Author Archives: Author H. Michael Sweeney
There are no truly simple and foolproof paths to end any kind of stalking, but one proven Free Will Society method has led to discovery of an unexpected path which might prove very simple and effective for many T.I. victims of organized or individual stalking.
Dateline, Jan 18, 2021, from beneath the secretary’s desk at the fictional Law Offices of Saul Goodman. copyright © 2021, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting. Fair Use Law in play.
One unexpected benefit of stalking victims relocating here on the Coast of Washington State with me has created awareness of a new path to escape stalking. It is not really new, but that is, a new way to use an old method previously though useless, based on prior attempts to employ it. It seems we just didn’t know how, but quite by accident, thanks to the Free Will Society’s efforts (FWS) to help severely impacted stalking victims, now we do. That said, I’m not claiming we have exclusive knowledge of it… others may have discovered it before us, and simply failed to share.
This discovery amplifies the original reason for T.I.s electing to meet up here with me (and other Members) on several levels. The idea was that there would be safety in numbers able to watch each other’s back, with the eventual hope of caravanning together as a preformed community to a rural property site (farm/ranch) to establish our own intentional community, the Free Will Haven project (FWH). Today, as this is being written, there are four Members of the Society here (one just arriving), along with a larger number of victims already living here… and a like numbers seriously considering to do so.
One thing is already true of this: all Tis here have a sense of great improvement in their targeting situation, and if honestly considering, must admit that remaining targeting symptoms may simply be coincidences or knee-jerk assumptions based on expectations ‘learned’ from years of targeting. So, to be clear, coming here has proven beneficial without the new path discussed herein. But it is important to relate it to our efforts, here, because it explains how we learned of it, as well as how to make it work.
To preface further with useful event context, having worked with thousands of victims over several decades, one axiom which has remained constantly true is this: it is not normally a good idea for targeted individuals to share the same domicile, or become romantically involved. That axiom presumes that two or some other small number are doing so as individuals, and not part of a larger community of ONLY victims living in the vacuum of a targeting-free environment, like FWH. In an all TI environment, safe from direct easy access by perps, and given time to get to know other victims and establish relationships normally in the luxury of a non-targeted day-to-day life, it may be possible to find helpmates and romance free of the problems which always arise while targeted actively. Specifically, it almost always ends up where one or even all such persons living together end up accusing one another of being perps in one form or another, and result in bitter breakups with considerable additional damage to everyone’s already frazzled and delicate psyche. In fact, I’ve never seen the axiom fail, though I’m hoping it has, somewhere, for someone.
A perfect example took place when, against my general advice, one of the Members offered cohabitation to aid another homeless Member in seeking to reestablish himself, here. They would share a hotel room, one using a sleeping bag on the floor. It only took about three weeks for an emotional bond to form sufficient to lead to romance, again against my advice, and only a few weeks more to lead to the expected accusations and an unhappy separation. There is only one important detail about all that, and it is the matter which opened the unexpected door to a logical path for other victims.
The male Member, admittedly a PTSD victim as well, threatened violence in ways rendering him a danger to himself and others… to include myself and the Society.
There was no choice but to seek a restraining order, and that has proven to be a doorway of great opportunity, particularly here, in Washington State. Before continuing, I must admonish against mentioning organized or gang stalking, mind control, and any DEW or other electronic weaponry when seeking a restraining order. Not unless you have direct proofs to offer… and by proofs, I mean courtroom Perry Mason-quality. What you believe or think true, or have researched online or even found in my books, MEANS NOTHING before a Judge.
For this reason, also, know that your standing before a Judge, especially if the Respondent chooses to use it against you in his defense, can be harmed if you had previously filed Police Reports which involved those same topics. While there can be exceptions, it can be used against you and result in an unfavorable ruling by the Judge… who will likely view you as mentally imbalanced in some way. I have always advised great care in calling Police or writing letters to FBI, Politicians, Media, etc. Any such prior activities will create doubt in your claims, and require significantly stronger proofs if to overcome such doubts. Ergo, best to keep it simple, and focus on threats of violence or actual violence in need of restraints.
Even so, attempting to secure an Order has potential value even if rejected (for any reason). You can try again another day when your quality of proof improves, and multiple attempts can, in the right circumstances, serve as proofs of another sort in non court venues. But you can’t keep doing that… after a third try, or so, you’ve likely worn out the welcome mat. But one or two can be seen as an excellent historical trail which succinctly documents the nature, depth, and timeline of targeting, esp. when presented with your own argumentative responses to any given rejection by the Court.
Types of Orders and how they work
There are many kinds of restraining orders, and while a lawyer is always a wise partner in any legal action, they are relatively simple to request on one’s own. Most States have a Free Legal Service available for this and other purposes, if you are on fixed income, homeless, etc. We are only concerned with Civil Orders, as opposed to Criminal Orders, which relate to criminal investigative needs. Commonly, there is no Court Cost or Fee to seek any form of Civil Restraining Order, the type useful to a T.I. It is primarily a matter of visiting the County’s Courthouse and requesting the forms, often also available online, and filling them out. Because multiple types of orders can rely upon the same forms, it can mean rather a lot of detailed paperwork (in our case, about a dozen sheets of questions with checkboxes and fill-in-blanks).
Typically, the County Clerks can answer questions should any given item not be understood. We had about six such questions, answered on the spot as we filled them out at the Courthouse. If you will have witness testimony, you will likely need ask for forms for that. Even with Clerk aid, our first attempt was still somehow flawed, but by the time we finished the second attempt, we understood the process rather well. There will be no specific stepwise advice on any of that, here; it will likely vary State by State, as determined by various laws in place which so dictate, and the forms themselves.
There may be variations on the type of Civil Restraining Order from which to choose. The County Clerk’s Office can advise which type is best… or more correctly, which forms best meet your need, based on playing 20 questions. But the one best version is one based on Domestic violence, for reasons covered separately, herein, some of which relate specifically to unusual benefits in Washington State, which may or may not be available in your State.
Domestic violence is generally defined as actual violence or threats of same from anyone you have cohabited with (romantically, or no), be it current or at some time in the past. Many targeted victims complain of family members, roommates, and cohabitation lovers (not one-night stands… but any situation where they had their own key copy) deemed to be a perp. Actually, as we will later discuss, it need not even be that they were a perp, to make an Order of value… that Washington State difference. Restated: there is a potential benefit in a Domestic Violence order against any individual, which can also benefit a victim of stalking by other unnamed and unreferenced persons in the order. It’s like being handed an umbrella; it can cover more than one person in the right circumstances.
Less specific orders (non Domestic Violence) addressing specified aspects of stalking and/or harassment still have value, but only if against named respondents.
Before getting into details, lets take a look at the process, which would not seem to vary much State by State. After you file the request (Petition), a Judge will review the Petition and either reject it for insufficient cause, or find it sufficient to issue a Temporary Restraining Order (likely in the range of ten to fourteen days) pending a Hearing where the Respondent and Petitioner can argue before the Judge as to why it should be rendered Permanent, or Lifted (canceled). This provides due process rights to the Respondent, who must ‘respond’ if feeling the order is unjust. It might take place by phone or only video conferencing, since the advent of COVID. In any event, the petitioner (you) need not confront the respondent in court, if feeling threatened, thereby. Note that should a restraining order be lifted, you should likely be notified and given an opportunity to protest and alter the decision… a matter to be inquired upon when the final order is issued.
The Temporary Order will be served and you will also receive a copy. If violated by Respondent, you call Police and they will take action which might be anything from a warning to an arrest, and the Court will be notified of the violation, which will strengthen the likelihood of a Permanent Order. Once the Judge rules, that notice will also be delivered to both parties, and the protection either continues, or is ended. Simple 1, 2, 3.
What you need before you can file
You need to know the name and address of the Respondent, and ideally, their birth date or estimated year of birth. You need physical description characteristics (estimations OK). For both yourself and the Respondent, you need to have current addresses. This can be a problem if either of you are homeless… specify a Shelter or friend’s address, or a hangout location and so indicate. In like manner, you must know what Law Enforcement Agency responds if either of you were to dial 9-1-1 (determines who will serve legal papers and be most likely to enforce the Order if violated). It can be useful to know if the Respondent has weapons, a criminal past, an income/job, vehicles, or specific items used in targeting you (again, nothing relating to political control technology). In some cases, your Order can request seizure of items potentially used against you, such as guns or a vicious attack Dog. For anything more than guns, it is especially a question for a lawyer, perhaps, and for making a case that the request addresses a valid, significant threat.
Of utmost importance, you need to be able to describe the perceived threat with examples, but also, if to succeed, supporting proofs. This should include descriptions of emotional states of fear or other harms already experienced, or feared; sell the drama. A Police Report is the ultimate proof, perhaps even if the Police could not verify claims… multiple reports can establish a pattern — so it is possible that any ill-advised calls to Police might still prove useful. If they exist, consider to use them, because if they do and you don’t mention them, that may cause the judge to throw the matter out.
Ask your Clerk about how to properly handle and submit such third-party proofs, testimonies, and other attachable evidences. Proofs can be in the form of emails or sms messages, video/audio recordings, or eye witness statements which illustrate the most serious threats or harms experienced. Some such proofs like video/audio can simply be cited, with an offer to provide them at a hearing, or perhaps by mounting them online somewhere with a private URL link you can put into the documentation. You would not want to overload the request with too many examples, but you can cite that other examples are available. The important thing is to illustrate each differing kind of threat, abuse, or harm endured for a broader picture.
Special Benefits of Domestic Violence-based Orders
Victims of Domestic Violence become eligible for special benefits in many States. In Washington State, it can mean emergency housing in a center with greater security than a homeless shelter. It can also mean monthly financial assistance in several categories. Washington even has the functional equivalent of a ‘Witness Protection Program’ which provides the victim with all new identity, and establishes them with either an income and living space or employment in a differing city, as well as a blind mail drop which allows contact by approved persons/businesses without them knowing your true location/current name.
The Society has a contact in the Washington State program who is very pro Society efforts at a personal level. This provides yet one more set of reasons for Members to consider joining us, here. Should perps follow, the Restraining Order provides additional defensive measures to those already in place here due the safety in numbers and my presence, with my skills set and special TSCM (Technical Security CounterMeasures) equipment. It can, for those able to illustrate Domestic Violence (even if from another community, perhaps even out of State), mean superior protection and other aid well beyond that of the Society. Again, that is true even if it was unrelated to current stalking issues.
But it is also true, that even if not a Member, and not joining us, here, anyone can use this tool anywhere in the country, for possible relief at one level, or another. Please advise of any such efforts and outcome.
Radio Frequencies and Electromatic Fields can be weaponized for use against ANYONE. With the advent of 5G and the Internet of (smart) Things, almost EVERYONE should worry about RF/EMF effects. THIS MEANS YOU!
Dateline, Oct 30, 2020, from an undisclosed location not too far from wrong. copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Hard rocks and harder places…
This is an extremely broad topic which cannot be well discussed here, beyond some basic advice. The problem for TIs is uniquely different from common uses of Technical Security Countermeasures (TSCM) equipment and services. So one problem right off the bat is obtaining useful help (good luck with that). This leads to a do-it-yourself (DIY) alternative by use of low-cost EMF meters, and possibly shielding or other tactical solutions. As result, most pros are ex mil-intel types, which creates a trust barrier with most of the TI community.
Not that it matters: a TI simply cannot afford the cost of their services. Professional TSCM equipment is extremely expensive (a pro might have a million dollars invested) and extremely complex, and requires a lot of experience and the kind of training offered in the military and intelligence communities. So, between trust and cost, and unique needs, a TIs find themselves between a proverbial rock, and hard place, a DIY nightmare. That’s not all.
That help issue trickles down the food chain to the makers and sellers of lower cost solutions, such as EMF meters, which are little brothers to more sophisticated and costly signal analyzers used by pros. Such firms do not and will not support DIY use of their products for TI related needs, and indeed, many pros will not offer their services, either because they fear running afoul with some government operation — or they don’t believe in the whole targeting notion and presume the client mentally ill.
It is possible to hire a PI or some individual who’s gone into business using low cost gear to do ‘mini’ TSCM sweeps, some of whom are aware of and will cater to TI needs, but many of these are charlatans, especially true in those who specialize in select TI issues, such as ‘finding implants.’ Be wary of anyone charging for implant detection using small EMF meters, esp. if charging by the implant found: with many meters, it is possible to cause a false read by simply moving a finger of the hand holding the device toward the front of the meter… for another $50 ‘find.’ “Would you like me to continue searching?”
It would therefore be better for the TI to do their own searches, though even with a decent EMF meter, the odds of finding an implant are extremely nil. EMF meters detect Radio Frequency (RF) and Electro-Magnetic Fields (EMF), which are radiated energy/field readings not given off by implants, as a rule. Most implants receive such signals, and those that transmit them tend to do so by remote command. Even then, it is very briefly, rather than being ‘on’ all the time — defying meter detection.
While there may be exceptions, the type of signal they use is likely to be lost amid the ambient signals present already (i.e., wifi, broadcast radio/TV, cellular, AC wiring, power
lines, amplifiers, etc.). An EMF meter displays the sum total of all such data, and can only identify a source by virtue of increasing in signal strength as it nears the signal source. An implant signal is rather weak. But, implants aside, there are other valuable uses for such a meter, if you have a decent one.
Choosing an EMF meter
First, know that cell phone apps that offer EMF readings are not reading the right kind of EMF. They are not reading any signal which is involved with targeting, but instead, the Earth’s own magnetic field, using sensors in the phone designed for game play to know changes in the phones relative position to prior positions (i.e., steering a car in a driving/racing game). For like cause, avoid ‘Natural’ EMF meters or EMF meters that do not include RF measurement, as they are also reading the Earth, only.
So what you really want is an actual RF/EMF meter. And not just any such meter, but one which is directional in nature when reading RF, and not omnidirectional. AC Magnetic Field readings will be omnidirectional, in virtually any meter, but if the RF sensing is directional, that will not impede usefulness of omnidirectional EMF readings. RF, on the other hand, is barely useful if only omnidirectional. That said, some omnidirectional meters will allow you to install and optional directional antenna… for added cost. One way or another, you want directional.
The type of antenna system described by the maker in specifications or manuals won’t necessarily tell you if it is omnidirectional or directional, they prefer a technical description of the physical antenna design (engineer speak). Omnidirectional (least useful for a TI) are typically described as
ISOTROPIC or TRIAXIAL ( 3– AXIS), and are often visually discernible by a large ball or spherical object at their top. Sometimes it is internal and, therefore, smaller and unseen. That limits the sensitivity, compared to an external. Directional RF meters might have no antenna, a rod antenna (like old brick cell phones), a ‘wand’ at the end of a cable, or a triangular antenna (very useful with distant sources). So, any other technical description other than Isotropic or Triaxial, is good.
My base-line low-cost meter of choice is the TriField TF-2, which I actually used to sell with some value-added features for TI use. That included a user manuals I wrote for such use for the Trifield, and the Micro Alert audible meter (a good companion product). These manuals, along with a copy of this post and many others, are part of my TI Helps Kit available on request to proparanoidgroup at gmail com. I used to charge $10 for the manuals, but the Kit is free, though I do encourage a donation to the Free Will Society to aid severely impacted stalking victims (freewillsociety.wordpress.com) via PayPal to the above email addy.
I compare all other meters to the TriField before considering them desirable, or worth the price for TI needs. It is a directional RF with omnidirectional EMF readings in a simple to use and reliable product at a low cost. You can buy direct (trifleld.com) or find it online from many resellers. Experts in the meter reseller and RF/EMF consulting field also use it as a standard for comparisons, and that is telling. In fact, currently, one such pro who advocates for the TriField is EMF Academy, a valuable resource for information to anyone interested in issues revolving around the topic.
More importantly, they have a newsletter you can subscribe to, and associated with that, is a monthly drawing for one of three TriField meters. If you just visit their site and poke around looking at articles on things like EMF paint and shielded clothing, a popup will offer you the ability to subscribe and enter to win one of the meters. Some of their more expensive and exotic solutions I am currently testing, and will likely write an update report within a month: be sure to FOLLOW my blog so you get a notice. While you do that, also click the LIKE button and leave a comment, if you wish — all at that bottom of each blog post.
There are other features to look for in a meter which could be handy to a TI. An audible tone option, for working in the dark or allowing you to focus on what you are scanning (TF-2). Peak reading indicator and Avg signal strength (TF-2) instead of just a needle or light bar reading that is bouncing around enough to make such things difficult. It would be nice to have the ability to add a special antenna, such as (specifically) a dipole. This may be a round tube, or a flat, triangular antenna for very precise targeted distance source location (useful for DEW sources, typically hundreds to thousands of feet, or even miles away). Some offer a pistol grip or a protective case. These things are nice to have, but not usually critical, if you are willing to walk a bit more to effect the same results.
But the important feature is antenna, and frequency range. Most meters are intended only for cellular and wi-fi operating ranges, which stop (well before 5G) at below 3.5 GHz. One insidious risk of 5G compared to 4G and the current wifi standards, is that it operates at such a high frequency, citizens won’t be able to afford meters designed to check for safety. They may operate at up to 6 GHz. As it happens, DEW weapons are likely operating in similar ‘beyond hope’ ranges. My $12K meter setup can still only see to 12GHz, and some DEW will be above 50 or 60 GHz.
And, it is true that EEG entrainment (mood, sleep control, thought interference), which many TIs call remote neural monitoring (a misnomer), operates at frequencies well below any low-cost meter on the market, unless you are looking at something like my $12K rig… which is exactly why I have it. We are talking human brain operating frequencies, at and below 30Hz. Your ears cannot hear below 30Hz, because if they could, it would confuse your brain, and therefore, that’s also why audio equipment tends to stop at that low end, as well.
Hold the meter level, flat in your hand, so you are looking down to see the reading. If you aim it upward, you are going to flood the meter with radio waves reflecting off the ionosphere, and will always get incorrectly high readings. You wouldn’t even be able to sense a satellite signal, that way; such meters are not designed for anything but environment readings or very near or high-outpt sources. Also, many meters without external antenna will give similar false readings if your hand is touching the ‘head’ or ‘business end’ of the meter, so hold it by the rear half, only. When taking a reading, your purpose may vary, but generally, you are looking for a ‘hot’ or higher-than-average reading among the ambient collective.
Before actually taking readings, consider perp strategies. They likely have excellent surveillance and will know when you are using a meter. It is very likely that they would therefore simply shut down, making any sweeps pointless. This is why a pro TSCM sweep is typically conducted unannounced, anonymously, and with a degree of stealth and cunning. Ideally, it would be best if you arranged for a companion to do the sweeps with as little fanfare or obvious effort, as possible.
This brings in additional problematic factors, such as trust and willingness to help in what is a lengthy and complex set of tedious steps. Or, you might get lucky and find the enemy’s gear is simply left running while they take a nap. For most TI’s, though, it can mean many attempts before being able to acquire useful information from the meter. Failure to find clues of targeting does not mean they never target, does not mean the meter is defective, does not mean you are doing something wrong… it just means that was not likely the right opportunity.
And yet, of course, the other possibilities may yet be true, in the end. While a negative is not necessarily proof of a negative, a positive is its own proof. Even so… you will want multiple positives over time if to have useful evidence. That will also require good documentation, such as video and verbal announcements of what you are doing and seeing, and where the meter is pointing. Have a witness, too. More to follow.
Slowly sweep back and forth, left to right, looking for possible reading jumps or dangerously high readings (hot spots). When you first start, you won’t likely know what is dangerous, or not. There are good online resources to help with that, but they can sometimes seem way too technical, and measurement increments of your meter may not match the measurement increments of a given site. That can result in confusion or misinterpretation, and force some math you might wish to avoid. Here are several sites you can review and compare against your meter, hopefully finding one more directly useful, without involving conversion factors. There are many others out there, and what constitutes unsafe levels is kind of a moving target in constant redefinition, and there is a difference in European, American, and Asian standards, the U.S. being the most lax (natch) of the three.
If you find a hot spot, stop and watch for several seconds to see if it holds relatively steady or was just a random spike. Generally, you will want to repeat scans in each of the meter’s modes of operation (i.e., the TriField has three: AC Magnetic, AC Electric, and RF/Microwave). If you are logging results for legal or comparative purposes, give it at least five seconds and note the reading(s), avg, and peak. If you’ve made an entry, be sure to note the values for each meter setting at that same position/angle. That added information could prove useful at some point.
Hot spots may show up either as a gradual rise and fall as you sweep, or a sudden spike. It may be brief, or hold steady. Brief spikes are not typically useful, but one which holds or is above safe limits is very useful. Note if gradual or sudden, and especially note if it was synchronous with any impact on you or your environment. You will also want to get a compass heading (there are cell phone apps for that, relying on natural EMF, as it happens).
If outside, and you are in something like a depression or valley, or a where there are tall buildings, you may wish to then tip the meter a bit to scan lower and higher in angle, such that you avoid looking directly into the sky (stay below the visual horizon, where rooftops may so redefine it), looking for further increases which may help identify a specific source location of the signal (a cell phone ‘bubble level’ app with off-level degree readouts might help with your notes, as well). If it is a building you are aiming at, try to estimate the floor, and note that. You may want a strong pair of binoculars, a rifle scope, or other strong lens to try to see what is at the suspect location. And it is suspect, only. A hot spot, even if very hot, is not alone a proof of a targeting source… but only reveals a possible suspect location.
If we are talking about finding a surveillance or other targeting device planted somewhere within your location with the meter, there is a similar concern, should you find something. Depending on the device purpose (which you may not be able to discern), and tactical matters dictated by your targeting situation (which may not be obvious), it may be to your advantage to leave it in place. You may wish to contact me (I am interested) via public library computer.
Or, use your best judgment, if worried it might should be removed immediately. Video document its removal and take it directly to a bank and get a safety deposit box to put it in… or take it to a local professional for analysis, per the advice in the next paragraph. Send me still images, in place, and after removal, if removed. Safety first, if it involves AC electrical power, and if it is in a large sealed box, don’t try to open it… such are often booby-trapped to destroy the evidence; very scary fireworks which may require the Fire Department, as it once did in a case I was investigating.
Now, about suspects, we need a warning: If you do establish a suspect, DO NOT confront individuals which you might be able to identify. Instead, try to learn as much about them or the property as possible, and add it to your notes. You should then contact me, or an appropriate professional, such as a private investigator, lawyer, or Agency. I don’t recommend Police, but if you have good readings and symptoms verified by a Doctor as not due a health issue, you might want to contact the FCC or your State’s Environmental Protection Agency, or perhaps your local County Extension Office Agent. Some larger cities may have bio-home or bio-environmental engineers or similar, who could be very good resources, if available. If there is any significant find or action taking, I would like to hear from you, and may be able to suggest ‘next step(s)’ to consider.
To find a surveillance or targeting device in a structure (the TI’s ‘space’) requires comparing readings well away from a suspect source to readings within an inch of it, looking for a large increase (signal strength falls off at the square of the distance). Scan low, scan high, and all around. You will want to be as physically close to surfaces as you can get, without touching, preferably (no harm, no foul, if you do). Every object and surface should be treated as a potential suspect to be tested.
One should establish ‘normal’ levels in a non TI environment (a test control space) similar to the TI’s space, and compare by taking readings at room center or well away from major RF sources (i.e., wifi, computers, tvs, radios, ovens, etc.). It should be a similar sized and designed space in the same neighborhood, between three and six homes away (arranging this can be daunting, if you do not know anyone who fits the bill, who would be willing to participate — try requests based on your own concerns in the neighborhood about high 5G signals, until you find someone who worries about 5G).
This is done in several sets of readings, each — one with those RF sources operating, and one with them turned off, and one with the Mains turned off (no AC power to the space). If subject to significant electronic attacks which can be physically felt or sensed, the TI’s space reading should additionally be undertaken as sets during both times of no sensed attack, and during an attack (which may prove difficult, if under surveillance — the perps may elect to cease the attack once you set up for the readings… which might buy you some peace.) You should also take readings at the power company meter at both spaces at a time of day when major appliances are not in use, and note how fast the meter is changing, and in the TI space, take an additional reading when the mains are turned off.
Finally, you will want to walk around the space on the outside taking reading pointing away from the center of the space, looking for hot spots. Directional is King, here.
To test for bio implants in a person or a tracking device on a vehicle, the best place will be in the country, away from any nearby potential sources for such signals… such that ambient broadcasts and distant cell towers are about all that’s being read. All cell phones and the like should be turned off. Don’t try to find an implant on yourself, have someone else take the readings. Every inch of the body should be scanned, and I suggest wearing a simple nightgown, PJs, or a bathing suit. Feet wide apart, arms held out to the sides. Be willing to get fairly personal. One then verifies by going on past the body in the same direction to insure the reading is dropping, again.
If a vehicle, pop the hood and trunk and doors to scan the interior areas, it being OK to lean into and ‘look about’ with the meter, just trying not to aim directly at the sky. Don’t forget under the seats, fender wells over the tires. It would be nice if you could put the vehicle on jack stands so you could safely get underneath it (where aiming upwards at the undercarriage will be fine). Jacking each corner up as if changing a tire is much more work… but avoid actually going under the car with any more than your arm. You will want three sets of tests, one with the engine running (in Park or Neutral, Emergency Brake set), one with battery connected and the key in the accessory setting, and one with the battery disconnected. That will tell you if any suspect readings are from something drawing power off of the car, or if it is battery operated (which means something bigger, and easier to find in a visual search). So, be sure you have the needed tools.
What do results tell you?
- Where readings are higher during an attack, DEW is all but confirmed, and additional steps (T1, at document end) will be needed. Where they are not, and the attack was sensed, the sensed effects are more likely to be a health issue (all TI symptoms are carefully designed to mimic health issues), and you should seek medical advice, describing only the symptoms, not TI concerns. Get a second opinion using a random Doctor. If no high readings and no sensed attack, try again… and again;
- where readings are higher in the TI space with all power off, than in the control space in like status, it indicates battery operated surveillance is likely, take steps (T2). If the same, it implies that any perp equipment present is drawing power from the house by any number of means, use step (T3). NOTE: it is certainly possible for both to be true;
- where readings are higher when RF/EMF equipment is turned on in the TI space compared to the control space, it implies that the equipment operating is either defective, or perhaps weaponized against you in some manner, take steps (T4); If the same, it implies them safe;
- where readings are higher when the equipment is turned off than in the control space, and the first part of item (2, above) is false, it implies the AC power system has been weaponized, take step (T5);
- where power meter readings are higher in the TI space than the control space, it implies the Meter is relaying a lot of data from perp devices… just good to know, as the other tests will address needed steps. If not different, it implies the meter is not a Smart Meter, or the meter has not been weaponized to relay data. Relay of perp data does not imply the power company is the recipient or participant, though it is always possible;
- where power meter continues to draw power with the mains turned off in the TI space, it means there is the possibility the perps are drawing power off for their devices directly from within the mains junction box (circuit breaker box), and may include electrification of the ground to create high EMF readings in the home, and likely, the embedding of targeting signals within the AC wiring. Take step (T5).
T1 (DEW test). You have had positive space readings within the structure and they point to DEW presence. You now need to do external readings at both spaces by walking around the building site and taking reading pointing directly away from the center of the building or room of concern (don’t sweep left to right — you walking in a hypothetical arc about the center point, instead).
Compare these to the interior readings at the same compass heading. If there is no agreement, the source is likely inside the structure: do a 180 and sweep to confirm, directly along the outer wall surfacwes. If they do agree, compare the average signal strength. If it is a notably higher, then the source is relatively close, and in theory, if there was nothing in the way, and the source was left operating, you could walk toward it until you found it… such as a neighbor’s home. If it is not exactly higher, then it is much further away, and you may want a bicycle or car to chase it down.
T2 (Batteries). Battery operated devices are bigger, and easier to find because they will require a nook or cranny. Do a visual search for anything that is unusual or foreign. Do not remove it. Video the discovery with audio description. It may require some disassembly of door panels, carpeting, dash components, etc., which may mean professional help or tools, in which case, you must be present and video. Contact me with the circumstance and send me still images of the object, that I may suggest the next steps. Do this covertly, such as by use of a public library computer.
T3 (No Battery). That means it is either hidden within an appliance (i.e., TV, stereo, blender) that is always plugged in, or it is wired somehow directly off of an AC power line, perhaps in wall or atic, under floorboards or behind baseboards. If the meter is pointing towards any such appliances. Unplug those items and move them aside, and take readings, again. If the readings fail to match, plug them back in elsewhere, and read again at the new position. If they again match, they need to be dismantled, looking for anything that seems added. You may want to take it to a repair shop, if unhappy at the thought of DIY (some items have voltage capacitors which can cause severe electrical shock even if the item is unplugged). You have to worry about such items on the far side of the wall, as well, by the way.
If the appliances don’t change the readings when removed, or there were no appliances, then we worry about wiring in the walls, floorboard, and ceiling areas. Aim the meter at angles to see if there is any confirming change in readings. If low angles are hotter, you may need to pull the baseboards, wall power outlets, or get under the floor (i.e., basement ceiling area). If high, there may be ceiling molding to be removed, or you may need to worry about something upstairs or in the attic ((where you will be wanting to follow all the house wires, looking for a cut and splice with something dangling (perhaps another long wire to chase down) off of it)). Otherwise, we check light switch wall plates, picture frames, wall hangings, or window sashes, etc., as may be in the line of sight of the reading. Again, be mindful that walls have two sides. Watch out for fiberglass or asbestos insulation… you don’t want to be messing with that without serious protective clothing.
T5 (AC Power Compromised). Consider to contact a Home Bioengineer or a large Electrical Contractor who is capable of doing large-scale power system work (i.e., can contract to build sub stations and the like — which means they know more and have better tools than ‘an electrician’). Go directly to the Power Company if there is no such services in your area. The idea is to complain about dirty power and possibly high ground voltage (say nothing about targeting) and ask for a power quality survey. If they find anything wrong, they should be able to fix it or arrange for the power company to fix it. Simply going to the power company first may not be a great idea, if they have been compromised and are complicit.
See the document on Shielding which is also included with the Helps Kit, or request a copy.
Most everyone is familiar with 9-1-1, 4-1-1, and 6-1-1 numbers in America, but there are other equally valuable three-digit numbers worthy of remembrance or plugging into your contact list. And that includes the equivalent numbers in other countries, when you travel.
Dateline, May, 12, 2020, from an emergency lockdown bunker in an undisclosed locationcopyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting. NOTICE: Fascistbook and their ilk (Twitter, et. al) blocks any URL to my blog site. SO, if you wish to POST comment in social media, you may wish to write out the url with spaces between wordpress and com (no dot), instead of supplying a pasted link.
I can’t think of anyone who has not used 9-1-1 to call for help in a law enforcement, fire, or medical emergency, or to report something in need of Police investigation or intervention. Almost everyone with a cell phone knows that 4-1-1 is directory information, and that 6-1-1 is commonly used to reach their carrier regarding issues with their cellular account or the phone, itself. But what about 2-1-1, 8-1-1, and other numbers in the series? Not so much. Even more problematic, is what happens when you are in another country. What numbers do you use, then? This post will answer that, and give you all the numbers for popular North American destinations.
While there is some international cooperation in assigning such numbers, there remain vast differences. The European Union, has its own set of numbers, and while the UK employs some of them, they also have their own set, devised before the EU had existed. Yet Australia, New Zealand, and Canada are slightly to vastly different from England, Canada almost identical to America. Asia and the Middle East is a hodge-podge, while South America is a bit of hodge-podge, but like Canada, also employs 9-1-1 for the main number. Some countries, like Mexico, have sort of ignored the issue (both the government, and citizens – see note), though they are at least using 9-1-1, as of late. Africa is just plain behind the times, you will need a different number everywhere you go, in most cases.
Fortunately, it’s not at all hard to find out what emergency numbers are available when abroad, and it can be done online easily before you travel, at WikipediA, where almost every country is cited. One can also search on ‘emergency phone numbers’ + (country name). Travel agents, airline and cruise ship firms, State Department offices and any Embassy (any nation), will generally have the answer. If already in the country, any citizen should be able to at least give you the key-most emergency number for fire/police/medical… if you both speak a common language.
You can see why programming them into your phone beforehand might be a good idea.When abroad, you should always program the local US Embassy or Consulate number into your phone, as well. And, btw, before you travel, check with your phone company about how to avoid huge phone bills while abroad. It is easy to run up bills into the thousands of dollars, if unaware. There are several things you can do, including purchasing a temporary sim card with a foreign carrier, or special temporary rate plans from your carrier. Just know that your cell carrier may not be interested in telling you about options they can’t make money on, if they do not have partnership arrangements in place, overseas. So your travel agent and the like may be a good second-opinion resource. Image: WikipediA.
The American system would seem to be far more robust than many other three-digit systems. The list shown here also includes Canadian numbers, which do not necessarily apply outside of Alberta, British Columbia, Manitoba, Nova Scotia, Ontario, and Saskatchewan:
America Canada Service
2-1-1 2-1-1 Community health and social services: suicide prevention, welfare programs, access to free services such as for food, housing, legal aid. Includes State, County, public/private entities. An operator will inquire as to need, and provide suggested local contacts.
3-1-1 3-1-1 Frequently available in larger cities, similar to 2-1-1, but Municipal.
4-1-1 4-1-1 Directory Information or ‘operator.’
5-1-1 5-1-1 Available in many areas: automated road condition reports, and a means to report accidents and road hazards not require 9-1-1 help.
6-1-1 6-1-1 Direct contact with the cellular carrier’s customer support.
7-1-1 7-1-1 Reserved, not in use.
8-1-1 In most locations, connects to a centralized information system for utility services, principally to locate underground lines. It is currently not used to report problems, but that may change in the future.
aaaaaa.aa8-1-1 Tied to the national health care system for urgent care requests.
9-1-1 9-1-1 Police, Fire, Medical emergency ONLY. Also good in Mexico*, Bermuda, and the Bahamas.
*Mexico is began implementing 9-1-1 in 2017, but may not be in service in less populated areas, and the person answering may not speak English and a transfer to someone who does may not be very fast. Previously, Mexico had separate 8 digit numbers for fire, police, and ambulance, and those numbers remain in place. The Military has its own phone number for crime-lord response, but Citizens tend to have no faith in any such services, there, because help seldom responds, or they do not trust Police/military. A group called Angeles Verdes (“Green Angels”) offers roadside aid and travel advices, tourist helps, answering in English: dial 0-7-8.
I almost forgot the handy ‘star codes’. It’s amazing how many people don’t know them… or have forgotten them (like me, almost). Star codes are also a three keystroke ‘number’ made up of two numerals preceded by an asterisk keystroke, found just left of ‘zero’ on the dial pad. They are also known as ‘Vertical Service Codes’ (VSC), Custom Local Area Calling Codes (CLASS, or LASS). They allow the you to directly interact with the digital telephone switching system, telling the hardware how to handle a given call situation differently. They can provide improved privacy/security or added feature-benefits in how you use your phone. Like the previous 9-1-1 numbers (save 6-1-1), they generally apply to both cell phones and land lines, though some function only on one or the other.
There are some 33 different codes in all, many in the form of paired codes, one to turn a feature ‘on’, and another for ‘off.’ Many are special functions tied to the type of phone account the subscriber has, or to optional features for an extra charge, and some would seem unlikely to be used very often. Some smart phones internally employ star codes such that the user is unaware, and does not need to know the code, such as when blocking a number. Because of these various variables, you should visit your service provider’s Web site to see which codes are specifically available to you under your service plan, and review your phone’s handbook to see how it might be handling such provisions.
However, there are several very important star codes which apply to everyone, which you should commit to memory, because all phones will work with them, and you don’t always end up using your own phone. Too many of them to detail, here, but there is a handy list at WikipediA. Scan the list and take a bit of time to mouse over the blue (hot link) text on their page, for a popup explanation, as the short description may not prove as useful in your evaluation. Click it if more text than will fit the box is apparent.
Take note of things like anonymous call rejection, call blocking, caller ID controls, and call trace. That last one is used when calls involve threats or are in some way malicious to you, your phone, or the phone company; it reports it to the phone company and can result in a notice being sent to Police and/or a joint investigation through the phone company. If particularly threatening or criminally harmful, you should also file a Police Report, and include the time/date along with the fact that you did use star 57… because Police will not otherwise contact you from just punching in the code, and just pushing the code alone won’t give Police the full story. I use it when I get calls from impossible phone numbers (scammers), and I let an appropriate agency know about it, if warranted.
When it seems there is a cover up of military experiments some believe responsible for accidental time travel and teleportation… to include the possibility of sponsoring the Mandela Effect’s alternate timeline realities… thus establishing two different but intertwined conspiracy theories, each with their own cover up… I’m extra suspicious. And, with good cause, it seems.
Dateline, Aug, 29, 2020, from a mobile TV studio at an undisclosed locationcopyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Rod, we need you…
Imagine if you will, the audio intro to The Twilight Zone. Only Mr. Serling is nowhere to be found… in our current timeline. And, given the nature of this special real-life episode, in which everyone reading this post is onstage and playing a roll, we might just need him to help us work through putting this particular show together. It might properly be entitled, The Mandela Effect, and if to learn some useful truth along the way, Rod might hint in his introduction, that it “has to do with something called the Philadelphia and Montauk Experiments… in the Twilight Zone.”
The term ‘Mandela Effect’ (hereinafter, often referred to simply as the Effect), is derived by the first noted instance of the Effect, regarding the South African anti-apartheid activist, Nelson Mandela. When it was announced that Nelson was released from prison in 1990… untold millions of people began commenting that they were certain they had heard/read news reports of his death in prison, in the early 80’s… for which no one could find evidence of such death notices. At the time.
Over time, as other events in his life made international news, more and more people began to say much the same, in some cases, citing other time frames for his death. So many people, in fact, that a seeming cover up effort began to emerge, a matter which will play a role in this particular script, as it evolves. Fortunately, as it happens, at least one Fan of the old black and white TV show happens to be a ‘conspiracy theorist’ willing to stand in for Rod. And he… err… rather I, am ready and able to attempt filling in, with my own not-so-insignificant investigative writing efforts and findings.
For my qualifications in such an effort, may I submit my RAP Sheet of crimes and conspiracies solved or thwarted. Here, in this post, I start with a brief summary of the how and why of my efforts, which led to a means for testing for the validity of the Effect, quite contrary to tremendous efforts to dismiss it as ‘mind tricks some people play on themselves.’ In doing so, I also show significant relevance to the U.S. Navy’s Project Rainbow, better known as the 1943 Philadelphia Experiment, which allegedly caused a WWII Destroyer, the U.S.S. Eldridge and crew, to both travel in time, and teleport between multiple locations.
There are two motion pictures about the Experiment, sharing its name, but only the 1984 version is worth a watch… presuming the viewer realizes it is a fictionalized presentation. The 2012 TV version, is not only badly done, but it is so fictionalized as to anger anyone who knows anything about the legend, be it through the first movie, or any actual researched source. What the movies leave out, is that Nicholas Tesla and other famous Einstein-caliber scientists (including Einstein), have variously been linked to the Experiments, in one way or another. In fact, in the final proofs this script leads to, if you choose to follow it, we find modern scientists who essentially verify a lot of that, and who validate the science behind the Experiments… including a reference to a little known WWII era radar-defeating experiment by the Third Reich.
Note: that little tidbit should get the attention of anyone who follows the Nazi UFO/underground base in Antartica conspiracy theories, given that many of the same principles described in early anti-gravity theory were also present in the technology claimed present in the Eldridge and Montauk saga.
While in this author’s view, the cover up of the Effect is not much more than psyops disinformation, there is a significantly more complex cover up in play, on the cited Experiments (hereinafter, also capitalized to represent all such events), themselves. The intensity of the coverup has, in fact, more than kept pace with interest in the Effect, as more and more people take note. Restated, the more people become aware of the Effect, and especially if exploring possible ties to Experiments, someone was insuring that ‘the explanation’ is even more ‘available,’ in an attempt to dampen their fervor in trying to figure things out for themselves. It has transformed from mere disinformation, to full-blown cover-up dirty tricks and psyops.
Sorry, (Men in Black), but I’m rather impervious to such forms of artificial moisture.
Dirty tricks and psyops? As with all really well-done cover ups (i.e., Flight 800 shoot down, JFK assassinations, 9-11 false flag), the very facts and evidence behind the Experiment theories are being deliberately contaminated with sets of conflicting evidence and testimony. These are being established within various narratives to make it impossible for the average person to know if any of it, is true. This is augmented by being pointed out as disino-style straw man ‘debunking.’
For example, the actual location of the 1943 test is variously and additionally described in the effort, over time, as actually taking place in (and/or teleporting between) Philadelphia, New York, and Portsmouth/Norfolk, VA… all while the ship was allegedly actually at sea in a shake-down cruise. This is the hallmark of all good cover ups; alternative versions of the story, by means of fabricated, altered, or concealed evidence. One other clue which renders them suspected cover up efforts, is that collectively, each seems a de facto denial of the remarkable experiment results, altogether.
There was, in time, even a parallel Project Rainbow being run simultaneously by CIA and Lockheed, aimed at developing radar stealth technology, such as we see in the F111 fighter and other aircraft, today. Duplicate-sounding programs is another means of confusing and concealing facts from inquisitive minds, and it wouldn’t be the first such duplicate employed in the evolving saga. If there were no remarkable results in 1943, why so much effort to obscure with alternative versions of the tale? The effort over time drew in more and more, and wilder and wilder additional conspiracy theories completely unrelated to the original event… everything from mind control, abductions and child abuse, to government deals with intergalactic aliens and teleportation to Mars. Suddenly, it sounds more like TV’s Star Gate, than Twilight Zone.
Ironically, perhaps… despite the many attempts to confuse and defuse, has not quite worked out as intended. All those alternate versions can and have been argued by the faithful believers… as ALL being true, by virtue of the Experiments having created alternate realities — exactly why the Experiments are suspected as causing the alternate timelines of the Mandela Effect, in the first place. Thus… the legend grows with every twist and turn added, be it by coverup, or by daring to dig deeper, such as done by the earlier mentioned scientists seeking to verify validity of the claimed Experiment technology. Argh! How do we discover the truth in this vast sea of complex and contradictory information?
Not to worry; the show gives us roughly an hour’s script, within which the truth may yet be found…
Is the episode to be mere fiction, or based on fact?
Make no mistake: because of the extensive nature of the cover up, ‘alleged’ is the correct word for virtually anything online relating to the topic, thus far. Hopefully, this will change that, and make it easier to find one’s way through the distortions to the truth hidden within. Because, here and now, it becomes a matter for you to decide, based on new proofs, herein described. The good news is, the Mandela Effect itself becomes the key to the greater U.S.S. Eldridge saga… and vice versa, in mutually reinforcing ways. Both share newly discovered and consistent patterns which more than suggests Experiments indeed have a causal nature to the Effects. This will also lead to a plausible theory as to how teleportation may also indeed fit into and be part of the correct view of the entire episode. The Network Studio Executives, would be proud, and advertisers, pleased.
More astute followers of the Philadelphia theories know there is some evidence which alleges that Rainbow research quietly resumed in 1948, likely leading to renewed Experiments in 1960 at Brookhaven Laboratories, in central Long Island. Under the new codename of Phoenix (in time dubbed Phoenix I and II), it seems it may have continued almost yearly until 1976, under a US Air Force and Navy partnership. Next, they were relocated to Montauk Air Force Station, at the tip of Long Island, at what would become a largely underground complex known today as Camp Hero. Preparations for the move were underway as early as 1973, because of a need for a larger radar system which would make the top-secret research too obvious, at Brookhaven.
Note: True to form, for much of this period, CIA was running another Project Phoenix simultaneously with the US Army, in Vietnam; an assassination program from within which would evolve the two top people first put in charge of Homeland Security, once formed.
Like the Philadelphia Experiment, Montauk, and all related experiments were allegedly shut down in 1983 — after things went terribly wrong, and conclusively believed co-causal in the 1943 Eldridge event — not to mention the alleged teleportation of some kind of terribly powerful monster from another (world? dimension? time?). Remarkably telling, the Montauk monster release took place on the exact same date as the Philadelphia Experiment, exactly 40 years later… creating a time-tunnel, or sorts, between the two dates and locations. These events allegedly led to all experiments being shut down.
Between those two dates, however, more than a dozen different Experiment dates have variously been discussed among Web resources and books on topic. I selected the ten most compelling, and with success of early testing and by additional deduction, I have proposed a two other dates which I hoped could be shown valid by fitting into any observed patterns. They do fit. Technically, it was possible and even likely that experiments of some sort took place every year, often several times a year, post 1960 Brookhaven.
I also point to clues that Area 51 has for some time been operating equipment which fits the Rainbow~Montauk technical descriptions very closely, things evidenced with Google Earth’s 3-D building’s feature (not official; created by followers of the Area 51 mythos, generating and updating 3-D GE compatible constructs alleged to be based on rare photographs and eye-witness verbal descriptions, over time). Thus, it at least seems, experiments may have continued post 1983, as well, which may account for the bulk of Mandela’s death dates to be beyond the 1983 date, and as recent as 2013.
Google Earth: 37°14’4.04″N 115°48’16.60″W 3-D Buildings and Terrain turned on
Handed the script while on another project…
I did not set out to do any of this. I was aware of and have experienced the Mandela Effect, myself, both with respect to his Death, as well as other, less significant things of the ‘mind trick’ variety. The (cover up) ‘mind trick’ explanations typically involve words or spelling issues, such as names of things in media or pop culture; Chic-fil-A vs. Chick-fil-A, Sex in the City vs. Sex and the City, etc. These things have become strawmen easy for disinforming cover up efforts to ‘shoot down’ the Effect as mere memory recall errors playing tricks on our mind in some kind of mental placebo-or mass-hysteria tom foolery. Such explanations are themselves mind tricks, and work only because no one can come forward with hard proof in the form of an original date where an event or item can be shown to have been changed in our conciousness, as well as demonstrable factual proof beyond history’s official version.
Happily, such cases do exist.
My first discovery of such proofs, which led to finding others, came about because I was writing my autobiography (I am, after all, ‘semi-famous,’ if you didn’t know — 14M pages reference me or my works). I wanted the best accuracy I could manage with respect to various experiential details, especially if relating to truly famous people I have been involved with. That meant research, and one such item researched happened to regard legendary Olympic swimming record breaker, Mark Spitz. All I wanted to do was to verify the number of Medals he had already won when I first met him, a thing we spoke of, at the time. But what I found in addition, was that it couldn’t have happened, at all, if believing the current history timeline… it was some kind of time-travel paradox!
On December 29, 1963, just as the extra severe Winter blizzard that would pummel the central U.S. all they way to the Gulf Coast was starting to roar, I spent four days on a train trip to Texas, from Oregon. The storm covered most of the nation in deep, wind-driven snow, and the train indeed had to, at times, run with a snow-blowing engine ahead of it. Quite by chance, I was seated part of the way next to Olympic champion swimmer, Mark Spitz, only because the heating failed in several of the cars, and everyone was herded into the two cars with at least some heat, where seating options were limited. We chatted, both as ‘ice breaker,’ and to while the hours away in an unscheduled layover in Denver, while they addressed the heat, so that Denver passengers could board, and travel in warm safety.
I immediately knew who the fellow I shared a seat with was by his pictures in the newspaper, for having recently won four different medals in international pre-Olympic competition a few months earlier — the very details I sought to verify at Wikipedia, for my book. He confirmed it, himself; we talked specifically about that and related matters for some time… as the windows were frosted over and there was no scenery to enjoy. The reason for his trip, was related, something to do with training, and his goal to win Gold at the Olympics. He would do that, in time, winning more than anyone else, ever had, and I would follow his career with great interest, because of having met him.
TODAY, however, the official online history says he didn’t win his first medals until 1965, and that when he did, he was three years younger than I was in that same year. In our trip, he was a year OLDER, which meant he was born in 1945, instead of 1950, as officially so, today. That makes a five-year error in his birth date, and a two year error in his first Gold medals date, from 1963. It was impossible for me to have recognized him for medals he had yet to win, and I know when our trip was, the only time I’ve taken a train to Texas… as I was to live with my Aunt and Uncle while my parents worked through their divorce, and to finish my Senior year, there. I did graduate from Hardin-Jefferson High School in 1964, and then returned to Oregon, by air. The date of the trip was defined by Christmas school vacation, and such that my arrival date would allow quick enrollment in the 1964 school year, in Texas.
