stones.
With these motives and curiosities in mind, let’s tear into the conflicts inherent within the official story:
James Holmes was a patsy
What we told and can see raises serious questions
“Conspiracy theories” happen when there are obvious questions ignored by officials in government and media (Elephants in the room), where presented facts do not jive one with another. This is always the first hallmark of a cover up in a major story. I should make clear to the reader: there is NEVER a cover up UNLESS there is a CONSPIRACY. A cover up REQUIRES it, in fact, or it becomes impossible to arrange — especially when the “the only person of interest” is behind bars and cannot so arrange. Now, because media has not asked ANY of the questions herein, we must assume such a cover up has begun. Failure to question is a tell-tale hallmark which soon enough results in charges of ‘conspiracy theorists’ when challenged.
So let’s take a look at some of the questions I find most troubling, and address them. I’m not talking about external matters such as reports that FBI pulled a terror warning regarding theater attacks being a possibility. I’m talking about shooting details, doing so because I’m anxious to be called conspiracy theorist one more time, because I love pointing out that’s just a labeling game to avoid discussing issues. So, after I ask all the questions, I’ll present the ONLY plausible scenario which answers all the questions without contradictions, a replay of the crime as a false flag event involving multiple participants.
QUESTION 1: Why did a Judge, within mere hours of the shooting, order all records sealed in this matter as ‘contrary to public interests?’ What facts had been uncovered that early in the investigation which prompted such a concern? It would not be until well into the next day that facts even started to usefully unfold for such an important consideration. I’d like to know who moved for such a ruling, and the reasoning behind their request (stated reasons do not always equate to actual motive). Could it have been a call from Washington D.C., which sparked it?
QUESTION 2: Why was there a training exercise based on the same exact scenario underway at the same time, less than ten minutes away? The Denver Post reports such an exercise indeed took place at the Parker Medical Institute. A common theme in ‘terrorist’ events thought to be a false flag operation, is the holding of a training exercise for exactly the same type event at the same general place and time. This was certainly the case for Sept. 11 and the Subway/Bus bombing in London, for instance, and I seem to recall it being so with the Saran gas attacks in Japan.
QUESTION 3: Why did media first talk about the “lone shooter” effecting his crime by “kicking in the EXIT door?” Like all patsy shooting events, the initial stories given to and relayed by media without question create the all-important ‘first and lasting impression’ in the minds of the public. It would be impossible for anyone to kick in a fire door designed to open outward. In like manner, with the confusion clearly in place, no one could know with confidence at the outset that there was only one shooter, even if true.
No witness could rightly so claim. No Cop would be so foolish as to make such a statement. I would hope no reporter would invent it. But several early news accounts, including one aired on FOX Radio (play the second audio file on the linked page) a single witness identified (in print) only as ‘Pam,’ said exactly that. Why, unless a ‘planted’ statement for Wag-the-Dog* media manipulation? The first known airing was actually from NBC affiliate, Channel 9, on the scene. From their unthinking quote of ‘Pam’, news people everywhere simply repeated the line, just as mindlessly, and as if fact. Isn’t that a great way to get an initial mental image out into the public?
Was Aurora shooting a DOD or CIA operation?James Holmes * An expression whereby news is manipulated by Men in Black to make people think things are much different than they really are, James Holmes popularized and hilariously illustrated in the Book and film of the same name starring Dustin Hoffman, Robert De Niro,
QUESTION 4: Why did ABC News deliberately take James’ Mother’s quote out of context to indicate ‘they had the right person’ in arresting James? She has officially protested through legal counsel that that statement was in confirmation to HER identity upon first contact by phone. Again, media twists words and thereby assures ‘first and lasting impressions,’ a known Wag-the-Dog tactic.
QUESTION 5: Who lobbed gas canisters into the Lobby? At 3:29AM, as part of an interview with Police Chief Dan Oates after capture of James Holmes at the rear of the theater complex, a Channel 9 report reveals a lone gunman entered the lobby and discharged a gas canister and THEN went on the shooting spree. As we will soon see, there are other reasons to believe someone was in the Lobby doing just that. In fact, multiple someones. Did the man in the Lobby have orange hair? No one is telling, no one is asking. Why?
We might reasonably assume the above report an error, an assumption. But in a Web radio interview with witness Tim McGrath who was in theater 8 adjacent to the theater 9 where the shooting took place, we learn that while the shooting took place, there were FLASHES seen with the loud pops described as coming from behind, which would be the lobby/hallway area. It would, after all, be impossible to see any visual signs of activity in the adjacent theater where the shooting took place. So there really was additional activity in the lobby area such as flash bang smoke grenades, as confirmed by the other reports. Moreover, the Police dispatch audio tape appears to reference the front door (Lobby entrance) as being ‘blown out,’ at about 3:50 into the audio.
These events could in no way be undertaken by James Holmes, as he would need to take the time to exit the lobby after throwing canisters and make his way all the way around the building to the back, change clothes, arm himself, and then enter via the EXIT… in time for them to go off in the Lobby and be seen and heard while he is shooting. It makes no sense. How is this possible without at least one accomplice?
QUESTION 6: Who opened the EXIT in theater 9 for James? We now have multiple witnesses who saw someone within the theater open the EXIT door something like 20 minutes before it was used by the shooter. Without stating it in so many words, it is clear Police think it Holmes who opened the door, and then exited the theater through the Lobby to go around to the back where he prepared himself and then used that door.
But there is an oddity, here, because the man opening the door is not described by any witness as having blazing orange hair. Why not? It was not seen on the shooter, either, because of his head covering. Why wear the hair if not intending to show it? We will come back to this question. But we also have to ask, by what logic or reasoning would James not simply take the EXIT directly to his car and then return? Why return into the theater/lobby area, at all, unless it be a different person with yet another assignment to be fulfilled who did so?
QUESTION 7: How did the shooter gain entrance to REAR EXIT of the building at the time of the shooting? We know how he gained entrance to the theater through the EXIT door but that doorway led only to a short hallway serving theater 10 and 9 together, to yet another secure fire door opening to the lot where James’ car was parked. How did that door get opened for James? No one on the Web has addressed this question before me, and I think I know the answer.
Was Aurora shooting a DOD or CIA operation?
The next installment asks these questions:James Holmes • Who warned people not to use the EXIT doors advising the shooter was outside, and why? James Holmes • Why did the shooter waste bullets shooting at a blank wall causing bullets to enter theater 10? James Holmes • Who wore the second gas mask and used the second rifle found at the scene? James Holmes • Why did the shooter not shoot the most logical victim? James Holmes • Why did that victim describe the first weapon used was a Rifle, when another says shotgun – who was indeed shot by a shotgun? James Holmes • And more… PLEASE: Comment (page bottom, or contact me), Rate (at page top), Share/Tweet this article. Visit my Reader Forum to promote your own cause or URL.
- Mind-Controlled Mass Shootings Don’t Change My Mind (proparanoid.wordpress.com)
- Lion Dance (a screenplay): How China Invades the U.S. via the Canamex Highway (proparanoid.wordpress.com)
- Six Dumb Arguments We’re Hearing About the Aurora Shooting [America's Screaming Conscience] (gawker.com)
A parody of real-life mechanisms in conspiracy cleanup (coverup contingencies)by H. Michael Sweeney permission to duplicate granted provided reproduced in full and all links remain in tact, with credit given to the author and proparanoid.wordpress.com as source.
James holmes is a patsy in a false flag operation
Update Aug. 29, 2012: As result of the popularity of my multi-part post on the Aurora shooting which is the most exhaustive review of facts to date, and because of the revelations the investigation involved in the effort have afforded, this post is woefully inadequate and no longer reflects the true concerns. Therefore, this update is actually a major rewrite to make it more in harmony with the true facts, rather than the early conjecture available on the Web at the time of its first writing. Additions or changes heralded in red. Any original material remains in tact, but in
strike-through text, as I do not wish anyone to feel the material may have been censored for any other cause. Article begins:
Whenever the official story starts to have cracks in it, the cleaners go to work in Wag-the-Dog fashion, and power is applied to the weakest pressure points to make things ‘better for all concerned.’ As one CIA operative (one of the clean-cut train hobos at Dallas in ’63 set to cause a ruckus if the Grassy Knoll escape plan looked like it might be compromised) told me, “History is what we say it is, and it will not be changed by you or anyone else.”
Er… OK. But don’t fault me for trying the truth now and then, and forgive me with any liberties I take in the absence of good solid news reports full of details and hard facts… a matter which always makes me wonder what we are really dealing with…James holmes a mind-controlled patsy? Come the terror at night, or by day, the citizens Plight is, or it may, be which one is right, by what they say, who is guilty of the fright, and how shall we repay? I wrote that with Aurora in mind, but it applies to a long American history of dark bumps in the dark, does it not? James holmes is a patsy in a false flag operation
Added section: Ring: The receiver is lifted, but no greeting is offered, the Executive seated at the expansive desk in a plush office recognizing the calling number.
Voice on line: “The script will be ready on July 20. Adjust your plans accordingly.” The line went dead and the Executive hung up, and then dialed a number of his own.
Executive: “I’m green lighting Drum Roll. Production can begin at once, with a shooting date set for July 20. Make sure the cast and props are ready by then, and there are no problems in the storyboarding and rehearsals.” And then he hangs up.
Note: Double speak is the intelligence community perfected ‘art’ of speaking in the open about something by couching key matters in allegory or parable form. In the above example, we see how someone in the motion picture industry might talk about a film production… that was really something else… Drum Roll being the role played by the drum magazine in the shooting. Storyboarding means contingency planning, and rehearsals means that everyone knows the plan forwards and backwards. The script refers to the scheduled date of the theater shooting exercise which ‘just happened’ to be being held the same day of the shooting some ten minutes away off the same Freeway access as enjoyed by the Century theater. Interesting because high-risk intel ops such as would be true of a false flag operation, tend to employ a similar ‘drill’ for a like event on the same day and in the same city. This provides a cover operation so that if an operative is compromised, they will not be arrested and the plot can be aborted without exposure of the truth. End of added section.
James holmes is a patsy in a false flag operation
Ring: “Hello? News reporter here.”
Recognized voice: “The word’s going out to all our newsies… be sure to point out he had over $20,000 in high-tech equipment,
and have another story by someone else suggest there is reason to believe there were Islamic ties, and be sure to play up the gun violence angle. And be sure not to mention he worked on that DARPA* project to develop super soldiers. That U.N. Treaty must be signed!”
News reporter: “But the shooting just happened. There’s been no time for an investigation, yet. What’s our source?”
Recognized voice: “Don’t worry about that. Just say ‘sources close to the investigation,’ and people won’t be smart enough to know any better… except for the ‘conspiracy buffs’ which you already know how to deal with.”
News reporter: “Right. By simply calling them that and ridiculing them for it. Got to hand it to Walter Cronkite for making that work so well in the JFK thing.”
*D.A.R.P.A. Defense Advanced Research Project Agency
Note: Walter was ex Army intel, and would have been a logical go-to person as part of CIA’s Operation Mockingbird which infiltrated news media with, by various estimates, over 1,000 operatives from CIA or on their payroll under the table. Since JFK, no conspiracy investigation has made good headway because media keeps trotting this excuse to ignore the valid questions of civilian investigators and investigative authors, or Engineers, Pilots, and other professionals who come forward with challenges to the official explanations. As one well known Comedian like to say, “I don’t get no respect, you know?”
James holmes is a patsy in a false flag operation
Ring: “Hello, Police Public Spokesperson.”
Recognized voice: “You have to stop talking about the possibility of the shooter having help. He’s a lone nut, nothing more.”
Police Public Spokesperson: “But people are trying to figure out how he got he got the larger weapons into the theater and all that gear. We already have one witness who’s been quoted as seeing someone open the Emergency Exit for him.”
Recognized voice: “Don’t worry about him. We have that covered. And don’t worry about what people think. We tell them what to think. Just do as I say.”
Police Public Spokesperson: “O.K. If you say so. Has everyone else in the loop here been so advised, or do I need to have an excuse to pass along?”
Recognized voice: “The key people are our people. We have it all covered, just like L.A. with the RFK matter.”
Note: In Robert Kennedy’s assassination, the Radio Dispatcher who controlled what Cops did that day and the Chief of Police were ex CIA. No wonder cops did not pursue the Woman in the Polka Dot dress, and the L.A.P.D. destroyed all the evidence which indicated more shots were fired than contained in Sirhan Sirhan’s gun, and did not protest that the fatal wounds came from the other side of his body where Thane Ceaser, a security staffer to a CIA involved military contractor had been walking directly behind Robert at the time of the shooting.
James holmes is a patsy in a false flag operation
Door shuts behind the lone interrorgator (spelling on purpose), and he takes a seat before the exhausted man at the desk. Interrorgator: “You told our people at the theater that you saw
someone open the Exit Door for the shooter a second smoke grenade thrown from the opposite direction?”
Eyewitness: “Yes. I couldn’t see who
because it was silhouettes against the movie screen might have thrown it.”
Interrorgator: “That’s impossible. We know the shooter was a lone gunman, and had no help. We have lots of people lined up who are going to be saying they saw it differently.”
Eyewitness: “I know what I saw. I was not more than ten feet away, and
he crossed in it flew right in front of me.”
Interrorgator: “That’s not what you saw. The confusion and fear of the shooting has simply confused your memory. All you saw was
someone getting up to take a leak or buy some popcorn. He never opened the door was some action on the theater screen from the movie… your mind has simply played a trick on you and filled in the blanks.”
Eyewitness: “No. I’m certain.”
Interrorgator: “Listen, kid. I’m going to lay it on the line for you.” Grabs him by the collar and jerks him halfway across the table. “I’m telling you, and you’d better listen up real careful like, you didn’t see that, you were confused. If you tell anyone you saw that, something bad might happen to you. There are a lot of people upset about this, and some of them have tempers and are looking for someone to go after. They don’t think very clearly, and I’m trying to keep you from getting seriously hurt… or your family for the matter. Do I make myself clear?”
Eyewitness: “You’re threatening me? With those people watching behind the mirror with cameras?”
Interrorgator: “You’re Goddamn right I’m threatening you.” Slaps face. “I sent those people on break and killed the camera, but in five more minutes, I’m going to call them back and we are going to be asking you the same question I started with, and you had better damn well tell me you were confused, or you and yours have NO F***ING FUTURE.” Shoves him back into his seat. “Do we agree on that, or not? Because if not, I can’t protect you!”
Eyewitness: “O.K. O.K. You win. I’m confused. I didn’t see anything except someone going to get popcorn.”
Note: Something almost identical to this happened to witnesses at JFK, RFK, and MLK, as well as the Flight 80o shoot down. Witnesses are often ‘told what they saw’ and told they were ‘confused by events,’ to allow investigators to later say their initial statements were not useful because of duress under stress impacting their memory.
James holmes is a patsy in a false flag operation
Ring: “Hello, Fire Department.”
Police Department: “We need you to take a Ladder Truck over to the shooter’s place and look in the window for us.”
Fire Department: “Why? We’ve never done anything like that before. What’s going on?”
Police Department: “We just want to make sure its not booby trapped. You need to tell us if it is so you we can send the Bomb Squad out.”
Fire Department: “Did the shooter say something to make you think there’s a bomb?”
Police Department: “Uh… sure. Yea. Something like that.”
Fire Department: “Well why not just send the bomb squad.”
Police Department: “Well, uh… I’m just doing what I’m told. I think they want high visibility with the press. Uh… you know… to make everyone look good. You will look good. We will look good… on TV… our small community will look good on national TV.”
Fire Department: “Whatever you say, Chief.”
Note: At a disadvantage with no concrete facts, there may have been a legitimate reason for asking the Fire Department to participate. Yet they did eventually send the Bomb Squad in and the first thing done was to use robots. Did the robots go in the window? Not that I’ve seen on video. No, they went in the front door. How do we know this? Because we have video of the bomb squad breaking out a portion of the window which would have needed to be removed if using the window for insertion of robots… doing so from the inside after the robots had finished. So why would there not have been a booby trap on the door blowing the robot away? That’s the FIRST thing I’d booby trap if of a mind to booby trap anything.
James holmes is a patsy in a false flag operation
Ring: “Bomb squad.”
Familiar Voice: “Be sure to blow a lot of stuff up at the practice demolition site afterwards.”
Bomb squad: “Why not just use the portable unit we always take with us? There’s nothing here large enough to require the demolition site.”
Familiar Voice: “TV coverage. Want to look good on TV, don’t you? Besides, the order comes from the top.”
Bomb squad: “Fine. We can have the rookies get in some practice at the same time.”
Note: The portable units (Mobile Explosion Containment Units) can contain significant blasts, but are not necessarily used for on-site demolition of bombs. They would perhaps prefer to instead transport explosives to a demolition site, as the units provide increased safety for such transport. However, some devices might be judged unsafe for transport, and should perhaps be destroyed at the crime scene. WHEN MULTIPLE DEVICES are found, there are several interesting possibilities which drove my inclusion of this portion of the dialogs.
a) The devices were too large to detonate on site. But we know that is not the case because we saw them on TV and they were small explosions (keep in mind that they use explosive devices to explode the bombs, so whatever blast you see is necessarily larger than the bomb by itself would have been.) Further, had this been the case, they should have likely been too large for collective transport, exceeding the safe operating limits of the mobile unit. But they were not shown making multiple trips to accommodate multiple bombs, so we again know this was not the case.
b) Despite the number of devices, their cumulative potential for damage is collectively within the ability of the chamber’s ability to safely transport through populated streets. IN SUCH A CASE, the bombs would normally be disposed of at the bomb squad’s facilities as a SINGLE BLAST. But we saw video on the news of multiple blasts in close proximity. This CONFIRMS they were not big blasts individually, and should have been done as a single blast. Why not? I can think of only one reason: Publicity stunt.
James holmes is a patsy in a false flag operation
Added section: Ring: “Executive speaking.”
Voice on line: “There’s been a problem with that special script for Drum Roll. It hasn’t been received by the Publicist.”
Executive: “Well where the hell is it, then?”
Voice: “We think it might be lost in the mail room for some reason.”
Executive: “Well get the… ah, you know… the ‘Director of Security’… to go search for it, then. That’s an important matter useful to Advertising and Promoting Drum Roll to the viewing public.”
Voice: “How do I do that? What do I tell them is the reason?”
Executive: Pauses. “I don’t know. It’s your job to solve problems like this.” Pauses again. “But try this; tell the Publicist to call the Director and complain about a suspicious package… and use that to get Security involved. Use your imagination.” Slams the receiver with a curse.
Note: Director of Security is their contact in the Police Dept. The Publicist is the Psychologist, or someone acting on her behalf. For some strange reason, the Psychologist indeed contacted Police about a strange package which showed up on her desk with no name on it, which turned out to be nothing but a text book being returned by a student. The explanation was concern, after the news about the bombs in James’ apartment, that it might be a bomb from James — in which case I wonder how James managed to put it on her desk while he was under arrest. For an even stranger reason, Police then searched the entire mail room to find the ‘script’ James allegedly mailed explaining in detail his plan to shoot up the theater. Strangest of all is that it was sent 8 days prior to the shooting. End of added section.
Next dialog, and the last, most telling of all…
Interrogator: “O.K., James. You want to tell us why you did it?”
James: “Did what? Why I am under arrest?”
Note: Jame’s reaction after the shooting is no different than Sirhan Sirhan (RFK), Jack Ruby (Oswald), David Chapman (John Lennon), Arthur Bremer (George Wallace), Squeaky Fromme (Reagan), and John Hinkley (Reagan), and others: No attempt to escape, in many cases going limp or calmly waiting nearby for arrest. Many of them have no recollection of the event, or have a single line of ‘political’ thought on it which they repeat, or start to explain and then just at the critical moment, change the subject.
These are all known methods of dissociation symptomatic of programmed Manchurian Candidates who are incapable of ‘confessing’ the truth, as they genuinely are not aware of it. In this case, we know he simply waited in his car and put up no resistance. What we don’t really know is if he has told the Police anything at all, but must presume not, or it would have been all over the news in some form or another.
So I’m taking the liberty and risk to assume, here. Please forgive any Ass made out of You and Me thereby. If I’m way off base, I’d be just as happy with the thought you may have gotten some entrainment value from it… because if I’m not off base, we are all going to end up mad enough to bring down the government and lynch some people.
James holmes is a patsy in a false flag operation
Please rate this article at page top, tweet/share, and comment. All comments welcome, good or bad.
- Official Formula For Conspiracy Coverups (proparanoid.wordpress.com)
Not even the aircrew knows what they are telling you to think
by H. Michael Sweeney
Note: in preparation of this article, which updates and corrects some prior material I’ve posted in the past, I had intended to copy material already posted at my proparanoid.net Website, only to discover it appears to have been hacked (my host service stopped using Macintosh, it seems). The entire article relating to Command Solo has vanished, links and all. I wonder who would have a motive for excising only Command Solo information? No matter, it is also in my book, M.C. Realities: Understanding, Detecting, and Defeating Electronic Weapons and Methodologies of Political Control Technology.
A plane like no other, an admitted weapon against free-will thought
It’s a specially modified Hercules C-130 called Command Solo, and the U.S.A.F. currently operates a fleet of 7 of them (predecessors, Coronet Solo, entered service as early as 1978). They are based out of the 193rd Special Operations Wing stationed at what used to be Olmstead AFB, now part of the Harrisburg International Airport at Middletown, PA. Costing up to $110M each, they are the ultimate tool in government’s arsenal of Political Control Technology (PCT) used to subvert God’s gift of self determination. Official USAF info, here. Notice my photo is better than theirs.
Assigned to the Air National Guard, they frequently fly training missions over U.S. Soil, and no one who might feel a twinge of guilt, not even the aircrew, knows what messages they beam down to the ground. It’s all a super sophisticated programmed system with nothing but indicators and meters to show how things are operating. See inset picture.
Officially, it ‘intercepts and blocks existing broadcasts and replaces them with whatever information is deemed necessary to achieve mission goals,’ and operates in the ‘AM, FM, and UHF/VHF TV bands employing medium and high frequency, very high frequency, and ultra high frequency.’ The problem with these statements is that they avoid discussing yet two other capabilities, one being subliminal message embedding, and the other being the use of low frequency and extra low frequency, ELF. This is the darker potential of Command Solo:
All such psyops methodology is based on principles of mind control developed by CIA and the DOD, and even research by NASA, many of the same technologies used selectively on Targeted Individuals by operatives on the ground to make them seem Schizophrenic, though victims of that level of mind control also ‘enjoy’ other special PCT treatments as well, to include low-tech methods such as organized stalking, sometimes called dogging, or street theater.
It is not simply conspiracy theory or conjecture. The Air Force has admitted Command Solo’s use of such tech with startling results in sanctioned operations abroad, and further admits they are allowed to use it here in America in certain circumstances. But the problem is, there is no way to police or monitor its use, detect it in use, nor know what the content may be.
How it works
Overt messaging: The least offensive possible use, whereby simple and direct propaganda is broadcast. The plane can even fly low altitude missions of this type and use loudspeakers capable of overcoming the plane’s engine noise by use of sound canceling technology. But this does not bother me in the least.
Subliminal messaging: The aircraft flies at altitude, loitering in large circles for endless hours, perhaps even employing in-flight refueling to increase time on station. There it picks up citizen broadcast radio and TV signals, and replaces or rebroadcasts them at amplified levels. It can work on select, whole groups, or even all locally available signals. How nice of them to provide improved reception quality for those listeners and viewers lucky enough to be below.
But there is a price to pay for the audience. The broadcast signals contain a few added elements of information embedded within the audio tracks. It is not known to be the case, but it is also presumed additional subliminals could be contained within the video. Subliminals are simple, brief, and repeated messages in a form not consciously discernible by the listener/viewer, but which, by repetition, are perceived and communicated subconsciously.
To my knowledge, the first known use that made the news about visual subliminals was in the motion picture industry when one frame in 24 (one frame every second) would have superimposed upon the image a single word, such as ‘popcorn,’ usually just before the intermission. This could also be achieved by the use of a second projector with all black film save the ‘word’ frames where the word was clear and transmitted white light in superimposition.
Alfred Hitchcock had the word ‘fear’ added directly to the film Psycho just before the scary parts. That was the use which became public, and revealed the fuller use to the public’s dismay, and soon enough sparked laws prohibiting its use altogether. We must suppose such laws are adhered to, as there is no easy way to know, for sure. All TV and film is candidate for suspect, and only frame-by-frame review would prove anything useful.
In audio subliminal messaging, a method known as ‘back tracking’ or ‘back masking’ gets a lot of attention in media, today… where the sound played backwards has a ‘secret message’, usually dark or evil. In some cases, the audio content may mirror the same information both forwards and backwards, such as is claimed for the famous ‘That’s one small step for man…’ moon-walk line, which backwards, says, ‘Man will space walk.’
The subconscious mind is said to ‘hear’ these messages quite well, but the phenomenon tends to happen naturally without engineering. While it is possible to engineer it, and many songs employ it for special effect, in my opinion, employing it for mind control purposes is less useful and less practical than employing a much more common method.
The simpler and earlier known method is to simply embed the message directly into the audio at inaudible levels and at frequencies or pitches sympathetic to the existing audio such that it seems part of the intended content. This method allows complex messages to be absorbed, and is well known as a means of teaching topical information or improving mental performance or even physiological attributes of people while awake or sleep. As long as the user of such content is informed of the existence and nature of subliminals, it is legal. Command Solo employs this later technology, but of course, there is no content warning.
EEG entrainment: There is currently no hard proof Command Solo employs EEG entrainment, though photographs (see image) of the plane reveal design elements which indicate the needed transmitters are installed. I’ve had the example photograph with annotations on line for nearly two decades and to date no one has protested the allegations with technical proofs or basis (or at all, for the matter, save possibly the protest inherent in the hacking thereof, which strangely left the image in tact — through removal of the image would have more quickly revealed the hack had taken place.)
The brain operates at extremely low frequencies (ELF) below 15 cycles per second (15 Hz). EEG (ElectroEncephaloGram) readings at multiple locations on the skull can be used to monitor brain activity by capturing these signals and converting them to printed readouts of squiggly lines for medical review. However, a given type of thought or mood, or even general physiological state (e.g. headaches, nausea, pain) will result in specifically unique EEG patterns as a collective. The EEG squigglies are indeed a de facto brain wave frequency map of such states.
Where such a frequency map is rebroadcast by traditional radio in the same frequencies but at stronger levels than the brain itself generates, the brain will adopt them as its own. This is called entrainment. Command Solo employs what I claim are special ELF transmitters to broadcast such frequency maps to a broad area to impact the thoughts of people below. Like the subliminals, this is presumed to impact anyone within several hundreds, perhaps thousands of square miles, though it must fade in potency as distance from the plane increases.
Therefore, by broadcasting subliminals such as ‘I should surrender if I get the chance…’ along with EEG states of mind such as ‘fear’ and ‘nausea,’ it is possible to perform quite a mind f*** of anyone unfortunate enough to be in the plane’s range of operation.
Follows is are excerpts from an article by Judy Wall, who was publisher of Resonance, a newsletter for members of MENSA (the high-IQ society) who specifically are involved in bioelectromagnetics study or research; a scientific paper. She also wrote investigative material for the magazine, Nexus, an international magazine covering technology as well as social phenomenon and their impact on mental and physical health. From Issue 7, volume 5 of Nexus, we find:
According to the (USAF provided) fact sheet: Missions are flown at maximum altitudes possible to ensure optimum propagation patterns… A typical mission consists of a single ship orbit which is offset from the desired target audience. The targets may be either military or civilian personnel…
In a phone call to the USAF Special Operations Command Public Affairs Office, I questioned the legitimacy of using these subliminal broadcasts against civilian populations. I was told that it was all perfectly legal, having been approved by the U.S. Congress (!) …the Air National Guard of the individual states in the U.S. can also operate Commando Solo aircraft, should the Governor of a state request assistance. That means the PsyOps mind control technology can be directed against U.S. citizens.
…On July 21, 1994, the US Department of Defense proposed that non lethal weapons be used not only against declared enemies, but against anyone engaged in activities that the DOD opposed. That could include almost anybody and anything. Note that the mind control technology is classified under non lethal weapons.
USAF General John Jumper ‘predicts that the military will have the tools to make potential enemies see, hear, and believe things that do not exist’ and that ‘The same idea was contained in a 15 volume study by the USAF Scientific Advisory Board, issued in 1996, on how to maintain US air and space superiority on the battlefields of the 21st century.’
Wall went on to report confirmation that Command Solo was employed in Iraq and specifically to sway Bosnian elections. The U.S.A.F. admitted to her that Command Solo played a significant role in getting Iraqi troops to surrender en mass, even sometimes to model airplanes (UAV – Unmanned Ariel Vehicles), and to sway elections in Bosnia to insure a Coalition approved leader was installed for the purpose of maintaining political control and stability of the region.
Additional thoughts (mine, not theirs)
This technology was first deployed in 1978. What happened in 1978? The World’s first mind control cult mass suicide: 909 persons at Johnstown, a CIA established cult started called The People’s Temple, led by Jim Jones. The cult, located in Guyana, was frequently overflown at surveillance distances by C-130 aircraft.
