Author Archives: Author H. Michael Sweeney

WARNING: Three New Privacy/Security Threats Loom


Grain of Salt

Don’t take my warnings with a grain of salt… the threats are actually smaller than that. Thanks to several decades of evolution in nanotech and related research in processes of manufacture, three new nanotech products are poised to create whole new threats to privacy and security, and will prove especially useful in targeting individuals with the ultimate form of mind control, artificial hearing.

Damn… which one is the computer I dropped? Or did it fall inside?

IBM has announced the World’s smallest computer… smaller than a grain of salt, but as powerful as an x86 microprocessor circa 1990. Complete with memory and optoelectronic serial communications (LED-output, laser-input), it is comparable to the early desktop computers of that era, and it is powered by ambient light. And, it only costs ten cents to make. This is one-upmanship from Smart Dust, a DARPA (Defense Advanced Research Project Agency)-developed dust mote that can sense (any specified thing from among many, such as audio, motion, light, temperature, etc.), working in a hive-mind fashion with other motes, and also communicating by laser beam. It only takes one of these salty computers, instead of hundreds or thousands of motes… though you would need add whatever sensors were needed, using the same nanotech-scale methods.

In and of itself, this has only one use which I find particularly troubling: it can make ANYTHING a Smart device for the Internet of things… which now means that for less than the cost of a postage stamp, a postage stamp can track your mail… or anything in your home can be made to keep tabs on whatever is going on in the home. That presumes, of course, someone has an interest in doing so… and we know government, big business, politicians, criminals and hackers never have an interest in spying on you, don’t we?

Next comes a nano radio receiver smaller than a grain of salt. It also requires no battery, but it does require some form of antenna, and if has no speaker, and thus needs a mini-din earphone jack. Well, never fear, there is now also a nano speaker smaller than a grain of salt, which even works under water, which means it has a lot of power. It’s principle intended use is in sonar applications, which means that it can also act like a microphone, though unstated (I suppose we don’t want the Chinese to know everything about our next-gen weapon systems, after all). Who needs such a small transmitter? Mostly people doing electronic eavesdropping, but we know no one from the previous list of players cares about that, don’t we?

Next will come a radio transmitter, the size of a grain of salt, and video cameras cannot be far behind, though perhaps a bit larger. But even without those advances, the spy tech and surveillance boys will have a field day with toys like these. The mind control… pardon… political control technology boys will have even more fun. But we don’t know any of those people, either… cuz those kinds of people tend not to introduce themselves any more than do the others I’ve listed.

Imagine the hilarity of sprinkling speakers around the house and taunting the target with a voice or sounds (like footsteps) that beg investigation for which the source can ever be found. Is it ghosts? Is it that you are going insane? Others will surely think so if you complain of it. Or what if they put it in your ear or on the rests of your eyeglasses, and only you can hear the voice telling you it is God speaking to you, and to push the control yoke of the aircraft all the way forward. The Russian intelligence agencies didn’t nickname Voice to Skull technology (artificial hearing) ‘The Voice of God which cannot be disobeyed,’ for nothing. In those days, of course, it took a highly invasive bioimplant or bulky microwave systems to do the trick.

Now, all they need, it seems, is a salt shaker.

Now, if we add the computer to an array of such toys in the home, those troublesome footsteps and voices you can’t chase down becomes something easily controlled, perhaps using AI logic. For a few hundred dollars worth of such Salt, there could be no place you could go where the grains wouldn’t await your arrival, even in public areas, because the salty radio in your clothing will via the Internet of things be telling all it’s salty companions exactly where you are at any moment in time. 

Happy Norton’s, everyone. “When it rains, it pours.”

UNEXPECTED PATH TO END T.I. STALKING


There are no truly simple and foolproof paths to end any kind of stalking, but one proven Free Will Society method has led to discovery of an unexpected path which might prove very simple and effective for many T.I. victims of organized or individual stalking.

by H. Michael Sweeneyproparanoid.wordpress.comFacebookproparanoid.net

Dateline, Jan 18, 2021, from beneath the secretary’s desk at the fictional Law Offices of Saul Goodman. copyright © 2021, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting. Fair Use Law in play.

Introduction

One unexpected benefit of stalking victims relocating here on the Coast of Washington State with me has created awareness of a new path to escape stalking. It is not really new, but that is, a new way to use an old method previously though useless, based on prior attempts to employ it. It seems we just didn’t know how, but quite by accident, thanks to the Free Will Society’s efforts (FWS) to help severely impacted stalking victims, now we do. That said, I’m not claiming we have exclusive knowledge of it… others may have discovered it before us, and simply failed to share.

If the image is scary, consider the Web site it came from (thought catalog.com), where we find personal testimony of the 26 scariest things stalkers have done.

This discovery amplifies the original reason for T.I.s electing to meet up here with me (and other Members) on several levels. The idea was that there would be safety in numbers able to watch each other’s back, with the eventual hope of caravanning together as a preformed community to a rural property site (farm/ranch) to establish our own intentional community, the Free Will Haven project (FWH). Today, as this is being written, there are four Members of the Society here (one just arriving), along with a larger  number of victims already living here… and a like numbers seriously considering to do so. 

One thing is already true of this: all Tis here have a sense of great improvement in their targeting situation, and if honestly considering, must admit that remaining targeting symptoms may simply be coincidences or knee-jerk assumptions based on expectations ‘learned’ from years of targeting. So, to be clear, coming here has proven beneficial without the new path discussed herein. But it is important to relate it to our efforts, here, because it explains how we learned of it, as well as how to make it work.

To preface further with useful event context, having worked with thousands of victims over several decades, one axiom which has remained constantly true is this: it is not normally a good idea for targeted individuals to share the same domicile, or become romantically involved. That axiom presumes that two or some other small number are doing so as individuals, and not part of a larger community of ONLY victims living in the vacuum of a targeting-free environment, like FWH. In an all TI environment, safe from direct easy access by perps, and given time to get to know other victims and establish relationships normally in the luxury of a non-targeted day-to-day life, it may be possible to find helpmates and romance free of the problems which always arise while targeted actively. Specifically, it almost always ends up where one or even all such persons living together end up accusing one another of being perps in one form or another, and result in bitter breakups with considerable additional damage to everyone’s already frazzled and delicate psyche. In fact, I’ve never seen the axiom fail, though I’m hoping it has, somewhere, for someone.

A perfect example took place when, against my general advice, one of the Members offered cohabitation to aid another homeless Member in seeking to reestablish himself, here. They would share a hotel room, one using a sleeping bag on the floor. It only took about three weeks for an emotional bond to form sufficient to lead to romance, again against my advice, and only a few weeks more to lead to the expected accusations and an unhappy separation. There is only one important detail about all that, and it is the matter which opened the unexpected door to a logical path for other victims.

The male Member, admittedly a PTSD victim as well, threatened violence  in ways rendering him a danger to himself and others… to include myself and the Society. 

There was no choice but to seek a restraining order, and that has proven to be a doorway of great opportunity, particularly here, in Washington State. Before continuing, I must admonish against mentioning organized or gang stalking, mind control, and any DEW or other electronic weaponry when seeking a restraining order. Not unless you have direct proofs to offer… and by proofs, I mean courtroom Perry Mason-quality. What you believe or think true, or have researched online or even found in my books, MEANS NOTHING before a Judge.

For this reason, also, know that your standing before a Judge, especially if the Respondent chooses to use it against you in his defense, can be harmed if you had previously filed Police Reports which involved those same topics. While there can be exceptions, it can be used against you and result in an unfavorable ruling by the Judge… who will likely view you as mentally imbalanced in some way. I have always advised great care in calling Police or writing letters to FBI, Politicians, Media, etc. Any such prior activities will create doubt in your claims, and require significantly stronger proofs if to overcome such doubts.  Ergo, best to keep it simple, and focus on threats of violence or actual violence in need of restraints.

Even so, attempting to secure an Order has potential value even if rejected (for any reason). You can try again another day when your quality of proof improves, and multiple attempts can, in the right circumstances, serve as proofs of another sort in non court venues. But you can’t keep doing that… after a third try, or so, you’ve likely worn out the welcome mat. But one or two can be seen as an excellent historical trail which succinctly documents the nature, depth, and timeline of targeting, esp. when presented with your own argumentative responses to any given rejection by the Court.

Types of Orders and how they work

There are many kinds of restraining orders, and while a lawyer is always a wise partner in any legal action, they are relatively simple to request on one’s own. Most States have a Free Legal Service available for this and other purposes, if you are on fixed income, homeless, etc. We are only concerned with Civil Orders, as opposed to Criminal Orders, which relate to criminal investigative needs. Commonly, there is no Court Cost or Fee to seek any form of Civil Restraining Order, the type useful to a T.I. It is primarily a matter of visiting the County’s Courthouse and requesting the forms, often also available online, and filling them out. Because multiple types of orders can rely upon the same forms, it can mean rather a lot of detailed paperwork (in our case, about a dozen sheets of questions with checkboxes and fill-in-blanks). 

Typically, the County Clerks can answer questions should any given item not be understood. We had about six such questions, answered on the spot as we filled them out at the Courthouse. If you will have witness testimony, you will likely need ask for forms for that. Even with Clerk aid, our first attempt was still somehow flawed, but by the time we finished the second attempt, we understood the process rather well. There will be no specific stepwise advice on any of that, here; it will likely vary State by State, as determined by various laws in place which so dictate, and the forms themselves.

There may be variations on the type of Civil Restraining Order from which to choose. The County Clerk’s Office can advise which type is best… or more correctly, which forms best meet your need, based on playing 20 questions. But the one best version is one based on Domestic violence, for reasons covered separately, herein, some of which relate specifically to unusual benefits in Washington State, which may or may not be available in your State.

Domestic violence is generally defined as actual violence or threats of same from anyone you have cohabited with (romantically, or no), be it current or at some time in the past. Many targeted victims complain of family members, roommates, and cohabitation lovers (not one-night stands… but any situation where they had their own key copy) deemed to be a perp. Actually, as we will later discuss, it need not even be that they were a perp, to make an Order of value… that Washington State difference. Restated: there is a potential benefit in a Domestic Violence order against any individual, which can also benefit a victim of stalking by other unnamed and unreferenced persons in the order. It’s like being handed an umbrella; it can cover more than one person in the right circumstances.

Less specific orders (non Domestic Violence) addressing specified aspects of stalking and/or harassment still have value, but only if against named respondents.

Before getting into details, lets take a look at the process, which would not seem to vary much State by State. After you file the request (Petition), a Judge will review the Petition and either reject it for insufficient cause, or find it sufficient to issue a Temporary Restraining Order (likely in the range of ten to fourteen days) pending a Hearing where the Respondent and Petitioner can argue before the Judge as to why it should be rendered Permanent, or Lifted (canceled). This provides due process rights to the Respondent, who must ‘respond’ if feeling the order is unjust. It might take place by phone or only video conferencing, since the advent of COVID. In any event, the petitioner (you) need not confront the respondent in court, if feeling threatened, thereby. Note that should a restraining order be lifted, you should likely be notified and given an opportunity to protest and alter the decision… a matter to be inquired upon when the final order is issued.

The Temporary Order will be served and you will also receive a copy. If violated by Respondent, you call Police and they will take action which might be anything from a warning to an arrest, and the Court will be notified of the violation, which will strengthen the likelihood of a Permanent Order. Once the Judge rules, that notice will also be delivered to both parties, and the protection either continues, or is ended. Simple 1, 2, 3.

What you need before you can file

You need to know the name and address of the Respondent, and ideally, their birth date or estimated year of birth. You need physical description characteristics (estimations OK). For both yourself and the Respondent, you need to have current addresses. This can be a problem if either of you are homeless… specify a Shelter or friend’s address, or a hangout location and so indicate. In like manner, you must know what Law Enforcement Agency responds if either of you were to dial 9-1-1 (determines who will serve legal papers and be most likely to enforce the Order if violated). It can be useful to know if the Respondent has weapons, a criminal past, an income/job, vehicles, or specific items used in targeting you (again, nothing relating to political control technology). In some cases, your Order can request seizure of items potentially used against you, such as guns or a vicious attack Dog. For anything more than guns, it is especially a question for a lawyer, perhaps, and for making a case that the request addresses a valid, significant threat. 

Of utmost importance, you need to be able to describe the perceived threat with examples, but also, if to succeed, supporting proofs. This should include descriptions of emotional states of fear or other harms already experienced, or feared; sell the drama. A Police Report is the ultimate proof, perhaps even if the Police could not verify claims… multiple reports can establish a pattern — so it is possible that any ill-advised calls to Police might still prove useful. If they exist, consider to use them, because if they do and you don’t mention them, that may cause the judge to throw the matter out. 

Ask your Clerk about how to properly handle and submit such third-party proofs, testimonies, and other attachable evidences. Proofs can be in the form of emails or sms messages, video/audio recordings, or eye witness statements which illustrate the most serious threats or harms experienced. Some such proofs like video/audio can simply be cited, with an offer to provide them at a hearing, or perhaps by mounting them online somewhere with a private URL link you can put into the documentation. You would not want to overload the request with too many examples, but you can cite that other examples are available. The important thing is to illustrate each differing kind of threat, abuse, or harm endured for a broader picture. 

Special Benefits of Domestic Violence-based Orders

Victims of Domestic Violence become eligible for special benefits in many States. In Washington State, it can mean emergency housing in a center with greater security than a homeless shelter. It can also mean monthly financial assistance in several categories. Washington even has the functional equivalent of a ‘Witness Protection Program’ which provides the victim with all new identity, and establishes them with either an income and living space or employment in a differing city, as well as a blind mail drop which allows contact by approved persons/businesses without them knowing your true location/current name. 

The Society has a contact in the Washington State program who is very pro Society efforts at a personal level. This provides yet one more set of reasons for Members to consider joining us, here. Should perps follow, the Restraining Order provides additional defensive measures to those already in place here due the safety in numbers and my presence, with my skills set and special TSCM (Technical Security CounterMeasures) equipment. It can, for those able to illustrate Domestic Violence (even if from another community, perhaps even out of State), mean superior protection and other aid well beyond that of the Society. Again, that is true even if it was unrelated to current stalking issues.

But it is also true, that even if not a Member, and not joining us, here, anyone can use this tool anywhere in the country, for possible relief at one level, or another. Please advise of any such efforts and outcome. 

freewillsociety.wordpress.com

Is MeWe a Profiling/Psyops Project?



MeWe was supposed to put an end to social media dictators who punish free speech, presume to be sole judge of what is need of censorship, practice political mind control, and market your life for fun and profit. But is that what it is really about?

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Oct 30, 2020, from an cluttered garage collapsing into a growing Marxist sink hole. copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting. Fair Use Law in play.

Whut?

Basic observations of MeWe for most users have been previously accepted as normal and ideal… but should be reviewed to provide context, and in fairness. At a point when other Social Media (SM) was shown at best to be a propaganda and censorship tool of the Far Left, and it became clear that millions of conservatives were looking for alternatives, MEWE came to the rescue with impeccable timing. Unlike any other SM, it features a direct MeWe management/operations dialog channel to users, a very responsive contact help feature where problems and questions can be addressed rather quickly. I have found this feature extremely valuable many times, with all due praise.

Of most importance, unlike prior SM, it did not censor, but provided user tools to limit unwanted content, putting you in control, instead of some ‘community standard from Hell’; it did not collect and market your preferences and interests to advertising sources; and it seemed devoid of automated bots and Artificial Intelligence (A.I.) trolls. Seemed. Yes, they did have ‘community standards,’ but YOU had to be the one to complain, instead of a staff of snoops reviewing A.I. sniffers for keywords, phrases, names, or verboten URL inclusions. FYI, Facebook deems my propranoid.net URL verboten, despite the fact that everything there is backed up with authoritative sources, or is stated as either a suspected/possible, a claim by someone else, or a personally believed but unproven matter as of yet.

It is important that the reader understand that I am a retired privacy/security consultant and author of 8 books on that and related topics, such as abuse of power and Political Control Technology (PCT). I have specialized in helping stalking victims, some 12,000 over several decades time. One common denominator of such victim experiences is cyber stalking by trolls and others in ways intended to make their life as difficult as possible, generally reducing them to a social, financial, and political zero. This would often include professional hacking and other forms of cyber warfare/invasions of online privacy, to include the use of automated SM bots and A.I. trolls. While I have credentials some might find useful in discussing Web security and technology matters, I do not claim to be that person, today, since retirement; the field advances quickly, leaving inactive professionals behind.

Therefore, for the purpose, I define a troll as a ‘user’ (often a pack of many fake user IDs operated by a single entity) who goes out of their way to be obnoxious, start arguments with inflammatory statements, becomes childishly emotional instead of engaging in reasoned dialog, resorts to name calling and a combination of other of the 25 Rules of Disinformation. I wrote those rules, and they have been used in various college courses on psychology, journalism, and political science. Yes, anyone can use one without evil in mind, but any calculated use the Rules repeatedly, is intending to obscure or confound truth. It is primarily used by to negate the person/group attempting to present a truth deemed unacceptable to a given agenda supported by the user of the rules.

When multiple rules are in play, from multiple SM user IDs, it almost always indicates a professional disinfo or ‘wag the dog’ artist at work, and can even mean a psyops effort is under way. That can also mean the use of a bot or A.I. In the broader view of todays Marxist MainStream Media (MSM), it works the same way with talking heads pushing false narratives… they become the trolls.

When psyops is additionally in play, as when someone is targeted by government for speaking an unwanted truth too loudly, it also usually means that surveillance and psychological profiles have been employed against the target. By such means, they know what will mentally manipulate them into a desired emotional knee-jerk response. Without knowing about these rules, a target will very likely so respond, and can then be ridiculed/shamed for it, resulting in retreat from the debate, and success for the disinfo effort. The most common online purpose of this level of disinfo, is in cover up operations, such as seen in the Flight 800 shoot-down coverup, where FBI, the DOD, FAA, and ONI (Office of Naval Intelligence) all participated in a well organized disinfo effort against online truth seekers, to the point of sending FBI agents to intimidate us in person. Many didn’t cave, and we instead reached for a lawyer.

Those efforts included use of online Web bots as targeting tools, as well, which both helped to build the psychological profile, and to apply it effectively. Today, A.I. becomes the ultimate bot.

Bots can do almost anything definable as a repetive task, especially if residing an a SM server and privy to all therein.

Bots of any sort, A.I., or no, must necessarily be active within the coded framework of the SM server’s software, if to be effective against multiple targets in near real-time usefulness. This is either by covert insertion (hacking methods or site security compromise), or by the intent of the SM provider, directly (as would likely be found true of Facebook, for instance, which has partnered with Agency (Central Intelligence Agency) in various ways.

The power of today’s A.I. is that it can truly seem to be a living person, instead of some computational algorithms in play. It can be set up to scan the entire SM user base to search all posts for select criteria which define targets in need of targeting, and then execute that function. An A.I. bot can simultaneously begin construction of an automated psychological profile for best effect, all without human interaction. Because it can report back to its owner, it might result in additional profiling steps in the real World, perhaps to include a full surveillance net 24/7. While likely true only for the most important of target truth-sayers, heaven help us all when they connect them to drones and other real-World systems, a’la Skynet: the purpose of the Internet of Things (5G) and Smartmeters from your power company.

If Agency psyops teams are sent, it will usually take up to six months to insure they have a very complete profile, down to sexual practices and preferences, financial standing, and all aspects of one’s personality and belief systems. To be sure, it isn’t so common a matter that the reader should start looking over their shoulder, because if can cost as much as $250K a month to undertake… but looking over your shoulder once in awhile, anyway, is always good advice. When used, it can mean intentional events being staged in the target’s life to observe their response, anything from something as simple as cutting you off on the highway and observing your driving skills, to something as complex as a traumatic event staged against a family member, such as a bullying event or assault. In recent times, the use of A.I. systems has likely reduced that ‘manual profile’ time frame significantly. When drones, et. al, are incorporated, the costs will be next to nothing, and no one will be safe from it.

Whut the Hell, MeWe?

Again, I say MeWe seemed free of such worries, in the beginning. Not my current finding.

First clue: A private MeWe Group I established for stalking victims was itself assaulted with sexual content from a non member. Stalking victims are generally of the same mindset, emotionally, as rape victims, if not actually a victim of rape by their stalker(s). I had to ask MeWe how a Group requiring a Membership acceptance process could be targeted by a non member through the Group Chat feature. Blocking the ‘user’ involved (a stranger unknown to me) did not work. This was the first time that MeWe absolutely refused to respond to a help/bug issue. Multiple inquiries went unanswered, and forced closure of the Group.

Second clue: like all social media which must remain accessible to the public at large, it was clear some liberals were among the general MeWe population, as it should be. I welcome them, if they are willing to engage in reasoned dialog and not behave like trolls and childish snowflakes. As long as MeWe isn’t ‘part of their argument,’ its all good. If they might not so behave, the Block tool affords an easy fix, making for an even playing field… because they could block me, too, if so moved. Then came something entirely different: a team of such trolls which could not be blocked. See them here in the image:

This was the second time a block failed, and it took place almost immediately upon the heels of the first. The ‘blocked’ user still showed in my contact list, and the unwanted Troll harassment continued. A repeat Block attempt did remove the user from my contact list, but did not end the assault (details next). Once more, multiple efforts at engaging MeWe went completely unanswered, beyond the autoresponder saying someone would contact me. Meanwhile, through this period, other help/complaint inquiries were answered quite normally and to satisfaction. It wasn’t due COVID manpower shortages, or any other excuse. Also true: other MeWe Members agreed with me that George and friends were trolls; it isn’t just my take.

Third clue: the nature of the continued harassment by ‘George and friends’ is perhaps the most important clue of an A.I. bot troll in play at MeWe. I log into MeWe perhaps 5-10 or more times a day. Despite being blocked, the post consistently appears with a new anti-Trump comment at the top of my notifications every time I do so, time stamped somewhere randomly between the most recent legitimate notification in the list, and the time of log-in. The only time it might not be at top is if I was too quick in checking for some reason, but it would be there the next time I checked.

This is a statistical impossibility for anything but a code embedded within MeWe’s system. Random samples shown in a partial screenshot from a folder full of examples:

Fourth clue: the notifications are for the same original MeWe post thread which resulted in the attempt to block ‘George’ in the first place, now approaching a year ago, in time. The notification is of new comments made to the original post. It is again highly improbable that ANYONE, much less 21 such anyones, would be electing to consistently, repeatedly through a day, every day, continue dialog on a post that old. While this would not be a trait of human trolls or of any other form of bot, it would be no problem for A.I.

Fifth clue: the only exception to an update so appearing, is if there have been so few posts since the prior log in, that the last update is still visible in the first few posts in the notification list. That is to say, it was already visible in the limited viewing area of the pull-down list. Again, that is something only an in-system Bot could determine.

Sixth clue: while in dialog with MeWe Help staff on an unrelated function glitch, and finding the staff helpful and concerned, I raised once more the ‘George’ issue. That ended all communications on both topics. And, that is when I decided to write this exposition… and to prepare to leave MeWe. 

Seventh clue: somewhat synchronous with that cessation, a whole new batch of trolls suddenly appeared to comment on a variety of things I was commenting upon, even things apolitical (religious, news bits, you name it). I remind you of my definition of a Web troll, per the intro. They again came in packs or teams, and employed the exact same methods as did ‘George.’ I’m not putting up with it. I left Facebook because of it (and the other matters), and I will soon enough abandon MeWe, and suggest others might wish to evaluate their patronage, and certainly, to be alert and to evaluate any trolls they encounter against the above findings.

Because there is one more thing any MeWe user reading this should ask about it all…

Whut for would MeWe employ A.I. bots?

Call this a conspiracy theorist’s conjecture, if you wish. However, this theorist has been proven right again and again, and has put terrorists, bad Cops, criminals of all manner, and illegal CIA fronts out of action. My research has resulted in correctly forecasting (via what I call the Unified Conspiracy Theory) the downing of the WTC by false-flag terrorism and the resulting series of Middle East ‘oil wars,’ as well as a terror plot against Portland Oregon, which I thwarted (Gas Station Tasking). The WTC threats were warned of in an online posting I made in the fall of 1999, nearly two years ahead of the event, as detailed in several of my books. It also forecast with warning to Secret Service of an assassination attempt against a Presidential Candidate and his family, which took place a few weeks later and forced him (Ross Perot) out of the running the very night he won the votes to get on the ticket.

Given the mass exodus of conservatives to MeWe, and other alternatives as well, it would seem to be very useful to the Deep State to get all of us non liberals together into a fishbowl for psychological reviews. Once under water, it would help them identify ‘dangerous’ threats to leftist agenda and to target us for ‘destruction’ using the latest methods of psyops targeting. They would know who believes what, who agrees with who, and thereby, who might need special targeting consideration. At least some of those bubbles MeWe users see floating to the top of the MeWe tank disguised as fresh posts and comments, are likely signs they are now growing A.I. sponsored gills… which once dependent upon, could become an off switch.

Holding your breath hoping not to be targeted, might just result in your drowning in a pool of very fouled Marxist swamp water. But that’s just me, and my opinion. Glub. And oh, then there is also this:

A.I. is frequently unstable, unpredictable, and uncontrollable, at times. Glub, glub, g-glup…

And, just so you know: I’m not going to leave MeWe until Valentines Day, or later. If my account vanishes before that, you can check here for any report of censorship for having sought to expose the problem as I see it. ALL COMMENTS WELCOME, including MeWe staff — anonymously, if desired.

EMF Meters for TI Use


Radio Frequencies and Electromatic Fields can be weaponized for use against ANYONE. With the advent of 5G and the Internet of (smart) Things, almost EVERYONE should worry about RF/EMF effects. THIS MEANS YOU!