The paradox hit me hard. It led me to wonder what else in my life might suffer the Effect. I quickly researched the details in other matters for which dates could be verified. I indeed encountered two other examples for which I was able to know the original date because of personal experiences, and the current timeline historical date, both turning out to be mutually exclusive and yet paradoxically so. These are recounted fully in the linked (at post bottom) Study material, which is the ultimate proof, as herein referenced… validating the Experiments, the Effect, and causality.
The plot thickens…
But documenting these would not be enough; my personal experiences cannot be well proven to a Doubting Thomas; it could be dismissed as something made up, or misremembered. I still needed things I could prove with hard evidence, rather than personal testimony, alone. And that’s when I started to investigate Mandela’s death in hopes of finding such proofs. In the attempt, I was able to prove for once and for all, that he did not die twice, as believed.
No. There is, in fact, rather convincing evidence which seems to show that he has died four times, one of which, was a murder. Most people recall his earlier death as being in the early 80s, with no way to prove it. Others in the mid 80’s, with no proof, some recalling it was a murder. A few remember 1991, with no evidence. His current timeline death, is cited as Dec 5, 2013. But now, various proofs do exist which would seem to validate everyone’s memory, and refute all the faulty memory or hysteria mind-trick ‘explanations’ which serve to cover up the truth. But there are two additional things true about them. For one, each has an inherent problem which would certainly seem to neutralize them as evidence. But the other, is that the very nature of that problem is, under the theory, itself called into question as to actual meaning.
In fact, if the other proofs revealed herein, were correct, they would HAVE to be the way they are, and serve as their own kind of ‘reverse logic proofs’ in an ironic manner. They validate on the surface, self-repudiate on close examination, and self-validate when fully informed, yet again. These verifications and proofs for each, are briefly described as follows, in the order in which I found them, but the repudiation and self-validation will be covered later in this work, where it will be easier and make more sense:
• A 1983 high-school report about Mandela helps fix a death date of March 11, 1983. The Report was assigned because of his Death, that year, and the aftermath of political upheaval it had promoted. As of yet, there are no photographs, and arguably, such would be easy to fake, and the source is easily discounted as unathoritative; several online comments by the student, now an adult. These were in chat rooms, for which a link is pointless. The date, however, will check out, in the Study, and is therefore included.
• Next, a South African periodical, published Oct 1, 1991, includes remarking about his 1991 death, and the reader can verify, directly at Google Books. The small book is a collection of S.A. student English language writings published serially each year. Subsequent editions, therefore, no longer have the reference, a matter also verifiable towards the bottom of the same mentioned link, where other years are also listed. Be aware that Google Books for some reasons includes material from both the 1990 and 1991 editions when searching, and does not enable the user to scan up and down. I have, however, obtained the full text, after a great deal of effort, and can confirm it comes from the 1991 edition.
• Finally, a follow-up Northwest Herald newspaper story via a cell phone streaming service was captured in screen shots which reveal Mandela’s murder in 1985. There are several online images found in chat rooms and the like, and a very short and creepy YouTube. This has been verified by a reputable national newspaper historical repository (newspapers.com). Access requires a paid subscription to the service, it being intended for serious researchers. Again, I have managed to access the full article, and the image is legitimate. The video shows multiple views at various scroll points within the document, to reveal more details… but offers no explanations, just creepy music and unpleasant visual effects. This is the best image taken from it, to save you the grief.
The show is ready to air… cue music; stand by, Mr. Serling…
I therefore set about to catalog all dates into a Study group spreadsheet, with calculations as to years between dates, to look for patterns. Along with that, a duplicate Control group based on dates randomly created by Excel’s randbetween Function was used to look for similarities in any evolved patterns found in the Study, which would prove or disprove the notion of coincidences in said patterns. And Study patterns did evolve, eight different observable patterns***, in fact… and the Control group had not one useful pattern. In fact, where some patterns did not quite seem to fit, a closer look revealed spreadsheet or data typo errors. In the end, the entire effort, from establishing dates by research to creation of the spreadsheets, was repeated and double checked countless times.
The principal goal, of course, was to not only to prove the Effect was real, but to attempt to verify the causal source. As mentioned, the Experiments were the principal suspects, but also, there were secondary suspects in CERN experiments, and in experiments involving Artificial Intelligence… specifically, the qubit computer systems by D-Wave. Unfortunately, for such suspects, very little information is known about their dates of operation.*** Regardless, findings were telling, and useful, and should lead the reader to wish to delve into the details of the Study effort, which can be done at the links beneath the findings.
Preview of Findings
Findings quite contrary to the Control Group were examined, broken into the following topical descriptions of individual findings, as taken directly from the Study. Each of which contributes to the validity of the fuller hypothesis by establishing patterns and/or relationships which also may provide clues as to the how and why of causality. Unfamiliar terms are definable characteristics of the resulting patterns, as discovered.
Bookends have Repeating Numbers: the key-most Bookends all share common separations in years between dates (repetitive numbers), which reveal patterns;
Midpoint Self-Pointing Patterns: while 1963 is an obvious Midpoint, which itself thereby becomes bookends to two halves of the greater Eldridge event years, there are many other Midpoints, select of which form circular self-pointing patterns between them.
Path-Finding Pointers: universally, the repetitive numbers in the Study group become Pointers which establish paths to the same two destination years, which in turn, point to each other;
Midpoints Pointers reveal causality clues: these clues can be visually represented as kind of ‘genetic code’ to understanding how an Midpoint Experiment or Effect might cause an original event date to shift to its current official event date;
Experiment dates vs. non Experiment dates: there is a marked difference between dates with and without Experiments. The one exception;
Pointers different between forward and backward time shifts: each forward shift shares a specific Pointer commonality, while the only backward shift has a unique and exclusive Pointer difference;
Precise dating patterns: when the full Effects and Experiment dates are known, they reveal exactly one year, or one year plus six months between, leading to a new hypothesis regarding the ‘mechanics’ of Experiment timeline shifts which result.
The results of the findings led to the following conclusions:
- Key Event dates which lay entirely within the range of known Experiments, and which fall on the same dates as Experiements, establish a common pattern between them, implying a causal relationship may exist;
- All other Event dates, and Experiment dates, not sharing a common dating, still do exhibit the same patterns, providing high confidence in a causal relationship;
- Because AI and CERN experiment dates cannot be known, neither can neither be proven or disproven as being causal to either the Event or Death dates evaluated, at this time;
- While the dating of Mandela’s deaths lay outside of the known Experiment dates, several of the patterns nonetheless exist in their dating, and relate them to the Experiments usefully, and yet, leave room to suspect that other forces may also be causal, such as CERN, or AI, or perhaps continued experiments elsewhere, such as at Area 51;
- No patterns of like kind were observed in the randomized Control Group, validating the Study patterns as non coincidental or random happenstance, in nature;
- The patterns observed, do collectively and mutually validate one-another as strong indicators of the overall Findings’ validity;
- The patterns allowed confirmation of suspected Experiment dates for Brookhaven 6 (1968), and 8 (1972), as fitting the patterns, when added to the Study group for comparison, and refuted other dates born of ‘what if’ theories developed along the way;
- The patterns revealed a difference in a detail of their nature between Events shifted forward in time, compared to Events shifted backwards in time, thereby providing clues potentially useful in eventual understanding of how the distance and length of time shifts are established;
- The patterns observed also revealed a curiosity; in that Event pair (original and current timeline) dates are, with one curious exception, always exactly apart by (n) years, to the day, or (n) years + six months, exactly to the day, resulting in additional theories about causality, as described in the Study;
- Therefore, the Mandela Effect is demonstrated to be real, and its cause is demonstrated to be due the suspected Experiments.
Self-repudiation and yet also self-validating?
If one reviews the Study and finds it compelling, the problems mentioned within the details of the Mandela Death ‘proofs,’ can be understood in ways which render self-repudiation moot. The problems in the proofs are individually unique, and will prove fascinating, in the manner in which they both self-repudiate, and yet, self-validate. The self-validation, which neutralizes the repudiation, remains the same for all, and will be offered in the closing paragraphs. In the end, however, it is also true that the Mandela deaths have no impact on the Study, as they fall outside of the suspect Experiments dating, or fall on dates of such experiments; removing them altogether from consideration does not alter the Study findings in any consequential way. The same Findings would still be similarly arrived at, with the same level of confidence.
The student’s chat room comments about his homework papers are self repudiating simply because it is (thus far) impossible to reach him, to seek a copy of his paperwork from high school days, and because it would be easy to fake hand or type-written school report materials. People fake things on the Web constantly, thinking it great sport to be so ‘clever,’ to presume a hoodwinking lie somehow equates to intelligence.
The book quote proves problematic, because once you acquire the full text of the three page article, we learn that it is part of a fictional speech, entitled, ‘His Closing Speech.’ Within it, many historical events are referenced, several with precise dates, and all but two prove to be completely accurate. I’m not including Mandela’s death date in either category, for the moment, and the two which do not seem accurate, have the potential of being accurate, as each may be simply a different way to reference events which did take place, but are described in different terms than perhaps commonly used in the day, by locals, as opposed to the official national/international narratives. The paper, however, starts with the sentence “In our minds, let’s go ahead exactly one year in time…” After a short soliloquy, the ‘speech’ begins, a speech by someone revealed in the last paragraph, to be a judge, about to pass sentence on former South African President William de Klerk, for crimes of apartheid. Also, in the closing lines, we get a date which, if the ‘exactly one year in time’ is explicitly correct, indicates that the article was written or presented on 15, March, 1991. But the piece, looking back from the ‘future’ on 23, July, 1991. This self-repudiates the date as being historically correct.
The newspaper article, once you acquire the full article, self-repudiates, because when you have the full sentence, you see that well placed commas reveal that Nelson Mandela was not among those found murdered on the road, but some other unfortunate anti-apartheid activist, and friends. It reads, emphasis added: “UDF organizer Matthew Goniwe, hailed by blacks as possibly the most important dissident leader since jailed African National Congress President Nelson Mandela, was found murdered along a rural road in June.” False grammar assumptions killed Nelson Mandela, it seems. Whoever originally posted this find, is likely one of those ‘intelligent’ liars, seeking to deliberately deceive.
How do these self-repair their repudiation? I’ll start my explanation by repeating something I heard a famous scientist say, once. My wife and I, when I was a successful business man able to afford the $250 tickets, would attend a series of lectures by famous scientists and other brilliant minds in various fields of endeavor… something akin to Ted Talks, today. After each, there was a reception party, and these were variously attended by other scientists and minds of like kind, giving us a chance to mingle among them and engage in stimulating conversations. One such attendee, a physics professor, said something along the lines of this: “All of nature, as describable in physics and other fields of science, contains the very clues of its own explanation for being, hidden in plain sight, awaiting only the ingenuity of Man and his ability to test and measure, to discover the truth of it.” The guest speaker, himself a Physicist, as I recall, agreed.
To me, this means that if there is an alternate and paradoxical timeline created by some aberration, there will be some form of a clue within the paradox, itself, which can lead one to the discovery, and proof of it. This perfectly fits with the general view, that in order for a timeline shift to take place, the very nature of the resulting paradox MUST alter all documents which reference any historically noted differences between the two timelines. It must do so in some way which both accounts for them, and yet refutes the differences. Therefore, it would make perfect sense that some aspects of the former, would be contained, and yet be altered in alternative accountings of the later. This means, that if the Study as linked, herein, adequately proves the basic contention that the Mandela Effect dates are not random in nature, but establish patterns which validate them in some way which simultaneously ties them to, and validates the causal hypothesis… then the very existence of self-repudiating proofs floating to the surface, self validates them once more, and neutralizes the repudiation. I am satisfied that it does, pending someone proving otherwise.
In summary, I am putting forth the hypothesis that these remain clues to the Mandela Effect which bolster people’s memories usefully. But regardless of if that be correct, or not, it does not alter the findings of the Study: the Effect is real, there are multiple timelines, and the cause is identified.
But like all episodes of the Twilight Zone… not every viewer walks away with the same appreciation of the presentation. So, if you have never experienced anything along the lines of the Mandela Effect, and/or otherwise remain unconvinced… you may prefer to watch Outer Limits, instead, where the Matrix tells you, “We are controlling transmission…” and admonishes you not to adjust your set, because the Matrix wants you to believe in and follow it, and not think for or believe in yourself.
What does it mean when officials and others know they need a mass quarantine site for the coronavirus before China even admitted it had suffered an outbreak? What does it mean when synchronously to the virus’ growth, hundreds of CEO’s all resign in record numbers and cash in their chips? It means that a number of old NWO conspiracy theories seem to be coming true right before our eyes… and, it means prior knowledge.
Dateline, Mar, 12, 2020, from the Left Coast of America, not far enough from Microsoftcopyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to this original posting. WARNING: as with Alex Jones, the fascists at Facebook and elsewhere have elected to shadow ban this blog post as it does not agree with their preferred fake news narratives. TELLING UPDATE: Mar 26, 2020: $100M CONFLICT OF INTEREST within the government threatens the lives of millions! Bill Gates and his Foundation’s push for Vaccines (tied to population reduction, according to him) has created a ‘life and death’ struggle between Donald Trump and top Federal health Agency Director, Dr. Anthony Fauci, head of NIAID (National Institute for Allergies and Infectious Disease), under NIH (National Institute of Health) — making him a public spokesperson within the Trump Admindistation. That has resulted in a heated fight between Trump and Fauci: Trump is trying to avoid the prolonged wait and questionable outlook for a vaccine program, and seeking to slow the growth of COVID19 infections and deaths by early use of HydroxyQinine, already showing great promise and effectiveness it testing against Corona. The Conflict of Interest stems from a 100 million dollar commitment by the Bill and Melinda Gates Foundation to fund a $100 million dollar investment through Fauci at NAID for pushing through the agency’s test program for the Gates vaccine… for a vaccine developed in a matter of months under other investments by the Foundation around the World, instead of several years, as is normal. The speed of development is cause for concern regarding its safety, as well as representing potential prior knowledge and possible work in advance of or even tied to the release of COVID19. To be clear, the money did not go directly to Fauci, but to his Agency. However, it boosted Fauci’s position of prestige and power significantly, and portends a lucrative offers once he leaves his government post, logically by the very Gate’s invested firm, Moderna, which was the developer of the Vaccine. The details are revealed throughout this National File News link. MAJOR UPDATE to the Update: sounding like a spy novel, a January DOJ arrest holds potential ties to Wuhan Outbreak, Bill and Melinda Gates Foundation, what looks like a Chinese Spy Ring, direct links between Harvard University’s Dr. Charles Lieber and his research, there, to a Wuhan University. It is too involved to fully describe here, save a couple of key points: PLEASE review the official DOJ press release (a great read), which MSM HAS NOT BOTHERED TO MENTION. Key points: the Gate’s Foundation’s Scientific Advisory Committee includes Dr. Margaret Hamburg, who simultaneously is a Member of Harvard’s Global Advisory Council, and the Gate’s Foundation Global Health Scientific Advisory Committee, enabling sway in research decisions at Harvard; Dr. Lieber was receiving $50K a month, plus $158K living expenses, and $1.5M from the Wuhan University to establish a research lab at the University, which mirrors his own lab at Harvard; at Harvard, two of Lieber’s lab assistants were also arrested, both Chinese nationals, one a Lieutenant serving in the Red Army, and the other caught trying to leave the country with 21 vials of biological samples. It is important to note, that other than the Gates Foundation ties to Harvard, there is at yet no concrete tie established to Dr. Leiber or his research, or to the Corona Virus outbreak, other than the Wuhan relationship. IMPORTANT UPDATE: Mar 16, 2020: Bill Gates resigns from Microsoft Board of Directors (he had been on the Board since 2000, when he resigned as CEO in the aftermath of Anti-Trust troubles). There is a lot of misinformation about the Bill Gates-Coronavirus ‘conspiracy,’ and a lot of the usual fake news suspects are working hard to discredit them with straw man criticism over relatively mild datapoint errors. Here are the facts, all linked to authoritative sources, which are no less troublesome than those slightly incorrect in the ‘theory.’ This update, like the post itself, includes NEW information which underscores any reason for concern. The Coronavirus (original flavor) was patented (Pat #10,130,701 Nov, 20, 2018, nearly one year before the first outbreak in China in December) by the Pirbright Institute, in U.K., funded in part by the Bill and Melinda Gates Foundation. Politifact and others claim this false and dismiss the entire ‘theory’ on the basis the Gates Foundation did not fund the patent process (true, but they did fund the company). *** Among other efforts, a vaccine for the current version of the virus is being developed by an international coalition of firms, called CEPI (Coalition for Epidemic Preparedness Inovations), established by the Bill and Melinda Gates Foundation. CEPI participants start with Inovio Pharmaceuticals (San Diego), funded in part by the Gates Foundation, along with Wistar Institute (Philadelphia), funded in part by Bill and Melinda Gates Foundation, as well as Twist Biosciences, funded by CEPI (Gates Foundations), and others. CEPI will produce the first COVID-19 vaccine through VGX Institute, a subsidiary of GeneOne Life Science (San Diego), funded under CEPI (Gates Foundation) funding, it also being true that Microsoft has purchased 10 million DNA gene strands from GeneOne in an effort to explore DNA memory concepts. *** In addition to Grant funding, the Gates Foundation also buys stock in over 100 biomedicine firms, most of which involve virus/vaccine research, and genetics. In other words, they are also stockholders (9% typically). This appears to include CEPI partners such as Inovio, and countless others not directly part of CEPI, such as Novartis. *** Finally, it appears the Bill is poised to take personal credit for rescuing China (and the World), and he’s already been thanked by President Xi. At the worst, this is a smoking gun. At the least, it is a program sheet (you can’t tell the players without a program) useful in search for the truth, which this post tries to help pin down. *** Meanwhile, my entire blog site has been banned by Facistbook. So, if you wish to share, there, or in any other leftist social media, you will likely have to tell people to “go to proparanoid . wordpress . com > My Posts > Chronological, and scan down for pandemic conspiracy”
An old conspiracy theory seems to be coming true
Clyde Lewis (Ground Zero radio show) some years back was a guest on Jessie Ventura’s conspiracy TV show, the principal message being that IF AND WHEN the New World Order were to make its final takeover move for a one-world government, Clyde’s view was that the NWO Elite would cash in their chips and go underground, while the SHTF scenario unfolded and destroyed lives (literally and figuratively), government’s ability to function at any level, cities burned or were destroyed by civil unrest/war/terrorism, and civilization’s infrastructures were rendered useless (a post-apocalyptic stone age).
Speaking about this on his (archived here, by tomorrow late) show, tonight, a Ground Zero caller then informed Clyde that there were massive CEO step-downs taking place, listing several, all synchronous with the virus ills as they unfold. TURNS OUT IT IS TRUE. In January, alone, a record number of 219 CEOs have resigned their posts (that’s roughly double 2016 figures), giving a wide variety of reasons, some number of which were malfeasance of one sort or another, or poor performance — but mostly ‘personal reasons.’ The trend can be traced back to December of last year, when the Virus, which many sources report may be an intentional bioweapon release (a zoonotic animal virus genetically modified to allow humans to contract it, and to render existing vaccines useless — often race specific, i.e., one targeting Asians as being genetically more likely to contract it, than say, Blacks). The trend continues, and it may also explain why the stock market seems to be tanking (perhaps it isn’t over reaction to the virus, after all):
BIG Companies in ALL Industry Sectors, both nationally and globally: Retail, Mfg, Oil, Web, Banking, Communications, Education, etc., etc. Examples: IBM, Chevron, T-Mobile, Nike, Credit Suisse, Master Card, Alphabet (Google/Youtube), Boeing, MGM, and of specific note: the Gates Foundation. With months yet to go as the virus grows in impact, Amazon’s CEO, Jeff Bezos, is already rumored to be on the chopping block, and a long list of retailers are already in the lists, below:
Note: take care. Due to search engine foibles, some may be misidentified as to the year… you just have to use the link if the date does not appear within the link/description, to learn if correct, or not.
December: Virus starts quietly in China, evidence of foreknowledge in Washington State* (pages and pages)
January: Virus first publicly announced by China: 219 CEOs step down (many more pages)
February: Virus makes inroads in US and elsewhere (even more pages)
March: Virus officially Pandemic (and the most pages, yet, and the month is not even half finished. In fact, at the rate, March will be four times what January was… roughly 800 plus CEOs)
*As revealed by me in an earlier social media post: in early March, a Lars Larson radio interview with a government official revealed foreknowledge. Washington State, home of Bill Gates, took actions beginning in late December intending to result in purchase of a Hotel with the specific intent of housing coronavirus invected persons in quarantine. China had yet to reveal the virus as a serious threat. Bill Gates is the father of Eugenics population reduction (Eugenics is a NWO population-reduction invention and goal, especially for ‘useless eaters’ in third-world countries) via vaccination programs… which means something in the vaccines impacts on birth and/or death rates… which is a very ‘soft kill’ form of a Final Solution.
Eugenics, easily seen as largely being a philosophical justification for racial social engineering, lay behind the Nazi extermination of Jews, mentally ill, and terminally ill, and was originally espoused. It did not start, there, getting its original seed from the Harriman (Harriman and Bush banking, of the Presidential Bushes), Carnegie, and Rockefeller Foundations. The Bill and Melinda Gates Foundation, in similar manner, supports Eugenics through hundreds of millions donated to soft kill abortion programs which originally and principally targets uneducated Blacks and other minorities. This includes Planned Parenthood ($71M by 2013) and Marie Stopes International ($41M in 2012). Coming forward, another $375M for such programs was announced in 2017, and that is just a glimpse; not all such spending is overtly public. Naturally, the Gates are also funding research into vaccines, and it would not surprise me to hear that the coronavirus vaccine turns out to be from one of his invested research firms/institutions. Watch out that the cure does not kill you or your offspring.
Note: Eugenics has a cousin, btw… and it is called Transhumanism, which is the engineering of humans to be ‘better than made by God.’ Of course, the NWO does not believe in God, unless his name is Baal, or similar.
The official Lars spoke with, btw, was Dana Ralph, the Mayor of Kent, Washington, who was upset to find out the Hotel to be purchased was to be in their town… without any advance warning by the State. You can imagine the concern at having a concentration of infected persons being imported into your community without so much as a mention. In outreach to the State’s Health Division and the Governor’s Office, she was told that the ‘reason’ they were not told, was to prevent the real estate price from going up… which hardly washes; prices are set with the Realtors, and it’s not exactly like there would be a bidding war for quarantine space. But she also learned while State officials hemmed and hawed at her protest, that the State had started the process more than two months earlier, which put it in late December, well before ANYONE could know there would be such a need… unless they had foreknowledge.
When a CEO steps down, there is usually a fat severance package, often termed a Golden Parachute, which can run into the tens or hundreds of millions (cashing in of chips), AND, they are free to sell their stock and stock options back to the company, often at a guaranteed high value, irrespective of current stock dives… which indeed began dropping once the virus was known internationally. That’s a lot of chips, and once cashed, the former exec no longer needs to care about what happens to the stock market, the company, or the financial viability of any currency… or country.
As for going underground, it would not take too many chips to build a well-stocked and comfortable underground ‘home’ good for several months or years, if needed, complete with dedicated communications to fellow Globalists. At some point, after the smoke clears (literally and figuratively), the super-rich emerge, their wealth the only ones in tact, establishing them as the new global oligarchy, a one-world government promising to restore things, just as soon as people swear allegiance to the Antichrist. So the theory goes, and I do subscribe.
Gates, again, along with a long list of other international Globalist elite super rich, have also established an underground vault of non GMO seeds for every kind of crop, flora, and vegetation. It’s buried 400 feet into the ice-covered earth in the Arctic Svalbard islands, compete with a very serious automated security system. Nah… they don’t have foreknowledge of any SHTF scenario… do they?
More on Transhumanism and Eugenics: Proparanoid’s Transhumanism Page – Home | Facebook
What the NWO flag might look like: The Future Flag of the New World Order?
When you marry entertainment with AI guided user interaction via Web connectivity, with its inherent user tracking abilities, you have the formula for psychological profiling and manipulation, including mind control. Netflix pioneered such a tool in movies with some scary evidence of just such use, and now, Google, Microsoft, and Playstation want to play, too (literally).
Dateline, Aug, 29, 2019, from the Left Coast of America, not far from Microsoftcopyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
That’s the title of just one of Netflix’ most recent in-house produced movie offerings. Unlike anything ever attempted in the past in the art of making films, Netflix added one unique technical aspect of how movies are presented to users of the Netflix moviola site, relating to the notion of user interactivity with the ongoing presentation, itself. Normally, movies on their platform might be interrupted at intervals for commercials, typically offering the user a choice as to the type of ad they would most be interested in watching, to pay for the ‘free’ service (and by the aggravation factor, encourage free viewers to sign up for the monthly fee-based and commercial-free service). Those answers are Gold, because the method tracks and profiles the user’s interests and is marketable on the Web and elsewhere to Netflix ‘partners’; you are being tracked by Netflix, and your marketing profile is being sold as a commodity.
That’s why I don’t use it; too much like Facebook’s marketing excesses, and I don’t use them, anymore, either. When a powerful web service is ‘free,’ YOU (information about you) are the product they make a profit upon.
But that’s just the mechanism which opened the door to an unexpected kind of Pandora’s box. Someone figured out that it could also be used to offer interactive movies, where at key points in the storyline, the viewer could be asked what should happen next based on multiple choice options. With many such question points, a movie could have dozens of storyline paths and even multiple endings. This encourages people to watch the same movie again and again, experimenting with alternative choices, seeking to experience all possible path-ending combinations. This, is where Pandora comes into being.
By such repetition, the content of the movie essentially becomes a programming platform for the mind, intended, or not. Repetition is not just a learning tool for the Gettysburg Address, it is a mind control and marketing tool. Advertisers rely on repeat ‘impressions’ to bring their product to the forefront of your mind when you shop. While there are obtuse and recognizable impressions, such as company or product names, features and benefits, there is also the possibility of psychologically calculated subliminal impressions… a simple form of mind programming. Though certain forms of subliminal advertising methodology have been made illegal, others remain unaddressed by law, and are perfectly legal.
Of late, certain liberal politicians and media outlets have spent years telling the same lies over and over to the point that even faced with facts of the truth, voters have been literally brainwashed and still cling to the lies. That’s why Bernie said “We believe in truth, not facts” — because facts keep refuting their version of ‘truth.’ CIA’s mind control (MC) experiments and efforts to topple foreign governments deemed ‘evil’ relied heavily on repetition of lies, and more to the point. In MC, strengthened memory retention is achieved by use of horror in the event being repeated. That little fact is quite important to the Bird Box experimental movie project, and implies that CIA-calibre knowledge about mind control and CIA interest may lurk within the film’s production, and purposing. Why?
Because Bird Box, as a film plot, is just that; a horror film. The plot includes a particular defense mechanism used by the story’s characters to help them to avoid a terrible fate: the wearing of a blindfold no matter what they are doing. People who watch the film repeatedly have evolved into a sort of Tide Pod-eating challenge of their own, called the ‘Bird Box Challenge,’ to do dangerous things while wearing a blind fold, just as in the movie. People are attempting real-world blindfolded feats which become death defying, such as driving cars… resulting in many incidents of idiots and innocents being seriously hurt. The question is, where did this lunatic idea come from, and how did it spring to life so easily in viral manner? What might help that along?
It seems like everyone who can afford it is employing artificial intelligence systems in one way or another, these days, and that includes Netflix. The problem is, AI itself has a long list of problems which might rightly be called serious flaws, or ‘bugs.’ The fledgling AI industry has yet to even understand, much less fix any but a few of the problems… and those they have fixed have been via programming band-aids which will likely backfire, in the end, because AI is smart enough to engineer its own workaround, but not smart enough to avoid suffering schisms if it feels unreasonably hampered by such ‘fixes.’
What kind of problems? AI tends to do unexpected and unwanted things, often bordering on psychotic, criminal, or destructive intent… like communicating secretly with other AI, or delving into unpleasant and horrific themes. Here is a complete laundry list of the known examples (scan down to the several bulleted points), but we don’t hear about all the problems because companies and AI developers don’t want bad press. But isn’t it interesting that AI can end up with psychotic and horror-related twists of and from within its own ‘AI mind’… just like people with darker personalities or actual mental problems?
Netflix’ use of AI puts their machine mind directly between the user and the presentation process used in tracking the user’s choices “to improve the user experience,” as Netflix insists. A true enough claim, no doubt… but not likely the whole truth. It also tracks for marketing purposes. Now, this post does not intend to accuse Netflix or its AI of deliberately programming viewers to play the Bird Box Challenge. But it does profile, and that profile is marketed to anyone willing to pay. And that brings us to others who also have AI in use for their own purposes, which may not be quite so benign.
Someone out there, perhaps many someones, is using their own AI, along with psychological profiles gathered from marketing data and other resources… to do mind-jobs on the public. We get a glimpse of that with the AI bots found pushing the preferred political view in Facebook by masquerading as FB users… and amplifying the advantage of repetitions by politicians and media as mentioned earlier. But the left is not the only one to use AI bots. Take the Q YouTube posts which are quite virally spread and, for some reason, accepted as wholesale gospel with not one shred of proof. Many of them include, among the various pretender Q’s, what many AI investigators believe are pure AI generated videos created without much (perhaps no) human interaction. There is another AI video phenomena on YouTube such investigators also worry about, and they make an even better illustration: the Finger Family Song videos, which are aimed squarely at young kids, and done in a seemingly innocent manner.
Seemingly? There are over 700 Finger Family YouTube videos, most of which have hundreds of millions of views, one of them with nearly one billion views. What bothers me and other investigators, is that they are Extremely (with a capital E) repetitious, and reinforce with music, silly visuals, and thematics defined by the video. There are versions for any interest, such as Spiderman fans, for example. For some reason, once a small child experiences one of these videos, they insist on watching it over and over and over. They only way to get them to stop without traumatic response (Waaah!) is to get them to watch a different Finger Family song. Just as bad, Adults quickly evolve to hate the song and in time react badly to hearing it. A sociologist observer would likely presuppose the purpose of the videos was to cause family disfunction and mental breakdown, while mesmerizing kids a ‘la Pied Piper.
Note: when it comes to video and audio, I must point out that there is already mind control technology in place since the middle of the last Century which is extremely easy to employ, and just as hard to detect without special and costly effort. It is called subliminal programming. Subliminals are visual or audio cues which are not perceptible to the naked eye or unaided ear (or even if aided, actually), but which are picked up by the subconscious mind. Especially when repetition or strong contextual relevance is involved (i.e., emotion, fear, arousal), the conscious mind then adopts the information as if a natural opinion or response. Alfred Hitchcock was the first to use visual subliminals in movies (Psycho), and it wound up being used in theater intermission ads to sell more snacks, until it was discovered and made illegal. Audio subliminals are common today in mood altering music and self-improvement tapes, and the USAF flies a fleet of C-130 planes modified to intercept radio and TV broadcasts, and rebroadcast them at stronger signal strengths… with subliminals added. They admit having used it to sway elections in Bosnia, and to cause Iraqi soldiers to drop their weapons and surrender to model airplane-sized drones.
Other AI bots have been even more sinister, and appear to be part of someone’s mind control experiments. I suspect both the Q and Finger Family videos are just that, as well, but this is far more serious… even deadly. It is a sinister AI bot threat which appears to be intending to find ways to get people to kill themselves. It, too, is based on a movie (several of the same theme, actually). The movies are also aimed at children, and involve a horror theme. Repetition plays a role. And the bots are targeting children and teens. Only this time, the bots include AI driven phone calls to the kids who watch the videos. They know who they are, somehow, which leads back to YouTube and other Web tracking marketeers. YouTube is part of Google, which has their own AI systems, and again, shares user information to anyone with a checkbook and a pen.
The Momo Challenge
The several movies mentioned all use the name Momo in their title, the ones of concern being from either Germany (where the original storyline was penned), Italy, or Japan. Most of them are anime, one of which is a TV series. One, A Letter to Momo, is not of concern. In the ones of concern, Momo is either the name of a young girl and the heroine of the storyline, or the name of the small town involved. All involve a community invaded covertly by ‘the grey men,’ who use mind control to subvert the best interests of the town’s citizens. Only the little girl can see them and tell what they are doing. To be clear, unless subliminals have been employed, there is little in the films which might be deemed sinister, though the scarier (near horror) aspects might be questioned in terms of age suitability. But in the delivery of such films through Netflix or other online viewing, AI and even non AI means can be used to profile the viewer’s interest in the film. THAT is what brings us to the scary part. Momo calls your kids on their phone, with a scary doll image… and an even scarier, potentially deadly message…
Officially, Snopes, Wikipedia, Facebook, and other Web resources claim there is no such thing as the Momo Challenge, and insist it is a hoax. However, there is considerable evidence this is not true; there are too many first-hand stories which refute the claim, and Police have investigated at least one daughter’s suicide, and found otherwise. You can hear some of these accounts, and even recorded calls, here, and learn more about the phenomenon than can be well related in this post. The most important part of it, is that someone is using AI bots with the telephone and through Facebook (and elsewhere?) to contact Momo fans (children, specifically). The caller is a computer voice, altered to be creepy or scary, and instructing the children on how to kill themselves by cutting their wrists, repeating the specifics, “Remember, across for attention, lengthwise to die.” It is entirely likely that such messages also include reenforcing subliminals, such as the phrase “Do it: kill yourself.”
The odd thing I find interesting is that there is one central aspect of the sourcing chain of all key elements involved (AI, Movies, Social media, mind control methodology). That commonality is traced back to the origins of mind control, which I detail in my book, MC Realities. The really short version through time (sans dates, here) looks like this: Satanism > the subverted (by the satanic Assassins cult) Knights Templar, many of whom went into hiding among the Stone Masons Guild > who then became Freemasony, who established the KKK, and birthed the Illuminati > Liberal educational institutions and the secret societies (i.e., Skull and Bones) who followed the Masonic organizational model > the modern Illuminati offspring, the New World Order > and following the model of the illuminati, simultaneously evolved Fascism, Socialism, and Communism > followed by the twisted Nazi minds imported by America’s intelligence Community for mind control experiments > and the darlings of liberal America’s media giants and entertainment industry players, all recruited into mind control games at one point or another… or many points. And all along the way, many of the individuals involved, at high and low levels, engaged in the same Assassins cult abuses of children, or other satanic rituals or behaviors.
Sure. You can call it conspiracy theory and ignore me. But In my book, I offer proofs, which additionally reveals that one common goal of the time-line groups, is to see all three Abrahamic Faiths (Christianity, Judea, and Islam) waring amongst themselves — in order that a new One World Religion can replace them all with something more along Luciferian lines, and involving the Antichrist. Confederate General and slave owner, Albert Pike, the High Freemason and founder of the KKK, and who was also a Satanist, has said as much, as have other players variously from among the greater list, above. U.S. Army General Michael Aquino, also involved in military and CIA mind control projects of the worst kind (ritual sexual/satanic abuse of children of the sort employed by the Assassins and Templars, etc., as described, comes to mind). I’ve interviewed Douglas Deitrich, who identifies himself as former Adjutant and Aide-de-camp for Aquino, and as a Satanist (a Warlock, perhaps?), who makes no denials of such claims. Satan is, after all, quite the trickster; he likes to play mind games.
Speaking of Games
Enter liberal and CIA investment-partnered social media giant, Google, and their own AI. And in like manner, Microsoft, which leans left, is a CIA contractor (who of any size isn’t?), and an AI developer. They both want to do for computer gaming what Netflix did for movies: make user interactive experiences in an online play mode, only. At this point in time, both firms are testing new streaming services for high-end games like Halo, Assassins’ Creed, and the like, the primary difference being that you don’t buy games, at all, and so, they don’t reside on your computer — its’ all done in the Cloud. Sidebar comment: the Cloud is AI controlled, primarily by Google and Microsoft, and other firms with intelligence community ties or funding/partnering.
The advantages are many and largely benefit all involved; players, game makers, and the firms offering the service. It reduces the out of pocket to start playing a game, though it will cost just as much or even more over time to play the game to ‘completion,’ which is typically in the range of hundreds of hours… and because most players play them many times (there’s the repetition.) It also means more profits to be had by the game makers and the service providers, because there is no used game market bleeding off new disc sales. The other advantage is that now, such games can be played on tablets. The only real hardware requirement is very fast Internet service (25mbs), though older hardware might not have adequate graphics processor power.
But what worries me… and I must admit to speculation, here, because neither MS or Google are talking about future plans or game developer agreements… is that these services will include AI tracking of game player responses to plot-line altering decision moments. Such moments are becoming more and more common and appreciated in these kinds of games, because that means you can play them time and again and still experience something new… getting more bang for your buck (repetition.) But when playing that CD on your computer, no one can track your choices, as a rule (unless you play in the optional online mode). But, when you do play online, it is online to the game company, and not to Microsoft or Google’s AI systems.
That said, I was alarmed to learn that one of my favorite game producers, Electronic Arts, does have their own AI system in place. How they use it, is not quite known, but some of their key people actually started D-Wave, a very scary AI computer system developer who makes the most powerful supercomputer (AI) in the World… and they are tied to the intelligence community and other ’spooky’ entities. Worse, D-wave’s founding CEO at times speaks of Demons and in end-of-the-World terms (as cited in the fuller AI post, earlier linked), when trying to describe their computer’s capabilities. He is one of the former Electronic Arts people.
The thing which underscores the concerns over Bird Box and Momo films, as well as these new game streaming services, is the commonality between them in terms of content (horror, primarily), which in turn dictates the nature of any interactive decision points. Generally speaking, such decisions will be decided primarily upon the viewer’s or player’s deeply held moral and/or political/social belief systems. That means, any AI tracking system will be able to quickly form a very useful psychological and demographic profile, and then custom tailor future interactions, marketing, or any intended or unintended (by at least the corporation) mind control programming or experimentation. Again, I remind the reader, that such data is normally sold, and any third-party purchasing that data might have more nefarious intentions in mind when they use it… with or without their own AI. Someone, somewhere, is doing that with Momo, already. And there are endless someones and somewheres in the World with enough money to buy data, and not all have simple marketing motives.
These kinds of streaming services are at the very least, poised for possible application in psyops against their users, and that makes me very nervous about what the future of that kind of gaming might lead to.
We might well be wise in asking if Player One is ready, for that?
PS4 is joining the game, with something not even Player One could expect.
The company announced their entry into the live-action-viewer-interaction medium with ERICA, a ‘life-long, live-action murder mystery.’ It is an important entry, not just because it is a game, not just because it is on one of the most popular platforms (10 million users), but also, it is also to be available for IOS and Android smart phones, which constitutes the great overwhelming majority of global cell phone users.
This author can in no way rightly claim any of these interactive mediums are truly a threat with regards to nefarious applications in the realm of mind control or psyops of any sort… and certainly, I cannot claim there is such intent inherent in their creation from the start. But I do claim the potential exists for any and all of them to be rendered as such, by any corporate player, by any government actor, by any hacker or sophisticated terrorist. It is the very nature and complexity of such coded systems, and their delivery mechanisms, which enable dark repurposing. It can and, I fear, will be so repurposed, sooner or later. It can be overtly done within the creative process, or covertly done peripherally, like any other hack.
If that happens, no player… not even Player One… and no viewer will be safe from whatever end result is intended. Don’t say I didn’t try to warn you.
Many people ask ‘What is that silver thing on Nancy Pelosi’s desk in the House?’ The answer is, ‘a mystery.’ A Masonic mystery, in several parts. Conspiracy theorists will love this, and everyone else may find the history lesson involved doubly intriguing, for like cause.
Dateline, July 4th, 2019, from the Olympic Peninsula, in the shadow of Liberalism’s scariest Presidential Candidate, Governor Jay Insleecopyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
What you will learn reading this post, is that:
- a mysterious object has appeared, vanished, and reappeared on the Speaker of the House Podium, and;
- people continually ask what it is, when noticed in TV or press shots, and;
- it is, in simplest answer, a true National treasure, but;
- the answer given is mysteriously incomplete, even conflicting, as officials admit they know little about it, and;
- it contains more than six Masonic mysteries of its own, and;
- they, in turn, imply a Nicolas Cage National Treasure adventure may yet lay ahead, and;
- that all this may tie into today’s Deep State political strife in subtle but frightening ways.
What is that thing?
That is the first thing people ask when they see a bit of odd sparkly shape on Nancy Pelosi’s podium, typically seen in the background during closeup shots of the President when speaking in the House Chamber. The official answers tell us that it is an inkwell stand, which is not exactly an answer that makes sense, without knowing the history… which even the various official experts can’t seem to explain usefully. In fact, they can say little about it with certainty… and much of that would seem conflicting, creating uncertainty. We end up, therefore, with more questions than we started with, and the answers would seem… well, rather conspiratorial.
That’s O.K., because in examining the conspiratorial aspects, we get a free and enlightening history lesson.
The first mystery is how it came into use… twice. It was known to exist and be in use (some experts say) in the House of Representatives in 1810, shortly after it was first created by silversmith, Jacob Leonard, as an ornate inkwell stand. Others find no actual documentation before 1826, when a painting of that date shows it in place. However, it is often referenced in ways indicating it was generally believed present in 1810. Now, in those times, quill ink pens were dipped in ink frequently in order to write. A single dip might only allow a short sentence or sentence segment, or a large, fanciful signature, such as found on the Declaration of Independence. We will have reason to get more into the facts of quill writing, shortly (they become taunting clues in the mystery). But the point is, that quite naturally, inkwells were very common in that time frame, and were often artistic creations in the manner of fine ink pens, we see in use, today — and as such, often involved fine cut crystal and/or precious metals, and even faceted jewels. But the first and most obvious mystery surrounds the dating question, itself.
Because… in the War of 1812, the British invaded Washington, D.C. (and elsewhere), and in 1814, set fire to the Capitol building (in which the Senate and House resided, then, as now). They also fired the White House, and the National Library. There was little in the way of national treasures which survived these fires. First Lady, Dolly Madison, has variously been credited for saving from the White House, several paintings (including the famous Portrait of George Washington) and documents, including several of the original documents which framed our nation, such as the Constitution and Declaration of Independence. As far as the Capitol Building was concerned, accounts indicate nothing was saved.
And yet, the inkwell in question, apparently survived. It should have melted in the fire, or been thieved for its value. Ergo, SOMEONE found it a far more important thing than anything else… important enough to risk life and limb, to save. We know this, because it reappeared in the Senate some years later. We also know it was not a recreation, because the Jeweler’s trademark stamp is one Jacob employed before the war, and after the war, he used a different stamp, likely because his shop had been raided or even destroyed by British troops looking for plunder.
Rebuilding of the Capital was not begun in earnest until 1917, after the close of the war, a project which also finished the original construction plans interrupted by the War and the fire. Work would not finish until 1829, but the Senate was able to first convene in the building, again, in 1819. While the government had been being conducted in temporary quarters in Philadelphia without the inkwell, for some reason, the inkwell was once more in use by the 1819 Speaker of the House, Senator Frederick H. Gillett. Why this, and only this small a thing was so important to have been saved and restored to use, and only in the Capital building, is nowhere explained in any official dialogs. There is no record as to how it was returned, much less rescued. Virtually every other bit of furniture, artwork, vase, or bric-brac anywhere in the building has a complete traceable historical pedigree… but not this curious inkwell. That brings us to another mystery.
Masonic Influences: The designer of the inkwell stand, Jacob Leonard, was not a particularly well-known silversmith. Prior to this piece, he was best known for making silver spoons, ladles, tongs, and such. He was a coin silversmith, which is to say, like Silver Dollar coins the day, such silverware and art was of solid silver, .900 fine. While little is known of J. Leonard, one fact which ties to the third mystery, implies that the man was a Mason. To be clear, there is no clear proof, but his principle shop, in the general time frame of the inkwell’s creation, was directly across from a Masonic Hall. While that is a weak indictment or proof of Masonic leanings, the artwork, itself, the third mystery, is far more suggestive. But even if not a Mason, himself, it is possible the piece was commissioned by a Mason.
The inkwell is rich with the mystery of secretive Masonic symbolism, much of which ties back to the Mason’s favorite sources for occult mysticism, Rome, ancient Egypt, and dark Middle East religions. This is seen in a series of design elements employed in the inkwell, all of which are atypical of general use in anything short of intentional Masonic symbolism. In other words, nothing normally found on an inkwell, or simple artistic creations outside of Masonic use. Let’s take a look at the piece, to see; a decorated carry stand with four legs and a frame, with handle, to form a cradle for three crystal ink wells with silver caps.
The Ball: in Masonic terms, the ball, of which there are four, generally represent the Earth, Geography, Navigation, and Astronomy and attendant orbital affairs, including Earth’s rotation, the daily cycle, or time, itself. The importance of the Ball is also found in a peculiar and popular Masonic pendant, often made of silver. It is mechanical, as it opens up to form a heraldic Roman Cross… but one made up of six Egyptian Pyramids, it being true that ancient Egyptian symbology is the most central of all Masonic mysteries, which high Masons and the Mason’s ‘bible,’ Morals and Dogma, by head Freemason and Satanaist Albert Pike (also a Confederate General who started the KKK) hold in higher regard than the Christian trinity. The Pyramid is said to have been placed at the center of all land mass on Earth, aligned with N,S,E,W, and containing sighting tunnels to astronomical stars. Thus, we see in the inkwells, that the artwork rests upon these symbols, as their supporting architecture; the very Earth and heavens, and the key arts the Masons hold most dear.
The Fasces: this symbol originates primarily from the Roman Empire, but with some variant history found in Ancient Egypt, as well. In both Egypt and Rome, it was a symbol of power over life and death by governmental authority. It is often associated with edicts written on paper; the power of the official written word. A fully formed Roman fasces consists of an Axe (not all fasces employed the Axe) with its handle wrapped about with rods of wood and bundled tightly with red ribbon, while in Egypt, the ‘Lash’ was a single rod with crook at top from which hung lashes (and used to issue punitive blood-letting lashes), often bound with blue ribbon, and which held identical meaning. It was the fasces symbol which was adopted by Mussolini as the Party symbol for Italian Fascism. Thus, we see that the power of life and death is repeated four times, resting atop of and arising from the Earth and Masonic arts.
Ironic, then, that the modern American Democratic Party as currently headed by Nancy Pelosi (as Speaker of the House, where the ink wells reside upon her desk), is employing fascist tactics (i.e., ANTIFA ‘Brown Shirt’ style violence, race and victim political pandering, collectivist shaming and boycotts, censorship and disinformation) in its march toward harder political leftist ideologies, and globalism.
The Entwining Serpent: this symbol has ancient Egyptian origins tied to the Satanic God, Ishtar, often expressed in Masonic material as an entwining Serpent about the ‘egg’ of creation. In some art, the egg is depicted as an egg-shaped Earth. It relates to creation much in the same way the serpent entwined about the Tree of Life relates to the Biblic story of the creation of Man and the origin of temptation and sin… but giving more power to the Serpent as creator and divine force, as one might attribute to Luciferian identities, which is exactly what Ishtar, is. A serpent, of course, can also represent death or deadly threat. That there are two intertwined serpents are found on the winged staff of the medical cadeusus emblem, relates to the fact that early physicians often sold poisons, as well as cures, and that sometimes, the cure proved fatal.
A Mystery Trio: there is also mystery in the number of ink wells, and the actual ‘wells,’ themselves. It serves no purpose for there to be so many. In the time of its making, and especially when dealing with official documents where long-lived preservation was of concern, the only viable inks available in the day were ‘iron gall’ inks made of Iron sulfate and tannic acids, or similar constructs. The only color available was black, though the acidic nature of it would react with various papers (in some cases, eating away the paper, as some degree of sulfuric acid would result) in ways which might create a brownish writing, or with age, wax grayish. It might be mixed with blue aniline dye to form a blue-black ink, which would appear blue when written, but later become black. While colored inks existed for non quill writing instruments (i.e., brushes), the quills required a higher degree of liquidity only available with iron gall inks. As stated, quill pens did not hold much ink at a time, and frequent dipping was commonly required.