The significantly upgraded (EEG) version was introduced in 1980. What happened in 1980? Iranians stormed the Russian Embassy in Teheran; 63 religious Zealots seize the Grand Mosque in Mecca and are beheaded; Bani Sadr, the most pro American of candidates is elected as President of the new government in Iran (this is at the time Iran held 6 American hostages); unarmed farmers storm, occupy, and burn the Spanish Embassy in Guatamala, a key event to Democracy being established a few years later.
These events prove nothing concretely, but themes appear with a frequency to cause one to wonder, ‘what if?’
A logical question arises:
How do we know what information is contained in Command Solo when over U.S. soil? The answer is, we don’t. The aircrews do not, either. Nor does Congress, or perhaps even those who should know at the Pentagon. Perhaps only the preparer of the preprogrammed digital tapes used to modify and retransmit knows, and it is conceivable even that person does not know, likely ordering it by a code number which does not reveal content. It may simply be marked ‘Training Use Only.’ But somewhere, someone knows, and they won’t be talking about it honestly if it contains messages to sway our political opinions and social viewpoints, or our votes and other key actions.
Now, does that sound like a democracy in action, or more like a military police state growing its power? You know my answer, best summed up by the wish that the right to bear arms might ought to include Stinger missiles. I’d like to see these aircraft permanently grounded, along with the 30,000 Global Hawk drones they want to fly over U.S. soil to ‘protect us from terrorists.’
WE are the terrorists, because our ability to think for ourselves is threat to the security of the 1% who seek total control; we strike terror into their hearts every time someone like me makes public the truth, and someone like you chooses to read, share, like, and rate (page top) that message. We know this fear to be true for many reasons, as cited in my other posts on related topics.
That’s why its called PCT in the first place, an abomination before God in defiance and subversion of His gift of Free Will and self determination we were promised by the Constitution as ‘the pursuit of happiness.’ Where, exactly, do you live, again?
Buy now, be happy. Trust government, vote for X, and be safe. Spend money, be happy. Believe TV news, fear terrorism. Borrow money, be happy. Fear terrorism, Vote for X, and be safe. Watch TV, be happy. Ban guns, be safe. Buy now, be happy. Trust government, vote for X, and be safe. Spend money, be happy. Believe TV news, fear terrorism. Borrow money, be happy. Fear terrorism, Vote for X, and be safe. Watch TV, be happy. Ban guns, be safe.
- Real Scientific Evidence for Subliminal Messaging: A Rising Tide (whatispsychology.biz)
- Timeline of Masonic/Illuminati/Mind Control Evolutions (proparanoid.wordpress.com)
- Can subliminal messages in movies be used to manipulate you? Like in FIGHT CLUB? (businessinsider.com)
The NWO can’t have my gun until I first get rid of the bullets
Update March 7 2013: Did the FBI undertake a covert ops to check out my gun collection (see image below, which I’ve posted both here and at my Facebook pages). Today and a few days ago, five individuals claiming to be insurance company employees entered a) my apartment; b) my daughter’s apartment; c) her husband’s father’s and brother’s apartment… claiming to do an insurance evaluation for the Landlord. They seemed to be focused on wanting to find and check out the water heater…
And so they looked in my bedroom (my office)… and then the closet… my (other) daughter’s bedroom and then the closet… the kitchen/dining area… the living room… and the master bedroom… and then the closet (where they FOUND the water heater)… and then continued looking for it in the other bathroom, the deck, and the deck closet… and then the attic storage area. It was OK, though, because they asked permission before opening any door, just like a law enforcement Officer would do when they had no warrant.
Having found the water heater behind a wall of stored items in the closet, all they could see of it was that it existed, as evidenced by about 12 square inches of tank wall and a couple of water pipes. I’m sure that was all they needed to answer their important insurance questions, because they didn’t ask anything about it, take pictures of it, or move anything to get a closer look. Yep. Insurance work is getting easier all the time thanks to the marvels of digital photography…
which, while they did not use it on the water heater, it being so important to them, and all, they did use it take pictures of other important things, mostly with deft hand-movements that concealed the camera from view. When I said something about the deck rotting after catching one of them using the camera, he even took a picture of the deck! Very important to water heater evaluations, yes?
Now would be a good time to mention that the woman looked very much like a known FBI agent from the Portland Office. Only the last time I saw her was when I was targeted by FBI for writing about Flight 800 friendly fire shoot down. I got visits from ONI, as well, and even one MI-6 chap who issued a death threat, and indeed over the next couple of months there were attempts on my life (not by him, but by local LEA, one of whom had been driving a car with license plates blocked out of Langley with DVM).
But I might be wrong. Might not be her. Kind of hard to tell because she had PUT ON SO MUCH WEIGHT! Any more and she would have a hard time passing the physical requirements. Kind of weird seeing someone who used to have a waist line now shaped more like a kite, and thinking them FBI. Kind of makes you loose confidence in government’s management capabilities, does it not?
Now is also a good time to mention that one of the men was seen wearing an old T-shirt from a known local CIA front… the one with all the technical toys hanging on his tool belt, and a clipboard. Anyone with the old T-shirt (the new ones are different) is usually an EX employee turned private contractor for hire. That front’s specialty is covert surveillance and eavesdropping. So if they left anything here, they had better real quick find a way to come and collect it before I can find it (I CAN VERY LIKELY find it), and end up filing a law suit, or at the very least go public with documentation of it.
The kicker? The image is NOT even mine, though I wish it was. It is a random image pulled from the Web for whom no original owner is evident (probably their wish). But FBI would rather do the knee-jerk, fear-based, jump-to-conclusion elaborate covert ops thing than bother to do a little research. Obama does not have enough money to pay for (anything we citizens need) but can spend $20,000 to convince the Landlord to go along with a phony insurance inspection ploy instead of $2 for a Google search? LMAO.
End of update – though I’d like you to know there are a series of companion posts which happen to also be my most popular posts (use My Posts menu item and select Top Ten).
Is FBI targeting people who have gun collections?
by H. Michael Sweeney
I may not speak for all gun owners, but i’m betting my sentiments are not at all isolated nor inconsequential. Look up the word consequence, to fully understand my meaning.
I hope the bluntness and inflammatory nature of my remarks are not lost on anyone. I deeply regret any need to write this, and in such tone, in the face of the unimaginable grief and wounds to the heart and soul of those who lost loved ones in Aurora. And though I’m sure they will not appreciate my remarks in the least, I cannot remain silent: I am incensed by the tragedy, doubly so because I see the darkness which surely drove it, and thrice so because it just happened to be within minutes of what is believed by many to be the intended new Capitol of the NewStates of America, also of that same darkness.
The shock value is for the Sheeple who need to listen up for a change and actually notice what’s happening around them outside of the sound bites they are fed daily. The NWO cares not for 71, 7,100, or 71,000,000 of us, if our loss will further their cause. We are but mere pawns who are allowed to pay for our own victimization that they may remain the 1% in power.
It’s also a warning to the governments of the World, including the United Nations and United States, that gun owners are the last people who give a damn about false flag terrorism as impacting our decisions on gun ownership. So if you want our guns, get yours, and come and try to get ours, if you can. A piece of paper, no matter whos’ signature is on it, or what flowery, tear jerking, politically correct words appear above it, will be of zero meaning to most of us, because we know why you want the guns, which brings us to the last reason for my blunt words.
Because it’s also battle cry for the rest of us, because we are so fed up with the BS that you spew forth so endlessly as if yours was the only side of the coin. We suffer from what I call too many Fascists Syndrome. You folks in power can have your Police State, but a piece of paper won’t get our guns, FIRST. You will have to take your chances after the fact, and we will see what happens when you try to go for it. You will have to get the answer to the age old question you’ve been afraid to openly ask, the hard way. And that question is…
Will we resist you, or won’t we?
You have feared the answer for decades, ever since the military Coupe your elders failed to make good on in 1933. The fear of what the answer might be to that question is all that has slowed you down, isn’t it? YOU, by the way, define the answer to that question, yourself. You define it by your actions. You would have no fear and not even need ask the question in that ‘kinder and gentler government’ you promised a few years ago, but woe unto you for the kind of government you are intent upon building, today. You risk much with every step closer to goal you take.
The Camel has a weight limit, and even we know not the final straw
What do I know that I should dare confront you so firmly? Because for decades I have researched you, and have written seven books about you. In particular, I’ve studied your preoccupation with Political Control Technology, that evil originally called mind control. There is one aspect of that, the Manchurian Candidate being a suitable (though technically incorrect) descriptor; a programmable killer, or agent, one capable of executing any foul instruction and being unable to later recall the deed, much less the instructions. MPD/DID through RSA torture is the proper term, along with hypnosis and chemical catalysts. Psychological magic mixed with Satanic methods of ancient times.
Words that should scare even you: Aritchoke, MK-Ultra, Often, Chikwit, NAOMI, and on and on. Patsies and real killers created by assembly line, rendered sleepers into society for activation on need, and often targeted with other forms of PCT to make them seem conveniently crazy should you need to call them into play. Am I crazy to say these things, or too close to the truth for you to dare even acknowledge I said them?
That is modus operandi, is it not? Ignore accusations as it tends to make people think there is nothing to them, and make the accuser go away once they get tired? Sorry, it’s been twenty years and I’m still talking, still accusing, and I am in no way alone. As result of our persistence, more and more Sheeple wake up each day, especially among the programmed sleepers. Fear us, for we are Legion! And guess what? We don’t even fear you enough to be anonymous about it.
Down to cases: to be specific, I accuse…
…that virtually every mass shooting incident has been a programmed shooter since the Texas Tower sniper felled 48 people, killing 16, in over an hour and a half of terror in 1966. And, as if some CIA operation gone wrong, media just magically stopped talking about it and kind of swept it under the carpet. Examine as many of this kind of incident as you wish, and please, by all means, lets include assassination attempts.
It is almost impossible to find an exception where the shooter was not under psychiatric care, commonly involving hypnosis and or drugs associated with CIA mind control research. At times, actual ties to CIA MC scientists or similar clues are found. Can you say, ‘Catcher in the Rye?’ How about Dr. William J. Bryan. Ring a bell? Manchurian, indeed!
It is almost impossible to find such an event where, if the shooter was captured alive, they were able to recall the incident. Why? Because of complete dissociation and honest lack of memory of the event, a known CIA methodology associated with mind control of the type in question.
It is ludicrous to the point of absurdity that any Sheeple remain unaware of the consistent ‘coincidence’ that Congress always seems to have legislation in hand ready to vote upon which ‘protects us’ from just such events as quickly as they happen, and quickly ‘strengthening gun laws.’ Gee, I have not noticed much improvement.
It was by this means that you have gotten us to register our weapons, which is something we should never have done, because now you know who and where we are, for that day when you come to collect our bullets. And you know, things still have not improved much with that law, have they?
It was by this means that you banned whole categories of weapons which would make any such effort more difficult for you, because you might end up collecting the bullets too quickly for your taste. And still no improvement in sight. Imagine that.
It was by this means that you made the good name of the NRA, of which I am not a member, and do not represent or speak for, but whom I respect, to seem to many Sheeple some dark kind of conspiracy, when in fact, it is YOU who conspire, and you who deceives. Still no improvement. Do you really think these laws through when you write them? Ever heard of logic?
And, it was by this means that you used even greater terrors to establish whole new agencies to spy upon us and to assault us with little dirty tricks in hopes of guiding us to the Sheeple category, but — SURPRISE! You instead created more of us and made us more adamant than ever. As I said, it is YOU that determines your fate, your actions which dictate the answer to your rightly asked question.
So, especially those of you in Congress, please keep that age-old question in mind when it comes time to consider outrageous gun or ammo taxes, and especially the U.N. sponsored international gun grab that gives up some more national sovereignty to the New World Order at the expense of the Constitution. Set the stage for a one World government and leader… who is that, again? The Antichrist? You really think we will allow that, do you?
Remember theses questions, and remember this: you can fool some of the people all of the time (the Sheeple), but you can’t fool the rest of us at any time, because Fascists are to us a known entity, and we do not listen to anything they say, except to hold it against them at their tribunal!
But what am I saying? I don’t even own a gun. But I assure you that I will, and millions more with me, if you force the matter to a head. Act wisely, for no one can easily stop what you might unleash through unbridled arrogance and lust for power.
How to know, what to do about it
by H. Michael Sweeney
This is an updated summary review of information (not excerpted) from my book, The Professional Paranoid: How to Fight Back When Investigated, Stalked, Targeted, or Harassed by Any Agency, Organization, or Individual (available in ebook, CDR, and hard copy)
This post is a companion to a post on cell phone security made just hours earlier. Unless you want me to repeat that introduction, you should quick like a bunny hop over to and read it, first, as it sets the stage. I’ll wait right here…
Good. Now that we are on the same page, it seems pretty clear that if a person is being monitored in their phone calls, then there is a good chance they are under what’s called a full surveillance net. That means that in addition to your phones, everything from your mail and computer communications, and your travels away from home, not to mention everything you do in your home, including sex, are likely being monitored.
Only a Police State is paranoid enough to watch people like that… and perhaps voyeurs. One could argue then, I suppose, that sexually repressed people tend to be the ones who apply for and take these kinds of jobs with the intelligence agencies. Take a look at CIA spooks David Ferrie and Clay Shaw of JFK assassination fame, for instance. That may be why TSA has so many perverts groping people. I don’t know. Sorry, couldn’t resist.
Methods of being followed
Watch the Will Smith/Gene Hackman movie, Enemy of the State, and you quickly learn there are all kinds of ways: satellite surveillance, tracking devices, helicopters, cars, on foot, and even by microphone relay and telephone calls (where we left off). Now, with all that sophistication comes an associated cost factor, which tends to favor use of low tech except for the greatest of national security risks or fears. So you, as mere ‘suspect’ in some government imagined conspiracy to blow up your underware because you think for yourself and talk openly in an attempt to get others to use their minds, are more likely to be followed by car or tracking device than the more exotic means available.
Funny thing about tracking devices, though, is there is almost always a car following that signal. You won’t see it, but it’s almost certainly there. The purpose of the device CAN be simply to make and keep a record of your travels for later consideration, but usually, they prefer to be close enough at hand so that once you stop at a location, they can show up and see WHY you stopped… since the satellite isn’t going to be watching for them. So for my purposes, it’s the same as being followed by car.
The only difference is, you won’t see them in the rearview, but like the folks you do find there repeatedly, you will see them at destination if you are alert and can find a good observation post you can use with some useful patience. I’ve even found them there waiting for me. That was a fun story, just part of a five year running war with the paranoids, but I’ll save it for another time, perhaps. But other than them showing up like that, we need another way to know for sure.
How to detect being followed
First, how NOT too, would be more in order. Don’t keep looking for it, and don’t assume a car you see with great frequency is a bad guy. You are by and large a creature of habit taking the same routes to get to any given repeat location at roughly repeat times of day. So is everyone else. So I don’t get nervous because a certain rusty Chevy is within a few cars of me several times a week. Actually, I don’t get nervous even if I do think them following me, because I don’t want it known that I know. So I don’t spend all my time looking up at the mirror. If you insist on that, get a rearview camera ‘so you don’t back up over some kids,’ and glance at that furiously.
Just be aware of cars around you all the time, with NORMAL use of mirrors and glances out windows. Don’t be looking like you are on the lookout. Trust your instincts, and if you ‘feel’ like you are being followed, you may just be. At such times, or when you THINK perhaps a given car is just a little too familiar (or a driver), find something about the vehicle or driver you can identify later, and make a mental note, or a verbal note to a VOX (voice activated) pocket recorder, or a written note to a memo pad, or even a photograph. Note time, place, and descriptor.
The descriptor is going to be whatever thing is easy to recall. It might be a dent or rust spot, an odd paint job, a bumper sticker, or, where nothing else works, the license plate. Now there is a trick to remembering plates (more correctly, making them memorable) that I like to use when part of the sequence is alphabetic. RTU 035 is the plate of a vehicle associated with a CIA operative (more correctly, a retired Marine Forward Observer hired to ‘observe’ me by CIA). I glanced at that plate and forever now can recall it by my memory trick.
Simply make up some nonsense acronym out of the alpha portion and repeat it to yourself a few times while looking at the vehicle, not the plate – you want to associate the plate with the color, make, model, etc., not some rectangular piece of metal that might be replaced at some point. So in my example, I said ‘Rat-Tailed U-boat 035, Rat-Tailed U-boat 035, Rat-Tailed U-boat 035.’ Done deal. Next vehicle, please.
You can do the same with drivers. I enjoyed making up names for them, too: Pug Face (looked like a boxer who didn’t retire soon enough); The Professor (very dignified); The Liddy Man (wore a Liddy mustache and similar hair line; The Cuban (you get the idea). You will often see these people in multiple vehicles over time. It really gets interesting when you see the same groups of people in the same cars others of the group had earlier driven. And above all else, the most important clue… when you see the same people or cars at differing parts of town on the same day… especially if in those groups. Been there, done that.
But I did also employ both audio and paper, and photographs, as situations allowed or required (such as when there is not a lot of time and the situation is fluid). At days end, I would compile these all into a database, and once a week, for those repeat offenders (that’s the important clue), I’d go down to the Department of Motor Vehicles and run the plates to see who owned them.
Can’t do that any more here in Oregon, they made it illegal. Most states won’t allow it unless you are law enforcement. No problem. Lots of friends and relatives in law enforcement. Don’t have any? Make it happen, but you need to become GOOD friends because to help, they risk getting into trouble. It’s very helpful if you are both politically incorrect, at least privately (cops don’t get very vocal about that in public, it tends to cause unemployment).
Benefits and reasons for detection
There are some serious reasons beyond merely confirming suspicions. Example: Amazing thing about the DMV reports was, for me, that more than half the plates were reported either as stolen, non existent, or blocked by law enforcement. Actually, they didn’t tell me the later part, they just said non existent. But all I had to do was lean a bit and read it for myself on their CRT screen. Point is, such reports give you a clue as to who is involved. If you don’t get a lot of stolen/non existing plates, then you are probably dealing with private investigators, corporate goons, or some kind of group of idiot citizens thinking themselves above the law. Else, its government of some kind.
In my book I go into a lot more depth with some intermediate steps designed to better identify your players, and to give yourself tactical advantages. In fact, overall, its one of the larger sections of the book, and its followed by whole sections on offensive and defensive actions that fit into any knowledge gained about who is involved. That’s because, when you know who, you know why, and when you know all that, you know their limitations and what to expect from them when you do X. You start to control events forcing them to react to you instead of you being a mere bug under an unseen microscope subject to their manipulations.
And, it talks about their manipulations, and how to deal with them. They will attempt manipulations, mostly to see your reactions as part of establishing a psychological profile (another reason for cameras in the bedroom, I suppose). So one trick I talk a lot about, is ACT, don’t REACT. Learn to control responses: consider if the situation might be observed and a reaction expected or hoped for, and then decide if you want to confuse their profile by acting differently, or not. Then ACT in the decided upon manner, forcing them to react to YOU (incorrectly react, at that).
The other tactic I discuss at length worth mentioning, here, is that sometimes it is valuable to deliberately blow their tail by letting them know you know they are there, and who they are. They have to report that to their superior and they and/or their vehicle need to be replaced. Very embarrassing and a great chuckle to be had by all. It should cause escalation of methods used to follow you to levels harder to detect, at least by the time you’ve blown two or three tails in a row. Ideally, you do not want to escalate to that point where you can no longer detect the next level, so you would stop using this ploy when you felt that point was near (for most people, that’s going to be the first level, so this will be a moot dialog).
But for others, it has great advantage, because the book tells you how to use that information to better determine just who is following you. For example, at one point I was able to determine it included bounty hunters working with Clackamas County Corrections, and was able to thereby identify the Corrections Officers involved, as well as eventually find the high Sheriff himself (some decades back, of course — the current Sheriff is not a known CIA in-place asset) was involved.
I happened to catch him unaware on video following me on foot near where I worked, and that allowed me to identify him from a coincidentally convenient interview conducted on TV that very week. Subsequently, I openly took pictures of him when he drove past me in a car with Federal plates (neat trick for a County guy, eh?). Never had much trouble with HIM after blowing his invisibility, and in point of fact, after filing a complaint, he ‘retired’ from his elected post. The bounty hunters relocated, too.
The escalation which followed (that was the purpose, recall)? They advanced to use of trucks and vehicles belonging to and driven by employees of an electrical contractor which was later identified as a CIA front operating under 17 names in four States. So that told me my problem was NOT with the Sheriff’s department, but a much bigger fish. The whole story came out well in the end, as I was able to gain enough proofs to force them to stop bothering me, and even to pay me for damages.
Those proofs included not just my own problems with them, but documenting their spying on local government and high tech industry here in the Silicon Forest… letting themselves in wee hours of the morning past high security locks, using flashlights, and presumably, collecting and replacing recorded tapes. It’s all in my book, as well as another book, Fatal Rebirth, which better explains their growing paranoia since 1947 and on into the future. Ever heard of the Unified Conspiracy Theory? Check it out.
Then you will know why I make them so paranoid. Seriously, though; email me if you are having these kinds of issue: proparanoid at century link net.
How to prevent gross violations of your privacy by the Police State
by H. Michael Sweeney
Note: This is a complex topic and thus is a lengthy post of a somewhat technical nature, and though it is based on knowledge of the U.S. communications network, most things found here generally apply World Wide. Given the complexity, it will not be useful to undertake reading it unless you have time to devote free of distraction, as it is too important for hit-and-miss reading. It is an updated summary review of information (not excerpted) from my book, The Professional Paranoid: How to Fight Back When Investigated, Stalked, Targeted, or Harassed by Any Agency, Organization, or Individual (available in ebook, CDR, and hard copy)
I’ll start with an inflammatory statement, which I’m fond of doing if it criticizes our errant government. We live in a Corporate Police State. This, I’m arbitrarily defining for the purpose of this article, is a form of government which partners with corporations against the clients of both. As Citizen, you are client to Government (you pay them taxes, they sell you societal infrastructure), and in this case, you are also client to your cell phone service provider. No client should be ever stand for being abused by those with whom they do business; they should stop doing business with them, or find ways to fight back and neutralize the abuse.
The Police State part arises whenever you have a government which applies surveillance and perhaps targeting with Political Control Technology (PCT) of citizens over political issues due to government’s paranoia; they fear the power of individual free thinkers who dare to have and express opinions contrary to their own. And, frankly, they should fear it, because the more Police State-like a government waxes, the more such persons they create, and the more likely such persons will become active in working to replace government. As other posts on my blog site reveal, when governments defeat traditional forms of redress, that could mean outright armed rebellion, if they persist and grow worse over time. Governments get what they create for themselves.
What has your government earned for themselves from you? Acceptance of abuse or defiance and protest against it? Your answer then defines you as being either a common dumb and obedient Sheeple or being someone who is more aware and thus deemed politically incorrect, and therefore liable to being spied upon by government through your cell phone. Here’s how they do it, how to detect it (when possible), and what to do about it.
Threat One: Listening in
A cell phone can be listened in upon by several means with varying degrees of usefulness, and in ways which almost make irrelevant any dialog about warrants, roving, blanket, or otherwise. Dialog on warrants would justify is own blog because as a topic, it is its own area of political spying abuse. So there will only be brief references, here.
While the information below talks about detection methods, most are not detectible usefully. At best, you may need to rely on situational evidence, such as people seeming to know things only possible by having overheard a conversation, or habitually ‘coincidentally’ showing up while you travel. It is all about being alert to your situation and surroundings. That is the price of politically incorrect (in a Police State). Here are the means:
a) If covert access to your phone was possible, it could have been cloned. Not all phones can be easily cloned, and some older phones may resist altogether, depending on who is doing the cloning (their sophistication). That means any use of the phone will be ‘duplicated’ on another phone somewhere as if the user thereof were inside your own head. This cannot be detected by you (assuming the user has set to mute) and, while the phone company could detect it in real time, they don’t try. It cannot be detected after the fact. Anyone using the tech would not likely rely upon a warrant, but it is possible that one could be involved. The technology to clone is hobby grade and above and thus almost anyone can construct the means to clone most phones.
b) Some cell phones have an undocumented diagnostics mode accessed by a keystroke sequence which lets the user hear all cell phone calls going on near to the tower at the moment, in random rotation. Since the number of users at a given instant could be just a handful, that often allows sensitive information to be gleaned, especially if one recognizes a voice. These codes are generally available on the Web, so anyone can use them, and no warrant is required. There is no means to detect its use.
c) The NSA (National Security Agency) worked with the phone industry to develop the modern digital telephone system which includes cellular technology as well as land-line phones. This has become a de facto World standard. The design incorporates command codes sent at ultra high-speed along the network mixed in amongst other call signal data. Phones generally cannot detect these codes (with some exception), but they do respond to them, and that is how they can be manipulated. The range of capabilities (and thus, the threat level) is broad:
1) Calls can be remotely listened to by NSA by computerized systems looking for keywords, in which case the call is escalated (see next). This cannot be detected and NSA routinely listens into almost all call traffic regardless of who the caller or recipient might be. This is under the umbrella of Operation Echelon, one of the earliest paranoiac efforts of the Cold War era intelligence community. Its been going on for decades.
2) Calls can be rerouted to a secondary location for recording and live listen-in capability. This allows thoughtful analysis of call content. This feature can be ‘preset’ so that all calls to or from a given number are recorded, which is exactly how they would choose to target the politically incorrect or a criminal suspect. A warrant is required by the phone company to set it up but anyone who knows the codes can bypass asking the phone company to do it. Virtually the entire military-industrial-intelligence complex knows the codes, and therefore, so do many individuals. It requires special black boxes anyone could build from scratch.
There is a subtle way to detect this form of eavesdropping on inbound calls, but it requires happenstance or deliberate query. If anyone mentions that it took a long time for you to answer the phone but at your end it only rang a few times, the call was rerouted and the caller heard extra rings while the secondary phone system took time to answer, initiate the recording process, and then pass the call along to you. This does not tell you if it is you or the caller who’s the target of the listen in, but you can query on outbound calls as to how many rings they heard at their end, and if calling several numbers at random with consistent results, you have your answer.
Another clue (very rare) can be when a call seems not to hang up and you continue to hear what is going on at the other end. That is a malfunction at the recording site which causes the call not to be released, and the line is held open. It is usually true that the other phone in the conversation was a land line. This brings us to the next threat:
3) The microphone of the phone can be turned on without the need of a phone call being placed or answered. The phone is then a ‘bug’ you carry with you. This can be detected in many cases by paying attention to battery consumption. If your battery life on a charge is normally many hours to days even with general use of the phone, but suddenly it dies or nears death within significantly fewer hours with the same level or less usage, it is being listened in, upon. This happens to me whenever I’ve announced I’m leaving the house, especially if to meet someone. Funny that the battery which normally lasts 2-3 days will crap out in six hours with a fresh charge, but return to the normal performance the following day.
4) I’ll mention as an additional capability less commonly employed is the ability to spoof a destination or point of origin call. You could dial, for instance, the Police to call for help, and someone else could intercept the call and pretend to be Police and sending help. Very useful when their own people are breaking into your home to cause you harm. The reverse is also possible, a call could come in from someone you know but be someone pretending to be calling from that number for some strategic value.
5) The original design did not anticipate the introduction of cameras into the system, but it is widely believed that it has been modified and may therefore allow the camera of the phone to be remotely activated with no means of detection. I can neither verify nor refute the belief, but it is quite plausible. Regardless, there is a way this can be achieved described in another section.
There is no way to detect these spoofs at the time unless there is a flaw in their verbal dialog which triggers your suspicion and you are able to quickly devise a test question. This function generally relies upon black boxes, again, but are of hobby grade. I’ve received such a call as part of a break-in incident, the proof of it in the after-the-fact means of detecting the spoof, which is that such calls do not show up on the phone bill. That also means, of course, you have no proof for any legal recourse.
d) A more exotic use of the system as a dirty trick is that such systems can play tricks on you with respect to radio shows, where you are a guest speaker. These are often detectible as there will be a call to you just prior to (turns it on), and just after the show (turns it off) which entails an obnoxious squeal of digital codes which are similar to a Fax tone, yet clearly NOT a fax tone. I’ve been hit with this three times, and in each instance the effect was different, as was the tone set employed.
The first time was when I was one of the top three on-line civilian investigators (as media and government would prefer, ‘conspiracy theorist’) who was revealing new information never before known that served as proof of a missile bringing down Flight 800. I was guesting on Coast to Coast with George Noorey. The moment I announced I had this new information and began to speak of it, the show was sabotaged in the entire region of New York and Long Island where Flight 800 went down. It was a hot topic there moreso than elsewhere, because there were so many eye witnesses, not to mention investigators which we would presume government would prefer did not hear something that might redirect their investigation. The sabotage was truly clever; listeners in that area stopped hearing Art Bell’s show, and instead got an old recorded Art Linkletter show, ‘Kids Say the Darndest Things’, as confirmed to me by listeners afterward. As soon as the topic changed back off of Flight 800, the got Art Bell again.
On another show hosted by the late Michael Corbin, the effect was different. Callers were complaining that they could hear the host, but not me. The Engineer confirmed everything was correct, and the prior guest had been heard just fine with no changes in the set up, as was true of the next guest. More interestingly, my voice also did not record and so the show could not be offered on-line via download. An effective censorship. A similar third instance rendered the entire audio dead to listeners. The digital system is very powerful, it seems, especially when other digital equipment such as found at radio stations, is involved.