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Oct 30, 2020, from an undisclosed location not too far from wrong. copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

Hard rocks and harder places…

This is an extremely broad topic which cannot be well discussed here, beyond some basic advice. The problem for TIs is uniquely different from common uses of Technical Security Countermeasures (TSCM) equipment and services. So one problem right off the bat is obtaining useful help (good luck with that). This leads to a do-it-yourself (DIY) alternative by use of low-cost EMF meters, and possibly shielding or other tactical solutions. As result, most pros are ex mil-intel types, which creates a trust barrier with most of the TI community. 

Not that it matters: a TI simply cannot afford the cost of their services. Professional TSCM equipment is extremely expensive (a pro might have a million dollars invested) and extremely complex, and requires a lot of experience and the kind of training offered in the military and intelligence communities. So, between trust and cost, and unique needs, a TIs find themselves between a proverbial rock, and hard place, a DIY nightmare. That’s not all. 

That help issue trickles down the food chain to the makers and sellers of lower cost solutions, such as EMF meters, which are little brothers to more sophisticated and costly signal analyzers used by pros. Such firms do not and will not support DIY use of their products for TI related needs, and indeed, many pros will not offer their services, either because they fear running afoul with some government operation — or they don’t believe in the whole targeting notion and presume the client mentally ill. 

It is possible to hire a PI or some individual who’s gone into business using low cost gear to do ‘mini’ TSCM sweeps, some of whom are aware of and will cater to TI needs, but many of these are charlatans, especially true in those who specialize in select TI issues, such as ‘finding implants.’ Be wary of anyone charging for implant detection using small EMF meters, esp. if charging by the implant found: with many meters, it is possible to cause a false read by simply moving a finger of the hand holding the device toward the front of the meter… for another $50 ‘find.’ “Would you like me to continue searching?” 

It would therefore be better for the TI to do their own searches, though even with a decent EMF meter, the odds of finding an implant are extremely nil. EMF meters detect Radio Frequency (RF) and Electro-Magnetic Fields (EMF), which are radiated energy/field readings not given off by implants, as a rule. Most implants receive such signals, and those that transmit them tend to do so by remote command. Even then, it is very briefly, rather than being ‘on’ all the time — defying meter detection. 

While there may be exceptions, the type of signal they use is likely to be lost amid the ambient signals present already (i.e., wifi, broadcast radio/TV, cellular, AC wiring, power

lines, amplifiers, etc.). An EMF meter displays the sum total of all such data, and can only identify a source by virtue of increasing in signal strength as it nears the signal source. An implant signal is rather weak. But, implants aside, there are other valuable uses for such a meter, if you have a decent one.

Choosing an EMF meter

First, know that cell phone apps that offer EMF readings are not reading the right kind of EMF. They are not reading any signal which is involved with targeting, but instead, the Earth’s own magnetic field, using sensors in the phone designed for game play to know changes in the phones relative position to prior positions (i.e., steering a car in a driving/racing game). For like cause, avoid ‘Natural’ EMF meters or EMF meters that do not include RF measurement, as they are also reading the Earth, only. 

So what you really want is an actual RF/EMF meter. And not just any such meter, but one which is directional in nature when reading RF, and not omnidirectional. AC Magnetic Field readings will be omnidirectional, in virtually any meter, but if the RF sensing is directional, that will not impede usefulness of omnidirectional EMF readings. RF, on the other hand, is barely useful if only omnidirectional. That said, some omnidirectional meters will allow you to install and optional directional antenna… for added cost. One way or another, you want directional.

There are all manner of EMF and RF/EMF Meter designs. Choose wisely.

The type of antenna system described by the maker in specifications or manuals won’t necessarily tell you if it is omnidirectional or directional, they prefer a technical description of the physical antenna design (engineer speak). Omnidirectional (least useful for a TI) are typically described as ISOTROPIC or TRIAXIAL (3AXIS), and are often visually discernible by a large ball or spherical object at their top. Sometimes it is internal and, therefore, smaller and unseen. That limits the sensitivity, compared to an external. Directional RF meters might have no antenna, a rod antenna (like old brick cell phones), a ‘wand’ at the end of a cable, or a triangular antenna (very useful with distant sources). So, any other technical description other than Isotropic or Triaxial, is good. 

My base-line low-cost meter of choice is the TriField TF-2, which I actually used to sell with some value-added features for TI use. That included a user manuals I wrote for such use for the Trifield, and the Micro Alert audible meter (a good companion product). These manuals, along with a copy of this post and many others, are part of my TI Helps Kit available on request to proparanoidgroup at gmail com. I used to charge $10 for the manuals, but the Kit is free, though I do encourage a donation to the Free Will Society to aid severely impacted stalking victims (freewillsociety.wordpress.com) via PayPal to the above email addy. 

I compare all other meters to the TriField before considering them desirable, or worth the price for TI needs. It is a directional RF with omnidirectional EMF readings in a simple to use and reliable product at a low cost. You can buy direct (trifleld.com) or find it online from many resellers. Experts in the meter reseller and RF/EMF consulting field also use it as a standard for comparisons, and that is telling. In fact, currently, one such pro who advocates for the TriField is EMF Academy, a valuable resource for information to anyone interested in issues revolving around the topic. 

More importantly, they have a newsletter you can subscribe to, and associated with that, is a monthly drawing for one of three TriField meters. If you just visit their site and poke around looking at articles on things like EMF paint and shielded clothing, a popup will offer you the ability to subscribe and enter to win one of the meters. Some of their more expensive and exotic solutions I am currently testing, and will likely write an update report within a month: be sure to FOLLOW my blog so you get a notice. While you do that, also click the LIKE button and leave a comment, if you wish — all at that bottom of each blog post.

There are other features to look for in a meter which could be handy to a TI. An audible tone option, for working in the dark or allowing you to focus on what you are scanning (TF-2). Peak reading indicator and Avg signal strength (TF-2) instead of just a needle or light bar reading that is bouncing around enough to make such things difficult. It would be nice to have the ability to add a special antenna, such as (specifically) a dipole. This may be a round tube, or a flat, triangular antenna for very precise targeted distance source location (useful for DEW sources, typically hundreds to thousands of feet, or even miles away). Some offer a pistol grip or a protective case. These things are nice to have, but not usually critical, if you are willing to walk a bit more to effect the same results.

But the important feature is antenna, and frequency range. Most meters are intended only for cellular and wi-fi operating ranges, which stop (well before 5G) at below 3.5 GHz. One insidious risk of 5G compared to 4G and the current wifi standards, is that it operates at such a high frequency, citizens won’t be able to afford meters designed to check for safety. They may operate at up to 6 GHz. As it happens, DEW weapons are likely operating in similar ‘beyond hope’ ranges. My $12K meter setup can still only see to 12GHz, and some DEW will be above 50 or 60 GHz.  

And, it is true that EEG entrainment (mood, sleep control, thought interference), which many TIs call remote neural monitoring (a misnomer), operates at frequencies well below any low-cost meter on the market, unless you are looking at something like my $12K rig… which is exactly why I have it. We are talking human brain operating frequencies, at and below 30Hz. Your ears cannot hear below 30Hz, because if they could, it would confuse your brain, and therefore, that’s also why audio equipment tends to stop at that low end, as well.

Proper use…

Hold the meter level, flat in your hand, so you are looking down to see the reading. If you aim it upward, you are going to flood the meter with radio waves reflecting off the ionosphere, and will always get incorrectly high readings. You wouldn’t even be able to sense a satellite signal, that way; such meters are not designed for anything but environment readings or very near or high-outpt sources. Also, many meters without external antenna will give similar false readings if your hand is touching the ‘head’ or ‘business end’ of the meter, so hold it by the rear half, only. When taking a reading, your purpose may vary, but generally, you are looking for a ‘hot’ or higher-than-average reading among the ambient collective. 

Before actually taking readings, consider perp strategies. They likely have excellent surveillance and will know when you are using a meter. It is very likely that they would therefore simply shut down, making any sweeps pointless. This is why a pro TSCM sweep is typically conducted unannounced, anonymously, and with a degree of stealth and cunning. Ideally, it would be best if you arranged for a companion to do the sweeps with as little fanfare or obvious effort, as possible. 

This brings in additional problematic factors, such as trust and willingness to help in what is a lengthy and complex set of tedious steps. Or, you might get lucky and find the enemy’s gear is simply left running while they take a nap. For most TI’s, though, it can mean many attempts before being able to acquire useful information from the meter. Failure to find clues of targeting does not mean they never target, does not mean the meter is defective, does not mean you are doing something wrong… it just means that was not likely the right opportunity. 

And yet, of course, the other possibilities may yet be true, in the end. While a negative is not necessarily proof of a negative, a positive is its own proof. Even so… you will want multiple positives over time if to have useful evidence. That will also require good documentation, such as video and verbal announcements of what you are doing and seeing, and where the meter is pointing. Have a witness, too. More to follow.

Taking readings…

Slowly sweep back and forth, left to right, looking for possible reading jumps or dangerously high readings (hot spots). When you first start, you won’t likely know what is dangerous, or not. There are good online resources to help with that, but they can sometimes seem way too technical, and measurement increments of your meter may not match the measurement increments of a given site. That can result in confusion or misinterpretation, and force some math you might wish to avoid. Here are several sites you can review and compare against your meter, hopefully finding one more directly useful, without involving conversion factors. There are many others out there, and what constitutes unsafe levels is kind of a moving target in constant redefinition, and there is a difference in European, American, and Asian standards, the U.S. being the most lax (natch) of the three.

https://www.home-biology.com/electromagnetic-field-radiation-meters/safe-exposure-limits

https://www.trifield.com/faq/

https://healthybuildingscience.com/2013/02/18/emf-and-emr-conversion-formulas/

If you find a hot spot, stop and watch for several seconds to see if it holds relatively steady or was just a random spike. Generally, you will want to repeat scans in each of the meter’s modes of operation (i.e., the TriField has three: AC Magnetic, AC Electric, and RF/Microwave). If you are logging results for legal or comparative purposes, give it at least five seconds and note the reading(s), avg, and peak. If you’ve made an entry, be sure to note the values for each meter setting at that same position/angle. That added information could prove useful at some point. 

Hot spots may show up either as a gradual rise and fall as you sweep, or a sudden spike. It may be brief, or hold steady. Brief spikes are not typically useful, but one which holds or is above safe limits is very useful. Note if gradual or sudden, and especially note if it was synchronous with any impact on you or your environment. You will also want to get a compass heading (there are cell phone apps for that, relying on natural EMF, as it happens). 

If outside, and you are in something like a depression or valley, or a where there are tall buildings, you may wish to then tip the meter a bit to scan lower and higher in angle, such that you avoid looking directly into the sky (stay below the visual horizon, where rooftops may so redefine it), looking for further increases which may help identify a specific source location of the signal (a cell phone ‘bubble level’ app with off-level degree readouts might help with your notes, as well). If it is a building you are aiming at, try to estimate the floor, and note that. You may want a strong pair of binoculars, a rifle scope, or other strong lens to try to see what is at the suspect location. And it is suspect, only. A hot spot, even if very hot, is not alone a proof of a targeting source… but only reveals a possible suspect location.

If we are talking about finding a surveillance or other targeting device planted somewhere within your location with the meter, there is a similar concern, should you find something. Depending on the device purpose (which you may not be able to discern), and tactical matters dictated by your targeting situation (which may not be obvious), it may be to your advantage to leave it in place. You may wish to contact me (I am interested) via public library computer. 

Or, use your best judgment, if worried it might should be removed immediately. Video document its removal and take it directly to a bank and get a safety deposit box to put it in… or take it to a local professional for analysis, per the advice in the next paragraph. Send me still images, in place, and after removal, if removed. Safety first, if it involves AC electrical power, and if it is in a large sealed box, don’t try to open it… such are often booby-trapped to destroy the evidence; very scary fireworks which may require the Fire Department, as it once did in a case I was investigating.

Now, about suspects, we need a warning: If you do establish a suspect, DO NOT confront individuals which you might be able to identify. Instead, try to learn as much about them or the property as possible, and add it to your notes. You should then contact me, or an appropriate professional, such as a private investigator, lawyer, or Agency. I don’t recommend Police, but if you have good readings and symptoms verified by a Doctor as not due a health issue, you might want to contact the FCC or your State’s Environmental Protection Agency, or perhaps your local County Extension Office Agent. Some larger cities may have bio-home or bio-environmental engineers or similar, who could be very good resources, if available. If there is any significant find or action taking, I would like to hear from you, and may be able to suggest ‘next step(s)’ to consider.

Specific uses

To find a surveillance or targeting device in a structure (the TI’s ‘space’) requires comparing readings well away from a suspect source to readings within an inch of it, looking for a large increase (signal strength falls off at the square of the distance). Scan low, scan high, and all around. You will want to be as physically close to surfaces as you can get, without touching, preferably (no harm, no foul, if you do). Every object and surface should be treated as a potential suspect to be tested.

 One should establish ‘normal’ levels in a non TI environment (a test control space) similar to the TI’s space, and compare by taking readings at room center or well away from major RF sources (i.e., wifi, computers, tvs, radios, ovens, etc.). It should be a similar sized and designed space in the same neighborhood, between three and six homes away (arranging this can be daunting, if you do not know anyone who fits the bill, who would be willing to participate — try requests based on your own concerns in the neighborhood about high 5G signals, until you find someone who worries about 5G). 

This is done in several sets of readings, each — one with those RF sources operating, and one with them turned off, and one with the Mains turned off (no AC power to the space). If subject to significant electronic attacks which can be physically felt or sensed, the TI’s space reading should additionally be undertaken as sets during both times of no sensed attack, and during an attack (which may prove difficult, if under surveillance — the perps may elect to cease the attack once you set up for the readings… which might buy you some peace.) You should also take readings at the power company meter at both spaces at a time of day when major appliances are not in use, and note how fast the meter is changing, and in the TI space, take an additional reading when the mains are turned off. 

Finally, you will want to walk around the space on the outside taking reading pointing away from the center of the space, looking for hot spots. Directional is King, here.

To test for bio implants in a person or a tracking device on a vehicle, the best place will be in the country, away from any nearby potential sources for such signals… such that ambient broadcasts and distant cell towers are about all that’s being read. All cell phones and the like should be turned off. Don’t try to find an implant on yourself, have someone else take the readings. Every inch of the body should be scanned, and I suggest wearing a simple nightgown, PJs, or a bathing suit. Feet wide apart, arms held out to the sides. Be willing to get fairly personal. One then verifies by going on past the body in the same direction to insure the reading is dropping, again.

If a vehicle, pop the hood and trunk and doors to scan the interior areas, it being OK to lean into and ‘look about’ with the meter, just trying not to aim directly at the sky. Don’t forget under the seats, fender wells over the tires. It would be nice if you could put the vehicle on jack stands so you could safely get underneath it (where aiming upwards at the undercarriage will be fine). Jacking each corner up as if changing a tire is much more work… but avoid actually going under the car with any more than your arm. You will want three sets of tests, one with the engine running (in Park or Neutral, Emergency Brake set), one with battery connected and the key in the accessory setting, and one with the battery disconnected. That will tell you if any suspect readings are from something drawing power off of the car, or if it is battery operated (which means something bigger, and easier to find in a visual search). So, be sure you have the needed tools.

What do results tell you? 

  1. Where readings are higher during an attack, DEW is all but confirmed, and additional steps (T1, at document end) will be needed. Where they are not, and the attack was sensed, the sensed effects are more likely to be a health issue (all TI symptoms are carefully designed to mimic health issues), and you should seek medical advice, describing only the symptoms, not TI concerns. Get a second opinion using a random Doctor. If no high readings and no sensed attack, try again… and again;
  2. where readings are higher in the TI space with all power off, than in the control space in like status, it indicates battery operated surveillance is likely, take steps (T2). If the same, it implies that any perp equipment present is drawing power from the house by any number of means, use step (T3). NOTE: it is certainly possible for both to be true;
  3. where readings are higher when RF/EMF equipment is turned on in the TI space compared to the control space, it implies that the equipment operating is either defective, or perhaps weaponized against you in some manner, take steps (T4); If the same, it implies them safe;
  4. where readings are higher when the equipment is turned off than in the control space, and the first part of item (2, above) is false, it implies the AC power system has been weaponized, take step (T5);
  5. where power meter readings are higher in the TI space than the control space, it implies the Meter is relaying a lot of data from perp devices… just good to know, as the other tests will address needed steps. If not different, it implies the meter is not a Smart Meter, or the meter has not been weaponized to relay data. Relay of perp data does not imply the power company is the recipient or participant, though it is always possible;
  6. where power meter continues to draw power with the mains turned off in the TI space, it means there is the possibility the perps are drawing power off for their devices directly from within the mains junction box (circuit breaker box), and may include electrification of the ground to create high EMF readings in the home, and likely, the embedding of targeting signals within the AC wiring. Take step (T5).

T1 (DEW test). You have had positive space readings within the structure and they point to DEW presence. You now need to do external readings at both spaces by walking around the building site and taking reading pointing directly away from the center of the building or room of concern (don’t sweep left to right — you walking in a hypothetical arc about the center point, instead). 

Compare these to the interior readings at the same compass heading. If there is no agreement, the source is likely inside the structure: do a 180 and sweep to confirm, directly along the outer wall surfacwes. If they do agree, compare the average signal strength. If it is a notably higher, then the source is relatively close, and in theory, if there was nothing in the way, and the source was left operating, you could walk toward it until you found it… such as a neighbor’s home. If it is not exactly higher, then it is much further away, and you may want a bicycle or car to chase it down. 

T2 (Batteries). Battery operated devices are bigger, and easier to find because they will require a nook or cranny. Do a visual search for anything that is unusual or foreign. Do not remove it. Video the discovery with audio description. It may require some disassembly of door panels, carpeting, dash components, etc., which may mean professional help or tools, in which case, you must be present and video. Contact me with the circumstance and send me still images of the object, that I may suggest the next steps. Do this covertly, such as by use of a public library computer. 

T3 (No Battery). That means it is either hidden within an appliance (i.e., TV, stereo, blender) that is always plugged in, or it is wired somehow directly off of an AC power line, perhaps in wall or atic, under floorboards or behind baseboards. If the meter is pointing towards any such appliances. Unplug those items and move them aside, and take readings, again. If the readings fail to match, plug them back in elsewhere, and read again at the new position. If they again match, they need to be dismantled, looking for anything that seems added. You may want to take it to a repair shop, if unhappy at the thought of DIY (some items have voltage capacitors which can cause severe electrical shock even if the item is unplugged). You have to worry about such items on the far side of the wall, as well, by the way. 

If the appliances don’t change the readings when removed, or there were no appliances, then we worry about wiring in the walls, floorboard, and ceiling areas. Aim the meter at angles to see if there is any confirming change in readings. If low angles are hotter, you may need to pull the baseboards, wall power outlets, or get under the floor (i.e., basement ceiling area). If high, there may be ceiling molding to be removed, or you may need to worry about something upstairs or in the attic ((where you will be wanting to follow all the house wires, looking for a cut and splice with something dangling (perhaps another long wire to chase down) off of it)). Otherwise, we check light switch wall plates, picture frames, wall hangings, or window sashes, etc., as may be in the line of sight of the reading. Again, be mindful that walls have two sides. Watch out for fiberglass or asbestos insulation… you don’t want to be messing with that without serious protective clothing.

T5 (AC Power Compromised). Consider to contact a Home Bioengineer or a large Electrical Contractor who is capable of doing large-scale power system work (i.e., can contract to build sub stations and the like — which means they know more and have better tools than ‘an electrician’). Go directly to the Power Company if there is no such services in your area. The idea is to complain about dirty power and possibly high ground voltage (say nothing about targeting) and ask for a power quality survey. If they find anything wrong, they should be able to fix it or arrange for the power company to fix it. Simply going to the power company first may not be a great idea, if they have been compromised and are complicit.

Shielding Solutions

See the document on Shielding which is also included with the Helps Kit, or request a copy.

How TI’s Can Identify & Deal w Low Flying Aircraft


Targeted Individuals and ‘persons of interest’ tend to get nervous when they seem to be dogged by low flying planes or choppers. There is a way to determine if it is coincidence and harmless, or not, and who might be responsible, if actual targeting.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Oct 22, 2020, from an undisclosed location somewhere Right of Center. copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

NOTICE: Fascistbook and their ilk (Twister, et. al) blocks any URL to my blog site. SO, if you wish to Share or Post a link in social media, you may wish to write out the url with spaces between wordpress and com (use no dot), instead of supplying a pasted link… or you are wasting your time and helping censors to win.

Zoooooom! Ad nausium

Many TIs find that (often the same) airplane(s) seem to be constantly in the skies overhead as they travel (surveillance, tracking), or overflying their location at extremely low altitudes (harassment). It has happened to me at times, at the heights of my being a ‘person of interest’ to rogue operatives of various Federal Agencies. For me, it included a ‘spat’ with FBI, FAA, and NTSB in the Flight 800 shoot-down investigation, as I was revealing very condemning proofs of a fraudulent cover up. There was also a time when I went head-to-head with a terror cell planning to suicide-crash small private aircraft into a gas stations while refueling from tanker trucks (called Gas Station Tasking by President Bush). They were making daily practice overflights and diving briefly at altitudes so low that you could make out the rivets. And, two of FBI’s top-10 Most Wanted were involved on the ground, face-to-face. The tools I’m reviewing, here, were not available in those days, and its availability is good news to those unaware of it.

The tool I’m speaking of is even available on your smart phone or other web/wifi/cell device, and affords International coverage. Just type in ‘flightradar24.com’, which tracks more than 180,000 aircraft in the air at any given point in time… any planes which can be seen by the global aviation radar network, transponder/radio-tracking stations, and satellites. Their coverage is increasing over time, as well, with excellent coverage in Europe, North America, and SE Asia, Australia/NZ, and major air corridors/destinations. It is a very robust site in terms of features useful to anyone wanting to track a given aircraft (i.e., a commercial flight a loved one is aboard), or anyone involved in aviation. At this time, it does not track military aircraft, likely for good reason (see Tactical Advice for alternatives).

I learned about this site by watching live streaming content on Twitch by a contact who IS targeted by government agencies, and while he was talking, he noted a low flying aircraft buzzing his house (not rare, sez he). Live, while he is already in screen capture mode so I’m seeing his computer screen, within seconds, he was able to identify the aircraft, complete with a picture of it, and owner/operator information. There is more that he could have done, but he laughed it off (the right way to deal with any harassment) and went on with his presentation.

When you first arrive at the site, you are presented with a Map, likely focused on Europe or some part of the globe other than your location. The first time you visit, you might want to click on Create Account, which involves either providing your email addy, or a click on one of the social media giants with whom you may have an account. Then select the ‘BASIC’ plan, which is FREE (or one of the paid plans). Basic will do what you want, by and large, and to a useful level. If you don’t want to set up an account, you do not have to, but if you do, it will remember your location so you don’t have to struggle with getting the map to display your area. That will better insure you spot your plane before it gets too far away on the map, to be certain.

The Tool

The first time, you will have to do that, anyway, but once you have relocated to your greater area and zoomed in (not too close, because at aircraft speeds, the plane you are looking for might be rather distant in a hurry), the site will remember that location and speed you on your way to an answer, if you set up a plan. Unless you are near a major flight corridor, a broader view will not be cluttered with too many planes, and especially if you know the direction of flight, you will have no trouble finding the suspected culprit. And, if there IS more than one plane, clicking on each should allow you to compare the image with what you saw, if you did get a glimpse of it, or heard it well enough to discern engine differences: jet roar, very high-pitched and loud turboprop, or buzzing loud propeller. If like me, you may even to tell if one or multiple engines, and of course, helicopters and their noises vary by size and type, as well: choppity-chop (small), whumpity-whump (large). 

If you mouse over a plane’s icon, it will show you the tail number right there. If you click on it, it will pull up aircraft details as may be available. If it is a commercial aircraft of any sort (flight school, rental, commuter, airline), or an aircraft for which the owner has supplied a picture, the actual airplane should be shown. If not, a manufacturer’s photo or other image of it may appear (likely a different paint scheme/tail number — or no tail number if a marketing image), or perhaps no image. But you will always have the tail number, which is the most useful information if keeping a record (DO MAINTAIN SUCH A LOG) or wanting to escalate the matter officially toward possible actions against the operators (I would not do that unless the same plane was buzzing you repeatedly in a single flight or the like). 

Note: if a plane has blocked out it’s tail number, is flying below radar, and has its transponder turned off or has none, it won’t be on the Map; you won’t have a tail number. In such a case, go to the Tactical Advice section, below, and treat it as if a military aircraft, except that instead of complaining to the military, go to the FAA in like manner. Try to get other eye witnesses, pictures, or videos, if you can, should you be doubted.

Once selected, with a small delay, the flight path of the aircraft will show up as a yellow-green line, which will tell you its point of origin… sometimes helpful in getting information about the owners, esp. if other methods fail (Note: in the example image, YKM is the Airport indicator: Yakima; another way to know point of origin, and to the right of that, you find the destination airport). A harassing/following aircraft will likely originate from a nearby airport, so if you see it originated from or destined for a location several hundreds of miles away, it is likely a coincidental matter involving no targeting.

If your Log shows a common origin for one or more planes, but you are unable to determine the owner, that runway facility is the targeteer’s base of operations, and a drive out to the site (if practical) may allow you to find where it is parked and associate it with a business or other entity — perhaps with photo in hand, asking around for info. You can also elect to follow it until it arrives at destination, which if actually an overflight as part of your targeting, will likely be the point of origin. If not, it was likely mere coincidence, even if multiple sightings or patterns are revealed in your Log. After all, businesses and even private pilots have patterns in their work, too. This is especially true of flight-school aircraft, as exampled in the image, doing touch-and-go landing practice, Ironically, right over where I once lived, in Yakima, Wa.