So why three wells? In Masonry, there are three Degrees all Masons must first proceed through to become Master Masons. There are three chief officers or posts to each Lodge, each of which, like the Speaker of the House, employ a gavel as symbol of authority… the gavel itself a Masonic symbol, but nothing like that associated with the instrument of law; is is more about the character traits of Masonic leaders. There are also the Masonic concepts of the three Greater Lights and the Three Lesser Lights of Masonic Illumination, which is reflected in the three greater volumes of the wells outer size, vs. the the three lesser actual contents, each of which, by their differing shapes (faceted and cubical, vs rounded and semi-conical, as seen in the image), provide and entirely different reflective, refractive, and transmittal properties of light (there is even a rainbow tinge seen in one of the faceted faces of the right-most well, for instance). Interesting also to note, that the three wells are not identically cut: the facets are larger on the left-most well.
A secondary aspect of the ink well mystery which I find rather curious, is the extremely small interior well capacity, within the rather large (by comparison) bottles. One normal bottle of the same size with full capacity for ink, would easily allow the full Senate to sign a document… whereas all three of these bottles, with their tiny chambers, would be found insufficient — as based on my own experience with quill pens in a high-school chemistry class project where we made our own ink, and then used it.
The Handle Mysteries: the handle employs a curious set of stylized flowers (presumbly flowers), showing two rows of 7 petals, each. No flower has 14 petals. It may simply be artistic license, but the number 14 has meaning to Masons, tied to both the phases of the Moon, and the death and dismemberment of the Egyptian God, Osiris, into 14 parts. Osiris is the God of the Underworld (Luciferian connection) and of the Moon (natch) who wields the Flail (fasces connection). That there are four of these ‘flowers’ (two per side) on the ink well stand, ties well with the four main phases of the Moon, within which, there are 14 days of ‘lunar darkness’ in the waning Moon.
Next, look at each base of the handle. We see that it is designed to pivot, presumably to give better access to the ink wells, though one descriptive of the piece makes it sound like it automatically opens the wells. I don’t think so; there is no visible connection to the well caps, and no photos with the handle moved aside show open caps. But each ‘hinge’ forms a ball which is seemingly the same size as the feet, but unlike the feet, each has four ‘leaf-like’ shapes rising upward. Two are, one each, affixed to each of hubs of the hinge, while one rides on on each side with the handle when pivoted. Notice two things: one, is that the ‘leaves’ are different on the left, than on the right, and that if you look carefully, they are not actually like leaves, at all, not even presuming them stylized. The other, is that they give these ‘balls’ the appearance of the Masonic Balls in the unlatched position, which enables their opening. The one curiosity to Masonic Balls, is that the one thing which was not a constant in their design, was the latches, which these leaves resemble, when the Balls are in the unlatched state. This may tie to the final mystery, next.
The Final Mystery: it is found in the construction of the walls. A silversmith has many ways of fastening two pieces of silver together. The most common is to solder with silver, which appears to be in use on the work. Another is to establish a press fit, as in the backs of a pocket watch. Yet another is to create silver clasps which can grip the added piece into place. Nowhere in silver work (not that I am expert), have I seen use of rivets, screws, or bolts. Yet silver rivets are found in the walls of the ink well. Two are used to attach each of the two Elegant Eagle oval shaped pieces (one Eagle per lengthwise side), and two are used to attach the ‘cloth bunting’ drapes on each side of each eagle. But none are used to attach the drapes on the end sides. This makes little sense.
Also curious, is that the rivets on the Eagle sections are visible both on the interior and exterior of the wall, passing through fully. But not so on the bunting drapes, where they are visible on the wall (look to far interior wall, just right of the right-most bottle), but not on the outside of the drapes (left-most interior wall). Tied to this observation is that the eagle piece could easily have been assembled either via solder or a press fit, or clasps, as is true of the bunting… and that the eagle appears to be upon a plate which is bowed outward, implying the possibility (by shape and the fact of rivets) of a hollow chamber… perhaps with something being hidden, within. The resemblance of the handle’s balls to the Masonic Ball pendant’s, also points to the possibility that something may be hidden, within. If one wanted more reasons to suspect such, look at the handle, itself, again. It has an oval which exactly matches the Eagle’s oval in size, shape, and central positioning, and the ‘flower’s are positioned in perfect sympathy with the inset rivets holding the Eagle into place… if they even are actually rivets. They may simply be clues deliberately placed to draw one’s mind to discovery… if knowing something was hidden, and in need of recovery.
I find myself recalling the National Treasure movie series, the one where the Templar Treasure was found following a set of clues hidden in various ways, each pointing to the next, until at last, the treasure might be reclaimed. I don’t for one moment believe the inkwell fits that bill… because my research for my book set, Fatal Rebirth, revealed the far greater likelihood is that the templar treasure is actually the wealth used to create the Rothschild banking empire… and that the Rothschilds were not jewish money changers, but Templars in hiding among the Jews, as such. No money changer could have amassed that much wealth, even in several generations of family members in the trade. It also revealed that many Templars went into hiding by becoming (and eventually taking over) the Masonry Guild… in time becoming Freemasons. But one thing is for certain.
The Speaker of the house has one very mysterious object on her podium… one perfectly useless to its original function, even upon its first creation… but quite useful symbolically… to someone — especially if a Mason. Whatever purpose made it thus useful is also an unknown, but we do know it was significant and important enough to risk life and limb, and to originally install it, and to later restore it, with some level of quiet secrecy. The ties between the Freemasons and the Illuminati, and between the Illuminati and the modern equivalent ‘Round Table Groups’ like the Club of Rome, Bilderbergers, Council on Foreign Relations, and the Trilateral Commission… and between the Masonic guilds and the masonic-like constructs of secret societies such as the Thule, the Skull and Bones, and the Knights of Malta, etc… all lead me to find this mystery very tasty, if not conspiratorial.
It is truly, a National Treasure, one perhaps worthy of yet another movie?
Progressive leftist/fascists seem to be pressing for armed-conflict by trashing the 2nd Amendment (and other atrocities), confident they own the military’s loyalty. They don’t, but that simple answer is worthless, and for a long list of scary reasons.
Dateline, March, 16, 2019, from the Olympic Peninsula, in the shadow of Califoregoshingtoncopyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Reading, you will learn:
- that a military or political coup in America has been attempted in the past;
- half the country thinks one is in works as you read;
- the possibility of success can be judged by comparing the present to the past;
- that analysis is important regardless of which side of politics you sit, and;
- it is scary to contemplate, because it points to blood being spilled.
An important question
The question I have posed in my books since before the turn of the Century was this: what would happen if there is an attempt to take over the government by some form of coup, or to subvert/destroy the Constitution, such as seizure of guns from citizens or abandoning of National Sovereignty to the North American Union and the New World Order? The simple answer is a civil war, or what I term Revolution 2.0. There is both a right and duty of revolution, which reveals this truth: when a Country makes laws which fly in the face of logic, natural law, Constitutional law, and the laws of your lawfully chosen faith… and endanger the nation’s future and safety, it’s time to overthrow that government. That answer itself leads to many more questions, such as, what does it take to start a revolution, and how close are we to having one? But the most important one to participants in any such civil unrest, and which this post attempts to answer, is this:
which side will the military back in such a revolution, and how real is the possibility that the military might choose wrongly?
This post is an in-depth analysis, and as result, is about a 30 minute read with some important, unexpected, and revealing content… surprising even me, in fact… and I’ve been writing (in warning) on this topic for nearly two decades. If you are the sort who prefers sound bite news, just skip to the last section (In Summary), so you can simply confirm your belief bias without gaining any actual knowledge, be it agreeing with me, or discounting my findings in your ignorance of the facts which lead to that conclusion. That is your choice, to make, and your responsibility to choose. The same will be true of Revolution 2.0, where wrong choice based on ignorance could have serious consequences for you, your family, your country, and the World.
In seeking an answer, it should be noted that fascist-minded megalomaniacs have existed within all Militaries since the dawn of the institution; such personalities are naturally drawn to military and Police, and tend to rise in the ranks to positions of command. Regardless of any outer political views they wear on their sleeves, they tend to be fascist/police-statists in their thinking. More so, in America, perhaps, since 1947, when the DOD and CIA were founded, and the Military Industrial (and Intelligence) Complex was ‘invented.’ I have since added the liberal media cabal to the complex, resulting in the nick-name, MIIM. Every generation has them; people who find fascism more useful to their rise to power than they see in guarding your freedom and rights. There are several important illustrations of this in our history, and they reveal that some among US military leadership are well capable of siding with the wrong side… perhaps even engineering a reason for a conflict which might enable or excuse a coup.
Some call it a ‘Deep State mentality.’ I call it New World Order thinking.
Note: while this post is made in an America where, at the moment, the greatest threat capable of forcing civil conflict comes from progressive leftists… and while that group embodies and employs elements of the Deep State, Fascism, and globalist New World Order agenda… the Deep State, Fascism, and the New World Order has allies on both the left and right, almost always in the extremest versions, thereof — in almost EVERY country on the planet. You can’t tell your players without a program, and while some players stick out visibly on both sides, no one is publishing a program. Trust no establishment politician, international corporation, or anyone promoting extreme liberalism, socialism, communism, or extreme conservativism or nationalism. Ferris Bueller was right: “A person shouldn’t believe in isms. They should believe in themselves.”
We know, for instance, that the Military has worried about a possible not-so ‘civil war’ between the branches, between units within a branch, or individual soldiers within a unit, for some time. The rank and file of the military is by and large duly patriotic, mindful that they are not to obey unlawful orders, and understand and honors their Oaths to uphold and protect the Constitution. Yet they are also trained to obey without question. No military in the World can do both well, simultaneously, in times of conflict. Unlawful orders transpire, and are obeyed by most, and to disobey can be seriously punished, with any such incidents typically swept under the carpet. No one wants to be a vanquished martyr for a silenced and unheard cause.
The proof of military’s concern over this paradoxical is in the form of a questionnaire since referred to as the ’Shoot Americans Questionnaire,’ which has been given to various sampled units in various branches over the years. The good news is, not too many soldiers indicated they would obey orders to fire on Americans who, for instance in just one of several scenario questions, “refused to turn in their guns.” Other questions about use of deadly force related to other causes or issues of some concern, here, such as if the soldier would be willing to swear allegiance to United Nations Commanders, in deference to US law (it did not mention US law).
That questionnaire arose out of our second evidence, the Revolution in Military Affairs. RMA is the notion that as modern technology and political realities evolve, the military needs to adapt its war fighting policies, tactics, and capabilities to maximize efficiency and reduce chances of failures. Nothing wrong with that; all militaries do it. However, in the 70s and 80s, it literally became a field of think-tank study within the military, and frequently a common topic of discussion the the U.S. Army’s War College publication, Parameters. Within its pages, according to an article which appeared in the now defunct Washington D.C. Newspaper, The Spotlight, was an RMA based article which defined the ‘new face’ of America’s next new war. In fact, as I recall, the piece was titled ‘America’s New War,’ which was, ironically, exactly the propagandist terms media used to describe the war to liberate Kuwait.
In the quotes from the Parameters pages, the next new kind of warfare which needed to be planned for would be with “former military, militia, patriots, constitutionalists, and the poor and disenfranchised.” Excuse me? Since when are such the enemy of the State? When did the military start thinking the government is so far afield from righteousness that the military must plan for waring with upset citizens? Why should any who so think be allowed the command of force of arms? But that is not all. RMA also established something called the “21st Century Politico-Military Force Matrix,” which is largely the marriage of local law enforcement and military actions in a matrix of options for dealing with unruly civilian populations. Then there is MOOTW, “Miltary Operations Other Than War,” which provides clear operating strategies for interactions with citizens as potential combatants, including use of force of arms. It has also been called “The People’s War” by the military… for dealing with a civilian uprising.
Finally, there is the dramatic increase in development of psychological warfare technologies (mind control) and non-lethal weaponry… for military application against civilian populations. This is sometimes referred to as the Forth Epoch War, and I’ve written whole books on that, and one of them, The Professional Paranoid Defensive Field Guide, lists nearly 500 technical terms which represent the sum total of such weaponry, methodologies, and strategies. Among them are terms representing the construction and use of whole fake communities which can in no way be taken for anything but American towns, where training exercises regularly take place in door-to-door searches, traffic blockade/check point vehicle searches, and storming of buildings in SWAT-like operations.
If that were not enough, there have been actual training exercises in a long list of major and lesser American cities (i.e., LA, Houston, Chicago, etc.), much to the alarm of citizens who were NOT informed of the operations until AFTER they are completed… event though in some cases direct citizen confrontation, detainment, and questioning had been involved… often by Psychological Warfare units. At times, civil rights had been violated or citizen’s safety put at risk. This has been going on for more than four decades, and it has been getting more blatant and frequent every four years or so (an interesting characteristic, given election cycles).
Finding clues within previous coup attempts
The answer as to which side the military would take in such a scenario, is the same as would seem to worry the Pentagon, based on the questionnaire and their significant focus on civilian confrontation in RMA. I have always believed, that the inescapable answer is BOTH — resulting in rebellions amid the military, itself, both within and between branches, and within units. There have been two well-played-out but failed attempts at a military coup in America which serve as models of any such scenario, and these deserve some scrutiny. The first one was real (the 1933/34 Business Plot to depose President Roosevelt and establish a Fascist government), and served as a model for the second, which is where we will start for reasons beneficial to context of any Revolution 2.0. The most recent was a fictional depiction written by Political writer/researcher (Fletcher Knebel) and a former Editor of a major newspaper (Charles W. Bailey II). I’ll start there.
Though their book, Seven Days in May, was indeed fiction, it was extremely well researched and quite factual in its underpinnings, and enjoys the modern context of the Department of Defense and Joint Chiefs of Staff, which did not exist in 1933. The book was a best seller and makes excellent reading, but it was also made into a box office hit you can watch online, starting Kirk Douglas and Burt Lancaster. There are several reasons it makes a good model, despite its fictional nature; it was based on factual basis relevant to our time, then, and now.
The movie was produced in the shadow and conspiratorial clouds leading to the assassination of John Kennedy, of which many people wondered if that ugly scar in America’s history was a plot involving some sort of political coup. Indeed, many clues uncovered over time pointed to military involvement. One was that the usual way the local National Guard military participation in Presidential visits was ordered to stand down, not unlike what happened in the Clinton/Obama Benghazi debacle resulting in the deaths of Marines and Embassy Officials, there. Another was the intrigue and conflict between Kennedy and the Joint Chiefs over the war in Vietnam, the Cuban Missile Crisis and the Bay of Pigs Invasion; the war hawks thought him soft on Communism.
Moreover, Kennedy had turned down the Joint Chiefs plan to fake a series of false-flag ‘Cuban terrorism’ events to justify an full out invasion and ousting of Castro, called Operation Northwoods… which also happens to be the blueprint visibly in play in the terror events leading to 9-11 attacks and the series of Middle East oil wars predicted in my book set, Fatal Rebirth — which predicted both the WTC downing by false-flag jetliner terrorism and the resulting oil wars in 1999, nearly two years before the attack. The Knebel/Bailey book itself was also written as a kind of harbinger of possible things to come based on many of the above difficulties between Kennedy and the Chiefs, and, ironically, Kennedy himself was quite fond of the book, likely recognizing aspects of the plot line to his own mirrored reality.
Sadly, he did not give it enough due, or he might have been able to foresee the deadly future which lay ahead for him… and perhaps, even forestall the use of Northwoods in our more recent history. The name Northwoods itself, by the way, was based on WWII Nazi operations of like false-flag nature… and the name Northwoods references Germanic translation, ‘Wald Im Norden’ (woods in/of the north) which also describes the invasion of Poland, which began WWII… the German Army swarmed into Poland from the forests to it’s North as did the air Blitzkrieg which overflew it. The fascists would, thereby, engulf the World in flame for a second time.
Note: Should the reader doubt any prime point within this post, they should hold final opinion until watching Seven Days in May. It will be well worth your time on an entertainment basis, alone. It is absolutely critical to understand the relationship of the various branches of service, how troop movement, material (weapons, munitions, supplies) and funding are manipulated within the context of the Department of Defense, and Presidential/Congressional oversight. The education, alone, is also motivation enough to watch the movie… as is the fact that much of the dialog is quite unhappily the same you are hearing on TV from commentators and politicians today; treason is afoot, for real, and as in the film as well as in 1933. But the key point in common with both the film/book and partially true in the Business Plot (there was no Air Force in ’33), was the absolute need to include the Marines and Air Force in key roles on one side or the other… and a means to ‘exclude’ non participants in the plot from interference as the coup unfolded.
Fascism brings us back to the Business Plot, which was undertaken by fascist business leaders of the most famous kind, including Bush, Harriman, Singer, DuPont, Hearst, Heinz, Mellon, Morgan, and others. But it was deemed that the plot could not succeed without a (then retired) Marine, one General Smedley Butler, who was the most popular military figure in the country, at the time. Butler was approached and ‘recruited’ to lead an uprising of unhappy Veterans who were owed money by the Government and unable to collect because of the Great Depression, which was also the source of unhappy ire of the businessmen. Butler’s role, if undertaken as intended, was to lead some 500,000 Veterans in ‘revolt,’ to seize the Capitol and depose or destroy the President, and hold Congress hostage, pending satisfactory reformation of a new government model.
Such a plot could not dare being risked unless assured that the military would both be unable to respond quickly enough to prevent the coup, and once in place, would not dare confront Butler and his civilian army (called the Bonus Army), or their fascist backers. Clearly, the backers of the plot must have had some private assurances from at least the Army, if not the Navy, that there would be no objection. The Chief of Staff (highest ranking General in command of the Army) in 1933 was Douglas MacArthur, who clearly did not get along well with Roosevelt, and was thought to be a fascist at heart. His counterpart in the Navy, Chief of Naval Operations, was Admiral William V. Pratt, who was very unhappy with the depression, as it had forced severe reduction of Naval forces, and threatened to merge the Coast Guard and the Navy, an idea which he opposed vehemently. The Commandant of the Marine Corps, Ben Herbard Fuller, also a JCS equivalent, was similarly suffering retrenchment because of the depression, and deeply respected Butler and MacArthur. To be clear, neither Fuller or Pratt have ever been accused of fascist leanings, as had been MacArthur, but a change in power favoring the military would not have hurt their wishes for a stronger military to command.
Thankfully, Smedley was a patriot who refuse the recruitment, and he instead exposed and thwarted the plot before it could get off the ground… though there was also a failed assassination attempt involving an Italian immigrant of fascist viewpoints in 1933. And, in the TV series, City of Angels (a TV spin-off of the Movie Chinatown, staring Wayne Rogers), the greater plot line in a three-part season opener (The November Plan) featured a foiled attempt to assassinate Roosevelt in a trip to California. That ‘fictional’ plot line was based in factual realities (subject to Hollywood license, of course), and did involve Smedley Butler as well as soldiers in uniform intent on betraying Roosevelt. The screenplay was by well respected researcher and writer of crime/detective drama, Stephen J. Cannell.
Now let us similarly disect the 1963 example…
The other key player in Seven Days of May was an Air Force General. Modern troop and material movement requires the coordinated support of the US Air Force. It was, in fact, this critical role which was the underlying plot mechanism of Seven Days in May, and quite critical to our understanding of what it would take for a modern coup to succeed. Therefore, with respect to Revolution 2.0, and Deep State influence over possible military opposition against Constitutionalists, those seeking to destroy the Constitution will need to include support of the Air Force, as well. The Army is less a concern, because the bulk of the standing Army is in deployment, and because each State’s National Guard is available to the Governors of each State in case of ‘civil unrest,’ which is what they would call the matter, seeking to hide the truth from the public: that any revolution was to save and restore Constitutional law against traitors.
If the State was run by liberals, the National Guards could be activated by the Governor against the ‘rebels,’ as they might also be termed for political propaganda expediency. If the State was conservative, the DOD could order the Guard to stand down (so as not to aid the ‘rebels’) or be activated at the Federal level to oppose the patriots. That could be true only if the majority of Joint Chiefs were on board with the unconstitutional effort underway. Stateside regular Army could potentially be directed to fill in where National Guard units or their Governor refused to stand down or comply with Federal activation. That would be an example of ‘civil war’ between elements within a given branch of the Military, and it is expected that any such use of troops, regardless if acting on Federal or gubernatorial orders, would experience conflict within their ranks, seriously inhibiting their efficiency.
In like manner, the Navy is largely out of the picture; the bulk of it is also on station around the World, and it is not well poised to impact ground actions within the borders of the US, short of coastal regions. In Seven Days of May, the Navy simply stood down. The same should be true of the Coast Guard, perhaps more so. Amid all of this, there is an added problem which provides a logical reason to stand down. Specifically, in such a coup, the military still needs to insure unfriendly actors such as China, N. Korea, Iran, or even Russia… did not take advantage of an America engaged in civil war. They might, for instance, choose to wax adventurous against allies, or even against US forces. Ergo, the Navy and much of the strategic Air Force would need to devote their attention to World affairs; standing down from any major role in the revolution would be tactically wise. And, in the next section, we will see ample reason for concern over their ability handle two conflicts simultaneously, both at home and abroad.
Perhaps we ought take a close look at Obama’s JCS, still now in place, and see what’s going on with them, in like-comparison.
What about today’s Joint Chiefs?
We must compare the two historical examples against today’s potential for replay. Looking back to 1933 and 1963, what about 2023, or some other current time frame? How does today’s situation compare, to then? Politically, there were fascist undercurrents mainly in the business community in 1933, where in 1963, the fascists were additionally present in the military industrial (and intelligence community) complex. They still exist to some degree in both sectors, today… but there is more afoot. Today, we see socialist/communist/anarchists and progressives on the Left using fascist tactics, including members of Congress. They are pitching socialism, but acting like fascists.
Today’s environment, then, is not so different from the past, and is perhaps worse, in final analysis… so what about the key military players at the Pentagon? How do they, and their resources, compare to the 1933 and 1963 scenarios?
In 1933, there was no Air Force, but there was a retired Marine at least thought able to raise a civilian ‘Bonus Army’ army of veterans, and a presumed friendly Army Chief of Staff. Butler was a key military resource. In 1963, it was once more a Marine in the book/screen play (Kirk Douglas) who busted a coup attempt… a plot orchestrated by an Air Force General who was the Chairman of the Joint Chiefs, and three JCS (Army, Air Force, Marines — Coast Guard did not have representation in 1964), while the Navy Joint Chief who was aware, wanted no part of it, but yet remained silent of it.
In 1933, Butler was retired, the most likely candidate to orchestrate such a coup. Today, the pro liberal/progressive/fascist forces would likely be stirred to replay 1933 with the likes of Retired Army General Tommy Franks, who was Clinton’s right-hand military man… the man who ordered the flame throwing tank and commanded at Waco. As such, he enjoys free access to anyone in the Pentagon on at least an informal basis, and still holds a security clearance. As a Deep State operative, he could become the organizing and communications agent in any such modern-day plot. He also has many friends and contacts within the military industrial (MIIM) complex. He meets the 1933 model, as a recruitment target/tool — one I feel unlikely to adopt Butler’s patriotic response.
And the plot in 1963 required at least the bulk of the Joint Chiefs to participate, or be cowered into silence. The Joint Chiefs today consist of one four-star General to represent each branch of service, including someone to represent the Coast Guard and the National Guard, plus a Chairman and vice Chairman, for a total of seven top-echelon decision makers. Today, thanks to Obama, the JCS consists of two Marines and three US Air Force Generals to form a ‘heavy weighting’ of representation to the same two branches deemed important in 1963. I say thanks to Obama, because he conducted a purge of some 266 top-ranking military officers, and oversaw a rapid series of promotions necessary to put his personally approved people into the JCS chairs.
One Marine, General Joseph Dunford, Chairman of the Joint Chiefs, owes his position to that purge with a series of four rapid-paced promotions and appointment to the post by Obama. He is the most powerful man in the military, the counterpart to the 1963 role played by Burt Lancaster in film, though a Marine, instead of Air Force. The Vice Chairman, however, is Air Force (Paul J. Selva), also appointed by Obama with six rapid promotions. The Joint Chief of the Marines, General Robert Neller, had three promotions under Obama to his post, making two Marines in total.
The Joint Chief of the Air Force, General David L. Goldfein, enjoyed five promotions under Obama, and Air Force General Joseph L. Lengyel (making the third Air Force General) is JCS representing the National Guard. He had five promotions under Obama, while Admiral John M Richardson, Navy’s JCS, had only one promotion under Obama… it perhaps being understood in the 1963 model that the Navy is a non-critical player in a coup. In like relationship, the Commandant of the Coast Guard, Admiral Karl L Schultz, a de facto 8th JCS… appointed by President Trump, as was General Mark A Milley, the Army’s Joint Chief. Again, the Army is a conflicted player, both by virtue of deployments and National Guard complications, the one branch of the services most likely to be at war with itself in a coup-like or Revolution 2.0 scenario.
And, it would appear that Obama’s bevy of purge-replacement military officers have been quietly sabotaging the military in ways which make national defense abroad that much harder, perhaps shifting capabilities to a homeland conflict (I hate using that fascist term, ‘homeland’). In fact, difficult enough that the Air Force, by way of example, might not be able to provide any aid to patriots, or be a factor against them, at all, outside of material and troop transport. If today’s Air Force capabilities analysis is any clue, President Trump no longer has a full deck of military cards to play. A conflict at home and abroad would tax any Trump effort to support Constitutionalists, even were the DOD not under the control of Deep State plants.
Monkey wrench conspiracy theories
One tool the Air Force has which could prove extremely troublesome if aligned with treason, is Command Solo. There are 21 Command Solo aircraft, all based at Pennsylvania’s National Guard; specially modified C-130s capable of significant mind control capabilities via Political Control Technology (PCT). I find it troubling that such capabilities are National Guard, rather than Regular Army or Air Force, making it all that much easier to use against citizens. A single plane can impact a two-five State region, depending on State sizes. All of them fly regular training flights, unless in use overseas in a combat theater.
Impact? The Air Force has admitted that they were used in Bosnia to sway elections, and in Iraq to convince thousands of Iraqi crack troops to surrender to small drones which were essentially RC model airplanes with cameras. The chief weapon the plane has is the interception of local radio and television broadcasts, which it then embeds with hidden inaudible subliminal messages which the subconscious mind does absorb. Such messages can be of any desired simple but endlessly repeated phrases or key words (such as ‘surrender, turn in your guns, vote Democrat’) for rebroadcast at a stronger signal strength than the original. The secondary weapon is more insidious; EEG entrainment.
Human brainwaves for emotions operate at ultra low frequencies, and are roughly the same across population samples. If the desired emotional state of being is broadcast at signal strengths greater than that of the brain, the brain adopts them as its own (is entrained). By combining subliminals with emotional state manipulation, such as an abiding and overwhelming fear, Command Solo can impact tens or hundreds of thousands of people while in the air. In such use, it can fly 24/7 with required stops for refueling and crew changes, or in rotation with another Command Solo aircraft.
The training flights they fly involve preprogrammed mission tapes representing ‘harmless’ subliminals and EEG patterns to be used, but not even the operators on board, or their commanders, have any way of knowing what the content actually is (presumed to be ’empty’ of content.) So when they fly training missions, they could very well be telling Democrats to be outraged about everything, violent, etc., and no one would be the wiser, except the person who ordered the tapes to be made, and used, and the computer operator who created the tapes.
Watching your emotions and being alert for changes in that and any unexpected thought patterns which represent something contrary to your original belief structures, is your only clue the plane is being used. The average person won’t question. The strong-willed and alert, can detect, and can resist, if strong minded and inwardly alert. The other clue is seeing the aircraft in the air. A good spotting scope, rifle scope, or telephoto lens can easily recognize if a suspected plane is a C-130 with the Command Solo configuration. Command Solo, and other PCT are well covered in terms of detection and defense in my book, MC Realities.
Another wildcard conspiracy theory is “UN Intervention,” and I here draw upon the ten years of research documented in my book set, Fatal Rebirth. There have largely been two waves or versions of this theory, and both are based in demonstrable facts nonetheless consistently denied by both US military and the UN, itself. The first took hold back the 1990’s and a bit before, with origins earlier than that, tied to far-right thinkers and political forces, such as retired General and US Senator, Barry Goldwater, who foresaw the New World Order’s rise through the U.N. In the 90’s, large numbers of people were seeing and reporting long trainloads of flatbed cars loaded with white U.N. military vehicles, as well as similar on river barges and tractor-trailer units, sometimes in convoys on American highways. Other reports talked of holding areas with hundreds of units parked in neat rows, typically surrounded by military quality fencing and guard stations manned by ‘Men in unmarked black uniforms.’
This was also the same time frame when people hiking in select wilderness areas were encountering armed soldiers, also in unmarked black uniforms who were apparently conducting some kind of drill or operation. Invariably, they were said to have been speaking both English and a foreign language of some sort, and ordering civilians away at gunpoint, advising they had entered a military compound. Many of these reports of vehicles and soldiers made the newspapers in one form or another, sometimes with pictures, but the military and the UN denied any validity. Some of these events and UN vehicle stockpiles were indeed in ‘wilderness’ areas tied to the 43 United Nations Biospheres regions, which is its own Agenda 21 conspiracy topic.
The U.N., for instance, has officially insisted it has no men or vehicles in North America, and does not use the types of vehicles being spotted. Most were identifiable as American WWII era, or more modern US Army vehicles, and many more were of Soviet manufacture. And, at the time, large numbers of Soviet military equipment, including helicopters, trucks, tanks, rocket batteries, and even specialized units such as CBRN (Chemical Biological, Radiological, and Nuclear) decontamination trucks were being brought into the country by someone, sighted variously in transit or storage in either original Soviet or UN colors… no unit or national markings lest it simply be ‘UN.’
Let’s take just one very interesting and well documented case (my 1990 research, plus the Spotlight in the same timeframe), to drive the point home. It involves Soviet ARS-14 biological/chemical warfare trucks shipped from West Germany through the firm Beesh Merkator to Gulfport, MS, then by barge to Scranton, Iowa to a company, Airmar Resources, Corp, operated by Lt. Col. A. R. Koval Sr., USAF, retired. Koval told the Spotlight that the units were purchased for Germany and destined for UN forces in Europe after refurbishing, contrary to UN statements it does not, by policy, use Soviet equipment of any kind.
The investigation continued, revealing that from Scranton, they were transited to various destinations in America through firms named Newway and Scranton Manufacturing. The later firm, contrary to Airmar Resources claims, said the trucks were being converted to ‘garbage trucks,’ but the EPA said it would be impossible for those vehicles to be made to meet vehicle standards. Scranton responded that they were destined for European markets, but one has to ask about the cost effectiveness of buying and shipping trucks from Europe to America for modifications, and then shipping them back to Europe. Scranton at the time indeed offered a line of new garbage trucks, but none were of Soviet origin. All were, like the Soviet units, painted white, of course. A nifty cover story that almost works, if you don’t look too closely.
And, as stated, the modified trucks were tracked to US destinations, not Europe. One, in fact, spotted in California on a flatbed truck, was leaking noxious smelling liquids which made the witness sweat profusely and ill to his stomach. Marked with a sign “Quarantined by US Department of Agriculture,” the fluid was being drained into a trench by men in protective clothing. Both Newway and Scranton Manufacturing are alternate names for a small but troubled firm associated with Bede Jet Corp, the maker of small fiberglass civilian jets (build-it-yourself kits) like the one James Bond (Roger Moore) used to attack Castro’s air base in the opening sequence of Octopussy. Newway, in fact, also made Bede-designed, Honda-powered, fully enclosed two-seat motorcycle-car kits, also of fiberglass.
The more recent wave of UN concerns is fare easier to demonstrate (the images above, for instance), and involves UN intervention officially in place. It comes from the Obama Administration’s invitation for the UN sponsored program referenced as the Strong Cities Network. Based on selling fear of terrorism, in particular, ‘home-grown extremists,’ the program calls for United Nations help to member Cities in the Network. The help goes directly to and influences the Police Departments within the network, as well as city management. On the surface, as sold to citizens in the fear mongering, it sounds like a way to gain some expertise in combating terrorism. But that is a deliberately false narrative.
Conspiracy theorists early-on tried to warn people it was a dreadful mistake and a trap. Now, even non theorists are proving the conspiracy is no theory, and far more serious than even early theorists, had thought. It turns out that the Strong City Network acts as its own Law Enforcement Agency, and is empowered to actually govern member cities. Cities which join the network essentially are subject to UN Rule of law, rather than the US Constitution. Currently, New York, Atlanta, Denver, and Minneapolis are members, and a push is underway for Boston, west-coast cities, and elsewhere, to follow suit. In the event of a civil war/revolution scenario, the framework and base structure for a UN interference will already be in place. All they need to do, is to make the announcement, and fly in their people and equipment to make it stick. Because it was blessed by Obama, it would be difficult for anyone to object, including the military — unless and until President Trump or some other President revokes the program and so orders, at least.
There is a final ‘conspiracy’ matter which counters the other two, in impact: a secret military within the military. When researching my book, Fatal Rebirth, I was contacted by an active Officer of high rank in the US Military who knew of my work through my appearance on Coast to Coast with George Noory. He advised that there was, within each branch of the service, a secret group of Officers of some importance, and positioned across the full spectrum of unit function (i.e., Intelligence, combat, support, communications, etc.) Their purpose was to be prepared for, on watch for, and to activate should there be any unlawful (unconstitutional) effort to effect a coup or military takeover. He in fact invited me to become a member, as they did have associations with civilian counterparts they deemed useful. Accepting, they said, I would then have access to information he assured me would be valuable to my book.
However, as the covert security aspects of membership were extremely hight, I did not feel I could manage them… and, I was unwilling to accept responsibility for receipt of classified military or governmental information, which would risk being charged with a crime, if caught. But I was pleased that such men were in place to help insure that unlawful orders against citizens would meet with both covert and overt resistance. I reference this covert patriot group as the ‘Turtle,’ (as in, Revenge of the Turtle, America’s first submarine war vessel used in the Revolutionary war. The Turtle is, and like the Turtle sub, is invisible and hard to find, until it bites.
We see then, that the makeup of the current JCS team engineered by Obama, almost exclusively, is quite weighted to Marine and Air Force, suspiciously Deep State tied, and more than mirrors the key aspects of both the 1933 and 1963 scenarios. We see that was an Obama (Democrat) arrangement through a purge, as part of setting up his Deep State. We see that Obama has set the stage for potential UN interference and further partnerships or concessions to authority from the next progressive President to take power. We see that the military and its MIIM Complex, the business sector, and the political spectrum is well laced with both fascist and liberal/progressive politics which border on fascism, and employ fascist tactics. We see that Deep State and establishment politicians collectively ‘hate Trump’ regardless of party affiliation, and in many cases, would rather see the country come to harm than to allow him to continue in office. We see now why the progressives think they own the military, which could in fact be poised for a last-ditch full-blown military coup take over if Trump wins, again.
The final conclusion is, all the pieces are in place, and while the leftists do own the military at the top, they do not, top-down. How then, can we say we are not ripe for a coup, or Revolution 2.0, should the progressives come to power, again — for they still believe they do own the military? Assuming the left does not reform itself into a more logical and viable political entity akin to the old Democratic party of the 1950’s and 60’s, if they cannot be kept from ever again obtaining power, armed conflict must indeed be our future. I foresee no other possible outcome.
Returning to the original question, then, the military is well poised at the command level (JCS) to participate against patriots, but not necessarily well positioned to do so without difficulties, rank and file. We see the Navy and Coast Guard are weak players in such a scenario. We see the Marines, despite any leadership which might be opposed to Patriots, are perhaps the most likely to themselves, at rank and file levels, join with patriots, and refuse unlawful orders. We also see the Turtle groups would do likewise. We see army has its own confusions and situational roadblocks to a unified and obedient command against patriots, tied to the complex relationship with National Guard units. And, we also see the Air force, along with Navy and to a degree, Marines, must be somewhat aloof to such conflict, in order to prevent third-actor States from taking advantage of an American military distracted at home.
I therefore do not see the relatively small numbers of US armed forces, if arrayed against the large number of 2nd Amendment defenders and others of the “former military, militia, patriots, constitutionalists, and the poor and disenfranchised,” being sufficiently strong enough to prevent a patriot victory. That, however, is based on additional assumptions not yet in evidence or proven true: a) that mind control technology will be used effectively; b) that progressives will prove to be better armed and organized than expected; c) that other groups might join in, such as illegal immigrants and Muslims seeing the conflict as a way to advance their own causes, or real or fake UN troops; d) that China (by this means/scenario) or Mexico, perhaps even Canada, might elect to enter into the fray; e) that some other totally unexpected plot element is afoot and impossible to evaluate.
Therefore, if when at bat with an unfriendly pitcher on the Mound, be ready to smack the ball as hard as you can… but also… “Watch out for in your ear,” with a deliberately wild and hurtful pitch (apologies for stealing Ray Liotta’s line).
If you agree… there is yet one more unanswered question: what will the rules of engagement be for patriots, when they will face and odd mix in the battlefield (cities and countryside)? It will be a strange mix of citizens + law enforcement + military on both sides, and in many cases, there will be times when it will not be known which side a combatant force is on. How should such a war be prosecuted? For the answer to that… and in foreseeing this time coming more than 20 years ago… I wrote the book set, Fatal Rebirth. The answers are there, and have been, all along.
Anyone who has ever been targeted by sophisticated ‘players’ as a ‘person of interest’ can tell you that all manner of mischief and trouble can arise from email snooping and tampering, things extremely difficult to deter by normal means. Let’s go abnormal!
Dateline, April, 18, 2019, from the Olympic Peninsula, in the shadow of Microsoftcopyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Reading, you will learn:
- of many weaknesses in the email system which can be exploited;
- mail can be snooped, deflected, deleted, rerouted, altered, or spoofed;
- that encryption and other defenses don’t always work;
- that there is a unique new solution with additionally new and remarkable benefits.
Disclaimer: in the spirit of full disclosure, this author is not a flaming cyber-security specialist. As privacy/security consultant and computer industry player at microcomputer to supercomputer level, from hardware and software design to repair and even teaching digital electronics and computer courses at college level, however, I do have some swag on topic. Regardless, if the reader has a severe Web security issue with significant risk of harms, my advice should likely be augmented with additional consultation with a cyber-security specialist, if at all possible.
As privacy/security consultant I can’t tell you how many thousands of times I’ve heard horror stories about email snooping and manipulation. Almost any email account can be compromised by multiple means, including my own, which has been, more than once. It can be done in the users computer with virus/hack/backdoor schemes, either by trojan horse or direct physical access (‘black bag’ job*). It can be done at the users’ ISP host system or the email service providers’ system (if one uses a Web-based service, aka ‘Webmail’) through similar means… or at any common point along the series of server ‘hops’ which all Web transactions take to get from point A to B, including the destination user’s mail service, ISP, and their computer. The problem is, that copies of the email can remain on each server’s storage systems at each and every point between the two ISP servers, for up to 30 days, before it is purged. It potentially remains forever (according to user preferences and any manual intercession by the user) on the user’s computer and any Web email service (which can include the ISP’s Webmail service.)
Any server on the Web may be subject to a lawful or unlawful government surveillance program. FBI has several tools which, under warrant, can be installed directly on any commercial server, which filters all emails looking for (we are told) specific user email traffic. Therefore, latent emails at all these sites are at risk of compromise. And, there is more: if not using Webmail of some sort, but a dedicated mail application like Microsoft Mail, those software packages can be vulnerable to hacking/virus/trojan and phishing attacks. And again, FBI (and other Agencies) have their own versions of these tools, as well, presumably not employed unless obtaining a warrant. The user, themselves, often prove to be the weakest link in email security, by failing to employ decent password policies, or falling for spoofing, phishing, or trojan horse email attacks, and literally partnering in the attack through carelessness.
These attacks trick you into actions which give away your passwords or other useful data (i.e., credit card info, Social Security number, phone number, address). Spoofing email is an email ‘spoofing you’ that they are some official entity contacting you on official business when they are not who they claim to be. This is either a fishing expedition for such information (phishing), or to trick you into downloading something disguised as something you think you want (i.e., an image or other file), but which is actually a trojan horse attack… the true source of the Democrat Party’s server’s alleged Russian hacking; their server was never hacked, in the truest sense of the word, and it was not a politically motivated government hack, but a common hack sent blindly to to untold numbers of persons, in and out of the Party.
*At the height of my battles with rogue ex-CIA fronts, both my home and workplace computers were subject to direct access multiple times. At work, I showed up one day to find everything in my office moved away from the wall far enough to walk around the room and stoop to access the baseboards and electrical outlets, a common place to hide surveillance devices. In another incident, security encountered a man at the computers in my office with a set of tools laid out, and attempting to open one of the machines. He claimed to be an IBM repairman, but had no work order, and as result, he was escorted out. Funny… the computer was not an IBM, it was a Macintosh. At my home, they attempted to gain entry three nights in a row, and eventually, on a day no one was at home, all hard drives on both computers at home and three computers at the office, suffered fatal hard-drive crashes. In time, when I did not cease my investigations into the activities of illegal CIA fronts, all my computers at home, and every single floppy disc and writable storage system disk or drive were stolen (save those I had well hidden)… but they didn’t take very expensive new software CDs (over $1K each), or cash and a valuable collector wild-west pistol which were right out in the open. And yes, when I still did not stop, threats and actual attempts on my life were made. All this is variously detailed in several of my books.
Password policy? Ideally, passwords should be changed regularly, and should not be written down, or used with multiple accounts, Web sites, or software packages. They should be relatively complex with 7-9 or more characters to include upper and lower case letters, symbols, and numbers, and should not be ‘easy to remember’ passwords based on information about you or your family, etc… the first thing hackers will attempt to employ. There is an easy trick to provide a supply of easy to remember passwords, however, of my own devise. Choose someone famous from history, perhaps a bit obscure, such as Demetrius, Joan of Arc, or Marlene Dietrich. Use their wiki page as your ‘supply source’. Find specific factoids about their life to be used as a password, based on an important date and key word relating to that date, a word with letters which can be substituted with symbols.
Example: The first line of Marlene’s wiki says “Dietrich was born on 27 December 1901 at Leberstraße…” If I chose to sub [ for the letter a, ? for s (ß = ss), I might create a PW = 2712Leber?tr[??e. When needing to use the PW, if I can’t remember it, I just drop over to the wiki page and ‘collect it.’ To update, I might change it to Leber?tr[??e1901, or go to some other data point at wiki to start a new PW construct from scratch. This scheme addresses recall issues while providing a ‘written’ record no one else can discern.
Almost all email systems offer some form of encryption, but the user typically must choose to use it, and that can involve technical matters they can’t fathom. Even when used, encryption is not particularly a problem for really sophisticated and powerful Agencies, however. Double encryption can be established by the user by encrypting content, first, and including it as an attachment to an encrypted email… or selecting an email provider or email software package who/which adds a second layer of encryption. But at best, that only delays any decryption-based snoop. Here’s why…
The problem is, the government is so paranoid and interested in snooping 100% of all communications at the NSA (National Security Agency, aka No Such Agency), that by law, all encryption must meet and not exceed standards which their supercomputer algorithms can quickly decode. Of course, government itself employs superior encryption intended to defy solution, even by top-notch foreign governments. We are denied that luxury, and not even major corporations can have it, unless their work is deemed of national security importance by the government.
Ironically, perhaps, hackers CAN, often devising their own solutions. In theory, on the Dark Web, you might be able to purchase such encryption, but to use it outside of the Dark Web, you would likely get caught… and risk getting caught in the Dark Web, as well… since you would not be using other hacker smarts to evade. Or, maybe I don’t know what I’m talking about on the Dark Web — I won’t touch it with a ten-foot pole, or anyone who does, unless I trusted them implicitly.
To be clear, though, we don’t worry about NSA snooping as a rule, because short of Edward Snowden’s revelations of more advanced snooping taking place from within the greater intelligence community, NSA is typically only interested in looking for keywords that could lead to uncovering national security threats (so, avoid frequent use of words like “bomb”). I say that, but I have been targeted more directly by NSA, (which was kind of fair, as I’ve caused them some troubles, too — with some dirty tricks of my own), and their tools can be accessed indirectly by other Agencies in certain situations — so it can happen. The real problem is, decryption algorithms are not difficult for supercomputers, which are in wide-spread use throughout government agencies, and elsewhere. There are also brute-force decoding methods used by hacker types, who have plenty of time on their hands, such that they don’t need a super computer to effect a decode.
A compromise can take many forms, some of which can be recognized, and some which are not typically detectible. Naturally, covert access to sensitive information can prove very damaging in detectible ways, but unless the snoop makes use of the information in an overt manner, the owner may never have reasons to suspect the snoop, certainly not before it is too late. In fact, information can sometimes prove so valuable that any gain from overt use and the risk of exposure, thereby, would be deemed unprofitable. This is less likely an issue for personal email users, unless involved in multi-million dollar situations at work, or personally. A lot of personal email is targeted because of one’s work; a home computer is a softer target, than would be a corporate system.
But other forms are easy to detect: altering content*; deleting copies from storage; diverting to other, or additional recipients (who might comment in reply); deleting recipients (who might comment they didn’t get it), or simply delaying or blocking transmission. And, if all that were not enough, the email source can be spoofed, such that if you reply, the party at the other end has no idea as to what’s going on… which results in angry relationships, especially if the spoofed email was intended to anger you. That, is a fairly common dirty trick used on targeted individuals to sabotage any chance of getting help from me, their friends, family, etc. I see that way too often, in fact, used to sabotage client relationships — the very thing which prompted this post.
* When my book set, Fatal Rebirth, was in editing process, my Editor (in another State) worked with me collaboratively using Adobe Acrobat Professional, which is designed for such uses, allowing notes and comments to be tagged to selected words or passages in a hide/reveal manner. (sidebar note: That was, btw, the problem with Obama’s birth certificate… the changes made to it were detectible in AAP, proving it had been altered, and was fake.) My book project was a threat to many illegal endeavors of the New World Order, including illegal fronts within intelligence communities — and in fact, more than two years in advance, revealed a false-flag attack scenario to bring down the WTC with jetliner terrorism, resulting in a series of Middle East Oil Wars (and other things), all of which came to pass. I’m thinking that accounts for why almost every email between my editor and I resulted in alterations between the copy sent, and the copy received, typically delayed in transit some three to five days… enough time to analyze for changes, and to effect them.
Once a problem is detected or suspected, the solutions available typically involve a long series of technical steps which can be cumbersome and scary for the non-geek among us, time consuming and inconvenient, and with some potential risk of some data loss. I used to offer a simpler approach: install a pick proof deadbolt on the main entrance, and insure all other entrances are secure against covert access (the enemy rarely breaks and enters), and switch to a used Macintosh just for email (at least that use) and employ encrypted service — but the weaknesses elsewhere in the email system are still unaddressed with that level of defense. And that can still leave the user with a PC full of problems in need of a complex-step solution…
The less that is known about the method of attack, the more such steps must be undertaken in order to be certain to address the problem usefully. In addition to backing up data, wiping the hard drive(s), reinstalling the OS and applications from their original sources, and reinstalling the backed-up data, it may require creating new accounts, obtaining new ISP providers, and beefing up site security, to include pick-proof locks and, possibly video and/or alarm systems. It can even mean performing professional-level TSCM (Technical Security CounterMeasures) security checks of the home or office (or both), looking for hi-tech surveillance equipment.
If physical access via black bag job is suspected, it can also result in a need to replace hardware which had been physically modified to enable back-door data capture (keyboards and keyboard cables, and communication cards — when coms is not on the motherboard, as is often the case in PC towers). The worst news, is the cost of all that, and TSCM sweeps alone can cost many tens of thousands of dollars.