Threat Two: tracking you by cell phone
Your cell phone is constantly saying to the phone network, more or less, ‘Here I am, anything for me?’ Each cell phone tower nearby relays it to the phone company to find out. If anyone wanted to know your location, all they need do is figure out which tower(s) have your signal. This is supposed to require a warrant, or permission of the phone account owner (i.e., a parent trying to find a child), depending on company policy and service features (some do not allow owner access). But as the ACLU informs us, they often freely give this information out to law enforcement without a warrant. You see TV show cops and the folks at NCIS get at it all the time, as media is trying to train you to think it’s a good thing that should be allowed.
The above is true for all cell phones regardless of age or features, and provides an accuracy of varying usefulness dependant upon the number of towers and other factors. It can be as broad as a 4-6 mile radius, or as narrow as a few hundred feet when circumstances are right. The new GPS equipped phones will rat on you automatically to within about 50-200 feet in most cases. No way to detect any of this, of course, and a phone call does not need to be in progress. It merely needs to be turned on.
Threat Three: EEG functions
Cell phones are based on low wattage microwave signals in a relatively high frequency bands in the range of hundreds of Megaherz (millions of cycles per second) to several Gigaherz (billions). The human brain operates at ELF frequencies below 15 Herz (15 cyles). The difference does not deter those intending the need from using the phone in unique ways against their target.
A cell phone, like any other phone, can be used with voice-stress analysis to detect lies almost as usefully as if an EEG monitor were attached to the user’s head for the purpose. Anyone can buy the gear needed for a few hundred bucks, which lights up when you lie. They can be as small as and made to look like an ordinary deluxe ball-point pen, but are more commonly larger as size tends to relate to accuracy.
But a worst threat exists for Targeted Individuals (TI’s). These are persons who are commonly assaulted daily by a wide-range of Political Control Technology (PCT) in order to render them social, financial, and political zeros, usually by trying to make them seem delusional Schizophrenics. It is a form of mental, and in some cases, actual painful physical torture, as many forms of electronic weapons can be involved. The cell phone can easily become such a weapon.
In addition to all the other potential cell-phone abuses, which will be in constant use on the typical TI, they must worry about EEG manipulation. Signal processing methods used by the kinds of sophisticated agencies or firms (most commonly the intelligence community, military, and their corporat contractors) who employ PCT, can allow a cell phone’s signal to be embedded with a modulated signal in the same range as the brain’s own EEG.
When the phone is placed to the ear, it is close enough that the weak microwave signal with the embedded ELF signal, is still stronger than the normal EEG signal put out by the brain. When the brain is subjected to any signal simulating a given EEG signal that is stronger than its own, it adopts the external signal as its own. This is called ‘entrainment,’ and it is instantaneous.
This technology allows mood manipulation as well as manipulation of select physiological sensations such as feeling fatigued and in need of sleep, nausea, and headaches. Generally, such signals are mixed and alternate between extremes to emotionally and physically exhaust the victim, making them irritable and less than fully functional.
This threat is not normally detectible except by extremely expensive and sophisticated signal analysis by experts using costly special equipment. However, one very alert to how they feel before, during, and after use of a cell phone may detect or have a sense that this kind of abuse is being used against them. The threat also applies to cordless land-line phones, by the way.
Now, while the method is quite workable when the phone is at the ear, it can have a gradual, lessened effect if a few feet away. It is thought, by the way, that the use of an earpiece does not deter the method because the earpiece is also communicating with the phone at Gigaherz levels (Bluetooth).
Note: Another way Targeted Individuals are threatened by cell phones is Mob Flash. The victim’s picture and suggested things to do (called Street Theater) or say if they see them (usually described as a harmless joke associated with a birthday or similar) are sent to everyone in the same cell phone tower’s range. When you see people looking at a cell phone and then doing the same sort of thing, that evidences the practice. I suggest you have fun with them at their own expense and formulate an unexpected nonsense response. Booga booga!
Threat Four: the Software Mod threat
All of the above threats to one degree or another, including remotely activating its camera, can also come from yet another source; software mods to your phone. Even very old cell phones with seemingly no programability can be modded. It can be achieved by covert access to your phone, or by a phone call to the phone using a black box (which tend to show very odd phone numbers as the calling source), or even by a virus attached to a text message. Most phones do, after all, use Microsoft OS, which is quite prone to virus catching.
The obvious exception is iPhone, which wile not susceptible to such virus attacks, can still be modded by the other means. Regardless of the phone, unless a technician, you cannot detect the mod’s presence, and even technicians have doubtful capabilities. The only safe solution is to periodically have your carrier wipe your phone’s memory and download your approved apps and phone lists, etc., fresh.
For all but the Mod threat, above, simply deny them their signals, and limit the phone’s usefulness as a weapon against you. Most people use the phone for relatively infrequent inbound or outbound calls. Anyone who uses it more frequently should also read up on the threat of cancer, which is so significant, that I refuse to put one to my head, and use speaker phone, only, unless absolute privacy is required, in which case I defer the call to another time and place, if possible. Frankly, the cellular industry is headed toward that time when class action lawsuits threaten to bankrupt them, as happened in the Asbestos and Tobacco industries. It’s exactly that bad.
Therefore, the simple solution is to turn the phone off when not in use. Power it up once in a while to see if you missed a call, and call them back. Your threat of tracking is limited to quite narrow windows of opportunity and tells them at best where you are the time of the call, which does not tell them how you got there or where you will be going next. Some newer phones ignore the power switch for tracking purposes, and it is thought they also allow listen in even when turned off.
This feature is not documented so we can’t say a specific phone is or is not a threat, but you should presume it so if built after 2005, and instead of turning it off, remove the battery. One indicator it may be an issue is if the phone stays lit up briefly after full completion of the power down (where it normally would not), or briefly lights up for no reason at all when not in use (someone has polled the phone with some sort of signal).
There are some who say that phones after 2009 also ignore battery removal. I have no confirmation, but you can also avoid power off and battery removal, as well as this added potential worry by simply placing the phone in a foil wrapper, even if just an empty foil-lined potato chip bag. And, by the way, put your credit cards in there to prevent people from using black boxes to steal your credit by cloning your card’s smart card chip. I use a foil lined oversized phone case to keep everything, including cash, and do not even own a wallet.
Deterring a listen-in threat is a different matter. Obviously, if you are using the phone, it is at risk. If you have a reason to suspect listen-in, it is likely because of a specific topic of sensitivity. Simply arrange in advance with persons with whom you likely need to speak openly about such topics to employ a simple code in conversations. A simple key word or phrase might mean ‘watch what you say,’ and then additional keywords might be translated as key sensitive elements of conversation. For example, you might agree that a given person’s name will simply be ‘Mr. Smith’ when, in fact, its not.
But don’t forget that there are two kinds of things one can say over the phone: things which are true, and things which are not. Thus if you suspect or know your phone is being used against you, try to avoid letting on that you so believe. That will give you the luxury of providing deliberate disinformation to any listening in. I’ll leave the usefulness of that up to your imagination, and suggest only that the person on the phone with you should likely have a means of knowing when you are using the ploy. Again, a keyword or phrase might help.
Where defense against listen-in seems impractical, simply avoid talking in specifics altogether, or offer to call them back later when you can do so from a phone thought more secure, such as a pay phone. Of course, the problem there, is, that government may be looking for your voiceprint with NSA’s help, so that any call you make is listened into. But land lines and topics like that will have to wait for another post… or you could get my book.
Seriously – email me if you have these kinds of issue: proparanoid at century link net
Next post in this series: In the Rearview Mirror: When You Think You’re Followed
What activists, militia, gun owners, and EVERYBODY ELSE should expect
by H. Michael Sweeney
Regardless of your beliefs of your political stand, Kevin Bacon had it right when he uttered the line in the film, JFK; ‘The Fascists are coming back…’ When they do, they won’t announce it beforehand, they will simply execute the End Game scenario as I wrote of in my book set, Fatal Rebirth. That book, if it helps with your giving me any credence, predicted the World Trade Center being brought down by jet liners and resulting in a series of Middle East oil wars… and several other unfortunate events including an assassination attempt on a Presidential candidate, ALL OF WHICH came to pass.
So I have just one word to those who do not believe Martial Law or Revolution are in their near future… ‘fool.’ Sure, I could be the fool. But I’d rather be a fool who is prepared for something which does not come to pass than the fool who was warned but choose to be unprepared when it did come to pass. With that in mind, here is my best advice on what to do to be prepared, with three different levels of preparadness for three kinds of people — from ordinary folk to the nastiest criminal and terrorist.
In the last post of this II part series, I outlined some significant warning signs that we are headed in this direction. If you agree the risk exists, the next step is to figure out which level of preparedness is right for you…
Level III candidates:
a) Is anyone in your family likely on a list? Anyone who is an Activist or outspoken politically on the Web, or in the real World, a Militia member, a registered gun owner, or who is a member of select ‘extremist’ political or religious groups (you probably have a good idea of who you are, and yes, that includes Constitutionalists, right wing, left wing, and wingless groups), is on a list.
b) If anyone in your family was ever given the treatment by any Federal Agency other than IRS (e.g., FBI, HSA, TSA, CIA,DOJ) for ANY reason, valid or not, you are on a list.
c) d) If you are currently a Targeted Individual, you are on a list.
d) If you the sort of person who, if shooting broke out tomorrow, would likely join in the fray against government, even if not thinking yourself on a list currently, should consider yourself level III or you may be neutralized before you can act.
e) If you are an illegal or in the United States on a Visa, and you would intend to stay, you may wish consider yourself a level III, because depending on where you are from, you may be in for harsh and harmful treatment.
f) If you are a criminal or a terrorist, you should consider yourself in this group. But you can please ignore me and get caught, please, because I’m not attempting to warn you to protect you, but to warn others they are going to be treated as if they were you, because government fears them more than you.
Level II candidates:
Everyone who is not Level III but who is also not employed by or associated with a government agency, military contractor, critical service sector (banks, fuels, transportation, utilities, etc.), or not independently wealthy persons of influence and power, be it corporate, political, or public image (famous people). This means the overwhelming bulk of us.
Level I candidates:
Everyone else; those who are so associated or wealthy; the 1% and people they love.
How you should prepare
Level I and above: You must presume an inability to travel, work, or access your finances. Banks will be closed. We are talking long term. You should prepare ‘Earthquake kits’ or similar of foods, emergency items, water, and cash in low denominations. Careful. FEMA will be in charge and will consider more than one week’s supply ‘hording,’ which is will be seen as a Federal offense which can result in detention and confiscation of personal property. Does your wife can fruits or vegetables? Better not have too many in the pantry.
Be prepared to have your home ransacked in a door-to-door search looking for illicit items, stolen goods, weapons, pornography, or horded stocks. You will be asked if you have such things and if you answer ‘no,’ but they find some, you will be detained. If you answer yes, be prepared to provide immediate access.
You will likely have advance warning of at least a half hour, during which you can put breakables in a safe place and perhaps pull drawers out and place them on tables so they won’t dump them on the floors to inspect the innards of the furnishings. UNLOCK everything if you don’t want locks smashed.
Be prepared for all medications in opened containers to be taken ‘for analysis,’ so you will want to have a supply of new-sealed medicines in reserve, at least a month’s supply. Some such things like insulin would not be an issue, but pills could be anything despite what the label says.
Any politically incorrect materials could subject you to detainment. They will likely want access to your computers and make a copy of hard drive contents. It will do you no good to erase questionable items unless you are quite expert in the field and have the correct software tools. Anything questionable found could result in detention and confiscation of the computer. It, or anything else taken will never be seen again.
If you have a dog or pet, put it n a cage lest it escape in terror or be shot as a presumed threat. Chaining is only going to be potentially useful if the radius does not encompass a walkway or access to a structure, but don’t count on it. There is additionally the risk of their own dogs seeking confrontation (even encouraged to do so) with yours. There will be dogs, so stand where they tell you to stand and do not make sudden moves.
In some cases those doing the searching will not be trained Police or military, but gang members or bounty hunters, or other persons who have been given cart blanch to do whatever they want, including theft of valuables. A a safe deposit box would be advised. If you have a wall safe, I’d not put anything truly valuable beyond personal documents there. You will be asked to open it, or risk having it blown open.
Stay tuned to the emergency radio and TV channels… the only thing which will be working. While you cannot trust everything you hear, there, it is best to obey any instructions tendered. Remain polite and obedient regardless of any personal affront you may experience. Be dressed when they come as they may choose not to let you dress or cover yourself if naked, especially if female. Lone females should invite a neighbor over for protection against risk of possible sexual abuse.
Level II and above: While level I persons will generally be afforded some degree of politeness and some hope of being given a chance to resolve issues which might arise (such as uncovering pornography not admitted to when asked), everyone on Level II is considered expendable, and in the way, a nuisance. You must be prepared to be even more tolerant and cooperative, as if a prisoner of war (close to the truth).
You should plan on hiding anything you do not wish to be taken, such as valuables, reserve supplies, or weapons, especially since you will be more likely to be searched by gang members or by unethical agents than Level I. See special tactical section on how to hide things. There will likely be ‘tests’ of your character and political thinking in the form of abusive behaviors and odd unnerving questions. There may be stress analysis lie detection in use based on audible response, so try to be truthful as best suits your needs.
Level III: You may wish to consider the prior advice for your family members, but any persons who fit the criteria to justify this Level should not stick around. See Tactical Advice section on Escape Plans. If the reason for such justification was terribly serious (e.g., being a known Anarchist or politically incorrect person such as myself), you should consider taking immediate family members with you, or at least having an alternate plan for their safe evacuation of the area. Make clear there will be no contact between you and them for a considerable length of time, and that when it does happen, it will be by unexpected means to which they should not react to at all with surprise. For example, they should not call out your name. They should not discuss it with other family members without care from surveillance. I suggest a copy of my book, The Professional Paranoid which offers a long list of specific issues such as this and appropriate strategies.
Special Tactical Issues:
Hiding things: You should not expect to be able to hide anything in your home safely. Not only might they employ dogs, but metal detectors, through-the-wall viewers, FLIR, IR, and Ground Radar systems. Merchandise of late is rife with RFID tags which send out what is effectively ‘here I am’ signals on radio request, and identifies the item. Anything buried at a depth of less than 80 feet is liable to detection, depending on its size, shape, and materials, and type of detection system and operator skill. Anything that absorbs and retains heat with a different coefficient than the items within which it is hidden will be more easily seen. So what can you do?
Depending on the nature of the item(s) there are some general strategies which can be useful. Small things like CDR discs or similar can sometimes be disguised or hidden in a way not likely to be seen electronically or visually, but I prefer to take no chances and instead hide things off the property and at distance. Items underwater and additionally concealed within an irregularly shaped bundle of various content tend to be invisible, so still waters can be useful. Indoors, there are often spaces in public buildings where one can hide small things and be assured not even the cleaning staff will encounter them, such as on top of overhead ducts, within vents, in the crevices of stairwells, etc. These would be low-traffic places such as emergency exits, back stairwells, etc.
Running: Establish your route and destination in advance, and consider variations for daytime vs. nighttime, as well as for circumstances. If there are troops on patrol and checkpoints, for instance, you need far more stealth options. False I.D. is illegal. Having found someone else’s I.D. and having it in your possession is only questionable. Using one or the other is one’s own discretion, be it real I.D. or something from your computer, but sometimes, walking right through the enemy’s door is better than trying to go around it. Of course, being proficient in a Martial Art is not a bad idea, either. Just remember that a Karate chop cannot outrun a hail of bullets. The best defensive martial arts courses money can buy today is Isreali Krav Maga. For extra money, they will sometimes teach you offensive tactics.
Once you have a route, especially if requiring days of travel, hide key supplies or items along the route in advance. Have more than one location for each so that if you cannot access one for a given reason, you have an alternative. As far as destinations go, the Book Set Fatal Rebirth has some very interesting ideas about how to modify and bolster structures to resist assault, as well as how to create perimeters of protection in layered form. Similar considerations on layered defense are covered in my first book, The Professional Paranoid. But the best modification is an emergency exit to a hidden remote point and yet another escape route prepared in advance.
Fighting, defensive or otherwise: If there is ever a revolution to restore government from a military coup or similar as so many of us fear is on the horizon (because, for the most part, that Congress is too blind to see the error of their ways in belief that the Constitution has no function despite their oaths to support and defend it), one must have a battle plan. What follows are just a few of the initial things which can be found in Fatal Rebirth, which goes well beyond this short article to include Rules of Engagement and an actual Battle Plan. Of course, that book was mere fiction, albeit one written for the ‘far out and unlikely propositions’ of ‘what if they took over the country and we had to take it back?’
I have a lot more to say about such things in Fatal Rebirth, all of it legal advice. But this forum does not allow it to be shared quite so freely without risk of prompting retaliation. I may already have said too much. So be it.
Please look out for each other, even those who refuse to understand, including where possible those who follow orders persecute you. Know your enemy and their weakness. It is their mind. Attack that and you win without bloodshed.
- Military Viewpoint: We are Six People Away From Revolution (proparanoid.wordpress.com)
- Citizen’s Viewpoint: We are ONE Person Away From Revolution (proparanoid.wordpress.com)
- Will Obama impose martial law? (wnd.com)
- Compare 1776 to 2012 and Tell Me Where You Think You Live (proparanoid.wordpress.com)
- Pentagon Source Alludes to MARTIAL LAW Around July 1st 2012 (zionistoutrage.com)
- Are Feds Preparing for Martial Law? (godfatherpolitics.com)
- Dan Feidt: Military Prepares for Martial Law Takeover (VIDEO) (animalsclubfreedom.typepad.com)
- Will Obama Attempt To Declare Martial Law Before November Election? (pakalertpress.com)
- Media Beast To America: Bow Down To Military Police, Your New Lord And Savior (disquietreservations.blogspot.com)
Included list of 250 terms and technologies of Political Control Technology
Edited excerpt from book MC Realities: Understanding, Detecting, and Defeating Political Control Technologiesby H.Michael Sweeney, copyright©2006 proparanoidpress, all rights reserved reproduction by request and approval only, to pppbooks at century link net
I write to the honorable legislative committees as a friend of the State and of all its citizens, volunteering the material contained herein as an expert witness on electronic weapons, electronic harassment and related technologies of political control. It is hoped that this material will be entered into the public record at your hearings and become useful in your final determinations…
Because of my knowledge on topic after a decade of helping victims of such technology, I must protest at the committee’s choice of language in the bill with respect to the first sentence… referencing control of these weapons only in the hands of the public by means of the phrase ‘no person’. This is to miss the entire purpose and intent of these weapons, and to fail to address the virtually sole possessor and users of the worst of the technology, which is government itself. The public does not need legislation to protect itself from itself, but from its own government. Language must specifically and clearly include government agencies and government personnel of all manner, Federal, State, and local…
In like manner, your definition of weapons is far too simple and narrow to avoid legal confusions. For example, the very same technology which is found in radar guns and FLIR can be used as a weapon of political control or harassment by mere abuse thereof. How will you protect against such abuses? How will anyone be able to determine by the wording of this Bill when the technology and application are legal and appropriate and when they are abusive and invasive?
The victim is not protected if the burden of proof rests on such simplistic language. The abuser, especially if governmentally authorized to access such technologies for normal uses, is not at risk where such loop holes exist. Your language must define and articulate to the complexities of the matter, which are illustrated by the technology reviewed in my (included) materials on topic. Merely adding ‘definitions’ section should address these concerns.
Finally, your legislation makes no provision for detection and enforcement. Can you imagine the local police arresting someone because a neighbor claims to have symptoms of attack? Without a means of detection, there can be no enforcement; all which remains is mere lip service, legislation not to protect the people from the weapons, but to protect the establishment from the people. The primary question is this: Is there anyone in our national or state governments who will stand up for the Constitution, support the Bill of Rights, live by the morally correct principles of humanity and of God, and resist the evil which stares you squarely in the face?
The challenge before your committee and, ultimately, for your entire legislative body, is not only formidable, but it is absolutely pivotal to determining the future of this nation…
Until one empowered sector of our own society, such as yourselves, makes an official protest and stand against this growing draconian onslaught, those things for which our nation stands come closer and closer to being silently crushed within a velvet totalitarian glove. Without such understanding… without laws to protect citizens from the dangers involved… and without any means of enforcing those laws… political control will be assured. The price for such control will be dear. It will be the surrender of that thing godly men call ‘free will’, and which the patriot calls ‘freedom and the pursuit of happiness.’
…May I propose three key concepts or points which should be a part of your deliberations?
1) The first is that any such legislation should be broadened to cover most, if not all non lethal weapons, not just electronic. The very same people who developed electronic weapons were responsible for the development of other non lethal weapons, and for the same unsavory reason: political control. All such weapons further have the same attendant risks to life and liberty and lend themselves to the same abuses and excessive draconian applications.
Perhaps just as important, a review of all such weapons makes the relationship between the weapon, the intended use, and the greater political control strategy which drove its development that much easier to grasp. In support of this notion, my report herein addresses the full spectrum of non lethal weapons, the greater portion of which are, perhaps surprisingly, the more hi-tech electronic variety.
2) The second point I would like to make is that your considerations and final findings must include and provide for public awareness. Only by educating the citizens of the realities of the existence and use of these technologies, can your efforts be well served. If the citizens do not understand the technology and the symptoms it generates, they cannot report the crime or well defend against it. In like manner, your law enforcement, the legal system, media, and the professional communities must also be educated, or the victims will have no place to turn without being labeled as insane.
Of even more value, such promotion and education will, more than any threat of punishments, deter actual use of the technology in the first place. All such technology is currently used in an extremely covert manner. The last thing an attacker using electronic weapons wants, is to be discovered. Such discovery puts not just the mission at risk, but also puts at risk the entire infrastructure of the non lethal weapons industry, and their leadership both in and out of government. Education will, in my opinion, prove to be your best weapon, in the end. But education in and of itself does not provide an adequate deterrence, because unless an attack can be proven, it is merely an accusation which, due to the sophisticated nature of the attack, can too easily be ignored by unconvinced authorities.
3) Therefore, the third and final point, perhaps the most important, is that if you are to have any true success in this matter, you must necessarily include funding for the exotic equipment required to detect and analyze the telltale electromagnetic fields, energy bursts, and radio frequency signatures which are the calling cards of these technologies. In fact, I remind you, it is precisely the output of these detectable indicators which makes this matter one of general concern to the population at large.
The leakage, overshoot, and reflection of these signals, energies, and fields created by these weapons have a great potential for harmful physical, mental and physiological effects on all citizens within a given radius of the intended principle target under attack. The collateral damage to these citizens is not now understood, nor can it be so understood until the actual weapons are captured and tested by independent laboratories. Even the most conservative estimates talk about dire health consequences associated with these weapons. If a particular cell phone can be found by scientists to cause a brain tumor, then what must we face when the signal strengths are many hundreds or even thousands of times stronger, and deliberately designed to cause physiological and mental effects?
If you fund the needed equipment, you will need to further fund appropriate training of technicians on how to use the equipment, as well as in general procedures and skills in the area of covert counterintelligence operations and general law enforcement procedures. This is exactly what will be required in order to be successful against those who use electronic weapons, and no less.
With the above in mind, I would propose the Bill provide for creation of a joint task force of specialists in the areas of law, communications, signal processing, electronics, bioethics, medicine, chemistry, psychology, counterintelligence, military, and law enforcement be created and managed by a carefully picked oversight body. In the absence of creating a new bureaucracy, I would suggest that such responsibility might best belong to any existing state environmental agency as opposed to general law enforcement.
One reason I say this, and it is intended as a general warning concerning the selection of specialist staffing as well, is that I can virtually guarantee that law enforcement of your state and major cities has already been infiltrated by members of the intelligence community, or would immediately so become upon passage of any such legislation. For this reason, the easiest way to assure failure of any mandate against electronic weapons is to simply hand responsibility for it over to law enforcement.
Keep in mind that the more exotic technologies are hardly used for their ultimate intended purposes at this time, but more typically used only in testing on unwitting guinea pigs, citizens at large, generally from among the underclasses, those persons least likely to be able to defend themselves or obtain the expensive helps required. Therefore, most victims are targeted not because of any actual political or intelligence value, but because of the value in learning how the technology works and how to best apply it without getting caught.
Now, regarding testimony from other parties, I might presume and certainly hope that many such victims will stand before you to offer testimony, and I beg of you not only to solicit for such witnesses, but to open your considerations to citizens beyond your state borders, that you may increase your chance at hearing the full truth.
Indeed, open your doors to Canadians, as well, for these weapons do not respect national borders, and are freely exported for testing and use abroad. And for every brave soul who dares stand before you in tortured fear of what will happen to them for their bravery, and an even greater fear of what will happen to them if they do not seek your help, there are likely tens of thousands of others on the continent which cannot or dare not testify. Regarding what they say, may I further advise of three additional points.
Regardless of how wild or bizarre may be the claims found in such testimony, there will be three absolute facts I can promise to be true regarding their claims:
1) among those testifying, you will hear persons who are:
a) legitimate victims of the technology and who are telling you the truth exactly as their ability to grasp and express it allows;
b) persons who are delusional and falsely believe they are victims, telling you of imagined things which have little or no basis in fact; and
c) intelligence community plants pretending to be victims in order to provide you with deliberate disinformation and, largely, to discredit the general value of all such testimony;
2) It will be impossible for you, short of elaborate investigation and expenditures of large sums of money, to make any useful determination of which category a given testimony falls within;
3) in light of the aforementioned difficulties, you should logically come away highly incredulous and doubting of the value of the entire collective of testimony, were it to stand alone.
This phenomenon (3) is a prime example of one of the chief purposes of political control technology, that of destroying the credibility of victims who dare tell others of their experiences. Think upon that, for a moment. Electronic weapons are designed to conceal their own use by making the victim seem incredulous. The testimony you hear will prove that it works exactly as intended. Do not discard the truth encircled by lies.
In light of these facts, I am moved to insure their testimony and my own presentation does not stand alone. I herein provide some meager proofs in the form of a technology review of some 250 terms and technologies of political control. A much more substantial body of such evidence is possible should it be required, which is why I have tried to include more valuable proofs in the form of references which are, by and large, easily obtained and verified.
This includes articles and scientific papers as well as actual patents on the technology itself. Patents are used only when other experts have already connected the technology to the claimed weapon. A reservoir of additional patents which could have been used, except for space and redundancy they represent, are included at report end. But understand that for reasons of national security, many more patents exist which were unavailable.
Also realize patent descriptions need not sound like weapons, partly as a natural result of the patent application process, and partly by design. Too, like many inventions intended for good, some patents having no apparent weapon’s application have been subverted to evil ends by someone who saw the potential…
In point of fact, the great bulk of evidential resources come from military documents, a matter which is deeply troubling to all right-thinking individuals because it paints a picture not of a military set on defending the United States from enemies who would threaten it, but a military which is the threat, itself… By the following materials, may you come to similar conclusions, and may you have the fortitude and resolve to do something about it, which is something we citizens cannot of our own accord achieve short of armed revolution. Please do not leave this the only remaining option for Americans, or that may be exactly what the next generations will need consider…
It was perhaps author Aldus Huxley, who first expressed concerns about political control technology, put into words within the fictional construct of Brave New World and Brave New World Revisited, Orwellian nightmares not unlike 1984. Based on 1958 technology, Huxley projected ahead a mere 40 years to describe exactly the kind of technology and social consequence which lays at the heart of our focus, here.
In point of fact, I hope to illustrate, we are well ahead of his projections. Welcome to the New World Order. Sheep, do not be alarmed at the slaughter of your fellow sheep. As it is for their own good, so will it be for you.
~ Sincerely, H. Michael Sweeney
Unfortunately, as with all such legislation efforts at both State and Federal levels, the Bill was not passed, nor was it amended to make it more likely to pass. It was simply dropped. Too many powerful people, firms, and groups benefit from Political Control Technology to allow a mere Congressional representative the luxury of a morally correct vote or opinion. The Cogs of government work beneath and behind the visible mechanism of floor debate, and are turned by the steam of the Military-Industrial-Inteligence-Media Complex. What you and I think, need, or desire in the pursuit of freedom and happiness is irrelevant, as is anything as trivial as the Constitution and Bill of Rights.
However, in 2004, a variation of the Bill WAS passed. It can be found here. A brief reading will find that not one of my suggestions was incorporated, and in fact, it specifically authorizes government to employ such weapons, the reverse of the need. All it does is makes it illegal for you and me. Like that was ever a threat. Yet the deem this legislation as an ‘Emergency Bill.’ Go figure.
- Judy Wall (targetedindividualscanada.wordpress.com)
From the Appendix of MC Realities: Understanding, Detecting, and Defeating Political Control Technologies
a book by H. Michael Sweeney – proparanoidpress.com
copyright©2006, all rights reserved This is an additionally annotated copy. Reproduction rights by request and approval, onlySorry, there will be no links in the article, as it would take weeks to compile and make it harder to read (hundreds, closely spaced). Images are out, too, as visual formatting would be destroyed. Too bad, there are some really interesting ones.
As a research guide, the following references do not always represent direct cause and effect relationships, but (unless otherwise indicated) at least visible relationships and ties. The expression ‘Masonic constructs’ means that various aspects of the organization or their procedures, especially secrecy, follow Masonic structure. When it says ‘formed by Masons,’ it means members, not the cult. A given citation in this list is not concrete proof, but merely a guidepost of where to look for such ties. However, inclusion is based on suitable ties being found by Author for the purpose to so conclude. In some instances, the basis is noted, but space limitations prohibit detail. Nothing contained herein is terribly hard to verify.