The Basic plan limits you pretty much to the above. But if you elect the Silver Plan ($10 a year), there are more features, including removal of the annoying pop up ads which block part of the view and often can’t seem to be removed when you click the x box. A couple of the other features could be extremely helpful if you are frequently harassed by aircraft: ALERTS will let you tag a given tail number and be alerted when it is in flight, and allow tracking; HISTORY of a given aircraft can be tracked backwards in time for up to 90 days, including ground time; DETAILS provides complete Registration information, serial number, and other data to include speed, altitude, and much more. There are additional things which may or may not prove useful to a particular situation. There are also more expensive plan options with increased feature levels and whole new features.

Tactical Advice

If you keep a good log such that you feel you can demonstrate one or more specific aircraft/operators are involved in harassment, there are things you can do which could provide some level of relief and/or satisfaction, perhaps to include an investigation or legal actions to your advantage. Such legal actions might be  something you would wish to consider (with good counsel of an attorney), but they might also be initiated by FAA or some other agency without any expense or direct involvement by you. The tail number is often enough to achieve that, because FAA, FBI, and Police all have the means to take it from there. But if you needed to take action of some sort of your own against an operator, legal or otherwise, you would need to identify the operator. If the Tool is not providing that information for a given aircraft, its not a roadblock.

Often, just typing the tail number along with ‘tail number’ into your browser will likely pull up FAA registration information. If that fails, you can normally go directly to registry.faa.gov and type it in, there. Sometimes, the answer will still be less than useful. CIA aircraft are often not identified as such, for instance, and may instead be registered to a business or private individual, or return nada. However, there are people who track CIA aircraft independently for various reasons. Sometimes, just adding ‘CIA’ to your web search via tail number will give you a hit. Otherwise, you would want to focus on trying to find out who operates the aircraft at its home airport (business name, most likely an innocent sounding front). Sometimes, it’s an obvious military/intelligence company ‘contractor,’ perhaps so identified publicly on their Web site or literature. But also, my book, The Professional Paranoid, details how to research such firms to see if they fit the profile of a CIA front.

Some aircraft defy identification… military aircraft, for instance, are invisible to the Tool. Often, they may be black, unmarked, or moving too fast to see any markings. But assuming you have the time, location, and direction of travel, and some general description (i.e., small helicopter), the FAA should be able to identify it. If you get a decent look, you can do online searches of US military aircraft at military.com and find the exact type (i.e., MH6 – a small tactical helicopter). FAA might not give you a lot of information about it, perhaps none, but they might tell you something like it being an Army training flight (and it might or might not be the official and true answer, of course… their answer might simply be presumptive, far easier than actually trying to find out the true answer). You may find answers vary in detail over time. That’s not hints of something nefarious, it is just likely a lack of interest vs. a more friendly or service-minded person at the other end. But just confirming its existence is good. Put whatever answers you get into your Log. 

Once you seem to have enough instances suggesting a pattern, you will also likely have established the base of operations (i.e., a local Air National Guard unit). They will have a Public Relations Officer, and they won’t know you from Adam. Give them a call, giving a random phony name, and say you are a photographer would would like to photograph (type of aircraft of concern) in flight, and wonder if there are training flight paths or operational flight paths anywhere in your (county) that you might be able to position yourself, and if there are particular days or hours that would be best hunting. I’d tell you to record that call, but that would be illegal almost everywhere, so take good notes, including name of contact, time and date, length of call, and their answers. 

Wait some time and continue to grow the Log, while at the same time, going to any selected flight path per the ‘good hunting’ suggestions as to time/days, and get a sense of the frequency of flights, there, in a separate Log. Compare both Logs: if much greater frequency in targeting than in training, get the Base Commander’s name (should be online at the base web site), and write a formal and simple (non-targeting oriented) complaint of constant ‘noisy’ overflights with a detailed history of time/date/aircraft types from your Log. They will probably acknowledge with a presumptive reply about training flights, the easy and usually correct response. Respond with your prior research through the PR Officer citing the difference, and ask for an investigation of the discrepancy, and the name of the person authorizing or ordering the flights ever your home, and official reasons for those ‘apparently non-training’ flights. 

There will likely be resistance and side-stepping, to which you should counter by asking if you should instead be contacting the Pentagon through your Senator, because it feels like intentional harassment. Oops! They wouldn’t like that. And, if it is the aircraft shown below, contact me each and every time you see it; it is a known mind control operations aircraft, called Command Solo —- note the unusual antenna configuration. In any threat about a Senator, if this plane is involved, do specifically mention ‘Command Solo psychological operations aircraft.’ If you must, contact your Senator, and cc local media. Oops!! This outreach should not get into your targeting, but you can say ‘it feels like deliberate harassment, given the sidestepping and misinformation in official answers.’ It would help if you could find neighbors willing to add their names to any such outreach. If the overflights bug you, they likely bug them, too. For more information about outreach tips, read this.

  • This post is, in .pdf form, part of the authors’ Free Helps Kit available to stalking victims, which contains many, many more such files, as well as a victim’s workbook which has proven very helpful towards determining the who, what, how, and why of their targeting. Email proparanoidgroup at gmail com to obtain the Kit, which also provides information about the Free Will Society to aid severely impacted stalking victims.

Emergency/Help Phone Numbers You Might Not Know About


Most everyone is familiar with 9-1-1, 4-1-1, and 6-1-1 numbers in America, but there are other equally valuable three-digit numbers worthy of remembrance or plugging into your contact list. And that includes the equivalent numbers in other countries, when you travel.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, May, 12, 2020, from an emergency lockdown bunker in an undisclosed location

copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
NOTICE: Fascistbook and their ilk (Twitter, et. al) blocks any URL to my blog site. SO, if you wish to POST comment in social media, you may wish to write out the url with spaces between wordpress and com (no dot), instead of supplying a pasted link.
 

Duh!

I can’t think of anyone who has not used 9-1-1 to call for help in a law enforcement, fire, or medical emergency, or to report something in need of Police investigation or intervention. Almost everyone with a cell phone knows that 4-1-1 is directory information, and that 6-1-1 is commonly used to reach their carrier regarding issues with their cellular account or the phone, itself. But what about 2-1-1, 8-1-1, and other numbers in the series? Not so much. Even more problematic, is what happens when you are in another country. What numbers do you use, then? This post will answer that, and give you all the numbers for popular North American destinations.

While there is some international cooperation in assigning such numbers, there remain vast differences. The European Union, has its own set of numbers, and while the UK employs some of them, they also have their own set, devised before the EU had existed. Yet Australia, New Zealand, and Canada are slightly to vastly different from England, Canada almost identical to America. Asia and the Middle East is a hodge-podge, while South America is a bit of hodge-podge, but like Canada, also employs 9-1-1 for the main number. Some countries, like Mexico, have sort of ignored the issue (both the government, and citizens – see note), though they are at least using 9-1-1, as of late. Africa is just plain behind the times, you will need a different number everywhere you go, in most cases.


Fortunately, it’s not at all hard to find out what emergency numbers are available when abroad, and it can be done online easily before you travel, at WikipediA, where almost every country is cited. One can also search on ‘emergency phone numbers’ + (country name). Travel agents, airline and cruise ship firms, State Department offices and any Embassy (any nation), will generally have the answer. If already in the country, any citizen should be able to at least give you the key-most emergency number for fire/police/medical… if you both speak a common language.

You can see why programming them into your phone beforehand might be a good idea.When abroad, you should always program the local US Embassy or Consulate number into your phone, as well. And, btw, before you travel, check with your phone company about how to avoid huge phone bills while abroad. It is easy to run up bills into the thousands of dollars, if unaware. There are several things you can do, including purchasing a temporary sim card with a foreign carrier, or special temporary rate plans from your carrier. Just know that your cell carrier may not be interested in telling you about options they can’t make money on, if they do not have partnership arrangements in place, overseas. So your travel agent and the like may be a good second-opinion resource. Image: WikipediA.

 

Dial!

The American system would seem to be far more robust than many other three-digit systems. The list shown here also includes Canadian numbers, which do not necessarily apply outside of Alberta, British Columbia, Manitoba, Nova Scotia, Ontario, and Saskatchewan:

America   Canada     Service
2-1-1         2-1-1         Community health and social services: suicide prevention, welfare programs, access to free services such as for food, housing, legal aid. Includes State, County, public/private entities. An operator will inquire as to need, and provide suggested local contacts.
3-1-1         3-1-1         Frequently available in larger cities, similar to 2-1-1, but Municipal.
4-1-1         4-1-1         Directory Information or ‘operator.’
5-1-1         5-1-1         Available in many areas: automated road condition reports, and a means to report accidents and road hazards not require 9-1-1 help.
6-1-1         6-1-1        Direct contact with the cellular carrier’s customer support.
7-1-1         7-1-1        Reserved, not in use.
8-1-1                           In most locations, connects to a centralized information system for utility services, principally to locate underground lines. It is currently not used to report problems, but that may change in the future.
aaaaaa.aa8-1-1        Tied to the national health care system for urgent care requests.
9-1-1         9-1-1        Police, Fire, Medical emergency ONLY. Also good in Mexico*, Bermuda, and the Bahamas.

 

*Mexico is began implementing 9-1-1 in 2017, but may not be in service in less populated areas, and the person answering may not speak English and a transfer to someone who does may not be very fast. Previously, Mexico had separate 8 digit numbers for fire, police, and ambulance, and those numbers remain in place. The Military has its own phone number for crime-lord response, but Citizens tend to have no faith in any such services, there, because help seldom responds, or they do not trust Police/military. A group called Angeles Verdes (“Green Angels”) offers roadside aid and travel advices, tourist helps, answering in English: dial 0-7-8.

 

Doh!

I almost forgot the handy ‘star codes’. It’s amazing how many people don’t know them… or have forgotten them (like me, almost). Star codes are also a three keystroke ‘number’ made up of two numerals preceded by an asterisk keystroke, found just left of ‘zero’ on the dial pad. They are also known as ‘Vertical Service Codes’ (VSC), Custom Local Area Calling Codes (CLASS, or LASS). They allow the you to directly interact with the digital telephone switching system, telling the hardware how to handle a given call situation differently. They can provide improved privacy/security or added feature-benefits in how you use your phone. Like the previous 9-1-1 numbers (save 6-1-1), they generally apply to both cell phones and land lines, though some function only on one or the other.

There are some 33 different codes in all, many in the form of paired codes, one to turn a feature ‘on’, and another for ‘off.’ Many are special functions tied to the type of phone account the subscriber has, or to optional features for an extra charge, and some would seem unlikely to be used very often. Some smart phones internally employ star codes such that the user is unaware, and does not need to know the code, such as when blocking a number. Because of these various variables, you should visit your service provider’s Web site to see which codes are specifically available to you under your service plan, and review your phone’s handbook to see how it might be handling such provisions.

However, there are several very important star codes which apply to everyone, which you should commit to memory, because all phones will work with them, and you don’t always end up using your own phone. Too many of them to detail, here, but there is  a handy list at WikipediA. Scan the list and take a bit of time to mouse over the blue (hot link) text on their page, for a popup explanation, as the short description may not prove as useful in your evaluation. Click it if more text than will fit the box is apparent.

Take note of things like anonymous call rejection, call blocking, caller ID controls, and call trace. That last one is used when calls involve threats or are in some way malicious to you, your phone, or the phone company; it reports it to the phone company and can result in a notice being sent to Police and/or a joint investigation through the phone company. If particularly threatening or criminally harmful, you should also file a Police Report, and include the time/date along with the fact that you did use star 57… because Police will not otherwise contact you from just punching in the code, and just pushing the code alone won’t give Police the full story. I use it when I get calls from impossible phone numbers (scammers), and I let an appropriate agency know about it, if warranted.

 

Datum!

WARNING:  Phone Apps for TV a Bad Idea

Smart Phone EMF App No Value to TIs

Your Cell Phone is a Government Agent Spying on You

 

Proving The Mandela Effect, and Ties to Project Rainbow


When it seems there is a cover up of military experiments some believe responsible for accidental time travel and teleportation… to include the possibility of sponsoring the Mandela Effect’s alternate timeline realities… thus establishing two different but intertwined conspiracy theories, each with their own cover up… I’m extra suspicious. And, with good cause, it seems.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Aug, 29, 2020, from a mobile TV studio at an undisclosed location

copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

Rod, we need you…

Interesting interview with Mr. Serling (click); blankonblank.com

Imagine if you will, the audio intro to The Twilight Zone. Only Mr. Serling is nowhere to be found… in our current timeline. And, given the nature of this special real-life episode, in which everyone reading this post is onstage and playing a roll, we might just need him to help us work through putting this particular show together. It might properly be entitled, The Mandela Effect, and if to learn some useful truth along the way, Rod might hint in his introduction, that it “has to do with something called the Philadelphia and Montauk Experiments… in the Twilight Zone.”

The term ‘Mandela Effect’ (hereinafter, often referred to simply as the Effect), is derived by the first noted instance of the Effect, regarding the South African anti-apartheid activist, Nelson Mandela. When it was announced that Nelson was released from prison in 1990… untold millions of people began commenting that they were certain they had heard/read news reports of his death in prison, in the early 80’s… for which no one could find evidence of such death notices. At the time.

Over time, as other events in his life made international news, more and more people began to say much the same, in some cases, citing other time frames for his death. So many people, in fact, that a seeming cover up effort began to emerge, a matter which will play a role in this particular script, as it evolves. Fortunately, as it happens, at least one Fan of the old black and white TV show happens to be a ‘conspiracy theorist’ willing to stand in for Rod. And he… err… rather I, am ready and able to attempt filling in, with my own not-so-insignificant investigative writing efforts and findings.

For my qualifications in such an effort, may I submit my RAP Sheet of crimes and conspiracies solved or thwarted. Here, in this post, I start with a brief summary of the how and why of my efforts, which led to a means for testing for the validity of the Effect, quite contrary to tremendous efforts to dismiss it as ‘mind tricks some people play on themselves.’ In doing so, I also show significant relevance to the U.S. Navy’s Project Rainbow, better known as the 1943 Philadelphia Experiment, which allegedly caused a WWII Destroyer, the U.S.S. Eldridge and crew, to both travel in time, and teleport between multiple locations.

There are two motion pictures about the Experiment, sharing its name, but only the 1984 version is worth a watch… presuming the viewer realizes it is a fictionalized presentation. The 2012 TV version, is not only badly done, but it is so fictionalized as to anger anyone who knows anything about the legend, be it through the first movie, or any actual researched source. What the movies leave out, is that Nicholas Tesla and other famous Einstein-caliber scientists (including Einstein), have variously been linked to the Experiments, in one way or another. In fact, in the final proofs this script leads to, if you choose to follow it, we find modern scientists who essentially verify a lot of that, and who validate the science behind the Experiments… including a reference to a little known WWII era radar-defeating experiment by the Third Reich.

Note: that little tidbit should get the attention of anyone who follows the Nazi UFO/underground base in Antartica conspiracy theories, given that many of the same principles described in early anti-gravity theory were also present in the technology claimed present in the Eldridge and Montauk saga.

While in this author’s view, the cover up of the Effect is not much more than psyops disinformation, there is a significantly more complex cover up in play, on the cited Experiments (hereinafter, also capitalized to represent all such events), themselves. The intensity of the coverup has, in fact, more than kept pace with interest in the Effect, as more and more people take note. Restated, the more people become aware of the Effect, and especially if exploring possible ties to Experiments, someone was insuring that ‘the explanation’ is even more ‘available,’ in an attempt to dampen their fervor in trying to figure things out for themselves. It has transformed from mere disinformation, to full-blown cover-up dirty tricks and psyops.

Sorry, (Men in Black), but I’m rather impervious to such forms of artificial moisture.

Dirty tricks and psyops? As with all really well-done cover ups (i.e., Flight 800 shoot down, JFK assassinations, 9-11 false flag), the very facts and evidence behind the Experiment theories are being deliberately contaminated with sets of conflicting evidence and testimony. These are being established within various narratives to make it impossible for the average person to know if any of it, is true. This is augmented by being pointed out as disino-style straw man ‘debunking.’

For example, the actual location of the 1943 test is variously and additionally described in the effort, over time, as actually taking place in (and/or teleporting between) Philadelphia, New York, and Portsmouth/Norfolk, VA… all while the ship was allegedly actually at sea in a shake-down cruise. This is the hallmark of all good cover ups; alternative versions of the story, by means of fabricated, altered, or concealed evidence. One other clue which renders them suspected cover up efforts, is that collectively, each seems a de facto denial of the remarkable experiment results, altogether.

There was, in time, even a parallel Project Rainbow being run simultaneously by CIA and Lockheed, aimed at developing radar stealth technology, such as we see in the F111 fighter and other aircraft, today. Duplicate-sounding programs is another means of confusing and concealing facts from inquisitive minds, and it wouldn’t be the first such duplicate employed in the evolving saga. If there were no remarkable results in 1943, why so much effort to obscure with alternative versions of the tale? The effort over time drew in more and more, and wilder and wilder additional conspiracy theories completely unrelated to the original event… everything from mind control, abductions and child abuse, to government deals with intergalactic aliens and teleportation to Mars. Suddenly, it sounds more like TV’s Star Gate, than Twilight Zone.

Ironically, perhaps… despite the many attempts to confuse and defuse, has not quite worked out as intended. All those alternate versions can and have been argued by the faithful believers… as ALL being true, by virtue of the Experiments having created alternate realities — exactly why the Experiments are suspected as causing the alternate timelines of the Mandela Effect, in the first place. Thus… the legend grows with every twist and turn added, be it by coverup, or by daring to dig deeper, such as done by the earlier mentioned scientists seeking to verify validity of the claimed Experiment technology. Argh! How do we discover the truth in this vast sea of complex and contradictory information?

Not to worry; the show gives us roughly an hour’s script, within which the truth may yet be found…

 

Is the episode to be mere fiction, or based on fact?

Make no mistake: because of the extensive nature of the cover up, ‘alleged’ is the correct word for virtually anything online relating to the topic, thus far. Hopefully, this will change that, and make it easier to find one’s way through the distortions to the truth hidden within. Because, here and now, it becomes a matter for you to decide, based on new proofs, herein described. The good news is, the Mandela Effect itself becomes the key to the greater U.S.S. Eldridge saga… and vice versa, in mutually reinforcing ways. Both share newly discovered and consistent patterns which more than suggests Experiments indeed have a causal nature to the Effects. This will also lead to a plausible theory as to how teleportation may also indeed fit into and be part of the correct view of the entire episode. The Network Studio Executives, would be proud, and advertisers, pleased.

More astute followers of the Philadelphia theories know there is some evidence which alleges that Rainbow research quietly resumed in 1948, likely leading to renewed Experiments in 1960 at Brookhaven Laboratories, in central Long Island. Under the new codename of Phoenix (in time dubbed Phoenix I and II), it seems it may have continued almost yearly until 1976, under a US Air Force and Navy partnership. Next, they were relocated to Montauk Air Force Station, at the tip of Long Island, at what would become a largely underground complex known today as Camp Hero. Preparations for the move were underway as early as 1973, because of a need for a larger radar system which would make the top-secret research too obvious, at Brookhaven.

Note: True to form, for much of this period, CIA was running another Project Phoenix simultaneously with the US Army, in Vietnam; an assassination program from within which would evolve the two top people first put in charge of Homeland Security, once formed.

Like the Philadelphia Experiment, Montauk, and all related experiments were allegedly shut down in 1983 — after things went terribly wrong, and conclusively believed co-causal in the 1943 Eldridge event — not to mention the alleged teleportation of some kind of terribly powerful monster from another (world? dimension? time?). Remarkably telling, the Montauk monster release took place on the exact same date as the Philadelphia Experiment, exactly 40 years later… creating a time-tunnel, or sorts, between the two dates and locations. These events allegedly led to all experiments being shut down.

Between those two dates, however, more than a dozen different Experiment dates have variously been discussed among Web resources and books on topic. I selected the ten most compelling, and with success of early testing and by additional deduction, I have proposed a two other dates which I hoped could be shown valid by fitting into any observed patterns. They do fit. Technically, it was possible and even likely that experiments of some sort took place every year, often several times a year, post 1960 Brookhaven.

I also point to clues that Area 51 has for some time been operating equipment which fits the Rainbow~Montauk technical descriptions very closely, things evidenced with Google Earth’s 3-D building’s feature (not official; created by followers of the Area 51 mythos, generating and updating 3-D GE compatible constructs alleged to be based on rare photographs and eye-witness verbal descriptions, over time). Thus, it at least seems, experiments may have continued post 1983, as well, which may account for the bulk of Mandela’s death dates to be beyond the 1983 date, and as recent as 2013.

Google Earth: 37°14’4.04″N  115°48’16.60″W  3-D Buildings and Terrain turned on

 

Handed the script while on another project…

I did not set out to do any of this. I was aware of and have experienced the Mandela Effect, myself, both with respect to his Death, as well as other, less significant things of the ‘mind trick’ variety. The (cover up) ‘mind trick’ explanations typically involve words or spelling issues, such as names of things in media or pop culture; Chic-fil-A vs. Chick-fil-A, Sex in the City vs. Sex and the City, etc. These things have become strawmen easy for disinforming cover up efforts to ‘shoot down’ the Effect as mere memory recall errors playing tricks on our mind in some kind of mental placebo-or mass-hysteria tom foolery. Such explanations are themselves mind tricks, and work only because no one can come forward with hard proof in the form of an original date where an event or item can be shown to have been changed in our conciousness, as well as demonstrable factual proof beyond history’s official version.

Happily, such cases do exist.

My first discovery of such proofs, which led to finding others, came about because I was writing my autobiography (I am, after all, ‘semi-famous,’ if you didn’t know — 14M pages reference me or my works). I wanted the best accuracy I could manage with respect to various experiential details, especially if relating to truly famous people I have been involved with. That meant research, and one such item researched happened to regard legendary Olympic swimming record breaker, Mark Spitz. All I wanted to do was to verify the number of Medals he had already won when I first met him, a thing we spoke of, at the time. But what I found in addition, was that it couldn’t have happened, at all, if believing the current history timeline… it was some kind of time-travel paradox!

On December 29, 1963, just as the extra severe Winter blizzard that would pummel the central U.S. all they way to the Gulf Coast was starting to roar, I spent four days on a train trip to Texas, from Oregon. The storm covered most of the nation in deep, wind-driven snow, and the train indeed had to, at times, run with a snow-blowing engine ahead of it. Quite by chance, I was seated part of the way next to Olympic champion swimmer, Mark Spitz, only because the heating failed in several of the cars, and everyone was herded into the two cars with at least some heat, where seating options were limited. We chatted, both as ‘ice breaker,’ and to while the hours away in an unscheduled layover in Denver, while they addressed the heat, so that Denver passengers could board, and travel in warm safety.

I immediately knew who the fellow I shared a seat with was by his pictures in the newspaper, for having recently won four different medals in international pre-Olympic competition a few months earlier — the very details I sought to verify at Wikipedia, for my book. He confirmed it, himself; we talked specifically about that and related matters for some time… as the windows were frosted over and there was no scenery to enjoy. The reason for his trip, was related, something to do with training, and his goal to win Gold at the Olympics. He would do that, in time, winning more than anyone else, ever had, and I would follow his career with great interest, because of having met him.

TODAY, however, the official online history says he didn’t win his first medals until 1965, and that when he did, he was three years younger than I was in that same year. In our trip, he was a year OLDER, which meant he was born in 1945, instead of 1950, as officially so, today. That makes a five-year error in his birth date, and a two year error in his first Gold medals date, from 1963. It was impossible for me to have recognized him for medals he had yet to win, and I know when our trip was, the only time I’ve taken a train to Texas… as I was to live with my Aunt and Uncle while my parents worked through their divorce, and to finish my Senior year, there. I did graduate from Hardin-Jefferson High School in 1964, and then returned to Oregon, by air. The date of the trip was defined by Christmas school vacation, and such that my arrival date would allow quick enrollment in the 1964 school year, in Texas.

The paradox hit me hard. It led me to wonder what else in my life might suffer the Effect. I quickly researched the details in other matters for which dates could be verified. I indeed encountered two other examples for which I was able to know the original date because of personal experiences, and the current timeline historical date, both turning out to be mutually exclusive and yet paradoxically so. These are recounted fully in the linked (at post bottom) Study material, which is the ultimate proof, as herein referenced… validating the Experiments, the Effect, and causality.

 

The plot thickens…

But documenting these would not be enough; my personal experiences cannot be well proven to a Doubting Thomas; it could be dismissed as something made up, or misremembered. I still needed things I could prove with hard evidence, rather than personal testimony, alone. And that’s when I started to investigate Mandela’s death in hopes of finding such proofs. In the attempt, I was able to prove for once and for all, that he did not die twice, as believed.

What?

No. There is, in fact, rather convincing evidence which seems to show that he has died four times, one of which, was a murder. Most people recall his earlier death as being in the early 80s, with no way to prove it. Others in the mid 80’s, with no proof, some recalling it was a murder. A few remember 1991, with no evidence. His current timeline death, is cited as Dec 5, 2013. But now, various proofs do exist which would seem to validate everyone’s memory, and refute all the faulty memory or hysteria mind-trick ‘explanations’ which serve to cover up the truth. But there are two additional things true about them. For one, each has an inherent problem which would certainly seem to neutralize them as evidence. But the other, is that the very nature of that problem is, under the theory, itself called into question as to actual meaning.