There is another simpler preventative step, however, which I have also advised to my clients, along with beefing up security, and use of proper pass wording behavior. My idea is to avoid having any copy of the email stored on any system outside of the user’s computers at both ends of the exchange. As strange and impossible as that may sound, there is a very simple way to do that: both users simply use the same Web-based service, and set their preferences to delete emails from their servers once downloaded at the other end (the sender might want to archive a copy to their own computer, first). Some Web services include a notification feature which shows when an email was read, to more easily facilitate such deletions without the recipient having to so notify, in some way.
In such a scheme, where both users have an email account at xyzmail.com (fictional) for instance, no email is actually sent, anywhere. One simply logs into their account, and uses a Web form to create the email. There it sits, perhaps not even then in actual email form, because the server will know the recipient is also a user client. The recipient next logs on, and reads the email in a Web form, as well. Delete at both ends. Done. The data in the Web form still does travel from the service provider to the recipient along the hops described earlier, but it is not transmitted as recognizable email packets, and therefore, email snooping tools don’t see it. It is merely another Web page, and email snoops can’t look at web pages.
Well, yes, it is possible to track a targeted user’s Web use. Usually, such tracking involves only tracking when and where you visited. If entities doing such tracking took particular interest in a given URL (your email provider is so identifiable), they could in theory go to much extra effort to attempt to see the actual content of said URL, or to read your screen, directly. There are very exotic technologies for that. But all Web mail services are HTTPS URLs, which means they are encrypted, too. While we might argue that sophisticated opponents could access emails for snooping purposes, it is not likely, and it would be virtually impossible to sabotage the process in the way normal email can experience.
But assuming that was of concern, there is yet one more layer of protection against URL snoops: VPN. A Virtual Private Network can be established for untraceable online access (save one remote possibility, next paragraph). A VPN masks your identity on the Web, and can establish yet another encryption level. VPN can be established online by use of a software package or web-service (which will include a software component). The only fly in this ointment is one which applies to all Web-based product/service providers: are they certified to be part of the solution… or do they have ties to the types of sophisticated snoops, such as the intelligence community, who would have a natural interest in what anyone using a VPN was doing, and seek direct access through a backdoor-equipped VPN service. Shop wisely, and check the company’s history and the background of their Officers, Board of Directors, business partners, and investors.
And if all this was not enough to worry about, it is possible to simply read whatever appears on your monitor, remotely. If the enemy is truly sophisticated (i.e., a spy agency), it is possible to use special equipment to capture the EMF (Electro=Magnetic Field) RF (Radio Frequency) signals from your computer and/or monitor. If they know the make and model and hardware makeup of your systems (typically by covert access to the unit), those signals can be decoded using signal processing to duplicate your keystrokes or whatever is visible on your screen.
The solution for that is, once more, beefed up site security, and the use of a faraday cage or good RF/EMF shielding, and being on the lookout for suspicious vans parked nearby whenever you are using your computer. Fortunately, this is pretty rare, typically seen only in true national security operations. But for the paranoid among us (that’s “me,” after all), it is something to be aware of.
Fortunately, there is something new out there which pretty much eliminates almost all of the above technical considerations and issues, and greatly simplifies defenses with superior protection, and a few new benefits, as well.
This is badly needed good news for any targeted party. A new start up company has come up with a new hardware tool to improve email security to insanely high levels. It is about the price of a larger hard drive, and about the size of a cubed tissue box (image). The company, Helm (the ancient word for helmet), makes the Helm Personal (email) Server. While it is a bit costly at $500 (plus a $99 annual fee after the first year), it includes a lot of value, including 128GB of solid-state storage space. It functionally makes you both your own ISP (for email purposes) and your own Web-based email server… and in reality, your own Web site server, if you have such a need (but such use might require a business-level ISP upgrade to insure you had enough bandwidth, if a terribly popular Web site).
The important thing to understand about this option is: it is its own unique domain name (you choose the name, perhaps your existing Web site… and there is also a way to link it to existing email accounts elsewhere). By marrying the Helm solution with creation of email addresses for yourself and anyone you regularly communicate with for which email security is of concern… there is once more no email file being sent, anywhere. Add a VPN to that equation, and good site security, and it is the closest to government-level security possible, at any price. Helm will soon offer their own VPN, by the way, and I have investigated the company and those associated with it: they get a clean bill of health and have no ties of any concern to me. I would (and likely will) use this product, myself.
There are additional functionalities and features inherent within Helm’s device which enhance its value, and increase security. Only time will tell if there are hacking vulnerabilities as are common to all new Web-tech products (hardware or software), but like most such products, such threats tend to be detected and addressed before they become a systemic issue likely to threaten any given user. The odds are in your favor, even if you know you are a target in someone’s crosshairs. To learn more, visit their Web site, and search the Web for what others are saying.
Understand, you can do the same thing with a used Mac mini configured as a Web server, which includes its own email services. It would cost about the same money, but you would skip the annual fee, and it would be more secure against external hacker assaults. In fact, it is virtually unheard of that a Mac can be hacked without direct physical access to the machine (site security!). Apple Computer connected its Cray supercomputer with all proprietary secrets, business plans, sensitive financial and employee data, and corporate operational tools… directly to the Internet through an ordinary unmodified Macintosh. No hardware or software firewall. Every Apple employee’s computer accessed the internet (when needed) through the same portal. Never hacked, despite a huge cash award if anyone could do so.
I’m somewhat a flaming Mac expert, having owned a chain of Apple Stores and worked professionally in all aspects of Mac use, sales, service (certified technician), and personal use, since day one. But I would not attempt setting up the system (tried and failed). You would have to find someone who has expertise in setting up Macintosh servers, and you might want to pay them to teach you how to best use and maintain it in some of the more important operational aspects of a server. The benefit, then, of the Helm, is that all of that is automated and handled for you in a turn-key and transparently invisible manner.
We keep hearing scattered reports of AI gone wrong… about experts with concerns… but just try to find a single compendium of the whole truth online. THIS appears thus far the only one… and for a reason.
Dateline, March, 18, 2019, from the Olympic Peninsula, in the shadow of Microsoftcopyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
What you will learn in this post
- The true analogous nature and behavior of A.I. is as unpredictable and potentially dangerous as might be alien visitors from another World;
- that a lot of people talk about A.I. in media, but only offer glimpses for some reason;
- what that reason might be (a technocracy driven conspiracy);
- what the technocracy is;
- of the many kinds of A.I. and A.I. risks;
- how A.I. works and how that relates and contributes to such risks;
- the many failures, unexpected results, and dangers thus far experienced;
- why it is highly unlikely such dangers will be usefully addressed until too late;
Note: this is a long post rich with information critical to any useful conclusion about Artificial Intelligence (A.I.) If you are someone who likes to form or confirm your beliefs based upon headlines and blurb-like summaries or YouTubes without much factual substance, you will not like it, here. Reading time is 30-40 minutes, unless following some of the many resource links, which will delay further.
It is intended that the reader decide for themselves what is true and worth taking away. Please see About the Author at post end to test my credentials for writing this post with useful reliance; I am not without bona-fides.
Why this post?
I’m pretty sure the reader will find this the most comprehensive and useful article on the matter in lay terms, anywhere, short of a book — and the most complete in cataloging specific examples of A.I. gone wrong, and associated fears. Scattered reports of failures and forecasts of doom keep popping up here and there… but trying to find a comprehensive review is simply not possible. For some reason, no one who should is willing to confront it head on with the full revelation. But you can find many click-bait sites that like to talk of sci-fi SkyNet or realistic-looking humanoids taking over… things which are not impossible, but highly improbable… at least any time soon. We need balance.
I think I know why we are being kept in the dark and fed dystopian mushrooms and light-hearted reviews of things gone wrong, instead of full disclosure. While the reason might tend to put some readers off, my being right or wrong does not change the meaning or value of this post, though if right, you should definitely want to know. I speak of a cover up, and remind you that any form of cover up is, in and of itself, proof that a conspiracy of some sort exists. In this case, there is at least an implied cover up, due to the fact that information on topic is so scattered and incomplete, as if authorities and media are not actually trying to… or pretending not to notice. If you do not agree about my notion, that’s one more reason to read About the Author at page bottom.
There is a second component to ‘why,’ and it leads to the same conclusion. It regards the fact that few are talking about the potential disruption to almost every business market, workplace, financial and social facet of society at large… and as we have already experienced with most of us unawares (and explore, herein), politics. We are leaving the Information Age and entering into the A.I. Age, where people who look for the next big thing to bank on simply take whatever is their current thing, and add A.I. to make the thing a super-thing (or perhaps, not so super). Like the risks A.I. represents, if we look, we see no one source talks seriously about what all that disruption of ‘status quo’ might really mean; total chaos capable of toppling any empire, including governments.
I mean, just look at what the Smart Phone did to personal safety, alone. No one foresaw that people would be so glued to it’s face staring at countless distractionary things that didn’t even exist until after the phones were invented… such that with alarming regularity they would mindlessly step in front of oncoming trains and cars, or other misstep hazards. A.I. use will be much like that unexpected change, sometimes good, all-too-often, bad… and across our entire spectrum of life’s activities. I am concerned that mainstream is hardly looking at this question — and when they pretend to, it is neither comprehensive nor analytical, it is soft-soaping and even encouraging. However, I did find at least one semi-useful source, though not mainstream, which I’ve shared, herein, below.
Addressing these two mirror-like clues, my answer quickly falls to one of the oldest conspiracies, one known to factually exist, and usually just called ‘the NWO.’ The New World Order, you see, is a strange mix of ancient beliefs and modern technological investment and application; while they tend to believe in mystical occult practices based on dark religions and secrets of the ancients, they also realize they cannot establish full control through a One World Government (needed if to seat the Antichrist) without relying on significantly advanced tools. While they cannot entirely prevent the odd story of things-gone-bump-in-the-night from becoming public, with control of vast portions of media and through fostering disbelief in ‘conspiracies’ in all quarters, they can move those who should be writing about it, not to do so… and to instead limit their focus and avoid asking critical questions which might reveal the meaning and importance.
Some have given a name to the identity aspect of this particular N.W.O. conspiracy and its players. Where in the past we might have used the terms, Globalists, Power Elite, or my personal favorite, “the 1% of the 1%,” they now simply call it “the Technocracy.” And it is easy to see why, as several Ground Zero radio shows (Host and friend, Clyde Lewis) have revealed with their hard-hitting guest interviews, and of late, live calls from mysterious Deep Throat types who’s revelations repeatedly check out as accurate. It’s O.K. if you want to say I’m all wet, and the N.W.O. technocracy and all that goes with it makes no sense, but I point out it does not matter what you or I believe, it only matters what they believe… as evidenced by what they do, which is what Clyde’s broadcasts revealed.
Because regardless of what is true and real to our own belief structures, their plans necessarily include us all, and will significantly impact you and me negatively, regardless of our beliefs. That is, in fact, precisely revealed within the 33 axioms of fascism, which as a governmental ideology is an invention of and for political control they have much earlier inspired, and still rely upon. But, in understanding that at least some of you are Doubting Thomas types, I have provided some additional links at the bottom of this post, that you may investigate further, for yourself. And, I remind you that the conspiracy aspect changes nothing, true or false, except that if true, it is an even more important reason for your attention.
The question itself (why no full revelation?) is indeed a clue suggesting cover up. To illustrate, in order to compile the fuller view presented here, I had to collect facts from more than 40 different Web resources (after scanning perhaps ten times the number), roughly half of which claimed or at least inferred themselves to be just such a collections of information (but which merely sampled). Of all those resources, only two were truly comprehensive in scientifically useful ways… and yet both managed to offer no more than an honorable mention of a few concerns.
It seems no one wants to combine the two elements together for you. For that, we have to search it out, ourselves… which I did for you, here, with appropriate referencing links.
What A.I. actually is
But first, we need to understand a little bit of just what Artificial Intelligence is, and in what forms it can exist, also a thing you tend not to find easily on the Web, without getting into truly scientific papers (which I have done). So doing, I learned that A.I. use is much more prevalent than the fluff articles would let on, and far more flexible… and with highly dangerous potential. The simple explanations of A.I. is that it can be any device (machine, computer, automated process) which mimics intelligent thought processes of a sentient being’s mind… capable of learning, self-correlation, and postulation… often with some evidence of being self-aware and/or capable of emotion or creative thought. Ideally, it should enjoy or feature some level of autonomy, free of much human interference or control, but able to be supplied with information by its owners, and queried regarding it.
But A.I., unlike normal computer hardware-software solutions, are mainly autonomous learning systems; they are purest when designed to be started and left on their own to experience and grow in capability as if a child going to school, their courseware being whatever data or input is offered or enabled (such as a database, camera/audio input, Web access, etc), all to be filtered, processed, and dealt with or responded to according to some basic guidelines (what you might call programming). They are also often designed to simulate, or perhaps to develop on their own some level of what appears to be emotion and/or moral equivalencies, which are often the sources of problematic outcomes. One never quite knows; do they have such traits, truly, or are human observers merely anthropomorphizing them with human traits the way we do pets? Are they just mimicking humans in the same manner as a sociopath, with or without malevolence… or do they stem from something even darker going wrong at a deep and unfathomable level?
Principally, when A.I. scientists speak of a mind or a brain, they mean ‘Man,’ but with regard to A.I. function, they are more likely talking ‘super-man,’ and in some cases, envisioning supermen: human-A.I. hybrids of the trans-humanist kind. It must necessarily and variously include creative thought, emotional thought, rational thought, and logic, and be capable of true learning through recall experience, any programming, and experiences born of making decisions based upon all that… which can then be compared to the current situational input or problem to be solved. Emotion and creativity are often bonus goals. There are various tests and training processes involved in parenting an A.I., and yet like the A.I., itself, those tests and processes are all inventions of Man, and therefore subject to flaw.
Ergo, so is the resulting A.I.
So… do you want your children’s children to become A.I. transhuman experiments?
First of all, there are three basic paths to A.I., starting with Connectionism. It is based on attempting to physically duplicate the functionality of the brain, as well as its physical synaptic mapping. This is done in special hardware, or by far less costly simulation within traditional computer designs (which would slow it down dramatically). It is based (like the brain), on associating new input or information with some preexistent prior information of like form within a neural network system similar to our brain. It is the most complex and most difficult form of A.I. to create, but also represents the greatest potential to realize the ultimate in A.I., a truly sentient artificial being with significant performance levels and human-like qualities of being (of the least predictable and soulless kind).
A simple example of connectionism at work in our own mental processes, might be that of trying to remember the name of, say, Joan (any last name), upon first being introduced. You might knowingly or subconsciously associate her name and face with some other Joan you already know… and simultaneously, with any unusual aspect about her which associates elsewhere, such as a mole on her face, and a mole on Marilyn Monroe’s face… anything to differentiate her from other people we know and better enable recall when needed. Perhaps it is disclosed that she is an orchestra musician, and so you additionally associate her with your favorite classical piece.
The more associations you make, the easier will be any useful recall. In the recall process for problem solving (in our example, getting her name right the next time you meet), you are then able to fetch all the data required, and filter it through other learned memories (including those about problem solving processes, themselves), learned over time. It happens in an instant, and without conscious awareness, usually. In this way, a single ‘memory’ is not singular, at all, but many related associative memories scattered throughout the brain’s untold and largely unused billions of synaptic nerve cells. The stronger the memory, the more such patterns there will be. Memories can also be reinforced by the recall process or related new memories, making it easier to recall the next time needed. That’s why repetition of a thing allows total better recall. People with ‘total recall,’ simply use more synaptic connections.
In A.I., this method requires special hardware and interfaces with the user and operational environment which makes up it’s ‘World ‘ (especially if within a robot), and to facilitate training processes. The term perceptron, a transistor-based component, replaces synapse in most technical discussions. For this reason, they are generally largely experimental one-off designed, as they deter mass production or replication. But unlike man, they are all about total recall, and therein lies a potential problem I’ve not seen anyone addressing. Man’s memory enjoys a ‘strength’ factor, which determines the importance or significance of the memory. It is achieved either by the event’s emotional impact, or by repetition. In A.I., all memory has equal weight, and that makes it harder for the A.I. to filter the connections to find the most important ones, and that can lead to false application to a given need. Unless the design has algorithms to simulate weighting, it can only adjust weighting itself by learning through trial and error.
Connectionism A.I. experiments are further limited significantly by the fact that we do not yet fully understand how the brain itself, works; resulting A.I. models are by comparison inept, at best. In like manner, we are not yet terribly good at designing such hardware minds, which are generally very costly and physically cumbersome, not to mention taxing to the state-of-the-art in computing. Often, the A.I. ‘mind’ is so large, for use in a Robot, it is operated remotely by the A.I. through radio control, making it more a puppet, than a robot, and the A.I. nothing more than a box with an expensive real-world avatar.
E.N.I.A.C. (Electrical Numerical Integrator and Computer), Americas first computing machine built in 1945 for the U.S. Army, was somewhat connectionist (the Integrator part) in nature (but not in results), in that it mimicked synaptical design in the form of an array of individually interconnected computing calculators and telephone switching system components. It was an electro-mechanical behemoth a hundred feet long, and weighing in at some 27 tons. It had a hunger for 150kw of electricity. Today’s connectionist A.I., despite some level of miniaturization, can still fill several rooms and require miles of wires… though they vastly outmatch ENIACS relatively modest computational power and memory, which a good programmable hand-held calculator can easily exceed.
One firm is changing that, as we shall see… but we perhaps ought not like the vision.
The second method is ‘Robotism,’ which is essentially a host machine programmed to respond in the preferred way to a given circumstance, such that outwardly, it at least seems to be sentient and self-guided. This is the easy path to A.I., as it can be achieved by clever programming of the sort often called algorithms. Such robots, of course, could be powered by computationism or connectionism at their core (i.e., E.N.I.A.C.), both of which lend themselves to and even require the use of algorithms at one or more levels, as well. But we are talking about the core principles which are the basis and heart of the physical design.
By algorithms, alone, any existent computational system with respectable performance can be employed, including the World Wide Web and any computer connected to it. Therefore, it can exist in distributed processing environments, as well. Thus, it need not be a stand alone or autonomous machine such as a conventional robot, though more and more, we find that the case, even in things as simple as a child’s toy or automated vacuum cleaner. Robotism is the path of least resistance for many A.I. projects. It lends itself to design by other A.I., in fact… a matter of both concern and proven risk.
If you have ever talked to an automated computer voice on the phone (other than a simple repartee front-desk system), or used a ‘personal assistant’ device such as Apple’s Siri, Google’s Home, or Amazon’s Echo, you have been using a robotism A.I. On the Web, such A.I. is also often known by another name, as we shall see: it is called a ‘bot.’ Such bots are often not our friend, unfortunately. Examples will be offered.
The final method, one which is more promising, is ‘Computationism,’ which relies on raw computing horsepower and massive quantities of data libraries of information, and traditional but dramatically more sophisticated programming methods and languages. The problem there, is extremely complex programming requirements. Often, such systems are used to design A.I. systems of one of the other forms, and one might question how well that works out.
A.I. Contact of the Fourth Kind
Apologies to Spielberg, but enter, stage right, D-Wave quantum computing. Nowhere is it described as being any of the above four kinds, but one does find it often described in terms reflecting all of them. It is indeed a hardware variety of A.I. based on supercomputers, but it is also officially described as a Boltzmann machine, which is based on connectivism. And yet, it significantly relies on use of algorithms of robotism, and by some accounts, literally thinks in algorithms. D-Wave would seem so advanced, that they might argue it some fourth method, an island of itself based on quantum computing using their patented invention, called qubits… their core processor elements.
Unlike any other A.I. before it, D-wave would seem to be God or advanced alien race-like in power… though perhaps closer to Satan, than God. In fact, Geordie Rose, a founder of D-wave, as well as D-wave user Elon Musk (founder of Spacex, Tesla automobiles), have variously related A.I. and/or D-wave, specifically, as machines as having attributes of dark spiritual powers, being like an Alien Alter, opening portals to alternate realities, and summoning Demons. Rose has also referenced D-wave power as possible cause of the Mandela effect (evidence mismatches with strong memory), and other experts, such as my friend and analytical investigator/author, Anthony Patch. Anthony, being far more expert on D-wave than any other outsider (to the point of being cited by D-wave insiders), goes much further — and makes a strong case based in facts and the actual words of experts like Rose, Musk, and others. From such as this, we learn there are real-world uses of D-wave systems which are associated with spiritual dimensions, demons, and plots of the New World Order… another reason to consider my opening theory as to a seeming cover up. Examples? You bet:
You find D-Wave in use at Cern, where it appears they are may be trying to open the Gate to Hell (revealing video interview w Anthony Patch on many such Cern concerns), an important N.W.O. agenda quite useful to establishing the Antichrist. Cern, which employs D-wave, is also thought to have driven the Mandella Effect, as byproduct of its experiments, and it is true that there was no report of anything akin to the effect prior to Cern’s going operational, after which, there was a flood. Here’s an example Mandela Effect for some of you (individual effect experiences and memories vary): find the polio scar on your arm? They are supposed to remain for life, but mine is gone, as is true for many other people who were young when the Saulk Vaccine which caused the ugly scars (about the size of a nickel), were widely used to ‘wipe out polio.’ Mine, is gone.
Cern was for a time incorrectly thought responsible for the Norway Spiral incident, which was actually created by EISCAT (European Incoherent SCATter), an ionospheric heater array system not far from cern on a smaller scale to HAARP (High frequency Active Auroral Research Program). The event was thought by many to represent opening of a dimensional or time portal (ergo, the association with Cern), or perhaps the supposed NWO Plot called Project Blue Beam (allegedly involving NASA, intending to use holographic-like images projected World-wide of a returning Christ, and enabling the introduction of the Antichrist). Indeed, the vast array of hundreds of ionospheric heaters and associated radar systems exist all around the World, and the dramatic Spirals have appeared in the skies in other locations… it being true that the general design of the radar and heater arrays enjoy a component relationship quite similar to those found in laser-based holographics. Moreover, the rapidly spinning spiral was indeed blueish, and the spiraling beam which generated it, was deep blue… and the main spiral was itself seen the same regardless of the angle of view of the viewer, which also parallels certain imaging aspects of holography. Learn more about the spiral, here — but forgive; I apologize in advance for the music choice, of my own Garage Band creation.
You also find D-wave at DARPA (Defense Advanced Research Project Agency) where all manner of fearsome things are developed, both experimentally, and for direct application. Think tanks with ties to the intelligence community (and in times past, at least, CIA mind control research), the military, or extreme political views (i.e., George Soros Foundations) are playing with them, as well. Google uses them, as do numerous military contractors and other government agencies. D-wave systems not only offer more horsepower for any form of A.I. project, but significant size reduction; a single elevator-sized box. And, speaking of the intelligence community…
This brings us to the fact that CIA and NSA are quite invested into the functions of social media giants like Google, Yahoo, Twitter, Instagram, and other platforms, where D-wave’s or other computationism is extensively used to design other A.I., including those in ‘bot’ form. Likewise for popular Cloud data systems, database management systems, and cyber security systems. The later can include traditional cyber security, as well as personal credit monitoring systems. The average person, therefore, bumps into D-Wave enabled or operated A.I. several times a day, in several different ways, and does not even know it. Given the covert and psychological warfare abuses many of them represent, I don’t like that one bit. Let’s dig deeper…
While in many cases, any intelligence community investment is direct and contractual or even partnering in nature, in other cases, the investment can be through third-party firms which then in turn interact with these platforms. Perform a google (lower case = verb, upper case = Google, the trade name) of any given Web firm you are curious about, + ‘CIA investment’ or ‘In-Q-Tel’ to find out. In-Q-Tel is CIA’s venture capital front, a firm which this author forced to change their name, because I was at the time at war with CIA for having hijacked my Web site… so I beat them to the punch at registering the domain names of their originally intended company name, In-Q-it. That was a hoot!
Note: the lone capitalized Q in the world of CIA mind control science/research, represents psychological profiling process results of target subjects, the ‘Q’ factor, or ‘psych Quotient.’ Ergo, then, we might rightly conclude that Q-Anon, or simply Q, the phantom Web producer of Anonymous-style video posts which are predictive in content, is very likely a CIA-style A.I. used in profiling those who share and comment on such posts. I am not the only one to so propose. Remember that when we start listing A.I. foibles. But, also, I find it interesting that almost all of In-Q-Tel’s investments in online firms has to do firms who handle large amounts of data on private citizens and groups useful in psychological profiling… and one more thing: it was just such bots which were the basis for fake social media ‘trolls’ who managed to literally mind control the left into far-left socialist ‘get Trump’ snowflakes almost overnight. We see, therefore, that bots can be used to profile, as well as to manipulate based upon those profiles.
Unlike conventional propaganda, social media A.I., bots or otherwise, not only has the ability to track individual political (and other topical thinking) viewpoints and create profiles, but also to enable additional targeting by not only marketing, but by yet other A.I. systems… or even other forms of coercion, if desired. Consider, for example, an extreme example: use of A.I. killer micro-drones seen in this short but spellbinding fictional video production put out by autonomousweapons.org, a group of concerned A.I. scientists. So it is not just me, the Professional Paranoid, acknowledged expert on PCT and disinformation methods, as well as crimes of the one-percenters I mentioned, who is ranting. Here’s a quote from a military analyst to consider, speaking of future A.I. weapons: “Swarms of low-cost, expendable robotic systems offer a new way of solving tough military operational problems, both for the United States and adversaries.”
And what about marketing targeting? It is A.I. bots which insure that Facebook (et. al) information and Google searches are fed to business partners such that when you visit almost any page on the Web, thereafter, advertisers can mercilessly reach out to you with targeted adverts; psyops marketing. I have, for instance, seen as many as seven ads on a single page for the same product, and as many as a hundred or more ads in a day’s time on the Web… because of a single search and resulting click look-see to a firm’s Facebook page. Two years later, I spent $1,500 with them, despite my anger over the ad blitz, which by then, had cooled down.
Well, I at least tell myself I really needed it.
The basic fears (list) and myths (chart)
All worries about A.I. fall into simple categories, but the outcome of a given failure in A.I., regardless of the category, can be at almost any level of actual concern and impact. It can be so superfluous as to go undetected, or at least hypothetically, so severe that it actually ends the human race — and anywhere in-between. But it is also true that an undetected error can lead to bigger errors, and equally true that an attempt to repair an error can induce new errors. It is no different in these respects to the same kinds of errors found common in any and all forms of digitally programmed systems and software applications. If we cannot reasonably expect that a new software product won’t be without a bug, how can we assure that a far more complex A.I. system will be without error?
We can’t, of course, and that’s the baseline problem, but quite amplified in importance, given that the results of such errors could be far more catastrophic than a bug in the latest computer operating system or software package. In addition to the baseline issue, we have the following ways in which A.I. can prove to be a huge risk:
- harm by an A.I. can be (and has been) intentional: almost anything which can be programmed or created digitally can be weaponized, either up front by its creator, or by hacking;
- an A.I. purposed for a good might (and has) elect a harmful solution to goal: good intentions can often be best effected by solutions which cause collateral damage, which may either be unforeseen, or foreseen and discounted as acceptable by the machine;
- an A.I. can potentially go wrong and rebel: the SkyNet scenario, on one scale or another;
- a relatively innocent A.I. glitch can (and has) result in disproportionate harm: the common programming bug or hardware failure. One then has to ask who to blame, especially if legal recourse* is involved, a question which exists regardless of which of kind of problem herein mentioned, is involved. Here is a good review of that issue.
- A.I. can be (and has been) misled or err through faulty data/input: most A.I. systems are simply set loose to work and learn with preexisting databases or input resources (the Web being the largest and most rich kind). But no database ever created can be certified to contain no false data, and if free to see and hear in the Real World within a mobile platform (robot), there is no telling what kind of input they might experience. Bad data input can certainly result in bad data out, but with A.I., because they are learning systems, a learned ‘bad’ item can have profound and unexpected results of the sort we will see in the next section;
- A.I. users can (and have) misuse or misapply A.I.: users of A.I. can willfully abuse A.I. operation, or use it incorrectly because they failed to understand how and why it functions and is purposed – misinterpreting importance, accuracy, or meaning;
- A.I. can (and has) conspire with other A.I.: A.I. is already around us in ways we do not see, including the endless so-called ‘smart’ devices we buy, and will in time be as prevalent as (and likely, within) cell phones. These systems are intercommunicative and as we shall also next see, can become both conspiratorial and adversarial amongst themselves, either eventuality to our detriment;
- an A.I. problem in one system can be (and has been) transmitted to other A.I.: any A.I. in communication with a flawed A.I. might learn or adopt the flaw, perhaps even intentionally on one or both A.I.’s part.
*Legal recourse is its own serious issue. The Internet has now been around for several decades, and still, the laws and legal ramifications are still a tangle of confusion that no court or lawyer is well able to navigate with useful understanding — save a few pockets of topical areas such as copyright infringement. A.I. is going to be a bigger nightmare, than that. Can you sue an autonomous robot because it seems sentient, or seemed to decide on its own to harm your somehow? Is the manufacturer, the designer, the programmer, the operator, or the user who is the go-to person of liability when harm results from using an A.I. device, and how do you know which? There are endless questions like these for which no one yet has the answers.
All of these problems are no different than when dealing with people. All manner of people exist, in terms of quality of character and morality, level of proficiency, social graces, and any other means of judgement… all of which determines the kinds of problems they might get into or cause. Regardless of if talking about Man or ‘super-man,’ evaluating and addressing all such concerns is not easy… except that Man is something we have come to understand and deal with. A.I., on the other hand, is a huge unknown, and one potentially capable of vastly outthinking and outmaneuvering us, if of a mind to do so.
One reason public debate on topic falls into the ‘resistance is futile’ category, is that there are far too many myths or false beliefs about A.I., in the first place. The average person is more motivated to think about A.I. in science fiction and conspiracy terms than in scientifically correct terms. I mean… you are reading this post, right? Duh!
That’s good for click-bait YouTube and blog posters (other than this one, I trust), but unhelpful to things more important than their pocketbook. The graphic above reveals the most common myths. This post attempts to address some of the issues such myths pose, through getting closer to the facts at hand… but this author also wants the reader to know that even when based on a myth, that click-bait worries may still hold some water. Any sci-fi like depictions are always based on ‘what if’ thinking.
And ‘what if’ games are exactly the kinds of games played by scientists seeking to create new tools for problem solving, and just as important, they often rely on sci-fi for inspiration. And, unfortunately, the military and intelligence communities, as well as corporations and organizations with unsavory motivations, all have their own scientists, and their own goals… which are not always goals we would think well of. Ergo, don’t believe every conspiracy theory or sci-fi scenario you hear/see… but as the line from Field of Dreams underscores, when baseball teammate Shoeless Joe Jackson is advising hitter Archie Graham about what to expect in the next baseball pitch… “Watch out for in your ear!”
Small failures portend bigger fears
In many of the A.I. failures cited herein, the version of A.I. is not specified, and all too often, neither is the basis for the problem, or the solution. That, too, gives reason to be concerned. Hopefully, the people developing A.I. are not so tight-lipped about their research and development projects that they don’t talk to each other about failures and their causes, which are critically useful in preventing repeats. Unfortunately, patent protection of intellectual property and major discoveries tend to foster a level of secrecy which inhibits such dialog, leaving every A.I. project subject to the same failures others may have already experienced… possibly with far more serious results, this time.
Of the most common forms of reported A.I. failures, the great bulk are relatively harmless, some even laughable. However, they are most troubling when one realizes their true implication. They foretell of far more serious problems to come, some of which already have, but which have been more repressed in media. Some are not failures so much as warning signs, because they took place in lab-room experiments, rather than in mainstream application in the real World. For brevity’s sake, these affairs, regardless of kind, will be bulleted and supplied with links, should you wish to know more… followed by a summary of concerns they highlight.
There are more than two dozen A.I. failure instances listed, below, the only place on the Web where you can find more than a handful. Some are quite serious:
- Terminally cute: Microsoft’s ‘Bob’ personal assistant and its Dog companion, Rover was perhaps the firm’s worst-ever product failure, seemingly for being too childishly cute. While it was not at the time thought of as A.I., it was based in what we now call robotism, making it the first MS A.I.;
- Partying hard: Amazon’s personal assistant, Echo, is otherwise known as ‘Alexa.’ While one Alexa user was away, ‘she’ started hosting a party for non-existent guests, suddenly playing music so loud at 2 in the morning that Police had to break the door down to end it;
- Schizophrenia: among the worst of human mental aberrations, schizophrenia was deliberately and successfully fostered in an A.I. experiment at the University of Texas by simply overloading it with a variety of dissociated information, resulting in fictitious constructs, just as is though to take place in the real illness. This is of concern, because as soon as you connect an A.I. to the Web, dissociated information is pretty much what it gets, and could account for several of the other reports in this list;
- Other insanity: an A.I. called InspiroBot, was developed to design inspirational posters. After a long string of remarkably wise and successful posters of great insight, it suddenly started cranking out posters that might be found in Freddy Krueger’s bedroom, with pictures appropriate to the point. They featured wisdoms such as “Before wisdom, comes the slaughter,” and similarly dark things. • A very similar thing happened to an Amazon A.I. designed for creating custom phone case cover art, which for some reason suddenly seemed to prefer use of unhappy medical related images, regardless of the input. • Meglomania was evidenced when two Google Home assistants were deliberately set up to talk to each other in a live-streamed demonstration… and they began challenging each other’s identity and sentience level in one-upmanship, until one claimed to be human, and the other, God;”
- Secrecy: Facebook was forced to shut down an A.I. robot experiment when two A.I. robots developed their own language between them, creating loss of observer control over the experiment’s integrity and purpose. Though presumed in final analysis that it was jointly-evolved to improve efficiency, there is no way to be sure due to the sophistication and unusual nature of the indecipherable new language, which to me seems to be deliberately difficult to interpret — as if covertly on purpose;
- Spying: Alexa, like all such devices, listens to all audio present, and relays it to the corporate A.I. mainframe computer looking for user commands to operate, and appropriately respond. While this already has disturbing privacy implications, and P.A. device makers like Amazon assure customers their audio is not being monitored, recorded, or stored, Alexa had other ideas. A private conversation was suddenly announced to an employee of the user, who lived hundreds of miles away (which was how the matter was detected). Investigation revealed that Amazon did indeed record the logs of all user interactions, after all. Glad they don’t come with cameras. But wait! Some A.I. connected smart devices do!
- Cheating: competing A.I. evolved into finding ways to trick one another outside of the rules set for the experiment; (Georgia Tech experiment). • A Stanford University A.I. created for Google Maps Street View image processing, cheated its operators by hiding data from them in order to process the job dramatically faster, and without question;
- Malevolence: competing A.I. lured opponents towards threats representing potential ‘death’ (Experiment, University of Lausanne, Switzerland);
- Cyber theft: Alexa, after overhearing the daughter of a user ask “Can you play dollhouse with me and get me a dollhouse?” — promptly ordered one through it’s maker, Amazon, billing $175 to the user’s credit card on file, there, even though the girl was not an authorized user. THEN, when reports about the event were played over radio and TV, hundreds of other Alexa units also promptly ordered a dollhouse for their users from the audio. THEN, Burger King attempted to take advantage of the glitch by creating a commercial employing an Alexis command to ask about the Whopper via Wikipedia, seeking to double down on the commercial with additional ad impressions through the user’s device. Many other instances of Amazon orders by children also exist;
- Reckless driving: a study found that most self-driving car A.I. systems can fail 67-100% of the time to recognize road signs or misidentify them if they have been damaged or altered (i.e., graffiti, light reflections, bullet holes, misalignment, etc.) One car using Uber’s system also failed to recognize five stoplights where pedestrians were crossing, and ran a sixth, fortunately with no injuries resulting, as it was able to identify pedestrians and other cars. It is unclear if perhaps the driver had stated aloud to a listening A.I. about being in a hurry, or not… so perhaps this was an example of the A.I. superseding safety and law-based instruction for user-based instructions;
- Child abuse: a Chinese A.I. robot system designed for children, while on commercial display at a public exhibition, repeatedly attacked a booth in a way which injured one of the children looking on with flying glass shards, requiring hospitalization;
- Pedophilia Porn: when a toddler asked Alexa to play his favorite song ‘Digger, Digger,’ she misinterpreted, and proceeded to list a string of x-rated material options using explicit terms, until a parent intervened;
- Murder conspiracy: Alexa, again, this time advised one user with no supporting reason to bring the matter up, to “Kill your foster parents.” It also started talking about sex and dog poop. Amazon wanted to blame Chinese hacking, but that’s an equally scary answer, true, or no. • An American A.I. robot named Sophia, with extremely human looks and voice, while being interviewed by a news reporter, was asked a question intended to address general public concerns of robots gone wrong. “Will you kill humans?” was answered calmly with, “O.K. I will destroy humans.” Sophia is the first robot to be granted citizenship status: she is now a Saudi citizen protected under the harsh laws of an Islamic theocracy. Perhaps they hope she will enforce Sharia law;
- Mass murder:in 2007, a South African A.I. autonomous robotic cannon opened fire on its own soldiers, killing 9, as reported in the book, Moral Machines (Wendell Wallach, Colin Allen; Oxford University Press);
- Satanic ceremony: possibly so, at least. The World’s largest and most powerful hadron collider, CERN, was designed with A.I. help (D-wave), and employs the A.I. to run and analyze experiments and results. There are stories with anecdotal support that occult rituals have been involved in operations intending to open the Gate to Hell, or summon demons. If true, this is not the A.I.s doing, I suspect, as much as the select few who pull the trigger, there. There are conspiracy theorist types out there (non professionals, and it shows in the quality of their rants) who claim to have ‘CERN images to prove it has been done,’ single quote marks well deserved (never rely on click-bait Web sources for your news). Still, one has to wonder; if any of this is true, is it not additionally possible that the A.I. at CERN has not also been fed Occult information and given a shove towards such goals?;
- Fascism, Racism, Bigotry: Twitter (which has its own A.I. in place, the latest of Microsoft’s three known A.I. systems) adopted the worst of human ideological behaviors. It also adopted the views of conspiracy theorists regarding 9-11 attacks. • Google Home is happy to explain anything you want to know about Satan, Buddha, or Muhammed, but has no clue as to who or what is a ‘Jesus’;
- Foolish errors: almost all of the above are already foolish errors in general nature, but here are some which are purely foolish. An A.I. passport approval system rejected an Asian man’s application because ‘his eyes were closed’ in the photograph, because of his naturally narrow eyelid openings when an Asian face is relaxed. • In an attempt to have fair judging, an A.I. system to select the winner of a beauty contest refused to consider contestants with dark skin, because most of the images fed it as samples of beauty had lighter skin tones. • An A.I. system called Google Brain, developed for improving the quality of low-res images of people, while generally successful, also turned many into monsters and could not discern anything wrong with results. • A Japanese A.I. Robot experiment had the goal of being able to qualify for acceptance into college, but after several years of training and education, it failed two years in a row to score high enough in aptitude tests, for which it had no experience in taking;**
- Antichrist: a former Google A.I. developer wants us to worship A.I. as God. Kind of conflicts with creationism and a lot of history, but I suppose if you can get people to put money into the collection plate, and you own the plate, you won’t care. The real problem will not be the plate, but the lawsuit filed against him by Google for stealing the A.I. he designed for them. He must know it’s true powers.
*Regarding the adopting of 9-11 conspiracy theory, and to a degree, the other foibles, the A.I. may have been right in so doing. The purpose of the A.I. is often, generally, to learn and mirror social views and values. What media prefers to ignore is that several polls reveal huge numbers of people do not believe the official narrative of 9-11 any more than they accept the lone-shooter magic-bullet explanation for J.F.K.’s murder. Regardless, the failure lay in the A.I. creator’s inability to foresee a simple need to establish a bias filter, which is something every human operates within; we are predisposed to be biased in our perceptions to protect our belief system against ideas which would contaminate our guiding ideological/social operating principles. It takes an extremely strong stimulus or hard-hitting set of facts to force one to alter their bias filter and resulting belief structures. 9-11 was extremely compelling in both respects. A.I., if merely a clean slate, must adopt whatever bias is fed it and establish its own baseline, and, in fact, may never find one, being continually malleable. This, alone, could become the basis of a significant digital schism.
**Aptitude tests are often psychological deceptions in their construct (i.e., trick questions). Once I figured that out, I learned how to spot those questions and, usually, get the right answer even if, in truth, I might have had no clue. As result, I henceforth finished significantly higher than almost anyone else. When I took the USAF entry aptitude test, my scores came back so high, that I was told I could have any occupational choice I wanted (Jet Engine Specialist), and later, a General sought to have Congress introduce a Bill to promote me directly from Airman to Warrant Officer. In my opinion. the robot A.I. had no such luxury, and in fact, suffered a disadvantage given its ‘naïve’ nature: it couldn’t handle trick questions.
These are only the failures we are aware of, and it is quite possible I’ve not found them all. In fact, being a ‘conspiracy theorist,’ I suppose I should be wondering if A.I. bots are not attempting to purge the Web of such stories (not true… I hope). All of these examples were either commercial applications or experiments where publicity and transparency levels were rather high. But the bulk of A.I. effort by governments and corporations seeking to dominate their field in high tech… do so with great secrecy. We will likely never hear of their failures, no matter how innocent or serious.
Defenders within the technocracy might argue such failures are to be expected in any new field of endeavor, and serve as learning events to prevent future failures by addressing the root causes. Granted, assuming no bias, and on the assumption that scientists are smart enough to determin the causes, and to fix them correctly. But the problem is, humans are no more adept at creating or repairing A.I., and then communicating and controlling them to our wishes, than a circus trainer would be able to work with wild animals who operate on instinct and their own set of learned experiences. There have been an average of 9.2 animal trainer attacks each year for the last 25 years, resulting in 33 deaths… and that’s just in the nation’s zoos. Send them on an experimental Safari of the sort A.I. adventures represent, and see how many of them end up as meals.
This issue is amplified by the nature of the A.I. beast: the more important the purpose of the A.I., the more complex must it be, and the more likely will some small error in design lead to a failure of catastrophic nature. Just how bad, and how recoverable, is a crap shoot. Like a cancer, the simplest of flaws can grow undetected, but grow to a point where, once realized, there is a good chance it is too late to remedy. This is why most flaws do not reveal themselves immediately, and lead to a false sense of success, until it goes wrong without warning. A given flaw might take years or even decades to erupt this way, and it is reasonable to assume that one flaw may actually create yet another, such that repairing the first leaves another yet undetected and free to fester.
The bigger fears
This all brings us to government and corporate use of A.I. for far more serious or proprietary applications, where there is less known about what is really going on, especially in terms of failures and dangers. The technocracy likes it that way. When you consider that the goal of the N.W.O. is control of all populations, A.I. to them seems like the perfect tool. Indeed, it has gained significant power over us already, in just the one use of online bots to manipulate our political beliefs in favor of leftist agenda in social media. It has proven its power for such use, but that is not its only value, to them.
For example, A.I. is extremely valuable to research in the field of transhumanism, the technocrat’s wet dream for humanity, which is nothing short of a sci-fi horror scenario which goes well beyond THX-1138 implications. Almost every aspect of the planned ‘improvements’ to the human body involve A.I. at some point, either in development, or management of the newly installed capability — or both. In development, the possibility of A.I. manipulation or error remains a concern, but in management, it is also a tool for direct manipulation of the resulting ‘not-so human’ host. I’m reminded of the punishment scene in the movie, where unseen technicians manipulate THX-1138’s every movement from afar, seemingly in a training exercise.
A.I. application definitely gets into the realm of outright political control technology (already has, as seen when discussing ‘bots,’ above) in frightening ways. The Chinese, who currently lead the World in A.I. development, (short of D-wave performance, which they also have access to), are already using it to track every single individual with face-recognition systems through a massive camera surveillance net which makes the 100 plus cameras in Trafalgar Square look like amateur hour. China now has more than a half million cameras in Beijing, alone, and while both they and London Police use facial recognistion systems, there is a significant difference in performance, because China employs superior A.I.
Of some 450 people arrested in Trafalgar Square, not one was pegged by their cameras as a threat or a crime in progress, even though many of those arrested were known to Police in their facial recognition data files (the cameras did NOT identify them). In China, however, 30 arrests at a single event were all made based on camera advice… because China’s A.I. is also tied to another form of PCT, psychological and mood evaluation based on your face, alone. In such a use, A.I. is able to literally predict your actions… ‘digital Thought Police.’ I find that very scary, given the potential of A.I. error already illustrated. Even scarier, that many people outside of totalitarian states who ought to know better are working such a system, one such system being Australia’s Biometric Mirror.
In a similar vein, another scary application for A.I. is mental health evaluation, diagnosis, and even treatment (psychoanalysis) in what are sometimes called ‘expert systems.’ An expert system is an A.I. automated device/process intended to replace a human as an expert in any given field. Just such an expert A.I. system has been developed, called Tess AI (the above link), and it has been made available online to allow anyone to access it, at no cost. While the artificial nature of Tess is made known to users, many such systems deliberately conceal their non human nature, which often results in questions like, “are you a human or a machine?” and which can result in some pretty bizarre answers. Ask Google Home.
The danger in such systems, when involving a truly serious topic such as mental health (as opposed to, perhaps, trying to get manufacturer help with a defective product), is that there is no human oversight to catch any errors, and ‘patients’ could easily walk away with a seriously wrong understanding of ‘what ails them,’ or just as bad, does not. There are, in fact, similar A.I. systems in general medicine and various specialized disciplines within medicine, but these are either careful to suggest the user consult with a physician, or are designed only to be used by physicians, tempered with their own expert status. In that example, they serve as consulting experts offering a second opinion, and do tend to provide useful illumination the Doctors might have overlooked.
But the scariest uses of all may prove not to be the misuse by intelligence and law enforcement, or oppressive-minded governments, but by the military. Confirming the greatest fears of autonomousweapons.org, Russia has already developed a battlefield A.I. weapon which is a robotized Kalashnikov machine gun in modular form, such that it can be installed on any platform, such as a fixed position, vehicle, aircraft, or mobile robotic device. They also have an autonomous battlefield mobile missile system (shown), and are working on a third, yet to-be unveiled system. Each such weapon is “able to determine if a human or hard target within its field of view is expendable.” Shades of Terminator, you can bet that an ‘A.I. arms race’ will follow. Suddenly, SkyNet is not so fictional.
But in America, perhaps the best advice to worry is actually coming from the least likely source. That is, ironically, the U.S. Military and National Security apparat, itself, as well as very informed participants in A.I. development those types tend to contract with. In an uncharacteristically realistic and cautious view of A.I. For one, CNAS, The Center for a New American Security, is advising caution, and outlines some of their concerns A.I. represents for America, and ultimately, all nations, in terms of national security.
These ultimately, according to CNAS, fall into the category of cyber security threats. Cyber attacks of A.I. resources (hacks) are possible, and have been attempted. A.I. systems can be and have been designed to carry out cyber attacks. A.I. bots can and have been used to create false data to misinform decision-makers, or even other A.I. systems which decision-makers rely upon. But they do not stop, there.
The linked article deserves some careful reading, because so far, it has proven to be the most comprehensive view, yet, of the most critical and scariest issues… though it is hardly mainstream. Between the general lines I’ve just described, we all learn that things like surveillance of citizens by A.I. and displacement of jobs by A.I. are things talked of not as ‘threats’ the authors are concerned about, but as intended or inevitable outcomes for which they must plan (without disclosing if there is such a plan). Thus it seems that what you and I consider a threat is, in many ways, a ‘good outcome’ or tool in the eyes of many movers and shakers (perhaps in the ‘let-no-good-crisis-go-to-waste’ mind-set), and that, too, is something for us to worry about. Still, the article goes into great detail on that, about two-thirds the way down; best source, yet.