NOTE: You will see in review of this why so many people think that it is Jewish Bankers who rule the World, but they were never Jews, but Templars, in my considered opinion (the Rothchildes).
1118-1313 Knights Templar exposed to Assassins, Baphomet , Ritual Sexual/Satanic Abuse;
1313-1600 Pope Discovers Satanism, Disbands Templars, Rosicrucians becomes hiding Place;
1390 Stone Masons Guild (like a Union) socially prominent – NOT an evil group;
1717 Templars convince Stone Masons to accept them as Speculative Masons, establish Visible 33 Degrees – no masonry skills;
1776 Illuminati NWO effort founded by Adam Weishaupt, Satanist Mason;
Late 1700s Rothschilds become International financial banking giants: The Rothschilds (several spellings) were Jews, and they became the ‘basis’ of ‘Jewish Cabal’ accusations. However, my research leaves open the possibility that the y were actually Rosicrucians and former Knights Templar, who deliberately took on the identity of Rosicrucians and then Jews in order to escape detection and death. They became dominant world financiers in the manner of the Knights Templar by having family members establish banks in the capital cities of every European nation (as did Templars). Instead of shipping money from one bank to another and risking highwaymen robberies and international taxes and tariffs from multiple nations, they simply traded letters of credit. They were the first to invent ‘debt’ as capital, and in more modern times, it was the Rothchilds and the Rockefellers, et. al., who invented a similar approach to currency itself, resulting in the Federal Reserve System, which is owned by the bankers, not the government;
1769 -1815 Jacobian Society founded with Illuminati ties, will spur French Revolution, Congress of Vienna;
1825-1830 Unitarianism (Protestants), Mormonism (Masonic construct), Universalists (Masonic construct, first-step toward one-World religion) formed by Masons, League of the Just, a German-French Christian cult formed with simplistic Communist ideology;
1847-1860 Karl Marx develops early Communist dogma, while in influence of Cecile Rhodes and other Masons;
1864-1868 Civil War between the North and South: Rothschilds send Col. T.W. House to advise Lincoln, and dictates North war actions resulting in ‘powder profits’ in Europe and the U.S. while Southern General Albert Pike, Satanist, helps dictate South war actions resulting in ‘powder profits’ in Europe and U.S;
1867 Pike former KKK (Masonic construct), becomes head of Masons, writes Morals and Dogma, the ‘Masonic Bible’ which clearly spells out Satanic underpinnings, and parallels Illuminati plans to establish NWO in many ways, including the division and dilution of Christian Churches and sponsoring of Wars, especially between Muslim, Christian, and Jewish States. Masonry is a subversive group at highest levels;
1870 Pike establishes Illuminized Freemasons, incorporates higher than 33 Degrees, all secret and for dark works. Mason Cecil Rhodes is at Oxford, influenced by Rothschilds and Wartburgs — as inventor of Dynamite, the Civil War made him almost as rich; ‘powder profits.’ Rhodes uses his wealth to fund Rhodes Scholarship in pursuit of the same goals as the Illuminati (One World Government). In this same time frame, the Jehovah’s Witnesses are formed (Masonic constructs) and the Hermetic Order of Golden Dawn (Masonic, Satanic), and the Christian Scientists (Masonic);
1884-1911 EuroAmerican Alliances of Masonic and financial influence form: Rhodes, Rothshilds, Wartburgs, Rockefeller, Carnegie, DuPont, Loeb, Harriman, Bush, JP Morgan, etc. (oft called the RockRoth Alliance);
1913 Federal Reserve Established Foundations Established by RockRoth, American Press Bought by the ‘powder interests;’
1914-1917 WW I, ‘War to end war’ used as platform to promote NWO concepts: Col. E.M. House (Son of T.W. House) sent to advise President Wilson by Wartburg, Rothschilds, impacts war actions for ‘powder profits’ in Europe and U.S. At close of war, RockRoth moves: Council on Foreign Relations (CFR) Established, League of Nations established, Theosophical Society (Masonic cult) established to introduce New Age concepts, including marrying of religious beliefs into one-World religion;
1920-1921 It continues: World Union established, Lucis Trust (Satanic New Age) Pantheism, Humanism. Masons now headed by Alestair Crowley, Satanist. RockRoth interests found Tavistock Institute (U.K.) for ‘Pain studies,’ and ‘invent’ Eugenics; MPD/DID RSA (ritual satanic/sexual abuse methods of original Assassins learned by Knights Templar) mind control research is pursued;
1933 Roosevelt Assassination and U.S. Military Coup attempt by (many members of) RothRock (DuPont, Singer at point, Rockefeller insulated), Rothchild/Wartburg’s Central Bank prints so much money for Germany, inflation sets up need for War. Masonic Satanic Thule Society set up in Germany (Hitler a member) with ‘sister’ cult in U.S. – Skull and Bones. DuPont, JP Morgon, Warburg, Rothchilds help establish Kaiser Wilhelm Institute studies along same lines as Tavistock, under Dr. Mengele, plus Leibensborn Project to breed purebred Arians out of Wedlock. Program would evolve to become the sexual rewards program for exclusive use by SS Officers, who had to pass the strictest of tests for pure Germanic bloodlines. The Oxford Group founded the same year by the same general group of players, and Rhodes, asks Rockefeller to fund Alcoholics Anonymous, father to all twelve-step programs, which are a form of mind control and which provide access to secrets useful for blackmail when power players seek the help (one of the steps is usually to confide secrets, also present in Skull and Bones, et. al.);
1939-1945 WWII: RockRoth brings in E. M. House again. Harriman, Bush, others align with Axis and fund, do business with Nazi partners during war, later convicted of Trading with Enemy. Post war, United Nations Established by RockRoth, Operation Paperclip Imports Nazi Scientists including Mengele;
1947-1948 National Security Act urged by RockRoth threats to create the agencies with their own money if Government did not. CIA, DOD, NSA created, MJ12 Project (mind control), World Council of Churches, Church of Scientology founded (Masonic construct), Bilderbergers first meet, American Committee on a United Europe founded (ACUE), UFOs appear (MJ12, aka Majestic), Psychological Strategy Board (DOD psyops), Liberalization of Church Dogma. The many MK mind control projects following MJ12 spread out over the next two decades;
1950 L. Ron Hubbard gets going (fan of Crowley);
1959-1961 World Constitution & Parliament Association founded (WCPA) Masonic Satanic Ordo Templis Orientis reformed along with Order of Temple of Asarte, First Mass Shootings start taking place now as first-fruits of CIA mind control research – Manchurian Candidate programing, Unitarian Universalist Association formed (first marriage in one-World Religion process), Club of Rome (to establish European Community, ACUE partner);
1966 Church of Satan formed by Mason Anton LaVe, U.S. Army’s Psyops Michael Aquino is founding member;
1970s CIA establishes Cult Awareness Network (CAN), UFO Abductions reported in large numbers (suspected faked by Army to create MC victims through MPD/DID). Michael Aquino involved in pedophilia (McMartin Preschool) and DOD Satansim after doing psyops in Vietnam, works on Revolution in Military Affairs (RMA), Trilateral Commission founded, Operation Pique (radio frequency mind control) launched (precursor to many more, including HAARP);
1983-1988 Johnstown Massacre (CIA MC project) with CAN influence, EEG entrainment Radio Broadcast Same year, The Finders, The Franklin Coverup, Command Solo USAF air-mobile EEG platform, Provisional World Government established (WCPA) via ACUE, World Constitution Written, quietly submitted to individual nations for ratification;
1991-1992 European parliament Founded, Europe United, USSR Falls, EEG system GWEN Operational Same year, Taos/Oregon Hum start to be heard, False Memory Symptom Foundation (MFSM) Founded to deny MC exists… by ex CIA MC Scientists;
1993-1997 MC project Branch Davidians vs. BATF, CAN, US Army Deltas, CIA, Solar Temple Suicide Cult (CIA and BCCI scandal ties, derivative of Order of Rosey Cross — Rosicrucians… bringing us full circle). Shoot Americans Questionnaire, Interfaith Initiative launched – DOD via Michael Acquino at The Presido attempting to organize all religions into one CIA sponsored Church. HAARP goes on line, Heaven’s Gate Suicide Cult dies, RAATs Bioimplants developed by DOD (tested on Islamic students just in time for a rash of suicide Islamic bombers), Scientologists take over CAN (cute – a cult owns a professed cult fighting tool), Verachip ‘Mark of the Beast’ ID tracking implant authorized, RFID chips hit U.S. retail products, Total Information Awareness Office established;
- Fundamentalists, the Illuminati, Freemasons, and the UN (leavingfundamentalism.wordpress.com)
- The Mystery Of Illuminati (mysteryworlds.wordpress.com)
- Meet the Ruling Faces of Evil (zengardner.com)
- Politics & NWO – Rothchilds and Rockefellers Merge Financial Empires NWO (disclose.tv)
- The Knights Templar today – who and where are they? (thetemplarknight.com)
- History of the Skull & Crossbones and Poison Symbol (mysafetysign.com)
We all draw lines in the sand, knowing or not,
which if crossed, will see us engage in battle
by H. Michael Sweeney
I do not call for revolution. But I warn of it, and the why of it is quite obvious to me; too many of us, and in all walks of life, are openly using terms like Fascist, Police State, Dictator, Hitlerian, New World Order, and so forth. This should tell you the water is starting to boil. That governmentals fail to understand this mystifies me. Unattended, it will boil over, but so far, the only attention government is giving is to turn up the heat is to madly develop more Political Control Technology and Draconian measures as if believing they can absorb the spillage. So it behooves you, the reader, to consider just what lines in the sand might be important to you, as well as what your role would be in any such revolt. After all, you have three possible positions: stand for freedom; stand under the yoke; and attempt to remain neutral, each considered below.
This is the third in a series of blog posts about the likelihood of armed conflict in the United States to regain control of government and restore the Constitution. Other supportive articles have also been written before the need to write had been sensed, and have become more relevant thereby. The first post, What Does it Take to Start a Revolution discussed how scary it is that it takes so very few people to start a revolution, and how low the cost in life tends to be, and the role of government in its own demise. The second, Military Viewpoint: We are SIX People Away from Revolution, revealed that such a revolution may be forced upon us by the Military itself by seizure of government in a de facto military coup, likely involving a massive terror event, be it false flag or otherwise.
Note: The war on terror is about control; fear is license for control. That’s why false flag operations are repeatedly found through history to be an all-too-common principal means of empowerment to evil men. Ask Hitler, for instance, the archetype of today’s modern Fascist. Do not be so foolish as to think there are no such men in our military and in government. And, know they are Fascists, and tend to occupy all high places in time.
This post, though perhaps the most important of the series, concerns only one small aspect of topic. It reviews the ONLY matter which defines the individual’s role in any success of a revolution, and as important, the ability for them and their family to well survive it. In other words, your very life and the future of your nation rest on this one small thing: how will you know when the day comes, that day the military thinks is inevitable (as do I), and people start to pick up their guns and say, ENOUGH! And, what will you do about it? Fortunately, guns are not the only answer.
That moment of decision can be different for each one of us; the defining moment when government crosses a line in the sand we have premeditated or which we may not have foreseen, an event which pushes us to that state of no return. When that happens, the individual starts working in full measure for the downfall of tyranny and restoration of freedom. Some have already reached that point. Hence, the phenomenon called Anonymous. Thankfully, there has yet to be any shooting or other violence of consequence from any quarter, certainly not Anonymous, who carefully points out the folly of it.
That could change overnight. It only takes one lone, frustrated individual to make a mistake… though history proves it could also be the right thing if the right circumstance, reason, place, time, personages, result, and consequence. But I for one, would hate to try and second guess that much risk and any ability to control it to predictable outcome. I have no bravado for foolishness, and would discourage others from presuming for themselves such a fearful and dangerous confidence. Yet I hold my breath because, as singer Phil Collins has so well sung, ‘I feel it in the air…’
On remaining neutral when it hits the fan…
From government’s viewpoint, you are either for them or against them. Those who are neutral (pacified or fearful to move) will be viewed with great suspicion and dealt with accordingly. The likelihood of being able to remain neutral without joining in the revolt is slim, because being neutral will mean targeting of the sort likely to cross a critical unstated or belated line in the sand (e.g., detainment and questioning most unpleasant, confiscation of property, denial of employment, etc.). There is even less a chance that you would ever be allowed to join government’s side, as you would not be trusted. The longer one waits to decide, the more dangerous their position becomes… neutral could be the worst place to be of all.
On standing under the yoke
Unless in an active support role (e.g., a Policeman, vocally supportive public person, etc.), your only value to government is that you are not an opponent, but it does not mean you are not in the way. On the one hand, you are acceptable collateral damage if unfortunate enough to be standing in-between them and the opposition in a conflict. When they cannot visually discern which you are with ease, they presume you guilty by the association of presence. This is a very dangerous role to undertake, because on the other hand, if you stand with government in opposition to the Constitution and openly support tyranny, those in revolt may deem you a viable target for retribution.
This results in a kind or risk of being caught in the cross fire, despite intentions of seeking a presumed safer position. I would not want to be in this category unless so high on the food chain that I was well protected by armed men… presuming I was so faulty in my thinking.
But then, high-powered crosshairs tend to easily bypass and render moot such protections, a cold hard fact.
On opposing villainy
This is the more enviable position in any logical review, and is in my opinion why successful revolutions tend to succeed with minimal loss of life. You know where you stand and it is not under the yoke. You know who you trust and you have allies you can count on solidly. But, of course, you have a clear and present danger against which you must steel yourself. If one would read my book set, Fatal Rebirth, there is advice to such persons on how to better defend and more wisely prosecute a successful effort of survival and victory. But do bear in mind it was written as fiction some two decades ago (predicting 9-11 and resulting Middle East oil wars) and was talking about a revolution forced upon the people… a bit like we are starting to face today. This is what makes knowing about lines in the sand so important.
The other reason this stand is more logical, is that in full-out revolution, the forces of the other side tend to switch sides as time passes. Elements and whole units of Police, military, and their supporting or directing resources start to see the light, either because they are being educated by what they hear and see happening, or because they start to see who is going to win. They bring real hardware assets with them for use against those still opposing. I seriously doubt, for instance, that many in the U.S. Air Force will stand by and let the U.S. Army use helicopter gunships and tanks on protestors, as indicated as likely according to Army manuals on dealing with civil unrest here in America. Clearly, that’s a crossed line.
Lines in the sand
For some citizens, such lines have already been crossed, perhaps again and again, and they are already actively working to destroy the corrupt government or prepare for the day when the point of no return comes. This even includes secret organizations operating covertly within the branches of the Military, for instance. Government is rightly paranoid, for they have made themselves enemy to their own. They have forgotten the most basic principle of their charter (the Constitution and Bill of Rights), which is that they are supposed to be a government of the people, by the people, for the people. Instead, they see themselves as a government over the people, and continue to usurp more and more power without regard to the rules of the charter (law of the land). A government which no longer obeys its own law is an outlaw awaiting a day of reckoning, and deserves no mercy.
We should perhaps review lines already crossed, because they happen so quickly and generally so quietly that most are unaware of at least some of them. There are, in fact, so many that rather than attempting to list them, I will instead simply cite other posts which are their own lists, as found in the Related Articles at page bottom).
For most of us, however, while we may grumble that a given action or law already upon us was criminal or unjust, it did not cross a line we had set, and only served to heighten our awareness (which this blog series also attempts). We sense something is intrinsically wrong and are starting to wonder what we should do about it. We are Sheeple starting to wake up, but yet dazed and confused, by and large. We are frogs who. though quite concerned, are not yet quite ready to jump out of the water as it nears boiling. Only those who do can have a chance to survive the experience, sadly.
Those of us less confused have already awakened and defined lines in the sand. I first stirred in 1961, when as a high-school Freshman, Eisenhower warned us about the Military-Industrial-Complex in his Farewell Address, now the Military-Industrial-Intelligence-Media Complex. I was more rudely fully awaken when that very Complex killed John Kennedy, and later, his Brother, Robert, and then Martin Luther King, and thus I started formulating lines in sand. Others will not awake or realize such lines exist until it is too late to usefully do so, and they have been crossed to no good end. What a rude awakening that will prove to be!
My personal lines in the sand
Martial Law and Suspension of the Constitution: There are variables in any such action which may or may not validate the event as worthy of sparking revolt. Read the prior post and the hesitancy will make a lot of sense. At the very least, however, any such event will force people who see the danger present to take steps to prepare for their defense and assure they retain an ability for offensive capabilities, because you can bet they will go door-t0-door to collect our guns.
Three key questions would be: are they relocating National Guard units to neighboring states, calling in the United Nations (real and/or bogus U.N. troops), or segregating units and sending some troops home and others abroad from the same units? Any of these three steps indicates an intent that there will be shooting of Americans who resist, per the prior article’s proof and the earlier cited proof from an Army manual.
Note to activists. You are already on a list of people to be watched. If Martial law is declared, there is an extremely high likelihood that all such persons will be rounded up and vanished. So THIS should DEFINITELY be one of your lines in the sand. Have an escape plan, as do I, and establish a network which will give you advance warning, because the roundup will take place BEFORE the actual announcement and commencement. The NDAA assures you of that.
Mandatory chipping: any order requiring a National ID Card, perhaps disguised as a driver’s license or health card, or actual implant of a biochip such as Digital Angel by Verachip, a CIA proprietary will set me off. These steps will allow unlimited tracking of individuals and are essentially THE Mark of the Beast or their forerunners, all of them based on RFID technology. When Biblic End-Time prophecy itself is fulfilled by government, the end is near, and the revolution which follows is not to save the nation from tyranny, but the World from the Antichrist and Armageddon. That kind of raises the stakes, does it not?
Calling for a CONCON and installing a new Constitution: A ConCon is a Congressional Constitutional rewrite effort whereby Congress can create whatever government they wish. As mentioned in the prior article, The Constitution of the NewStates of America has already written by a CIA think tank, so they need only ‘sign off’ on it and have it ratified. That’s why they have worked so hard to gain control of individual States in elections. If pressed, I could cite several examples where CIA sponsored candidates for Governor and State and Federal Congressional posts, and so forth, have been fielded. Bribery and blackmail work well on yet others. So if they hold a ConCon, you can bet the ratification is not far behind, no matter what you or I might say or do to argue against. Such a document will enable the North American Union, and be a stepping stone to a one-world government, which in turn enables the seating of the Antichrist. Really hot water, again.
A Pandemic and forced inoculations, or closing the borders: The topic is far too broad to be covered well, here. But my research into the 50 Dead Microbiologists as detailed in Fatal Rebirth, and a mountain of other material which has since become public, convince me that any such Pandemic is merely a tool to seize power, and it will very quickly escalate to include Martial Law, and all that goes with it. I fear that the inoculations will be a death sentence for the Politically incorrect, and a means for vanishing us. There is also a significant possibility it will allow covert injection of race-specific pathogens to target Muslims, Blacks, or Asians. Such terror bio weapons have been developed. Closure of borders is a sure warning sign that events akin to these concerns is about to come down. I have a contingency in place. Do you?
Sedition legislation or executive orders or other takeover or closure of the Internet: If they move to make it illegal for citizens to criticize government, or take away our ability to freely do so without penalty or censorship by decree or technical means, it is war. Period. For me, as an author and activist, that also means any assault on my personal ability to so outreach, such as shutting down or seizing my server or taking actions (e.g., dirty tricks) to destroy me financially.
Currently, for example, I’ve been hit with a huge tax bill out of the blue which I have no hope of paying off in the manner being demanded. While I have friends who have owed more than this for more than a decade, I’m being asked to pay it all off within a year. It’s only a few thousand dollars, but I’m unemployed more than two years, now, and, because of disability and my age, not likely to find a job. If they force the matter with garnishment of my Wife’s meager income, the hardship would likely foreclose on my ability to make myself heard. Anyone have about $6,000 they don’t need? I could handle the tax on that. I take PayPal, by the way :)
Any personal attacks against me or my family: This I suppose is a kind of catch all. Being arrested and subjected to TSA/HSA/FBI style abuses, for instance, might represent such a line. More likely, however, depending on outcome and steps employed, it will merely make me martyr and sponsor a growth in my following which makes me more dangerous to their tyranny than I am now. So I’m not expecting this to be a problem, though I have contingency plans in place. So should you, if activist.
What lines will you draw, how will you respond if crossed?
I cannot speak for you. I cannot tell you what to think, or what to do. I can only warn you that if you do not draw a line, have it in mind, and speak openly about it with others, you risk that line being crossed and catching you unawares. As stated earlier, that is not an enviable place to be. But by being open, you and others become aware, including government. They need the warning, you see, that they might understand that they are playing that game of Russian Roulette every time they elect a Draconian act. At some point, we might reasonably hope, they will see the error of their ways by our vocal protests, and recant. That’s what being a Citizen is all about; effect government by your voice — not just at the ballot box, but in polls and blogs and Facebook and Twitter and face-to-face with everyone you can.
In the face of tyranny, activism is not an option if you want freedom instead
So you see, none of this dialog, nor anything in my book, is calling for revolution. Instead they seek to avoid it by warning of it. Not warning just you, the reader, but those in government who need to hear it most. Also understand ONLY YOU can make that so, by in turn engaging in such dialog with others. Smokey the Bear might say, ‘Only YOU can prevent Fascism.’ He would be right. So be mindful, be active, and be prepared.
If a line is crossed, consider your method of resistance. Some will choose the gun. Others will find other ways to fight, many not involving combat at all. All will be aggressively targeted by government, but few will be easily defeated if they have contingency plans in place and networks of allies. PLEASE, if considering what you will do, especially if aggressive in nature, read Fatal Rebirth, because it contains logical rules of engagement intending to reduce loss of life and assure popular support. It covers both defensive and offensive considerations. Again, keep in mind it was written as fiction and not calling for revolt, but depicting what might happen if government forced it. Still, the great bulk of it is appropriate for tactical consideration in exactly such a case.
I hate that it should prove so.
The other side has blinked, their wall of deceit cracking
There are signs the edifice of tyranny is starting to crack under our constant cries of unjust an unconstitutional behavior. They blinked when the 99% took to the street, but then played Russian Roulette and passed a law making such protests illegal when inconvenient to government. The World-wide protests have made the NWO realize they cannot continue their power hungry course without opposition. This makes them exceptionally dangerous and unpredictable, perhaps forcing them to move their plans forward while their strength is still in tact. If you don’t know what lines in the sand you will not allow them to cross, you may fall victim if they do. Beware. Be informed. Be alert. Be ready.
And I’d like to help. I’ve lifted the copyright restrictions on Fatal Rebirth and reduced the price. I assure you there is a wealth of more solid, useful information there than in all my blogs and tweets combined. If buying the ebook set on CDR, the purchaser can copy and distribute it to others at no charge. There are stipulations. Learn more, in this post on Federal Reserve criminality.
Please comment with the lines in the sand you feel important!
- Military Viewpoint: We are Six People Away From Revolution (proparanoid.wordpress.com)
- What Does It Take to Start A Revolution? (proparanoid.wordpress.com)
- Do We Need and Should We Start a Second American Revolution? (godfatherpolitics.com)
- On Routine Political Assassination of U.S. Citizens; a Simple Remedy (proparanoid.wordpress.com)
- 24 Campaign Planks; H. Michael Sweeney for President of the United States? (proparanoid.wordpress.com)
- Guest Post: Americans Are Being Prepared For Full Spectrum Tyranny (zerohedge.com)
- We Live in a Gestapo State (lewrockwell.com)
- Stand Your Ground: Revolution of the Working-Class (fidlerten.com)
- Obama’s DHS Monitors Liberty Loving “Terrorists” (freemadd.wordpress.com)
A Method to Control Athletes as Well as You and Me
by H. Michael Sweeney
A contract Journalist named Terri Hansen recently published an article through Mother Earth Journal the deserves our attention. Titled Intentional Radiofrequency Targeting Affects Olympic Performance, Leaves No Trace, it cites insider information which reveals a serious threat no one has previously suspected. She cites the warning words of wisdom from insider to British military and intelligence community covert electronic weapons development and deployment, retired Physicist Barry Trower — from an interview for ICAACT, the International Center Against Abuse of Covert Technologies.
A former Cold Warrior, Barry has in recent months become quite outspoken about not only the dangers present in weaponized technology of this type, but also, civilian use of non weapon sister technologies, such as cell phones. Learn more about what he has to say along those lines in this transcript of an interview with a South African radio station.
I’m writing here to confirm the validity of this story and to add key detail
As published author with seven books generally on topic and two specifically on topic, it will be easy to do. In fact, in my book, The Professional Paranoid, 2nd Edition (2005 — proparanoidpress), a defensive handbook for targeted individuals, I wrote about a CIA/DOD contractor VSE Corp. which, according to Public Relations material provided by them on line, actually took an unmarked van to a Winter Olympics (in an unspecified year prior to 2001) for testing their newly developed LADS system on Athletes. I quote from their own information, below, which predates 2001, when I first mentioned it in my newsletter.
LADS stands for Life Assessment Detector System and is supposed to be used for finding signs of life in rubble (e.g., collapsed buildings) or locating villains behind walls for the benefit of SWAT or military sharpshooters. It is only one of several ‘see-through-the-wall’ (or other barrier) technologies developed in the last few decades. It is sophisticated enough that it can identify one human from another if needed, provided pre surveillance of the target subject has captured the needed data. This entire project had, since the publishing of my book, apparently gone dark as VSE deemed to remove all references to it from their Web site shortly thereafter. While, perhaps thanks to me, you can find lots of information about LADS from other sources on line, you won’t at their own Web site. Quote on:LADS consists of a sensor, neural network, and control/ monitor modules. The sensor module is an x- band (10 GHz) microwave transceiver with a nominal output power of 15 mw, operating in the continuous wave (CW) mode. The neural network module device can store many complex patterns such as visual waveforms and speech templates, and can easily compare input patterns to previously “trained” or stored patterns. The control/monitor module provides the L A DS’ instrument controls, such as on-off switches, circuit breakers, and battery condition, as well as motion, heart- beat waveform, pulse strength, and pulse rate displays. End of VSE quote.
My book further states; They talk about a test, for instance, at the U.S. Olympics. What sense does that make, you ask? They parked an unmarked van near the Alpine Skiing and Shooting event’s shooting positions, and used LADS on the competitors. The goal was to measure and IDENTIFY each shooter by their own individual biometrics (i.e., EEG, breathing pattern, pulse rate, etc.,) WHILE SHOOTING. Thus they have both individual patterns to allow them to recognize specific shooters, but also, information useful to identify (based on the aggregate or average readings) anyone entering into an aim and shoot situations. In other words, they can tell when someone is about to use a weapon. End of quote from book — but clearly, this means EACH competitor had to have earlier been surveilled by this same technology well in advance of the test. Scary.
But there are things even scarier
In the broader view, I have variously written in my books and newsletters describing over 500 terms relating to Political Control Technology such as LADS, perhaps more than two dozen of which are related to LADS in design, capability, or purpose, at least as offshoots or predecessors, if not outright evolved supersets. The LADS tests at Olympics were harmless enough only because LADS was a ‘sense only’ technology. However, part and parcel of this kind of technology, which might be called ‘remote physical’ capability, which is to say, it senses things about the subject at distance as if hooked up directly to medical test gear… is EEG brainwave monitoring.
Note: for a free sample copy of my newsletter which features 250 such terms, including LADS, email proparanoid at century link net.
The interesting thing about EEG monitoring is that a ‘catalog’ of brainwave patterns can, in LADS-like fashion, be used not only to identify individuals and their specific physiological and mental states in select states of mind and body, or tasks undertaken, but to feed it back to them for instant adaptation, a phenomenon called ‘entrainment.’ All they need to is to rebroadcast the signals back at them at stronger levels than their own body would be able to generate. The human brain instantly entrains to such a signal. Of course, the brain’s state definitely impacts the remaining physiological functions of the body accordingly. Now that’s truly scary!
Such technology is quite frequently found to be in use against politically incorrect citizens, generally to cause yo-yo mood swings, and bounce them back and forth between sleepiness and wakefulness in ways which mimic general torture methods based on sleep deprivation and denial of self. I work with such people as consultant every day (you may also ask for a free Helps Kit if you fear you may be such a victim). If used by one country in an Olympics against foreign competitors, it would be quite simple to ‘throw their game off’ sufficiently to allow an easier victory. It could also be used on one’s own athletes to better insure ‘top game’ performance. It is, sadly, undetectable except by the most sophisticated of TSCM equipment (Techincal Security CounterMeasures), and so doing requires perhaps a million dollars worth of gear and well trained experts, generally costing many tens of thousands of dollars per deployment. Even then, given the covert development of this technology, there is a risk they would mistake it for something less insidious and give a thumb’s up.
This technology is currently down to the size of a cell phone for portability in applications where the subject is within close range, perhaps 50-200 feet or less, and powerful tripod systems can accurately target people where there is line-of-sight capability from many thousands of feet, and even miles away. It is perhaps important to mention that one reason this is so easy to employ is that the signals are highly directional and narrow in beam. Another is that the signals can be so highly matched to the target subject that even when accidentally hitting a bystander, they do not have the same effect. But the most important reason is that, except where the individual has been trained to sense the signals (I train my clients in such methods, where possible), or they are already hypersensitive to radio frequencies, they have no understanding the attacks are taking place. It all seems natural. Unpleasant or unwanted, but natural.