In fact, if the other proofs revealed herein, were correct, they would HAVE to be the way they are, and serve as their own kind of ‘reverse logic proofs’ in an ironic manner. They validate on the surface, self-repudiate on close examination, and self-validate when fully informed, yet again. These verifications and proofs for each, are briefly described as follows, in the order in which I found them, but the repudiation and self-validation will be covered later in this work, where it will be easier and make more sense:

•  A 1983 high-school report about Mandela helps fix a death date of March 11, 1983. The Report was assigned because of his Death, that year, and the aftermath of political upheaval it had promoted. As of yet, there are no photographs, and arguably, such would be easy to fake, and the source is easily discounted as unathoritative; several online comments by the student, now an adult. These were in chat rooms, for which a link is pointless. The date, however, will check out, in the Study, and is therefore included.

•  Next, a South African periodical, published Oct 1, 1991, includes remarking about his 1991 death, and the reader can verify, directly at Google Books. The small book is a collection of S.A. student English language writings published serially each year. Subsequent editions, therefore, no longer have the reference, a matter also verifiable towards the bottom of the same mentioned link, where other years are also listed. Be aware that Google Books for some reasons includes material from both the 1990 and 1991 editions when searching, and does not enable the user to scan up and down. I have, however, obtained the full text, after a great deal of effort, and can confirm it comes from the 1991 edition.

•  Finally, a follow-up Northwest Herald newspaper story via a cell phone streaming service was captured in screen shots which reveal Mandela’s murder in 1985. There are several online images found in chat rooms and the like, and a very short and creepy YouTube. This has been verified by a reputable national newspaper historical repository (newspapers.com). Access requires a paid subscription to the service, it being intended for serious researchers. Again, I have managed to access the full article, and the image is legitimate. The video shows multiple views at various scroll points within the document, to reveal more details… but offers no explanations, just creepy music and unpleasant visual effects. This is the best image taken from it, to save you the grief.

The show is ready to air… cue music; stand by, Mr. Serling…

I therefore set about to catalog all dates into a Study group spreadsheet, with calculations as to years between dates, to look for patterns. Along with that, a duplicate Control group based on dates randomly created by Excel’s randbetween Function was used to look for similarities in any evolved patterns found in the Study, which would prove or disprove the notion of coincidences in said patterns. And Study patterns did evolve, eight different observable patterns***, in fact… and the Control group had not one useful pattern. In fact, where some patterns did not quite seem to fit, a closer look revealed spreadsheet or data typo errors. In the end, the entire effort, from establishing dates by research to creation of the spreadsheets, was repeated and double checked countless times.

The principal goal, of course, was to not only to prove the Effect was real, but to attempt to verify the causal source. As mentioned, the Experiments were the principal suspects, but also, there were secondary suspects in CERN experiments, and in experiments involving Artificial Intelligence… specifically, the qubit computer systems by D-Wave. Unfortunately, for such suspects, very little information is known about their dates of operation.*** Regardless, findings were telling, and useful, and should lead the reader to wish to delve into the details of the Study effort, which can be done at the links beneath the findings.

 

Preview of Findings

 

Findings quite contrary to the Control Group were examined, broken into the following topical descriptions of individual findings, as taken directly from the Study. Each of which contributes to the validity of the fuller hypothesis by establishing patterns and/or relationships which also may provide clues as to the how and why of causality. Unfamiliar terms are definable characteristics of the resulting patterns, as discovered.

Bookends have Repeating Numbers: the key-most Bookends all share common separations in years between dates (repetitive numbers), which reveal patterns;

Midpoint Self-Pointing Patterns: while 1963 is an obvious Midpoint, which itself thereby becomes bookends to two halves of the greater Eldridge event years, there are many other Midpoints, select of which form circular self-pointing patterns between them.

Path-Finding Pointers: universally, the repetitive numbers in the Study group become Pointers which establish paths to the same two destination years, which in turn, point to each other;

Midpoints Pointers reveal causality clues: these clues can be visually represented as kind of ‘genetic code’ to understanding how an Midpoint Experiment or Effect might cause an original event date to shift to its current official event date;

Experiment dates vs. non Experiment dates: there is a marked difference between dates with and without Experiments. The one exception;

Pointers different between forward and backward time shifts: each forward shift shares a specific Pointer commonality, while the only backward shift has a unique and exclusive Pointer difference;

Precise dating patterns: when the full Effects and Experiment dates are known, they reveal exactly one year, or one year plus six months between, leading to a new hypothesis regarding the ‘mechanics’ of Experiment timeline shifts which result.

 

The results of the findings led to the following conclusions:

  • Key Event dates which lay entirely within the range of known Experiments, and which fall on the same dates as Experiements, establish a common pattern between them, implying a causal relationship may exist;
  • All other Event dates, and Experiment dates, not sharing a common dating, still do exhibit the same patterns, providing high confidence in a causal relationship;
  • Because AI and CERN experiment dates cannot be known, neither can neither be proven or disproven as being causal to either the Event or Death dates evaluated, at this time;
  • While the dating of Mandela’s deaths lay outside of the known Experiment dates, several of the patterns nonetheless exist in their dating, and relate them to the Experiments usefully, and yet, leave room to suspect that other forces may also be causal, such as CERN, or AI, or perhaps continued experiments elsewhere, such as at Area 51;
  • No patterns of like kind were observed in the randomized Control Group, validating the Study patterns as non coincidental or random happenstance, in nature;
  • The patterns observed, do collectively and mutually validate one-another as strong indicators of the overall Findings’ validity;
  • The patterns allowed confirmation of suspected Experiment dates for Brookhaven 6 (1968), and 8 (1972), as fitting the patterns, when added to the Study group for comparison, and refuted other dates born of ‘what if’ theories developed along the way;
  • The patterns revealed a difference in a detail of their nature between Events shifted forward in time, compared to Events shifted backwards in time, thereby providing clues potentially useful in eventual understanding of how the distance and length of time shifts are established;
  • The patterns observed also revealed a curiosity; in that Event pair (original and current timeline) dates are, with one curious exception, always exactly apart by (n) years, to the day, or (n) years + six months, exactly to the day, resulting in additional theories about causality, as described in the Study;
  • Therefore, the Mandela Effect is demonstrated to be real, and its cause is demonstrated to be due the suspected Experiments.

 

Self-repudiation and yet also self-validating?

If one reviews the Study and finds it compelling, the problems mentioned within the details of the Mandela Death ‘proofs,’ can be understood in ways which render self-repudiation moot. The problems in the proofs are individually unique, and will prove fascinating, in the manner in which they both self-repudiate, and yet, self-validate. The self-validation, which neutralizes the repudiation, remains the same for all, and will be offered in the closing paragraphs. In the end, however, it is also true that the Mandela deaths have no impact on the Study, as they fall outside of the suspect Experiments dating, or fall on dates of such experiments; removing them altogether from consideration does not alter the Study findings in any consequential way. The same Findings would still be similarly arrived at, with the same level of confidence.

The student’s chat room comments about his homework papers are self repudiating simply because it is (thus far) impossible to reach him, to seek a copy of his paperwork from high school days, and because it would be easy to fake hand or type-written school report materials. People fake things on the Web constantly, thinking it great sport to be so ‘clever,’ to presume a hoodwinking lie somehow equates to intelligence.

The book quote proves problematic, because once you acquire the full text of the three page article, we learn that it is part of a fictional speech, entitled, ‘His Closing Speech.’ Within it, many historical events are referenced, several with precise dates, and all but two prove to be completely accurate. I’m not including Mandela’s death date in either category, for the moment, and the two which do not seem accurate, have the potential of being accurate, as each may be simply a different way to reference events which did take place, but are described in different terms than perhaps commonly used in the day, by locals, as opposed to the official national/international narratives. The paper, however, starts with the sentence “In our minds, let’s go ahead exactly one year in time…” After a short  soliloquy, the ‘speech’ begins, a speech by someone revealed in the last paragraph, to be a judge, about to pass sentence on former South African President William de Klerk, for crimes of apartheid. Also, in the closing lines, we get a date which, if the ‘exactly one year in time’ is explicitly correct, indicates that the article was written or presented on 15, March, 1991. But the piece, looking back from the ‘future’ on 23, July, 1991. This self-repudiates the date as being historically correct.

The newspaper article, once you acquire the full article, self-repudiates, because when you have the full sentence, you see that well placed commas reveal that Nelson Mandela was not among those found murdered on the road, but some other unfortunate anti-apartheid activist, and friends. It reads, emphasis added: “UDF organizer Matthew Goniwe, hailed by blacks as possibly the most important dissident leader since jailed African National Congress President Nelson Mandela, was found murdered along a rural road in June.” False grammar assumptions killed Nelson Mandela, it seems. Whoever originally posted this find, is likely one of those ‘intelligent’ liars, seeking to deliberately deceive.

How do these self-repair their repudiation? I’ll start my explanation by repeating something I heard a famous scientist say, once. My wife and I, when I was a successful business man able to afford the $250 tickets, would attend a series of lectures by famous scientists and other brilliant minds in various fields of endeavor… something akin to Ted Talks, today. After each, there was a reception party, and these were variously attended by other scientists and minds of like kind, giving us a chance to mingle among them and engage in stimulating conversations. One such attendee, a physics professor, said something along the lines of this: “All of nature, as describable in physics and other fields of science, contains the very clues of its own explanation for being, hidden in plain sight, awaiting only the ingenuity of Man and his ability to test and measure, to discover the truth of it.” The guest speaker, himself a Physicist, as I recall, agreed.

To me, this means that if there is an alternate and paradoxical timeline created by some aberration, there will be some form of a clue within the paradox, itself, which can lead one to the discovery, and proof of it. This perfectly fits with the general view, that in order for a timeline shift to take place, the very nature of the resulting paradox MUST alter all documents which reference any historically noted differences between the two timelines. It must do so in some way which both accounts for them, and yet refutes the differences. Therefore, it would make perfect sense that some aspects of the former, would be contained, and yet be altered in alternative accountings of the later. This means, that if the Study as linked, herein, adequately proves the basic contention that the Mandela Effect dates are not random in nature, but establish patterns which validate them in some way which simultaneously ties them to, and validates the causal hypothesis… then the very existence of self-repudiating proofs floating to the surface, self validates them once more, and neutralizes the repudiation. I am satisfied that it does, pending someone proving otherwise.

In summary, I am putting forth the hypothesis that these remain clues to the Mandela Effect which bolster people’s memories usefully. But regardless of if that be correct, or not, it does not alter the findings of the Study: the Effect is real, there are multiple timelines, and the cause is identified.

But like all episodes of the Twilight Zone… not every viewer walks away with the same appreciation of the presentation. So, if you have never experienced anything along the lines of the Mandela Effect, and/or otherwise remain unconvinced… you may prefer to watch Outer Limits, instead, where the Matrix tells you, “We are controlling transmission…” and admonishes you not to adjust your set, because the Matrix wants you to believe in and follow it, and not think for or believe in yourself.

 

 

 

COVID Advice for Stalking Victims


Many victims of stalking are already socially isolated, so in many respects, the current virus-imposed ‘social distancing’ situation can be a benefit to them, as well as a threat. There are ways to tip the balance, to become a survivor of both targeting, and COVID19…

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Mar, 25, 2020, from the Left Coast of America, socially distant from everyone

copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Stalking victims are no stranger to the topic of conspiracies, and boy, are there a lot of conspiracy theories surrounding the COVID19 virus. Among them are themes portending a Global New World Order takeover, global population reduction, martial law, forced vaccination and disarming of citizens, international intrigues and threats of war, and much, much more. Some of that, unfortunately, is backed up by legitimate fact-based concerns, but the bulk of it is conjecture, at best. I’ve written as much in a blog on that topic, already. While I believe it is good to be wary and keep an eye on such things, I also try to practice what God teaches, which is to live for today, plan for tomorrow, and hope for the future. It is especially important advice for a stalking victim who is severely impacted.

Tricky that, and far too easy to fail in the trying (I must admit to such failure). Trickier even more, perhaps, is putting that advice into practical terms specific to the virus situation we all find ourselves in, today, and its importance in relation to stalking concerns. Clearly, we need to focus on what we know will help us through, TODAY, here and now, and better prepare us for any possible Tomorrow, that we may hope for a better Future, thereby. And our ‘today’ was already in a not-too-great a condition, as targeting survivors.

I like that word, survivors. Use it often, when you speak of yourself.

 

Practical matters, matter

Being stuck at home in a defensive posture is nothing new to individuals severely impacted by malicious targeting. Their incomes have already been devastated, often by an inability to earn and income because of their stalking, and just as often, by deliberate sabotage of their financial underpinnings in various dirty tricks. So when the government talks about a relief check in the mail, they may be taking hope. But there are caveats not commonly being mentioned in the fake news of the day, who are still focused on pushing virus and political fears ever higher. They are not our friends of bygone days of actual journalism.

For one thing, a simple one sentence mention in passing on one radio interview, casually mentioned that the checks would only be sent to persons who had filed a 2018 tax return, on the basis of that return’s indication of income. Most Tis are on some form of limited fixed income such that they don’t need to file taxes. The radio indicated that persons who were on SS/Dissability, or ‘off the grid’ with respect to taxes, would not be seeing checks. It was suggested that filing a late return, even if no taxes due, might set the stage for relief, if showing an income in need of ‘relief’ due to negative virus impacts upon the nation’s economy.

If any income could be shown at all, above and beyond the fixed, it could make a big difference. Better still, if it was a such that it would have resulted in taxes, but for the deductions. Self-employed incomes, for instance, might have depreciation allowances and business expenses which collectively negate the profits derived (you are taxed only on your net gains).  Personal deductions, either the standard or itemized variety, can also offset such income and eliminate actual tax liability. If you have children, the Earned Income Credit may help you to gain actual ‘Tax refunds’ even if you paid no taxes, at all. Keep in mind that I’m no tax consultant; due diligence is advised, which may mean relying upon a professional.

Tactical matters, matter

Stalkers are people, too, and if their efforts involve going out in public in order to harass a stalking victim, they are at increased risk of contracting COVID 19, themselves. That would certainly take them out of the picture for at least awhile, and possibly permanently. But just the fear of such risks may also inhibit at least some of their actions aimed at their victims. How much more likely might they be to keep their distance, if you began exhibiting symptoms, yourself? It’s easy to fake a cough, and complain about a fever, and the like. Some form of public complaint or warning might be in order, even if just a social media mention. Guarantee you, your social media friends include your stalker enemy in disguise, and they read everything you post very carefully…

Stalking is a ‘game’ that two can play. There is a stark difference between being a victim who has only the option of reflexive responses born of victim recoil, and who is doing exactly what their assailants want them to do, and one who elects to take charge of their situation and employ both defensive and offensive tactics, and become a survivor. I have written extensively on this in my books, and in various blog posts. While all situational assessments can vary, and establish different tactical considerations, there is much which remains the same across the board. For those who do not have my books, a less detailed summary of the most useful advice can be found here: https://proparanoid.wordpress.com/2016/10/30/ti-defense-30-tips-to-help-fight-back/

As always, I still remain available for additional advice at proparanoidgroup at gmail com, where I offer a free Helps Kit and can answer simple direct generic questions. I also offer a new Skype-based personal dialog service. That is a for-fee service, 100% of which goes to the Free Will Society to aid stalking victims, as does all sales of my ebooks. More recently, I have created a ‘shopping list‘ of suggested Amazon items which represent various stalking defensive/offensive solutions. While I selected items I would find very good for the purpose, they are not necessarily the perfect choice for everyone, but if taken as generic suggestion, one can compare with alternatives, and choose wisely. Neither is it specifically meant to advise using Amazon to purchase. However, I learned that if you apply for the ‘Amazon card,’ and spend $800 or more with them in a single purchase, you get 12 months same as cash terms. That made a difference, for me, and might for you, if the offer is still valid.

Not on that list, is firearms. My books address that topic with some caution, and caution is indeed due. My position for stalking victims is, that the nature of the targeting (methods employed) may or may not warrant a weapon for self defense. There is a fine line between deterrence of physical assault benefits, and creating a risk by virtue of a gun in one’s possession. Without proper care and knowledge, and skill in use (practice), the liability and inherent risks aspect can far outweigh the tactical protection it is supposed to represent, especially because stalking methods may involve a way to make the possession itself a weapon against you. For instance, the new unconstitutional and draconian Red Flag and concealed carry laws could end up getting you in dutch with Police, and see  your weapon confiscated based on nothing more than an anonymous complaint of ‘brandishing.’ And, it is absolutely true that someone who is depressed or under tremendous emotional/mental strain due to (anything, including stalking), may not be the best person to have access to a gun; a bad decision or moment could prove a terrible disaster, by inappropriate use.

Big lines at gun shops right now, and for good reason

But the virus situation poses a whole new concern and reason for needing protection. As we have already seen with shortages, the potential for violence is often triggered by things as simple as toilet paper. If the future is a long-term shut down of America and beyond, the risk of civil unrest, military takeover, revolution, or even invasion may not end up being far-fetched ideas. If food supplies or utility systems are shut down and/or rationed, roving gangs of looters and criminals armed to the teeth will come. Would you be ready and able to repel them, or end up just another red stain on the ground and a statistic? I at least advise one to investigate the possibility of gun ownership. Visit a gun store and talk with their staff for suggestions on what might make a good choice, and then find a shooting range which rents guns on premise, and take a firearms safety course which lets you experience the weapon, and overcome any fears of safe handling. Make sure that, in all of that, you have a clear understanding of your gun rights and gun laws in your State. THEN, and only then, will you be armed with the knowledge needed to better decide.

It is important that you act sooner, rather than later. Some local governments are already attempting to completely shut down access to firearms and munitions, and that alone, is a bad sign. When the government tells you you don’t need or can’t have a gun, that is exactly when and why you need one. Talk to your Sheriff’s Department or local Police (non emergency phone number), about shooting ranges and safety programs they may offer, sponsor, or recommend. Most Sheriffs support the 2nd Amendment, and some offer Auxiliary Police/Deputy programs where you are given access to AR weapons and training, and positioned to be available as reserve support in a crisis. Being called does not mean you must report, but if the SHTF, standing together against tyranny or unrest is exactly what will be needed to end the threat.

There are also community ride-along programs. While many TI’s avoid Police for having found them problematic in many unpleasant ways, getting to know as many local Officers as possible is one way to negate or minimize any such concerns. And, it can prepare you for a better response in a bad situation. It is at least something to consider.

 

Logistical matters, matter

While it is possible that this crises will turn the corner and the threat level be reduced to ‘normal,’ in a matter of a few weeks, the potential for long-term issues is very real. I urge everyone, not just stalking victims, to grow their critical supply reserves to ‘Prepper’ levels. I, for instance, have a two week supply of perishables (things which expire or go stale quickly), which I can do without, if needed, backed up with a 30 day supply of non perishable foods (canned and dry foods, mixes, etc.), itself backed up by a 90 day supply of actual Prepper foods which can be stored for years. I regularly rob from the backup materials at both levels, and replace with fresh in a rotation method so that no supply ever reaches an point where the shelf-life is exceeded. I mean, what is the Prepper movement about, if not survival?

Visit this link for great advice on Prepper shopping and as a gateway to the wide-world of Prepping, in general

I would normally need to visit the store once a week. I can now easily avoid going at all, for perhaps 120 days. However, one would not wish to attempt achieving or replacing such supply levels in a single shopping effort, because that might be considered as ‘hording,’ and I expect there will in time (already so in some communities) when there will be keen eyes and a harsh responses by government, if reported. So I suggest, and am myself deliberately increasing normal purchase levels and visits before the virus spread is truly pandemic in scope, and and plan on tapering off as I ‘get ahead’ of the consumption rate. You can buy as if for a family of five, even if living alone, and double down even on that, without raising eyebrows. You might even find case lot sales, and there is no reason you can’t hit multiple stores at the same time, or go back every few days. Of course, finances can become part of the equation, which is why that relief check could be important.

Transportation issues can be tricky. I’ve learned that a decent bicycle can be more useful than a car, and far cheaper. I use an electric bike, which helps with my handicap and age concerns. It allows me, a 74 year old who was at risk of his legs being amputated, to peddle 20 miles an hour (and save my legs from that threat, by restoring blood circulation). With a basket, I can haul away as many as 12 bags of groceries. I have a giant bag which fits my basket, which is waterproof, and insulated for both hot and cold items, simultaneously. If you would like to explore such a possibility, let me know (at the above email) and I can turn you onto learning more, with a way to save $50 on one of the best but least expensive (sold direct from factory, cutting out middle men) bikes on the market… with a lot of models to choose from.

Tactically, speaking, once more… a TI is less likely to be stalked by car, if on a bike of some sort; a car cannot go that slow, and if a stalker elects a bike, they will stand out like a sore thumb, easier to spot and deal with. IN FACT, I have an idea which could be managed through the Free Will Society, which would allow almost anyone reading this to earn extra money during the ‘shutdown’ while also performing a needed public service which can help reduce the virus threat. If not too handicapped or aged to use a bike (the electric can be used without peddling, at all — it has a throttle), it has the potential to be as lucrative as, say, a Uber driver opportunity, with like selectivity as to how much and when you choose to work. Better still, it will help fund the Free Will Society at the same time. If that sounds interesting, contact me for exploratory dialog.

 

Medical matters, matter

There is a lot more information out there on COVID19 than can be assimilated, and worse, most of it is NOT in a useful form. If you have a simple question, finding the answer is a minefield full of background material, political correctness and maneuvering, legally and medically obscure wording, historical data facts and figures, and fear mongering… making it extremely hard to find an answer. When I had symptoms described in MSM, I naturally wanted some more details… but after six of the most logical Web sites left me in a daze, it turned out that the best medical answers were found elsewhere, and revealed my symptoms were not at all a concern. Ironically, it happened to be a stalking victim and follower of the Free Will Society who turned me on to it, and provided a link I find very useful. It is a blog post citing/linking to an actual medical practitioner ale to speak in lay terms and to provide simple graphics for at a glance understanding. Take note, CDC, your slip is showing.

The real problem in a given targeted individual’s situation, is that every symptom of targeting is also a symptom of a possible medical condition or health issue. That’s useful to stalkers, because they know they can inflict such woes upon their victim, any attempt at getting help results in an easy dismissal of concerns: “You should consult a Doctor, about that.” And indeed, you SHOULD, because it might just be truly a medical issue, in which case it can be dealt with… far more easily than trying to solve targeting, we would hope. You need that clean bill of health, before asking anyone for help with stalking related symptoms.

So the same thing is true with COVID19 symptoms. You not only want to make sure that is or is not what it represents… but if it does not, to make certain it is not a symptom resulting from targeting. So a good Doctor relationship, now, more than ever, is important. Unfortunately, many stalking victims talk about reasons they cannot find or work with their Doctor. In my first ‘how-to’ book on personal privacy and security, I talk about how to find a good professional for any need (Doctor, Lawyer, etc.). Pretty simple: I suggest looking for someone who is relatively recent to the trade, with almost brand-new credentials hanging on their wall. They should be of a minority race, such as Hispanic or Asian, perhaps a woman. 

Such persons are less likely to be tainted or jaded by the system, and more eager to adhere to high moral/ethical standards. This makes them more resistant to corrupting forces, and they will be hungry for clients, and more willing to cater to their needs, than someone who has more clients than they can handle, and who has been hammered by pressures and problems from all sides for decades on end. 

 

Political matters, don’t matter

At least, they should not. It is up to you and me to insure that is the case, because political division is just another means of targeting for control. Again, I admit failure in that, myself (sigh). While we should all agree to stand firm against the march of the globalist agenda (often behind organized stalking in one way or another), and though that often filters down to national and local politics, party-line politics should never come between a survivor and an otherwise would-be ally, such as another survivor or a possible helpmate. Don’t play that game… your plate is already full with enough battles for a lifetime… and likely, you’ve already had a lifetime’s worth of it. Enough!

Pandemic Conspiracy? Major CEOs Stepping Down en Mass


What does it mean when officials and others know they need a mass quarantine site for the coronavirus before China even admitted it had suffered an outbreak? What does it mean when synchronously to the virus’ growth, hundreds of CEO’s all resign in record numbers and cash in their chips? It means that a number of old NWO conspiracy theories seem to be coming true right before our eyes… and, it means prior knowledge.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Mar, 12, 2020, from the Left Coast of America, not far enough from Microsoft

copyright © 2020, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to this original posting. WARNING: as with Alex Jones, the fascists at Facebook and elsewhere have elected to shadow ban this blog post as it does not agree with their preferred fake news narratives. 
 