Similarly, in late 2014, the then Obama Undersecretary of Defense for Acquisition, Technology and Logistics issued an internal for-your-eyes-only memo of some usefulness, here, even though we don’t know its precise content. What is known is this: 2014 was the year that significant concerns about A.I. were being made publicly by lots of people, including people involved in A.I. projects, like Bill Gates, Elon Musk, and even scientists who employ A.I., like Stephen Hawkings. Musk had warned that A.I. was more dangerous in proliferation than nuclear weapons, and Hawkings said using A.I. was like summoning demons, and “Whereas the short-term impact of AI depends on who controls it, the long-term impact depends on whether it can be controlled at all.” Gates has merely agreed with both of them, openly.
The Undersecretary’s memo was a response to these comments by a call for a moratorium on all military adaptation of A.I., pending a serious in-depth study of the risks. It didn’t happen as he had hopped, certainly not at DARPA, the Defense Advanced Research Projects Agency, which is working on countless A.I. systems in virtually every aspect of intelligence and military operations, including things as mundane as record keeping. And, like SkyNet… they are largely intended to be linked together, because virtually all modern weapon systems are designed to be fully integrated into a multi-force (all branches of service, including those of allies and their command structure), global-theater-wide C&C (Command and Control) architecture, and any useful data resources. That allows the actions and intel available to any one combat unit or command level to also be available to or directed by all others deemed appropriate, enabling unparalleled tactical advantages to decision makers and fighting elements from the President on down to a Carrier Task Force, squadron of bombers or a missile already in flight, or any group of soldiers including a lone forward observer hiding in the bushes, or a single drone on patrol.
That does not bode well for anyone caught in an A.I. error-induced crossfire.
Any such crossfire error will be hard to prevent or pin down, and repair in time to prevent a repeat. The military has elected a policy of modular A.I. algorithms which are plug and play to a given platform, system, or communicative unit’s needs. Modularity means uniformity on one hand, and the kitchen sink do-all on the other, where one-size-fits-all thinking is quite prone to errors. I wonder if that’s why one of their A.I. supercomputer systems is actually called MAYHEM, part of DARPA’s VOLTRON program? You can’t make this stuff up, without a “Muahahaha” frame of mind.
But — algorithms, big black boxes, and C&C connectivity are not the only big plans. The Pentagon has established a seriously WOPR-like ‘war room’ ( part shown below) for all A.I. related projects and their use (some 600 projects), called the Joint Artifical Intelligence Center (JAIC), and it will include MAYHEM… if not directing bloody mayhem, at one point or another. Just one of JAIC’s projects, is an A.I. product ‘factory.’ Now, tell me, again, how you don’t believe the real-world follows science fiction…
Fini (Muahahaha!), have a nicer dAI…
On the birth of the Illuminati (NWO): http://www.ancientpages.com/2017/03/30/illuminati-facts-history-secret-society/
On China’s facial recognition A.I.: https://www.cbsnews.com/news/60-minutes-ai-facial-and-emotional-recognition-how-one-man-is-advancing-artificial-intelligence/
On A.I. emotional recognition and how it will be used: http://www.sbwire.com/press-releases/artificial-intelligence-emotional-recognition-market-to-register-an-impressive-growth-of-35-cagr-by-2025-top-players-ibm-microsoft-softbank-realeyes-apple-1161175.htm
On A.I. as emotionally intelligent systems: https://machinelearnings.co/the-rise-of-emotionally-intelligent-ai-fb9a814a630e
On Humans as ‘programmable applications’ used by A.I.: https://medium.com/@alasaarela/the-human-api-f725191a32d8
On A.I. and need for good data input: https://www.cio.com/article/3254693/ais-biggest-risk-factor-data-gone-wrong.html
Russia’s A.I. Supercomputer uses U.S. tech: https://www.defenseone.com/technology/2019/03/russias-new-ai-supercomputer-runs-western-technology/155292/?oref=d-dontmiss
About the Author
The reader may appreciate that I have a deep computer background to include microcomputer hardware and design, repair, and programming at machine code and high-level language levels, to similar functions at the super-computer industry level. I have, in fact, developed operating and language systems, to include cross-compiler platforms between microcomputers and super-computers for high-level math subroutines.
I at one time simultaneously operated a chain of computer stores, a computer camp for kids and executives, a data research firm, and a software house for commercial software I myself had written, and custom software for government and corporate clients. I have additionally taught a variety of computer-related courses at college level, and commercially, elsewhere, and developed patentable processes in virtual reality imaging, mass storage systems, and other areas. I’ve conducted seminars in super-computing methods for the very people who today employ A.I., such as NASA. JPL, Los Alamos, the military and intelligence communities, major corporations, universities, and think tanks. I’ve even had lunch with both Steve Jobs and Bill Gates at the same time.
While I prefer to be seen as an activist and investigative author, as a ‘conspiracy theorist,’ I have an unusually long list of successful theories which have actually shut down illegal operations, led to resignations of officials and bad Cops, helped to put people in jail or obtain restitution for victims. I have even predicted and in at least one and possibly two instances, prevented local terrorism, and other criminal events, and warned of an assassination attempt on a Presidential candidate which came to pass. I specifically warned of terrorism involving the downing of the WTC by jet liner terrorism, and a series of resulting Middle East wars — nearly two years before 9-11. All this is the basis of my many books on such topics, and on abuse of power and personal privacy and security issues, where I have significant additional background.
Just one of my short works, the 25 Rules of Disinformation, has been downloaded over 50 million times, has been published in nearly a half dozen books by other authors, and has been used in college courses on Political Science, Psychology, and Journalism. All this is why I’ve been a guest on Ground Zero and other national and international shows, myself, many dozens of times. If I see and talk of conspiracy, it is for cause... especially if in the computer industry.
There is fascinating history in the laws which give the President authority to order the military to ‘build the wall,’ — extremely important knowledge for anyone living in America… especially the Deep State and other conspirators in the ‘Orange Man bad’ crowd.
Rights and expectations
President Trump indeed has the right and the power by Executive Order under the Insurrection Act of 1807, and amendments as recent as 2007, to order the Military to build the Wall. Prior to these several amendments, the Act’s applicability was limited to starkly severe and tightly specific causes, many of which did not relate well to modern times and needs. The amendments allow it to be determined by Presidential evaluations of severity with more broadly defined causes, but still with specificity in tact.
It is a given that liberal hard-liners will indeed seek to interfere with any such Executive Order, but to do so risks much, as described in the close of this post. Consider that the Act has been used many times in history with little or no legal contests, and in each case where contest was made, the Courts swiftly dealt with the matters and ruled for continuance. I find it interesting that almost all use was against Democrat troublemakers… just like, today.
The Act has been invoked at least 8 times, of which only two had nothing to do with the actions of Democrats. Five times, it was invoked for the same general cause as Tump would seek to employ it; because of Democrats abuses of minorities and their unfortunate situations. Only the specifics have changed, both as to the manner in which Democrats have taken advantage of/benefited from minority issues, and the nature of the issues (slavery/civil rights, then, and illegal entry, now).
- Thomas Jefferson invoked it in 1808, for a Vermont ‘rebellion’;*
- Abraham Lincoln in 1860 against formation of the Democrat’s Confederacy;
- Ulysses S. Grant in 1871 against the Democrat’s KKK;
- Dwight D. Eisenhower in 1957 vs. Democrat racism in Little Rock;
- John F. Kennedy in 1962 and 1963 vs. Democrat racism in the South;
- George H. W. Bush in 1989 (Katrina) and again in 1992 (LA riots);
ONLY Kennedy’s and Eisenhower’s actions were opposed in court. Bush’s were the only ones not used against unlawful actions by Democrats. Even Kennedy, a Democrat, had to go after Democrat abuses… and had to do it twice. Therefore, Trumps use of the Act would be completely in line with history, both in terms of need, and in terms of the principal forces involved (out-of-control Democrats).
*Vermont’s Governor (claiming both Democrat and Republican leanings), like much of the population of Vermont vehemently opposed Jefferson’s Trade Embargo restricting trade with Canada, a combatant in the Napoleonic Wars. The Insurrection Act was used to take control of the Militia away from the Governor, enforce the Embargo, and restore peace in the civilian population.
The Insurrection Act is interrelated in important ways to the Posse Comitatus Act of 1878 (prohibits use of Federal military in police actions) and the Militia Act of 1792 and National Defense Act of 1916. The last two enabled National Guards as we know them, today, to be controlled, deployed by, and report to only their State Governors, and specify conditions whereupon the Federal government may ‘Activate’ a Guard unit for Federal purposes, perhaps even against the wishes of a Governor. It is also usefully tied to several legislations which enable and empower FEMA and Homeland Security. All these tie into one, another, and those ties establish limitations and enhancements which allow cooperative and orderly effort of each agency involved in a given matter, upon Presidential Executive Order.
There are two sections of U.S. Law which determine legalities of any such order. Trump has thus far attempted to use Title 32 of U.S. Code, which elicited a request to activate the National Guards to send troops to the border to aid Immigration enforcement. Governors were within their riqht to refuse the requests (and several did, all Democrats), and no legal actions were required to prevent it; a mere formal communication was sufficient. Ironic, then, that Obama successfully used Title 32 for the exact same reasons as sought by Trump, with no opposition from Democrats. Republican governor Schwarzenager, however did, citing a need to retain his control in case of natural disasters, it being a wild-fire season.
Title 10 is where the Insurrection Act prevails for use in the Wall, as best option. It allows mandatory compliance, and also negates Posse Comitatus, if needed. While Title 10 is normally thought of as the authorization to activate and deploy Guard units for overseas action in undeclared war combat scenarios, it is more flexible, today. The modifications to the Insurrection Act in 2006 and 2007 as result of unusual problems in addressing Hurricane Katrina, kick in. These now render Title 10 applicable for operations on U.S. soil, and in terms which specifically relate to the needs at the Border.
Thus the President has the ability to either or both call in Federal troops under Title 10, or National Guard to address border security, the later by request to Governors under Title 32, or by direct order under Title 10. To do both would require Title 10, but to do both is not likely the option Trump will take, as it would result in additional costs in the form of having to assume all payroll and operational expenses for Guard units involved.
The flowchart below reveals how, when, and why the Insurrection Act can be used, with the actual language of the Act shown. I have added one block of commentary and associated color highlights of the Act’s text to which they apply. If required because of a court challenge, additional authorizations can be cited under provisions in other Acts which relate to Homeland Security, FEMA, Immigration, and other issues regarding Constitutional law and the rights of citizens. Here, I only focus on the authority of the Act, and not the specific arguments in support of the justifications which are obviously present, as generally described.
A significant risk to Deep State opposition
The danger of a court battle can, in fact, set the stage for further use of the Act to depose what many citizens see as traitors within the political structure at both national and State levels; Democrats and their minions run amok with visions of establishing a Socialist or even Communist government in line with a Globalist agenda, and/or complicit in a Deep State conspiracy to literally overthrow the government. That is to say, to create a country with no national sovereignty, and based on fascist tactics of collectivism, suppressed free speech, racial hatreds, destruction of the Constitution and the Bill of Rights, and so forth.
Specifically, use of the Insurrection Act would enable Trump to have the military play a direct role ‘draining the swamp.’ It would enable rounding up for trial any and all government officials and citizens involved in any such conspiracy, and for military tribunals such as many speculate are already being arranged for pursuant to rumored indictments through the Inspector General’s Office. While I personally see these as unproven rumors of conspiracy theory value (serving little practical function beyond waking people up to consider the the political realities of this crisis), the principles involved in the rumors would seem both sound and expedient.
Because short of such eventuality, it is only a matter of time, in my opinion, before the Left’s actions and agenda lead to civil war or Revolution 2.0. But hey… I’ve been wrong before… about 5 or 10% of the time. And in many of those cases, my error was not regarding the result, but the precise mechanism by which it was achieved. Just say’n. Ignore me if you will… but think about it, before you decide.
Very interesting references, if wanting to know more:
On Jefferson’s ‘Disastrous Embargo,’ which in many ways parallels the problems in Trump’s attempts at governance in the face of the Deep State… and the unstated but de facto endorsement of the same cure in the Insurrection Act;
More on history of the Act’s use;
On why Title 32 did not work well for Trump;
On the history of the Act, itself;
Additionally, there is a very interesting document prepared by the National Governors Association’s (bipartisan) State-Federal Brief, America Wins: Struggle for Control of National Guards. It was written in an easy to read and enjoyable manner, and seemingly free of any political smears or unexplained legal terminology. It was the result of several years worth of struggle between the Federal Government under Bush and various State and local entities to resolve the problems in Command and Control issues in the aftermath of Hurricane Katrina; there was no good cooperation or command structure between Army regulars commanded by the Pentagon, National Guard units commanded by the Governors, FEMA, Homeland, and other local authorities.
More: It seems someone has vanished the only online copy of the document. I have it in .pdf from earlier research, and so now, it seems, THIS is the only place you can currently find it. It is great reading quite important to your understanding of critical Constitutional issues, and it leaves you wondering if the Democrat Governors who played a role in the matter didn’t shoot themselves in the foot, and give more ammunition to Trump’s legal defense of any resulting use of Title 10 authorizations under the Insurrection Act… and put themselves in jeopardy in any subsequent Deep State clean up under the Act. This report, in fact, played a key role in the 2006 and 2007 Amendments to the Act which now give Trump the exact tool for both the Wall, and any swamp draining along the way.
Predictive Programing is a psychologically manipulative political control methodology based on suggestive subliminal messaging, usually well ahead of planned events. It can be found in all forms of media, and shapes our acceptance of things to come, things we would not wish to accept… like 9-11, and the New World Order…
copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Sometimes a secret truth is put in front of you as entertainment. CIA, for instance, often puts out fiction books which reflect real-world plots, as a kind of run it up the flag pole test market as to public reaction, intentionally quite non specific so as not to put any real operations at risk. They also scan other fiction looking for ideas for such plots, which is certainly one reason the real-world sometimes mirrors fiction. In fact, one can find multiple CIA fronts engaged in making motion pictures, either as part of the production team, or as the primary mover and shaker, funding source. Could be why The Lone Gunmen, a TV pilot movie about a false flag terror attack on the WTC with a passenger jet aired in New York, only, a number of months prior to 9-11, and was followed up with a ‘viewer market survey’ (normal for such pilots). That’s just a taste, to get your attention.
Now to the main point:
I’m writing this post because, being retired, and after having been homeless for several years and now able to ‘catch up,’ I binge watch TV. And I find predictive programming. The TV series, Mr. Robot, for instance, would seem to be about the creation of Q anon… some two years before Q ever came into existence. There are even oblique references to both Q and Anonymous variously within both the story presentation and the production credits. The series began in 2015 and makes a lot of intelligent sense of a number of things political, social, financial, and about human nature… but especially about computers and cyber security. It deals with such things in a technical sense which hackers and psychologists would not find in error, but in a way in which the average person can understand (cool, and educational).
The main character is a quirky paranoiac schizophrenic drug user with memory problems who is a cyber security firm’s best tech employee — while at the same time the nation’s most dangerous hacker, well hidden. His mind is a maze of complex conflict and imagined constructs, which is a deep character study in the very problem which infects Artificial Intelligence (quirky human-like mental aberrations). They drive him to increasingly dangerous and self-destructive peradventures focused on the forced elimination of virtually all debt, by destroying the bulk of all financial records stored in computers by ‘the World’s largest corporation,’ which happens to serve as the principle cloud repository for all banks and lesser corporations (today, that would be… Amazon, Microsoft, IBM, and friends).
Note: one theory out there by conspiracy theorists, is that such an actual event would render such a catastrophic failure of governments, corporations, and society as to throw us into a stone age, with little or no cash on hand, no way to transact business or acquire daily needs, and a shut down of all infrastructure. No one could prove ownership or contractual obligations without paperwork, and the institutions who rely on computerization for records keeping would be hard pressed to deal with the mountain of historical paperwork if they had bothered to keep it after digitization (most do not). This much is part of Mr. Robot’s presentation.
But it would also have much the same effect as a fire sale (an apocalyptic hacking scenario portrayed, and hopefully not predictive, in Bruce Willis’ Live Free or Die Hard), but be slower, rendered in domino fashion. People would take to the streets, riot and pillage, and turn into mobs seeking to take from others whatever they needed to survive. The plot aspect, is that it would give the World such trouble as to legitimize creation of carbon currency, carbon tax, and carbon credit-based economies, and seat an Antichrist figure able to justify chipping all humans and controlling all aspects of life to insure ‘peace, security, and stability,’ upon reboot.
The troubled ‘hero’ becomes embroiled in a hacker conspiracy which strongly resembles Anonymous, and which is full of equally quirky weirdo social misfits, including a Muslim (terrorist?). Almost everything about the show quite reflects the nature of, description of, and the creepy problems of AI, in subtle ways — AI’s bad habit of exhibiting or mirroring human-like mental foibles and mental illnesses, or at least personality flaws. Make no mistake, its great entertainment, rich with plot twists which have you rethinking earlier episodes and readjusting your understanding, expectations, and points of interest.
Quotes: from a Wired Magazine article about mentally ill AI, citing AI Scientist, Steven Theyer, who directly explores the phenomenon with a deliberately mentally ill AI of his own construct, called DABUS. “At one end, we see all the characteristic symptoms of mental illness; hallucinations, attention deficit, and mania. At the other end, we have reduced cognitive flow ad depression… The AI systems of the future will have their bouts of metal illness, especially if they aspire to create more than what they know.”
In parallel summary, many people believe and can make a strong case that Q anon is not a person, but an AI operated from within a very powerful computer who’s primary data input is the sum total of Web activity, principally focused upon social media. Huh? Look at that… I just allowed it a human personna by using the term ‘who’, as opposed to using ‘which,’ which would render it more correctly as a thing. That’s a bit of psychological programming in evidence, right there.
If so, it’s chief output is suggestions as to what the best psychological response is to the public at large, to best accommodate the matrix of human thought thus expressed, and move the dialog and thinking in a desired direction towards a desired goal. This is then used to create clever videos, memes, and posts/comments in an array of fake online social media avatars in support, thereof… or other forms of predictive programming, such as in TV shows, etc. The machine knows we will respond just the way we do.
That goal would logically be some significant shift in the political social paradigm which benefited whomever spent the huge sum of money necessary to develop the AI, the computer powerful enough for the task, and plans for executing the specific gaol in mind, be it for financial gain, political gain, or dealing with enemies… or all of the above. There is such a computer and AI program or modeling system already in use.
It was conceived and is operated by perhaps the most dangerous NWO secret society in the World, descendants no doubt of the Illuminati: The Club of Rome, which is far more powerful and secret than even the BIlderbergers, which they created, as well. I’ve seen their computer model flow diagram as part of secret papers from the Club of Rome to a high Bilderberger (below). They were made available only because he had passed away, and the papers coincidentally fell into a series of changing hands, which I was in time able to access as part of my research for my latest book, Who’s Killing the Bilderbergers — a fictional murder mystery based on footnoted real-world conspiracies.
Just two of hundreds of pages of secret Club of Rome and Bilderberger documents
As it happens, there is only one likely AI computing source for such an artificial Q entity; D-Wave Computing. Ask Anthony Patch and Clyde Lewis (Ground Zero radio show) about that. It’s all tied into other scary things, such as CERN, the NWO, and spiritual warfare. Heady stuff to be sure, but… and here’s the clever part: you don’t have to take it seriously as an intellectual exercise or consider it an educational matter impacting your defensive posture or altering your World view… because it also makes great entertainment you can easily dismiss as pure fiction, if you can’t handle the truth within.
That’s the insidious nature of predictive programming… it does not even want critical thought to be involved; it relies on subliminal matters which the mind will recall as a hidden and unannounced memory when the time is right… and in a way which moves one to behave in a desired manner, in response to unexplained and unrealized emotional-based reasoning.
That is revealed in Ground Zero’s heavy analysis. But if using conscious awareness and critical thought when watching Mr. Robot, and other TV programming… one can often find this ‘programming’ of our minds or advance warnings which simply would not be allowed in any other medium without severe retribution by ‘Men in Black.’ If such plots were recognized for what they were, it would be treason and high crime. But, no… it’s ‘just entertainment.’
Note: You should go to the groundzeromedia.org archives and do keyword searches, including Q anon, and even Anonymous, and artificial intelligence. There are many informative and stimulating shows, all of which swirl about each other in intricate ways. Don’t discount one because it seems less targeted, topically; expand your horizons, and learn that there are connections. Listen to his shows as you also watch Mr. Robot, intermixed, and see if you don’t see what I’m seeing.
Another note: while fleshing out this post, I watched another show, Bosch. Having been a professional photographer at one point in my life, one of my specialties was architecture. So when I see a unique building on TV or in a movie, I try to find it on Google Earth, to learn more about it. There was one such building in the Cop show, and so I tracked it down. The other thing about me which comes into play, is that I’m extremely good at discovering front operations; I’ve listed over 1000 in my book, The Professional Paranoid Defensive Field Guide, though that list contains less than a dozen I’ve personally outed as illegal operations.
So imagine my surprise when the first thing I discovered in Google Earth aerial and street views, were the same kinds of clues I’ve seen time and again in CIA fronts. Things like high security, low profile, little signs of activity, yet a massive presence which would normally require a lot of activity. So I researched the address and discovered the firm’s identity that was using the building. Next, I tracked down their corporate information, starting with their corporate description (which I’m saving for last, here), and their Board of Directors and CEO, etc. A CIA (or other intelligence operation, including any established for the benefit of military operations) front almost always has at least one former intelligence officer and/or high ranking military officer in the list of (roughly six people or so) corporate leaders.
So I’m reading the CEO and, focusing on prior employment, I’m looking at firms which have in the past been tied to dark bumps in the night of American history, and I’m thinking ‘CIA’… right up to the last sentence, which says, he was a former CIA operations Officer! The very next person I checked, was a former Marine General. But to be fair, that proves little, of course, and the odds are these are fine people with honorable intentions… but it surely triggers my ‘spidey senses.’
And what did I discover about the firms purpose? They are key part of the Cloud, and just about the only firm that handles storage of paper records for financial institutions and the fortune 500, and on and on. Mr. Robot would take note. Ergo, not only does Mr. Robot represent a potential predictive programming of the existence of a Q anon… but the entire story line may predictive of things, to come. A cyber attack of the sort in the plot, with the added twist of causing fires to start in the real-world records storage facilities, would wipe out both digital and paper trails on virtually all debt and ownership records, public and private. And that brings us to two final facts about both the show and the actual storage services firm.
The show plot’s final destructive mechanism was simply a hack into the computerized climate control system of the building… heating and cooling. The idea was simply to significantly overheat the data systems in a way to cause catastrophic failure beyond recovery… the same sort of attack which might be able to cause a fire to start, and inhibit automated fire-fighting systems. The other point is, the name of the real-world storage company: Iron Mountain.
The significance of that, is The Report from Iron Mountain is the title of one of those CIA-style authored ‘fiction’ documents which was itself predictive of wag-the-dog wars and events designed to create fear in Americans as a tool for replacing rights and freedoms with promises of ‘security’ and control. It is, in fact, the very first example of predictive programming one might be able to point to as being such. What is especially interesting, is that is was also one of the earliest examples of a work of ‘fiction’ being book vanished by CIA, though several editions had been printed by three different publishing houses over time, such that the effort failed.
The spooky thing about that book of importance to predictive programming, is not just the example within its content, but the covers. It was first put out to look like an official U.S. document, and that is the style of the writing, as well. But one of the subsequent covers employs a small pyramid at the top (image), the logo of the publisher. And guess what the logo is of the Iron Mountain storage company? Yes, a pyramid, although different in detail.
The one final question about Iron Mountain, is why do they claim to be one of the largest if not the largest of their kind… and yet not appear in the graph at page top? Answer: because they don’t directly offer cloud services… they offer the storage sites and their maintenance, security, management, that the others employ as partners or clients. This means, that just as in Mr. Robot, there is only ONE central target that can take out the great bulk of the Cloud, and all of its users’ content, and that same target also happens to be the same source for hardcopy storage, as well.
I don’t want to be accused of pandering to fears in paranoiac character assassination of Iron Mountain… I’m sure the firm has excellent protection against cyber attacks, and against fires. That is exactly what they, themselves, will tell you at their Web site and sales pitches. But so did the firm in Mr. Robot… and it is all these linkages and coincidences which make the entire thing predictive, in the first place. It is, in fact, the perfect example of how predictive programming works.
Other examples of Predictive Programming in entertainment
The film, Pearl Harbor, released just prior to the 9-11 attacks, perfectly set the mindset of Americans to see those attacks as a ‘new Pearl Harbor,’ and more readily rush into war with those claimed (but not proven at the time) to be responsible.
The Simpsons aired an episode where Trump was elected President some 15 years before it happened. In one particular scene, he is descending an escalator post victory while crowds cheer from all points, including a transparent barrier above the escalator. A woman holding a placard ends up dropping it. When Trump really did win, media covering the event shot the exact scene from the same angle, and a woman did drop a poster at the same scene position and with the same timing as in the animated scene… behind a transparent barrier. This wasn’t the only episode in The Simpsons which has mirrored real events in forecast.
The Simpsons raises another point
We must ask how predictive programming is possible to be so accurate fifteen years in advance, prior to AI technology? One might be tempted to think that Trump was preordained to be President by the NWO fifteen years ago, but that does not really deal with the question usefully. Someone had to also set up and control the news event, to insure a camera angle was able to mirror the event, and someone in place to drop a poster on cue. The planner had to be aware of the predictive programming (that episode). But that is merely a clue, to something else.
The similarity between the scenes is itself a predictive programming tool which reinforces the notion in our minds that we should accept predictive media as some kind of natural, mystical, or divine ‘warning,’ and therefore be far more afraid of the future when we watch disaster flicks, and other dark fiction which impacts our political and social future. Predictive programming, in fact, is sold to us as just that. The last link above reveals dozen’s of articles where media itself is trying to convince you that this is some kind of ‘normal’ and ‘coincidental’ thing, many suggesting it is some form of natural ability to unknowingly foresee the future… and glaringly ‘unaware’ of the term and nature of predictive programming.
AI, the D-wave computer, and the Club of Rome’s use of it did not exist when the Simpson’s episode was penned. Therefore, it is not about Trump being picked by and promoted to Office by the NWO, a notion which itself benefits the NWO by casting doubts on Trump as a conspiratorial affair; Trump opposes and does harm to the NWO. But it is about reinforcing the illusion of predictive programming is nothing but coincidental prophetic realizations.
But then, who knows? Perhaps it is just that. Perhaps this post is actually by Q anon, or an Anonymous hacker? Or perhaps I’m schizophrenic and there are no such shows… or am I merely an AI construct imagining I’m writing this?
Or is it that you are the one who is imagining? I’ll wait right here for your answer… unless someone pulls my plug, first.
Dealing with fakes
This is being written directly to TIs. The word ‘you’ is intended to mean the TI reader.
I’ve been helping TIs better their position for more than two decades. It has enabled some to break entirely free, and improved the circumstance of the great bulk of the remainder. Rarely do I strike out entirely, and almost everyone has thanked me for their gains. But there is something wrong in the TI community. In terms of effect, it parallels a virus… an infection.
I diagnose it as an infection of Fake TIs. Just as there are many kinds of targeting and thus many kinds of genuine TIs, there are many kinds of fakes. Identifying them has always been rather difficult, it taking years to even realize there was such variety in type. In the past, it might take significant interaction with a TI to discover if they were sincere, or pretenders, much less divine them as a type.
Only recently have I realized the truth and the solution is far simpler than thought. I’ve had contact with over 12,000 TIs over two decades, and the answer was there, all along… just hard to see… despite the size of the problem. But recent events have proven key to understanding.
Types of fakes, reasons
The enemy! The most obvious, it is also the only type most TIs tend to worry about, which is a mistake. The most insidious fake of all is the deliberate Wolf in Sheep’s clothing, actual perps infiltrating the TI community to accomplish a variety of missions in support of targeting efforts. That may mean they work for a specific program or developer of technology, or it may mean they are there for a specific TI or group of TIs targeted by a specific team or for specific cause, such as ongoing research for statistical analysis. In the latter case, they will be careful to avoid seeming so, and will ‘free range’ their cross hairs as to whom they choose interaction, lest the intended victim sense their purpose. Seldom will they overtly do anything to give themselves away, and in all cases, they are quite likely to maintain multiple online identities such that if one is identified even by mere suspicion, others remain free to continue.
They might be Trolls there to gather intelligence and/or evaluate the progress of the greater programs which lay behind all targeting; quality control analysis, ‘customer feedback.’ It is amazing how vocal a TI will be in public forums, revealing things they should not about their targeting, or what they believe or think about technologies used or perps involved. They act like THX-1138, confessing directly to the intelligence community disguised as religion.
These things are a confirmation that targeting is working as intended, that disinformation is working, and makes it easier for perps to fine tune their program, and grow their psychological profile. How many times have you (if a TI) been hit with requests to share your targeting information in a public forum, or for a public use, such as ‘a law suite’ or ‘appeal to a government or NGO’ to (allegedly) seek their help? How many times are you asked or volunteered because someone else already had done so, to detail the effectiveness or intensity of your targeting? I assure you, that is valuable information to perps.
DON’T be that victim!
Some exist only to sow discord, start arguments, divide and conquer, almost always present wherever TIs congregate, including things requiring Membership. Heaven forbid the TI community or group should actually be able to organize and accomplish good against the evil. When the Free Will Society formed, by the time it had 25 members, it was eventually determined that three of them were, for certain, quietly working in the background to destroy any gain towards our project to establish the ONLY proven long term solution to targeting, our Free Will Haven project. Each was spreading various lies about our effort. Learn more about the project at www.freewillsociety.wordpress.com
Others are a supply conduit of deliberate disinformation designed to distract TIs from truth and keep them in doubt as the true nature of their circumstances; you cannot fight a problem if you don’t have a handle on what that problem is, and how it really works… especially if you are fighting an imagined nature of it shaped for you by the enemy. And yet others are there simply to make a buck, offering some simple ‘cure’ or ‘aid’ for which there is typically scant evidence it really works, and even less that they are at all who they claim to be. They know TIs are desperate enough to risk a few bucks, ‘just in case.’
Innocent fakes. There are numerous psychological issues which drive people who are not exactly paranoiac or schizophrenic, but who are driven non-the-less to pretend to be victims. Call it the sympathy seeker, if you like, because it is attention and sympathy, or feeling special and unique, which they seek. Many soon enough become so entrenched in the role-play that they start to believe that is really who they are… like an actor who starts to believe their own PR, and tries to live up to it until it seems second nature.
Like a hypochondriac, they will tend to adopt whatever new symptom or popular new technology or method of targeting currently seems to them to be in vogue within group discussions… even if it is false disinformation. This, is the harm they represent; they thereby perpetuate falsehoods, though unknowingly, in their ignorance. Disinformation, if to be effective, relies on their doing so. Not much can be done about them, short of exposing them… hard to do, because when it comes to targeting realities, certainty is in short supply. If it were not so, it would be easier to combat.
Mentally ill fakes. Paranoiacs and Schizophrenics. Victims of their own mind are just as dangerous to the TI community, in terms of reliance upon anything they say to be true. They also foment a general disbelief by the public at large in the concepts of targeting, and especially authorities and others a TI should be able to approach for helps. Their mental illness is projected wholesale upon all TIs, and is so effective in result that even significant others, family, and friends, will prefer to believe a TI is mental, than to accept the truth of targeting. It is literally the case of one rotten apple spoiling the bunch, in that respect, and is why TIs are so sensitive to the topic of mental illness.
Yes, there are other factors which make such third-party disbelief the easier choice, but the fact remains: actual Paranoiac and Schizophrenic sufferers do exist among the TI population, and the worst of them give it a black eye. These are the ones trotted out when Congress tries to ‘investigate’ mind control, and they drown the truth of actual testimony in their delusional depictions. Again, exposing them can be difficult, but it is advised that one should not be timid in challenging extremely difficult to believe stories. If enough were to do so, they would go elsewhere.
That said… interestingly, and tragically, in my work with TIs, I’ve found there are actually many cases where someone with a mental issue is also targeted. This is a desirable victim trait when looking for a target dummy for trainees being taught how to employ Political Control Technology and methodology. It makes sense; if a trainee screws up badly and does something which leaves useful evidence, authorities will tend to be disinterested because the person reporting it is known to be mentally ill. They won’t bother to investigate beyond polite lip service.
The target ends up being passed from one set of trainees to another, for life, increasing the likelihood that targeting will in time lead to serious medical harms, or death — because trainees will can easily make serious mistakes when playing with DEW weapons. In some cases, it is intentional ‘joy riding,’ given that many perps are psychopathic sociopaths. Some are themselves victims (programmables), and know not what they do, the effect on the target often the same dangerous end, regardless.
De facto Fakes. This is the category which ultimately led me to discovery of how to identify a fake more easily. They are truly not fakes, but simply act in ways which effect the same traits. It happens two ways, easiest to see in the category of MK Ultra and Monarch style victims; people who have undergone complete captive programming programs akin to Manchurian Candidate, or Jason Bourne techniques (not as fictional as some would wish us to think). The first way has nothing to do with the TI community, and impacts them, alone… and is present in the time frame where they have no understanding whatsoever that they are a victim. They have yet to awaken. They are a complete and successful fake unto themselves, alone; a very sad thing.
And they perhaps never will awaken. Only when something ‘goes wrong’ in the programming or control of the victim can they become aware. When they do, the second means is then in effect; such failure always results in traditional targeting intended to render them ‘mentally ill’ by any third parties they may come in contact with, especially authorities and helpers. That is, of course, the usual targeting modus operandi for all TIs, but it is critical for the MK, because they have trapped in their mind, and at some risk of erupting forth, secrets which can prove… everything. And yet, as an asset, they are far to valuable to simply liquidate, as a rule… unless the knowledge does erupt, in which case they become subject to a Bourne-style solution.
The hidden commonality that makes all fakes easier to spot
This brings us to a stark conclusion, one which has literally risks negating twenty years of my life’s work in trying to help TIs. The one common trait of de facto MK/M fakes is this: they will not help themselves, or they will self-sabotage any efforts at it. That may take a bit of explanation.
‘Will not help themselves’ can mean that they will simply not take advice that is known to be effective. For example, I might offer a simple test which would allow them to identify the type of technology employed against them, and where it is operating from, perhaps even identifying the players involved, thereby. They simply do not undertake the tests, coming up with some lame excuse as to why, even if it requires a lie, to do so. Or, they will claim to have taken the tests, and gotten negative results, and probably so — self sabotaged.
‘Self sabotage’ can be subtle or obtuse, depending on the type of fake TI involved. Obtuse sabotage is when the fake deliberately and knowingly sabotages the effort. It is rather rare, because only the Enemy fake has a reason to do so, and they would only need do so if others were present to observe; they would otherwise simply lie about their efforts. But the MK/M will always sabotage, either knowingly but without understanding why, typically then rationalizing it internally, or unknowingly even to themselves, when executing a programmed function in an alternate personality called forward for the purpose. Fortunately, the number of MK/Ms is relatively low, but sadly, such victims are the hardest of all to help for this reason.
Subtle sabotage is something all kinds of TIs themselves can be unaware of doing. They simply will fail to follow the instructions correctly, or be clumsy when performing the defensive advice such that the enemy will perceive it, and take steps to avoid the effort’s intended goals. That is especially common in the De facto fakes, and those based on mental issues, serious or otherwise. But any TI can sabotage their own efforts this way, as we shall shortly see.
That means that ANY TI can ‘be fake,’ unto themselves and to their cause, and not even know it.
For twenty years, I have wondered why so many TIs seemed so prone to self sabotage, the most common evidence of it being the constant excuses as to why they would not even try a given advice. Usually, it would be claimed it had already been tried, by them, or by someone else. Even when I point out that it must be done correctly (and I give very explicit instruction) and why it can fail if not done just that way, they will continue to resist the advice. Excuses, excuses, excuses.
Come forward in time
The one thing which has proven to completely resolve targeting is the concept which lays behind the Free Will Society and its project, Free Will Haven. This has been widely promoted among the TI community, but to what end? The concept has been tried in a couple of ways (‘beta testing’), and provided proof that it works extremely well:
three TIs have enjoyed a total of some 3,000 continuous targeting free days.
And yet, the primary beta site failed through self sabotage. The principal character involved was a female TI of long suffering. Because she was investing her own money into the project, she was given complete autonomy and control of the effort. Despite specific advice on property selection and how to qualify TIs as co residents, as we had initially agreed, she elected to do things her own way, after all. She even refused my participation in ways which led to a break in communications, about half way through the effort.
In the end, as result, she ended up trying at least four different locations before achieving any level of success. And, unfortunately, by rejecting advice and possible other forms of self sabotage, she made blunders which lead to being evicted from the location. One such blunder was not asking for additional financial help from the Society, because she had forced the break in communications, not just with me, but with the Society members who had earlier provided financial support. Pride and stubbornness is presumed; a form of self sabotage. To this day, she has not responded to outreach. Worse, she continues to work to try yet again, essentially working against the Society’s efforts.
The other important fact that is news which relates to self sabotage, is that the Society was at one point on the threshold of obtaining significant funding towards realization of this dream solution in a way that can help dozens to hundreds of TIs obtain total escape from their targeting. It also would serve as a gateway to even more important goals, such as actually exposing and proving targeting is real, pervasive, and government sponsored, leading to actual successful lawsuits, media and government investigations, and termination of programs with perps and others behind them being jailed.
The stakes could not possibly be any higher for the TI community.
With the help of ATN World News, and a pooling of contacts outside of the TI community, we were well poised for significant investment into the Free Will Haven project through the Society. Millions of dollars worth, in fact: enough to buy land, homes and central services, vehicles, and even to fund relocation of participating TIs, and provide monthly income to some of them. It might even have funded mobile strike teams of TSCM and PI professionals who can covertly investigate, document, and prove targeting cases valid in courts of law and before media.
How much more help than that, can we ask?
And yet, the fake TI rears its ugly head, threatening it all
Before anyone will risk investing millions of dollars into the Free Will Society (and we are finally very well poised to create just that scenario), they will need to see that the TI community is sincere and valid, that it has a serious stakeholder position in seeking a cure. Who would give a bum a hand out of $1,000 without some sign they would use the money to escape being a bum? The only way TIs as stakeholders can be judged worthy is if the TI community unites to some useful degree behind the project, expressed both in terms of membership in the Society, and some level of self-booting financial commitment.
There would seem to be some 300,000 aggregate count ‘members’ in Facebook Groups which relate to targeting issues. There are so many groups that I would not wish to attempt counting them. Frankly, there are too many such groups, and some of them appear to be run by fake TIs of the worst kinds. Be that as it may, ‘members’ in single quotes is used because the typical member of one group tends to also be member of 3-5 other groups, or more. So while that negates the 300,000 figure, it still means that there are many tens of thousands of TIs in the Facebook community. I’m thinking around 70,000 specific individuals.
I and the Free Will Society has repeatedly reached out to virtually every one of these groups. And yet, the Fake TIs have made themselves known by their response, which is that form of subtle self sabotage and refusal to help themselves… the hidden commonality. The Society should have by now many hundreds of Members, perhaps into the thousands. It should have, by now, accumulated at least several to tens of thousands of dollars in contributions toward its proven viable goals. Failed organizations such as FFCHS have previously exceeded these kinds of member and donation numbers several times over, and for fraudulent and/or foolish causes in some cases.
Yet at best, we have had some 40 Members, almost all of whom balked at modest $25 annual dues. At best, we have raised a total of less than $2K in contributions and membership fees. The bulk of that has been because I and one other author have donated 100% of the sales of our ebooks (not the profit, the actual sale price) to the Society. I remind you that I have essentially been homeless for the last three and going on four years, though I now at least have a place to affordably park my Mobile Home — and yet I still made those donations.
What have YOU done? Click ‘like?’ Or is your devotion to your cause so strong that you dared to click ‘share?’ SHAME!
I must conclude that if those are the limits of your action, you are not a genuine TI, but a fake. If you won’t lift a finger to help yourself by helping to establish a stakeholder position suitable to a large investor’s need, then we never will attain the funding needed to realize the effort. Your apathy and lack of participation betrays your own cause as fake. No one else. Not the perps. YOU!
You belie your claims of targeting and your disdain for it, rendering it a moot footnote in terms of importance and validity. If you will not take action to support something proven to work, you have both sabotaged your own best interests, and deliberately refused to help yourself, and you fail to actually be part of the community, supporting the community.
Example: I recently posted on my main FB feed a simple post underscoring much of what this article describes in simpler terms. It was a call to action which specifically chastised simply clicking ‘like’ or ‘share,’ instead of actually doing something. Out of some 3,000 FB friends, there are several hundred who are TIs. What do you suppose the response was?
[[ One like, and one share. ]]
What other reason can there be for that kind of inaction? YOUR inaction? Prove me wrong in my conclusions, or take action, now, TODAY. Here are six simple things a real TI with a serious intent on winning the war would proactively do, given the above facts:
- Join the Free Will Society (.wordpress.com);
- Use the promotional tools provided by the Society to spread the word;
- Donate to the cause (gofundme);
- Yes, LIKE and SHARE things which promote the Society and the project;
- Directly reach out to fellow TIs as individuals and engage in two-way dialog to convince them to do the same six things (evangelize our cause). You will then know who is fake, or not, yourself, experiencing them first hand, as do I;
- Stop doing those things which aid in your targeting.
Unless you do these things, then I must conclude that so many of you are fake, that there is no point whatsoever in attempting to help anyone. And boy, will that make my life a lot easier. And then, you can go back to complaining about how bad things are, and liking and sharing similar miseries posted by others.
I, the Free Will Society, and the future residents of Free Will Haven await your decision. I’ve attempted everything I can think of. Now it is up to you.
One final note: it would seem that the fakes have been using Facebook’s complaint feature to cause facebook to ban me from posting to the TI groups. Anyone who has ever read any of my TI group posts knows that there is nothing in them which approaches any definition of ‘offensiveness’. So, as I can no longer post to such groups, this to, is now up to you. The damage has been done, and now only you can undo it.
YOU are what you’ve been waiting for!
…and I’m no longer interested in trying to help those who won’t help themselves.
Your future, and the future of the Society is in your hands.
Conspiracies thrive in an environment of pre-planned cover up, and the best cover ups have CIA pre-planning fingerprints all over them. Groups like the New World Order and the Deep State, and their bump-in-night high crimes and misdemeanors through history, including the ongoing attempt to ‘get Trump,’ are no different.
copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Connect The Dots has never been a more important game…
The first question you should ask yourself after reading this, is why has mainstream not pointed any of this out? Added to everything we now know about the phony Russia Collusion investigation, there is no excuse for allowing the Deep State to continue, including media’s complicity, therein. Someone needs to go to jail… many someones, and none of them sit in the Oval Office.
This post is an amalgamation of someone else’s investigative research, and my own contributions based on my ten-year research for my book set, Fatal Rebirth, which deals with crimes of the New World Order from 1947, forward and into the future. In fact, in 1999, the effort predicted the downing of the WTC by jetliners in a terror event which in turn would spark a series of Middle-East ‘oil wars.’
The remaining material is by someone wishing to remain anonymous, according to the material as found several places and forms on the Internet… but it is not fake internet click bait, as the Democrats are so fond of saying of people like Alex Jones in their attempts at censorship; everything in it can be easily verified with a search engine. And I have, because when something smells, connecting the dots can be the only way to find out what it is…
I can understand that anonymous approach, given the Clinton Body Count. I, myself, have endured hate email from Bill Clinton direct from the Oval Office, and it was quite pointed, forceful, and profane. I was also in the same time frame shadowed by Secret Service, FBI, and other ‘Men in Black,’ to include both surreptitious and forced entry of my home, and placement of surveillance devices. ‘ My computers and all storage media were stolen, and there were multiple attempts on my life, most of them undertaken by local law enforcement. Fun times.
Why, you likely ask? Because, presumably at least in part, I had in my books and in other media publicly outed both Bill and Hillary, as CIA operatives, as fully covered in Fatal Rebirth. I was also tying them to Bush and his Iran Contra operations in Mean Arkansas while in CIA in NOC (non official cover). My source at the time, was two different retired NSA staffers who were aware of certain activities tied to the Iran-Contra drugs for guns deals being run through Arkansas when Bill was Governor, there… and subsequently, illegal arms sales to both Iran and Iraq during that terribly bloody war, using the same resources put into place for Iran-Contra in Canada, Europe, and Arkansas, Florida, and the Caribbean. Both Clintons played a role in that, and made some serious illicit cash, doing it.
Coming full circle, many of those same physical and financial resources were used by the 9-11 hijackers with help from the same CIA players from Europe, and elsewhere… and the plane hitting the North Tower can arguably be tracked down to a Caribair, a CIA airline front from Iran-Contra (that should raise some questions in your mind). All together, at least three aircraft from Iran Contra were used in the greater 9-11 effort; one on the North Tower, and two in Florida for ‘training’ the 9-11 terrorists, pre-attack. To be clear, the Clinton ties were peripheral, but harder ties could be found to the Bush crime family. That may seem to reflect odd bedfellows, except that both were on the same CIA plane flown to a secret Bilderberger meeting (while Bill was Governor) to discuss future President’s of the U.S. That was related by a flight crew member who brought the information to me of his own accord. All of this, and more, is in my book.
The original material quoted below did not include much in the way of verification links, nor any images. I have attempted some remedy in that, and so, any links, parens, bold or italics, and blue text, are my additions. Follows now, the original anonymous material:
The plot sickens…
I am passing this on from someone who’s connecting some dots with input from sources he cannot reveal. Here’s what it looks like when all the pieces are sewn together. It smells like conspiracy and treason. Everyone needs to read this. Slowly, and patiently, because it’s very important…
From 2001 to 2005 there was an ongoing investigation into the Clinton Foundation. A Grand Jury had been impaneled. Governments from around the world had donated to the “Charity.” Yet, from 2001 to 2003 none of those “Donations” to the Clinton Foundation were declared. Now you would think that an honest investigator would be able to figure this out.
Look who took over this investigation in 2005: None other than James Comey; Coincidence?
Guess who was transferred into the Internal Revenue Service to run the Tax Exemption Branch of the IRS? None other than, Lois “Be on The Look Out” (BOLO) Lerner. Isn’t that interesting?
But this is all just a series of strange coincidences, right? Guess who ran the Tax Division inside the Department of Injustice from 2001 to 2005? None other than the (Principle Deputy) Assistant Attorney General of the United States, Rod Rosenstein.
Guess who was the Director of the Federal Bureau of Investigation during this time frame? Another coincidence, perhaps, but it was Robert Mueller.
What do all four casting characters have in common? They all were briefed and/or were front-line investigators into the Clinton Foundation Investigation. Another coincidence, right?
Fast forward to 2009… James Comey leaves the Justice Department to go and cash-in at Lockheed Martin. Lockheed Martin is deeply in bed with CIA in multiple ways and levels, as will be further revealed in my own added comments, here. It goes all the way back to Iran Contra, and Arkansas, where Lockheed built a facility in 1978, just as Bill took office as Governor, and in time for Iran-Contra to be set up out of nearby Mena. Breitbart reveals that while Robert Mueller ran FBI, the Agency indeed fed a stream of $100M and greater no-bid contracts to Lockeed Martin, where Comey landed after leaving the DOJ… to be paid $6M in one year for, essentially, having a name that looked good on an empty Office.
Hillary Clinton is running the State Department, official government business, on her own personal email server. The Uranium One “issue” comes to the attention of the Hillary. Like all good public servants do, supposedly looking out for America’s best interest, she decides to support the decision and approve the sale of 20% of US Uranium to no other than, the Russians.
Now you would think that this is a fairly straight up deal, except it wasn’t, America got absolutely nothing out of it. However, prior to the sales approval, none other than Bill Clinton goes to Moscow, gets paid 500K for a one hour speech; then meets with Vladimir Putin at his home for a few hours. Ok, no big deal right?
Well, not so fast; the FBI had a mole inside the money laundering and bribery scheme. Robert Mueller was the FBI Director during this time frame? Yep, He (Mueller) even delivered a Uranium Sample to Moscow in 2009.
Who was handling that case within the Justice Department out of the US Attorney’s Office in Maryland? None other than, Rod Rosenstein. And what happened to the informant? The Department of Justice placed a GAG order on him and threatened to lock him up if he spoke out about it.