Political Control for the Masses
The real question is not ‘Is this technology being used at the Olympics?’ because it most likely is given the ease of deployment and the tremendous value placed on success in Olympic events by nations and corporations. This equipment is in the hands of almost every industrialized nation on Earth, and not just in government hands. Corporations and perhaps even criminal groups have access at least to older versions. Even technically skilled civilians using information available on line can build devices in this family. That kind of technology in the hands of a major betting parlor would be worth millions, and in in similar ways greatly amplifies the value of advertising dollars for corporate sponsorships.
No, the real question is, ‘Will the Olympic authorities choose to believe there is a Boogyman and do what it takes to defend against them, or not?’
To do so would fly in the face of over half a century of ‘logic’ by authorities of all manner who, when approached by persons targeted with such technology, preferred instead to simply deem them Paranoid or even Schizophrenic, and shove them aside and deny aid with jokes about ‘tin-foil hats.’ Sad, because such hats work, and that’s one reason such joke are so mainstream — to make anyone in need feel and look foolish using them. For any authority, it is far easier to let the Boogyman run free, than admit the possibility of existence. Besides, any public statement of detectible use of such technology would undermine the ‘notion of fair play’ expected in the Games. It is one thing to have rules for athletes to follow and tests to insure they do not abuse drugs for a competitive edge, but quite another to set rules and employ tests for government’s fairness in play.
Yet to do nothing may well eventually lead to the revelation that there is no purpose at all in watching or competing in the Olympics, because the entire affair was nothing short of a puppet show, more a colorful, scripted charade than a sports competition. But that thought brings us to another unpleasant notion. The real value of the Olympics in the first place is its power to distract and control the masses globally, and promote globalist corporate interests. Those of us glued to the TV will not be busy protesting the G-12 or WTO gatherings, or occupying more than our living rooms, closer to a functional zero than a potent 99%.
So what do the globalists care if the Games are on the up and up, or not? Zzzzzap! Score!
- Effort to ‘read’ Hawking’s brain (bbc.co.uk)
- How Sci-Fi Becomes Reality – Mental Manipulation (theurbn.com)
- Synthetic Telepathy And The Early Mind Wars (powersthatbeat.wordpress.com)
- Wes Moore ~ Television: Opiate of the Masses (Thanks, C) (shiftfrequency.com)
A Privacy/Security Consultant’s Personal Advice in ten stepsfarcical advice, that is, by H. Michael Sweeney permission to duplicate in full with all links and credits in tact, and a link back to proparanoid.wordpress.com hereby granted
How to deal with terrorism by Obama bin Laden
Updated Sept. 16, 2012 to add 8th ~ 10th Steps, and supporting links and notes
In the face of the horror of September 11 and all the dire plots thwarted or predicted since that time, what can you do as an individual to best deal with and be prepared for terrorism? With seven books generally on topic, here is my considered professional advice in answer to that question:
1) Yawn. Even including the casualties of Sept. 11, you are statistically in far greater danger of being killed or seriously injured by a Policeman or National Guardsman than some crazed and largely imaginary terrorist. That is a fact. They would have to pretty much wipe out all of Los Angeles in order to have equal odds.
2) Prepare for the worst. Even though the Terrorist is not likely to get you, there is a growing threat to your personal security and longevity which is tied to the ‘terrorist threat.’ It’s called Fascism, variously described as a Police State, or Military Dictatorship, or the New World Order. If your prefer, think Martial Law, FEMA Camps, UN Occupation, Chinese Invasion, our next (overdue?) Revolution, intentionally Bankrupt Banks or, (gasp!) mass Walmart Closures. Regardless of manifestation or name (I prefer Shadow), and regardless of what you believe, such disaster is a more real threat. And regardless of final form, it is going to impact everyone, not just those attacked by Police, National Guard, Terrorists, and unemployed Wallmart staff.
3) Increase key supply reserves. You must presume in time of National emergency that water, foods, gasoline, weapons and munitions, and money will be very hard to come by. A smart man will stockpile. Warning. The government has defined that persons who stockpile are to be considered terror suspects, even Mormons. Weapons, especially, are a problem, as is being a member of NRA or talking about the Right to Bear Arms in public. Rural Texans, should especially beware, since they own more guns on average per family than some Swat Teams.
*note: while this is not specifically on FBI’s list, it is clear in the wake of the Aurora shooting that government is watching who buys weapons, and suspicious of anyone who collects. The WACO standoff and massacre was staged for just such cause; the ‘illegal’ weapons BATF claimed on their warrant included descriptions made up to include things which no one could possibly own because there was no such thing ever in existence.
4) Educate yourself. You must be alert to news around you from as many resources as possible. When the Sh** hits the fan, it won’t be NBC or your newspaper that gives advance warning, it will be something on the Internet or an email from someone on the front lines. Establish as many contacts in as broad an informational network as possible, especially to include Activists, who will be the first to feel the Iron Fist when it comes. Warning: The government has determined that persons who make any form of contact, subscription, or affiliation with such politically incorrect sources (like me), even when seemingly accidental, are to be considered terror suspects. Oops… too late for you, now!
•note: this is not exaggerated. As far back as COINTEL and COINTELPRO days under Nixon, government was tracking such matters, and Hoover’s FBI before that. In point of fact, illegal political spying was launched against people (including me — details of surveillance tails of my activities by up to five operatives at a time) who subscribed to select newspapers (i.e., the now defunct Washington D.C.Spotlight — the only newspaper in America to never be proven wrong in a story, and to which I subscribed), and such information was being freely traded between CIA, local Police, and the Anti Defamation League/B’nai B’rith/Mossad — and sold to anyone for a price.
5) Avoid credit, use cash. Credit creates obligations which in a time of disaster and an inability to work or access bank accounts could mean foreclosures and other negative financial harm before remedy could be managed. Warning: The government has determined that persons who pay with cash are to be considered terror suspects.
6) Form group defenses. Find others, be they family members, friends, or simply like-minded individuals to form mutual defensive relationships designed to cover each other’s back and increase the ability to withstand external threats. Warning: The government applies the principle of guilt by association and the notion that whenever two or more citizens get together a conspiracy is afoot, and must presume them a terror suspect.
*note: This exaggerated point is based on the fact that everyone on Facebook and other social media is being spied upon by a paranoid government to see who else they are in contact with, and what they are saying/doing.
7) Have a plan of escape. Consider getting out of the country to Canada or some other nation, or escaping into the countryside as a survivalist might do, or at the very least relocating to another community or staying on the road at length. A moving target is harder to hit. Warning: The government has determined that persons who travel extensively*, and especially survivalists, may be terrorists and should thus be put on watch lists.
*note: the couple arrested were told one reason they were being interrorgated (deliberate spelling) was because they were traveling so much. Another was, they were asking too many questions about why they were being questioned! But their actual arrest was ‘for threatening an agent’ by ASKING “Am I in danger, here?”
8) Document everything. There are many reasons you should photograph almost everything, and keep good records. Insurance claims you may need to file, for instance, and proofs of ownership. On the assumption terrorism might destroy public buildings and key infrastructure, it might be good for posterity’s sake, and art’s sake, to photograph key locations to ensure future generations will be able to remember. Wish I had that picture I took of the World Trade Center some years back. Warning: FBI has told police to target anyone taking pictures of public places as potential terrorists.
9) Educate your children. If our way of life is threatened, it will be more important than ever to insure our children will know what it means to be an American so they can carry on. Help them with homework to insure they understand the political processes and political choices, and are able to grasp concepts like Free Speech and the differences between Republicans, Democrats, and Ron Paul. Warning: FBI has visited and questioned school children who’s’ school report mentioned freedom of speech and Ron Paul, and subjected them to psychological profile questions to see if they or their parents were terrorists.
10) Buy Gold and Silver. If the money collapses because of massive bank closures under Martial Law or terrorism which kills the banking system, you will need a safe investment alternative. Warning: FBI has indicated people who buy precious metals should be considered terror suspects.
In summary, you would be far safer, rather than attempting the above defensive steps, to actually join Al Qaeda in the first place. The number of terrorists killed or arrested by government is, after all, practically non existent compared to the number of Policemen killed by criminals. Of course, that could change under NDAA, which makes murder of US Citizens legal if you are named Obama bin Laden. So at the same time, join the ACLU, as well as the patriotic Republican AND Democratic parties, and consider those memberships as insurance policies. The former to watch out for you if arrested, and the later to provide a kind of insulation against it regardless of which party is in control of the nation: they won’t want ‘one of their own’ to make the news as a terrorist, now, will they?
No. That’s when assassination is the better option. But don’t worry too much about that. Just watch the Matrix repeatedly until you can master all their defensive moves, especially the ones dodging bullets.
Sorry, but if I hadn’t misplaced my Al Qaeda membership application, I’d post it here for your convenience. That’s OK, I’m sure the CIA, who created the infamous group with the help of the U.S. Army, can provide you with a copy on request.
- Al-Qaeda a tool for West’s political/military adventures (alethonews.wordpress.com)
- Will insurance cover you if terrorists strike? (insurance.com)
- DHS Characterizes Patriotic Americans as Terrorists (moonbattery.com)
- Osama bin Laden and the 911 Illusion – Part I of 3 (vaticproject.blogspot.com)
- Bin Laden realized the truth: Terrorism just doesn’t work (juneauempire.com)
a four-book set by H. Michael Sweeney
Copyright © 1996 All righs reserved.
From The Preface
Truth cannot live on a diet of secrets, withering within entangled lies. Freedom cannot live on a diet of lies, surrendering to the veil of oppression. The human spirit cannot live on a diet of oppression, becoming subservient in the end to the will of evil. God, as truth incarnate, will not long let stand a World devoted to such evil. Therefore, let us have the truth and freedom our spirits require, or let us die seeking these things, for without them, we shall surely and justly perish in an evil world.
Now we have a dark, difficult to see Shadow across the land. It is a secret Shadow, one built upon and operated by lies disguised as truth, dedicated to the works of tyranny and oppression in the guise of freedom’s cause, and driven by the darkest of evil wearing the mask of good intent. This Shadow lusts for and worships power, and applies it with great and frequent abuse to acquire even greater power. It wants the ultimate power to control the World, to decide who lives and who dies, and to directly or indirectly own and control all things. Many do not yet see it, and sadly, will not, until it is too late. Untold millions more will die never knowing why. Who or what is Shadow? Read and learn, learn and decide.
This author was once an ordinary man eking out an ordinary existence. This was my happy state and my presumed ongoing fate — until I came into possession of an innocuous and incredulous document. It was unbelievable: a tremendously conspiratorial document detailing many sins of the empowered elite and their minions within government — especially within the intelligence community. Preposterous as it seemed on the surface, something within that document must have been true, for merely mentioning its existence transformed my ordinary life into an extraordinary 007 nightmare.
They spent perhaps $250,000 a month in surveilling me and manipulating my life in devious ways. What about that document, unless it be the conspiracies detailed therein, so frightened them that they took such measures against me? Indeed, what was the purpose of the document — why was it ever written? More key, as the document itself attests, who were the people behind the conspiracies, and what dark motive drove their actions? Who are they that should so fear mere words on paper? They are Shadow. This book is their story. It is my story. It is the story of other Americans also caught in Shadow’s web. It is your story — a story of your historical past revealed to be lies, and of a dark future, if you do not take care.
This book is an attempt at revealing the true nature of a Shadow manipulated past, the true Shadow fostered dangers of our present time, and the all-too possible future Shadow plans for us all. It must be said up front that this author began this work completely unawares of the social and political realities perceived by any of the many organizations that exist on the political fringes to the left and right of the staid Republican and Democratic parties. As an overly naive and easily pacified American, there was no understanding of what CFR or NSA was, what a constituted a leftist or extreme right point of view, a Populist or Elitist, nor of little in between. Huntly-Brinkly were my sole political enlightenment, and the balm and ointment of my few political fears and concerns. I was mere fodder for the engines of media manipulation: Hear Ye, Hear Ye, believe and obey. I believed. I obeyed. But then came proof of Shadow.
Shadow is a secret society with its own secret government. Shadow is a secret business community with its own secret monetary system. Shadow is a secret intelligence community with its own secret police. Shadow has a secret agenda achieved with secret resources. At Shadow’s darkest, innermost place lies a black, satanic religion whose secret roots are the very essence evil — so dark as to have origin beyond mere mortal man. Shadow’s branches are everywhere, and its greatest branch may ultimately prove to be the anti-Christ.
With combined resources of unimaginable wealth, influence, and power, there is likely no high place Shadow does not control or sway in some way or to some degree. Shadow’s greatest tool and protector lies in secret works and an invisibility to detection, thus making it impervious to would-be enemies. We would be Shadow’s natural enemy, would we recognize it for what it is. As we do not, we remain its prized and willing victims. We are no more wary than a gnat buzzing about a spider’s ever growing web. Save some awakening of our dull wit and even duller senses, it’s only a matter of time…
Legend tells us that thousands of years ago, Diogenes searched a lifetime with his lantern held high in a futile search for just one honest man. The centuries do not seem to have changed the odds in his favor. But in our modern times and societal infrastructures, should there not be some source of truth and honesty? Is there no place where we can seek the essence of righteousness? If not, then as the opening suggests, we are doomed to evolve or collapse into a kind of world-wide tyranny wrought by those that thrive in lies and secrets. Indeed, everything points to that eventuality becoming reality. The military-industrial-intelligence-media complex, in an unholy alliance with what many term the super-elite of the one-world crowd, steadily remakes us into a fascist-like corporate-manipulated state. Sweeping statements, yes.
Such sweeping statements need explanation if we are to understand the nature and identity of Shadow. To start with, many people today do not understand what a fascist is — thinking it some irrelevant term from a bygone past. They should look up the word, especially if from among the poor or minorities, for they already are suffering under the first signs of its growing yoke. Fascism holds a special, unkind place for them under its unbridled reign. Indeed, perhaps for us all. Failure to understand and accept the existence of Shadow and their dark crimes may very well mean a kind of death through slavery to a dark will – the difference between all good things which the reader desires and believes in and the loss of all hope that they might come to pass. Fascism favors the moneyed elite, and Shadow’s head is formed largely from among the leadership of the megacorporate giants. The reader cannot turn away from these notions unless and until satisfied beyond all Shadow of doubt that they are untrue.
Want to know more? Read Fatal Rebirth!
- The 33 Axioms of Fascism, a Primer (proparanoid.wordpress.com)
- The New Faces of Fascism (theconservativemind.net)
- Shadow Executive Orders (rockelement.typepad.com)
- Media Beast To America: Bow Down To Military Police, Your New Lord And Savior (disquietreservations.blogspot.com)
- Guest Post: Americans Are Being Prepared For Full Spectrum Tyranny (zerohedge.com)
No one would, I hope, consider me a serious candidate, and certainly no one mainstream would consider my ‘extreme’ planks as reasonable… though that would show they have no clue as to what true conservative politics are. I am neither left nor right wing, though I have been called both. All I seek is to restore the country to the state it was in before government got so powerful it managed to destroy the country, a kind of political time warp going back some 50 to 100 years. In simpler terms, I’d restore the government of the United States to a Constitutional government as envisioned by our founding fathers. How left- or right-winged is that?
Indeed, all the policies put in place in that time span which have gone awry and led us astray would by those governmentals in power at the time would surely have seemed to be the radical (both to the left and the right) notions in the eyes of the likes of Jefferson, Hamilton, and Franklin, et. al. Our country had run just fine for more than 100 years without such changes, and is now on the verge of extinction because of them. So why not fix it? Because it’s radical?
But that all means is that I’m a a strict Constitutionalist, which also means I am per the current use of the term by media not just a radical extremist, but even a terrorist by some standards, which I take as a badge of honor in the face of the tyranny of an unconstitutional and lawless government. But then, so are you, too, just for reading this, because endless Draconian legislation and the public rhetoric of power brokers desperately seeking to retain status quo must consider you guilty by association. FBI, in fact, now considers ANY contact with ‘extremist or terrorist’ groups as justification for surveillance targeting. I’ve written about that extensively in my books on personal privacy and security.
You have no right to use your mind as you see fit, and are a become part of a growing danger to the status quo (keep it up!). The government spies on everybody, and in their reasonable paranoia (because the angst of the 99% is nothing compared to the disgust felt by the many who did not hit the street out of fear). And it is that; they use fear of terrorism and of government heavy-handedness (Police, TSA, FBI, NSA, CIA, and others, to include even the military, of late) to tighten their grip, and event to get us to spy on each other. Replay of Nazi Germany tit for tat. Got your Brown Shirt and armband handy?
Because those of us who are fed up with the status quo… with the New Boss being the same as the Old Boss (and largely lost to their power-mad tyranny)… fed up with the corruption, the pork, the endless signing of Bills without even reading them (largely lost to their greed-driven treason)… and fed up with the steady march toward a New World Order and a Police State mentality (largely lost to their Globalist Fascism)… will LOVE my planks.
But since I am not running, let’s just say it is for mere entertainment and intellectual exercise that I present my planks… which might be described in a motto, ‘Restore the Republic.’ It would effectively de-centralize the Federal government’s power for all except things which were critical to National viability. What most of the Federal agencies are and their functions can be done better and less expensively, and more gently, by the States, or is best left undone at all. I seek to undo.
Unworkable? Unrealistic? Nieve? Sure. But the best ideals ever adopted by humanity through history started out that way. It was, in point of fact, one such ‘unrealistic’ ideal which drove both the French and US revolutions and their resulting Constitutional structures. Those revolutions were driven by a multitude of nieve ideals, just one of which was stated in mutual paraphrase by both Jefferson and Montesquieu, here.
This, and many other like remarks summed ‘radical notions’ unheard of before the Magna Carta, quite unworkable and unrealistic in face of the virtually unlimited power then held by Kings. But when ideals and goals are lofty enough, idealists everywhere will find a way to make them workable, and make them real, despite any ignorances in the beginning. Stumble along the way as we learn, say I. Far better to stumble going forward up a tough hill than to take easier path; sliding down the slippery slope of despair into the total ruination which seems now so near at hand for our once fair Land.
So you can’t vote for me (write in’s excepted), but you can try to pressure candidates to adopt these planks or some other workable overhaul, and vote for the ones that come closest to meeting your wishes. Right now, for me, that would be Ron Paul, in my opinion. Or you can give up and let the NWO win. Or you can pick up a gun and start a revolution with no guarantees of surviving the effort. There are no other choices, the later two so frightening and yet so near on the horizon by the clues at hand that I pray to God for a miracle to prevent them. I suspect we would agree some kind of an overhaul is in order, so humor me then, please, with an overview of the planks… not presented in any order intending to imply priority. Moreover, they are but a small sampling of wrongs in need of righting…
Plank Number One: Critical Review and Reversal of Presidential Executive Orders
In the first 90 days I would move to review thousands of Executive Orders since Lincoln with an intention of reversal of those which have quietly modified the institution of Government in ways which have proven to be tragic in the long run. For all my love for Lincoln, he started us down the path of ever growing, unchecked Federal power, the bulk of which resides in the Presidency. Some tweaking is in order, it would seem. We don’t know about every E.O., because untold hundreds of them are not for public consumption (which makes me nervous about their purpose and result.) But some of them we do know about, as they tend to make their way into the Federal Register (on line). Here are just a few examples… one of which curiously needs enforcement, rather than revocation.
Revoke EO 7933-A By Franklin D. Roosevelt. It allowed the IRS to investigate the finances of those under suspicion of unamerican activities, a provision in support of the McCarthy witch hunt in the Red Scare. Since it is still in place, even though the House Committee on Unamerican Activities no longer exists, this EO may represent a potential source of political targeting by the IRS against Muslims and the politically incorrect among us by our paranoid government.
Order the enforcement of EO 111110 by John F. Kennedy, which was intended to restore the power of the U.S. government to issue money, and end the ability of the private bank of the Federal Reserve from making loans in the form of Treasury Notes to the U.S. government and charging interest. THIS, is where the National Debt comes from. This EO was never enforced, perhaps because JFK’s assassination rendered it ‘unknown’ in some way, or irrelevant under the helm of Lyndon Johnson. However, it has never been revoked, but was ‘nullified’ by a sneaky E.O. 1208 by Ronald Reagan, which needs to be revoked. Upon such corrections, therefore, a new EO would be appropriate which denies that portion of the National Debt accrued since the signing of 111110 June 4, 1963. It is, by EO 111110, stolen money, ill-gotten gains. Go fish, Globalist bankers.
Revoke EO 6102 by Franklin D. Roosevelt, which prohibits citizens and corporations to ‘hoard’ Gold. Ostensibly to allow the U.S. Government to protect and enhance its own Gold reserves in backing of U.S. Currency, the EO remains non functional given that the U.S. no longer employs the Gold Standard, preferring instead to pay huge sums of interest for printing endless IOUs to the privately held Federal Reserve Bank, which is not a government agency. Revocation would allow free ownership and barter of all forms of Gold and Silver by any citizen or corporation for any purpose. Use it or lose it. Moreover, as President, I would demand a tour and inspection of content at Fort Knox to see if there is actually any gold left there, at all, or if it is now fake to cover a suspected theft.
Revoke EO 12148 by Jimmy Carter (and roughly 15 related E.O.s) which would disband F.E.M.A. A replacement agency which truly represented emergency management and did not represent a potential tool for total power grab and abuse of power as the agency has so faithfully exhibited as its true purpose or limit in ability (next paragraph). I would propose that each STATE have its own local FEMA replacement entity under local State Government oversight cojoined by a centralized Federal oversight body to insure that once activated, the State’s best interests were maintained with respect to cooperation in aid between States and the Federal level. Each State, however, is its own boss as to how and where such aid is delivered internally.
Few people realize how insidiously powerful FEMA becomes in the event of Martial Law or even a simple localized emergency declaration. They will control EVERYTHING including how much food you have on your shelf, if you can travel ANYWHERE (even to work), or if you can buy or possess ANYTHING, and much more. They gain control of all aspects of social life, including your kids, your medical choices, etc. And as seen in the aftermath of Katrina and in the wildfires of Texas, FEMA is NOT our friend, but our mortal enemy. Worse, that State of Emergency is already declared, and has been since 2001, and you will not believe what FEMA’s role is to be should they choose to act on their power. Under Reagan, plans were discussed at the highest levels of government for FEMA to intern blacks in concentration camps. You can bet there is an E.O. somewhere adding Muslims to that list. WTF? Now all those conspiracy theories about FEMA camps don’t seem quite so ‘theory.’
FEMA must die as a NWO Fascist instrument, which means a lot of E.O.s must be revoked.
Revoke EO 13158 by Bill Clinton and EO 13575 by Barack Obama, and others, which transfers large tracts of U.S. wild lands, rural and Agricultural lands to control of the United Nations with loss of sovereignty — no Congressional approval sought. The former to establish 47 ‘biospheres‘ where U.S. citizens have been threatened (by signs, mostly, but at times, by armed military types from unknown units and sometimes speaking foreign languages) with severe punishment for tresspass. Such acts had been reported frequently over the years in the now defunct Spotlight newspaper, with further documented covert military operations and/or Soviet made military hardware storage was taking place at biospheres, ostensibly U.N. related. Yet the U.N. officially states it has no such operations or equipment in the U.S.
The later has (Obama gave up rural/agriculture land) to do with something called Agenda 21 — which essentially sponsors corporate monopolies of the food supply, but which is seen as an extension to the biosphere scheme and heir apparent to Codex Alimentarius, which is its own matter to be undone in another plank. Agenda 21 is also quite related to massive depopulation and eugenics programs which would make Hitler’s attempts to eliminate Jews seem a mere cursing in the wind. Obama is further moving in that same direction in an attempt to turn over all agriculture to control in the U.S. to a few corporations spearheaded by Monsanto. Under Agenda 21, private ownership of land is not be allowed, nor is growing your own food, nor for the matter, growing natural food; all must be genetically modified and/or irradiated.
Plank Two: Force Congress to DO IT’S JOB
E.O.s are SUPPOSED to be reviewed by Congress and approved or denied, becoming de facto law if not denied. Congress has fallen down on the job, and my Plank would include requesting a law forcing Congress to… well, do what it should. It must debate, in closed hearing if necessary, each and every new E.O. and come to a decision within a narrow time line. In like manner, each Congressman MUST read every page of every bill. Only by being fully informed may one debate and decide legislation in a way useful to the nation and its people. And finally, no Bill may be passed which contains buried legislation unrelated to the Title of the Bill, thus ending Pork Barrel and time bombs waiting to be discovered. It it deserves to be law, let it be its OWN law unto itself, alone, or let it be non existent lest it foster ignorance of the law by its buried nature. If there was a way, I’d want the law to read that any Congressman who voted for a Bill which was found by the Supreme Court to trample on the Constitution would be subjected to an immediate recall vote (but that would likely also require State law changes).
Plank Three:a) End the FED, b) establish a GNP Monetary System where money is c) controlled and printed entirely by the government and d) tied to the nation’s financial health.
Based on the Gross National Product and the value of labor and goods, it is a bit complex to explain, here. The basic concept is that money supply cannot exceed the GNP (the value of the output of labor and goods). The GNP is to the number of workers a relationship by which the standard of living is evolved. More workers and lower GNP means lower standard of living, and less money minted, as does a constant GNP and more workers. But more workers and more GNP means a fairly stable standard of living, and money supply, while any boost in GNP greater than the increase in workers means a higher standard of living and more money. Interest rates would tend to remain constant or suffer mild fluctuations in all but the most severe of economic swings.
Minimum wage and adjustments thereto for promotions and the like would, in addition to performance merits, be based on a baseline GNP determination, not unlike the way we use a baseline Prime Lending Rate from which all other lending rates are devined. The price of goods would be based on the cost of production which includes the cost of labor, vs. the contribution the goods represent to the GNP. And then, of course, there is the matter of taxes – see next plank.
Plank Four: End the IRS as we know it
No more Federal personal income tax! No more Federal corporate tax! Instead a value added tax in the manufacturing processes. Raw material collection (taxed when sold to processors); raw materials processed (taxed when sold to manufacturers); processed materials made into components (taxed when sold to product manufacturers); products and assembled goods (taxed when sold to distributors/retailers), purchased by resellers to consumers – tax free except by State tax options. States would be encouraged to adopt the same model. The actual tax rate would be quite small, but 100% of all GNP commerce other than services would effectively be taxable and generate sufficient revenue to allow the Cost of Goods sold to cover the tax. Services are NOT taxed, and therefore, all such labor contributes 100% toward the GNP tax free.
Yes, you would pay more at the store for the goods you buy, perhaps offset somewhat by the lack of corporate taxes which are already causing prices to be higher, but you would no longer have 1/3 or more of your income eaten up by separate tax payments and you would have NO REPORTING OR FEDERAL SNOOPING, INDEPENDENT IRS COURT SYSTEM, and NO IRS TO WRITE ITS OWN LAWS, etc. And remember, much of the National Debt has been wiped out in Plank One, so taxes actually go to funding government operations, not to retire a bit of the national debt owed the banks for all that illegally printed money. A huge chunk of tax revenue today (up to 75% of taxes) goes directly to the banks as interest payments.
Plank Five: Make the nation pay for What it Buys When it Buys It
You want to buy a tank, Mr. Army? Want to build a spy satellite, Mr. CIA? Want to build a highway or dam, Mr. Congressman? Use the money you actually have in hand from tax collection, or you can’t have it. Don’t even think about writing legislation you can’t finance from taxes. A balanced budget with ZERO National Debt should be the law of the land. This also means that Social Security funds must be reimbursed and payments updated to reflect where they should have been prior to the looting process (SS is its own plank.)
It does NOT mean that you raise taxes to buy something you can’t afford at the moment. Since taxes are collected DAILY, the Congressional ‘checkbook’ has an income stream against which you may write legislative checks as you need them. Live within your means, Congressmen. Emergency funding for dire circumstance is handled by borrowing from the banks only to the extent that payments are clearly within the ability to pay from the monthly income stream. So I suppose the fat bankers can still sponge a bit off government, but it would in such a case also be to the advantage of government and to the people, where as currently there is only the one winner at the piggy trough.
Plank Six: End the Alphabet Soup Intelligence Agencies
The TSA, DOJ, FBI, DEA, CIA, NSA, DOD, DIA, HSA, etc., etc. represent a top heavy superstructure of spying on Americans that MUST stop. I’d rather completely fire all these people and deal with the aftermath of villains running amuck than put up with the crap I’ve seen first hand as victim of endless COINTEL PRO style targeting (of myself and my clients). This is the number one source of fear of government in America, exactly as it was in the Soviet Union before their revolution.
But that extreme is not required. Cleaning house, redefining goals, and placing checks-and-balance style limitations on them will, in most cases, be a good fix. In some cases, like HSA, NSA, CIA, the housecleaning will be so significant that they may feel like they were done away with, but their root defined core jobs will be left in tact. In other cases, redundancy is found to exist and that can be eliminated, and in yet others, there is simply no just purpose not better served by some other means. This plank would be a literal death warrant for any candidate so proposing, I’ve been repeatedly told. I mean assassination. So what does that tell you when U.S. Citizens fear their government such they believe it would assassinate civilian politicians to preserve status quo?