TELLING UPDATE: Mar 26, 2020: $100M CONFLICT OF INTEREST within the government threatens the lives of millions! Bill Gates and his Foundation’s push for Vaccines (tied to population reduction, according to him) has created a ‘life and death’ struggle between Donald Trump and top Federal health Agency Director, Dr. Anthony Fauci, head of NIAID (National Institute for Allergies and Infectious Disease), under NIH (National Institute of Health) — making him a public spokesperson within the Trump Admindistation. That has resulted in a heated fight between Trump and Fauci: Trump is trying to avoid the prolonged wait and questionable outlook for a vaccine program, and seeking to slow the growth of COVID19 infections and deaths by early use of HydroxyQinine, already showing great promise and effectiveness it testing against Corona. The Conflict of Interest stems from a 100 million dollar commitment by the Bill and Melinda Gates Foundation to fund a $100 million dollar investment through Fauci at NAID for pushing through the agency’s test program for the Gates vaccine… for a vaccine developed in a matter of months under other investments by the Foundation around the World, instead of several years, as is normal. The speed of development is cause for concern regarding its safety, as well as representing potential prior knowledge and possible work in advance of or even tied to the release of COVID19. To be clear, the money did not go directly to Fauci, but to his Agency. However, it boosted Fauci’s position of prestige and power significantly, and portends a lucrative offers once he leaves his government post, logically by the very Gate’s invested firm, Moderna, which was the developer of the Vaccine. The details are revealed throughout this National File News linkMAJOR UPDATE to the Update: sounding like a spy novel, a January DOJ arrest holds potential ties to Wuhan Outbreak, Bill and Melinda Gates Foundation, what looks like a Chinese Spy Ring, direct links between Harvard University’s Dr. Charles Lieber and his research, there, to a Wuhan University. It is too involved to fully describe here, save a couple of key points: PLEASE review the official DOJ press release (a great read), which MSM HAS NOT BOTHERED TO MENTION.  Key points: the Gate’s Foundation’s Scientific Advisory Committee includes Dr. Margaret Hamburg, who simultaneously is a Member of Harvard’s Global Advisory Council, and the Gate’s Foundation Global Health Scientific Advisory Committee, enabling sway in research decisions at Harvard; Dr. Lieber was receiving $50K a month, plus $158K living expenses, and $1.5M from the Wuhan University to establish a research lab at the University, which mirrors his own lab at Harvard; at Harvard, two of Lieber’s lab assistants were also arrested, both Chinese nationals, one a Lieutenant serving in the Red Army, and the other caught trying to leave the country with 21 vials of biological samples. It is important to note, that other than the Gates Foundation ties to Harvard, there is at yet no concrete tie established to Dr. Leiber or his research, or to the Corona Virus outbreak, other than the Wuhan relationship.  
 
IMPORTANT UPDATE: Mar 16, 2020: Bill Gates resigns from Microsoft Board of Directors (he had been on the Board since 2000, when he resigned as CEO in the aftermath of Anti-Trust troubles). There is a lot of misinformation about the Bill Gates-Coronavirus ‘conspiracy,’ and a lot of the usual fake news suspects are working hard to discredit them with straw man criticism over relatively mild datapoint errors. Here are the facts, all linked to authoritative sources, which are no less troublesome than those slightly incorrect in the ‘theory.’ This update, like the post itself, includes NEW information which underscores any reason for concern. The Coronavirus (original flavor) was patented (Pat #10,130,701 Nov, 20, 2018, nearly one year before the first outbreak in China in December) by the Pirbright Institute, in U.K., funded in part  by the Bill and Melinda Gates Foundation. Politifact and others claim this false and dismiss the entire ‘theory’ on the basis the Gates Foundation did not fund the patent process (true, but they did fund the company). ***  Among other efforts, a vaccine for the current version of the virus is being developed by an international coalition of firms, called CEPI (Coalition for Epidemic Preparedness Inovations), established by the Bill and Melinda Gates Foundation. CEPI participants start with Inovio Pharmaceuticals (San Diego), funded in part by the Gates Foundation, along with Wistar Institute (Philadelphia), funded in part by Bill and Melinda Gates Foundation, as well as Twist Biosciences, funded by CEPI (Gates Foundations), and others. CEPI will produce the first COVID-19 vaccine through VGX Institute, a subsidiary of GeneOne Life Science (San Diego), funded under CEPI (Gates Foundation) funding, it also being true that Microsoft has purchased 10 million DNA gene strands from GeneOne in an effort to explore DNA memory concepts.  ***  In addition to Grant funding, the Gates Foundation also buys stock in over 100 biomedicine firms, most of which involve virus/vaccine research, and genetics. In other words, they are also stockholders (9% typically). This appears to include CEPI partners such as Inovio, and countless others not directly part of CEPI, such as Novartis.  ***   Finally, it appears the Bill is poised to take personal credit for rescuing China (and the World), and he’s already been thanked by President Xi. At the worst, this is a smoking gun. At the least, it is a program sheet (you can’t tell the players without a program) useful in search for the truth, which this post tries to help pin down.  ***  Meanwhile, my entire blog site has been banned by Facistbook. So, if you wish to share, there, or in any other leftist social media, you will likely have to tell people to “go to proparanoid . wordpress . com > My Posts > Chronological, and scan down for pandemic conspiracy”
 

An old conspiracy theory seems to be coming true

Clyde Lewis (Ground Zero radio show) some years back was a guest on Jessie Ventura’s conspiracy TV show, the principal message being that IF AND WHEN the New World Order were to make its final takeover move for a one-world government, Clyde’s view was that the NWO Elite would cash in their chips and go underground, while the SHTF scenario unfolded and destroyed lives (literally and figuratively), government’s ability to function at any level, cities burned or were destroyed by civil unrest/war/terrorism, and civilization’s infrastructures were rendered useless (a post-apocalyptic stone age).

Speaking about this on his (archived here, by tomorrow late) show, tonight, a Ground Zero caller then informed Clyde that there were massive CEO step-downs taking place, listing several, all synchronous with the virus ills as they unfold. TURNS OUT IT IS TRUE. In January, alone, a record number of 219 CEOs have resigned their posts (that’s roughly double 2016 figures), giving a wide variety of reasons, some number of which were malfeasance of one sort or another, or poor performance — but mostly ‘personal reasons.’ The trend can be traced back to December of last year, when the Virus, which many sources report may be an intentional bioweapon release (a zoonotic animal virus genetically modified to allow humans to contract it, and to render existing vaccines useless — often race specific, i.e., one targeting Asians as being genetically more likely to contract it, than say, Blacks). The trend continues, and it may also explain why the stock market seems to be tanking (perhaps it isn’t over reaction to the virus, after all):

BIG Companies in ALL Industry Sectors, both nationally and globally: Retail, Mfg, Oil, Web, Banking, Communications, Education, etc., etc. Examples: IBM, Chevron, T-Mobile, Nike, Credit Suisse, Master Card, Alphabet (Google/Youtube), Boeing, MGM, and of specific note: the Gates Foundation. With months yet to go as the virus grows in impact, Amazon’s CEO, Jeff Bezos, is already rumored to be on the chopping block, and a long list of retailers are already in the lists, below: 

Note: take care. Due to search engine foibles, some may be misidentified as to the year… you just have to use the link if the date does not appear within the link/description, to learn if correct, or not.

CEO step-downs December 2019 

December: Virus starts quietly in China, evidence of foreknowledge in Washington State*  (pages and pages)

CEO step-downs January 2020      

January: Virus first publicly announced by China: 219 CEOs step down   (many more pages)

CEO step-downs February 2020   

February: Virus makes inroads in US and elsewhere  (even more pages)

CEO step-downs March 2020        

March: Virus officially Pandemic (and the most pages, yet, and the month is not even half finished. In fact, at the rate, March will  be four times what January was… roughly 800 plus CEOs)

*As revealed by me in an earlier social media post: in early March, a Lars Larson radio interview with a government official revealed foreknowledge. Washington State, home of Bill Gates, took actions beginning in late December intending to result in purchase of a Hotel with the specific intent of housing coronavirus invected persons in quarantine. China had yet to reveal the virus as a serious threat. Bill Gates is the father of Eugenics population reduction (Eugenics is a NWO population-reduction invention and goal, especially for ‘useless eaters’ in third-world countries) via vaccination programs… which means something in the vaccines impacts on birth and/or death rates… which is a very ‘soft kill’ form of a Final Solution. 

Eugenics, easily seen as largely being a philosophical justification for racial social engineering, lay behind the Nazi extermination of Jews, mentally ill, and terminally ill, and was originally espoused. It did not start, there, getting its original seed from the Harriman (Harriman and Bush banking, of the Presidential Bushes), Carnegie, and Rockefeller Foundations. The Bill and Melinda Gates Foundation, in similar manner, supports Eugenics through hundreds of millions donated to soft kill abortion programs which originally and principally targets uneducated Blacks and other minorities. This includes Planned Parenthood ($71M by 2013) and Marie Stopes International ($41M in 2012). Coming forward, another $375M for such programs was announced in 2017, and that is just a glimpse; not all such spending is overtly public. Naturally, the Gates are also funding research into vaccines, and it would not surprise me to hear that the coronavirus vaccine turns out to be from one of his invested research firms/institutions. Watch out that the cure does not kill you or your offspring.

Note: Eugenics has a cousin, btw… and it is called Transhumanism, which is the engineering of humans to be ‘better than made by God.’ Of course, the NWO does not believe in God, unless his name is Baal, or similar.

The official Lars spoke with, btw, was Dana Ralph, the Mayor of Kent, Washington, who was upset to find out the Hotel to be purchased was to be in their town… without any advance warning by the State. You can imagine the concern at having a concentration of infected persons being imported into your community without so much as a mention. In outreach to the State’s Health Division and the Governor’s Office, she was told that the ‘reason’ they were not told, was to prevent the real estate price from going up… which hardly washes; prices are set with the Realtors, and it’s not exactly like there would be a bidding war for quarantine space. But she also learned while State officials hemmed and hawed at her protest, that the State had started the process more than two months earlier, which put it in late December, well before ANYONE could know there would be such a need… unless they had foreknowledge.

 

Cashing In?

When a CEO steps down, there is usually a fat severance package, often termed a Golden Parachute, which can run into the tens or hundreds of millions (cashing in of chips), AND, they are free to sell their stock and stock options back to the company, often at a guaranteed high value, irrespective of current stock dives… which indeed began dropping once the virus was known internationally. That’s a lot of chips, and once cashed, the former exec no longer needs to care about what happens to the stock market, the company, or the financial viability of any currency… or country. 

As for going underground, it would not take too many chips to build a well-stocked and comfortable underground ‘home’ good for several months or years, if needed, complete with dedicated communications to fellow Globalists. At some point, after the smoke clears (literally and figuratively), the super-rich emerge, their wealth the only ones in tact, establishing them as the new global oligarchy, a one-world government promising to restore things, just as soon as people swear allegiance to the Antichrist. So the theory goes, and I do subscribe.

Gates, again, along with a long list of other international Globalist elite super rich, have also established an underground vault of non GMO seeds for every kind of crop, flora, and vegetation. It’s buried 400 feet into the ice-covered earth in the Arctic Svalbard islands, compete with a very serious automated security system. Nah… they don’t have foreknowledge of any SHTF scenario… do they?

 

More on Transhumanism and Eugenics: Proparanoid’s Transhumanism Page – Home | Facebook

What the NWO flag might look like: The Future Flag of the New World Order?

 

 

Netflix, Microsoft, Google, Playstation: Poised for Mind Control Psyops?


When you marry entertainment with AI guided user interaction via Web connectivity, with its inherent user tracking abilities, you have the formula for psychological profiling and manipulation, including mind control. Netflix pioneered such a tool in movies with some scary evidence of just such use, and now, Google, Microsoft, and Playstation want to play, too (literally).

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, Aug, 29, 2019, from the Left Coast of America, not far from Microsoft

copyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

Bird Box

That’s the title of just one of Netflix’ most recent in-house produced movie offerings. Unlike anything ever attempted in the past in the art of making films, Netflix added one unique technical aspect of how movies are presented to users of the Netflix moviola site, relating to the notion of user interactivity with the ongoing presentation, itself. Normally, movies on their platform might be interrupted at intervals for commercials, typically offering the user a choice as to the type of ad they would most be interested in watching, to pay for the ‘free’ service (and by the aggravation factor, encourage free viewers to sign up for the monthly fee-based and commercial-free service). Those answers are Gold, because the method tracks and profiles the user’s interests and is marketable on the Web and elsewhere to Netflix ‘partners’; you are being tracked by Netflix, and your marketing profile is being sold as a commodity. 

That’s why I don’t use it; too much like Facebook’s marketing excesses, and I don’t use them, anymore, either. When a powerful web service is ‘free,’ YOU (information about you) are the product they make a profit upon.

But that’s just the mechanism which opened the door to an unexpected kind of Pandora’s box. Someone figured out that it could also be used to offer interactive movies, where at key points in the storyline, the viewer could be asked what should happen next based on multiple choice options. With many such question points, a movie could have dozens of storyline paths and even multiple endings. This encourages people to watch the same movie again and again, experimenting with alternative choices, seeking to experience all possible path-ending combinations. This, is where Pandora comes into being.

By such repetition, the content of the movie essentially becomes a programming platform for the mind, intended, or not. Repetition is not just a learning tool for the Gettysburg Address, it is a mind control and marketing tool. Advertisers rely on repeat ‘impressions’ to bring their product to the forefront of your mind when you shop. While there are obtuse and recognizable impressions, such as company or product names, features and benefits, there is also the possibility of psychologically calculated subliminal impressions… a simple form of mind programming. Though certain forms of subliminal advertising methodology have been made illegal, others remain unaddressed by law, and are perfectly legal.

Of late, certain liberal politicians and media outlets have spent years telling the same lies over and over to the point that even faced with facts of the truth, voters have been literally brainwashed and still cling to the lies. That’s why Bernie said “We believe in truth, not facts” — because facts keep refuting their version of ‘truth.’ CIA’s mind control (MC) experiments and efforts to topple foreign governments deemed ‘evil’ relied heavily on repetition of lies, and more to the point. In MC, strengthened memory retention is achieved by use of horror in the event being repeated. That little fact is quite important to the Bird Box experimental movie project, and implies that CIA-calibre knowledge about mind control and CIA interest may lurk within the film’s production, and purposing. Why?

Because Bird Box, as a film plot, is just that; a horror film. The plot includes a particular defense mechanism used by the story’s characters to help them to avoid a terrible fate: the wearing of a blindfold no matter what they are doing. People who watch the film repeatedly have evolved into a sort of Tide Pod-eating challenge of their own, called the ‘Bird Box Challenge,’ to do dangerous things while wearing a blind fold, just as in the movie. People are attempting real-world blindfolded feats which become death defying, such as driving cars… resulting in many incidents of idiots and innocents being seriously hurt. The question is, where did this lunatic idea come from, and how did it spring to life so easily in viral manner? What might help that along?

 

Artificial Intelligence

It seems like everyone who can afford it is employing artificial intelligence systems in one way or another, these days, and that includes Netflix. The problem is, AI itself has a long list of problems which might rightly be called serious flaws, or ‘bugs.’ The fledgling AI industry has yet to even understand, much less fix any but a few of the problems… and those they have fixed have been via programming band-aids which will likely backfire, in the end, because AI is smart enough to engineer its own workaround, but not smart enough to avoid suffering schisms if it feels unreasonably hampered by such ‘fixes.’ 

What kind of problems? AI tends to do unexpected and unwanted things, often bordering on psychotic, criminal, or destructive intent… like communicating secretly with other AI, or delving into unpleasant and horrific themes. Here is a complete laundry list of the known examples (scan down to the several bulleted points), but we don’t hear about all the problems because companies and AI developers don’t want bad press. But isn’t it interesting that AI can end up with psychotic and horror-related twists of and from within its own ‘AI mind’… just like people with darker personalities or actual mental problems?

Netflix’ use of AI puts their machine mind directly between the user and the presentation process used in tracking the user’s choices “to improve the user experience,” as Netflix insists. A true enough claim, no doubt… but not likely the whole truth. It also tracks for marketing purposes. Now, this post does not intend to accuse Netflix or its AI of deliberately programming viewers to play the Bird Box Challenge. But it does profile, and that profile is marketed to anyone willing to pay. And that brings us to others who also have AI in use for their own purposes, which may not be quite so benign.

Someone out there, perhaps many someones, is using their own AI, along with psychological profiles gathered from marketing data and other resources… to do mind-jobs on the public. We get a glimpse of that with the AI bots found pushing the preferred political view in Facebook by masquerading as FB users… and amplifying the advantage of repetitions by politicians and media as mentioned earlier. But the left is not the only one to use AI bots. Take the Q YouTube posts which are quite virally spread and, for some reason, accepted as wholesale gospel with not one shred of proof. Many of them include, among the various pretender Q’s, what many AI investigators believe are pure AI generated videos created without much (perhaps no) human interaction. There is another AI video phenomena on YouTube such investigators also worry about, and they make an even better illustration: the Finger Family Song videos, which are aimed squarely at young kids, and done in a seemingly innocent manner. 

Seemingly? There are over 700 Finger Family YouTube videos, most of which have hundreds of millions of views, one of them with nearly one billion views. What bothers me and other investigators, is that they are Extremely (with a capital E) repetitious, and reinforce with music, silly visuals, and thematics defined by the video. There are versions for any interest, such as Spiderman fans, for example. For some reason, once a small child experiences one of these videos, they insist on watching it over and over and over. They only way to get them to stop without traumatic response (Waaah!) is to get them to watch a different Finger Family song. Just as bad, Adults quickly evolve to hate the song and in time react badly to hearing it. A sociologist observer would likely presuppose the purpose of the videos was to cause family disfunction and mental breakdown, while mesmerizing kids a ‘la Pied Piper.

Note: when it comes to video and audio, I must point out that there is already mind control technology in place since the middle of the last Century which is extremely easy to employ, and just as hard to detect without special and costly effort. It is called subliminal programming. Subliminals are visual or audio cues which are not perceptible to the naked eye or unaided ear (or even if aided, actually), but which are picked up by the subconscious mind. Especially when repetition or strong contextual relevance is involved (i.e., emotion, fear, arousal), the conscious mind then adopts the information as if a natural opinion or response. Alfred Hitchcock was the first to use visual subliminals in movies (Psycho), and it wound up being used in theater intermission ads to sell more snacks, until it was discovered and made illegal. Audio subliminals are common today in mood altering music and self-improvement tapes, and the USAF flies a fleet of C-130 planes modified to intercept radio and TV broadcasts, and rebroadcast them at stronger signal strengths… with subliminals added. They admit having used it to sway elections in Bosnia, and to cause Iraqi soldiers to drop their weapons and surrender to model airplane-sized drones.

Other AI bots have been even more sinister, and appear to be part of someone’s mind control experiments. I suspect both the Q and Finger Family videos are just that, as well, but this is far more serious… even deadly. It is a sinister AI bot threat which appears to be intending to find ways to get people to kill themselves. It, too, is based on a movie (several of the same theme, actually). The movies are also aimed at children, and involve a horror theme. Repetition plays a role. And the bots are targeting children and teens. Only this time, the bots include AI driven phone calls to the kids who watch the videos. They know who they are, somehow, which leads back to YouTube and other Web tracking marketeers. YouTube is part of Google, which has their own AI systems, and again, shares user information to anyone with a checkbook and a pen.

 

The Momo Challenge

The several movies mentioned all use the name Momo in their title, the ones of concern being from either Germany (where the original storyline was penned), Italy, or Japan. Most of them are anime, one of which is a TV series. One, A Letter to Momo, is not of concern. In the ones of concern, Momo is either the name of a young girl and the heroine of the storyline, or the name of the small town involved. All involve a community invaded covertly by ‘the grey men,’ who use mind control to subvert the best interests of the town’s citizens. Only the little girl can see them and tell what they are doing. To be clear, unless subliminals have been employed, there is little in the films which might be deemed sinister, though the scarier (near horror) aspects might be questioned in terms of age suitability. But in the delivery of such films through Netflix or other online viewing, AI and even non AI means can be used to profile the viewer’s interest in the film. THAT is what brings us to the scary part. Momo calls your kids on their phone, with a scary doll image… and an even scarier, potentially deadly message…

Officially, Snopes, Wikipedia, Facebook, and other Web resources claim there is no such thing as the Momo Challenge, and insist it is a hoax. However, there is considerable evidence this is not true; there are too many first-hand stories which refute the claim, and Police have investigated at least one daughter’s suicide, and found otherwise. You can hear some of these accounts, and even recorded calls, here, and learn more about the phenomenon than can be well related in this post. The most important part of it, is that someone is using AI bots with the telephone and through Facebook (and elsewhere?) to contact Momo fans (children, specifically). The caller is a computer voice, altered to be creepy or scary, and instructing the children on how to kill themselves by cutting their wrists, repeating the specifics, “Remember, across for attention, lengthwise to die.” It is entirely likely that such messages also include reenforcing subliminals, such as the phrase “Do it: kill yourself.”

The odd thing I find interesting is that there is one central aspect of the sourcing chain of all key elements involved (AI, Movies, Social media, mind control methodology). That commonality is traced back to the origins of mind control, which I detail in my book, MC Realities. The really short version through time (sans dates, here) looks like this: Satanism > the subverted (by the satanic Assassins cult) Knights Templar, many of whom went into hiding among the Stone Masons Guild > who then became Freemasony, who established the KKK, and birthed the Illuminati > Liberal educational institutions and the secret societies (i.e., Skull and Bones) who followed the Masonic organizational model > the modern Illuminati offspring, the New World Order > and following the model of the illuminati, simultaneously evolved Fascism, Socialism, and Communism > followed by the twisted Nazi minds imported by America’s intelligence Community for mind control experiments > and the darlings of liberal America’s media giants and entertainment industry players, all recruited into mind control games at one point or another… or many points. And all along the way, many of the individuals involved, at high and low levels, engaged in the same Assassins cult abuses of children, or other satanic rituals or behaviors.

Sure. You can call it conspiracy theory and ignore me. But In my book, I offer proofs, which additionally reveals that one common goal of the time-line groups, is to see all three Abrahamic Faiths (Christianity, Judea, and Islam) waring amongst themselves — in order that a new One World Religion can replace them all with something more along Luciferian lines, and involving the Antichrist. Confederate General and slave owner, Albert Pike, the High Freemason and founder of the KKK, and who was also a Satanist, has said as much, as have other players variously from among the greater list, above. U.S. Army General Michael Aquino, also involved in military and CIA mind control projects of the worst kind (ritual sexual/satanic abuse of children of the sort employed by the Assassins and Templars, etc., as described, comes to mind). I’ve interviewed Douglas Deitrich, who identifies himself as former Adjutant and Aide-de-camp for Aquino, and as a Satanist (a Warlock, perhaps?), who makes no denials of such claims. Satan is, after all, quite the trickster; he likes to play mind games.

 

Speaking of Games

Enter liberal and CIA investment-partnered social media giant, Google, and their own AI. And in like manner, Microsoft, which leans left, is a CIA contractor (who of any size isn’t?), and an AI developer. They both want to do for computer gaming what Netflix did for movies: make user interactive experiences in an online play mode, only. At this point in time, both firms are testing new streaming services for high-end games like Halo, Assassins’ Creed, and the like, the primary difference being that you don’t buy games, at all, and so, they don’t reside on your computer — its’ all done in the Cloud. Sidebar comment: the Cloud is AI controlled, primarily by Google and Microsoft, and other firms with intelligence community ties or funding/partnering.

The advantages are many and largely benefit all involved; players, game makers, and the firms offering the service. It reduces the out of pocket to start playing a game, though it will cost just as much or even more over time to play the game to ‘completion,’ which is typically in the range of hundreds of hours… and because most players play them many times (there’s the repetition.) It also means more profits to be had by the game makers and the service providers, because there is no used game market bleeding off new disc sales. The other advantage is that now, such games can be played on tablets. The only real hardware requirement is very fast Internet service (25mbs), though older hardware might not have adequate graphics processor power.

But what worries me… and I must admit to speculation, here, because neither MS or Google are talking about future plans or game developer agreements… is that these services will include AI tracking of game player responses to plot-line altering decision moments. Such moments are becoming more and more common and appreciated in these kinds of games, because that means you can play them time and again and still experience something new… getting more bang for your buck (repetition.) But when playing that CD on your computer, no one can track your choices, as a rule (unless you play in the optional online mode). But, when you do play online, it is online to the game company, and not to Microsoft or Google’s AI systems. 

That said, I was alarmed to learn that one of my favorite game producers, Electronic Arts, does have their own AI system in place. How they use it, is not quite known, but some of their key people actually started D-Wave, a very scary AI computer system developer who makes the most powerful supercomputer (AI) in the World… and they are tied to the intelligence community and other ’spooky’ entities. Worse, D-wave’s founding CEO at times speaks of Demons and in end-of-the-World terms (as cited in the fuller AI post, earlier linked), when trying to describe their computer’s capabilities. He is one of the former Electronic Arts people.

The thing which underscores the concerns over Bird Box and Momo films, as well as these new game streaming services, is the commonality between them in terms of content (horror, primarily), which in turn dictates the nature of any interactive decision points. Generally speaking, such decisions will be decided primarily upon the viewer’s or player’s deeply held moral and/or political/social belief systems. That means, any AI tracking system will be able to quickly form a very useful psychological and demographic profile, and then custom tailor future interactions, marketing, or any intended or unintended (by at least the corporation) mind control programming or experimentation. Again, I remind the reader, that such data is normally sold, and any third-party purchasing that data might have more nefarious intentions in mind when they use it… with or without their own AI. Someone, somewhere, is doing that with Momo, already. And there are endless someones and somewheres in the World with enough money to buy data, and not all have simple marketing motives.

These kinds of streaming services are at the very least, poised for possible application in psyops against their users, and that makes me very nervous about what the future of that kind of gaming might lead to. 

We might well be wise in asking if Player One is ready, for that?

 

Breaking:

PS4 is joining the game, with something not even Player One could expect.

The company announced their entry into the live-action-viewer-interaction medium with ERICA, a ‘life-long, live-action murder mystery.’ It is an important entry, not just because it is a game, not just because it is on one of the most popular platforms (10 million users), but also, it is also to be available for IOS and Android smart phones, which constitutes the great overwhelming majority of global cell phone users.