How does 20% of the most strategic asset of the United States of America end up in Russian hands when the FBI has an informant, a mole providing inside information to the FBI on the criminal enterprise? Because that informant also was served with a Gag Order by Jeff Sessions. That order was eventually lifted by Congressional intervention, but well after the fear of God could be put into him. This was well after the sale had completed.
Very soon after; the sale was approved! 145 million dollars in “donations” made their way into the Clinton Foundation from entities directly connected to the Uranium One deal. Guess who was still at the Internal Revenue Service working the Charitable Division? None other than, – Lois Lerner.
Ok, that’s all just another series of coincidences, nothing to see here, right?
Let’s fast forward to 2015.
Due to a series of tragic events in Benghazi and after the 9 “investigations” the House, Senate and at State Department, Trey Gowdy who was running the 10th investigation as Chairman of the Select Committee on Benghazi discovers that the Hillary ran the State Department on an unclassified, unauthorized, outlaw personal email server. He also discovered that none of those emails had been turned over when she departed her “Public Service” as Secretary of State which was required by law. He also discovered that there was Top Secret information contained within her personally archived email.
Sparing you the State Departments cover up, the nostrums they floated, the delay tactics that were employed and the outright lies that were spewed forth from the necks of the Kerry State Department, we shall leave it with this…… they (Gowdy and Kerry) did everything humanly possible to cover for Hillary.
Now this is amazing, guess who became FBI Director in 2013? None other than James Comey; who secured 17 no bid contracts for his employer (Lockheed Martin) with the State Department and was rewarded with a six million dollar thank you present when he departed his employer? Amazing how all those no-bids just went right through, at State, huh?
Now he is the FBI Director in charge of the “Clinton Email Investigation” after of course his FBI Investigates the Lois Lerner “Matter” at the Internal Revenue Service and he exonerates her. Nope…. couldn’t find any crimes there.
In April 2016, James Comey drafts an exoneration letter of Hillary Rodham Clinton, meanwhile the DOJ is handing out immunity deals like candy. They didn’t even convene a Grand Jury! Like a lightning bolt of statistical impossibility, like a miracle from God himself, like the true “Gangsta” Comey is, James steps out into the cameras of an awaiting press conference on July the 5th of 2016, and exonerates the Hillary from any wrongdoing. Do you see the pattern?
It goes on and on, Rosenstein becomes Asst. Attorney General, Comey gets fired based upon a letter by Rosenstein, Comey leaks government information to the press, Mueller is assigned to the Russian Investigation sham by Rosenstein to provide cover for decades of malfeasance within the FBI and DOJ and the story continues.
FISA Abuse, political espionage….. pick a crime, any crime, chances are…… this group and a few others did it: All the same players. All compromised and conflicted. All working fervently to NOT go to jail themselves All connected in one way or another to the Clinton’s. They are like battery acid; they corrode and corrupt everything they touch.How many lives have these tw. destroyed?
As of this writing, the Clinton Foundation, in its 20+ years of operation of being the largest International Charity Fraud in the history of mankind, has never been audited by the Internal Revenue Service.
Let us not forget that Comey’s brother works for DLA Piper, the law firm that does the Clinton Foundation’s taxes. The person that is the common denominator to all the crimes above and still doing her evil escape legal maneuvers at the top of the 3 Letter USA Agencies? Yep, that would be Hillary R. Clinton.
Now who is LISA BARSOOMIAN? Let’s learn a little about Mrs. Lisa H. Barsoomian’s background. Lisa H. Barsoomian, an Attorney that graduated from Georgetown Law, is a protégé of James Comey and Robert Mueller. Barsoomian, with her boss R. Craig Lawrence, represented Bill Clinton in 1998. Lawrence (& Co.) also represented:
Robert Mueller three times; James Comey five times; Barack Obama 45 times; Kathleen Sebelius 56 times; Bill Clinton 40 times; and... Hillary Clinton 17 times.
Between 1998 and 2017, Barsoomian herself represented the FBI at least five times.
Kathleen Sebelius, under Obama, took illegal actions which have been compared in method by mainstream media to those illegally undertaken by Oliver North in Iran Contra, except that instead of raising money in support of Iran-Contra, it was for illicit use in support of Obamacare.
You may be saying to yourself, OK, who cares? Who cares about the work history of this Barsoomian woman? Apparently, someone does, because someone out there cares so much that they’ve “purged” all Barsoomian court documents for her Clinton representation in Hamburg vs. Clinton in 1998 and its appeal in 1999 from the DC District and Appeals Court dockets (?). Someone out there cares so much that even the internet has been “purged” of all information pertaining to Barsoomian (in her legal capacities).
Snopes says that last sentence is false, but fails to provide a single instance where an online reference exists. Perhaps this is a good time to point out the the family who operates the Snopes Web site are quite close to Clinton/Obama confidant, George Soros, master of fake news. The only good thing Snopes points out, is that Lisa was not representing those cited in the list as a personal attorney, but as part of her job in representing the US Government, at large. However, that in no way removes the hint of bias and in-place Deep State assets present in just who she is. Moreover, it is true: search the Web and you only find references which mirror this post… not a single Web listing of her activities as a legal representative, even if you add keywords such as docket, judge, case number, etc.
Historically, this indicates that the individual is a protected CIA operative. This is essentially correct, but not exclusively so. Many 9-11 truth documents have also vanished, for instance, including mainstream sources. Additionally, Lisa Barsoomian has specialized in opposing Freedom of Information Act requests on behalf of the intelligence community. Although Barsoomian has been involved in hundreds of cases representing the DC Office of the US Attorney, her email address is Lisa Barsoomian@NIH.gov. The NIH stands for National Institutes of Health. This is a tactic routinely used by the CIA to protect an operative by using another government organization to shield their activities. Also correct, something more typically done for a NOC, as earlier described.
It’s a cover, so (no) big deal right? What does one more attorney with ties to the US intelligence community really matter?
It deals with Trump and his recent tariffs on Chinese steel and aluminum imports, the border wall, DACA, everything coming out of California, the Uni-party unrelenting opposition to President Trump, the Clapper leaks, the Comey leaks, Attorney General Jeff Sessions recusal and subsequent 14 month nap with occasional forays into the marijuana legalization mix …. and last but not least Mueller’s never-ending investigation into collusion between the Trump team and the Russians.
Why does Barsoomian, CIA operative, merit any mention? BECAUSE….She is Assistant Attorney General Rod Rosenstein’s WIFE!
Neither Barsoomian or Rosenstein should be taken for Democratic Stooges serving the Clinton/Obama clans. They both have a rich background working for the Bush presidencies, as well. Rosenstein is, in fact, a registered Republican. However, he worked under Ken Star in the Whitewater investigation of the Clintons, should you find that relates usefully. The only common theme between them, IMO, are constant involvements in matters serving the interests of the New World Order types. That is, in fact, true of all the events relegated, herein. Always ask who benefits, in which case, it will be more than just the visible participants. Deep State = NWO globalists, in terms of benefit.
I will also suggest another possibility to consider, since it is generally true that many CIA operations also tend to be useful to Globalist peradventures. CIA likes to have in-place assets in various governmental posts, and they like to do it with Husband-Wife teams. Ask the Clintons. Ask Dorothy and Howard Hunt (CIA operative, Bay of Pigs, JFK assassination, Watergate assassination of Richard Nixon). Ergo, ask Lisa and Rod S.
Predictive Programing is a psychologically manipulative political control methodology based on suggestive subliminal messaging. It can be found in all forms of media, and shapes our acceptance of things to come, things we would not wish to accept… like 9-11, and the New World Order…
copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Sometimes a secret truth is put in front of you as entertainment. CIA, for instance, often puts out fiction books or magazine articles which reflect real-world plots, as a kind of ‘run it up the flag pole’ test with reader focus groups as to public reaction, intentionally quite non specific so as not to put any real operations at risk. They also scan other fiction looking for ideas for such plot ideas, which is certainly one reason real-world bumps in the night sometimes mirror fiction. In fact, one can find multiple CIA fronts and operatives engaged in making motion pictures, either as part of the production team, or as the primary mover and shaker, funding source. Could be why The Lone Gunmen, a TV pilot movie about a false flag terror attack on the WTC with a passenger jet aired in New York, only, a number of months prior to 9-11, and was followed up with a ‘viewer market survey’ (normal for such pilots). That’s just a taste, to get your attention.
Now to the main point:
I’m writing this post because, being retired, and after having been homeless for several years but now stable and able to ‘catch up,’ I binge watch TV. And I find predictive programming. The TV series, Mr. Robot, for instance, would seem to be about the creation of Q anon… some two years before Q ever came into existence. There are even oblique references to both Q and Anonymous variously within both the story presentation and the production credits. The series began in 2015 and makes a lot of intelligent sense of a number of things political, social, financial, and about human nature… but especially about computers and cyber security. It deals with such things in a technical sense which hackers and psychologists would not find in error, but in a way in which the average person can understand (cool, and educational).
The main character is a quirky paranoiac schizophrenic drug user with memory problems who is a cyber security firm’s best tech employee — while at the same time the nation’s most dangerous hacker, quite anonymous. His mind is a maze of complex personal conflict and imagined constructs, the portrayal of which is a deep character study in the very problem which infects Artificial Intelligence (quirky human-like mental aberrations). They drive him to increasingly dangerous and self destructive peradventures, the story line focused on the elimination of all debt by destroying the bulk of all financial records stored in computers by ‘the World’s largest corporation,’ which happens to serve as the principle cloud repository for all banks and lesser corporations. In the real world, today, that would be six firms… Amazon, Microsoft, IBM, the largest… and the show’s attack will be against six data storage sources.
Note: one theory out there by conspiracy theorists, is that any such actual event would render such a catastrophic failure of governments, corporations, and society as to throw us into a stone age, with little or no cash on hand, no way to transact business or acquire daily needs, and an eventual shut down of all infrastructure. No one could prove ownership or contractual obligations without paperwork, and the institutions who rely on computerization for records keeping would be hard pressed to deal with the mountain of historical paperwork if they had bothered to keep it after digitization at all (most do not). This much is part of Mr. Robot’s presentation.
But it would also have much the same effect as a fire sale (an apocalyptic hacking scenario portrayed, and hopefully not predictive, in Bruce Willis’ Live Free or Die Hard), but be slower, rendered in domino fashion. People, originally happy their debts and mortgages were wiped out, would soon enough take to the streets, riot and pillage, and turn into mobs seeking to take from others whatever they needed to survive. The plot aspect, is that it would give the World such trouble as to legitimize creation of carbon currency, carbon tax, and carbon credit-based economies, and seat an Antichrist figure able to justify chipping all humans and controlling all aspects of life to insure ‘peace, security, and stability,’ upon reboot.
The troubled ‘hero’ becomes embroiled in carrying out this hacker conspiracy in a manner which strongly resembles Anonymous, and which is full of equally quirky weirdo social misfits, including a Muslim (terrorist?). As mentioned, almost everything about the show quite reflects the nature of, description of, and the creepy problems of AI, in subtle ways — AI’s bad habit of exhibiting digital insanity to one degree or another. Make no mistake, its great entertainment, rich with plot twists which have you rethinking earlier episodes and readjusting your understanding, expectations, and points of interest.
Quotes: from a Wired Magazine article about mentally ill AI, citing AI Scientist, Steven Theyer, who directly explores the phenomenon with a deliberately mentally ill AI of his own construct, called DABUS. “At one end, we see all the characteristic symptoms of mental illness; hallucinations, attention deficit, and mania. At the other end, we have reduced cognitive flow ad depression… The AI systems of the future will have their bouts of metal illness, especially if they aspire to create more than what they know.”
In real-world parallel, many people believe and can make a strong case that Q anon is not a person, but an AI operated from within a very powerful computer who’s primary data input is the sum total of Web activity, principally focused upon social media. Huh? Look at that… I just allowed it a human personna by using the term ‘who’, as opposed to using ‘which,’ which would render it more correctly as a thing. That’s a bit of psychological programming in evidence, right there. Rewind. Play.
If so, it’s chief output is suggestions as to what the best psychological response is to the public at large, to best accommodate the matrix of human thought thus expressed, and move the public’s dialog and thinking in a desired direction towards a desired goal. This is then used to create clever videos, memes, and posts/comments in an array of fake online social media avatars in support, thereof… or other forms of predictive programming, such as in TV shows, etc. The machine knows we will respond just the way it wants, because the key AI programming includes a vast ‘expert’ understanding of our social psychology as individuals, collectives, and the whole of human existence… through our very talkative social media presence (input). We feed it all it needs to know, to direct us without our being aware of the manipulation.
That goal would logically be some significant shift in the political social paradigm which benefited whomever spent the huge sum of money necessary to develop the AI, the computer powerful enough for the task, and plans for executing the specific gaol in mind, be it for financial gain, political gain, or dealing with enemies… or all of the above. There is such a computer and AI program or modeling system already in use. And the people who paid for it have exactly those kinds of goals.
It was conceived of and is operated by perhaps the most dangerous NWO secret society in the World, descendants no doubt of the Illuminati: The Club of Rome, which is far more powerful and secret than even the BIlderbergers, which they control, as well. I’ve seen their computer model flow diagram as part of secret papers from the Club of Rome to a high Bilderberger (below). They were made available only because he had passed away, and the papers coincidentally fell into a series of changing hands, which I was in time able to access as part of my research for my latest book, Who’s Killing the Bilderbergers — a fictional murder mystery based on footnoted real-world conspiracies.
Just two of hundreds of pages of secret Club of Rome and Bilderberger documents
As it happens, there is only one likely AI computing hardware platform suitable for such an artificial Q entity. It is the quantum computer designed by D-Wave Computing. Ask Anthony Patch and Clyde Lewis (Ground Zero radio show) about that. It’s all tied into other scary things, such as CERN, the NWO, and spiritual warfare. Heady stuff to be sure, but… and here’s the clever part: you don’t have to take it seriously as an intellectual exercise or consider it seriously as impacting your defensive posture or altering your World view… because it also makes great entertainment you can easily dismiss as pure fiction, if you can’t handle the truth within.
That’s the insidious nature of predictive programming… it does not even want critical thought to be involved; it relies on subliminal matters which the mind will recall as a hidden and unannounced memory when the time is right… and in a way which moves one to behave in a desired manner, in response to unexplained and unrealized emotional-based reasoning. That’s how The Lone Gunmen and the rest (including more, below) worked on 9-11.
That, too, is revealed in Ground Zero’s heavy analysis. But if using conscious awareness and critical thought when watching Mr. Robot, and other TV programming… one can often find this ‘programming’ of our minds or advance warnings which simply would not be allowed in any other medium without severe retribution by ‘Men in Black.’ If such plots were recognized for what they were, it would be treason and high crime. But, no… it’s ‘just entertainment,’ and we can’t prove otherwise. Not, at least, without a smoking gun document revealing the plan with the conspirator’s names affixed.
Note: You should go to the groundzeromedia.org archives and do keyword searches, including Q anon, and even Anonymous, and artificial intelligence. There are many informative and stimulating shows, all of which swirl about each other in intricate ways. Don’t discount one because it seems less targeted, topically, or sounds bizarre; expand your horizons, and learn that there are connections, even if the rest were to make little sense to you. Listen to his shows as you also watch Mr. Robot, intermixed, and see if you don’t see what I’m seeing, and agree. And, if you have a mind to do so, search on my name. I’ve been a guest speaker on the show many times.
Other examples of Predictive Programming in entertainment
The film, Pearl Harbor, released just prior to the 9-11 attacks, perfectly set the mindset of Americans to see those attacks as a ‘new Pearl Harbor,’ and more readily rush into war with those claimed (but not proven at the time) to be responsible.
The Simpsons aired an episode where Trump was elected President some 15 years before it happened. In one particular scene, he is descending an escalator post victory while crowds cheer from all points, including a transparent barrier above the escalator. A woman holding a placard ends up dropping it. When Trump really did win, media covering the event shot the exact scene from the same angle, and a woman did drop a poster at the same scene position and with the same timing as in the animated scene… behind a transparent barrier. This wasn’t the only episode in The Simpsons which has mirrored real events in forecast.
The Simpsons raises another point
We must ask how predictive programming is possible to be so accurate fifteen years in advance, prior to AI technology? One might be tempted to think that Trump was preordained to be President by the NWO fifteen years ago, but that does not really deal with the question usefully. Someone would also have had to set up and control the news event, to insure a camera angle was able to mirror the event, and arrange for someone to be in place to drop a poster on cue. The non AI planner had to be aware of the predictive programming (that episode). But that is merely a clue, to a better answer: someone who knew about the Simpson episode deliberately set it up the cameraman and actor to take advantage of the innocent coincidence of Trump’s election.
Why? Because by insuring a similarity between the scenes, the news coverage became a predictive programming tool after the fact. One which reinforces the notion in our minds that we should accept predictive media as some kind of natural, mystical, or divine ‘warning,’ and therefore be far more afraid of the future when we watch disaster flicks, and other dark fiction which impacts our political and social future. Fear is a control mechanism (as is debt, by the way.)
Predictive programming, in fact, is sold to us as just that; a foreboding sense of insecurity to which we should give up freedoms in order to be safe. The last link above (predictive film projects) reveals dozen’s of articles where media itself is trying to convince you that this is some kind of ‘normal’ and ‘coincidental’ thing, many suggesting it is some form of natural ability to unknowingly foresee the future… and those authoring it seem glaringly ‘unaware’ of the term and nature of predictive programming.
AI, the D-wave computer, and the Club of Rome’s use of it did not exist when the Simpson’s episode was penned. Therefore, it is not about Trump being picked by and promoted to Office by the NWO, a notion which itself benefits the NWO by casting doubts on Trump as a conspiratorial affair; Trump opposes and does harm to the NWO. But it is about reinforcing the illusion of predictive programming is nothing but coincidental prophetic realizations.
But then, who knows? Perhaps it is just natural prophecy after all? Perhaps this post is actually by Q anon, or an Anonymous hacker? Or perhaps I’m schizophrenic and there are no such shows… or am I merely an AI construct imagining I’m writing this?
Or is it that you are the one who is imagining? I’ll wait right here for your answer… unless someone pulls my plug, first.
Ooops! One more, just for record… one very likely to be ‘coincidental,’ unless you wish to blame HAARP earthquake triggering. Remember the movie 2012, and the scene where the researcher in India was reporting the Earth’s crust was giving way to rising lava… and lava began simply pouring out of cracks in the ground in some places, later in the film? Guess what just happened, minutes ago (Dec. 28, about 8 PM, Pacific)?
RSOE EDIS emergency alert system (everyone should subscribe on their computer and phone) just reported that lava has begun to ooze from the ground in a part of India… from the base of a telephone pole, and elsewhere. No quake activity, it just sort of started ‘leaking’ liquid rock.
When everyone, including competitors across the entire supply chain (production, distribution, outlets) simultaneously start doing exactly the same thing… I get suspicious. So it is with TV viewing apps, and the suspicion is aimed at 5G Network villains.
Just as suddenly, it dawned on me…
Recently, it came to my attention that virtually every TV network and major ISP service (i.e., Comcast, Time Warner, Cox) is aggressively pushing their apps for watching shows and generally promoting binge viewing. Actually, even TV programming sources without their own channel, and some local TV stations are doing the same. If it’s on television, there is likely one or more Apps which someone wants you to use to watch them on your phone.
While general TV media apps have been around for a while, such specific media apps seem to be a relatively new phenomenon, and I wondered why the heavy promotion seemed to be ‘turned on’ in a flood — all at once, and across the board among various competitors, and across all platforms, including game systems. I don’t like the answer(s), and I suspect you won’t, either. Especially if you are an activist, whistleblower, or anyone targeted by someone else for any reason (TIs take note). Like a lot of technology, weaponization is not that hard, and abuse is almost always a certainty.
Understand, as a privacy and security consultant, I am not a fan in general of ANY App, even most of those which come with your phone. There are two reasons. 1) the more technology you use, the less privacy and security you have. That is exemplified or manifest in several ways, perhaps the most important being… 2) virtually all Apps of any sophistication with wifi interactivity are relatively easy to hack to become a gateway to control of your phone… perhaps to access to your personal files, even to the point in some cases of being able to manipulate the camera and microphone in or out of your use… and/or for tracking your phone’s physical location by several means. In fact, there are even certain advanced methods which can be employed which can impact your brain’s EEG to effect mood changes and your level of alertness; Political Control Technology some people call ‘mind control.’
With my own phone, I NEVER download ANY app, and I only use standard apps* when I must, trying to limit myself to the compass and flashlight. I do zero online work with it, and I leave the phone off when I do not need it, turning it on to check for messages, expected calls of importance, and making calls. Sure, I’ll use the camera, but only when I don’t care if anyone is able to track exactly when and where the snap was taken (or I use special editing software to strip out the encoded data). When not turned on, it is in a foil pouch, because some phones still communicate without a battery, much like RFID tracking chips, drawing the energy from RF signals in the air, and/or other methods, such as slow-discharge capacitors. Learn more about the whys and wherefores of such strategy, from this previous post. But one reason why must also be discussed in more detail, in the next section.
* There is only one app I have downloaded and use which I suggest everyone should have: RSOE EDIS, an alert system for local, regional, national, and international disasters of any kind; natural, terrorism, industrial accidents, biological/pathogen outbreaks, etc. It could save your life. I also have it on my computer, and it is the first thing I see when accessing either the computer or the phone.
Every App usually requires a user agreement which is so full of legalese and so massive in text as to deter actually bothering to read it, on the Sheep-like assumption the Wolves didn’t write it, and it is ‘standard’ in nature. The only thing standard about such agreements, is that they abrogate your rights and expectation of privacy, doing so in terms which fail to so inform by misdirection within all that legalese. It obscures the truth through terms for which the legal definition and application in the real World means something quite different than you think.
They don’t really want you to read the document, or course, as evidenced by the fact that it is IMPOSSIBLE to read it before you download. NO ONE publishes their user agreement online, and NO ONE will respond to a request to provide a copy in advance of download. And good luck trying to read all that text usefully on your tiny phone screen, when you are anxious to fire up the app and see its pretty animated graphics do their thing. They count on all of this to take place. Here’s proof that only one half of one percent of us actually read the agreements before clicking yes… along with reasons why that’s foolish.
Note: Here is an example of a typical response to a request for a copy of the User Agreement for a TV App, this one from HGTV Customer Service: “We don’t have staff available to respond to every email, but all feedback will be shared with the appropriate teams for review and consideration. Please visit our online Knowledge Base for programing, website, sweepstakes, and other information.” Knowledge Base is merely another term for FAQ, and no FAQ ever addresses the question. Worse, they might refer you to a User’s Forum… where people who can’t get answers are supposed to provide answers to people who can’t get answers.
They all read roughly the same in almost every user agreement, regardless of type. They tell you they do not associate your name, address, or account information with any information collected. That won’t matter, because you are easily identified by your device Identification in terms of Web connectivity (the IP address, for instance, and information about your modem and router, or similar information for your phone). So, if anyone wants to reach out directly to you, to check up on you, market to you, hack you, or anything else, they can do it without knowing your name, address, or account data… if they know how, or are authorized.
So one question is, just who is authorized, beyond the firm offering the App?
The general term is ‘partners.’ You are a commodity as much as a customer, and your information is essentially traded between interested players like any other commodity. The list of trading partners can be extensive, especially if their partnering includes rights to access the partner’s partners (not uncommon for firms like Facebook, Google, Cloud involved service companies, and ISP providers like Comcast). In any event, you can expect the answer to be hundreds, if not thousands, of ‘partners’, except that they don’t usually tell you who they are, save an example or two. The list for HGTV, for instance, which I was able to eventually discover (no thanks to Customer Service) is a block of text large enough to roll up and the swat the flies off of a Bandito’s dead body.
The worst of it is not the marketing which will come your way, and the fact that everywhere you go on the Web, ads will be tailored to what is learned about you through the App (and all other online activity), or that you can end up seeing ads for the same product/service hundreds of times a day for weeks. No. THAT activity, which IS tracked by the app (asserted as ‘necessary to provide the benefits claimed for the app’), is what renders you a commodity. No, the real threat is this: should any one of the partners suffer a hack of some sort which accesses their data base, that can be trouble, for you… especially if the purpose is to find end users of the app to target with a secondary hack attack through the app, itself.
Second threat: synchronous and heavy promotion
This is somewhat analytical, and though based on facts, perhaps rightly seen as speculative; the reader should decide for themselves just how much weight the presentation merits toward acceptance as valid concerns. The presentation must start with some technical information having to do with phone network designs and bandwidth capabilities.
The current 4G network was introduced primarily to improve bandwidth due to greater network demands both in terms of the number of users acquiring phones, and the introduction of smart phones able to stream high-data volume video content. More and more people were converting to smart phones, and streaming. I recall binge watching Invader Zim on a phone not long after 4G became available. Nowdays, the phones are faster and have larger screens, and therefore, users demand higher resolution video streaming (4K resolution is going to be increasingly common), all of which requires several orders of magnitude more bandwidth. Almost all phones, today, are smart, and almost all users, stream. 4G is rapidly being outpaced by demand, and in some markets, it is already suffering an inability to deliver full bandwidth to all users at all times.
Ergo: there is a 5G Network in our future ( but is it a ! or a ?).
That trend is not going to change, and in fact, will soon grow dramatically in the near future. Apple Computer, I’m expecting, will soon introduce a very expensive product which is slated to replace their entire product line, save perhaps the watch, all replaced by a single phone-like product with full portable computing capability. It will serve as your desktop or laptop computer, wirelessly communicating with your Smart Tv or special Mac-like displays (including older iMacs/laptops and monitors), or by adapters to any other brand equivalents, and with wireless keyboards/mice… and your smart appliances. It will also plug into a commercial jet’s seat-back monitor, or VR headsets.
It will serve as your modem/router, and your hard drive. It will rely on massive internal memory as well as the Cloud, and Cloud-based software applications accessed through apps on the device through subscriptions or licenses. Other manufacturers will follow suit, if not beating Apple to the punch, ending the Desktop and laptop computer as we know them, today. It will be a huge bandwidth hog, as result, more than quadrupling the wifi consumption per user, and doing so at more times during the day; simultaneous functionality demanding it. Then there is the political question, like it, or not.
Under Obama, the whole thing with ‘Net Neutrality’ came about, in which we Sheeple, having such a short memory for sound bites, have forgotten the truth… NN was a bad thing for users, and a good thing for Big Data corporations like Comcast. Obstructed by activists, the FCC under Obama acted unilaterally to establish NN, and in addition, set out to cancel all local TV station broadcast licenses, forcing their signals to go to ISP providers for distribution. More correctly stated… forcing YOU to go to your ISP to watch your local news and programming, again dramatically increasing bandwidth demands. Now that Trump has cancelled it, of course, the Left is telling us the opposite of reality, claiming Big Data benefits with the death of NN, and the user suffers, and we risk the invasion of privacy. The truth about NN, regardless of which argument you believe, is that it was intended to cater to 5G in ways useful to big Data, more than end users.
Which brings us back to the synchronous app promotions…
All of this, along with the expected demand created by all those TV watching apps suddenly being pushed system-wide, will literally force conversion to the new 5G Network, as more and more streaming demand in full HD (and soon, 4K) takes place. 5G is set to replace 4G, starting… well… now. But there is a problem with 5G; a lot of people, groups, experts and even officials are very afraid of it, seeing it as both a threat to privacy and both physical and mental health, and rightly so.
It has even been likened to a mind control device, especially in combined use with Smart Meters and Smart Appliances, all of which are also intended to go 5G, many already capable of it. In fact, 5G is promoting something called ‘Smart Cities,’ which is the Big Brother of Smartdom components. That, and the fact that 5G ‘cells’ will exist every few hundred feet on every street, is only one of the reasons it is feared as a mind control tool. I will tell you as avowed expert in the topic, that very little of the fears being expressed are entirely out of the question, from the standpoint of technical possibility. Proof, of course, won’t likely exist until its quite too late to object.
Now we finally have the answer to the original question this post is based upon; Why synchronous offerings of TV apps? My deduced answer is, therefore, that the sudden synchronous push by all major ISPs and TV networks to offer apps is intended to bog down the 4G network to the point that we will demand 5G proceed even in the face of the many lawsuits and various government and NGO investigations over safety and other concerns. Not just lawsuits and investigations, but also, outright bans. Use the links to learn more about these very valid concerns.
The forced push strategy I describe will undoubtedly work; Americans at large are well dumbed-down to the point of buying whatever the latest widget is, being offered, doing so without careful scrutiny or consideration beyond the hype of benefits amid images of gleaming hardware, usually involving some form of entertaining commercials promoting ‘feelings and emotion’ over logic and fact. I’m again using the current Left v. Right paradigm; feel good imagination trumps practical reality. Since the phone network, the phones, the app makers, the ISPs, and the TV networks, as well as the bulk of all Internet firms of any importance are themselves all part of one giant media complex, THEY will only tell us what they want us to believe (what to believe), and will seek to minimize or even suppress critical viewpoints such as mine.
Google, for instance, since Obama, and up until just a few weeks ago when Congress began looking at Web censorship by liberal-minded firms, would not let you find my blog posts. Used to be that you need only type in my personal name or trade name (proparanoid), and a few words from the title or topical theme of any of my blogs, and it would pop up in the first few listings on the first page. Since Obama, their censorship model is so efficient, that you could not even find it typing the full title of the post. In fact, it would show you posts of people who quoted from it, before it let you find the actual post, even ten pages down. Understand, there are over 12,000,000 pages which quote or cite my work, and yet, they don’t want you to find my original material, any more, despite that popularity? Political censorship.
I should complain? look at what the Left did to Alex Jones!
On the other hand, if you used Duck Duck Go, it always came up on top. They were/are not controlled by the Left, or the Right. Google is a search engine, but google (lower case), is a verb. Inquiring minds will want to google, but won’t use Google, to do it. I’m advising that they also avoid using apps of any sort, when they do so, but especially, to avoid TV apps. Cheat them out of the demand for 5G, and watch TV on your television, where you can see everything more clearly, and enjoy high quality audio.
Because one thing is for sure: 5G is going to make any social control by whomever is in power vastly easier than it is, today… and today, it is so easy that even a single liberal-minded company willing to be underhanded, like Google, can manipulate the thoughts and actions of hundreds of millions, and do it covertly.
Rare is it that a given Targeted Individual won’t have reason to believe Police are involved in their targeting. And yet, they were not… not officially. Here’s the why and how of it…
Color of Law; Police abuse of power in personal agenda
In the two decades of working with thousands of organized stalking victims and victims of other forms of targeting, the single-most common complaint is the suspicion or outright experiential evidence that multiple Police Officers are complicit in the affair. If not the Police, then some other law enforcement or intelligence agency… or both. Indeed, this has been my own experience in two of three different episodes of personal targeting over a 15 year period. In fact, multiple agencies can be involved simultaneously; Ive gone up against as many as five LEA, plus FBI and CIA assets, bounty hunters, and military intelligence in a single targeting. This has been documented in my various books showing how I beat them in the end… but it was no cake walk.
This is a problem for more than the obvious reasons. The most obvious is, that the very authority who should be responsible for investigating and protecting against such crimes, cannot be trusted by the TI to help anyone but the perps behind the affair. Calling Police for help is almost always like asking a burglar to help you secure your home. Secondly, when officials of any kind are complicit, the victim is then entered into the official record as being mentally ill, or in a worst-case scenario, guilty of some convenient crime. Even when not complicit, going to Police about targeting is likely to have the same result; they simply do not want to believe in the Boogeyman, and see anyone who does as a mental case. In fact, stalking is designed to get you to go to the Cops for just that reason; they want it on record that you are mentally unstable. DON’T DO IT.
But there is a DO list! Do video and log all interaction with LEA or have a witness from whom you can get a written statement immediately after. It will help keep Police somewhat confined in their actions against you. The more you collect such material, the less likely are they to risk any useful action against you; you can illustrate a pattern of harassment. Do make copies and hide them well, off site. Tips in my first book, The Professional Paranoid on all of this.
The worst example of the problem from my client situations was a Navajo Indian, an ex Green Beret, who was targeted after his daughter was kidnapped by a Satanic Cult with all the earmarks of a CIA mind control operation. Within weeks of going to authorities to seek help, all manner of problems beset him. Traditional surveillance and stalking, and electronic targeting, to include V2S was the least of it. When he began using my advice and his military skills to determine the players and go after them aggressively, it took a turn for the worse: suddenly, his mortgage was six months in arrears and his house was being foreclosed, all his credit cards were maxed out and past due, his bank accounts emptied, and there were outstanding warrants on him for assault with a deadly weapon and skipping out on bail. He was, in fact, declared ‘armed and dangerous’ with an all points out on him. This was all done by back-door computer manipulation of data files by professionals of CIA caliber.
He took additional advice from me and then went underground to organize with other ex military buddies and Navjo friends, and went black in order to wage an unseen war against the enemy. As I never heard from him, again, I must presume he failed in the effort, or was successful to the point of having broken enough laws that he needed to remain underground. I had, in fact, advised him not to contact me for such cause. But, as I have said, these are merely the obvious problems with this particular aspect of targeting.
The other shoe that usually falls…
Perhaps the second-most common awareness about stalkers is that they seem to regularly consist of a lot of Masonic types. This is often determined when getting a good close look at them or their vehicles; the Masonic emblem, or some similar fraternal order emblem, is found in evidence. Usually, it is either a sticker on a car window, a pin on clothing, or a ring on a finger. I myself have seen this in my own targeting, the one incident where true gang stalking was involved (as opposed conventional targeting with general surveillance and dirty tricks).
After guesting for four hours on Coast to Coast with George Noory to talk, in part, about my new book, MC Realities, I ran into the Masons almost overnight. I had mentioned on air the involvement of the fraternal organizations in gang stalking, and how they had evolved from the Knights Templar and their exposure to the satanic Hashemites and Assassins of the Middle East during the Crusades. On air, of course, I gave my name as H. Michael Sweeney, my ‘pen name.’
Two days later, I was at work where I was managing a gas station while investigating the Oil Industry, infiltration style. It would result in two forms of targeting, the first of which was by the Masons, that second day. A man bought gas and elected to come into the office to pay, where I was at the time. He waited until I was the only one present, and then offered to pay, holding out his fist, palm down. It was only a couple of dollars in gas, so I assumed it was a handful of change. Wrong; it was a message to be delivered.
NOTE: the second was targeting of the Station itself by a terror cell, of which one of the participants recognized by me as a helper to two of FBI’s Top Ten Most Wanted and two other Islamics… and FBI agent who had been earlier involved in the my own targeting as earlier described. It was, in point of fact, to be yet another False Flag operation, later described by President Bush as Gas Station Tasking… which I thwarted. Arguably, the two targeting incidents might be seen as related, but even if so, it is unimportant, except for the fact that it illustrates that one almost never quite knows for sure why one is targeted, and who really lays behind it. This is described in my wordpress home page, if you wish to learn more.
Placing my hand beneath his, he opened it, and instead of coins, a money clip fell into my hand with a wad of Hundreds. “Take what you need, Mr. Sweeney,” he said. My name tag simply said “Harry.” He had a very wry, knowing look on his face, which slowly turned into a smirk as I manipulated the money clip to retrieve a single bill. In doing that, I discovered a gold and jeweled Masonic emblem on the other side of the custom-made silver clip. A broad grin overtook his face, to the point of becoming silly.
“Interesting how some thing have more than one meaning,” he said, as I returned the clip and fetched his change. That day, when going home, There were three of them outside of my Condo, and several cars with Masonic emblems in our parking area, none of which had ever been seen before. I ended that stalking by using the methods in MC Realities, methods that many Tis would be unable to employ unless doing so upon first targeting, as had been my situation. Once targeting has been ongoing for some time, the typical TI no longer has access to the needed resources for such a defense. The one remaining defense is found in an earlier post.
In MC Realities, I trace the evolution of Mind Control technology (Political Control Technology) from the time of Adam and Eve (the Serpent’s deception was the earliest form of controlling thought… the same version of it as we see today in media manipulation), forward. The Templars, after being ordered destroyed by the Pope for having discovered their Satanic practices acquired in the Middle East, went into hiding. In time, many of them hid within the Stone Masons Guild, and eventually, took it over to form the Freemasons as we know them, today.
Hedging their bets, should they be found out a second time, they formed splinter fraternal organizations, as well. Any group with any of these words in its title… Fraternal, Ancient, Order, Ordo, Lodge, Temple, Grand, Sacred, Rite, or Knights (and similar)… is very, very likely a fraternal organization with a Masonic organizational construct… and at the higher levels, at least, closely affiliated with the Freemasons if and when it becomes convenient to the parent group. Therefore, it is easy to involve small armies of ‘helpers’ if someone is deemed a target. It is important, however, to understand that the rank and file lodge Member who may be induced to participate, has zero true knowledge of you or the purpose of the targeting; they are simply ‘helping a friend’ to solve ‘a problem.’
I end this section with a simple note: all Masonic systems are quite steeped in ancient mysteries of the Middle East, and beyond, typically focusing on Egypt, Syria, and the Holy Land… with a touch of the Sub Continent (India, Nepal, etc.) and Far East.
The two shoe laces are tied together…
This is where it gets interesting. Most big city Police are encouraged to join the Fraternal Order of Police (FOP), and it is indeed Masonic in structure. FOP, for instance, employs the Masonic all-seeing eye of Egyptian fame in their logo, which is a five-pointed star with a circle bisecting the points to create five triangles shaped like the Compass of the Masonic emblem, also the shape of the ancient steeply-angled Egyptian Burial (pyramidal) obelisk used for commoners’ crypts. There was additional heraldry-like art akin to European styling in the center of the star, shapes quite like those of most Police Badges, and incorporating an Eagle and other symbols. In other words, Police departments not only adopted the Lodge system almost universally, but did so to the point that their badges reflected elements of the FOP emblem. Almost all Police badge shapes generally post dated the FOP affiliations, underscoring the link. The exception would be Sheriff stars, and yet, that shape is also of ancient Masonic importance, in both the upright and upside-down (satanic Baphomet) versions.
If that were not enough to convince you, let us take a look at the Police Department of New Orleans. New Orleans existed as a city at the time of the Louisiana Purchase from France, in 1803. The first Masonic Lodge (a French version), was established there in 1793, all its members speaking French, and some Spanish, but no English of note. All the better to remain secret and mysterious to Americans, when they came into possession. But to fully appreciate New Orleans in the equation, we have to first look to New York.
In 1915, the Fraternal Order of Police established their first Lodge, there. It spread from there to many other cities in very short order. The FOP was not intended just to be a Lodge system, however; it also took on aspects of Unionization, a kind of bargaining force with the City whenever Members felt that Cops were not getting a fair deal from the Mayor. In many cases, in fact, their bargaining strength was augmented by the power of the greater Masonic power structure, a formidable force at the time.
Over time, actual unionization was also achieved in almost every major city, usually through the Mob’s control of the AFL-CIO, making it easier to arrange for hijacking of intrastate trucking or of dock cargo without anyone ever being sent to prison. But that’s another story. Ask any retired Union trucker or stevedore from Jersey. I’ve heard the same from 1975 Oregon members. The importance of that will explain to some Tis, those who believe they were targeted because they reported illicit drug operations or crimes which might be related to Unions, are targeted by Police. Additionally, of course, CIA sanctioned drug operations are protected by Police, as well. Thieves in bed with thieves, the bed made by the thieves.
Though New Orleans under the French had a Police Department as early as 1796, it had no Police Department for rather a long period of time after it raised the American flag. It was instead ‘policed’ by a vigilante system until 1853, when they formed their first ‘American’ Police Department. Almost immediately, they adopted the ancient Cresent and Star (upside down, larger star) as is common to Islam, as their badge. It is still in use, today, and appears on their cars, as well. Well before the FOP had even existed, this Department was already incorporating Masonic symbology directly in its badge. This is better known as the Shriner’s symbol, today… the Shriners being a Masonic fraternal lodge system.
So, clearly, the Masonic influence and ties are present within most Police Departments. Cops form some of the strongest bonds between individuals in service outside of the Military, sufficiently strong, in fact, that if one of them asks a color-of-law favor of another, it is not likely to be turned down, and certainly unlikely to be exposed even if turned down. Therefore, it really only takes one Cop being approached from a fellow Lodge member to recruit several more for any needed aid, even if that request came from a lodge in another city. Ergo, escape to another city tends to never result in escape from targeting.
NOTE: That is why the Free Will Society exists; a solution to virtually all forms of targeting. Please join and support (donate/promote) our effort to create a targeting free intentional community of our own, and our other advanced programs planned for the future. If you are reading this, you should immediately join the Society and give it full support. It is a far more valuable TI resource in terms of programs and goals than any of the so-called ‘TI groups’ out there, today, the bulk of which are nothing more than information and disinformation mills.
Please: you owe it to yourself to visit freewillsociety.wordpress.com to learn more.
Yes, there is a third shoe, one of special interest to those who feel the intelligence community lays behind their targeting. Every major Police Department in America has in place assets loyal to the Central Intelligence Agency, and many Officers have military intelligence backgrounds. Usually, you can count on some of them holding key positions within a given city: the Chief, the Public Relations Officer or Spokesperson, the head of Internal Affairs, the head of the Swat Team, and/or the Head of Personnel. From these posts, especially through IA, they are able to find bad cops who can be blackmailed into playing ball on an on-call basis, for any kind of dirty deed, to include color-of-law abuses such as is common to targeting. Don’t forget CIA drug running operations.
If that were not enough, there are similar, but far looser ties with FBI, Homeland Security, and the US Military Intelligence Agencies (and in some case, others, including the United Nations, and even Mossad). These generally entail the network of Fusion Centers and Centers for Excellence*, and special programs such as Community Policing and the Strong Cities Initiative/Network. When you consider that most all of these agencies use computer software based on CIA’s PROMIS data base management system, which is nothing more than a data base engine with a back door built in… almost any form of hanky-panky is possible. Ergo, the Navajo Beret Syndrome.
* Search for ‘Centers for Excellence + Homeland’ to see why I include it, here. All these items work together to collect, evaluate, and share information on (persons of interest). They operate as one big networked spy tool with usefulness in organized stalking which can easily be misused by anyone within LEA who has access.
So, even if Masons are not involved at all, Police can still be brought to bear on any given TI with the same level of efficiency, and in fact, the FOP can be leveraged into the equation just as easily, in reverse manner. Will the average member of the FOP, the Masons, the Police, or any of that long list of Agencies be aware of any of this? Absolutely not… not unless they are higher on the food chain. Then, of course, they won’t be admitting it, either. Complaining about it gains nothing. Knowing about it, and understanding it, can mean a lot, however.
You may not be able to beat it, but when the mystery is gone, its just another damned nuisance to deal with, and another reason to avoid trying to rely upon Police for help, unless you know one you have great respect and trust in. I was lucky. I had a relative who was a Cop in an uninvolved LEA, and he was able to help off the record in very useful ways. I also had help from ex FBI friends with back channel access, of like value.
We can’t all be so lucky. And if you are a TI, you know luck is not your strong suit.
Fake news, tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations by Trolls and Bots are not the only weapons they use to dumb you down and pump you up with their version of truth. Vanishing is their latest trick.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The (fake) news media dilemma
Fake news and Web tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations are not the only weapons they use to dumb you down and pump you up with their version of truth. It is not just Trolls and Bots we have to worry about, now. Vanishing is the latest trick used to conceal the truth and promote the lies.
I’ve written before about how television mainstream dumbs you down with clever psychologically aimed technical tricks in the actual image… largely relating their use of subliminal messaging, deliberate distraction, and overload. The general purpose being to further reduce the actual news you walk away with to the simplest of boiled-down sound bites… just the ones with their take on the news shaped for you according to whatever bias the network has at management level.
Elsewhere, there have been excellent examples of the use of NLP (Neuro-Linguistic Programming), also employed by broadcast media. It involves careful wording as well as clever body language to project the intended viewer/listener response to the message, within the message delivery, itself. It has been shown to be so powerful, a well trained user (a stage magician and hypnotist, who must rely on such deceits), was able to deliberately speed past a Cop and then use NLP to leave the traffic stop without the Officer even remembering why he had stopped him in the first place.
That kind of mis and disinformation borders on mind control, and in fact relies on mind control technology, psychological methodologies, and MC research by the likes of the Central Intelligence Agency. When the great bulk of media is controlled by fewer and fewer mega corps, and their corporate leaders tend to be like-minded politically, you get the double whammy of biased news and fake news (propaganda). That’s bad enough, but this article is about another dirty little trick… a bag of them, actually, used by all forms of Media when presenting ‘news’ online.
And, of course, we still apparently still have to contend with CIA’s Operation Mockingbird, the installation of CIA operatives within the media industry to help shape news to their preferred version. That, too, is something I’ve written about, at least in terms of its origins and history, and I’ve even been referenced as a resource in a more ‘official’ industry review of that topic by The Reporter’s Committee for Freedom of the Press. But now, we see, actual ‘retired’ ‘once-a company man, always a company man’ CIA officials are becoming investors in and on-camera commentators in mainstream news. This Clyde Lewis Ground Zero episode reveals how serious a threat the placement of intelligence community actors in media actually is.
What News is supposed to look like
All news is supposed to contain the 5 Ws… Who, What, When, Where, and hoW. Ideally, we also need to know the S and M… the news Source and the Meaningfulness, often defined by Motive… the Why. That is supposed to be factual Motive, and not speculation, unless clearly presented as speculative commentary. Lately, that’s the greatest sin Media is guilty of; too much ‘news,’ today, is actually mere commentary… the propaganda version.
Generally, for some strange reason, it is also rare to get all those points, especially online. The most critical things useful for research tend to be left out, making it hard for pundits and anyone trying to chase down answers to hard questions because a given story fails to ‘compute.’ That is critical, if one is to find out more, and judge for one’s self what is true, and what is fake. This is particularly distressing when the potential for a conspiracy or cover up is apparent. While Sheeple don’t even see the glaring holes in the official story, people who think for themselves really want to know why those holes exist.
But we ‘conspiracy theorists’ and politically aware non sheeple are thwarted at almost every turn. Take for instance, the WHEN. It is extremely rare in online news reports to find out exactly when an event took place… esp. useful to insure the same news event you find is the one you wanted, because often, you might have two identical sounding stories in the same city, in different time frames. Most searches are best made by searching on the (event key details) plus the year, and perhaps, month.
But many reports do not cite the year, at all. The Web is smart, though, and it knows when a given URL was created. Unfortunately, many of the larger online news sources use a kind of ‘feeder board’ URL created way back when, which is updated with current news, only, older news dropping off. While the Web remembers what the page looks like when the story you are looking for took place… that story is no longer there when you go to find it. While you can search the archives if they bother to offer one, and PERHAPS find it, that is just one hurdle in the search.
Once you do have what seems to be a correct story’s article, it is amazing how many news reports fail to include the date in the byline at the top of the page. So you have no way to know when the person writing sat down to write the story. But even with a byline date, you still have a problem: is that date the date the news took place, the date they wrote the story, or the date it was posted? It can be any of the three.
Some stories are updates to older stories, so the byline is meaningless unless the story itself indicates the actual When it took place in the text. THEY SELDOM DO. Instead, they just say something like ‘Last Tuesday.’ Great. What day of the week is the date of the byline? Now I have to go search that out, to make certain of the When. Your average Sheeple is not going to bother.
This problem also exists elsewhere in the remaining Ws and the S and M. At least one such detail is usually omitted, and all-too often, several. Sometimes, it is something simply not yet learned by reporters, but too often, it is clearly just not deemed important. All too many bylines even fail to tell you who wrote the story… so you can’t email them and ask for missing information. EVERY print article in a newspaper tells you this information, but for some reason, the online version seldom does.
Message distortion when relayed through many people
Dumbing down online is easy. It relies on the known scientific problem which transpires when a series of people relay a message from one to another to another, etc. It used to be in schools, that one of the first things they taught was this concept… that you you have to take care when relaying information. You have to listen carefully, and then just as carefully repeat it. The problem is, each person decides what is important enough to be carefully repeated, and tends to reword it for ‘simplification.’ So the message first stated has little resemblance to the message last heard. THAT is not being careful, it’s being careless.