Plank Seven: Give the Indians Back Their Land
I would offer to the stoic Tribes of American Indians complete responsibility and control of all Federal Lands not used as military reservations. This would end the BLM, Fish and Wildlife, and assorted other agencies, and place forested and wild lands, national parks, and other lands in the care of the people who loved it most, and took far better care of it than have we. Much of the current budgets of these agencies would go to the Indians to fund that management. They would be required, of course, to allow free access to public lands, but empowered to stipulate rules of use to insure the lands were not fouled or abused. They would inherit the resources and manpower of the aforementioned agencies as tools they may freely mold and reshape as they see fit. All treaties would be rewritten to undo prior treacheries as well as could be managed, the new lands being added to their reservations under joint ownership, but useful to their communities to include relocation and new settlements. I would not intend Casinos or industrialization of the type now all too easily approved on these lands, or other uses not now allowed, but all other good use to the Tribes would be their right.
Plank Eight: End Corporate Personhood As it Exists Today
Not quite an ending… but I’d move to make corporations more like real people. For one thing, that means they have a life time to live, and a means of producing children to survive them. At the end of their life, their children (spin off corporations) carry on the same family name, clients, products and services. Like real people, they also must be held accountable for their actions with real impact to the corporation as well as its Boards and Officers, and in a manner consistent with the same acts if committed by a real human. Toward the end of longevity (say 100 years), a corporation would split into one or more sub corporations (children), which would give all employees who ever worked for the corporation, even if just for one month, a pro rated share equal to their contribution in labor to be credited toward stock OPTIONS at the prior value of the original firm when they were FIRST hired. Over time, ownership falls more and more to employees and less and less to moguls and block stock investors.
By such a scheme retirement programs might be eliminated, providing a nest egg for retirees without increasing corporate obligations over time, and the ‘children’ would gain fresh funding for a growth spurt during their formative years. I would seek controls of Boards of Directors which prevent the same men from sitting on multiple Boards in a manner which puts too much control of a sector into too few hands. I would end the revolving door; seeking a ten-year waiting period for government personnel before allowing them to work for firms in any sector in which they held a position of related service in government, and in like manner disallow any member of an industry to serve as more than advisor to government, certainly not as administrator in any government oversight of that industry’s affairs. To be hired by a firm as a former government employee, and vice versa, should be based on expertise born of their experience and not clout and pull still in place with staffs remaining in recently vacated offices. Period!
Plank Nine: Establish a Free Press and Transparency in Government
Currently there exists a kind of de facto partnership in America (and a mirror situation in other ‘free’ countries) between the Military, Industrial, Intelligence, and Media sectors… forming MIIM, the Military-Industrial-Intelligence-Media complex. Media is controlled by a small handful of individuals who are largely in bed with the other sectors. At one time (at the time of the friendly fire shoot-down of flight 800), all three major television networks were outright subsidiaries of military contractors, which is why they fired any reporter who said anything on air about friendly fire.
Currently, there still remains employed within media, which includes the entertainment and advertising sectors, thousands, if not tens of thousands, of CIA and other agency personnel, to include military proponents serving as mouthpieces for the very undue influence President Eisenhower warned of when he left office (listen carefully to his Farewell Address video and you will see that he warned us about almost everything these planks address). This was a direct outgrowth of CIA Operation Mockingbird, and only the tip of the current iceberg.
If a means of insuring that ownership has no impact on editorial and reporting departments cannot be easily found, I’d just as soon provide equal funding to alternative underground news sources. All employees who were government shills would need to resign or face charges of treason if uncovered after the fact, because disinformation is treasonous in any government of the people, by the people, and for the people. Thus media must have good access to government, and government must be frank with media. While national security can make it important not to reveal the full truth of a given matter, lies should never be national policy, at home, or abroad. Even an enemy MUST know we are truthful that they not misread our intentions, and we should never betray a friend by a lie, especially our best friends, our very own citizens.
Plank Ten: End Foreign Aid and Foreign Policy as We Know It
Foreign Policy and any resulting aid should be about helping those in time of great need. It should be about bolstering defenses of weaker nations against predator nations. It should be about encouraging free Republics and free enterprise (not Democracy, and not capitalism or free trade – there are significant differences). It should be about bootstrapping struggling nations that they might become financial and social partners in World building (not New World Order building). It should be about assuring health and wellbeing of human kind ((not the wellbeing of the big pharma firms), and done regardless of race or political creed.
It should not be about politics, fat military contracts, or quid quo pro deals for fat cats. Israel is a strong, wealthy, proud, and fully independent nation. Mutual defense agreements, yes. Arms sales at competitive prices, yes. But the billions must stop flowing to them and other nations as a means of buying loyalties, funding MIIM, and aiding the march of the NWO. You don’t buy friends and good neighbors, you build good neighbor relationships and cement friendship by actions, by standing by them in a time of need, and by being fair. You don’t take food out of your own children’s mouth and give it to the neighbors when they have their own.
Plank Eleven: Fix Health Care and Confront Pharma
Step one is to forbid Pharma to advertise to the public. Doctors, perhaps, via medical journals. This will lower prescription prices. Step two is to forbid insurance companies from forcing deductibles or co-pay minimums at term start, which effectively eliminates the poor from getting health care even when they have insurance. I myself have insurance which I and my children cannot use for this cause. Step three is to stop the fat-cat billing schemes inherent in Medicaid and Medicare which allow hospitals and doctors to rake in tons of money for outrageous charges and unnecessary procedures. These need to be replaced with a monitoring system that rewards discovery of overcharges and excessive billing.
In my own extended family I can cite countless thousands of dollars in endless examples both at private practice and hospital levels. Step four is to establish government oversight, which will never work unless the FDA and CDC is eliminated and replaced with a body that protects the people rather than the corporations. Step five is to FULLY investigate the origins of HIV, Avian, and other man made virus,’ including Cancer, and to ALLOW alternative medicine cures to be explored.
Step six (step one, really) is to shred Codex Alimentarius, Agenda 21, and related NWO efforts. GMO crops should be illegal unless passing stringent tests by outside agencies. Currently, it seems, no GMO crop could pass such a test and represent a greater long-term health threat than the Black Plague. A Congressional investigation of Monsanto actions is in order.
Plank Twelve: Fix Agriculture and Immigration
Step one is to make it illegal for any firm to control more than 15% (or some number which assures competition still thrives) of a food supply or aspect of production and distribution — no monopolies such as enabled by GMO and Agenda 21. Step two is to enforce current labor laws against employers instead of focusing only on illegal workers, which would tend to make illegal migrant emigrants less of a an issue. Step three is to naturalize all current illegal aliens who can pass minimum tests for language, non criminality, and health, and simultaneously truly seal the borders and evict all who do not pass the standards. Step three is to allow conditional work visas for would-be emigrant migrant workers based on a system of work demand vs. worker supply such that if non emigrants will take the jobs, they may more easily do so without competition from illegals. Step five is to stop teaching mainstream courses in multiple languages in our schools. You must know English to go to school, where if you wish to learn a second language as its own course, you may do so. So if you want to be a migrant worker crossing the border, learn English first or leave your kids behind.
Plank Thirteen: Stop the RFID Technology Threat
If you do not understand the nature and threat which Radio Frequency Identification Devices represent to your personal liberty, then you have not read my books or been paying good attention to the Web. I suggest you can ‘catch up’ by listening to my Webinar interview with Republic Magazine… about 32 minutes into the interview. The one simple way to stop RFID as a threat is to simply require them to be removable or destroyed at point of purchase, and that all such product be prominently labeled.
Plank Fourteen: Stop Canamex COLD, Kill NAFTA/CAFTA and Job Exportation
This is a broad topic beyond the scope of usefulness in this (already too-long) an article. I would simply repeal or renegotiate the agreements in place and write Canamex out of existence. See my blog post on Lion Dance, or request my free newsletter on Canamex for an eye opening explanation of why this is a critical step; email proparanoid at comcast net.
Plank Fifteen: End the Drug War and decriminalize illicit drugs, empty the prisons.
America, with a population on par with Europe, has a half million people behind bars for drug related matters, more prisoners per capita in this one category than most other nations have for all crimes combined. It is a fake drug war prosecuted by a CIA front agency (the DEA was founded by top CIA operatives) as a tool to protect illicit drug sales by sanctioned CIA conduits. It forces the price (and profits) artificially high, and fosters a prison-based economy to the delight of corporate greedsters. Take away the criminality and replace it with treatment, and it will cost our economy one tenth as much, boost GNP, and make it less profitable for Cartels and CIA alike. Pushers stay in jail, users walk.
Plank Sixteen: Fix Voting and Census
The Census is very critical to certain functions of government, including Districting for voter representation and the voting process. But the Census can be done in a way which is not invasive and a violation of privacy, and is kinder to those less disposed to cooperate. The solution is similar to a solution I have in mind for fixing the less-than-trustworthy voting system. These solutions are too complex to fit a paragraph or two, but essentially decouple raw information from the identity of the individual after a simple verification process, which is to say, that in the passing of information, identity verification simultaneously dissociates the information with the individual. Additionally, a verification process facilitates the individual’s ability to verify their vote or census material was correctly tallied and attributed as intended, all the way up the ladder to the final tally. The general method may be loosely described as being similar to certain email encryption schemes involving keys in possession of both the sender and the recipient.
Plank Seventeen: Get at and Expose the Truth
JFK, RFK, MLK, Peltier, Riconosciuto, Christic Institute’s Secret Team, Mena, OKC, Waco, S&L, CIA/DOD mind control, MJ-12 and UFOs, and above all, 9-11 and the Derivatives Scam. Conspiracy theories, my a**. If the official facts are in conflict with themselves and defy reality and/or logic, but are accepted and tendered as truth, that is a kind of proof of a cover up, and any time you have a cover up, it is automatically a conspiracy as a matter of fact. It therefore justifies further investigation by independent and unbiased participants. Truthers will out.
Plank Eighteen: End Globalist Traitor Domination of Government(s)
You cannot be a patriot and serve fellow citizens in office if your true allegiance is to a Globalist agenda which would seek the end of national sovereignty. An oath of political office should include declaration of non alliance, affiliation, membership, or sympathy for the goals of Globalist organizations such as the Bilderbergers, Tri-Lateral Commission, Council on Foreign Relations, Skull and Bones, and the like. To violate the oath would make one subject to prosecution and imprisonment.
Plank Nineteen: Kill the Military-Industrial-Intelligence-Media Complex
While this has already been addressed in part above, I would additionally want every black operation and military and intelligence project currently in works or previously undertaken reviewed. Where such operations were deemed either in support of a New World Order or in support of MIIM profiteering or power grabs, all persons associated with it at management level would be subject to investigation and possible prosecution for treason.
Plank Twenty: Fix Social Security
This is easy to do. As we see in planks 3 and 4, funding SS as it was intended will be quite doable, with additional help by easing of government costs resulting from many of the other planks. Further, plank 8 gives employees of corporations a built-in retirement program vastly superior to SS, and thus SS obligations now active would be come locked in or ‘grandfathered,’ but it would become a voluntary program at each new employment opportunity. Further, I would enforce the law regarding SS numbers and force the elimination of all electronic data and forms outside of the Social Security Office of said numbers. It has no place in credit reports and other records.
Plank Twenty One: Explore an alternative to Daylight Savings Time; Social Time
Our highways are clogged, unemployment is high, classrooms are crowded, stress is high. A long list of such social complaints can be offered. I propose a review of what I call Social Time, presented here in oversimplified explanation; a work day definition is cut to seven and a half hours paid, plus another hour for lunch and breaks, but the bulk of social infrastructure both private and governmental would be expanded from ‘a day’s work’ to a full 24 hour work cycle. That would mean, with broad participation (voluntary for the most part), that businesses and agencies would be open at all hours, which would dramatically reduce volume of client traffic at any given hour and spread it out somewhat evenly over the whole clock.
This would allow some reduction in manpower needs on an hourly basis, yet often provide new jobs to support the extra hours. As time progresses, the work day for an individual would start 90 minutes later each day, thus revolving everyone through all twenty-four hours over the space of just under a month — 14 times a year. We would not need to build more schools to reduce classroom crowding, or more transportation systems to handle population growth, etc. GNP and employment could only benefit, and make the country more competitive. Part and parcel of this idea is to END PART TIME EMPLOYMENT loopholes for employers who don’t want to offer benefits. EVERYONE GETS BENEFITS, but under the various planks outlined above, the cost to employers for benefits will decrease.
Plank Twenty Two: Establish True Redress and an Initiative Process
Whistleblowing shall not be punished. Lawsuits against government for violation of rights or constitutional violations shall be funded by government. In balance, should government win the case, the costs will fall back to the plaintiff. Any citizen can propose a law for consideration in a process similar to that found in several states, such as Oregon. If such proposed law meets constitutional tests, is written to legal requirements, well defined and stated, and can earn popular support (signatures of citizens who so support), it can be sent to Congress for debate and possible passage. In Oregon, the law goes to the ballot for vote by the people, as does all legislation proposed by State legislators. See next Plank on how this might play at a national level.
Plank Twenty Three: Review of possible Constitutional Change from Republic to Advocated Democracy
Especially where initiative process (prior plank) is in play, the use of the Internet could allow, with careful creation of safeguards as also addressed in earlier planks, a way to allow the people to vote on Bills rather than Congressmen. This would be an Advocated Democracy, where elected Representatives (the Republic style) would instead merely propose or debate initiative proposed laws. This would be broadcast and each citizen would then decide to vote for or against the legislation. No more pork barrel, no more bribed Senators, no more fat cats, no more buried language, no more end-run legislation. Just pure simple will of the people.
Plank Twenty Four: End Non Consensual Testing on unwitting subjects, and use of Political Control Technology (PCT)
Last but perhaps foremost in terms of being close to my heart. While current laws prohibit non consensual testing or use of weapons, drugs, and procedures on citizens, there are far too many loopholes which allow it to take place. In my books I cite countless examples, and as consultant I work with victims of it every day. Worse, the very agencies established for the purpose or which otherwise have authority to enforce such laws, are compromised by intent or by lack of training and resources, not to mention handicapped by their very belief structures. It is a sin that Police, for instance, automatically presume one crazy for hearing voices in their head when it is a known fact that CIA and Department of Defense has spend billions to develop technology which allows anyone to be targeted with such experiences, generally with the express purpose of discrediting the target by making them seem mentally imbalanced.
I’ve already proposed language for laws which properly address this topic, and submitted them in written testimony to the Massachusetts State Legislator when they were considering such a Bill. Currently, the military and CIA are developing new PCT faster than we can learn of it, generally under the guise of antiterrorism and funded through Homeland Security. It is a joke to presume that any of this technology can in any way prevent terrorism. It can only enable political control of the population, and nothing more.
- The Best: Tracking You and Your Family Just Got a Whole Lot Easier (whiskeyandgunpowder.com)
- How Roosevelt Sold Us to the Higher Bidder: the Federal Reserve (myvoice2012.wordpress.com)
Specifically addresses psychopathic individual stalkers,
but elements apply to organized or gang stalking as wellby H. Michael Sweeney, copyright © 2011, ProparanoidPress, all rights reserved edited from original versions in The Professional Paranoid and The Professional Paranoid Defensive Field Guide permissions to reproduce available on request to pppbooks at comcast (net) Dateline Portland, OR Sept 27, 2011
My Professional Paranoid series of (3) books are a kind of ‘how to’ in the realm of privacy and security issue problem solving. The key to solving a problem is, of course, knowing about it in the first place. Thus all my material includes how to detect the problem. Follows are the things everyone, and especially women, should know about stalking (which is one reason why, for simplicity’s sake, the steps are presented as if a woman is being stalked by a man). But stalking is definitely not limited to female victims or male stalkers. Ask David Letterman, which points additionally to the fact that stalking can be about something other than just sex.
Fame or circumstance can be the prime motivation for stalking, even circumstance as simple as cutting someone off on the freeway. They follow you home, and plot their campaign of insanity against you. And it is a plot, well thought out, and by someone typically of great intellect. For some reason, the psychopath tends to be a brilliant thinking in all respects but the most basic of logic paths associated with social reasoning.
Internet Stalking can also follow the model to a degree, but is commonly a bit harder to detect and significantly harder to deal with while it is a such a remote level, one typically anonymous to the nth degree. The danger is, of course, that the Web stalker may escalate at some point to a physical or real-World stalker.
From my books, with minimal editing:
A stalker will…
1 Study and learn to know the victim: observe and learn as much as possible before planning the attack.
So be alert, be inconsistent! Observe those at the periphery of your daily doings and keep watch for repeat presence, especially if overly interested in your activities. Try not to establish patterns, and whenever possible, go out of your way to change regular habits.
2 Make contact: find an excuse to get close enough for conversation, if possible, something irresistible to the victim (i.e., involving victim’s pet, hobby, project, etc.):
So end conversations with strangers quickly! Turn cold and hostile if polite excuses fail. If there is any further insistence of any kind, do not warn that you will call for help, DO IT! If needed, follow instructions in item five.
3 Lower victim’s defenses: be friendly and charming, control dialog.
So don’t let them get past step 2! End it! Be especially wary of very charming and flattering, talkative types.
4 Obligate and gain trust: endears himself to the victim, perhaps by some task or favor which indebts the victim, preferably an ongoing task which involves going with the victim to a more private place, such as carrying groceries.
Again, don’t let them get past step 2!
5 Isolate: isolate the victim using trust gained, always ready to counter possible objections by clever whimsy or logic. Seek a place where no one else can hear or see.
So run! Drop everything, scream, and run. Do whatever it takes to draw unwanted attention and then, to play safe, get witnesses contact information. Call Police.
6 Attack! In their mind, this may simply mean ‘romancing you,’ but no matter how gentle, it is an unwanted assault on your person. But many stalkers ‘loose it’ in the moment and violence ends up being the final expression of their feelings. So no matter how gentle it may start, it can quickly escalate to something else.
So defend yourself! Fight back to the best of your ability (hopefully improved with martial arts or weapon’s training). Remember, the perp will expect you to wilt with fear (or succumb to charm), perhaps to break into tears and become a human vegetable. Fight back fiercely, suddenly, and without warning, no holds barred, screaming and kicking all the way. Break windows, knock over furniture, honk horns, anything to draw attention. Do whatever it takes to be his worst nightmare.
7 Eliminate evidence: hide, take, or destroy all evidence, including the victim in worst case scenarios.
So observe everything! Note details about face, clothes, vehicles: get license numbers, scratch skin or pull hair in struggles (get DNA sample, mark them with scars), get a button from clothing, etc.
8 Escape: make good a retreat without detection.
So thwart escape (where safe)! If possible WITHOUT FURTHER CONFRONTATION, get witnesses, damage vehicle to make it stand out and need repair, inflict a wound that will require medical treatment or force a limp, bandage. REPORT THE CRIME. There is no guilt in being a victim, ever. If any law enforcement officer or medical staff member treats you with other than respect, immediately ask to speak to their supervisor and have someone else assigned, file an official complaint, and go public about that treatment, if necessary, to get that person fired or reprimanded. They have no business being in their line of work. You may even wish to consult a lawyer about a suit for emotional damages.
Anyone who feels they are being stalked should at the earliest opportunity to present useful information speak with Police. Useful information would be descriptions, time, place, witnesses, event details. In the absence of too many such informational elements, Police will not even be moved to file a report. The GOAL is to have a report filed, not to have the matter ended, because such information is rarely actual evidence nor is it condemning enough to warrant investigation or arrest.
But it MIGHT result in the deterrence of a Police interview of the suspect, and DOES result in documentation of the problem which, with continued reports, will build a case for stalking to the point where, hopefully, an arrest and prosecution can take place. Without such a history, a single report, even if involving violence, will not necessarily result in arrest. Police need a LOT of information and detail before they can act usefully.
It is also suggested that you email me for additional advice. I offer a free helps kit and two weeks of consulting which can make a big difference in how things progress, as well as the final outcome. Email proparanoid at comcast (net).
- You: Stalking victims failed by the law (guardian.co.uk)
- Dealing with a Stalker Your Own Personal Terrorist (socyberty.com)
- Profiling a Stalker (lachapelleinteriors.wordpress.com)
- System ‘lets down stalking victims’ (mirror.co.uk)
and Anonymous Targets
by H. Michael Sweeney,copyright © 2011, ProparanoidPress, all rights reserved permissions to reproduce by request to pppbooks at comcast (net) V is for Vendetta Dateline Portland, OR Sept 26, 2011
V is for Vendetta“We are Anonymous; V is for Vendetta” Anonymous, the hacker group, should perhaps be both feared and revered, depending on… POV
V is for Vendetta
Introduction… Who is Anonymous?
A shadowy freedom fighter using terrorist/assassin methods known only as ‘V‘ was originally the concept and character of DC Comics, in a comic book series which lasted for only ten issues in March of ’82 through May of ’89. Called V for Vendetta, it was written by Alan Moore and relied on the wonderful artwork of David Lloyd. V, as a character, described himself as Anonymous (the 1st, if you will). A viral hacker group has hence adopted the name, the mask and other graphical elements of the character, and elements of V’s tactical modus operandi (vendetta, for one) for their own use. And they seem all powerful thereby.
Not just the hacker group, Anonymous, but a much greater group of seeming millions of would-be revolutionaries (I include myself, of late) seeking to right things wrong with the World and its ‘System,’ who in all likelihood are at least sympathetic with the goals of the hackers, if not their methods. Anonymous is, after all, a symbol, an idea, and not merely a fictional character, or even a hacker group. It is something which has taken on its own living persona as a collective of human expression as much as any idealistic movement in history, intangible and shapeless, and yet indelible and impacting. In the sixties, it was the Peace Symbol and a raised pair of fingers to form a ‘V’ behind which we rallied. Today, it is a mask and a V within a circle, arguably, the circle of the peace symbol as it reflects the non violence philosophy embraced by Anonymous.
Certainly, a typical person is quite enamored with the romantic image of rogue defiance of injustice, a popular theme in art and life. But we many who take up the mask have no direct affiliation with Anonymous beyond such visages and ideals… have no such power or ability to take direct action against the system as hackers… and most lack the desire to risk the kind of bravado exhibited by Anonymous, and shrink at the notion of criminality required. The later determinations are highly personal, of course, and undoubtedly vary person to person, but we all share the dream with the hackers, all share the visual trappings. Thus we all may rightly claim, “We are legion. We are Anonymous.” It is a kind of Political statement, a slogan behind which to rally and taunt the enemy called the New World Order.
An unstated but important message to the System is, however, that this could change at any time. Should the system wax even more repressive or make one false move, it could easily find that the greater army of mask wearers would unite and act in ways resulting in an actual revolution of the kind which replaces governments. Such an army could grow manifold overnight, like a flash flood, in fact, because for everyone willing to adopt the Mask, there are likely 10 or even 100 who teeter on the edge of doing so, and even more who like the idea but simply think it is not appropriate for them at the time. All can change in an instant depending on the stimuli. The System should rightly fear and respect that possibility, and behave accordingly, and not transgress. That is the great logic and genius at work within the idea of Anonymous.
V is for Vendetta
Hollywood screenplay and distant history drive the movement
In 2006, a screen adaptation by Warner Bros was produced which has become a cult classic. As such, it became a kind of springboard for the ideas which led to the Hacker group and those who share their goals. The film is revered and promoted almost as if a recruitment tool by those fed up with the New World Order, Fascism, and corruption in government and corporate machines. There are several places where one can watch the movie on line if they do not mind endless popups and commercial interruptions. I refuse to recommend a specific site for this reason. Go buy or rent the film, it is well worth it. In the watching you will learn truths about America and much of the World which you may have overlooked if not yet awaken to the fact that you have been lied to consistently by media and government for decades. It can be a Sheeple eye opener.
The film reveals these things despite a setting in a future Great Britain, a nation by then an outright Police State. Interestingly, one bit of dialog sounds very much like a reverse of the Boston Tea Party in description, where goods from the U.S. are to be dumped into the London Harbor, and the American government is decried as corrupt and overbearing as was the King of England in 1776. The screenplay, by the way, was written by Larry and Andy Wachowski, better known for their stunning work in The Matrix series, which is perhaps why some popular Web depictions of V or related graphics such as the mask sometimes bear an uncanny ‘green’ resemblance to the tumbling Matrix symbols so frequently seen in those films.
V must wear a mask because of disfigurement, not unlike the Phantom of the Opera. And in many respects he is a bit superhuman because of non consensual genetic manipulations on prisoners by a foul government experiment gone terribly wrong. There is also a hint of his being mentally unhinged to a ‘useful degree’ as well, especially a fixation upon a particular date and a poetic line repeated in the film: “Remember, remember, the fifth of November, the gunpowder treason and plot. I know of no reason why the gunpowder treason should ever be forgot.” This is in turn based on a real historical plot on Nov. 5, 1605, to kill King James I and the full House of Parliament by blowing up the Bailey, a building of Parliament. It was called the gunpowder rebellion.
It was a foiled plot, undertaken by a lone revolutionary named Guy Fawkes, hoping to spark followers by his act. Like V, Fawkes was imprisoned and tortured, but unlike V, eventually executed. Actually, the plot was Jesuit orchestrated and tied to the fact that the government of England was at the time Protestant, and Queen Elizabeth I had been excommunicated, along with the rest of England’s non Catholics. This may be more than we need to know, but it is fascinating background, more so because V himself suffered horrifically on the same date (we know not exactly the future year), at which time he also manages to escape and be reborn as Anonymous. He then sets about establishing revenge for both himself and for Guy Fawkes… starting with blowing up the Bailey on the next available Nov. 5th he can manage.
This is followed by a subsequent invitation for the Sheeple to join with him on that same date one year hence — if they approve of and appreciate his efforts on their behalf. His efforts include much education on the lies and sins of their Fearless Leader, not to mention a lot of assassinations. As it happens, Anonymous is following a similar course of action, sans violence, as we shall see.
V is for Vendetta
Come now the NWO, and a real World version of V
The World depicted in the movie would seem to have come to pass in many respects in just four or five years since the film’s release. Some very specific events in the film are especially haunting to anyone who is fully informed on the criminal actions of the New World Order. No wonder then, perhaps, that someone should get the idea to reincarnate V in principle, theory, and in fact.
That would be, of course, the hacker group, which while rather small, appears to be globally based. Being a hacker is not conducive to making lots of friends and freely sharing risky ideas, especially when any use of such ideas means direct head-to-head confrontation with vast armies of sophisticated enemies — enemies who work tirelessly 24/7 and have an endless budget (e.g., government intelligence agencies). But the ideals expressed by V and Anonymous have indeed additionally infected millions of savvy Web users who have, for one reason or another, elected to employ the mask or some other symbol of V as their iconic avatar in various social media groups such as Facebook. Millions more take the mask into the street as political statement at protests, and thereby thwart FBI and Police cameras pending some abusive act to remove the mask by force.
They are everywhere, and even I am one who has elected such graphical trappings. It is not illegal, though repressive minds may move to make it so in their fear of an idea.
V is for Vendetta
A terrorist group with a Public Relations effort
Knowing the value of spreading the word, Anonymous seems fond of issuing videos to promote themselves. Like bin Laden videos, there are undoubtedly fakes claiming to be the real deal. But there are YouTube vids which promote and explain Anonymous which certainly seem to be created by them much in the same way as V employed himself in the film to educate the public and attempt to rally the people in support. Such works are compelling and intriguing, if not disturbing to watch. Out of fear the government or YouTube itself may eventually pull the works, I herewith outline one of the more key videos, detailing their hacking activities along the way:
V is for Vendetta
- It starts with a quotes from V “Each of us has our own path,” and adds “but we share the same goal: a Free Humanity.”
- A series of newscasts detail its hacking victories in Vendetta for government’s assault on WikiLeaks
- Hacks crashing VISA and MasterCard financial services in Vendetta for suspending WikiLeaks accounts
- Hacks of 51 government sites in Malaysia overnight in Vendetta for Internet censorship
- Hacks of HB Gary, a Federally contracted Web security firm in Vendetta for boasting it would catch Anonymous
- Hack of HB Gary posted thousands of confidential emails and forced resignation of their CEO
- Hacks of government Web sites in Egypt, Libya, and Tunisia during unrest there, literally powering the revolution
- Public statement “We are Anonymous. We are Legion, We do not forgive, We do not forget. Expect us.”
- They threaten attacks in Vendetta for mistreatment of Bradley Manning (WikiLeaks source of DOD documents)
- A news commentary describing Anonymous as ‘a new way to fight back… direct peaceful resistance.’
- Quotes from John Kennedy regarding undue intrusion by government into privacy and censorship
- A statement purpose for non violent restoration of the rule of law and fight the organized criminal class
- A PBS interview describing Anonymous methods as highly democratic in deciding what targets to hit, and why
- A quote from Sun Tzu’s Art of War, “Supreme excellence consists in breaking the enemy’s resistance without fighting.”
- A long list of Cabalistic NWO entities and projects (e.g., HAARP, Controlled Media, Globalist Groups) as enemy
- A Russian TV news clip warning all that governments can do to stop them is shut down the Internet
- … and the advice that when that happens, the people will rise up to shut down the government
- Closing quotes, “The resistance has begun,” and an introduction of a plan similar to V’s own…
V is for Vendetta
A Plan is hatched and you’re invited to play a role
That year began June 15th and features it’s own Web site (whatistheplan.forumotion.com) where all who wish to participate may do so more actively as an actual member of, presumably, Anonymous. Going there, you are redirected (http://www.whatis-theplan.org/). Though considered an expert in privacy/security, I do not claim to be an expert in Web security. Yet I do know the redirect does not appear to offer anonymity and thus joining as invited may not be wise without additional precautions.