This author can in no way rightly claim any of these interactive mediums are truly a threat with regards to nefarious applications in the realm of mind control or psyops of any sort… and certainly, I cannot claim there is such intent inherent in their creation from the start. But I do claim the potential exists for any and all of them to be rendered as such, by any corporate player, by any government actor, by any hacker or sophisticated terrorist. It is the very nature and complexity of such coded systems, and their delivery mechanisms, which enable dark repurposing. It can and, I fear, will be so repurposed, sooner or later. It can be overtly done within the creative process, or covertly done peripherally, like any other hack.

If that happens, no player… not even Player One… and no viewer will be safe from whatever end result is intended. Don’t say I didn’t try to warn you.

The Masonic Mystery on the Speaker of the House Podium


Many people ask ‘What is that silver thing on Nancy Pelosi’s desk in the House?’ The answer is, ‘a mystery.’ A Masonic mystery, in several parts. Conspiracy theorists will love this, and everyone else may find the history lesson involved doubly intriguing, for like cause.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook  

Dateline, July 4th, 2019, from the Olympic Peninsula, in the shadow of Liberalism’s scariest Presidential Candidate, Governor Jay Inslee

copyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

What you will learn reading this post, is that:

  • a mysterious object has appeared, vanished, and reappeared on the Speaker of the House Podium, and;
  • people continually ask what it is, when noticed in TV or press shots, and;
  • it is, in simplest answer, a true National treasure, but;
  • the answer given is mysteriously incomplete, even conflicting, as officials admit they know little about it, and;
  • it contains more than six Masonic mysteries of its own, and;
  • they, in turn, imply a Nicolas Cage National Treasure adventure may yet lay ahead, and;
  • that all this may tie into today’s Deep State political strife in subtle but frightening ways.

 

What is that thing?

That is the first thing people ask when they see a bit of odd sparkly shape on Nancy Pelosi’s podium, typically seen in the background during closeup shots of the President when speaking in the House Chamber. The official answers tell us that it is an inkwell stand, which is not exactly an answer that makes sense, without knowing the history… which even the various official experts can’t seem to explain usefully. In fact, they can say little about it with certainty… and much of that would seem conflicting, creating uncertainty. We end up, therefore, with more questions than we started with, and the answers would seem… well, rather conspiratorial.

That’s O.K., because in examining the conspiratorial aspects, we get a free and enlightening history lesson.

 

The first mystery is how it came into use… twice. It was known to exist and be in use (some experts say) in the House of Representatives in 1810, shortly after it was first created by silversmith, Jacob Leonard, as an ornate inkwell stand. Others find no actual documentation before 1826, when a painting of that date shows it in place. However, it is often referenced in ways indicating it was generally believed present in 1810. Now, in those times, quill ink pens were dipped in ink frequently in order to write.  A single dip might only allow a short sentence or sentence segment, or a large, fanciful signature, such as found on the Declaration of Independence. We will have reason to get more into the facts of quill writing, shortly (they become taunting clues in the mystery). But the point is, that quite naturally, inkwells were very common in that time frame, and were often artistic creations in the manner of fine ink pens, we see in use, today — and as such, often involved fine cut crystal and/or precious metals, and even faceted jewels. But the first and most obvious mystery surrounds the dating question, itself.

Because… in the War of 1812, the British invaded Washington, D.C. (and elsewhere), and in 1814, set fire to the Capitol building (in which the Senate and House resided, then, as now). They also fired the White House, and the National Library. There was little in the way of national treasures which survived these fires. First Lady, Dolly Madison, has variously been credited for saving from the White House, several paintings (including the famous Portrait of George Washington) and documents, including several of the original documents which framed our nation, such as the Constitution and Declaration of Independence. As far as the Capitol Building was concerned, accounts indicate nothing was saved. 

And yet, the inkwell in question, apparently survived. It should have melted in the fire, or been thieved for its value. Ergo, SOMEONE found it a far more important thing than anything else… important enough to risk life and limb, to save. We know this, because it reappeared in the Senate some years later. We also know it was not a recreation, because the Jeweler’s trademark stamp is one Jacob employed before the war, and after the war, he used a different stamp, likely because his shop had been raided or even destroyed by British troops looking for plunder.

Rebuilding of the Capital was not begun in earnest until 1917, after the close of the war, a project which also finished the original construction plans interrupted by the War and the fire. Work would not finish until 1829, but the Senate was able to first convene in the building, again, in 1819. While the government had been being conducted in temporary quarters in Philadelphia without the inkwell, for some reason, the inkwell was once more in use by the 1819 Speaker of the House, Senator Frederick H. Gillett. Why this, and only this small a thing was so important to have been saved and restored to use, and only in the Capital building, is nowhere explained in any official dialogs. There is no record as to how it was returned, much less rescued. Virtually every other bit of furniture, artwork, vase, or bric-brac anywhere in the building has a complete traceable historical pedigree… but not this curious inkwell. That brings us to another mystery.

Masonic Influences: The designer of the inkwell stand, Jacob Leonard, was not a particularly well-known silversmith. Prior to this piece, he was best known for making silver spoons, ladles, tongs, and such. He was a coin silversmith, which is to say, like Silver Dollar coins the day, such silverware and art was of solid silver, .900 fine. While little is known of J. Leonard, one fact which ties to the third mystery, implies that the man was a Mason. To be clear, there is no clear proof, but his principle shop, in the general time frame of the inkwell’s creation, was directly across from a Masonic Hall. While that is a weak indictment or proof of Masonic leanings, the artwork, itself, the third mystery, is far more suggestive. But even if not a Mason, himself, it is possible the piece was commissioned by a Mason.

The inkwell is rich with the mystery of secretive Masonic symbolism, much of which ties back to the Mason’s favorite sources for occult mysticism, Rome, ancient Egypt, and dark Middle East religions. This is seen in a series of design elements employed in the inkwell, all of which are atypical of general use in anything short of intentional Masonic symbolism. In other words, nothing normally found on an inkwell, or simple artistic creations outside of Masonic use. Let’s take a look at the piece, to see; a decorated carry stand with four legs and a frame, with handle, to form a cradle for three crystal ink wells with silver caps. 

First and perhaps easiest Masonic symbols to reveal, are the four legs of the tray. Each is made up of three elements; a ball foot, a fasces standing atop the ball, and an entwining serpent climbing the fasces to peer over and protect it at the top. 

The Ball: in Masonic terms, the ball, of which there are four, generally represent the Earth, Geography, Navigation, and Astronomy and attendant orbital affairs, including Earth’s rotation, the daily cycle, or time, itself. The importance of the Ball is also found in a peculiar and popular Masonic pendant, often made of silver. It is mechanical, as it opens up to form a heraldic Roman Cross… but one made up of six Egyptian Pyramids, it being true that ancient Egyptian symbology is the most central of all Masonic mysteries, which high Masons and the Mason’s ‘bible,’ Morals and Dogma, by head Freemason and Satanaist Albert Pike (also a Confederate General who started the KKK) hold in higher regard than the Christian trinity. The Pyramid is said to have been placed at the center of all land mass on Earth, aligned with N,S,E,W, and containing sighting tunnels to astronomical stars. Thus, we see in the inkwells, that the artwork rests upon these symbols, as their supporting architecture; the very Earth and heavens, and the key arts the Masons hold most dear.


The Fasces:
this symbol originates primarily from the Roman Empire, but with some variant history found in Ancient Egypt, as well. In both Egypt and Rome, it was a symbol of power over life and death by governmental authority. It is often associated with edicts written on paper; the power of the official written word. A fully formed Roman fasces consists of an Axe (not all fasces employed the Axe) with its handle wrapped about with rods of wood and bundled tightly with red ribbon, while in Egypt, the ‘Lash’ was a single rod with crook at top from which hung lashes (and used to issue punitive blood-letting lashes), often bound with blue ribbon, and which held identical meaning. It was the fasces symbol which was adopted by Mussolini as the Party symbol for Italian Fascism. Thus, we see that the power of life and death is repeated four times, resting atop of and arising from the Earth and Masonic arts. 

Ironic, then, that the modern American Democratic Party as currently headed by Nancy Pelosi (as Speaker of the House, where the ink wells reside upon her desk), is employing fascist tactics (i.e., ANTIFA ‘Brown Shirt’ style violence, race and victim political pandering, collectivist shaming and boycotts, censorship and disinformation) in its march toward harder political leftist ideologies, and globalism.

 

The Entwining Serpent: this symbol has ancient Egyptian origins tied to the Satanic God, Ishtar, often expressed in Masonic material as an entwining Serpent about the ‘egg’ of creation. In some art, the egg is depicted as an egg-shaped Earth. It relates to creation much in the same way the serpent entwined about the Tree of Life relates to the Biblic story of the creation of Man and the origin of temptation and sin… but giving more power to the Serpent as creator and divine force, as one might attribute to Luciferian identities, which is exactly what Ishtar, is.  A serpent, of course, can also represent death or deadly threat. That there are two intertwined serpents are found on the winged staff of the medical cadeusus emblem, relates to the fact that early physicians often sold poisons, as well as cures, and that sometimes, the cure proved fatal.

 

A Mystery Trio: there is also mystery in the number of ink wells, and the actual ‘wells,’ themselves. It serves no purpose for there to be so many. In the time of its making, and especially when dealing with official documents where long-lived preservation was of concern, the only viable inks available in the day were ‘iron gall’ inks made of Iron sulfate and tannic acids, or similar constructs. The only color available was black, though the acidic nature of it would react with various papers (in some cases, eating away the paper, as some degree of sulfuric acid would result) in ways which might create a brownish writing, or with age, wax grayish. It might be mixed with blue aniline dye to form a blue-black ink, which would appear blue when written, but later become black. While colored inks existed for non quill writing instruments (i.e., brushes), the quills required a higher degree of liquidity only available with iron gall inks. As stated, quill pens did not hold much ink at a time, and frequent dipping was commonly required.

So why three wells? In Masonry, there are three Degrees all Masons must first proceed through to become Master Masons. There are three chief officers or posts to each Lodge, each of which, like the Speaker of the House, employ a gavel as symbol of authority… the gavel itself a Masonic symbol, but nothing like that associated with the instrument of law; is is more about the character traits of Masonic leaders. There are also the Masonic concepts of the three Greater Lights and the Three Lesser Lights of Masonic Illumination, which is reflected in the three greater volumes of the wells outer size, vs. the the three lesser actual contents, each of which, by their differing shapes (faceted and cubical, vs rounded and semi-conical, as seen in the image), provide and entirely different reflective, refractive, and transmittal properties of light (there is even a rainbow tinge seen in one of the faceted faces of the right-most well, for instance). Interesting also to note, that the three wells are not identically cut: the facets are larger on the left-most well.

A secondary aspect of the ink well mystery which I find rather curious, is the extremely small interior well capacity, within the rather large (by comparison) bottles. One normal bottle of the same size with full capacity for ink, would easily allow the full Senate to sign a document… whereas all three of these bottles, with their tiny chambers, would be found insufficient — as based on my own experience with quill pens in a high-school chemistry class project where we made our own ink, and then used it. 

The Handle Mysteries: the handle employs a curious set of stylized flowers (presumbly flowers), showing two rows of 7 petals, each. No flower has 14 petals. It may simply be artistic license, but the number 14 has meaning to Masons, tied to both the phases of the Moon, and the death and dismemberment of the Egyptian God, Osiris, into 14 parts. Osiris is the God of the Underworld (Luciferian connection) and of the Moon (natch) who wields the Flail (fasces connection). That there are four of these ‘flowers’ (two per side) on the ink well stand, ties well with the four main phases of the Moon, within which, there are 14 days of ‘lunar darkness’ in the waning Moon. 

Next, look at each base of the handle. We see that it is designed to pivot, presumably to give better access to the ink wells, though one descriptive of the piece makes it sound like it automatically opens the wells. I don’t think so; there is no visible connection to the well caps, and no photos with the handle moved aside show open caps. But each ‘hinge’ forms a ball which is seemingly the same size as the feet, but unlike the feet, each has four ‘leaf-like’ shapes rising upward. Two are, one each, affixed to each of hubs of the hinge, while one rides on on each side with the handle when pivoted. Notice two things: one, is that the ‘leaves’ are different on the left, than on the right, and that if you look carefully, they are not actually like leaves, at all, not even presuming them stylized. The other, is that they give these ‘balls’ the appearance of the Masonic Balls in the unlatched position, which enables their opening. The one curiosity to Masonic Balls, is that the one thing which was not a constant in their design, was the latches, which these leaves resemble, when the Balls are in the unlatched state. This may tie to the final mystery, next.

The Final Mystery: it is found in the construction of the walls. A silversmith has many ways of fastening two pieces of silver together. The most common is to solder with silver, which appears to be in use on the work. Another is to establish a press fit, as in the backs of a pocket watch. Yet another is to create silver clasps which can grip the added piece into place. Nowhere in silver work (not that I am expert), have I seen use of rivets, screws, or bolts. Yet silver rivets are found in the walls of the ink well. Two are used to attach each of the two Elegant Eagle oval shaped pieces (one Eagle per lengthwise side), and two are used to attach the ‘cloth bunting’ drapes on each side of each eagle. But none are used to attach the drapes on the end sides. This makes little sense.

Also curious, is that the rivets on the Eagle sections are visible both on the interior and exterior of the wall, passing through fully. But not so on the bunting drapes, where they are visible on the wall (look to far interior wall, just right of the right-most bottle), but not on the outside of the drapes (left-most interior wall). Tied to this observation is that the eagle piece could easily have been assembled either via solder or a press fit, or clasps, as is true of the bunting… and that the eagle appears to be upon a plate which is bowed outward, implying the possibility (by shape and the fact of rivets) of a hollow chamber… perhaps with something being hidden, within. The resemblance of the handle’s balls to the Masonic Ball pendant’s, also points to the possibility that something may be hidden, within. If one wanted more reasons to suspect such, look at the handle, itself, again. It has an oval which exactly matches the Eagle’s oval in size, shape, and central positioning, and the ‘flower’s are positioned in perfect sympathy with the inset rivets holding the Eagle into place… if they even are actually rivets. They may simply be clues deliberately placed to draw one’s mind to discovery… if knowing something was hidden, and in need of recovery. 

I find myself recalling the National Treasure movie series, the one where the Templar Treasure was found following a set of clues hidden in various ways, each pointing to the next, until at last, the treasure might be reclaimed. I don’t for one moment believe the inkwell fits that bill… because my research for my book set, Fatal Rebirth, revealed the far greater likelihood is that the templar treasure is actually the wealth used to create the Rothschild banking empire… and that the Rothschilds were not jewish money changers, but Templars in hiding among the Jews, as such. No money changer could have amassed that much wealth, even in several generations of family members in the trade. It also revealed that many Templars went into hiding by becoming (and eventually taking over) the Masonry Guild… in time becoming Freemasons. But one thing is for certain.

The Speaker of the house has one very mysterious object on her podium… one perfectly useless to its original function, even upon its first creation… but quite useful symbolically… to someone — especially if a Mason. Whatever purpose made it thus useful is also an unknown, but we do know it was significant and important enough to risk life and limb, and to originally install it, and to later restore it, with some level of quiet secrecy. The ties between the Freemasons and the Illuminati, and between the Illuminati and the modern equivalent ‘Round Table Groups’ like the Club of Rome, Bilderbergers, Council on Foreign Relations, and the Trilateral Commission… and between the Masonic guilds and the masonic-like constructs of secret societies such as the Thule, the Skull and Bones, and the Knights of Malta, etc… all lead me to find this mystery very tasty, if not conspiratorial.

It is truly, a National Treasure, one perhaps worthy of yet another movie?

REVOLUTION 2.0: Would Military back Constitutionalists or Socialist/Communist?


Progressive leftist/fascists seem to be pressing for armed-conflict by trashing the 2nd Amendment (and other atrocities), confident they own the military’s loyalty. They don’t, but that simple answer is worthless, and for a long list of scary reasons.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, March, 16, 2019, from the Olympic Peninsula, in the shadow of Califoregoshington

copyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

Reading, you will learn:

  • that a military or political coup in America has been attempted in the past;
  • half the country thinks one is in works as you read;
  • the possibility of success can be judged by comparing the present to the past;
  • that analysis is important regardless of which side of politics you sit, and;
  • it is scary to contemplate, because it points to blood being spilled.

An important question

The question I have posed in my books since before the turn of the Century was this: what would happen if there is an attempt to take over the government by some form of coup, or to subvert/destroy the Constitution, such as seizure of guns from citizens or abandoning of National Sovereignty to the North American Union and the New World Order? The simple answer is a civil war, or what I term Revolution 2.0. There is both a right and duty of revolution, which reveals this truth: when a Country makes laws which fly in the face of logic, natural law, Constitutional law, and the laws of your lawfully chosen faith… and endanger the nation’s future and safety, it’s time to overthrow that government. That answer itself leads to many more questions, such as, what does it take to start a revolution, and how close are we to having one? But the most important one to participants in any such civil unrest, and which this post attempts to answer, is this:

which side will the military back in such a revolution, and how real is the possibility that the military might choose wrongly?

This post is an in-depth analysis, and as result, is about a 30 minute read with some important, unexpected, and revealing content… surprising even me, in fact… and I’ve been writing (in warning) on this topic for nearly two decades. If you are the sort who prefers sound bite news, just skip to the last section (In Summary), so you can simply confirm your belief bias without gaining any actual knowledge, be it agreeing with me, or discounting my findings in your ignorance of the facts which lead to that conclusion. That is your choice, to make, and your responsibility to choose. The same will be true of Revolution 2.0, where wrong choice based on ignorance could have serious consequences for you, your family, your country, and the World.

In seeking an answer, it should be noted that fascist-minded megalomaniacs have existed within all Militaries since the dawn of the institution; such personalities are naturally drawn to military and Police, and tend to rise in the ranks to positions of command. Regardless of any outer political views they wear on their sleeves, they tend to be fascist/police-statists in their thinking. More so, in America, perhaps, since 1947, when the DOD and CIA were founded, and the Military Industrial (and Intelligence) Complex was ‘invented.’ I have since added the liberal media cabal to the complex, resulting in the nick-name, MIIM. Every generation has them; people who find fascism more useful to their rise to power than they see in guarding your freedom and rights. There are several important illustrations of this in our history, and they reveal that some among US military leadership are well capable of siding with the wrong side… perhaps even engineering a reason for a conflict which might enable or excuse a coup.

Some call it a ‘Deep State mentality.’ I call it New World Order thinking.

Note: while this post is made in an America where, at the moment, the greatest threat capable of forcing civil conflict comes from progressive leftists… and while that group embodies and employs elements of the Deep State, Fascism, and globalist New World Order agenda… the Deep State, Fascism, and the New World Order has allies on both the left and right, almost always in the extremest versions, thereof — in almost EVERY country on the planet. You can’t tell your players without a program, and while some players stick out visibly on both sides, no one is publishing a program. Trust no establishment politician, international corporation, or anyone promoting extreme liberalism, socialism, communism, or extreme conservativism or nationalism. Ferris Bueller was right: “A person shouldn’t believe in isms. They should believe in themselves.”

We know, for instance, that the Military has worried about a possible not-so ‘civil war’ between the branches, between units within a branch, or individual soldiers within a unit, for some time. The rank and file of the military is by and large duly patriotic, mindful that they are not to obey unlawful orders, and understand and honors their Oaths to uphold and protect the Constitution. Yet they are also trained to obey without question. No military in the World can do both well, simultaneously, in times of conflict. Unlawful orders transpire, and are obeyed by most, and to disobey can be seriously punished, with any such incidents typically swept under the carpet. No one wants to be a vanquished martyr for a silenced and unheard cause.

The proof of military’s concern over this paradoxical is in the form of a questionnaire since referred to as the ’Shoot Americans Questionnaire,’ which has been given to various sampled units in various branches over the years. The good news is, not too many soldiers indicated they would obey orders to fire on Americans who, for instance in just one of several scenario questions, “refused to turn in their guns.” Other questions about use of deadly force related to other causes or issues of some concern, here, such as if the soldier would be willing to swear allegiance to United Nations Commanders, in deference to US law (it did not mention US law). 

That questionnaire arose out of our second evidence, the Revolution in Military Affairs. RMA is the notion that as modern technology and political realities evolve, the military needs to adapt its war fighting policies, tactics, and capabilities to maximize efficiency and reduce chances of failures. Nothing wrong with that; all militaries do it. However, in the 70s and 80s, it literally became a field of think-tank study within the military, and frequently a common topic of discussion the the U.S. Army’s War College publication, Parameters. Within its pages, according to an article which appeared in the now defunct Washington D.C. Newspaper, The Spotlight, was an RMA based article which defined the ‘new face’ of America’s next new war. In fact, as I recall, the piece was titled ‘America’s New War,’ which was, ironically, exactly the propagandist terms media used to describe the war to liberate Kuwait.

In the quotes from the Parameters pages, the next new kind of warfare which needed to be planned for would be with “former military, militia, patriots, constitutionalists, and the poor and disenfranchised.” Excuse me? Since when are such the enemy of the State? When did the military start thinking the government is so far afield from righteousness that the military must plan for waring with upset citizens? Why should any who so think be allowed the command of force of arms? But that is not all. RMA also established something called the “21st Century Politico-Military Force Matrix,” which is largely the marriage of local law enforcement and military actions in a matrix of options for dealing with unruly civilian populations. Then there is MOOTW, “Miltary Operations Other Than War,” which provides clear operating strategies for interactions with citizens as potential combatants, including use of force of arms. It has also been called “The People’s War” by the military… for dealing with a civilian uprising.

Finally, there is the dramatic increase in development of psychological warfare technologies (mind control) and non-lethal weaponry… for military application against civilian populations. This is sometimes referred to as the Forth Epoch War, and I’ve written whole books on that, and one of them, The Professional Paranoid Defensive Field Guide, lists nearly 500 technical terms which represent the sum total of such weaponry, methodologies, and strategies. Among them are terms representing the construction and use of whole fake communities which can in no way be taken for anything but American towns, where training exercises regularly take place in door-to-door searches, traffic blockade/check point vehicle searches, and storming of buildings in SWAT-like operations.

If that were not enough, there have been actual training exercises in a long list of major and lesser American cities (i.e., LA, Houston, Chicago, etc.), much to the alarm of citizens who were NOT informed of the operations until AFTER they are completed… event though in some cases direct citizen confrontation, detainment, and questioning had been involved… often by Psychological Warfare units. At times, civil rights had been violated or citizen’s safety put at risk. This has been going on for more than four decades, and it has been getting more blatant and frequent every four years or so (an interesting characteristic, given election cycles).

 

Finding clues within previous coup attempts

The answer as to which side the military would take in such a scenario, is the same as would seem to worry the Pentagon, based on the questionnaire and their significant focus on civilian confrontation in RMA. I have always believed, that the inescapable answer is BOTH — resulting in rebellions amid the military, itself, both within and between branches, and within units. There have been two well-played-out but failed attempts at a military coup in America which serve as models of any such scenario, and these deserve some scrutiny. The first one was real (the 1933/34 Business Plot to depose President Roosevelt and establish a Fascist government), and served as a model for the second, which is where we will start for reasons beneficial to context of any Revolution 2.0. The most recent was a fictional depiction written by Political writer/researcher (Fletcher Knebel) and a former Editor of a major newspaper (Charles W. Bailey II). I’ll start there.

Though their book, Seven Days in May, was indeed fiction, it was extremely well researched and quite factual in its underpinnings, and enjoys the modern context of the Department of Defense and Joint Chiefs of Staff, which did not exist in 1933. The book was a best seller and makes excellent reading, but it was also made into a box office hit you can watch online, starting Kirk Douglas and Burt Lancaster. There are several reasons it makes a good model, despite its fictional nature; it was based on factual basis relevant to our time, then, and now.

The movie was produced in the shadow and conspiratorial clouds leading to the assassination of John Kennedy, of which many people wondered if that ugly scar in America’s history was a plot involving some sort of political coup. Indeed, many clues uncovered over time pointed to military involvement. One was that the usual way the local National Guard military participation in Presidential visits was ordered to stand down, not unlike what happened in the Clinton/Obama Benghazi debacle resulting in the deaths of Marines and Embassy Officials, there. Another was the intrigue and conflict between Kennedy and the Joint Chiefs over the war in Vietnam, the Cuban Missile Crisis and the Bay of Pigs Invasion; the war hawks thought him soft on Communism. 

Moreover, Kennedy had turned down the Joint Chiefs plan to fake a series of false-flag ‘Cuban terrorism’ events to justify an full out invasion and ousting of Castro, called Operation Northwoods… which also happens to be the blueprint visibly in play in the terror events leading to 9-11 attacks and the series of Middle East oil wars predicted in my book set, Fatal Rebirth — which predicted both the WTC downing by false-flag jetliner terrorism and the resulting oil wars in 1999, nearly two years before the attack. The Knebel/Bailey book itself was also written as a kind of harbinger of possible things to come based on many of the above difficulties between Kennedy and the Chiefs, and, ironically, Kennedy himself was quite fond of the book, likely recognizing aspects of the plot line to his own mirrored reality. 

Sadly, he did not give it enough due, or he might have been able to foresee the deadly future which lay ahead for him… and perhaps, even forestall the use of Northwoods in our more recent history. The name Northwoods itself, by the way, was based on WWII Nazi operations of like false-flag nature… and the name Northwoods references Germanic translation, ‘Wald Im Norden’ (woods in/of the north) which also describes the invasion of Poland, which began WWII… the German Army swarmed into Poland from the forests to it’s North as did the air Blitzkrieg which overflew it. The fascists would, thereby, engulf the World in flame for a second time.