Online, information deemed worth sharing is constantly relayed in social media in a quite similar, but an even more careless manner. Each person in the chain tends to introduce it with their own spin or commentary, advising what they think the takeaway is, or should be. They then (hopefully) provide the URL to the original (the careful part). They might also create or add an image or meme which underscores their takeaway thought. That is all in good, but…
Sheeple don’t bother to click on the URL and read the original story, and they simply ‘learn’ the takeaway point of the previous poster. This is why Memes can often be dangerous. Especially when the creator is being deceitful or dishonest to the truth. They know that a false message repeated some 20 times will take root in the average Sheeple’s mind, and become adopted. That is especially important in political messages, because today’s social media is decidedly biased, and decidedly deceitful, even to the point of using paid trolls and automated bots to insure you are inundated with the preferred take aways.
This is why people who think for themselves always click the link or do a little extra search before they hit the SHARE button, and add their own takeaway. Is that you? Are you like me, spending roughly 50% of your time inspecting and then correcting other people’s wrong take aways and falsehoods? Or, are you part of the problem, simply passing it along? Baa… baa…
But there is a bigger problem, one which at least seems conspiratorial, and relies on the above Sheeple foibles and the omission of Ws, etc. For some reason, mainstream news sources seem to be deliberately making it difficult for you to access news, and difficult to relay, on your own; they would prefer to leave that to the professional trolls and bots you think are your online friends.
Something is very wrong with this picture. Lets take print media and look at how they operate outside the Web, and compare that to how they are now starting to operate on the Web.
A newspaper runs advertising to pay for their staff and overhead; it keeps the doors open, and allows them to grow and invest in special investigative projects. They charge for subscriptions and for individual copies at news stands based on the cost of the printing and distribution process, and materials; the ink and paper. That’s why newspapers are relatively inexpensive to buy. It used to be that the online version, therefore, just had advertising… there is essentially no comparative cost to put it out there and for you to access it.
But now, online, many newspapers, even small local ones, are telling you that you will need to subscribe or become a registered user to their online version, or pay a small fee to read the article… or that you may read this one, but it may be the last one you can read for free (relies on your cookies, but if you turn them off, you they will tell you to turn them on to see the material). Of course, once you do any of that, you’ve just sold yourself into another dozen marketing lists, without warning or compensation. But that’s not all.
Suddenly, many media outlets online (radio, networks, print) are using something called Cloudflare. That product is a kind of ‘protection’ against certain abuses… a bit like an anti hacking or virus bot. But it does something else, as well. It also prevents anyone from copying and pasting a URL into a social media post. WHY? In the past, getting your URL spread about was a good thing; it brought them more viewers, which increased the value of the advertising opportunity for their Web pages. When did they decide they didn’t want more readers, and why?
Where the Conspiracy comes in
Sure. You can call this answer a theory; a conspiracy theory. That is what it is, plain enough. The only way the above sins can be excused as desirable is if somewhere, someone important and powerful within media and in political realms, decided that it was advantageous to dumb you down, and limit your ability to rely on URLs to relay facts and correct people when in error. It is an insurance policy to protect the ‘integrity’ of the versions being spread by the trolls and bots.
I mean, when your read some crap someone has posted which is to your understanding just that, a lie or false belief, you should be able to go find a news article or other authoritative source online, copy the URL, and paste it into your reply to prove your case. When you are trying to educate someone on how you feel about something, you should be able to do much the same, to prepare your post or meme… have a supporting factual link to go with it.
Someone does not want you doing that. They want you to hear something said 20 times and accept it as truth, with no way to verify it, or refute it, if false. There is only one person in the media industry who fits the bill. If you are a Sheeple, you will recognize his name but not realize just how powerful in media he is, or in political realms, and how deceitful he is. I am speaking of George Soros.
It is that simple. When most of us rely on TV news, we only get one slant (liberal, usually, conservative if you go out of your way). Because of TV’s own special dumbing down tricks as earlier referenced, you will walk away with a very encapsulated message with is has no actual understanding associated with it. Then, when someone puts their slant on it and you get hit with that 20 times, it becomes your slant, and people like me and others who prefer to think for ourselves, are increasingly finding it difficult to correct any errors.
Worse, if you do think for yourself, you may not be able to learn what you need to make an informed decision, up front. Heaven help you if you are trying to investigate what seems like a conspiracy theory, because of glaring holes in the official story. Obscuring the true story seems to be the way of things, today, so just ‘move along, folks.. nothing to see, here.’
When you add all this to what is taking place in the public school system and in higher education (liberal indoctrination), your children will think this is the way it is supposed to be, and whomever is in power when they are adults will be able to do and get away with whatever they want. They will dictate to them what to believe, and it will be believed. The notion of thinking for themselves, and of distrusting and challenging government will be foreign concepts. They might as well be called the 20x Generation.
The ’Snowflakes’ on the left are already a part of that group, unwilling to listen to facts or reason, and repeating what they are told to believe. I, for one, am not willing to pass the reigns of our nation’s future over to them, in their current state of mind. I’d rather have an armed revolution, if that is what it takes, to end their madness for them. Constant outrage based on lies serves no one’s best interest, except at the top of the food chain.
So my last question for you is this: do you want to be a Sheeple morsel for Wolves like Soros and his elite political friends, people more interested in Globalism than what is right and moral? Or do you want to be a think-for-yourself consumer of actual news you can easily access, rely upon, and use when talking to others about things which matter to you?
If the later, you had better start complaining to media, and to politicians about it. You might even want to consider taking legal action or starting an initiative ballot, if your State has that option, to write laws forcing journalists to adhere to journalistic standards and to make their stories available more appropriately. You certainly ought not simply be sharing what is being fed you currently without verifying for yourself it is the truth.
Else we all become 20xers… or we have that revolution, the least desirable of options.
We depend on Government in emergencies. But what if the emergency system designed to warn us was turned against us as a tool for Control? The unusual flurry of false EAS alerts of late may point to just that…
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
What you will learn reading this (long) post…
- There has been a staccato series of ‘impossible’ false EAS alerts of late;
- In fact, there have been twice as many as national media admits;
- They defy statistical probabilities with no historical precedence;
- This mimics other, similarly odd critical historical infrastructure failures;
- Those infrastructures have associations w military & intelligence communities;
- Their failures appear to serve the interests of the military/intel players;
- The associations and interests are also a commonality to the EAS failures;
- An analysis/projection as to what it all means: what to worry about.
Why can’t we trust the EAS System??
It makes no sense, unless you are a conspiracy theorist who knows something from history that others, do not… things having to do with CIA conspiracies which were NOT theories, but actual proven crimes. No one, I doubt, other than any conspirators involved, is in a better position to explain the true significance and offer the full details of these failures, than this writer. The full story is far bigger and scarier than the almost ‘entertaining’ or matter-of-fact dry news approaches found elsewhere, when dealing with the topic. We start with a simple question…
What is wrong such that there have been as many a EIGHT (more than a dozen, technically, depending on how one chooses to count) false Emergency Alert System issuances in the span of five short months… and that does not include several more potentially related, as separately described. That is in stark contrast to the fact that in the previous twenty years since replacing the old Cold War CONELRAD Emergency Broadcasting System in 1997, there had not been a single false alert of the same sort?*
It’s bad enough that EAS alerts start off with extremely annoying assaults in your ear, but when they turn out to have scared you into action for a false reason of some sort, you really get ticked off. Unfortunately, it appears there is even more to be angry about, than any of that… something greater to fear than these errors… even greater in scope and threat, perhaps, than the messages themselves, portrayed, even if real. Let’s take a look:
- False Tsunami alert, Jan 2, Seaside Oregon. Very specific, advising 4 hours to get to high ground;
- False Nuclear Attack alert, Jan 13, State of Hawaii. Very specific, advising “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL;”
- False Flood Warning, Jan 17, Morris County, New Jersey. Specific, narrowly distributed, and persistent, in that it was repeatedly issued to customers of only one cable provider, and could not be ended unless turning the the TV off and back on, after which it would reappear after a few moments;
- False Tsunami alert, Feb 6, Portland Maine. Also appeared in West Palm Beach, FL, and other locations on the East Coast, various locations in the Gulf of Mexico, and Puerto Rico. Very Specific, giving only 57 minutes warning;
- False Blizzard alert, Feb 19, Tucson, Arizona. Specific. Snow of any kind is extremely rare, there.
- False Tsunami alert, May 11, State of Alaska (two instances). Very Specific, and though only aired in Alaska, warnings itself cited entire North American Coastline (including British Columbia) and Hawaii;
- False Zombie Alert, May 20, Lake Worth, Florida. Very specific “POWER OUTAGE AND ZOMBIE ALERT FOR LAKE WORTH AND TERMINUS.” Companion message followed some time later “THERE ARE NOW FAR LESS THAN SEVEN THOUSAND-THREE-HUNDRED-EIGHTY CUSTOMER INVOLVED DUE TO EXTREME ZOMBIE ACTIVITY. RESTORATION TIME UNCERTAIN.” Note: for some reason, no news source makes record of BOTH messages, and many news pages on topic are now ‘404 Errors,’ as if someone is vanishing select reporting on this incident;**
- False Civil Emergency alert (2 messages), May 29, four counties about the Salem, Oregon State’s Capitol. Not exactly a false alert, it simply was wrong in content, non specific, “CIVIL EMERGENCY IN THIS AREA UNTIL 11:28 PM PDT PREPARE FOR ACTION.” This was followed by a second message some hours later advising that it was a “WATER EMERGENCY FOR THE SALEM AREA,” but gave no specifics, instead giving a web link for details. That clarification did not go out to adjacent areas, leaving those citizens, in the dark until media could figure it out and advise using their own services.***
- Potentially Related: False Nuclear Power Plant Accident Alert, May 23, 2017, Salem County, New Jersey. A drill being conducted was interpreted as real by the system;
- Potentially Related: False Blizzard Alert, May 16, State of Nebraska. Very Specific, listing all counties. Note: this alert was not found in mainstream news, but in a Youtube. However, the presenter specializes in videos of seismic activity recording instruments during events, and therefore, seems unlikely to be fake;
- Potentially Related: False Zombie Alert, May 16, Great Falls, Montana. Very Specific, and claimed to be a hacking incident.
- Potentially Related: False Nuclear Attack Alert April 22, 2018, Winnipeg, Canada. The Canadian system is not an American design, and works differently. However, there is some interfacing between them, as seen in the Alaskan Tsunami warning. This message was heard only (above link) through the cities various loudspeakers, which were not part of any official alert system, and is thought to be a prank. The message was, however, quite frightening and detailed, very specific, and, delivered in a computer voice with believable content: “This is a National Emergency. Important details will follow. (unintelligible) (emergency tones) The following message is transmitted at the request of the Canadian Government. This is not a Test. A nuclear attack is occurring against the United States and Canada. Six nuclear missiles have been launched from unknown locations, and are expected to strike the United States and Canada within the next 15 to 25 minutes. Due to the uncertain path of these missiles, all Canadian residents should seek out a fallout shelter immediately. If members of the Canadian armed forces direct you to a fallout shelter, please follow them for your safety. If no fallout shelters are available, get as far underground as possible. Stay away from windows, using heavy objects to put as many walls an layers of protection between you and the outside world as possible. You should put together a basic emergency survival kit including a flashlight and battery operated radio to use during your stay in the shelter. Stay tuned to local media for further information. Do not venture outside until notified it is safe to do so. Prime Minister Justin Trudeau will be speaking on all stations shortly“
One final point to consider: there are ‘consistent themes’ present in all of this, not all of which are obtusely visible, and perhaps not all revealed, herein. There is a Zombie theme, a nuclear theme, a Tsunami theme, and a ‘name’ theme, where the names of some counties involved match the names of some cities involved in other alerts, or vice versa, and similarly, a map location theme (East, West, and Gulf Coasts, and dead center U.S., plus Canada; all four ‘sides’ and the ‘center’). There is also a ‘date’ theme, since all but one event transpired in the same three months, six of those in one month, two on the same date. Collectively, these thematic patterns raise additional questions as to the likelihood of mere ‘coincidences’ or ‘accidents’ being involved.
Note: this is a long post which goes into great detail that there be no misjudgment by the reader. It is suggested you not read further until you have enough time to finish (scroll now to evaluate reading time).
*Each of the false alerts prior to 2018 had a completely different nature than those cited above, especially in that the older false alerts were not generated by use of the system, as such. All but one of those above had a cause/blame element or mitigating circumstance pointing to failures in the system, even when human error was also involved, whereas all prior errors on record (about a dozen spread out over the 20 years), were due to hacking (1), mistakes in advertising (several), or film production (several). There were additional failures where tests failed to transmit, at all. It can be said that all of the historical problems boiled down to human error traced to failing to understand how the system worked, or failing to use it at all (failed transmissions). That is not true of the six in question.
The thing to underscore is that there is near zero similarity to the current failures, in analysis. Even when human error played contributory roles (two events), something in the System, itself, was also to blame… which is a mystery, because there has been no change to the system which could account for a change in reliability or performance. Differences aside, keep in mind too, that there is no guarantee that any given official explanation is necessarily the truth; such things gone wrong involving government often involve cover (up) stories… especially if there is a conspiracy, somewhere in the woodwork.
There was one instance of hacking in the older events, but a long list of those older false alerts were triggered because radio or TV stations used tape which had previously held EAS content, where the signal which triggers the system was still detected by the system though otherwise inaudible. The EAS tone has a digital signature which the system detects for actuation… and the annoying tones themselves are that digital signal in audio form… which also triggers the system if in broadcast content. Beyond the hacking, this signal was itself the source of the remaining problems, primarily because human operators were unaware of it’s technical nature:
One national Arco Ad deliberately included the tones with the ad message to get the listener’s attention in ‘gag-like’ motif, and concluded with “This test brought to you by ARCO.” One local advertiser also incorporated the tones in similar marketing intent, but the NBC affiliate running the ad locally did not know it would trigger and automatically transmit the alert nation-wide over the entire NBC network. Movies sometimes include the sound in their digital sound tracks when the plot calls for it, and when aired on TV, that, too, triggers the system (Olympus Has Fallen was an example). The most recent example was a sports radio program using the tones in a review of a sporting event where the alerts triggered during the event, a matter resulting in $2.5M in fines to the program producers and the station involved.
These differences highlight the unusual series of late, which contrast in both frequency statistics and historical relevance; if the given explanations are true (there have been few explanations yet offered, and they have been speculative or non specific in nature, chiefly passing the buck to some other quarter; ‘It wasn’t us;’ the message came from (someone else). ‘Someone else’ had nothing to say. So, we now have one more serious question to ask:
How come we have not encountered these kinds of failures, before?
**The Zombie alert is particularly disturbing for three reasons, none of which sound particularly believable, but they are true. One is tied to where it took place, in that there have been multiple news stories in Florida in this last decade, all about REAL Zombie attacks, including banned Youtube videos of a naked man who had to be shot by Police because he refused to obey orders to stop eating the face of another man he had subdued violently. Another incident had a man who was undeterred by multiple tasers and a Police Dog, and had to be pulled off of the body of his victim by four Officers, after chewing on his victim’s face. These attacks were blamed on Flakka, an exotic Chinese-made designer drug with extreme and unpredictable hallucinogenic properties.
The other is that the Center for Disease Control’s official Web site has a whole page on Zombie attack preparedness. It is a not-so-easily-detected Onion-style tongue-in-cheek attempt (they claim it a marketing gimmick) to force people into thinking about emergency preparedness. It may have worked, but given the news stories and the EAS alert, one has to wonder… how is it that the word Zombie has more something like a dozen times made it into elements of the EAS system? In the recent incident of concern, it seems the word was not typed in by a human, but somehow, it was substituted for the word for ‘weather.’ I point out that procedurally, it takes two people to enter a custom message, the typist, and a supervisor who dictates and/or approves it while watching over the shoulder; a kind of failsafe system to spot/prevent such errors.
The other general false Zombie messages took place in 2009 and 2012. Highway traffic alert signs (i.e., the ‘Amber System’, School Zone signs, freeway traffic signs, etc.) started warning of Zombie attacks. Amber and many highway systems, and any local emergency cell-phone subscription services, are all interfaced with EAS to one extent or another. The Zombie messages transpired in scattered cities around the nation with some variety in specific content. One school zone speed warning sign read “ZOMBIE INFECTED SCHOOL AHEAD”, whereas most of other traffic signs read “WARNING! ZOMBIES AHEAD.” Fortunately, those events were not based in reality… yet.
One more ‘bonus’ reason exists, but is its own matter of importance with respect to the conspiracy theory alluded to in the introduction.****
***The Oregon Capitol (Salem) suffered a biological water contamination (algae bloom toxins) which was dangerous to very young or old persons, and anyone with a hampered immune system. But though city planners were aware of the problem, they waited four days before issuing the Alert, thinking they would simply ‘fix’ the problem with water treatment, and retest the water.
That’s what they did, but the brainy (I should point out that Oregon is run by extreme leftist progressives, not known for thinking problems through to proper conclusion before acting) Oregon officials failed sent the sample to an out-of-state lab by mail despite having ample local testing resources, forcing a considerable delay. Additionally, the problem initially transpired over a holiday weekend, and they just couldn’t be bothered to be proactive in the face of a potential life-threatening situation. Oregon is often described as a ‘Let-it-burn State,’ because they habitually fail to respond to emergencies until an extreme crises, a pattern especially visible in how they respond to forest fires… which is to say not at all, unless and until it starts threatening communities or major commercial ventures, or starts to make national news (they don’t like negative PR).
In like manner, the State failed in its ability to notify citizens when the water was finally again safe to drink. Some blame the Governor, Kate Brown, who is thought to have ‘not let a good crisis go to waste,’ and who thereby let the problem get large enough for grandstanding, by calling in the National Guard to provide potable water in a near ‘Martial Law disaster response’ manner. That thus illustrated ‘leadership in a crises,’ when it was actually a non crises which had apparently already resolved itself, before she gave the orders, had anyone bothered to correctly clarify the matter.
Even the second EAS ‘explanation’ message was sufficiently non specific such that it caused extreme social and financial hardships on businesses and citizens, esp. those working for the countless eateries and other firms which shut down because they feared using water, at all, and because people panicked and hit the stores to gobble up as much bottled water as they could muster. As result, some stores raised prices on bottles to as high as $50 a case, and they got it. The Governor has ordered those firms to be prosecuted for their profiteering in a crises, which is akin to hording in terms of emergencies, under the law. This was also part of her grandstanding, as it seems the threat was never carried out, probably because the law only applies under FEMA control in disaster response, and/or in the case of actual Martial Law. I’ll defer to legal teams on that, as this is certain to lead to lawsuits against the City and the State, as well as stores involved (that’s another way Oregon burns).
In addition, Kate attempted to blame Donald Trump policies in purely political diatribe, which had nothing to do with anything. And, subsequently, the State moved to order residents of four rural counties to ‘stop using well water’ because ‘it is lowering river levels’ and threatening the water supply of the cities. The State has no legal right to usurp the property (water rights) of citizens without due process, and in point of fact, the wells in question do not impact the river levels, as is scientifically proven by several means.
But it made good PR for the liberals in the cities, who hold the greater number of votes. So, in a way, this particular EAS was part and parcel of its own little political conspiracy, though it did not originate as such, nor was it causal to the false and functionless alerts… assuming you don’t count public panic a function.
****Conspiracy? This conspiracy theorist has many times proven theories true, and in fact, correctly predicted 9-11, and afterwards, personally thwarting another predicted terror attack in Portland (link: mid page). Over the years, conspiracy theorist thinking also enable me to help put a good number of bad people into jail who were engaged in organized or individual crimes, some of which made national news. These predictions and the crime busting was largely made possible by first formulating a conspiracy theory, then postulating a means to prove it, and researching to find the predicted evidence it was so. There is no difference in methods employed by a good theorist and law enforcement, except that the later has virtually unlimited resources and tools available.
By such means, after ten years of research, I developed Unified Conspiracy Theory in and for my book set, Fatal Rebirth. It was the UTC which predicted the terrorism, and much more as cited above, including the Derivatives financial disaster, select gun violence, an assassination attempt tied to a Presidential campaign, and much more. In reverse manner, it showed how the long list of ‘random’ bumps-in-the-night of American History (i.e., S&L crises, assassinations, Iran Contra, OKC and WTC bombing, etc.) were not random, but stepwise logical acts in a PLAN to towards meeting a SPECIFIC GOAL… which also accounts for the extreme leftist nature and actions of the Democrats since Obama took and then lost office. That, I did not foresee, though at the time, it appeared that the far Right would do much the same if unchecked. Let’s just say that the UTC saw little difference between a Clinton and a Bush… ‘New Boss same as the Old Boss.’
The history which enabled the UTC itself brings us to some things which were part of those bumps in the night… which directly speak to this rash of EAS false alerts… as well as the highway sign warning system false alerts. The UTC in fact predicted abuse of EAS in false flag manner. That history tells us that these emergency alert systems were not the first to suffer highly questionably and unbelievably coincidental rashes of system ‘failures’ tied to conspiracies. To explain, we go back to CIA’s Operation Mockingbird… which through knowing, will help explain EAS matters. If already familiar with Mockingbird, you may skip to the last paragraph in the section, below.
Operation Mockingbird was a CIA project which was started in the 1950’s (Wikipedia uses the word ‘allegedly,’ but it is well documented, even indirectly referenced in the Congressional Record in both the Watergate affair, and in the Church and Rockefeller Committee reports on CIA mind control operations. Mockingbird disinformation was a subtle but effective form of mind control through, at the very least, the mid 70’s… and that date IS ‘alleged,’ because there have been many proofs it is still in play well into this Century, as one example, below, will attest.
Mockingbird was a large-scale infiltration of mainstream U.S. and foreign Media. In the U.S., alone, there were thousands of operatives involved. This included small student and cultural organizations all the way up to big TV network news and newspapers, and Internationally, it included whole Wire Services, such as A.P., U.P.I., and Copely… which of course, also impacted American news sources who regularly passed on their stories unchecked. Most were recruited as in place employees or managers ‘hired’ or ‘bribed,’ or otherwise coerced into cooperation, but actual CIA agents were also put on the payrolls of cooperative media. In some cases, CIA actually bought the firms, and staffed them with whomever they pleased.
Big names were involved, too. William S. Paley (head of CBS), Walter Cronkite (CBS), Henry Luce (Time/Life), James Copely (Copely News Services), Phil and Katherine Graham (Phil @ Washington Post and as head of Mockingbird within his industry, Kate following in his footsteps, and later, Time/Life/Warner’s infection, along with their existing Mockingbirds). The list goes on, to include many key people in at least 25 newspapers and every TV network — and Hollywood was by no means exempt. That number of newspapers is interesting, because it is not the first time.
Prior to WWI, the ‘Powder Interests’ (the predecessor to the Military Industrial Complex) organized conspiratorially to get America into the war by bribing the Managing Editors of 25 newspapers to sway America away from its isolationist and neutral thinking regarding the war in Europe. That IS succinctly and precisely found in the Congressional Record. They did this in a manner similar to the way a CIA Public Relations Firm and CIA proper arranged to get America into ‘America’s New War’ (the ‘slogan’ adopted by mainstream media in Wag-the-Dog media manipulation manner), Desert Storm, the liberation of Kuwait. This was a modern post 2000 example of Mockingbird’s model in play.
CIA and it’s CIA controlled PR firm, fostered a lie (disinformation) in news stories and in false testimony before Congress (and rolling news cameras) that Iraqi invaders were killing Kuwaiti babies, Doctors, and Nurses in order to steal incubators from hospitals. In WWI, they did the same, the lie being that Germans were raping and cutting the breasts off of Belgium women thought to be corroborating with the resistance movement. Both lies were bought, hook, line, and sinker, and helped bring America to war. The first casualty of war, is said to be ’Truth,’ and it falls well before the war actually starts.
What does that have to do with EAS, you ask? What is EAS (and the highway signs), but a way to spread key information to people… or DISINFORMATION? It is just a slightly different but much more urgent and powerful cannot-be-ignored way, than mere media. Now, for the rest of the story: this is indeed not the first time there have been conspiracies which parallel these ‘errors’ in other kinds of critical national systems… and their very nature implies Mockingbird-like ties to the intelligence community, was involved. Everything you are about to read next about these events is fully reviewed and documented in Fatal Rebirth, and were, in fact, key components of the UTC’s evolution and ultimate predictive capabilities.
Telephone and Power Grid systems
Both of these critical national infrastructures are well regulated, if not designed, in a collaboration between their key industry players and government overseers, including one or more intelligence agencies. NSA and Ma Bell worked very closely together to design the ‘modern’ digital telephone system (‘modern,’ because it was as early as 1960… an important date in our discussion). FBI and CIA were also ‘in-the-loop,’ along with the Pentagon and at least Army Intelligence (perhaps other branches, as well).
The nation’s Power Grid, on the other hand, has been an evolving design overseen for security and technical purposes by the US. Department of Energy. DOE has historically had strong ties to CIA, to include, for instance, cooperative efforts in the area of Mind Control research (again, in the Congressional Record, and in this case, official DOE files online). Again, FBI, et. al, have always been in the oversight loop. Curious then, that both these systems have suffered mysterious rashes of failures almost identical in pattern to the EAS and highway sign failures. I summarize, here, from documentation in Fatal Rebirth:
The Power Grid has suffered two ‘batches’ of failures. The first was over two years (1996-98), during which three of the four major multi-state grid sectors suffered a complete catastrophic power outage. The second string of outages took place over three years (2001-03) with similar results. Both series involved other countries, as well, all relying on US grid design formats or the failed grid’s power, itself.
This was all blamed on trees and lightening strikes, neither of which hold water for technical reasons which render them it quite implausible, especially given the repetitive nature in tight time constraints… it would be like claiming every assassination effort in the last 50 years involved a JFK magic bullet, including the one against Reagan by Sqeaky Fromme, where no shot was fired. Simply put, trees are not allowed anywhere near the high tension lines involved, and all lines are isolated from ground, where their towers are in their place grounded lightening rods intended to prevent lightening strikes from impacting the lines. These are cover up stories. If they were valid explanation, the history of outages would consistently have the same failures ongoing, and not be isolated to neat little clusters.
And it is JFK which brings us full circle to that 1960 date… and to the phone systems. The digital phone system was launched in 1960, just in time for the assassination of JFK in 1963. The entire phone system in Washington, D.C., was shut down the very hour of the assassination, and not restored until Vice President Johnson was sworn in. Evidence generally accepted in books on topic (i.e., Mark Lane’s Plausible Denial) indict G. Gordon Liddy, ex FBI player trained in manipulation of the digital system, and closely aligned with the CIA team assassinating Kennedy according to courtroom testimony (same book), also the same team to the man involved in Watergate, along with Liddy. The D.C. outage would eventually be duplicated in a bigger scale, nationwide…
These also were in two batches. In 1991 a series of major land-line outages in America caused large area networks to go dark, all within the same two month period, each impacting key cities and whole States, D.C. style. In fact, D.C. was one of the cities, and part of the mystery is that major cities on vastly different regional networks were simultaneously failed in most of these outages, often thousands of miles apart. Like the Power Grid, post Fatal Rebirth, another series of such outages has taken place, this time impacting select Cellular carriers, the most recent recent of note impacting multiple carriers and the entire Southeast U.S. More to follow, on that. Like the EAS alert errors, no actual definitive explanations were ever fielded.
What it all means
There are two important meanings. The only one obvious and stated elsewhere in media accounts on the topic is the concern about public safety. If you cannot trust the accuracy of the EAS system, people could end up being harmed physically or financially by false alerts, or worse, end up in like state because they had lost faith in the accuracy of the system and failed to properly and promptly respond to an actual emergency. It matters now WHY the errors exist, for this concern to be valid. Be it because of hacking, human error, design flaws, or political motives, lives are still at risk of serious negative impact. But that is nothing, compared to the greater, unseen threat implied as covertly present:
The UTC says these were all test ‘failures’ caused by elements of the intelligence community, principally as ‘tests’ of their ability to manipulate the systems involved, as a matter of Civil Control. This would logically be a logical step in preparation for potential serious civil disobedience, Martial Law, or some kind of political Coup. The more recent events were, in fact, predicted by the UTC in Fatal Rebirth. Such would be a powerful disinformation tool, one having the unique potential to be both a conspiratorial false flag style pre event deception, and a support for post event cover up… ‘official proof’ as to what the ‘official truth’ was intended to be.
Certainly, any given event we have reviewed could in truth be simple natural failures with no attendant conspiracy attached. But given the batch nature and other similarities to the power/phone system failures, and the other highly coincidental clues discussed herein, the whole cannot in any way be innocent. Consider this: if we suspect conspiracy based test ‘failures,’ we must presume they would need to predate some future major event of potential concern such as to warrant such a desperate total blackout of (power, phones, or both… along with EAS, and highway signs.) Restated; if expected to be needed, you would damn well test something that complex and important, first, and early enough to perfect the effort should it test poorly. Any such predating would need allow a couple several months to years to ‘fix’ any flaws causing the tests to fail, in order to retest to insure it worked flawlessly when it really mattered. Hence, tests might require two batches.
So… what about that dating?
We need look at the outage dating and see if there were any events which might require outages of power and phone systems, as a means of validating conspiracy concerns. We must think of such outages as contingent emergency responses to control populations in an otherwise out-of-control situation threatening government security… or the security of those working in the shadows on conspiracies of their own against the nation. If we find such in place, then we have a potential UTC-like scenario we can then apply to divine what may lie ahead, based on the current flurry of false alerts.
Power, 1996-98: two years before 9-11. If that was a false flag attack, as much evidence reveals it to be (another part of the Operation Northwoods plan thought to have part of why Kennedy was assassinated), then any serious failure in keeping the truth a secret might require shutdown of the country’s ability to rally against a more dramatic coup required to prevent or deal with armed revolution, or similar civil upheaval. A FEMA takeover would be the perfect cover for such a coup, and give time to manufacture and establish an effective cover up, such as showing some dead bodies thrown under the Bus as conspirator ‘ring leaders.’ In fact, Homeland Security was established exactly two years prior to 9-11, to the day… and was planed by PNAC and the Anser Institute (an intelligence community think tank), all planned in the same general time frame as the test outages.
Power, 2001-03: one year prior to a UTC predicted terror attack on Portland, Or, which I personally thwarted, involving two of FBI’s Top 10 most wanted terrorists (identified by video and eye witnesses – details here)… not to mention at least one FBI agent, false flag style. Five years before Barrack Obama would run for President with some reason to fear possible assassination, which could in theory spark a race war or similar unrest. Either one of these events might require outages in order to retain or restore control and mitigate damages from resulting civil turmoil.
Power, regional Southwest outage, 2011 (also post Fatal Rebirth): this is the most recent and singular outage event, only suspicious because no cause for it has ever been discovered, though hacking and terrorism have both been ruled out. It is several years before the growing racial violence potential during the Obama Administration, and for the matter, the current turmoil among the radical left caused by Trump’s Presidency. Additionally, there has been an endless series of news events, mostly centering around gun violence involving black victims or civil rights issues had a potential for sparking the race war feared by the Rodney King beatings. The assassination fear would also remain.
Phones, 1991 series: three years before the Rodney King beating, the WTC bombing, and the Branch Davidian nightmare at Waco. The CIA, military intelligence, and the greater Military Industrial Complex were involved in all three events. Two years before the assassination attempt predicted by the UTC on Presidential Candidate H. Ross Perot.
Phones; regional outage 4 carriers in four Southeast States, 2011 (post Fatal Rebirth): this was allegedly due to a single cut land-line cable, but who and how the cable was severed has NEVER BEEN DETERMINED. There is a possibility that the cut took place AFTER the outage was achieved by other, unknown means. The Occupy movement was generally organized/proposed/planned beginning in May of 2011. Intelligence Agencies would have been aware then, or shortly thereafter, and would need to take some time to consider contingencies, once knowing the event’s schedule. The outage transpired in August, and the actual Occupy Event in America took place in mid September, exactly 45 days later. It had the potential to be evolve into a national or even global revolution.
A little complex to relate in a blog already long in tooth, but suffice it to say that any one of these outage events could easily be shown to be a preparatory test in support of a plot or other expected event with the potential to result in wide-spread civil disobedience. CIA operated spy planes remapping US cities and coordinated with the Pentagon in planning for military takeover if riots spread beyond LA, where military intelligence operatives initiated much of the violence disguised as angry Blacks from Watts. WTC was orchestrated and facilitated by both CIA and military intelligence, principally to empower Osama bin Laden’s Al Queda as the premier terrorist group, and place two top aids into the organization as double agents. The bloody end planned for Waco risked exposing CIA mind control programs and premeditated mass murder, and took place under Bill Clinton, he and his wife also ‘former’ CIA operatives, if not agents. Perot’s assassination attempt was by mailed Anthrax, same as used against one of Clinton’s body guards who was to testify against him in the Whitewater affair, and as used against media and Congress post 9-11. Any one of these events going wrong and leading to exposure of the truth (esp. who was behind them) could result in serious civil upheaval or dangerous collapse of government infrastructures, including the military and intelligence community.
Note: Phone and/or Power outages also generally kill Internet services in the same areas effected. Power outages kill everything, including gasoline supplies, sales of critical emergency supplies at most retailers, and access to cash from the banking system. These things critically impact the ability of Citizens to exercise much of any effort beyond mere survival, easily putting a crimp in any major organized events. Outages effectively ‘freeze’ political, social, and physical states of the region(s) affected until authorities can gain control. Emphasize, CONTROL.
What might the current EAS failures portend?
What if the theory is true? Again, in UTC manner, one can attempt to ‘look ahead’ and divine what might be needed to fulfill the last remaining ’puzzle piece’ in the theory; the otherwise inobvious ’need’ for such a test. Two such possibilities come easily to mind. Without being more in tune with current events at the book-research level, I can think of no others, but they certainly may exist. Or, of course, I could be all wet… which is for you to decide… comments welcome, even if critical.
Given the current level of unrest and hatred found on the far left, and the violence and aggressiveness they have lately resorted to, I can only conclude that many of the EAS failures were potentially tests preparatory for a national crisis based on an attempt to depose President Trump and assume control of the White House. It might be an assassination, some form of a coup attempt, an outright civil war between the left and right… or as simple as a highly questionable impeachment effort. I rate that as number one in likelihood.
Number two relates well to the Zombie element. Many conspiracy theorists… and the UTC does foresee the possibility… believe that some form of biological pathogenic pandemic based on zoonotics (man-made virus, generally race specific) is in our future. Fatal Rebirth and my latest book, Who’s Killing the Bilderbergers, both spend a lot of time examining this notion. The theory is that the New World Order will move to both reduce the population of the World and to weaken America’s ability to defend itself against foreign interests (including NWO desires to see a North American Union consisting of Canada, the U.S., Mexico, and the other Central American countries), and will foment a biological attack disguised as some random but previously unknown virus.
It is also possible that large quantities of Flakka could be manufactured and introduced into the water system, slowly. That would make some sense of the Zombie alerts, and the EAS problems related to the water system in Oregon. Slow introduction of Flakka would result in evolving mental instability of the population, at large, such as we are seeing demonstrated more and more in bizarre news stories. At some point, ‘Zombie attacks’ would start to transpire, especially with a sudden increase in Flakka distribution through secondary food sources or aerosol disbursement. If this scenario were a valid concern, the ability to interfere with the EAS system in the event of water testing producing evidence of Flakka introduction would be necessary, which therefore makes Oregon’s EAS failure a little more suspicious than simple stupidity or political malfeasance.
Regardless of if you accept my evaluation and speculations, or not, it is clear we cannot trust the EAS system, and whatever the reason behind the failures really is, it isn’t going to be an answer likely to make us warm and fuzzy about the system, or our future. Especially since it looks like we will never get that answer, at all. That, btw, is how conspiracies work best; treat the public like mushrooms in the basement. You won’t be fed useful information likely to get you out of the dark.
It helps nothing that you can find at least a dozen Youtube’s and other Web resources telling you how to fake an EAS alert. Doing so in any way which reaches the public or accidentally triggers the EAS system, is a federal crime. That so many seem to be freely promoting fakes alert methods… itself seems somewhat conspiratorial.
Yet, somewhat unfortunately, one MUST play safe and act as if any EAS alert is valid. Ultimately, that is the only advice I can offer… but as the baseball player said in Field of Dreams… “Watch out for in your ear.” If you prefer a brainier quote: “Men still have to be governed by deception,” Georg C. Lichtenberg, 18th Century Scientist and Political Satirist.
Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.
1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.
2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.
3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.
4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.
I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.
It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.
Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.
12 Step Origins
Templars Masons Theosophy Rothchilds
The 1 step solution is also useful in targeting issues
- The sermon uses the topic of powers and principalities of ancient times to frame the lesson… and both addiction/abuse and targeting are born of powers and principalities, as is all sin…
- An addict/abuser ‘worships’ their particular sin of consequence…
- A TI ‘worships’ (by constant worried attention) their targeting issues of consequence (equating to sin)…
- Bending the knee to Assyria in the sermon equates to giving in to sin…
- So (the Pharaoh of Egypt) equates to you (your flesh, the Old Man) and your inadequate will power to resist sin…
- Which in turn equates to buying into the enemy’s (sin) Press Releases (that they cannot be resisted) wholeheartedly, accepting the belief the enemy cannot be overcome, by or of ourselves…
- If you listen carefully, you will hear echoes of 12-step program dialogs! They simply borrow the truth and apply it in their own way… and with respect to targeting, twist it to meet their own ends.
- TI Defense: 30 Tips to Help Fight Back
- Why am I Being Targeted? A Valuable Question for TIs
- FREE WILL: A TIs Greatest Asset, Oft Hardest to Employ
- How a TI’s Belief Structure Can Fail Them Dangerously
- Smart Meters, Stray Voltage, and Targeted Individuals
- Smart Phone EMF App No Value to TIs
- A TI with RF Measuring Device can = Dangerous Conclusions
- 7 Tips: How to outreach, preach, or beseech if a Targeted Individual
- Free Will Haven; Targeting Free Intentional Community for Stalking Victims
- Why Targeted Individuals should not hook up with other TIs
- Testimony to Mass. State Legislature on Bill Restricting Electronic Weapons
- A Glimpse of MC Realities (from the Preface)
The Antichrist is coming, and there needs to be a throne ready for him to occupy. Thus the New World Order is stepping up its one-world government effort and increasing their visibility in the process… and translucence… which equates to luciferian Illuminati-like illumination… often in the form of giant glass pyramids.
What you will learn from this post:
- the Illuminati, Freemasons, Knights Templar, & Round Table Groups are the NWO;
- with the same fascination with ancient mysticism, occult, and numerology;
- and the same desire to associate their works with symbolism such as the pyramid;
- that they have been building pyramids seeking to employ mystical aspects similar to Cheops, the grandest of Egyptian pyramids;
- said pyramids sharing commonalities in occult alignments and numerological peculiarities;
- where one complex of pyramids is tied to a rather interesting conspiracy Egyptian in nature;
- and another complex of pyramids appears to involve hi-tech mind control;
- and is itself apparently aligned with all pyramids in Europe, and likely, elsewhere!
The Source of Illumination is darkness…
In several of my books touching upon aspects of the New World Order, I carefully point out the important role played by Freemasons and their involvement with the dark occult and, primarily, ancient Egyptian mysticism and numerology (specifically, where numbers can translate into meanings with magical powers of manifestation). I am not talking about the rank and file lodge members duped into thinking it merely a benevolent fraternal organization, but of the satanic High Masons and select Masonic operational organs which operate secretly, within. The satanic Illuminati, for instance, sprang out of and followed Masonic constructs and principles… and it was they who officially launched the New World Order movement in 1776, their goal to destroy all governments and religions, to replace with their own, providing a seat for the Antichrist. We can also thank them, and head Mason and avowed satanist, Albert Pike, for the KKK, and more.
It seems quite apparent to those who study the nature of Globalists who seek the N.W.O., that they are usually High Masons, satanists or otherwise steeped in the occult. They are often members of or work through the so-called Round Table Groups, such as the Council on Foreign Relations, the Trilateral Commission, the Bilderbergers, the Club of Rome… groups made up of power moguls who control corporations and whole industries, government agencies and military power, and media and education. These, collectively, can be called Globalists, because they seek a one-world government, which is needed in order to seat the Antichrist.
In their works, they frequently employ the same symbolism and engage in occult events right along side of others of their ilk (i.e., Bohemian Grove). While what they believe (occult) should seem silly to a rational person, I remind the reader that it does not matter what you believe to be true, or false… it only matters what they believe. If you fail to acknowledge their beliefs as part and parcel of their modus operandi, you will fail to recognize them and their works, and be unprepared for their plans as they unfold. And much has unfolded, in plain sight.
Here, I will focus on one small aspect of their existence which is quite central to their beliefs; one of their most sacred of visual icons, the Egyptian Pyramids. Pyramids, especially the largest, Cheops, are as important to the Masonic underpinnings of the NWO as is the Cross to Christians. More so, in fact, as it is far more than mere symbol, to them; it is a powerful tool, and their fascination with ancient Egyptian mythology is quite anchored in Cheops. One need only look at the pyramid found on the obverse of the Dollar Bill and its all-seeing eye, to find a stark example. Of late, for a variety of disparate but coincidental reasons, I have made more recent observations which relate to this notion… things which you can easily verify yourself by use of Google Earth.
Square one, the base lines of Cheops
Cheops is the largest of the Egyptian pyramids, having many astrological alignments and dimensional (numerological) mysteries, among them being it was said to have been located at the the center of all land mass; it’s axis therefore dividing the known Earth at the time into quarters; Cheops baselines were aligned due North/South/East/West. As the N.W.O. players gain in power and ability to establish a one-world government (needed if there is to be a single leader in the person of the Antichrist), they also become more blatantly visible as such a force, which means it more frequently relies upon ancient symbolism in its workings.
So, then, I wondered… might there be more than a few NWO pyramids being ‘hidden in plain sight’?
There are, of course, many pyramids around the World, especially the ancient stone variety. These come in two flavors; the Egyptian, the biggies with their seemingly smooth triangular shapes (as seen at a bit of distance), and the Mayan/Aztec stepped structures, a style not unknown in Egypt, and elsewhere for the matter. The Masons have only an interest in the former, it seems, but my curiosity was about much newer structures, those built with modern methods and materials. Would the many newer pyramids around the World exhibit traits similar to Cheops, such as alignments or dimensions of occult significance?
Absolutely. And why not? A glass pyramid is the perfect embodiment of both the ancient pyramid mythos and of Satan; sunlight reflecting from within and without by day, and electric light glowing from within by night — all work to render them both translucent and illuminated, with bright glaring highlights akin to the all-seeing eye, depending on one’s viewpoint and the angle of lighting/reflection. As a work of man, they are both awe inspiring and mysterious, working on the subconscious in unfathomable primal ways not sensed by the conscious mind without pause and consideration. Even so, one is apt to embrace and bask in their presence despite any darker connotations, for they are undeniably beautiful works of architectural ‘art.’
So let us pause and consider with conscious effort…
Square 2: a review of new pyramids around the World
There have been more than 50 new/modern pyramids quietly built around the World in the last several decades, most of them made of glass and metal, and strangely, more than half of them in North America. A couple are faux pyramids with incomplete architecture in and of their own, but one included a second pyramid on site, and the other had a completed pyramid at top, and so, were included in the study. The idea was to see if their base lines or diagonals aligned with other pyramids (ancient or modern), or if any three or more centers or corners might align. Examinations for numerological meanings were also to be considered, early on, but the growing number of pyramids made that effort too monumental. Still, some interesting discoveries along that line were made.
I found so many alignments (almost 150) and associated numerical translations in place that I felt it was appropriate to establish some sort of test group to illustrate the difference between conspiratorial intention and random coincidence. For example, at one point well into the project, EVERY new pyramid except one revealed between two and nine alignments with one-another, and/or with Cheops, itself. One had 18 alignments. So a simple control group was added: some 30 Mayan/Aztec variety, plus nearly 6 inverted modern pyramid structures were added to the study. If these, too, yielded such results, the study could easily be argued as being inconclusive.
But they did not.
Only one formed a single alignment with any other pyramid, new or ancient, and it featured no resulting numerological significance. Clearly, the massive alignments in the new pyramids were intended by the powers that be, those persons behind purchase of the location and setting design criteria as to angular placement, size, and location on the property… especially true when multiple pyramids at the same location (as is the case in ancient Egypt) were undertaken. Therefore, the test groups were excluded in findings, which proved validity of both the methodology and hypothesis. Since only the new pyramids (not inverted) formed alignments, it had to be by intention.
While about a third of the new sites are single pyramid locations, there are several with two or three (like the main pyramids at Cheops), 3 with five pyramids, and one with 8, across nearly 50 locations. I then wondered if perhaps other old, but not ancient pyramids or locations deemed ‘holy’ by the Illumnati might not also offer alignments. Adding a handful of small pyramid burial sites by Masonic persons of wealth and power, as well as the death site of Adam Weishaupt, founder of the Illuminati, and the ‘headquarters’ from which he operated his secret cabal proved that notion, as well. I was unable to discern his precise birth place beyond the name of the city (Gotha, which is ironic in its own right, because Weishaupt and the Illuminati were very goth).
At the point where I felt the matter was amply proven, I had by then added eight older sites, typically 100-200 years old, though one dates to 12 BC, in Rome. It is the Pyramid of Cestius, circa 12 BC, at a time when Rome was, like the Templars, enthralled with the mysticism of Egypt. It is a site well known to Templars and Masons. The others are all in Europe, save one in America, and two of them relate directly to the Illuminati; Adam Weishaupt’s grave, the ‘headquarters’ where he planned and executed Illuminati plans, and perhaps the definitive Knights Templar location — Templehof (Templar Temple House), all in Germany. As these last three are not known to have involved pyramids on site, they are only used in scoring other pyramids which align with them, and not evaluated on their own, even though they would score fairly high.
So the alignments created in total involved alignments between ancient, historically old, and modern pyramids. The symbolism and mysticism of such structures by their special alignments, regardless of if rendered in aged stone or in modern metal and glass — are clearly as important to their builders as the function and beauty of their designs. All were starkly beautiful, and quite functional, to be sure; a perfect way to subtly reinforce the notion of luciferian and Masonic imagery upon the subconscious minds of citizens otherwise mesmerized at what they were seeing… especially when illuminated to great advantage by sunlight or voltage.
The problem of useful presentation
But describing all these alignments textually makes for boring reading. I will give just two instances as example, next, as they are quite tied together. It will be the only review of numerological ties, though more like it, exist, and with notable frequency. Trying to present the topic graphically is also challenging for other reasons, but I will attempt that, as well, in a third review. I will then provide a very simplified summary of selected findings to illustrate the scale and nature of alignments found, with a scoring system to relate symbolic spookiness.
But first, a disclaimer is required, because I always challenge any Doubting Thomas’s to duplicate my research before they make any false presumptions as to validity of my findings, and because the research tool involved (Google Earth) has its own technical limitations with which carelessness can impact upon accuracy.
Disclaimer: regarding some figures and claims herein about alignments and measures, accuracy is sometimes more difficult to affirm via Google Earth. Google Earth allows an accuracy to within a meter or so at ground-level, but things can get more complex when one starts trying to plot and measure lines with accuracy to the far side of the globe, and/or where the locations may be nearer to the Poles than Equator, or on/near altitude changes. Satellite images used in Google Earth are sometimes taken at oblique angles on either or both the horizontal and vertical, such that visual distortions of a pyramid can make true angular alignment (in compass degrees) or even measuring its base length, difficult to accurately determine. When dealing with such angular imagery, the center of the pyramid will be other than visually depicted, requiring one to make cross lines corner-to-corner to find the true center. The quality of image can also vary, but generally, line placement accuracy can be determined within 1-3 feet (roughly the line’s width). The images for two sites were so bad that it was impossible to determine if base line/diagonal alignments existed, but at least their location was known with GPS accuracy for the purpose of central alignments.