There are ways to visit ‘anonymously,’ such as afforded by first going to (natch) an anonymous surfing resource such as (natch) anonymous.org. Once using their free service, your Web activities cannot be tracked by the activities themselves. You can then only be tracked by having already been put under a full surveillance net. But the site clearly states that hacking and other illegal activities are not to be discussed, and thus one might be moved to presume that as long as they merely put about and keep their nose clean, they could care less that Big Brother is watching. Yet, under the Patriot Act, one cannot depend on government failing to define the act of registering at this site as ‘supporting terrorists’ in some way. Fascists love to persecute the soft targets of the unsuspecting as form of building their personal power within the system.
Else why would they murder poor Troy Davis? This one matter, alone, would drive me to consider being an Anonymous hacker, had I the skills. That is the power of a Martyr, it moves people to act and becomes its own backlash.
Regardless of the dangers in open surfing, I will myself join and report further as my opinion is molded by the experience. I’ve done battle with the FBI and the other agencies already, and I suspect they will not wish to target me further for reasons not useful to this article, though such detail might enamor the reader to me and result in more book sales. Relax — I’ll not abuse the reader thus.
Anonymous advises: “It is time we start becoming our own legends… If you feel something inside you pushing you toward acting on the plan… (join us.)” They describe a three phase plan. Phase II starts five months (November), they say, but neither it nor phase III are described. CBS is reporting they plan to shut Facebook down on Guy Fowkes day, as it is known in England (I would be happy to endure such an attack if it resulted in Facebook decoupling itself from the intelligence community — see my post on FascistBook) as described in a related article listed at page bottom, here.
Anonymous continues in exactly the strategic manner of V; “So if you see nothing, if the crimes of governments remain unknown to you, then we would suggest you allow this year to pass unmarked. But if you see what we see and you feel as we feel, and you would seek as we seek, then you too, are Anonymous. Stand beside us this year as we execute the plan, and together we shall give them a year which shall never be forgot. We are anonymous, united as one, divided by zero.”
If finally ends with one of the closing lines of the film, “Beneath this Mask… there is no flesh. Beneath this Mask is… an idea,” for which the punch line is, to underscore, “...and ideas are bullet proof.” That is true. You can kill a man for expressing an idea, but having had listeners, the idea lingers on long after his passing. Indeed, it is amplified in his martyrdom. That is one reason the Pen of Truth is mightier than the Sword of Lies. And when the one wielding the Pen is Anonymous, the Sword has nowhere to swing usefully, and it instead lashes forth in recklessly to cause collateral damage, and making martyrs of all in its path.
That speeds its undoing, for at noting the carnage, those nearby take warning, and consider the idea with more interest and, almost always, adopt it, and being quickly educated to the truth, and seeking to overpower the sword’s obvious evil. That is what Anonymous seeks to do. Unite us behind one idea… the idea that the day of tyrants and thieves in government is over. The New World Order is self-rendered as obsolete by their own greed, wanton murder, and their lashing out. They will extinguish themselves with just a little Anonymous help.
Are you that help?
V is for Vendetta
Target rich environment
I’d hate to be Anonymous and faced with trying to set priorities among all the possible deserving targets guilty of tyranny. They already have their own list of course, and I find it interesting (and appropriate) that amongst their list is the quasi-religious cult, Scientology, which has been linked to CIA and mind control projects in my research. But the problem of choosing targets as faced by a hacker group is just as huge for any legal form of targeting by activism, protest, or media efforts. My book, The Professional Paranoid Defensive Field Guide list over 1,000 CIA fronts, half of which have engaged in illegal mind control projects or other criminal enterprise, such as drug smuggling, illegal weapons sales, etc. It also has page after page listing illegal non consensual bioweapon and similar experiments on unwitting Americans, some not terribly dissimilar from those inflicted upon V as Guinea Pig.
My book set Fatal Rebirth details the truth behind decades of dark news events which dot the American historical landscape from 1947 forward, to include Sept. 11, which it predicted. I’ve personally gone head-to-head with a lot of these people and might reasonably and rightly claim I owe a Vendetta, for the personal cost has been high. But it is not about me. It is about the crimes against countless others, and whole nations, races, and classes of people. Why? Because the NWO is at its heart Satanic and thus hates all who have faith. Because the NWO is at its heart racist and hates non whites. Because the NWO at its heart is greed driven and hates any competition for ownership of each existent dollar. Because the NWO is at its heart fascist and hates freedom. Because the NWO hates Free WIll and life itself, and seeks death for all who have it.
As consultant to countless victims of electronic weapons of Political Control Technology and organized stalking, I’ve encountered groups, organizations, and agencies deserving of targeting for the grievous suffering they have caused thousands. They have relentlessly destroyed individual lives with nightmares well beyond anything ever depicted in any documentary or commercial film, and which defy mere verbal description. As investigative writer, even more such criminal power brokers have been discovered. And, of course, there are the major criminal events of our time; false flag operations, fraudulent financial debacles and bail outs, behind the scenes deals. These events are exposed endlessly, and yet they continue on and on and on. Not all these people and groups can be touched in a direct way by Anonymous hacking, but they can be touched by you and me by our activism. Anonymous proposes that such activism is empowered by the use of their Mask and name. Thus far, I tend to agree.
In Fatal Rebirth I offer my own advice which, I suppose, could easily be adapted by an Anonymous group. It talks about who the enemy is, what the rules of engagement should be with a focus on nonviolent opportunities as well as what they should be in any eventual armed confrontation (revolution) forced by the other side. I would hope that it would deter at least one person for making a tragic mistake which results in loss of life. Other elements of my advice may serve to be a kind of challenge to Anonymous: the creation of an easy to use and spread… and quite ultimate encryption tool to allow completely safe Web communications without fear of prying government eyes even being aware of encryption. The basic design construct is laid out, and awaits only one talented person to create and distribute it. But of course, such is already illegal under Dracos law.
There is even advice in The Professional Paranoid on how to react when dealing with arrest and detention, interrogation, etc.
V is for Vendetta
Being Anonymous is not child’s play
So one should not casually join or support anonymous unless confident they may actually do so Anonymously or otherwise have in place some useful level of immunity from investigative reprisals. And there is one other thing: one must ask if a given Anonymous contact, either from the hacker group or the greater public body of mask wearers is the real deal, or if they are a government operative seeking entrapment.
Half the people in jail for ‘terrorism’ would never have considered doing anything criminal except for being duped into it, or worse, framed by agent provocateurs pretending to be terrorists themselves. You can earn $100,000 cash setting someone up for arrest, so entrapment has become ‘big business‘ among the low lifes so employed. You can bet governments will freely use such methods to trap actual hackers through their less savvy supporters, even if they have to threaten or actually prosecute innocents along the way. So if you are going to be Anonymous, don’t forget your mask, and don’t tell anyone you have it.
Me? I’ve already gone on record as having a mask (albeit mere artwork at the moment). So the FBI, CIA, DIA, NSA, HSA, and any other initial set may freely seek me out if they wish. Just know that my insurance policies still remain in place, and that there will be Vendetta of another sort should their hand (sword) be too heavily applied. They’ve already targeted me both intensively and randomly over the decades, sometimes devastatingly. But that was before I got the goods on some of their matters. Since then we’ve coexisted fairly peacefully in the same cyberspace. I don’t mind that they are in the woodwork, and they don’t mind that I talk about them. The Mask shouldn’t change things that much. Having dared to write this, I guess we will soon enough see.
Yet there is also safety in numbers. They can start lists of people who visit a Web site and register. They can make lists of people on the Internet to use Anonymous symbology and phraseology. They can make all the lists they wish, and add to them as many names as they wish, and what I wish, is that they do so, endlessly. Because the more names there are on the lists, and the more lists they have, the more meaningless and useless they become. We outnumber them millions to one. No matter how big their budgets, they cannot target us all for investigation and surveillance, much less arrest, prosecute, and jail us. And to attempt any of it detracts from their resources and abilities to go after Anonymous, the hackers. Thus there is only one possible way to logically end this article:
We are legion. Expect us.
V is for Vendetta
YouTube Vids of interest
- What We Are Capable OF – This is Anonymous!
- Message from Anonymous: FBI Arrests
- Anonymous vs FBI, Anonymous Wins (Russian TV)
- Scientology is Afraid of Anonymous
- Scientologists handing out fake Anonymous flyers
- How to Join Anonymous (not)
- Anonymous to take down Facebook on Guy Fawkes Day, who is Guy Fawkes? (cbsnews.com)
- How Time Warner Profits from the ‘Anonymous’ Hackers (newsfeed.time.com)
- FBI Arrests LulzSec and Anonymous Hackers (it.slashdot.org)
- ‘Anonymous’ hackers target BART, Fullerton police (latimesblogs.latimes.com)
Reveal Political Control Technology
by H. Michael Sweeney,copyright © 2011, ProparanoidPress, all rights reserved permissions to reproduce available on request to pppbooks at comcast (net) Dateline Portland, OR Sept 23, 2011
What is Templehof?
Some Facebook friends sent me a URL on an ongoing investigation they were involved in regarding the Templehof Airport, in Berlin. It is written in German but I’ve translated it for you, here. Templehof was the Cold War era airport used to combat the blockade of Berlin by Kruschev with an unprecedented (vid) continuous 24/7/365 airlift of food, medicine, and goods needed to keep the city alive and functioning. The airport, rebuilt by the Germans in the 1930s, was remodeled again in the Cold War years by the Americans, and that has become the source of a mystery involving Political Control Technology secrets… and more.
Though the runway portion is rather small and, like many, a simple slim rectangle… for some reason, the airport features a mammoth oval perimeter and a completely atypical and massive arcuate terminal building which, even in busy times, was more than needed. Not at all now that the airport is closed and ‘abandoned.’ Abandoned is an odd description given the high security perimeter fencing and human guard network surrounding the periphery of this airport, years after any military presence. This has raised the curiosity level of investigative authors Grazyna Fosar and Franz Bludorf.
Templehof Political Control Technology
Chasing after mysteries at Templehof
They wondered why so many people in the shadow of the airport have, over the last several decades, come down with the same unique and serious health problems, with new cases continuing to come from the area. We are talking about health problems associated with bombardment by RF energies of a type common to Political Control Technology. That is, psychotronic weapons known to have been employed during the late Cold War by both sides, and subsequently developed for portable use against individuals as well as groups on an ‘as needed basis.’ Other symptoms of such technology in play also exists at the site; a low frequency hum which seems to have no location or source, heard only by humans and not by recording machines. Ah, but they can be recorded as radio signals… traced to the closed base. Imagine that.
Their investigation revealed the existence of a large underground loop antenna for transmission of the ELF (Extremely Low Frequency) signals involved… frequencies which match the human brain’s own EEG signals. It is already proven that if you broadcast an EEG signal as a radio wave at energy levels greater than those of the mind, a human in the radio beam’s path will automatically adopt (be entrained to) those signals as if their own; remote mood control. All this is the stuff about which I write in my book, MC Realities (proparanoidpress.com).
My own research has included HAARP and an endless number of similar or related facilities World Wide as well as how they seemed tied to a phenomenon called the Norway Spiral seen and videoed in the skies by thousands of people. This strange event was said by some to be related to Project Bluebeam, a conspiracy intending, it is claimed, to fake the second coming of Christ in order to facilitate seating of the Antichrist. It’s a conspiracy pinned on the modern-day Illuminati, which is another way of saying Knights Templar.
Such spirals have actually been seen in three locations around the World (yellow ‘targets’ in the 1st image, above), but Norway was the one that got all the publicity. All bear a set of unique properties and relationships associated with the HAARP-like facilities, and it was my study of these relationships which revealed that a World-wide network of HAARPish sites exist in a way such that if Bluebeam is a real planned event… there is nowhere on Earth they can’t make you see whatever they want you to see. To underscore, more recently, crosses are appearing in the sky (vid1, vid2), and other apparitions which defy logic, such as two Suns (vid1, vid2, vid3), and giant jellyfish creatures (vid1, vid2). But I digress, and these prove nothing but that debunking is getting harder. And do watch out, there are a lot of debunkable things out there.
Templehof Political Control Technology
Templehof, playground of the Knights Templar
Looking at the Templehof matter, the first thing I find of interest is its history. Temple means ‘temple,’ which is also what Templar means (of the Temple) and hof means ‘court’ or ‘palace.’ Templehof was in the centuries before Hitler a home to the Knights Templar, until Friday the 13th, 1307 when the Pope and the Crown Heads of Europe began to hunt them down for crimes not at all proper for the Pope’s own (hint: Satanism). This may be one reason why Hitler, as occultist supreme, elected to make it a key military base and frequently held massive ceremonies there. In my research, I attempt to show links between the Knights Templar and the Illuminati, the dark Satanic cult which sought the establishment of the New World Order, a one-World government ruled by the Antichrist. They coined the word, and they laid out the plan still seen in force today in the New World Order movement, all detailed in my book.
Templar treasure has always been of mythical proportions, but based in truth. They held more wealth than the Crowned Heads, and were generally the money lenders of their day. It is reasonable to assume that as a Templar Hof, there would have been tunnels and secret underground chambers. Thanks to excellent accounts, we know that there were massive, multi-level tunnels beneath Templehof Airport at the end of WWII which had likely been constructed prior to the War or during, perhaps enlarged from ancient digs.
They were so extensive that they ran to distant parts of the airfield as well as the local Police station. When the U.S. took control, a security lid was put on Templehof and the tunnels. Any upgrades for installation of electronics were likely undertaken in the mid 1950’s when the U.S. discovered that Soviets were beaming electronic weapons at our embassies, and we officially but secretly entered into a psychotronic weapons race, as detailed in my book.
Templehof Political Control Technology
Radar synonymous with HAARP and Political Control Technology
But the second thing that I noticed was technical, catching my eye for several reasons associated with my earlier study of HAARP-like sites. The unusual terminal shape reminded me of a particular complex located in China in several details. Both form an arc-like structure which could be employed as a giant radar dish, similar to those of the DEW Line and Soviet counterparts during the Cold War era, albeit enclosed in concrete and glass, and not perhaps as tall… both being much, much wider, and both with a more pronounced degree of arc. Understand that all HAARP-like facilities employ multiple forms of radar systems along with their ELF and VLF radio antenna arrays. At Templehof, it would have been relatively easy to incorporate structural elements of a radar ‘wall’ (image left) as part of the existing facade.
But that does not mean it was used as a conventional radar system. Such would blast the planes and workers at the airport with intense and dangerous radar waves. But it could easily be a receiver designed to amplify the traditional radar systems present. If one draws a line (thin white line in my image) bisecting the center of the Templehof arc and plots it on Google Earth, it can be extended to see the ‘line of sight’ such a dish might have. Extension reveals a precise bisect within a few degrees of arc with the Cold War military airfields at Prerov in Czech Republic, Cheshnegirovo in Bulgaria, and Neisse Malxetal in Soviet occupied Germany. If one widens the arc additional military fields would be inclusive. Further, there were undoubtedly many mobile and fixed missile launch points within the same zones. Such a viewing angle represents an overlook of what might be described as the ‘front line’ of Soviet offensive launch capabilities against European targets. Prerov faces Italy. Cheshnegirovo for France, and the German bases are closest to Great Britain.
The similar radar structure located in China, on the other hand, is aimed at Australia. In its lookdown path we find several HAARP-like arrays in Australia including the American operated HOLT system for communicating with submarines, a site which, by the way, incorporates ‘sacred geometry’ favored by the Templars and Illuminati (the two groups are related). Thus the Chinese site seems to be a listening post of sorts, but the construct is quite similar to Templehof, and HAARPish elements are nearby.
Embedded within an underground portion at the site, I believe, there is the functional equivalent of a giant Yagi style di-pole antenna which serves to amplify signals within a focused narrow aim. There are visual clues that a huge buried Yagi exists both in China as well as Templehof. And we will find them elsewhere, too…
Thus in my opinion, if investigators were to go back to Templehof, they might find evidence of an underground placement of a Yagi system running all the way to the Viktoriapark monument, which is likely the actual base of any such antenna element. The distance of any Yagi at Templehof would seem shorter than found in China, but the Chinese system, located at 40∞30’37.90″ N 93∞14’12.03″ E is not as large. I propose the smaller Chinese radar profile requires a longer Yagi to compensate. While this can easily be deemed nothing more than conjecture, I remain confident in the principles applied.
Templehof Political Control Technology
How Deep is the Rabbit Hole?
I have an extensive Google Earth.kmz file available which plots all known HAARP-like facilities World Wide (their number is far more than anyone has suspected). An example at page top comes from my YouTube videos on the Norway Spiral — I suggest you start with part 4 if wishing to review. The .kmz may be useful to anyone wishing to conduct further research or cross check my investigative effort. Among that dataset are two sites in the U.S. which relate in their own way to both Templehof and the symptoms shared by victims of electronic PCT in various parts of the World. In terms many Americans might understand, I speak not just of the health issues, but of an additional symptom known as the Taos Hum (and there is the Oregon Hum, etc., etc., etc., a list dozens of places long and World wide), long a mystery thought to be a government mind control conspiracy. Indeed…
One of the unusual sites is in Huachuca, N.M. There a particular Radar is associated with a very unusual HAARP-like array (below). It also exhibits evidence of an underground loop such as found in Templehof as well as of five underground Yagi (faint thin whit lines locate them for you, image right) arranged in parallel and aligned in the same direction, one of which is longer than the others and appears more recently buried.
Moreover, the alignment of these is also in alignment with the actual array, which unlike all prior arrays, seems to involve enclosed antenna structures laid out in a repeating geometric pattern with diminishing dimensions (see image). This, too, achieves a bit of a Yagi type of directional amplification, as I understand it. It establishes a wave guide, or sorts, with a building intensity as the signal is emited… in one direction.
While the direction of aim of the array and the Yagi are the same and generally toward Taos, N.M., it does not provide a precise ‘hit.’ That’s O.K., because it does hit in the desert area near TAOS where the hum is most often reported. But that is not all. There is in Colorado a second HAARP-like system at Plateville with radar dishes of its own, and they have a fixed angular focus which, according to official information (image) overlaps the Huachuca signal at only one place… the Desert area near Taos. There is no apparent evidence of a possible Yagi or Loop, but that does not mean they do not exist.
With that discovery, I rest my case that,
a) Templehof, China, and Huachuca, likely with aid from Plateville, all do much the same thing, which is;
b) x’mit Political Control Technology signals, and/or;
c) watch or listen in on potential foe activity; and
d) employ a combination of underground loops and Yagi systems with above ground radar and (often) HAARP-like ELF/VLF arrays; and
e) the entire history of Templehof, the NWO movement, and Political Control Technology share one prime motivating factor… the Templars; and of
f) The Military
But by no means does that prove a conspiracy… and in fact there are no doubt some actual useful purposes not associated with PCT for sites such as Plateville. But that kind of alternative use, be it a cover story or genuine, is NOT why it does not prove a conspiracy. No. It is because no matter how hard you try, no one is going to believe in the boogyman until they personally fall victim. For you, not today, I hope. Me? Been there, done that. Indeed, I believe.
by H. Michael Sweeney, copyright © 2011, ProparanoidPress, all rights reserved permissions to reproduce available on request to pppbooks at comcast (net) fascism
Read the Introduction (part I), here.
Read part III (Axioms as to the Middle Class), here.
Fascism is the expression of the 1776 Illuminati Plan…
to establish the New World Order (they invented the term)…
a World with one Fascist police-state government…
with one supreme World leader…
who would be the Antichrist…
and lead us to the ultimate End Game…
at a place called Armageddon
The 33 Axioms:
As to the Lower Classes (cont.):
23) The lower class must be forced to rely upon societal infrastructure as a means of control by dependency
Yet these must not truly meet their needs to ensure they remain dependant. Health care/insurance programs, financial aids, worker protections and aids, the legal system, and welfare programs must suppress a desire and limit the actual ability to better one’s self by bootstrap and good work ethic by offering just enough to ‘make do without any further effort.’ This better insures they will prefer not to revolt or drop out of the system out of fear of ‘loosing key resources.’
24) The lower classes should not be allowed to long hold the same job
This not only lightens corporate obligations with respect to the cost of retirement programs, but it allows for profiteering by support industries such as firms providing Health Insurance who get to keep enrolling them over and over, but have no obligation for many months pending ‘qualification’ delays. Each new job denies one access to such services for a number of months, and makes everyone more profitable. Pensions no longer become a long term problem. Moreover, it teaches the worker they have insufficient worth and ability, and should not be striving to better themselves, but should instead accept their lot and life and move on as best they can.
25) Activists, protesters, and ‘do gooders’ should be covertly targeted to neutralize or destroy them and their effectiveness
Depending on their cause and their effectiveness, this could be something as simple as a black list or constant harassment by Police, or it could be as sophisticated as the hi-tech methods described in Axiom 30, below. There are, of course, also endless dirty tricks. Try this on for size. Out of ten activists with children polled, seven state they have had Child Welfare called into play, resulting in very difficult times and expense, and becoming a matter that must be revisited endlessly. So what is it about activism that sponsors them to mistreat their children? Nothing of course, but an anonymous phone call. Likewise, a large percentage of activists are finding themselves being portrayed behind their backs as pedophiles, or persons under investigation for (something nasty).
26) Expendable, gullible, and obedient fools can always be recruited and exploited
They will come from that portion of the lower classes who might naturally care nothing for humanity, morals, or God, and can thus be encouraged to serve Fascist needs by promising them a small portion of power or wealth. These are the dogs that eat the crumbs of their Master and relish barking and gnashing at whatever target they are given. They are psychopaths and are quite expendable. They are well fed as long as they perform perfectly and obediently, but at any time it may amuse those holding their reigns to double cross them and let them suffer for their crimes. Amen.
As to the manner of thinking:
27) Fascism prefers bold audacity and daring, which will achieve much through dependence on public disbelief and apathy
The more impossible it seems to be, the easier it will be to get away with it. The role of media and education in dumbing down the population will ready them for tactics which allow magic bullet explanations to seem plausible. Distractions with bigger news stories, pornography and entertainment fluff and gossip, making matters as complex as possible so as to seem beyond grasp, and hammering them with the same story endlessly hours at a time will insure apathy and lack of interest. The use of constantly moving graphics, multiple talking heads, scrolling text bars, and other visual distractions will assure that only the desired sound bites get through. Ad to the mix a group of talking head shows purporting to be investigative or commentary in nature but which are really political thought assassination machines using loud voices and decisive, argumentative styles designed to block any undesired message.
28) A primary enemy, villain, war, terrorism, or cause must be created upon which all social problems and ills can be blamed
This will provide a motivation for uniting the people under the Fascist leadership in the name of common good or defense. A false flag operation is the easiest means to villainize a target group. Thereby the government need not actually address problems in any useful direct way, and instead blame external forces. The anger toward their lot in life is directed not at the source (government), but at an imaginary cause. It is the perfect framework for getting away with reduction in rights, privacy, and enabling other Draconian actions such as the Patriot Acts, and government spy agency partnering with social media.
29) Fascism makes victims responsible for their own plight, and to pay for their own victimization
Especially useful where the victim is targeted and victimized by the government. The tactic enables wrongdoing in the name of good and complicates all efforts in the name of good, that apathy may rule men’s hearts. It must make logic seem illogical, and nonsense seem logical. It is psychological manipulation. Thus the victim of a crime must feel they may have been doing something wrong and must be made to question their motives. This reduces their fervor for justice and renders them docile. A fine or a tax can offset the cost of targeting, or they might be offered commercial treatment or prescribed drugs which return profits to the corporations.
30) Fascism relies upon Political Control Technologies as ‘humane alternatives’ to the gun
In modern times, the use of ‘non lethal’ weapons over more traditional law enforcement techniques is pushed at every opportunity. New PCT must be continually researched and made available for covert application outside of law enforcement, to include electronic weapons for surreptitious targeting of politically incorrect persons. Advanced methodology in gang stalking, microwave weapons, bio implants, voice-to-skull, and other technology will allow such persons to be made to seem mentally ill and cause them to be ignored when they attempt to make an argument for their case or cause.
31) Fascism seeks to demonize, neutralize, and homogenize mainstream religion by association with cults and violence
This may require establishing such cults using psychological indoctrination (mind control) methods, or infiltrating existing cults with manipulative agent provocateurs, to insure that they eventually make the news in some unsavory way, such as Jonestown, Heaven’s Gate, and Koresh. Simultaneously, division and hatred between mainstream religions must be fostered to insure that Jews, Christians, and Muslims will never realize they all worship the same God of Abraham, and unite against the Satanic underpinnings of Fascist goals. And also simultaneous, an attempt at creating an acceptable unified, all-faith, religion acceptable to and obedient to the State should be sought.
32) Fascists are racist by nature as a rule, and thus will at all times seek ways to oppress and destroy any race but the white
Overpopulation of the planet is a concern for which action must be taken at both ends of the problem. Birth rates must decline, and death rates must increase. The target population of one-half billion just happens not to include too many people who are not Caucasians. Thus race-specific pathogens should be sought, such as Avian Flu for the Asians, HIV for the Blacks, Hanta Virus for Native Americans, and Swine Flu for Hispanics, all of which are man-made variants of animal virus’ altered to impact humans in ways which defy good treatment. Of course, these are only prototypes for testing purposes. The real killers are yet to be released.
33) Fascism believes in might is right, the ends justify the means
Nothing more need be added to that.
by H. Michael Sweeney, copyright © 2011, ProparanoidPress, all rights reserved permissions to reproduce available on request to pppbooks at comcast (net)
Read the Introduction (part I), here.
Read part II (Axioms as to the General Nature), here.
Fascism is not a body Politik…
it is a perverted notion of greed.
Fascism is not an openly Socialist agenda…
it is socialist to foster a covert agenda.
Fascism is not a way to run a nation as a state…
it is a way to ruin a nation by making it a corporate state.
The 33 Axioms:
As to the Power Elite:
13) Recruitment to the inner sanctum of high power is according to simple rules.
The inductee will generally be: a) from one of the select old-money families; b) cultivated and tested in the educational system for right thinking; c) proven as follower and leader true to the cause prior to anointing with higher power; d) a member of one or more secret organizations; e) most likely, a Satanist or practitioner of the occult, but seldom a Christian except in masquerade. If you happen to be a General, so much the better.
Hitler’s secret society was the Thule Society, thought to be the arc-type and ‘sister’ to Skull and Bones, and he was obsessed with the Occult. Mussolini actually hated secret societies and passed laws against them, though the Mafia flourished against his efforts, as did the Knights of Malta, and the Masonic Lodges. When Italy fell to the Ally invasion, he was arrested and held in a secret location, in part, to keep the Germans and Italian loyalists from rescuing him. His rescuers used magical Occult methods to locate him, only to find he had been relocated. Eventually, as the photo (right) gruesomely attests, he was released to the angry mobs. Under Franco, the secretive Opus Dei (propelled into fame by The DaVinci Code) flourished, and though Franco was key in the Spanish Revolution against atrocities against Church leaders, there seem to be no concrete ties to Franco, per se, though he put a lot of their members into government posts. Franco dabbled in Occult ‘magic,’ even using it to determine the fate of his people, one such effort costing 2oo,000 lives to starvation.
14) Fascism will gladly offer multiple candidate choices to the people in elections to at least simulate political freedom of choice.
Each candidate is one of their own in disguise, almost always, baring unforseen roadblocks. Thus policy of secret government can advance regardless of outcome, it is just a matter of who enjoys holding the reigns and taking the glory (or blame). All are disposable, or recycled to other positions of power. The more debate and controversy which can be managed on unimportant issues (with respect to true goals) the more the people are divided for easy control, and the more they feel they have an impact, false though the assumption be. Political Parties are organizational tools for individuals in the process, and in the end have little functional power in terms of final impact to the things they profess to seek.
Personal note: How many Presidents have advanced more than one of the causes for which the people voted them into office? How many woes which they promised to address were actually retained or made worse as result? How many Presidents have left the country in better shape, and the citizens happier, when they left office? Have the corporations and the war machine gotten bigger under their helm, or smaller? Did the rich get richer by their actions, and at the expense of everyone else, or did we get the shaft, again? Have freedoms grown or been reduced on their watch? Has life grown closer to or gone away from a Police State by their hand? How many hands will it take you to count them? My guess is part of one, at best.
One last question. Why do still you buy into it?
15) Fascists will cull the unworthy from the ranks of the wealthy, seeking to discover and destroy by any means those who do not support the fascist view.
Their corporations, wealth, power and their heirs will be taken (Dupont, Hughes come to mind, Kennedys a work in progress) away by manipulations of government, machinations of corporations, and manipulation of public opinion via media. Assassinations, accidents, and other crimes are on the table. You will read more on this in the next Axiom.
16) Laws and regulations need not apply equally, but may be reserved for targeting the the unworthy or enemies of the cause, and benefiting the Elite.
Victims will never understand what hit them, nor will they easily escape the series of traps set for them. Hughes TWA Airlines was targeted with anti-trust and cries of unpatriotic profiteering when in point of fact Pan Am was the more powerful monopoly, but Pan Am Airway’s Juan Trippe was ‘in’ with powerful allies in Congress and Hughes was not. Stripped of his industries, he waxed toward insanity as CIA made off with the Hughes Medical Institute, Hughes Tools (later become Enron – yes, a CIA fraud, and so now you know where the money went, made clear on Sept. 11), Hughes Electronics (source of bioimplant tracking devices – Digital Angel), which also spun off Hughes Satellites (which track people via Digital Angel), Hughes Aircraft and his Spruce Goose, as well as parts of TWA (CIA’s Evergreen Aviation, et. al), and Hughes Marine (ship building) and their Glomar Explorer, a CIA spy ship with deep sea research capabilities used to steal sunken Soviet nukes (that’s my finding). All these resources covertly work in tandem to advance NWO agenda more than any legitimate use for National Security. All this and more is detailed in my book set, Fatal Rebirth.