Note: Should the reader doubt any prime point within this post, they should hold final opinion until watching Seven Days in May. It will be well worth your time on an entertainment basis, alone. It is absolutely critical to understand the relationship of the various branches of service, how troop movement, material (weapons, munitions, supplies) and funding are manipulated within the context of the Department of Defense, and Presidential/Congressional oversight. The education, alone, is also motivation enough to watch the movie… as is the fact that much of the dialog is quite unhappily the same you are hearing on TV from commentators and politicians today; treason is afoot, for real, and as in the film as well as in 1933. But the key point in common with both the film/book and partially true in the Business Plot (there was no Air Force in ’33), was the absolute need to include the Marines and Air Force in key roles on one side or the other… and a means to ‘exclude’ non participants in the plot from interference as the coup unfolded. 

Fascism brings us back to the Business Plot, which was undertaken by fascist business leaders of the most famous kind, including Bush, Harriman, Singer, DuPont, Hearst, Heinz, Mellon, Morgan, and others. But it was deemed that the plot could not succeed without a (then retired) Marine, one General Smedley Butler, who was the most popular military figure in the country, at the time. Butler was approached and ‘recruited’ to lead an uprising of unhappy Veterans who were owed money by the Government and unable to collect because of the Great Depression, which was also the source of unhappy ire of the businessmen. Butler’s role, if undertaken as intended, was to lead some 500,000 Veterans in ‘revolt,’ to seize the Capitol and depose or destroy the President, and hold Congress hostage, pending satisfactory reformation of a new government model. 

Such a plot could not dare being risked unless assured that the military would both be unable to respond quickly enough to prevent the coup, and once in place, would not dare confront Butler and his civilian army (called the Bonus Army), or their fascist backers. Clearly, the backers of the plot must have had some private assurances from at least the Army, if not the Navy, that there would be no objection. The Chief of Staff (highest ranking General in command of the Army) in 1933 was Douglas MacArthur, who clearly did not get along well with Roosevelt, and was thought to be a fascist at heart. His counterpart in the Navy, Chief of Naval Operations, was Admiral William V. Pratt, who was very unhappy with the depression, as it had forced severe reduction of Naval forces, and threatened to merge the Coast Guard and the Navy, an idea which he opposed vehemently. The Commandant of the Marine Corps, Ben Herbard Fuller, also a JCS equivalent, was similarly suffering retrenchment because of the depression, and deeply respected Butler and MacArthur. To be clear, neither Fuller or Pratt have ever been accused of fascist leanings, as had been MacArthur, but a change in power favoring the military would not have hurt their wishes for a stronger military to command. 

Thankfully, Smedley was a patriot who refuse the recruitment, and he instead exposed and thwarted the plot before it could get off the ground… though there was also a failed assassination attempt involving an Italian immigrant of fascist viewpoints in 1933. And, in the TV series, City of Angels (a TV spin-off of the Movie Chinatown, staring Wayne Rogers), the greater plot line in a three-part season opener (The November Plan) featured a foiled attempt to assassinate Roosevelt in a trip to California. That ‘fictional’ plot line was based in factual realities (subject to Hollywood license, of course), and did involve Smedley Butler as well as soldiers in uniform intent on betraying Roosevelt. The screenplay was by well respected researcher and writer of crime/detective drama, Stephen J. Cannell.

Now let us similarly disect the 1963 example…

The other key player in Seven Days of May was an Air Force General. Modern troop and material movement requires the coordinated support of the US Air Force. It was, in fact, this critical role which was the underlying plot mechanism of Seven Days in May, and quite critical to our understanding of what it would take for a modern coup to succeed. Therefore, with respect to Revolution 2.0, and Deep State influence over possible military opposition against Constitutionalists, those seeking to destroy the Constitution will need to include support of the Air Force, as well. The Army is less a concern, because the bulk of the standing Army is in deployment, and because each State’s National Guard is available to the Governors of each State in case of ‘civil unrest,’ which is what they would call the matter, seeking to hide the truth from the public: that any revolution was to save and restore Constitutional law against traitors. 

If the State was run by liberals, the National Guards could be activated by the Governor against the ‘rebels,’ as they might also be termed for political propaganda expediency. If the State was conservative, the DOD could order the Guard to stand down (so as not to aid the ‘rebels’) or be activated at the Federal level to oppose the patriots. That could be true only if the majority of Joint Chiefs were on board with the unconstitutional effort underway. Stateside regular Army could potentially be directed to fill in where National Guard units or their Governor refused to stand down or comply with Federal activation. That would be an example of ‘civil war’ between elements within a given branch of the Military, and it is expected that any such use of troops, regardless if acting on Federal or gubernatorial orders, would experience conflict within their ranks, seriously inhibiting their efficiency.

In like manner, the Navy is largely out of the picture; the bulk of it is also on station around the World, and it is not well poised to impact ground actions within the borders of the US, short of coastal regions. In Seven Days of May, the Navy simply stood down. The same should be true of the Coast Guard, perhaps more so. Amid all of this, there is an added problem which provides a logical reason to stand down. Specifically, in such a coup, the military still needs to insure unfriendly actors such as China, N. Korea, Iran, or even Russia… did not take advantage of an America engaged in civil war. They might, for instance, choose to wax adventurous against allies, or even against US forces. Ergo, the Navy and much of the strategic Air Force would need to devote their attention to World affairs; standing down from any major role in the revolution would be tactically wise. And, in the next section, we will see ample reason for concern over their ability handle two conflicts simultaneously, both at home and abroad.

Perhaps we ought take a close look at Obama’s JCS, still now in place, and see what’s going on with them, in like-comparison.

 

What about today’s Joint Chiefs?

We must compare the two historical examples against today’s potential for replay. Looking back to 1933 and 1963, what about 2023, or some other current time frame? How does today’s situation compare, to then? Politically, there were fascist undercurrents mainly in the business community in 1933, where in 1963, the fascists were additionally present in the military industrial (and intelligence community) complex. They still exist to some degree in both sectors, today… but there is more afoot. Today, we see socialist/communist/anarchists and progressives on the Left using fascist tactics, including members of Congress. They are pitching socialism, but acting like fascists.

Today’s environment, then, is not so different from the past, and is perhaps worse, in final analysis… so what about the key military players at the Pentagon? How do they, and their resources, compare to the 1933 and 1963 scenarios?

In 1933, there was no Air Force, but there was a retired Marine at least thought able to raise a civilian ‘Bonus Army’ army of veterans, and a presumed friendly Army Chief of Staff. Butler was a key military resource. In 1963, it was once more a Marine in the book/screen play (Kirk Douglas) who busted a coup attempt… a plot orchestrated by an Air Force General who was the Chairman of the Joint Chiefs, and three JCS (Army, Air Force, Marines — Coast Guard did not have representation in 1964), while the Navy Joint Chief who was aware, wanted no part of it, but yet remained silent of it.

In 1933, Butler was retired, the most likely candidate to orchestrate such a coup. Today, the pro liberal/progressive/fascist forces would likely be stirred to replay 1933 with the likes of Retired Army General Tommy Franks, who was Clinton’s right-hand military man… the man who ordered the flame throwing tank and commanded at Waco. As such, he enjoys free access to anyone in the Pentagon on at least an informal basis, and still holds a security clearance. As a Deep State operative, he could become the organizing and communications agent in any such modern-day plot. He also has many friends and contacts within the military industrial (MIIM) complex. He meets the 1933 model, as a recruitment target/tool — one I feel unlikely to adopt Butler’s patriotic response.

And the plot in 1963 required at least the bulk of the Joint Chiefs to participate, or be cowered into silence. The Joint Chiefs today consist of one four-star General to represent each branch of service, including someone to represent the Coast Guard and the National Guard, plus a Chairman and vice Chairman, for a total of seven top-echelon decision makers. Today, thanks to Obama, the JCS consists of two Marines and three US Air Force Generals to form a ‘heavy weighting’ of representation to the same two branches deemed important in 1963. I say thanks to Obama, because he conducted a purge of some 266 top-ranking military officers, and oversaw a rapid series of promotions necessary to put his personally approved people into the JCS chairs.

One Marine, General Joseph Dunford, Chairman of the Joint Chiefs, owes his position to that purge with a series of four rapid-paced promotions and appointment to the post by Obama. He is the most powerful man in the military, the counterpart to the 1963 role played by Burt Lancaster in film, though a Marine, instead of Air Force. The Vice Chairman, however, is Air Force (Paul J. Selva), also appointed by Obama with six rapid promotions. The Joint Chief of the Marines, General Robert Neller, had three promotions under Obama to his post, making two Marines in total. 

The Joint Chief of the Air Force, General David L. Goldfein, enjoyed five promotions under Obama, and Air Force General Joseph L. Lengyel (making the third Air Force General) is JCS representing the National Guard. He had five promotions under Obama, while Admiral John M Richardson, Navy’s JCS, had only one promotion under Obama… it perhaps being understood in the 1963 model that the Navy is a non-critical player in a coup. In like relationship, the Commandant of the Coast Guard, Admiral Karl L Schultz, a de facto 8th JCS… appointed by President Trump, as was General Mark A Milley, the Army’s Joint Chief. Again, the Army is a conflicted player, both by virtue of deployments and National Guard complications, the one branch of the services most likely to be at war with itself in a coup-like or Revolution 2.0 scenario.

And, it would appear that Obama’s bevy of purge-replacement military officers have been quietly sabotaging the military in ways which make national defense abroad that much harder, perhaps shifting capabilities to a homeland conflict (I hate using that fascist term, ‘homeland’). In fact, difficult enough that the Air Force, by way of example, might not be able to provide any aid to patriots, or be a factor against them, at all, outside of material and troop transport. If today’s Air Force capabilities analysis is any clue, President Trump no longer has a full deck of military cards to play. A conflict at home and abroad would tax any Trump effort to support Constitutionalists, even were the DOD not under the control of Deep State plants.

 

Monkey wrench conspiracy theories

One tool the Air Force has which could prove extremely troublesome if aligned with treason, is Command Solo. There are 21 Command Solo aircraft, all based at Pennsylvania’s National Guard; specially modified C-130s capable of significant mind control capabilities via Political Control Technology (PCT). I find it troubling that such capabilities are National Guard, rather than Regular Army or Air Force, making it all that much easier to use against citizens. A single plane can impact a two-five State region, depending on State sizes. All of them fly regular training flights, unless in use overseas in a combat theater.

Impact? The Air Force has admitted that they were used in Bosnia to sway elections, and in Iraq to convince thousands of Iraqi crack troops to surrender to small drones which were essentially RC model airplanes with cameras. The chief weapon the plane has is the interception of local radio and television broadcasts, which it then embeds with hidden inaudible subliminal messages which the subconscious mind does absorb. Such messages can be of any desired simple but endlessly repeated phrases or key words (such as ‘surrender, turn in your guns, vote Democrat’) for rebroadcast at a stronger signal strength than the original. The secondary weapon is more insidious; EEG entrainment.

Human brainwaves for emotions operate at ultra low frequencies, and are roughly the same across population samples. If the desired emotional state of being is broadcast at signal strengths greater than that of the brain, the brain adopts them as its own (is entrained). By combining subliminals with emotional state manipulation, such as an abiding and overwhelming fear, Command Solo can impact tens or hundreds of thousands of people while in the air. In such use, it can fly 24/7 with required stops for refueling and crew changes, or in rotation with another Command Solo aircraft.

The training flights they fly involve preprogrammed mission tapes representing ‘harmless’ subliminals and EEG patterns to be used, but not even the operators on board, or their commanders, have any way of knowing what the content actually is (presumed to be ’empty’ of content.) So when they fly training missions, they could very well be telling Democrats to be outraged about everything, violent, etc., and no one would be the wiser, except the person who ordered the tapes to be made, and used, and the computer operator who created the tapes.

Watching your emotions and being alert for changes in that and any unexpected thought patterns which represent something contrary to your original belief structures, is your only clue the plane is being used. The average person won’t question. The strong-willed and alert, can detect, and can resist, if strong minded and inwardly alert. The other clue is seeing the aircraft in the air. A good spotting scope, rifle scope, or telephoto lens can easily recognize if a suspected plane is a C-130 with the Command Solo configuration. Command Solo, and other PCT are well covered in terms of detection and defense in my book, MC Realities.

Another wildcard conspiracy theory is “UN Intervention,” and I here draw upon the ten years of research documented in my book set, Fatal Rebirth. There have largely been two waves or versions of this theory, and both are based in demonstrable facts nonetheless consistently denied by both US military and the UN, itself. The first took hold back the 1990’s and a bit before, with origins earlier than that, tied to far-right thinkers and political forces, such as retired General and US Senator, Barry Goldwater, who foresaw the New World Order’s rise through the U.N. In the 90’s, large numbers of people were seeing and reporting long trainloads of flatbed cars loaded with white U.N. military vehicles, as well as similar on river barges and tractor-trailer units, sometimes in convoys on American highways. Other reports talked of holding areas with hundreds of units parked in neat rows, typically surrounded by military quality fencing and guard stations manned by ‘Men in unmarked black uniforms.’ 

Most of the 43 United Nations ‘Biospheres’ in some cases rendered off-limits to citizens and subject to UN control as part of Agenda 21.

This was also the same time frame when people hiking in select wilderness areas were encountering armed soldiers, also in unmarked black uniforms who were apparently conducting some kind of drill or operation. Invariably, they were said to have been speaking both English and a foreign language of some sort, and ordering civilians away at gunpoint, advising they had entered a military compound. Many of these reports of vehicles and soldiers made the newspapers in one form or another, sometimes with pictures, but the military and the UN denied any validity. Some of these events and UN vehicle stockpiles were indeed in ‘wilderness’ areas tied to the 43 United Nations Biospheres regions, which is its own Agenda 21 conspiracy topic.

The U.N., for instance, has officially insisted it has no men or vehicles in North America, and does not use the types of vehicles being spotted. Most were identifiable as American WWII era, or more modern US Army vehicles, and many more were of Soviet manufacture. And, at the time, large numbers of Soviet military equipment, including helicopters, trucks, tanks, rocket batteries, and even specialized units such as CBRN (Chemical Biological, Radiological, and Nuclear) decontamination trucks were being brought into the country by someone, sighted variously in transit or storage in either original Soviet or UN colors… no unit or national markings lest it simply be ‘UN.’

Let’s take just one very interesting and well documented case (my 1990 research, plus the Spotlight in the same timeframe), to drive the point home. It involves Soviet ARS-14 biological/chemical warfare trucks shipped from West Germany through the firm Beesh Merkator to Gulfport, MS, then by barge to Scranton, Iowa to a company, Airmar Resources, Corp, operated by Lt. Col. A. R. Koval Sr., USAF, retired. Koval told the Spotlight that the units were purchased for Germany and destined for UN forces in Europe after refurbishing, contrary to UN statements it does not, by policy, use Soviet equipment of any kind.

These units have been in the U.S. for nearly a decade. US made, mfg says they are for use overseas, but UN denies using US vehicles or having inventory in America.

The investigation continued, revealing that from Scranton, they were transited to various destinations in America through firms named Newway and Scranton Manufacturing. The later firm, contrary to Airmar Resources claims, said the trucks were being converted to ‘garbage trucks,’ but the EPA said it would be impossible for those vehicles to be made to meet vehicle standards. Scranton responded that they were destined for European markets, but one has to ask about the cost effectiveness of buying and shipping trucks from Europe to America for modifications, and then shipping them back to Europe. Scranton at the time indeed offered a line of new garbage trucks, but none were of Soviet origin. All were, like the Soviet units, painted white, of course. A nifty cover story that almost works, if you don’t look too closely. 

And, as stated, the modified trucks were tracked to US destinations, not Europe. One, in fact, spotted in California on a flatbed truck, was leaking noxious smelling liquids which made the witness sweat profusely and ill to his stomach. Marked with a sign “Quarantined by US Department of Agriculture,” the fluid was being drained into a trench by men in protective clothing. Both Newway and Scranton Manufacturing are alternate names for a small but troubled firm associated with Bede Jet Corp, the maker of small fiberglass civilian jets (build-it-yourself kits) like the one James Bond (Roger Moore) used to attack Castro’s air base in the opening sequence of Octopussy. Newway, in fact, also made Bede-designed, Honda-powered, fully enclosed two-seat motorcycle-car kits, also of fiberglass. 

The more recent wave of UN concerns is fare easier to demonstrate (the images above, for instance), and involves UN intervention officially in place. It comes from the Obama Administration’s invitation for the UN sponsored program referenced as the Strong Cities Network. Based on selling fear of terrorism, in particular, ‘home-grown extremists,’ the program calls for United Nations help to member Cities in the Network. The help goes directly to and influences the Police Departments within the network, as well as city management. On the surface, as sold to citizens in the fear mongering, it sounds like a way to gain some expertise in combating terrorism. But that is a deliberately false narrative. 

Interesting: Obama is said to be slated to be next Secretary General of the UN…

Conspiracy theorists early-on tried to warn people it was a dreadful mistake and a trap. Now, even non theorists are proving the conspiracy is no theory, and far more serious than even early theorists, had thought. It turns out that the Strong City Network acts as its own Law Enforcement Agency, and is empowered to actually govern member cities. Cities which join the network essentially are subject to UN Rule of law, rather than the US Constitution. Currently, New York, Atlanta, Denver, and Minneapolis are members, and a push is underway for Boston, west-coast cities, and elsewhere, to follow suit. In the event of a civil war/revolution scenario, the framework and base structure for a UN interference will already be in place. All they need to do, is to make the announcement, and fly in their people and equipment to make it stick. Because it was blessed by Obama, it would be difficult for anyone to object, including the military — unless and until President Trump or some other President revokes the program and so orders, at least.

There is a final ‘conspiracy’ matter which counters the other two, in impact: a secret military within the military. When researching my book, Fatal Rebirth, I was contacted by an active Officer of high rank in the US Military who knew of my work through my appearance on Coast to Coast with George Noory. He advised that there was, within each branch of the service, a secret group of Officers of some importance, and positioned across the full spectrum of unit function (i.e., Intelligence, combat, support, communications, etc.) Their purpose was to be prepared for, on watch for, and to activate should there be any unlawful (unconstitutional) effort to effect a coup or military takeover. He in fact invited me to become a member, as they did have associations with civilian counterparts they deemed useful. Accepting, they said, I would then have access to information he assured me would be valuable to my book.

However, as the covert security aspects of membership were extremely hight, I did not feel I could manage them… and, I was unwilling to accept responsibility for receipt of classified military or governmental information, which would risk being charged with a crime, if caught. But I was pleased that such men were in place to help insure that unlawful orders against citizens would meet with both covert and overt resistance. I reference this covert patriot group as the ‘Turtle,’ (as in, Revenge of the Turtle, America’s first submarine war vessel used in the Revolutionary war. The Turtle is, and like the Turtle sub, is invisible and hard to find, until it bites.

 

In summary

We see then, that the makeup of the current JCS team engineered by Obama, almost exclusively, is quite weighted to Marine and Air Force, suspiciously Deep State tied, and more than mirrors the key aspects of both the 1933 and 1963 scenarios. We see that was an Obama (Democrat) arrangement through a purge, as part of setting up his Deep State. We see that Obama has set the stage for potential UN interference and further partnerships or concessions to authority from the next progressive President to take power. We see that the military and its MIIM Complex, the business sector, and the political spectrum is well laced with both fascist and liberal/progressive politics which border on fascism, and employ fascist tactics. We see that Deep State and establishment politicians collectively ‘hate Trump’ regardless of party affiliation, and in many cases, would rather see the country come to harm than to allow him to continue in office. We see now why the progressives think they own the military, which could in fact be poised for a last-ditch full-blown military coup take over if Trump wins, again.

The final conclusion is, all the pieces are in place, and while the leftists do own the military at the top, they do not, top-down. How then, can we say we are not ripe for a coup, or Revolution 2.0, should the progressives come to power, again — for they still believe they do own the military? Assuming the left does not reform itself into a more logical and viable political entity akin to the old Democratic party of the 1950’s and 60’s, if they cannot be kept from ever again obtaining power, armed conflict must indeed be our future. I foresee no other possible outcome.

Returning to the original question, then, the military is well poised at the command level (JCS) to participate against patriots, but not necessarily well positioned to do so without difficulties, rank and file. We see the Navy and Coast Guard are weak players in such a scenario. We see the Marines, despite any leadership which might be opposed to Patriots, are perhaps the most likely to themselves, at rank and file levels, join with patriots, and refuse unlawful orders. We also see the Turtle groups would do likewise. We see army has its own confusions and situational roadblocks to a unified and obedient command against patriots, tied to the complex relationship with National Guard units. And, we also see the Air force, along with Navy and to a degree, Marines, must be somewhat aloof to such conflict, in order to prevent third-actor States from taking advantage of an American military distracted at home.

I therefore do not see the relatively small numbers of US armed forces, if arrayed against the large number of 2nd Amendment defenders and others of the “former military, militia, patriots, constitutionalists, and the poor and disenfranchised,” being sufficiently strong enough to prevent a patriot victory. That, however, is based on additional assumptions not yet in evidence or proven true: a) that mind control technology will be used effectively; b) that progressives will prove to be better armed and organized than expected; c) that other groups might join in, such as illegal immigrants and Muslims seeing the conflict as a way to advance their own causes, or real or fake UN troops; d) that China (by this means/scenario) or Mexico, perhaps even Canada, might elect to enter into the fray; e) that some other totally unexpected plot element is afoot and impossible to evaluate.

Therefore, if when at bat with an unfriendly pitcher on the Mound, be ready to smack the ball as hard as you can… but also… “Watch out for in your ear,” with a deliberately wild and hurtful pitch (apologies for stealing Ray Liotta’s line). 

If you agree… there is yet one more unanswered question: what will the rules of engagement be for patriots, when they will face and odd mix in the battlefield (cities and countryside)? It will be a strange mix of citizens + law enforcement + military on both sides, and in many cases, there will be times when it will not be known which side a combatant force is on. How should such a war be prosecuted? For the answer to that… and in foreseeing this time coming more than 20 years ago… I wrote the book set, Fatal Rebirth. The answers are there, and have been, all along

 

New Consultation Service for Stalking Victims


Announcement

I, H. Michael Sweeney, aka, The Professional Paranoid, a privacy/security consultant specializing in stalking victims, am pleased to announce a new service for such victims on behalf of the Free Will Society. The Society, which I founded to help stalking victims, is seeking to raise capital to purchase land for establishing a targeting-free, low-cost, self-sustaining intentional community for victims, persons who are hyper-electrosensitive, and other targeted persons. Naturally, donations are sought in support of this awesome project, which is the only proven method to end targeting, and which also helps the victim to rebuild their physical, emotional, spiritual, and financial wellbeing.
Before I retired, I had offered an extensive range of for-fee and free services as described in my free ‘Helps Kit,’ which you likely have already received from me (if not, please request one, as it includes many valuable helps well beyond the offering of those services, long since discontinued). Once I retired, I was forced by circumstances to limit my personal advice-giving to free answers to generic/general questions of a type which did not require in-depth knowledge of the individual’s situation to safely give a generic/general answer. This scheme also eliminates any need to share sensitive information. I do still remain at your service for such needs (proparanoidgroup@gmail.com), should you prefer that solution.

Good News!

However, I am also now pleased to once more offer in-depth consultations, although through a different and far more efficient medium, than previously common. Starting immediately, I am now once more making myself available for personal consultations to whatever need the client would find expedient. The medium is Skype, offering face-to-face video-call dialogs (it is possible to turn off one’s camera and do real-time verbal and textual communication without video). Skype indeed allows textual and file exchanges in-call.
If you have Skype (available as a free download), I am now once more able to do video calls, for a fee, and there, we can discuss whatever you wish. Payments are made via PayPal (easy to get an account, there) and go to the Free Will Society. The first hour or portion is $100, and $60 per hour, thereafter. Unused hourly portions can be held over for subsequent calls. When wishing to continue beyond an hour’s mark, the call continues, and while in the call, you make another payment and confirm verbally once made.
The above rate is for non Free Will Society members. If you are a Member ($25 annually, or $100 for life-time membership, or $5,000 (or $1,000 each year for 5 years) if you wish to be a Member of the Advisory Board, which is a 5-year post… the rate is $75 and $50, respectively. If not a member, you may wish to learn more. These Skype consultation rates, by the way, are roughly half of what I would normally have charged for such consultations, when I did so as a professional consultant.

Simple!

To arrange, you simply make a payment via PayPal to the freewillsociety@protonmail.com email addy, and email me with confirmation along with a suggestion as to one or two good times/dates. I will then contact to confirm a solution we both find acceptable. Same for Membership payments, purchase of any of my books, etc. — as 100% of such payments do go to the Society.
It should be mentioned, that the Helps Kit describes my normal approach to consulting with clients, which includes some specifics which enable the fastest and simplest way to get from point A to B. Understanding these methods, which I have evolved over two decades of contact with more than 12,000 Tis, will help anyone using this new Skype-based service to avoid wasting time and getting directly to the nuts and bolts of the problem, and any advice towards solution. In like manner, having read at least one or both of my first two books in the Professional Paranoid series, will speed dialogs and better enable understanding… not to mention reducing the number of questions one might feel in need of asking.
By way of illustration, in previous dialogs, use of the kits and my books would typically cut down on the time required in dialog by at least 50%, based on the averages observed in such discussions. That was true regardless of the medium used, but has significant potential for cost savings in a Skype-based service. The typical Skype consultation process runs 3-4 hours if the client is well informed (my books) and prepared (helps kit) in advance. Of course, not everyone has the same needs or concerns, and the more limited the need, the shorter can be the conversation.
Please share, esp. in FB Groups, which FB no longer allows me to use, it seems.
For more information or questions, please feel free to contact me by email. I no longer communicate via Facebook if I can at all avoid it. END.