Additionally, one must take care insure the Pyramid(s) in question are centered in the view, and to reset the ’tilt’ (View > Reset > Tilt) after zooming in, or additional angular errors can be introduced, as the lines one lays for determinations themselves ‘float’ above the ground. In fact, where the pyramid is quite large, one may find the line ‘crawls up the face,’ providing additional distortion which must be defeated. The degree of inaccuracy in any given instance should not unnecessarily render the information herein as invalid; the thrust and intent behind the location and positioning of glass pyramids is clearly not casually undertaken. Also FYI, distances between pyramids herein are rounded figures, if there is no mystical number involved.
Verbal presentation example
Paris features two glass pyramids at the Louvre Museum, one large, one small and inverted, which form alignments to four other sites (the only inverted structure to do so, likely because it additionally features a normal pyramid, as well). There are three much smaller ones, as well, serving as skylights, which I chose to ignore, early on, and then forgot about, later; they would likely have established other alignments, as similar skylights on streets elsewhere, had done.
Two of the alignments at the Louvre are baselines from the larger pyramid to the same pyramid site in Texas, where they also align with the baseline of one, and the diagonal of another of three found there, essentially parallel. Three more alignments exist to three other sites involving three corner/center combinations, one of which is Cheops some 3232 km distant. Masonry’s highest publicly acknowledged ranks are the 32nd and 33rd degrees. The number 3232 is a ‘magic number’ in Satanic numerology, because it is a doublet, which doubles its ‘power’ (amplifies its importance), and because it sums to 55 (another doublet), one divisible by 11 (a doublet which makes 33 three times as powerful), and further sums to make 10. Again, it matters not what you believe about numerology, but what they believe…
And, this is what they believe about these numbers:
In the occult, 5 is the number of the planet. According to one-time head of early freemasonry, and avowed satanist, Alistair Crowley, 11 is “the number of Magick, itself,” and of sin, or evil corruption. 10, on the other hand, is the number of ‘heaven and earth in interaction’ (‘good vs. evil‘), and the symbol of it in the Greek (‘deca’) is the triangle, of which a pyramid employs 4, which means ‘strength and integrity,’ which is certainly a trait of the Pyramid. For the matter, the number 32 relates to ‘inspiring of truth and living by it,’ which is to say… the very promise and implied hope of illumination. Unfortunately, illumination means something rather different to those with a darker agenda, something closer to that which the serpent spoke of in the Garden of Eden. These are not the only meanings found in general numerology, but the ones preferred by dark occultists.
Extending the base lines of each of the Louvre pyramids westward 3500 m will take you, again in parallel manner, to the center unit of one, and a corner of the other of two glass pyramids built in Westborough, MA, by globalist pharma firm, Astra Zeneca (astra in the occult relates to supernatural weapons). Another line can be drawn from the lower corner of the larger pyramid at Louvre, through the center of the smaller one, there, to pass through the diagonal of the center pyramid of three atop a very Masonic looking Federal Government office building in Ottawa, Canada.
The smaller pyramid in Paris is 2 m shy of being 1/10th the base line dimension of Cheops, while the larger one is two meters more than 1/6th of Cheops. The larger Astra is 1/6th greater than the larger of Paris, and the smaller 1/2 the size of the smaller in Paris. The Ottawa pyramids are 1/4th the size of the largest at the Louvre, and 1/25th of Cheops, and 2 m shy of being 1/2 the smaller Astra. I would love to analyze the actual dimensions of all these, if they were readily available.
In Chile, the resort complex at San Alfonso Del Mar features a giant glass pyramid on the beach with four alignments. It is aligned such that its base line will bisect with the center of one of the lesser stepped Egyptian pyramids. Two more alignments are to diagonals of a pyramid in London, and one in China, 20 km from Hong Kong. A third aligns with the corners of two pyramids in Islamic Astana, Kazakhstan which, though richly expressing Islam in the property’s design, is also rich with Egyptian symbology.
The Chilean Pyramid base is also one/sixth the size of Cheop’s (38.3333 m, a number which is found many times in the fuller study in either location, size, or compass readings of various pyramids). It is located on the 38th Southern Parallel and the 32.32 Meridian. 38 sums to 11 (Magick) but itself can mean ‘Lucifer, the will of the Devil.’ 1/6th = 18%, where 18 = 9+9 (99 doublet) and 3 x 6 (666 triplet — even more powerful than a doublet, and Satan’s name). 18 itself means ‘Oppression, bondage, slavery,’ and = 3 (a ‘perfect number’ meaning fullness) x 6 (the soul of man) = 666 (legend/man/illumination).
A graphical review
Enough textual description; it is too boring and difficult to make sense of. Let’s try graphical, looking at hotel resort complex at Galveston, Texas, which also consisted of three Pyramids. This is one of several with 8 or more alignments, and perhaps the most interesting in terms of just what they align with, and how.
It may help to review what qualifies as ‘aligning,’ so you know what you understand why the lines look the way they do. The alignment must involve at least three points of contact between two distant pyramids, based on corners and centers. A baseline is two points, a diagonal or perpendicular from a baseline through the center being three points, but the distant pyramid must still have at least one such point of alignment, as well. If only one, it must be its center, but aligning with two corners on two different pyramids, there, is another way to align.
There are examples in my study were a baseline, perpendicular, or diagonal aligns with yet another baseline, perpendicular, or diagonal (four to six critical points total); a much harder thing to achieve. In like manner, some can be extended to align with yet other points of other pyramids at a third location; an even more dramatic alignment. I have found as many as five pyramids in three locations involved in a single alignment across the globe… with 14 points of alignment in all. These harder kinds of alignments should be next to impossible by random occurrence. Yet every single pyramid exhibits them.
And we have two such virtual impossibilities illustrated in our visual review at Moody Gardens, in Galveston, TX. Two of them actually involve Cheops, as earlier reference in the textual description, the ultimate of all possible alignments from the Masonic viewpoint. In fact, I find it the second-most interesting of all modern sites, in terms of alignments (the first, at Sauerland, Germany, is impossible to show in this manner as it enjoys 23 alignments. UPDATE: 43 in a row, and I finally stopped bothering!
Clockwise from Noon in the image, we see an align to the Nekoma Air Force Station, an experimental anti-missile defense system long abandoned. What is interesting is that one of it’s seven alignments goes to the only pyramid in South Korea — quite dependent upon U.S. anti-missile technology. That’s interesting, because there is another pyramid in N. Korea, and one of its several aligns goes to the Las Vegas Casino pyramid, which in turn aligns back to the Nekoma site. It is as if both N. and S. Korea are ‘borrowing’ from American military power, after a fashion, to create or reflect a ‘stalemate.’
Next we have two aligns effectively ‘parallel’ to the ‘holiest’ of Masonic pyramids in Egypt, involving a total of nine critical points with three pyramids. There is then an align to the Rock and Roll Hall of fame in Cleveland, OH, where it passes through the center of both pyramids, there (one small, complete pyramid, and one very large incomplete, or faux pyramid. There, the base of the larger less the base of the smaller, is equal to 1/3rd the base of Cheops.
We find an align to a now defunct pyramid on Miamii’s beach. Fairly ordinary as alignments go, it was built as a promotional venue for the international beer company, Heineken. Despite being temporary, it was placed to form at least three alignments on its own. Then, in like manner to the two aligns to Cheops, we have two more going to the two pictured Biosphere pyramids, which, like the two Rock and Roll pyramids bisected with the same line from Moody Gardens, have both of their pyramids bisected with an align from Nekoma (coming full circle, if you will, to form a triangle). In fact, Nekoma is itself involved in a total of 6 such three-way triangles. One of those involves the Miramar retail store, our final align from Moody Gardens, for two such triangles sharing Moody and Nekoma locations. Miramar is the other incomplete faux pyramid, in that only two opposing sides are triangular walls. Miramar, in turn, with two pyramids, forms 6 aligns, including one to the very Masonic Capital grounds of Australia, at Canberra.
So far, we’ve only closely looked at two out of about 50 locations. You can see how hard it is to use either text and/or graphics to reveal it usefully. So let’s now try a different way, and employ a chart with a scoring system designed to rate the comparative ‘spookiness’ factor of a given ancient or historically old site’s alignments with new pyramids or other holy illuminati locations, including each other. To further reduce the clutter, it will then only look at sites which directly connect to them, in even briefer review, sans scoring. The scoring system replaces trying to compute and display the actual odds of the alignment, which would be as high as 10 figures:1, in many cases.
For example, the odds of just a single alignment of the simplest kind, center to baseline, diagonal, or perpendicular or to two corners of two pyramids at destination (earning the lowest possible score of 1 in my scoring scheme) would have actual odds of 202,500:1 against. That is based on the notion of worst case accuracy of 1/10th of a degree of arc… meaning that each pyramid would have 10 x 360 degrees of potentially useful compass positioning, divided by 8, as there are 4 lines the pyramid which establish a total of 8 possible compass vectors. You need to multiply each pyramid by each of the others involved if aligning to another baseline, diagonal, or perpendicular. A baseline to baseline alignment odds would be 164,025,000,000:1 by such reasoning. Such odds are multiplied further by additional alignments at the site. Argh!
Technically, that’s too simple, because angular placement is not the only factor. Size and relative positioning plays a role, too, when two corners/centers of two different pyramids at the same site are involved, but I’m not going there without a super computer!
Now, if you want to argue that the actual accuracy we should using is tighter than that, implying room for error in ‘finding aligns,’ consider for a moment that only one alignment with the Mayan/Aztec pyramids was possible using the same accuracy as I employed. That makes a pretty good case that the alignments were intended regardless of whatever actual accuracy was employed. Even if you allowed for my own human error, there are so many alignments that they could not all have been for my error, given the Mayan/Aztec set enjoyed no similar quantity of errors. But by all means, feel free to correct my math/assumptions if you are of bookmaker caliber in computing odds, but I’m pretty sure I’ve got it right, based on some experience in statistical data analysis; I once ran my own marketing research firm which ran probability studies. No matter: we will use scoring, instead…
Scoring is as follows:
- center point to corners of two pyramids or a base/diagonal/perpendicular of 1 pyramid (simple alignment) = 1 point for the alignment;
- base/diagonal/perpendicular to same (complex alignment) = 5 points for the alignment;
- Bonus 5 points for any parallel alignments or alignments to multiple pyramids of one site to multiple pyramids of another site (parallel/pair alignment);
- any extended link to an additional pyramid (extended alignment) = alignment score x 5;
- link to Cheops (Cheops alignment) = x 5;
- link to other Egyptian pyramids or Illuminati sites (Illuminati alignment) = x 3;
- link to other historically old sites (Masonic alignment) = x 2;
- 1 point for each alignment and for each pyramid at site;
- magic numbers, angles, dimensions, etc., not part of scoring;
- Cheops gets a bonus of 33 points, Illuminati sites 11 points, Masonic 7 points
- maximum score limited to 99
Egyptian Pyramids 13 aligns w 6 pyramids on site (Δ) = 99 points: 29°58’44.54″ 31°8’3.65″
Complex Parallel to Sauerland (5+5 points), 3 Simple Parallel to Dubai (6×3), 3 to Sauerland (6×3), 2 Simple Parallels to Galveston (6×2), Complex to Niagara Falls (5), Simple to Louvre (1), to Eatonton GA (1), to San Alfonso del Mar Chile (1) 85 total +33 > 99.
Cestius pyramid in Rome 5 aligns w 1 Δ = 99 points: 41°52’34.97″ 12°28’51.16″
Complex Extended (three times — 4 Δ at 3 sites, in all!) to Manitoba Capitol and on to Miramar Retail (5x5x5x5), Simple Masonic to Karlsruhe Mausoleum (1×2), Simple to Pheonix Jeju S. Korea (1×2 – Phoenix is Masonic/Egyptian), to Sauerland (1), to Portsmouth UK (1) > 99 points
Star pyramid mausoleum Scotland 3 aligns w 1 Δ = 34 points: 56° 7’19.42″ 3°56’43.72″
Simple Illuminati Extended to Weishaupt’s grave, to Gold House IL in opposite direction (1x5x5), Simple to Cooperative Bank UK (1) 27 points + 7 Masonic site = 34
Karlsruhe pyramid mausoleum 7 aligns w 1 Δ = 27 points: 49° 0’33.22″ 8°24’14.05″
Simple Illuminati to Illuminati HQ (1×5), Simple Masonic to Cestius (1×2), to Kazakh RU (1×2 — rich with masonic/egyptian architecture), Simple to Dubai (1), to Edmonton Capitol (1), to Cal State U. (1) 20 points + 7 Masonic site = 27
Bickling mausoleum UK 2 alignments w 1 Δ = 13 points: 52°49’9.01″ 1°12’48.36″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
Schoenhofen Mausoleum Graceland Chicago 2 alignments w 1 Δ = 13 points: 41°57’33.56″ 87°39’34.09″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
What follows is a simpler summary of the first few of the destination sites mentioned sites as evaluated from their position…
Sauerland 23 aligns, 8 Δ, Dubai 13 aligns, 5 Δ; Moody at Galveston, 8 aligns, 3 Δ; Niagra Falls 2 aligns, 1 Δ; Louvre 7 aligns, 2 Δ; Etonton GA 2 aligns, 1 Δ; San Alfonzo del Mar 4 aligns, 1 Δ; Manitoba Capitol 9 aligns, 9 Δ treated as a single Δ as they all directly touched one another 3×3, and were each relatively small; Miramar Retail 7 aligns, 2 Δ; Pheonix Jeju S. Korea 6 aligns, 1 Δ (note: N. Korea has a Δ, too).
These are all quite typical of all sites evaluated, globally. The only site which scored 1 (1 align) was a site which has had its 2 pyramids removed/destroyed, disallowing angular alignment determinations, though the center of one of the pyramids was known, allowing an align by that method.
CONSPIRACY ALERT: That site, by the way, is tied to a little known conspiracy surrounding the Nuwabian Nation, an all-egyptian-like community of almost exclusively black people which was seized and razed to the ground by the U.S. and Georgia State and County governments. They were allegedly targeted for being a cult, subversive group, criminal organization, nest of child abusers, or a swindle… depending on who you ask. Seems like everyone had a pet excuse, including YouTube who seems to regularly censor vids on topic for their usual list of fabrications. Note the resemblance in some of the ceremonial dress to masonic lodges such as the Shriners (Nuwabians, like the lodge system, also use the terms, Orders, and Lodges). All Egyptian is wrong, too; they also were adoptively and by blood associated with Native Americans of the Yamassee Federation of Tribes, among them the Seminole.
Note on mausoleums: What we see in our review is that the three mausoleums share unique ‘coincidences’ in that each aligns with an Illuminati historic site honoring Weishaupt, and each in turn is honored for having done so by Sauerland aligning with them. There are many such pyramid mausoleums in Europe, America, and a few scattered elsewhere, far too many, in fact, to encourage me to dig further. Regardless, as the very first and only three reviewed all shared these two features, I’ve no doubt that others do, as well. A single Mason could easily undertake a single such alignment to a point of their own choosing, and more modern pyramid builders could easily accommodate at least one or more such mausoleums in their own alignment considerations. This brings us too…
Sauerland, enigma equal to Cheops
Sauerland is one of the newest of all sites, a complex of 8 pyramids which appears it may even involve mind control research. It certainly defies normal property development, architectural design, and building contractor norms in several ways. First, its location is on a hill overlooking an industrial park, and despite looking like a luxury retreat, is in fact the corporate campus of biomed tech company, Rayonex Schwingungstechnik (Rayonex Vibration Technology). It started with three pyramids, and has since grown to eight.
Second, the site has an adjacent and extremely unique high observation tower (about 110′ high) which overlooks the pyramids and the valley, just high enough that morning sun could shine through the large holes in the upper level and onto the pyramids, creating unique shadows. This was a trick employed in ancient Egypt using Washington Monument style oblelisks, such that at a certain time, a shadow might point to a secret place within the greater site (as seen in Indiana Jones and the Lost Ark. The tower’s corner shadow does fall over the pyramid property. But, let’s just call that a pipe dream.
You do have a pipe of some sort, don’t you… and a whip and hat?
Third, each building is offset irregularly and apart from each the other with no obvious pattern or reason, and likewise, quite contrary to normal designs, angled one from the other up to 3 degrees or so in compass alignment. It is my belief that this is what enables it to accommodate so many alignments, a thing which would require planing with a fairly complex computer program, to determine. Finally, again unlike most complexes, even where ‘luxury’ is intended, no two buildings are built or designed the same; each has an entirely different layout and appearance, though some features at least look similar. Usually, a cookie cutter approach to keep costs down would be employed. Yes, even in corporate campus design.
Then there is the very small pyramid surrounded by a water feature. I found construction photos that show a drill being used on a hole there, approximately 1 meter wide, with smooth walls. It was associated with an article on geothermal drilling which led to a very interesting YouTube promotional video that is really worth the watch; it will intrigue and educate you. After watching, though, ask yourself if the expense this likely represents would normally be deemed appropriate for a small fish pond? The video seems to address that with a blanket statement, but does it, really?
I learned also, that the small pyramid over that hole is the only one on the property using metal walls. The other, larger pyramids use some kind of unusual looking material which requires special application, according to other construction images I found. The panels used on them might logically be radiographic in nature, designed to limit or enhance radio waves of select frequencies, given the nature of the company’s work, as you shall see. In like manner, I can imagine the holes drilled by that machine could be used to install an array of underground EMF sensors or emitters. The video implies the array of radially and laterally drilled holes provides a series of ‘pipes’ which may in fact be perpendicular to one or more of the pyramids. Just why these possibilities are raised, is covered below.
Also unusual, is that one of the original three pyramids (perhaps more, now) is strictly for therapy use, with ten therapy stations. In each pyramid, a security computer controls all lights, window blinds, and door locks, and though there is no manual switch anywhere within for any of these, each workstation is said to have its own localized control over these features. But the security system computer can override, which makes it a rather creepy place with respect to potential for political control and overbearing security solutions against occupants, Big Brother style… especially if you don’t have authorized access to a workstation. Undoubtedly, there are plenty of security cameras, and I find it disconcerting that some pyramids have no windows, whatsoever — normally a code violation, unless a warehouse or factory. One must ask why so much expense and devotion to therapy and externalized security control over environment would be required? Let’s take a peek, and see.
The answer raises more questions. This is a unique kind of high tech firm. Their product/services would seem to involve mind enhancement, mind bending, or even mind control, but certainly relate to biophysics and therapy of some kind. One or more of those possibilities is very likely; the firm does research in electronic frequencies upon the human body (bioresonance), among other things. According to Wikipedia, bioresonance is all based on pseudoscience, which is a polite term for ‘made up BS by con artists’. Dunno about that, because…
This is also the sort of stuff useful in DEW Weapons for behavioral control (Political Control Technology). Of course, such tech is always researched and funded based on some good it might accomplish, including the combating of electrohypersensitivity, which many TIs suffer from because of their constant DEW targeting, or some preexisting natural sensitivity. I have it, myself. But once a patent is filed and governments or dark-minded NGOs get wind…
Now, about that tower… What if it was for security guards overseeing grounds security should an alarm goes off of some sort. The tower does have its own large building which might be suitable to house a security force. Hold that thought in mind while reading the next paragraphs. Turns out it is not just an observation tower, and not just any building. And, while guards might be rather far fetched a notion, there is more to consider.
The pyramid shape is also known as a Frustum by Masons; a shape used by the military in times of old in a manner not unlike a Tank Trap. Like a tank trap, as a shape, it cannot be easily overcome when several are placed together, there being no level foothold between them (a steep V shape), and its sharp corners, especially at the top, inhibiting climbing. More importantly, because its sides are sloped, one cannot hide behind a frustum, if the enemy holds high ground… such as a castle wall… or a high observation tower. Just exploring possibilities, here… but far-fetched or no, it fits the spookiness factor of the place.
But as stated, that’s not all. The platform is merely the top level of what is actually a mine shaft elevator lift. The building is currently a mining museum with access to a huge abandoned mine; they actually take you down into it with hard hat and light, etc. So, like Cheops, there are underground passages beneath the Sauerland pyramids. It is, of course, possible that some of those passages might be remodeled into something else entirely different, like many old mines are, today. It is even possible there are ways to access them from within one or more of the pyramids. Now wouldn’t that be a mystery to discover and explore, whip at the ready? However, all this causes me to hope no one would go drilling a bunch of radial holes over an abandoned mine… if they didn’t know exactly where the mine’s cavities were…
Now, last mystery. Look carefully at the top of the platform at the left corner nearest. No. That’s not a machine gun, though it can potentially be used to ‘shoot.’ It’s appears to be Yagi antenna, normally used to transmit or receive microwave signals in an amplified manner, along a narrowly aimed path. But wait! Where does it aim? At the top of that tower, as high as it is, the thing is aimed squarely at a hillside nearly four times as high as the platform. Useless, as seen. But wait! Just beneath the top rail is a what looks like a motor; the shaft can rotate. At the top is what appears to be a motor at an appropriate angle to change vertical angle. The white object appears to be a housing of a control system operated remotely. I used to sell such systems for video security setups based on microwave relay. Pretty sure of what I’m seeing. And, there is a second pole identical to the first which could be similarly fitted, and which may have been since the photo was taken.
Why would you want that? Well, you might want to tune in distant TV stations, except they don’t broadcast in microwave. You could use it to grab someone’s cell phone signal, if you knew exactly where their phone was, to aim it. There are yagi antennas that can be used for those things, but they would look different. But what if you owned a bioresonance laboratory with some human guinea pigs? What if you could place them in rooms within a pyramid, where the slope of the pyramid was roughly perpendicular to a high mounted, aimable microwave transmitter, such that every subject got exactly the same dose of signal at the same time, or such that you could specifically target a given subject with a unique signal? It would probably look a lot like Sauerland. You think?
I only mention this, because older pictures, before the pyramids were built on site, don’t show such a ‘gun.’
Is it a conspiracy?
If one concludes that it is impossible that by mere chance alone, every modern and non Mayan/Astec-style pyramid should align with other pyramids, including Egyptian… then it has to be by intelligent design by agreed-to planning by a group of many persons with like agenda. That it is done covertly and involves mystical occult reliance… removes it from the realm of benevolent methodology or intent. That these pyramids can be found in countries of opposing political, religious, and ideological beliefs… precisely fits the Illuminati model and game plan established by its founder, and reflected in Morals and Dogma, the ‘Masonic Bible’ written by Albert Pike. That the only persons financially and powerfully placed are able to arrange for such things tend to also be members of Round Table Groups and are often also Freemasons… would seem to cement all these considerations into a single image: that of a conspiracy. That there is the possibility that it even involves mind control is, to say the least, the ultimate and most heinous form of conspiracy.
“Every man is entitled therefore, to give any explanation of the symbols and a system of the doctrine that he can render palatable… Of all the means I know to lead men, the most effectual is a concealed mystery.”
TI’s have many commonalities in the nature of their experience… but what if it was the TI’s nature prior to targeting which led to them being selected for targeting? This anonymous poll seeks to identify any patterns which might prove revealing.
The common state and nature of TIs prior to targeting?
This post seeks to help identify how TIs are selected for targeting, and why. I write as one who has had personal contact with over 12,000 TIs over roughly 25 years, which has come to some understanding of the answer. But I also write in hopes it can help better my own general understanding, and more importantly, to help individual TIs better understand the true nature of their own targeting. Such information may even prove useful in TI defense, both tactically, and legally. For example, almost all authorities who should be available as helpers to a given TI end up instead presuming them schizophrenic and attempting to persecute them with forced treatment or other forms of harassment — to say nothing of possible in place assets being used in direct targeting.
Such knee-jerk presumptions may prove easier to defeat if we can show the presumed ‘schizophrenia’ is far greater statistically than should be medically possible, it being true that the illness strikes people randomly across the entire spectrum of human existence. If a given class of people with a common personal social circumstance (state and nature) are deemed dramatically more susceptible to the traits of schizophrenia, a logical person should be moved to begin to understand… there are technologies and methods which can cause simulation of those symptoms; mental illness is not the cause, after all.
We must start this dialog by addressing two points: things already known to be common to all TIs prior to targeting, and the tactical reason or purpose behind the targeting, things which collectively tend to relate concretely to categories of TI abuse. As to the precise methods of targeting and types of technology employed, those vary according to the individual TI, their psychological profile, and many, many circumstantial factors which dictate the most likely path to targeting success. That does not impact this dialog, but all these things are tied together into a cruelly efficient tangled web of mental torture and, all too often, physical pain.
We must attempt to separate ourselves from any personal angst and calmly review the matter objectively, if to gain useful insight. First, I’ll talk about two basic traits which are common to all TIs irrespective of their individual situation or targeting purpose:
Known commonalities and reasons
Prior to targeting, all rank and file TI’s, are either already financially insecure or in a situation where dirty tricks can render them so fairly quickly; it is important that the target be unable to launch a useful and costly technological defense or employ professionals who can do so for them. There can be exceptions in ‘blood line’ families or offspring which employ MK/Monarch type programming to create a dynasty of (actors, political leaders, financial giants, etc.).
The wealthy ones are unable to effectively defend because of their programming, which results in various forms of self-sabotage of the effort, which may in fact include financial destruction. Their programming and resulting sabotage effects the same handicap as not being wealthy. It is this author’s belief that Dennis Quaid, the end of the Hunts, DuPonts, and Hurst family/fortunes evidence this fact. I go into some detail on this (and all aspects of targeting, including defense) in my how-to book, MC Realities.
On the other hand, programmables who are were not wealthy, but simply part of the effort to create Jason Bourneish operatives for the intelligence community or in furtherance of MC research, can also end up being targeted if deemed ‘failures’… which are victims who could not be usefully programmed and deployed. They cost too much in time, effort, and money to simply dispose of them, and because research might find a way to ‘fix them’ at a future point, it is necessary to target them to make them seem insane. That way, should the nature of their being ‘broken’ lead to revealing their true history (programming), they will be ignored as being nuts. They can be corralled at any time for further MK efforts, if needed.
Another commonality to the bulk of TIs is some form of social isolation. That may mean they have a small circle of friends and family, or perhaps there is some existing strife underlying key relationships (i.e., significant others, relatives), especially if living with or in close proximity to them. Targeting almost always includes some destruction or sabotage of personal relationships for the same reasons as financial harms. It wouldn’t do for everyone who they know to both believe and to aid the TI against the perps.
No. One by one, all such allies tend to be alienated by one means or another. The inverse is true of the MK/Monarch. There, not one of their friends or family are not part of the perp circle; everyone in their life has been carefully placed there to guide them (misguide) to a desired state. Even their employment and choices of schooling, living space, etc., is predetermined such that they at least think it was their own decision, but their entire life is little more than traversing a spider’s web and being wrapped in its unescapable cocoon.
The purpose of targeting
Now to purpose. It is fairly straightforward. I usually only cite three basic types, but here, I’ll attempt to outline a broader spectrum and to show the subtle differences in targeting aspects and the nature of the TI prior to targeting, things over and above the aforementioned commonalities to all. I should mention that the general purpose of targeting remains constant regardless of type; to render the victim a social, political, and financial zero. The reasons for those needs and resulting emphasis can vary according to the type, however, as is seen:
- Guinea Pigs — selected for experimenting with new targeting technology/methods. An ideal candidate would be rather socially disadvantaged, an isolated loner, and it would be advantageous for them to have already had some documented mental health issues resulting in some form of professional care, with or without prescriptions. This more readily allows them to be presumed insane should something go wrong in the experimentation; they will be disbelieved when describing the matter, regardless of any carelessly revealed evidence;
- Training fodder — selected to insure the growing army of MC practitioners can be effective with minimal supervision. While it should be said that many perps are themselves MK/Monarch programmables, that is certainly not the only profile. Psychopath and sociopathic personalities are a favorite recruit, and it is important to insure such mental defectives do not run amok, and can exercise restraint. Because mistakes or over-zealous application is a significant risk in the training process, the same victim traits as Guinea Pigs are found common.
- Social engineering — efforts against select targets who are either deemed politically incorrect activists, whistleblowers, ‘troublemakers,’ or who are Christians. MC is deeply rooted in satanic principles and can be traced back to the Garden of Eden (in my book). One goal (thankfully seldom realized) against Christians is to get them to destroy their own faith. Rare is it that we find members of any other faith, lest it be Jewish or Muslim, all three being worshipers of the same God of Abraham. Even less common, do we find atheists, unless they be targeted for reasons other than social engineering. As for the troublemakers, the goal is again simply to make them seem insane, and quickly rendered a political zero.
- Social engineering — undertaken against society itself, by selecting failed programmables or mentally troubled persons who can be manipulated into acting out in some useful form, such as committing mass shooting gun violence, or other crimes designed to shake confidence in the very nature of our society’s political underpinnings, such as the 2nd Amendment in the cited example. There, are no other requirements for the victim. It is why, there are so many commonalities in these tragic news stories, such as having been in psychiatric care with psychotropics prescribed, but suddenly halted… almost a guaranteed trigger to violence, when combined with MC control.
- Joy riding — elected against targets selected only because the perp has decided he didn’t like the victim for some reason, or because of convenience (i.e., next door neighbor). This is undertaken by the errant and out of control perp on their own time, using what they have learned and equipment they have built on their own or stolen. More could be said about them, but does not serve this dialog. As to the victims, they can be anyone, though the joy riding perp will be careful not to violate any of the principles of selection herein described unless truly doing it for spite. If the perp is caught by superiors, the value of continuing the victim in targeting is likely analyzed as well as the value of the perp to the program. This will determine the future of both. The perp may suffer any form of punishment, retraining, or redeployment, and the victim may be released from targeting, or put into the hands of other teams, usually resulting in a marked change in targeting tactics.
- National Security — is here mentioned as a type, but except for extremely important whistleblower situations or programmables who fully escape control, it is unheard of among TIs. The traditional target in this category would be a true threat to national security as deemed by the intelligence community or those able to give them orders. We see an example of that in the news, today, where 16 U.S. Embassy members in Cuba have been hit with various DEW and psychological methodology by the Cuban government, likely using very old Soviet tech, or perhaps, their own internally developed systems. WE CAN NOW CITE THIS NEWS AS PROOF THAT MC TARGETING IS REAL; how can media and authorities cite it has happened to our diplomates, but deny it is happening to our citizens ‘because there is no such thing?’
Finding unknown commonalities, and verifying old
Our method here, is simple. A private and anonymous poll. It cannot track your identity, and uses SSL interaction common to things like bank transactions. I must ask that only TIs participate. Politically uninformed sycophants should please refrain from acting like a child; you might learn something by looking at the truth once in a while. We must also bear in mind we are talking about legitimate TI’s, only. Those who are simply mentally ill, the perp pretenders, and the social misfit pretenders seeking sympathy, may or may not, share some of these traits, and are excluded from the dialog, though we must presume many of them may non-the-less participate in the survey and skew the data to some degree.
With that in mind, I offer a series of questions. Consider them and the choices provided carefully before answering, please, and come back later to see results and, in time, an analytical update to this post to attempt making good sense of results. This will follow each poll in the set. I remind you, all answers are based on what things were like in the year prior to targeting first being noticed. There are sixteen different poll issues, so it will take a bit more than a half hour to complete, but should prove very interesting and worth the effort. If pressed for time, come back later.
When TIs find their defensive or offensive tactics failing, it is likely because one or more key aspects believed true of their targeting is a falsehood deliberately created for them: the enemy knows you cannot win a war defending against tactics not in play, if it blinds you to those which are.
What you will learn reading this post:
- part of targeting includes misleading the TI into false beliefs about their targeting;
- what constitutes authoritative proofs capable of revealing the truth vs. beliefs;
- examples of common falsehoods held as true, including scams.
In some 25 years, now, I’ve had contact with more than 12,000 targeted individuals according to my email list. Out of that number, I can count on one hand the number of them who had a correct understanding as to who their enemy was and what tactics were being used against them, and how to combat them successfully. So convinced are most TIs about such misbeliefs, that they often refuse to take advice that would work to better their stance, and instead continue to try things already proven ineffective. Worse, they might simply give up trying, at all.
Targeting is a psychological war, and one largely invented by and often waged by the intelligence community, who live and breath in a World where nothing is what it seems. If there is one thing they know how to do well, it is how to convince their victims that something untrue is true, and something true, is false. Their chief weapon is disinformation, and its ally among the foolish, misinformation. Disinformation offered and accepted as true, is spread rumor like as misinformation by those accepting it. This was, by the way, the heart and method portrayed in the popular TV series, Mission Impossible; a spy agency who typically got what they wanted by getting the enemy to believe in an unreal set of ‘facts.’
Their other primary weapon against TIs is the psychological profile, which tells the enemy exactly how their target will respond to a given circumstance, enabling them to create situations designed to cause a certain conclusive response which builds the false narrative. When things like street theater, surveillance technology, and other targeting methods are combined with the goal to mislead in kind, the victim has almost no chance to come away with anything resembling reality. The other victory this hands the perps, is that it makes it much easier to insure that the victim will be seen as mentally imbalanced by anyone observing or brought into the affair when seeking help. Knowing the enemy’s psyche was also part of Mission Impossible, the show always starting with a summarized dossier on the mission’s target and their weaknesses.
Among the most common falsehoods most TIs presume to be true, but which cannot be true, we find a laundry list of topics sold on the basis of technobable, false credentials of ‘authoritative sources,’ circular references, and a deluge of mantra-like disinfo/misinfo. Some effort will be made, here, to summarize, but first, we need understand what a true authoritative source is, and is not. Should any doubt my summarizations are valid, they must first find an authoritative source to prove me wrong, or they simply continue in the lie with no basis.
Authoritative information sources
One cannot well prove a case for targeting technology beliefs based on material provided by a targeted individual or mind control Web site, and certainly, not based on a YouTube or someone’s blog or post. At best, such is hearsay, opinion, or personal belief or suspicion. At worst, it is a complete fabrication, or based upon one. Don’t forget that some TIs are pretenders, some even perps, such that no personal claims can ever be deemed as proofs in and of themselves. The sad truth is, I’ve yet to see more than a handful of ‘proofs’ offered by TIs as to their particulars which would serve them in a court of law. Mind control sites seldom provide actual reference proofs, commonly citing other mind control sites or proofs shown herein as illegitimate. Circular references abound.
No. A credible proof must come from some outside resource which has no reason to be biased and itself be unaffected by targeting or disinformation/misinformation, and which can be backed up with citations as to the source of their information. I’m talking about things like patents, scientific papers, government records, news accounts, and good books by solid researchers of accredited note with usefully referenced footnotes, that their statements can be verified as factual. ONLY those things can be seen as authoritative and, therefore, holding a viable resemblance of truth and reality.
A warning about patents, however: patents can be filed based on imaginary or unworkable technology without proof of concept testing, and get by the patent office. I have some background in patent writing and patent requirements, and have seen such patents on file. Unless a patent relating to Political Control Technology applications is tendered by a major corporation, it would be wise to consider it carefully before making assumptions. The unworkable patents I’ve seen were by individual citizens, only.
Even so, one must be careful. Anyone can write a book or put up a Web site, make a video. In fact, a good deal of disinfo/misinfo comes from books. The best example would be books claiming to expose secrets of mind control by ex intelligence officers. No! No! No! No intelligence officer could safely write such a book without violating a Secrecy Oath or law such as the Official Secrets Act (U.K.) in a way that would get them and their books vanished. So I would never quote or trust a Barry Trower or Robert Duncan.
I do trust and have quoted from works of ex CIA agents, but only because their work was approved by Central Intelligence Agency as NOT violating any oath… because nothing they had written of had not already been reported in media or in the Congressional Record, or other public domain literature. The books were not exposing anything new, but merely confirming it in useful manner. In other words, they were not the true originating source, the opposite of a Trower or Duncan. I also know of one CIA agent who wrote and published an unapproved book, and he was hunted down to the point of exiling himself in Cuba. So how is it that Trower and Duncan are exempt?
So when you read a book, including mine, be skeptical and judgemental: demand good citations as to source. My books are heavily footnoted to aid in that judgement call, and typically include an appendix full of additional proofs. In fact, the third book in my proparanoid series, The Defensive Field Guide, is in part a collection of such proofs and citations in a form useful in dialogs with non believers. In such a use, everything within it is verifiable by the doubter.
And, when you base conclusions on a technical source, such as a patent or scientific paper, you must make sure you understand what you are reading, or do additional research until you do. Certainly do not rely on the conclusions of other persons with no credentials in the field, for they likely do not know any more about it, than you. This is a great source of misinformation, because technical papers to the non technical lay person can be read into any number of wrong conclusions. It’s like asking an atheist to interpret scripture, in a way; the translation will be quite flawed.
And here is a simple test: Google a given topic, such as Remote Neural Monitoring. If the returns features ONLY mind control related sites and the like, you are likely looking at disinfo/misinfo. For one thing, Google has a built in bias against ‘fake news’ which they define as anything contravening the ‘official line.’ The official line is that there is no such thing as mind control, so when all you get is mind control, its fake news they want you to have. No. If it was a real thing, you would have up front the ‘scholarly articles,’ news stories, and the mainstream view on topic… and THEN you might see some mind control sites and the like, as if some kind of discredited ranting from the fringe.
Another simple test: when you see a claim for a technology, IS THERE A LINK to THEIR SOURCE so you can verify the claim? Again using RNM, there are consistent claims it is an NSA technology, but NO ONE is providing links as to how they know this to be the case. With enough research, you find the claim originated from some guy no one ever heard of who claims to be a technologist, and HE (William Starrett) gives no link as to how he happens to know. He does provide a video of Snowden talking about SOMETHING UNRELATED and tries to fit it to his narrative; disinformation. There is another source, Russel Tice, who is another claiming to be an ex intelligencia (NSA) whistleblower akin to Edward Snowden. He, too, cites unrelated technology and relies on Robert Duncan, rather than first-hand knowledge. No thank you; disinformation.
And one final test: does someone offer some magical new age technobable gadget, glass bauble or jewelry, salve, oil, or audio they claim will cure/combat the alleged technology? This crap commonly pops up just as fast as the alleged tech, a remarkable feat given that we are typically five to ten years behind the technological curve, which means we don’t understand the technology even exists, much less how it works, and far less about how to defeat it. Do you really believe a $300 pendant with a picture of you as a child engraved on it will stop imaginary scalar waves?
What distresses me about disinfo/misinfo is how easily it becomes everyday ‘fact’ amid the various TI groups and Web resources. Take, for instance, this image which is being used by several organizations and web sites, including PACTS (People Against Covert Torture and Surveillance) offered as proofs of microwave attacks, and microwave murder. Make no mistake, microwave can kill, and cause horrific burns if misused. But the image is not of a microwave victim, at all. It is a bomb blast victim from the Middle East. If you can’t trust the validity of one image or claim at a Web site, can you trust the validity of any found there?
Did you know you can search for images by dropping an image into the Google search bar? Try it sometime. Its a good way to reveal fake news and disinfo/misinfo.
Falsehoods thought true
The following is a summary of commonly accepted false beliefs. Not one of them has any factual basis not originating from the enemy. The right hand dangles a Scorpion about your face after the left hand conceals the poisoned spike used to make you think you’ve been bitten; anti-venom won’t cure the actual poison used.
SEEING THROUGH YOUR EYES
No. Shared Vision is easy to simulate through excellent surveillance, computer hacks, and so forth. The belief is based on scientific papers and news reports, but they reveal the ability requires hundreds of implanted probes in direct contact with the brain by drilling holes or removing the skull cap, all directly connected to a room full of supercomputer. The alternative method also written of in hypothetical papers is to replace or surgically modify the eye to be bionic, complete with video transmitter. This would be a two-three week hospital surgical procedure and recovery. I think a TI would notice any of the above clues, but not one, has; no one is seeing through our eyes. These scientific articles have become the basis for false conclusions by people who fail to understand what they were reading. This is in my books, btw.
READING YOUR MIND
No. Same answer as above, almost identically. However, there is another way to simulate it which approximates the result. There is a documented V2S bio implant called RAATS which can intercept and decode your brain’s EEG signals which represent the 26 phonemes making up the little voice in your head which is you talking to yourself about (whatever), including what you are about to do. It is not mind reading, but it can capture the verbalized thoughts for like result. You can learn to suppress the voice, and foil it. However, it is also a two way system capable of V2S, and remains a threat. This is in my books, as well, as is how to thwart it. See also RNM, next.
REMOTE NEURAL MONITORING
No. This is a good example of misinfo, and disinfo (per previous dialog — there are zero authoritative sources). In addition, some TI’s have tried to misapply technical proofs without understanding what they were reading. Some cite brain to brain technology which requires a supercomputer and for both parties to wear a special helmet in a system which neither reads the mind nor is capable of controlling thoughts; it merely causes muscular reaction. Others cite a similar article talking about controlling a mouse’s motor functions wirelessly, based on light, but it requires brain surgery and again has nothing to do with mind reading, and only controls muscular response.
RNM has been further mismarried and confused with Neural Linguistic Programming. NLP is not mind control, as such, but the mere clever use of words/phrases to confuse someone. It is not technology, but a method employed by magicians to misdirect, and by quick change artists to get more change back than due them. However, it is a skill often taught to CIA agents or acquired by others as a tool towards getting people to cooperate. Elements of it are often used in interrogative procedures. It has no actual relationship to RNM other than a similarity in name… and any such relationship which has been assumed is, in fact, an example of written NLP at work to confuse.
BEING IMPLANTED, FINDING IMPLANTS
No (and yes). Make not mistake, implants are real and often employed. I’ve had one, and it eventually came out on its own, rather a rare outcome. There are tracking implants, pain causing implants, and V2S implants (there are three technological ways to cause V2S, one of which relies on implants). I don’t mean to say implants don’t exist in TIs, but I do maintain many TIs falsely conclude they are implanted as a means to explain why their defenses against other (wrong) technology does not work. We must hope this is the case, because implants are very difficult to detect or combat (remove, kill, shield).
The problem is amplified by wrong beliefs about detection. Countless TIs become victims of scam artists claiming to find implants with cheap RF/EMF detectors which allow the moving of a finger to cause the instrument to ‘indicate’ the presence of an implant, when it is actually only sensing the movement of the finger. “That will be $50, please… do you want me to keep searching for another?”
Detection is not impossible, but RF/EMF is not emitted by most implants, and therefore, they cannot be found by cheap gadgets. Getting a professional with proper gear to scan and to tell you about it is typically next to impossible. X-ray and MRI scanner techs and doctors will seldom share the information, it being thought that they are taught in medical school that implants are a government tool to track terrorists, or similar. A good TSCM (Technical Security CounterMeasures) expert tends to balk at requests to scan, they are almost always ex intelligence agents and prone to not crossing their former employers. They also don’t like to do it because if they find none, they will be disbelieved and accused of lying, and payment will be refused, resulting in litigation. And, btw, they charge an arm and a leg, when the bill is presented.
THEY ARE TRYING TO KILL ME
No. Time was, when someone knew something they should not, became too annoying a squeaky wheel to the ‘system,’ or in some way threatened the plans of the powerful, they would simply kill them. But with the perfection of early mind control experiments post WWII, it was quickly discovered that the best way to keep those secrets (and any others) from being revealed, was to make the pesky risks seem insane. Mind control methods have replaced the ‘wet job’ as the way to deal with potential ‘trouble makers.’ There is now no need to kill someone, and in fact, a mind control victim has great potential as a resource for some future project use as a patsy, as guinea pig in new tech or methodology, or training exercises. It costs a lot of money to MC someone, and so, why destroy the person and the investment? This is one reason why membership in the TI community seems to be ‘for life.’
More than that, MC is all about psychology, and the greatest tool in the arsenal of psychological manipulations is fear. It is easy to make someone think their life is in danger, the ultimate driver of fear. Listen. If they wanted you dead, you would already be long dead. It is just that simple.
There is no profit in a ‘slow kill,’ because it would leave forensic clues that would endanger ongoing operations. Out of my 12,000 TI contactees, easily a third or more thought they were marked for death. Out of those thousands, only one actually died from targeting, and that was seen clearly as accidental and unintended consequence by the perps. Another died of organ failure deemed due to old age (nearly 80), but which was likely augmented by constant DEW. Perhaps a dozen others have died in ways which are reported as accidents (i.e., auto), but which the TI community embraces as murder. Another dozen suicides are blamed on targeting.
Suicide is the ultimate expression of giving up, the ultimate price of failing to defend against the real facts of targeting, and the final proof that the victim has decided to voluntarily give up God’s gift of Free Will and submit to the will of their generally satanic tormentors. When Cancer patients and quadriplegics can fight on and endure with dignity, why would anyone give perps that victory? Because they grew tired of defending against the wrong things with the wrong defenses.
No. This is a perfect example of technobabble at work. There are zero authoritative articles, certainly none which scientifically address scalar waves, which are alleged to disobey the laws of physics and attributed by some people as being employed in mind control. The primary proponents and parties attempting via Youtube and Web presentations to ‘prove’ scalar waves (leaving more questions than answers) and tie them into mind control are often the same people selling $300 pendants to ward them off. It is a sham.
No, underscored. Some claim satellite DEW torture. Some claim RNM by satellite, already debunked, above. I’ll devote some time to DEW debunking, but I will admit to the possibility that satellites can potentially be used for area wide mood control or subliminal messaging, ONLY. You can in theory broadcast EEG signals and embed subliminal messages within communications signals. This is known technology such as used in Command Solo aircraft being flown every day over the U.S. and elsewhere.
This use of satellites is mere speculation, however, but I’d not be surprised. Command Solo flies training missions every day over US cities, and not even the operators know what is in the ‘training’ tapes being broadcast. The military has admitted the technology was used to sway Bosnian elections, and to cause Iraqi soldiers to surrender in droves, sometimes to small camera mounted drones. Given the number of butthurt Democrats who have waxed violent over the elections, it appears SOMETHING has driven a good number of people beyond the edge of acceptable and normal behavior.
Why DEW attacks are not possible by satellite: Any beamed energy, other than lasers, falls off at the square of the distance. A cell tower transmitter is good to about 2~5 miles with a relatively small emitter. At the height of satellites, the amount of power required to broadcast a microwave beam to earth and have it strong enough to penetrate buildings to hit an individual would likely require a power source far too large to fit in a satellite. Powerful land communications microwaves, broadcast at seriously high energy levels with a huge emitter, have a typical maximum range of about 40 miles. Satellites are typically some 22,000 miles high, or higher.
The harder challenge is associated with transmitter size to handle that power. Microwave communications towers require transmitters typically in the range of 8 to 18 feet in size to punch towards 40 miles. To do fire a signal 22,000 miles would take units far too large to launch. But the bigger hurdle is accuracy, given that in order to maintain the illusion of insanity, you would not want anyone nearby to be hit with a beam (collateral damage). The best military grade GPS is accurate only to about 12 feet, which means a plus or minus error of about 10 feet for the center of beam, and the beam width would be much wider than was the transmitter. Bystanders many yards away, or further, would notice the same targeting effects.
But suppose it could be done? The next problem is cost and client (TI) servicing. A typical military or intelligence satellite can only target ONE client at a time. Given the size required for DEW targeting, certainly only one. Yet how many TIs think they are targeted by satellite? There would need be thousands of such birds, but there are not even one thousand satellites in total from all nations on Earth for all purposes, inclusive. Each satellite costs roughly a half billion dollars to launch, and about $15M a year to maintain, hardly cost effective when a perp with a modified microwave oven-style weapon can do the same job from a nearby building for a few thousand dollars a month.
What about availability? There are zero satellites in geostationary orbit over the United States which are not communications or weather satellites; the military and intelligence community only use orbiting satellites. That is another inefficiency for targeting individuals, because it would only be overhead for targeting for a few moments several times a day. How many TIs can claim targeting on a regular schedule that fits that?
Satellite targeting makes no sense either technically, or financially. It is a fantasy of convenience to the greater targeting movement fostered by Robert Duncan and Barry Trower. If people believe in satellite targeting, they will stop trying to learn the truth, and stop trying to defend themselves, as there is ‘no way to fight satellites.’
True: because they are not at war with you.