Note: I lecture on the class of technology which is Digital Angel. CIA does not appreciate what I say about the many CIA fronts involved in this project. Unfortunately, the video (link) does not contain my full lecture on topic, but it will still scare you.
As for the Middle Class:
17) The middle class bears the burden of providing the bulk of fascism’s cash flow, through consumerism, credit extension, and taxes
All commerce must cater to, advertise to, and sell to their needs, providing them with any frivolous reason as to why they have such a need. They should ideally go into debt at every turn, for debt is control, and a weapon to corral the errant. Product should have a short shelf life and need upgrades, repair, or replacement. Repair and replacement parts should ideally cost more than buying a new one. (ergo, Ink costs more than the printer). warranties should sound great but have many loopholes, or poor enforcement mechanism, and place the burden on the Dealer to rectify. Everything should have a tax, even one’s death. Thus they may be promoted and should be stolen away that they may spend their wages back with the corporations, less taxes, of course. Being stolen, they will create the same benefits for the corporations by ‘their loss’ as described in Axiom 24, regarding the Lower Class.
18) The principal means of control of the middle class is a manipulated media, (disinformation or mind control) – advertising, news, and entertainment
There should be as few owners as possible of mainstream media outlets. Where possible the military or intelligence communities should be involved in one way or another (when Flight 800 was shot down by a Navy missile during a War Game, all three major networks were owned by military contractors who had contracts with the Navy for missile components – and CIA has regularly maintained an army of thousands of agents in the employ of U.S. media, and even established their own news agency, Reuters).
19) The middle class may be encouraged and allowed to ascend the ladder towards the Elite only as long as there are numerous mechanisms in place which to stop the bulk of such efforts
A few may illustrate usefulness to the cause and may be allowed to ascend undaunted. All others will suffer organized destruction when the opportunity for looting their wealth is at zenith. The test as to if one might be allowed to continue or not is in the form of being approached for recruitment to an organization useful to the cause. It may be, for example, membership in the Council on Foreign Relations. There, they can be tested constantly for ‘right thinking,’ and better manipulated into position for a fall should that be the final decision.
Personal note: This was exactly what happened to me (here I go with sour grapes). I opened a computer store in 1978 at a time when experts were saying you needed a minimum of $100,000 to succeed. I had $10,000. I not only succeeded, but opened two more stores on internal cash flow alone in as many years, never once borrowing money from a bank. I catered million dollar deals selling the lowly Apple II, and lunched with Jobs and Gates once at the same time. So someone from the CFR approached me and gave me a general pitch on their Globalist agenda (a sanitized version, but clearly NWO in tone), and invited me to join, SPECIFICALLY stating that it would be ‘good for business.’ I declined.
Within six months I had lost two million dollar deals to blind siding, and a series of setbacks seemed to be engineered by the same handful of people whom I had before been able to trust. Even my employees were concerned that our phones seemed tapped, and someone was regularly stealing product and our advertising external of the store. These things cascaded to the point where I was barely able to stay afloat. We managed, but in the end, the Shake Out period for the fledgling computer industry began, and I saw the handwriting on the wall, and shut down gracefully: I had had no more than two competitors for five years. That next phone book had over 100 new stores. I was right, within two years EVERY store in the area but mine went bankrupt. Me? I had liquidated my entire inventory at full retail and came out like a skunk, and lived on that money for about five years while trying to break into writing. Lucky for you, eh?
All that bad luck earlier was mere coincidences, I was sure… but later I ran into a woman who gave me a very detailed story about a ‘secret CFR within CFR’ (shades of Three Days of the Condor and a secret CIA within CIA, as shown in my books to be true) which held corporate tribunals to decide what businesses succeeded and failed, and operated hit squads who used dirty tricks and intelligence community assets to arrange the desired outcomes. Of course, Members had to pay huge fees off the books to fund such dealings. I did not believe her, until she showed me a bag of checks she collected every Month. She was a courier for same.
As to the lower class:
Note: for the sake of dialog, the Poor, or Under Class are one and the same as the Lower Class. Indeed, the later will become the former in time, but they will be considered and dealt with in like manner regardless of their status, except that the underclass tend to ‘drop off the radar’ in many respects, since no one wants to be confronted by their presence, and prefers to put them out of mind unless it be to blame them for society’s ills. That, as it happens, is a favorite Fascist ploy (blame the victim, blame someone incapable of fighting back, make them a scapegoat, rally all to your agenda thereby). Even the Lower Class will shun the poor given an opportunity. Seems like you have to be a ‘do gooder’ to break that mold, and who wants to go to all that trouble? Just a few people with strong Christian beliefs, and some other nuts.
20) Fascism is built on the ceaseless toil of the lower classes, who must be intimidated with repressive police-state powers
In Communism that meant working for beans and standing in line for your ration of beans, but the Party Boss got Steak. In Capitalism it means working for beans, paying taxes on the beans, and spending all you have on some beans, so the Big Boys can eat Steak. In either system and points in between, as the wealthy gain power and wealth (1% of the population now controls 90% of the wealth of the nation) , the Middle Class becomes Lower Class, and Lower Class becomes disgruntled. Well, there will be an Anser for that, too. That is NOT a typo – read on. A portion of Police and military should be recruited or trained for unthinking violence with psychopathic cruelty, but such should seldom be allowed promotion to high ranks, for they are merely a weapon of control through repression.
Ergo, riots and protests must be handled with a heavy hand: invent ‘non lethal weapons’ by the score, hire more police and build more jails, write repressive laws which make everyone guilty of something, and rely on naturally occurring Police brutality to make the point. Of course, the military is always there in backup and able to do their part (e.g., Kent State). This is why we have the Anser Institute, to invent Homeland Security two year before the Sept. 11 attacks, to help prepare the Patriot Act(s) so they will be ready for signing right away after the attacks, and to use the fear generated by the attacks to justify spending money on HUNDREDS of ‘non lethal weapons’ to ‘fight terrorism,’ which just happen to only be useful in crowd control against civilians. Circle complete.
21) The principal means of control of the lower classes is poverty, enforced by the legal system and Law Enforcement Agencies
Laws must at least seem fair most of the time, but the courts need not be. Everything must have a fine, a penalty, and a judgement too high to well bear. Despite what you are told, you are presumed guilty and all effort made to make it so, even if needing to lie or fabricate evidence, and though you are told otherwise when you hire your lawyer, you are urged to plead guilty as the least dangerous route when it comes time to go to court. Thus a fully informed jury is seldom seen though it is every man’s right (allows juries to find one guilty as charged but decide they should not be punished because the jurors identify with the reasons behind the act). So why do lawyers not advise their clients and request it? Thus the poor cower lest the law be levied against them. They dare not draw attention to themselves lest the little they have be eaten up by the courts.
22) The lower class is allowed to at least believe they may ascend to the middle class provided there are numerous mechanisms in place which will defeat them
A few may illustrate usefulness to the cause and may be allowed to ascend undaunted. All others will suffer organized destruction when the opportunity for looting their wealth is at zenith. The test as to if one might be allowed to continue or not is in the form of being approached for recruitment to an organization useful to the cause. It may be, for example, membership in the Council on Foreign Relations. There, they can be tested constantly for ‘right thinking,’ and better manipulated into position for a fall should that be the final decision. See my earlier personal comment.
to be continued… Conclusion here.
- Centralizing America Thru Corporate Banking Power: Remembering Benito Mussolini, Adolph Hitler (politicalvelcraft.org)
- Fascism Today in the US and Beyond (robertlindsay.wordpress.com)
- Survival of the ‘Lowering Class’ (via NCPrism’s Blog) (southwerk.wordpress.com)
by H. Michael Sweeney, copyright © 2011, ProparanoidPress, all rights reserved permissions to reproduce available on request to pppbooks at comcast (net)
Originally from The ProParanoid Newsletter
Dateline Portland OR July 25 2011
‘The limits of tyrants are prescribed by the endurance of those whom they oppress.’ Journalist Frederick Douglas, 1857
Note: The 33 Axioms of Fascism, updated from the original in the Proparanoid Newsletter. It is rather a large document for a blog page, and thus is split into four parts. This page is merely the introduction and explanation, quite key to understanding. The actual axioms will be contained in a three-part blog series of add-ons. Please subscribe to this blog to be notified when they are posted.
In this article we will learn about Fascism:
- From whence it comes and what it is
- That it has a plan and specific role for YOU (no matter your station in life)
- That it is alive and well in YOUR government (any government)
- That it and the Illuminati share the same goals (establishing a New World Order)
- How it works to reach those goals
Fascism is a term not understood by most modern-day Americans, but some do have a grasp on the dark aspects of the New World Order and are relatively certain they do not like what these things represent. Many view Fascism as some dark and vile thing destroyed in the WWII era along with Adolph Hitler and the Axis powers. Sadly, people do not realize that fascism has been and continues to be an ongoing philosophy and driving force of our time, here in America, Europe, and elsewhere. Today fascism exists in almost every nation on earth, and does so secretly, by and large. We actively sought it, in fact, at the end of WW II, when the DOD began to import Nazi scientists and war criminals to continue their dark work here in the U.S.
But they are getting bolder. Neither do most people realize that Fascism and the New World Order are essentially one and the same, nor do they realize that the ties between the these things came about from the same secret societies which, at their core, can be shown to be worshipers of Satan. The most unique and key thing about fascism which most do not know is that it holds a special place for almost everyone – though few would want the place to which they are assigned against their natural will. The 33 Axioms will make that abundantly clear.
The sad truth is, hundreds of millions of people in any given nation are already in their unhappy places – put there by design more than by mere happenstance, and done in a way that they see only the happenstance as cause. My friend Rodney Atkinson, former advisor to the Ministry of Finance in the UK, makes that quite clear in his book, Europe’s Full Circle, which shows that almost all goals set by Hitler have been realized in the establishment of the European Union. That is essentially thanks to media control, one of the first goals/steps of the Illuminati plan to establish the NWO to dumb us down to what’s really happening to us. The unhappiness in their life is a testimony that fascism is alive and well here and abroad, and they don’t even know it.
One of the most popular pieces of writing I have ever produced was The 25 Rules of Disinformation. There have been a perhaps 20 million downloads of this file in just a few short years since first posting on the Internet. It has also been reposted to countless Web sites, many without giving proper credit, and incorporated into Journalism, Psychology, and Political Science courses at major universities. Serving as a handbook for both detecting and defeating disinformation in all of its various forms, it is ironic that the Department of Justice, CIA, and military have been among those constantly accessing the file – invariably along with my Web page on CIA’s sworn courtroom ‘confession’ to the JFK assassination. It seems that perhaps some government employees do understand their Oath, after all. Disinformation (outside of errors or misinformation) can only exist when there is a criminal conspiracy, and thus, discovery of the use of disinformation tactics is one of the most important clues that truth is not being served and a conspiracy exists around a given news event.
Another popular list was 400 CIA fronts, proprietaries, and influenced or infiltrated businesses, institutions, and organizations as published in my first book, The Professional Paranoid. This was subsequently published on the Federation of American Scientists Web site, and elsewhere. This list is actually a minor compilation captured from a mere handful of open sources and books, representing a tiny fraction of the names that might be compiled. I have since added over 600 more like it, and could easily amplify that number by some multiple. The most remarkable aspect of this list, which covers several decades, is that almost half of them (both the 400 and the 1,001 now listed) are related to Political Control Technology (PCT) — mind control. There IS a strong tie between mind control and fascism, as well as Satanism and the secret organizations from which they all sprang.
That is easily seen in another compilation from my newsletter which detailed over 250 PCT devices and terms in use by the United States Government and lesser groups (now 500, almost all of the new ones because of Homeland Security’s funding of ‘antiterrorism solutions’ which are nothing more than crowd control weapons). This issue of the newsletter is available FREE on email request to proparanoid at comcast (net), and includes patent, federal document, and other published references which vouch for its viability. The success and usefulness of these lists is clear, and so, I have also undertaken to define Fascism by similar means, creating for you, here, The Thirty-Three Axioms of Fascism.
This is perhaps a very logical extension of the earlier lists, which like the CIA mind control fronts, exist only because they are needed to support fascist aims. To start down this path they used fascist scientists and fascist technology illegally imported from a defeated Nazi Germany by CIA and the military — war criminals who were being sought for prosecution for war crimes in Nurnburg. This should tell us something about the validity of the notion that these Axioms apply to America, today. They do. It is hoped that The Thirty-Three Axioms of Fascism (and The New World Order) will prove to be just as valuable a handbook as the 25 Rules and just a valuable an indicator as the CIA Fronts and PCT items. All of these, by the way, can also be found in my latest prof. paranoid series book, The Professional Paranoid Defensive Field Guide.
But rather than fighting sporadic battles of disinformation or merely highlighting the nature of the beast, the Axioms go directly to the source of most such battles to define a greater evil – the root cause and author of the crime, the cover up, the disinformation, the conspiracy, or the reason and force behind a CIA front or the development of PCT, or the targeting of an individual by such forces and means. Guilt is quite the Albatross, isn’t it?
It is perhaps appropriate that the number 33 is the count. The number 33 is a particularly important number in the Masonic realm, from which fascism sprang. It is also a significant number to Satanic worshipers, which is the heart of the Masonic power structure. All are Satanic in origin, as shown in my book, MC Realities. Therefore, If you are an American reading this, I beg of you to carefully consider each and every axiom and compare it to the experiential knowledge of your family, friends, relatives, and coworkers. Many readers, especially those of minorities or the underclass, and those who have attempted to raise themselves up by their own bootstraps will see some clear explanations for their more unfortunate experiences. Life is a bitch, isn’t it?
There is not a single Axiom here which cannot be found at play within the government of The United States of America…
and, certainly, in the boardrooms of major corporations, institutions, and foundations. Indeed, those that rule government and these bodies are themselves often known to be members of the secret organizations which have their roots in a Satanic history, and all of which are unabashed New World Order proponents. The axioms are organized into four categories, but it will be seen that there is certainly overlap in application. Drugs, for example, are mentioned in one category but apply equally well in others, a matter obvious enough to forsake repetition in each instance. The four categories will show how each person has been considered carefully in the fascist version of government, business, and social paradigms.
The reader will undoubtedly find surprises, and perhaps some will have reluctance to accept a given axiom or component. I ask only that the reader make the comparison, and to especially compare our most current history, and ‘America’s New War’ on terrorism with the Nazi model of fascism. War is hell, isn’t it?
If that statement seems too harsh or controversial, I suggest you learn about prior knowledge of 911 events by the Bush administration and the cozy and incestuous relationships between Osama bin Laden and the terrorists with CIA, the Bush family, the military, and the military industrial complex — of which media has hardly mentioned though it is there in their archives and even as details in current reports for anyone to find, not to mention the curious role of 200 Israeli ‘art students’ quietly deported for spying on the 19 hijackers as they obtained countless helps from CIA and DOD along the way. That is documented in my book series, Fatal Rebirth, which predicted September 11 attacks and resulting wars, by the way.
As far as I am aware, two plus two still equals four, and not the six we are being told by government and media. I’ll leave you to check their math – unless they’ve already made up your minds for you, and you have no interest in the true facts. Math is fun, isn’t it?
end of introduction. Click here for part II, the actual Axioms.
- Rational Fascism by Michael Parenti (1997) (dandelionsalad.wordpress.com) Another not-so-distant review by an accredited author and lecturer
- Who coined the term Fascism (wiki.answers.com) A more historical accounting that may be useful to anyone who did not grow up in the shadow of, or suffer through WWII. Ultimately, we all did, because the United Nations and the Globalization of business and geographic ‘Unions’ (e.g., The North American Union) has grown out of response to WWII.
- History of the Illuminati (at virginia.edu) A not-too detailed review of the Illuminati showing ties to Masonry through Albert Pike and Illuminati founder Adam Weishaupt (both Satanists).
by H. Michael Sweeney, copyright © 2011, ProparanoidPress, all rights reserved permissions to reproduce available on request to pppbooks at comcast (net)
Dateline Portland, OR July 20, 2011 Updated July 27, 2012
Calling the Cops or Writing your Congressman can Backfire
But there are ways it can work better
This is being written for the TIs among us. It will become the seed basis for a new chapter in the next edition of my book, MC Realities.
I get three kinds of people who contact me for help: a) Targeted Individuals; b) persons claiming to be targeted individuals but who are actually part of the targeteers (new word); and c) persons who are either paranoiac and/or schizophrenic and wrongly believe they are targeted individuals. In any grouping of TIs, these three types of persons exist (e.g., my clients, groups such as the Free Will Society to Aid Targeted Individuals, and gatherings such as Conspiracy Con 2011 held in Santa Clara last June). I make no initial judgements on the viability of claims or beliefs, nor conclusions as to the type of TI with whom I am actually dealing. Such things become evident in time. Moreover, what good am I to anyone I if I judge them the same way as everyone else, and turn them away on a mere conclusion based on brief contact?
I cannot, for if I simply dismissed them based on a degree of incredulous description or conflicting facts or details, I might make a serious mistake. For one reason, a TI can be made to believe almost any unreal or incorrect thing, and commonly do as direct result of the targeting process. It renders them unable to fight the correct fight, and it also makes them less believable if they choose to speak of their problems to others. Which is exactly what this article is about; the problems and solutions in making such dialogs yield good results. For another, of course, we both miss a possible chance at improving their situation, perhaps ending the torture entirely, sometimes even with compensation or remuneration for their losses. A fellow can always use some more pocket change.
The problem in attempting to talk about targeting to any other person, even another TI, is that their credibility can easily be strained, were it to exist in the first place. As a rule, it does not pre exist except perhaps with another TI or someone like myself (though to my knowledge, I’m the only one of my kind doing quite what I do). Even a friend or loved one will tend to follow the thought patterns evidenced in LEA (Law Enforcement Agencies), officials, and medical practitioners, which is to presume the TI in need of mental health care. Sad, but true (the thinking, not the reality — at least when involving an actual TI).
My first advice to new clients is almost always “Do not go to Police, government, or professionals with this problem.” The answer I get is almost always, “I already have.” The description of results is almost always, “they did not help, they think I’m crazy.” Well, to a degree they were crazy… crazy to believe they would be believed and get help. But the reason for such conclusions on the part of would-be helpers can at least potentially be negated. There are ways to do it which establish improved believability and increase the likelihood of actual useful helps, or at least obtaining next-step advice.
Sadly, most such contacts are not equipped, willing, or able to help in any useful direct way. The kinds of helps truly useful are found elsewhere, and have an extremely high and unreachable price tag: a good Technical Security CounterMeasures (TSCM) and Private Investigator investigation can easily cost $50K, and there are no guarantees it will produce good result without more than one attempt. Should the ‘perps’ engaged in targeting get wind, they can simply shut down operations while the investigation takes place. Further, there are plenty of con men out there looking to make a quick buck pretending to be such experts when they are not – the first clue being they charge a fraction of the price. It costs what it costs. Anything less, is less.
If one MUST talk to others, there are a few basic rules of behavior and procedure which can make a good deal of difference, even with LEA and medical professionals, who are otherwise quite trained and disposed to presume mental illness. There are steps to take, all well before opening one’s mouth. Let’s call them tips, since they are hardly sequential steps.
The very first step is to be armed with factual information which establishes the validity and existence of targeting technology, and its use on Citizens at large in the past. A very good source (sorry for the plug) is my third book in the series, The Professional Paranoid Defensive Field Guide, which contains a wealth of information which should be mandatory reading for any TI about to open their mouth, or not. This gives them factual ammunition which can be cited to back up the notion of a potential for truth in the TI’s claims. Key among such proofs and citations in the books are lists of documented Political Control Technology among which can be found many capable of producing each and every symptom of schizophrenia in a TI. You therefore establish plausibility. If you do not obtain it by such attempt, there is no point in continuing on unless you also have good evidence, which is the next step to consider.
political control technology
Tip 2: have useful evidence
An almost impossible goal, but quite key to being believed. LEA, unfortunately, requires a much higher standard of evidence before they can actually respond, but lesser levels of evidence can at least forestall notions of mental issues being involved. Fortunately, the medical community may be far more easily convinced by lesser evidence, since their goal does not involve actions which put them into potential conflict with targeteers, as would be the case for Police. For the record, LEA requires courtroom quality evidence which is seldom available. I talk to countless victims who claim to have such evidence, but in over a decade, there has been perhaps only three instances where such evidence was actually that good… but further suffered the problem of easily being neutered by alternative explanations. Targeteers are simply too good at what they do to make the kinds of mistakes needed to provide superior evidence.
But fortunately, there are kinds of evidence which can be useful for establishing some credibility. Video or audio of strange doings, if clear and if context is visually present, can be useful. Eye witness reports are quite useful. Lists of repetitive events, such as noting the same license plate at odd times and places in your life, or the discovery of a listening device, or even proof of tampering or sabotage in the form of a repairman’s statement… or the like… can be useful. While all can have alternative explanations, they take away from the ‘suffer’s schizophrenia notion’ and moves toward ‘ could be paranoia’ (worst case result), or shows enough of a pattern of questionable matters to exceed probabilities and shift thinking toward actual belief in the possibility of actual targeting. The later is where you want to end up, of course..
Lesser evidence and general event histories should only be mentioned in passing as existing, but add a phrase such as, “I’m not sure what that means,” “I know it proves nothing,” “I don’t know if that’s a clue, or not,” or some other diluting statement. You mention it to add ‘bulk’ to the evidence even though it has no ‘substance.’ It makes you sound more rational and cautious in your thinking by volunteering the disclaimer as to value. NEVER say you KNOW something as fact based on observations of this sort, as that immediately destroys you in their eyes as not being rational.
Tip 3: make a proper presentation
This is essentially a matter of learning to religiously apply dos and don’ts in framing descriptions of your problem and associated experiences:
Do NOT use terms or phrases like “they or them,” which sounds conspiracyish (new word). Do not presume who they might be (e.g., they are NOT government, military, CIA, Masons, etc.) Instead say “person or persons unknown”. It is not your job to identify the perps, only to establish they exist and are a mystery worthy of a look see. There are many such conspiracy related terminologies and references which should be avoided at all costs. Instead use generic terms which leave it open and enforces the mystery element.
Do NOT make statements of fact, draw conclusions, or claim to know something is true. Remember, you could be made to believe any unreal thing, so your conclusions and beliefs are NOT useful at this point, at all. Instead imply the possibility of such things using qualifying expressions (see next).
DO use qualifier terms to show your own uncertainty or a willingness to accept alternate explanations (being rational would demand this kind of thinking). Things like “I reasoned this might mean,” “I wondered if it was possible that,” “If that was true, then it might mean,” and so forth. Use these as verbal vehicles to explore possibilities in personal dialogs, and if they probe you for conspiratorial beliefs, it is OK to admit “Well, that thought has crossed my mind…” but temper it again with reason; “but there isn’t enough evidence, yet. That’s one reason I need your help.”
DO stop briefly and ask a question of the listener in an attempt to get an sense of useful agreement. Its a check to see how you are doing and to make sure you don’t walk over a cliff by going on and on beyond their plausibility threshold. Baby steps here — don’t go for the gold. “Was that an unresonable assumption on my part?” “Am I crazy to think about it in those terms?” “Does that seem like a lot of coincidence to you, too?” This works in written material as well as conversations, though you don’t enjoy an answer, but it shows the reader you are considerate of their beliefs, which again shows you as a reasoning person.
political control technology
Tip 4: choose your listener carefully
There is a reason you are selecting a given listener. Make sure you understand what it is, and tell them up front in generic terms what it is you are trying to accomplish. “I’m very concerned about some strange events that lead me to believe someone is doing strange things to me… a kind of harassment.” Conclude your presentation with precise request for specific actions you hope they can take to help you. Don’t aim too high. They can volunteer more if warranted. “Could someone look at my video and give me advice?” is a lot better than “I want these people investigated and jailed!”
When it comes to a given listener from among many in a possible group, such as when choosing a lawyer or other professional, I usually advise going out of your primary community to any nearby smallish city of about 40-50K population, and seek a minority person relatively new in the trade. This increases the likelihood of their being hungry for business, and decreases the likelihood of their being co opted. When it comes to family members, co workers, and neighbors, church members, etc., you want to evaluate what you know about them as well as what might go wrong should they absolutely disbelieve. Are they likely to say inappropriate or unwanted things to others, or remain quiet as you prefer?
Most important of all, if as you proceed in any verbal presentations, you are getting signs that the listener is not buying what you are selling, if you have already produced your biggest guns… thank them for your time and excuse yourself. Do not let them detain you with encouragements. This is a case where anything you do say will be held against you. As there will likely be an official record, you need to cut and run and avoid that record being overly negative. “Possible paranoiac tendencies.” is better than “Exhibits Schizophrenic behavior.” Better to seek out an alternate listener for another day. If they are in the same agency, you are likely doomed to a repeat failure as commentaries of the first listener will be made available to the second… so an alternate agency may be in order, or at least some means to reverse whatever is believed to have caused the negative view (e.g., evidence). That’s another reason your pitch should be as good as it can be the first time ’round, which means well though out — exactly why you are reading this.
Tip 5: rehearse an organized presentation
If you feel you are under surveillance (you are, most likely), you may want to prepare a written outline or index card set and read them quietly to yourself while imagining to be speaking. Open with an introduction by name and a brief generic description of who you are and where you are in life – a bit like describing your life situation to an old High-School chum met randomly on the street. “I’m a homemaker with two kids holding down a job as a secretary for a military contractor, etc.” Follow with a brief explanation of your targeting in VERY generic and brief terms and the up front request for help from step 4.
Outline your basic problem with somewhat more details (e.g., gangstalking, EW targeting symptoms, etc.)., without giving precise examples and AVOID THOSE TERMS in favor of generic symptoms or observations. Once you start talking the terminology you will likely be at a disadvantage and need to ‘educate’ them in the terms and that will again paint you as a conspiracy nut. Introduce evidence availability along the way, including the Field Guide proofs as may be appropriate, and likewise with the baby-step questions of agreement. Close with the specific request for help. It is more than OK to work from your notes or index cards in the actual presentation. That shows methodical and organized thinking, as opposed to emotional response. Express your feelings about this or that at key points in the presentation, perhaps in the form of an agreement question, “I felt like I was being treated like a criminal. Wouldn’t you feel that way if it happened to you?”
political control technology
Tip 6: be prepared to answer questions
Try to make a list of likely questions and prepare ready-made answers. Do expect unexpected questions, at unexpected times. It is OK not to quickly answer, but if you are a bit at a loss for words, express it with something neutral, such as “Well, I hadn’t thought about that, much,” or “That’s an interesting question. Hmm.” Don’t get flustered or nervous. It is also OK to say you don’t know, or that you are unsure but have a theory or belief.
Tip 7: be honest but constrained
Be as honest and direct as you can while still observing the above points. It is OK to withhold things which are not directly related to the precise element under discussion if they risk damage to credibility. For example, talking about general targeting observations and symptoms when describing gang stalking and suspected (use that word a lot) electronic weapons doe snot require you to admit to hearing voices, which is the one thing most likely to get you judged up front as mental — despite the fact there are many technologies known to create the effect, including some now being used commercially, such as Quad S or Silent Sound commonly found in museum tours and the like. Your goal is to paint enough of a picture to provide a useful image of an existing and real problem, not to provide complete disclosure at the risk of blowing away any possible acceptance of its reality. You want them interested enough to want to go to the next step with you, not so well informed as to want to send you packing due the limitations of their own belief structures.
In the end, that’s really what it is about. You need to overcome their existing belief structures sufficiently to hear you out and conclude a possibility exists sufficient enough that the next step seems appropriate, even if for no other reason than curiosity. That’s where mystery comes to be valuable. You may even want to include in your opening statement something to the effect of, “What I’m about to tell you will probably sound like nonsense. So I’m asking you to please briefly suspend your belief structure just as if sitting down to watch a sci-fi movie. But what I have to say is no fiction, it just sounds implausible on the face of it.”
Regardless of if using these seven tips, or not, I sincerely wish you the best possible outcome in any outreach effort. Please ask for my free Helps Kit if a TI or a helper to a TI. Anyone can ask for my free sample newsletter on Political Control Technology. Email me at proparanoid at comcast (net).
- How do you act smart in front of other people (wiki.answers.com) An 8th tip, perhaps? Couldn’t hurt.
- Reason seen as a Weapon, not a Path to Truth (dinmerican.wordpress.com) Sometimes things are not as they seem on the surface, and ‘help’ is worse than the bite in need of mending. You can spot clues that this is happening, and walk away.
- 1 Cor 4:16 Wherefore I beseech you, be ye followers of me. (Bloodofthelamb.wordpress.com) The one person who, if you follow him, will ALWAYS listen, care, and do the right thing.
- Technical Surveillance Threat Series, “Cellular Threats”. (comsecllc.blogspot.com) A bit of an insight into the World of TSCM.
- See also Granite Island Group, one of the few such TSCM specialists I personally would choose — contributors to my books, The Professional Paranoid and The Professional Paranoid Defensive Field Guide.