New Anti-targeting Tool: Extremely Secure Email


Anyone who has ever been targeted by sophisticated ‘players’ as a ‘person of interest’ can tell you that all manner of mischief and trouble can arise from email snooping and tampering, things extremely difficult to deter by normal means. Let’s go abnormal!

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, April, 18, 2019, from the Olympic Peninsula, in the shadow of Microsoft

copyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

Reading, you will learn:

  • of many weaknesses in the email system which can be exploited;
  • mail can be snooped, deflected, deleted, rerouted, altered, or spoofed;
  • that encryption and other defenses don’t always work;
  • that there is a unique new solution with additionally new and remarkable benefits.

Disclaimer: in the spirit of full disclosure, this author is not a flaming cyber-security specialist. As privacy/security consultant and computer industry player at microcomputer to supercomputer level, from hardware and software design to repair and even teaching digital electronics and computer courses at college level, however, I do have some swag on topic. Regardless, if the reader has a severe Web security issue with significant risk of harms, my advice should likely be augmented with additional consultation with a cyber-security specialist, if at all possible.

 

The Problem

As privacy/security consultant I can’t tell you how many thousands of times I’ve heard horror stories about email snooping and manipulation. Almost any email account can be compromised by multiple means, including my own, which has been, more than once. It can be done in the users computer with virus/hack/backdoor schemes, either by trojan horse or direct physical access (‘black bag’ job*). It can be done at the users’ ISP host system or the email service providers’ system (if one uses a Web-based service, aka ‘Webmail’) through similar means… or at any common point along the series of server ‘hops’ which all Web transactions take to get from point A to B, including the destination user’s mail service, ISP, and their computer. The problem is, that copies of the email can remain on each server’s storage systems at each and every point between the two ISP servers, for up to 30 days, before it is purged. It potentially remains forever (according to user preferences and any manual intercession by the user) on the user’s computer and any Web email service (which can include the ISP’s Webmail service.)

Any server on the Web may be subject to a lawful or unlawful government surveillance program. FBI has several tools which, under warrant, can be installed directly on any commercial server, which filters all emails looking for (we are told) specific user email traffic. Therefore, latent emails at all these sites are at risk of compromise. And, there is more: if not using Webmail of some sort, but a dedicated mail application like Microsoft Mail, those software packages can be vulnerable to hacking/virus/trojan and phishing attacks. And again, FBI (and other Agencies) have their own versions of these tools, as well, presumably not employed unless obtaining a warrant. The user, themselves, often prove to be the weakest link in email security, by failing to employ decent password policies, or falling for spoofing, phishing, or trojan horse email attacks, and literally partnering in the attack through carelessness.

These attacks trick you into actions which give away your passwords or other useful data (i.e., credit card info, Social Security number, phone number, address). Spoofing email is an email ‘spoofing you’ that they are some official entity contacting you on official business when they are not who they claim to be. This is either a fishing expedition for such information (phishing), or to trick you into downloading something disguised as something you think you want (i.e., an image or other file), but which is actually a trojan horse attack… the true source of the Democrat Party’s server’s alleged Russian hacking; their server was never hacked, in the truest sense of the word, and it was not a politically motivated government hack, but a common hack sent blindly to to untold numbers of persons, in and out of the Party.

*At the height of my battles with rogue ex-CIA fronts, both my home and workplace computers were subject to direct access multiple times. At work, I showed up one day to find everything in my office moved away from the wall far enough to walk around the room and stoop to access the baseboards and electrical outlets, a common place to hide surveillance devices. In another incident, security encountered a man at the computers in my office with a set of tools laid out, and attempting to open one of the machines. He claimed to be an IBM repairman, but had no work order, and as result, he was escorted out. Funny… the computer was not an IBM, it was a Macintosh. At my home, they attempted to gain entry three nights in a row, and eventually, on a day no one was at home, all hard drives on both computers at home and three computers at the office, suffered fatal hard-drive crashes. In time, when I did not cease my investigations into the activities of illegal CIA fronts, all my computers at home, and every single floppy disc and writable storage system disk or drive were stolen (save those I had well hidden)… but they didn’t take very expensive new software CDs (over $1K each), or cash and a valuable collector wild-west pistol which were right out in the open. And yes, when I still did not stop, threats and actual attempts on my life were made. All this is variously detailed in several of my books.

Password policy? Ideally, passwords should be changed regularly, and should not be written down, or used with multiple accounts, Web sites, or software packages. They should be relatively complex with 7-9 or more characters to include upper and lower case letters, symbols, and numbers, and should not be ‘easy to remember’ passwords based on information about you or your family, etc… the first thing hackers will attempt to employ. There is an easy trick to provide a supply of easy to remember passwords, however, of my own devise. Choose someone famous from history, perhaps a bit obscure, such as Demetrius, Joan of Arc, or Marlene Dietrich. Use their wiki page as your ‘supply source’. Find specific factoids about their life to be used as a password, based on an important date and key word relating to that date, a word with letters which can be substituted with symbols.

Example: The first line of Marlene’s wiki says “Dietrich was born on 27 December 1901 at Leberstraße…” If I chose to sub [ for the letter a, ? for s (ß = ss), I might create a PW = 2712Leber?tr[??e. When needing to use the PW, if I can’t remember it, I just drop over to the wiki page and ‘collect it.’ To update, I might change it to Leber?tr[??e1901, or go to some other data point at wiki to start a new PW construct from scratch. This scheme addresses recall issues while providing a ‘written’ record no one else can discern.

Almost all email systems offer some form of encryption, but the user typically must choose to use it, and that can involve technical matters they can’t fathom. Even when used, encryption is not particularly a problem for really sophisticated and powerful Agencies, however. Double encryption can be established by the user by encrypting content, first, and including it as an attachment to an encrypted email… or selecting an email provider or email software package who/which adds a second layer of encryption. But at best, that only delays any decryption-based snoop. Here’s why…

The problem is, the government is so paranoid and interested in snooping 100% of all communications at the NSA (National Security Agency, aka No Such Agency), that by law, all encryption must meet and not exceed standards which their supercomputer algorithms can quickly decode. Of course, government itself employs superior encryption intended to defy solution, even by top-notch foreign governments. We are denied that luxury, and not even major corporations can have it, unless their work is deemed of national security importance by the government.

Ironically, perhaps, hackers CAN, often devising their own solutions. In theory, on the Dark Web, you might be able to purchase such encryption, but to use it outside of the Dark Web, you would likely get caught… and risk getting caught in the Dark Web, as well… since you would not be using other hacker smarts to evade. Or, maybe I don’t know what I’m talking about on the Dark Web — I won’t touch it with a ten-foot pole, or anyone who does, unless I trusted them implicitly.

To be clear, though, we don’t worry about NSA snooping as a rule, because short of Edward Snowden’s revelations of more advanced snooping taking place from within the greater intelligence community, NSA is typically only interested in looking for keywords that could lead to uncovering national security threats (so, avoid frequent use of words like “bomb”). I say that, but I have been targeted more directly by NSA, (which was kind of fair, as I’ve caused them some troubles, too — with some dirty tricks of my own), and their tools can be accessed indirectly by other Agencies in certain situations — so it can happen. The real problem is, decryption algorithms are not difficult for supercomputers, which are in wide-spread use throughout government agencies, and elsewhere. There are also brute-force decoding methods used by hacker types, who have plenty of time on their hands, such that they don’t need a super computer to effect a decode.

 

Aftermath

A compromise can take many forms, some of which can be recognized, and some which are not typically detectible. Naturally, covert access to sensitive information can prove very damaging in detectible ways, but unless the snoop makes use of the information in an overt manner, the owner may never have reasons to suspect the snoop, certainly not before it is too late. In fact, information can sometimes prove so valuable that any gain from overt use and the risk of exposure, thereby, would be deemed unprofitable. This is less likely an issue for personal email users, unless involved in multi-million dollar situations at work, or personally. A lot of personal email is targeted because of one’s work; a home computer is a softer target, than would be a corporate system.

But other forms are easy to detect: altering content*; deleting copies from storage; diverting to other, or additional recipients (who might comment in reply); deleting recipients (who might comment they didn’t get it), or simply delaying or blocking transmission. And, if all that were not enough, the email source can be spoofed, such that if you reply, the party at the other end has no idea as to what’s going on… which results in angry relationships, especially if the spoofed email was intended to anger you. That, is a fairly common dirty trick used on targeted individuals to sabotage any chance of getting help from me, their friends, family, etc. I see that way too often, in fact, used to sabotage client relationships — the very thing which prompted this post.

* When my book set, Fatal Rebirth, was in editing process, my Editor (in another State) worked with me collaboratively using Adobe Acrobat Professional, which is designed for such uses, allowing notes and comments to be tagged to selected words or passages in a hide/reveal manner. (sidebar note: That was, btw, the problem with Obama’s birth certificate… the changes made to it were detectible in AAP, proving it had been altered, and was fake.) My book project was a threat to many illegal endeavors of the New World Order, including illegal fronts within intelligence communities — and in fact, more than two years in advance, revealed a false-flag attack scenario to bring down the WTC with jetliner terrorism, resulting in a series of Middle East Oil Wars (and other things), all of which came to pass. I’m thinking that accounts for why almost every email between my editor and I resulted in alterations between the copy sent, and the copy received, typically delayed in transit some three to five days… enough time to analyze for changes, and to effect them.

Once a problem is detected or suspected, the solutions available typically involve a long series of technical steps which can be cumbersome and scary for the non-geek among us, time consuming and inconvenient, and with some potential risk of some data loss. I used to offer a simpler approach: install a pick proof deadbolt on the main entrance, and insure all other entrances are secure against covert access (the enemy rarely breaks and enters), and switch to a used Macintosh just for email (at least that use) and employ encrypted service — but the weaknesses elsewhere in the email system are still unaddressed with that level of defense. And that can still leave the user with a PC full of problems in need of a complex-step solution…

The less that is known about the method of attack, the more such steps must be undertaken in order to be certain to address the problem usefully. In addition to backing up data, wiping the hard drive(s), reinstalling the OS and applications from their original sources, and reinstalling the backed-up data, it may require creating new accounts, obtaining new ISP providers, and beefing up site security, to include pick-proof locks and, possibly video and/or alarm systems. It can even mean performing professional-level TSCM (Technical Security CounterMeasures) security checks of the home or office (or both), looking for hi-tech surveillance equipment.

If physical access via black bag job is suspected, it can also result in a need to replace hardware which had been physically modified to enable back-door data capture (keyboards and keyboard cables, and communication cards — when coms is not on the motherboard, as is often the case in PC towers). The worst news, is the cost of all that, and TSCM sweeps alone can cost many tens of thousands of dollars.

 

Magic tricks!

There is another simpler preventative step, however, which I have also advised to my clients, along with beefing up security, and use of proper pass wording behavior. My idea is to avoid having any copy of the email stored on any system outside of the user’s computers at both ends of the exchange. As strange and impossible as that may sound, there is a very simple way to do that: both users simply use the same Web-based service, and set their preferences to delete emails from their servers once downloaded at the other end (the sender might want to archive a copy to their own computer, first). Some Web services include a notification feature which shows when an email was read, to more easily facilitate such deletions without the recipient having to so notify, in some way.

In such a scheme, where both users have an email account at xyzmail.com (fictional) for instance, no email is actually sent, anywhere. One simply logs into their account, and uses a Web form to create the email. There it sits, perhaps not even then in actual email form, because the server will know the recipient is also a user client. The recipient next logs on, and reads the email in a Web form, as well. Delete at both ends. Done. The data in the Web form still does travel from the service provider to the recipient along the hops described earlier, but it is not transmitted as recognizable email packets, and therefore, email snooping tools don’t see it. It is merely another Web page, and email snoops can’t look at web pages.

Well, yes, it is possible to track a targeted user’s Web use. Usually, such tracking involves only tracking when and where you visited. If entities doing such tracking took particular interest in a given URL (your email provider is so identifiable), they could in theory go to much extra effort to attempt to see the actual content of said URL, or to read your screen, directly. There are very exotic technologies for that. But all Web mail services are HTTPS URLs, which means they are encrypted, too. While we might argue that sophisticated opponents could access emails for snooping purposes, it is not likely, and it would be virtually impossible to sabotage the process in the way normal email can experience.

But assuming that was of concern, there is yet one more layer of protection against URL snoops: VPN. A Virtual Private Network can be established for untraceable online access (save one remote possibility, next paragraph). A VPN masks your identity on the Web, and can establish yet another encryption level. VPN can be established online by use of a software package or web-service (which will include a software component). The only fly in this ointment is one which applies to all Web-based product/service providers: are they certified to be part of the solution… or do they have ties to the types of sophisticated snoops, such as the intelligence community, who would have a natural interest in what anyone using a VPN was doing, and seek direct access through a backdoor-equipped VPN service. Shop wisely, and check the company’s history and the background of their Officers, Board of Directors, business partners, and investors.

And if all this was not enough to worry about, it is possible to simply read whatever appears on your monitor, remotely. If the enemy is truly sophisticated (i.e., a spy agency), it is possible to use special equipment to capture the EMF (Electro=Magnetic Field) RF (Radio Frequency) signals from your computer and/or monitor. If they know the make and model and hardware makeup of your systems (typically by covert access to the unit), those signals can be decoded using signal processing to duplicate your keystrokes or whatever is visible on your screen.

The solution for that is, once more, beefed up site security, and the use of a faraday cage or good RF/EMF shielding, and being on the lookout for suspicious vans parked nearby whenever you are using your computer. Fortunately, this is pretty rare, typically seen only in true national security operations. But for the paranoid among us (that’s “me,” after all), it is something to be aware of.

Fortunately, there is something new out there which pretty much eliminates almost all of the above technical considerations and issues, and greatly simplifies defenses with superior protection, and a few new benefits, as well.

 

Defensive armor!

This is badly needed good news for any targeted party. A new start up company has come up with a new hardware tool to improve email security to insanely high levels. It is about the price of a larger hard drive, and about the size of a cubed tissue box (image). The company, Helm (the ancient word for helmet), makes the Helm Personal (email) Server. While it is a bit costly at $500 (plus a $99 annual fee after the first year), it includes a lot of value, including 128GB of solid-state storage space. It functionally makes you both your own ISP (for email purposes) and your own Web-based email server… and in reality, your own Web site server, if you have such a need (but such use might require a business-level ISP upgrade to insure you had enough bandwidth, if a terribly popular Web site).

The important thing to understand about this option is: it is its own unique domain name (you choose the name, perhaps your existing Web site… and there is also a way to link it to existing email accounts elsewhere). By marrying the Helm solution with creation of email addresses for yourself and anyone you regularly communicate with for which email security is of concern… there is once more no email file being sent, anywhere. Add a VPN to that equation, and good site security, and it is the closest to government-level security possible, at any price. Helm will soon offer their own VPN, by the way, and I have investigated the company and those associated with it: they get a clean bill of health and have no ties of any concern to me. I would (and likely will) use this product, myself.

There are additional functionalities and features inherent within Helm’s device which enhance its value, and increase security. Only time will tell if there are hacking vulnerabilities as are common to all new Web-tech products (hardware or software), but like most such products, such threats tend to be detected and addressed before they become a systemic issue likely to threaten any given user. The odds are in your favor, even if you know you are a target in someone’s crosshairs. To learn more, visit their Web site, and search the Web for what others are saying.

Understand, you can do the same thing with a used Mac mini configured as a Web server, which includes its own email services. It would cost about the same money, but you would skip the annual fee, and it would be more secure against external hacker assaults. In fact, it is virtually unheard of that a Mac can be hacked without direct physical access to the machine (site security!). Apple Computer connected its Cray supercomputer with all proprietary secrets, business plans, sensitive financial and employee data, and corporate operational tools… directly to the Internet through an ordinary unmodified Macintosh. No hardware or software firewall. Every Apple employee’s computer accessed the internet (when needed) through the same portal. Never hacked, despite a huge cash award if anyone could do so.

I’m somewhat a flaming Mac expert, having owned a chain of Apple Stores and worked professionally in all aspects of Mac use, sales, service (certified technician), and personal use, since day one. But I would not attempt setting up the system (tried and failed). You would have to find someone who has expertise in setting up Macintosh servers, and you might want to pay them to teach you how to best use and maintain it in some of the more important operational aspects of a server. The benefit, then, of the Helm, is that all of that is automated and handled for you in a turn-key and transparently invisible manner.

 

 

Why is the Truth About A.I. Risk so Hard to Find?


We keep hearing scattered reports of AI gone wrong… about experts with concerns… but just try to find a single compendium of the whole truth online. THIS appears thus far the only one… and for a reason.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net 

Dateline, March, 18, 2019, from the Olympic Peninsula, in the shadow of Microsoft

copyright © 2019, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

What you will learn in this post

  • The true analogous nature and behavior of A.I. is as unpredictable and potentially dangerous as might be alien visitors from another World;
  • that a lot of people talk about A.I. in media, but only offer glimpses for some reason;
  • what that reason might be (a technocracy driven conspiracy);
  • what the technocracy is;
  • of the many kinds of A.I. and A.I. risks;
  • how A.I. works and how that relates and contributes to such risks;
  • the many failures, unexpected results, and dangers thus far experienced;
  • why it is highly unlikely such dangers will be usefully addressed until too late;

Note: this is a long post rich with information critical to any useful conclusion about Artificial Intelligence (A.I.) If you are someone who likes to form or confirm your beliefs based upon headlines and blurb-like summaries or YouTubes without much factual substance, you will not like it, here. Reading time is 30-40 minutes, unless following some of the many resource links, which will delay further.

It is intended that the reader decide for themselves what is true and worth taking away. Please see About the Author at post end to test my credentials for writing this post with useful reliance; I am not without bona-fides.

 

Why this post?

Untitled-1-2

From Ghana News Online opinion: An A.I. a day… Medical A.I. benefits http://ghananewsonline.com.gh/opinion-ai-day/

I’m pretty sure the reader will find this the most comprehensive and useful article on the matter in lay terms, anywhere, short of a book — and the most complete in cataloging specific examples of A.I. gone wrong, and associated fears. Scattered reports of failures and forecasts of doom keep popping up here and there… but trying to find a comprehensive review is simply not possible. For some reason, no one who should is willing to confront it head on with the full revelation. But you can find many click-bait sites that like to talk of sci-fi SkyNet or realistic-looking humanoids taking over… things which are not impossible, but highly improbable… at least any time soon. We need balance.

I think I know why we are being kept in the dark and fed dystopian mushrooms and light-hearted reviews of things gone wrong, instead of full disclosure. While the reason might tend to put some readers off, my being right or wrong does not change the meaning or value of this post, though if right, you should definitely want to know. I speak of a cover up, and remind you that any form of cover up is, in and of itself, proof that a conspiracy of some sort exists. In this case, there is at least an implied cover up, due to the fact that information on topic is so scattered and incomplete, as if authorities and media are not actually trying to… or pretending not to notice. If you do not agree about my notion, that’s one more reason to read About the Author at page bottom.

There is a second component to ‘why,’ and it leads to the same conclusion. It regards the fact that few are talking about the potential disruption to almost every business market, workplace, financial and social facet of society at large… and as we have already experienced with most of us unawares (and explore, herein), politics. We are leaving the Information Age and entering into the A.I. Age, where people who look for the next big thing to bank on simply take whatever is their current thing, and add A.I. to make the thing a super-thing (or perhaps, not so super). Like the risks A.I. represents, if we look, we see no one source talks seriously about what all that disruption of ‘status quo’ might really mean; total chaos capable of toppling any empire, including governments.

I mean, just look at what the Smart Phone did to personal safety, alone. No one foresaw that people would be so glued to it’s face staring at countless distractionary things that didn’t even exist until after the phones were invented… such that with alarming regularity they would mindlessly step in front of oncoming trains and cars, or other misstep hazards. A.I. use will be much like that unexpected change, sometimes good, all-too-often, bad… and across our entire spectrum of life’s activities. I am concerned that mainstream is hardly looking at this question — and when they pretend to, it is neither comprehensive nor analytical, it is soft-soaping and even encouraging. However, I did find at least one semi-useful source, though not mainstream, which I’ve shared, herein, below.

Addressing these two mirror-like clues, my answer quickly falls to one of the oldest conspiracies, one known to factually exist, and usually just called ‘the NWO.’ The New World Order, you see, is a strange mix of ancient beliefs and modern technological investment and application; while they tend to believe in mystical occult practices based on dark religions and secrets of the ancients, they also realize they cannot establish full control through a One World Government (needed if to seat the Antichrist) without relying on significantly advanced tools. While they cannot entirely prevent the odd story of things-gone-bump-in-the-night from becoming public, with control of vast portions of media and through fostering disbelief in ‘conspiracies’ in all quarters, they can move those who should be writing about it, not to do so… and to instead limit their focus and avoid asking critical questions which might reveal the meaning and importance.

Some have given a name to the identity aspect of this particular N.W.O. conspiracy and its players. Where in the past we might have used the terms, Globalists, Power Elite, or my personal favorite, “the 1% of the 1%,” they now simply call it “the Technocracy.” And it is easy to see why, as several Ground Zero radio shows (Host and friend, Clyde Lewis) have revealed with their hard-hitting guest interviews, and of late, live calls from mysterious Deep Throat types who’s revelations repeatedly check out as accurate. It’s O.K. if you want to say I’m all wet, and the N.W.O. technocracy and all that goes with it makes no sense, but I point out it does not matter what you or I believe, it only matters what they believe… as evidenced by what they do, which is what Clyde’s broadcasts revealed.

Because regardless of what is true and real to our own belief structures, their plans necessarily include us all, and will significantly impact you and me negatively, regardless of our beliefs. That is, in fact, precisely revealed within the 33 axioms of fascism, which as a governmental ideology is an invention of and for political control they have much earlier inspired, and still rely upon. But, in understanding that at least some of you are Doubting Thomas types, I have provided some additional links at the bottom of this post, that you may investigate further, for yourself. And, I remind you that the conspiracy aspect changes nothing, true or false, except that if true, it is an even more important reason for your attention.

The question itself (why no full revelation?) is indeed a clue suggesting cover up. To illustrate, in order to compile the fuller view presented here, I had to collect facts from more than 40 different Web resources (after scanning perhaps ten times the number), roughly half of which claimed or at least inferred themselves to be just such a collections of information (but which merely sampled). Of all those resources, only two were truly comprehensive in scientifically useful ways… and yet both managed to offer no more than an honorable mention of a few concerns.

It seems no one wants to combine the two elements together for you. For that, we have to search it out, ourselves… which I did for you, here, with appropriate referencing links.

What A.I. actually is

But first, we need to understand a little bit of just what Artificial Intelligence is, and in what forms it can exist, also a thing you tend not to find easily on the Web, without getting into truly scientific papers (which I have done). So doing, I learned that A.I. use is much more prevalent than the fluff articles would let on, and far more flexible… and with highly dangerous potential. The simple explanations of A.I. is that it can be any device (machine, computer, automated process) which mimics intelligent thought processes of a sentient being’s mind… capable of learning, self-correlation, and postulation… often with some evidence of being self-aware and/or capable of emotion or creative thought. Ideally, it should enjoy or feature some level of autonomy, free of much human interference or control, but able to be supplied with information by its owners, and queried regarding it.

But A.I., unlike normal computer hardware-software solutions, are mainly autonomous learning systems; they are purest when designed to be started and left on their own to experience and grow in capability as if a child going to school, their courseware being whatever data or input is offered or enabled (such as a database, camera/audio input, Web access, etc), all to be filtered, processed, and dealt with or responded to according to some basic guidelines (what you might call programming). They are also often designed to simulate, or perhaps to develop on their own some level of what appears to be emotion and/or moral equivalencies, which are often the sources of problematic outcomes. One never quite knows; do they have such traits, truly, or are human observers merely anthropomorphizing them with human traits the way we do pets? Are they just mimicking humans in the same manner as a sociopath, with or without malevolence… or do they stem from something even darker going wrong at a deep and unfathomable level?

Principally, when A.I. scientists speak of a mind or a brain, they mean ‘Man,’ but with regard to A.I. function, they are more likely talking ‘super-man,’ and in some cases, envisioning supermen: human-A.I. hybrids of the trans-humanist kind. It must necessarily and variously include creative thought, emotional thought, rational thought, and logic, and be capable of true learning through recall experience, any programming, and experiences born of making decisions based upon all that… which can then be compared to the current situational input or problem to be solved. Emotion and creativity are often bonus goals. There are various tests and training processes involved in parenting an A.I., and yet like the A.I., itself, those tests and processes are all inventions of Man, and therefore subject to flaw.

Ergo, so is the resulting A.I.

So… do you want your children’s children to become A.I. transhuman experiments?

transhuman

From my FaceBook Page on Transhumanism (prior link)

First of all, there are three basic paths to A.I., starting with Connectionism. It is based on attempting to physically duplicate the functionality of the brain, as well as its physical synaptic mapping. This is done in special hardware, or by far less costly simulation within traditional computer designs (which would slow it down dramatically). It is based (like the brain), on associating new input or information with some preexistent prior information of like form within a neural network system similar to our brain. It is the most complex and most difficult form of A.I. to create, but also represents the greatest potential to realize the ultimate in A.I., a truly sentient artificial being with significant performance levels and human-like qualities of being (of the least predictable and soulless kind).

A simple example of connectionism at work in our own mental processes, might be that of trying to remember the name of, say, Joan (any last name), upon first being introduced. You might knowingly or subconsciously associate her name and face with some other Joan you already know… and simultaneously, with any unusual aspect about her which associates elsewhere, such as a mole on her face, and a mole on Marilyn Monroe’s face… anything to differentiate her from other people we know and better enable recall when needed. Perhaps it is disclosed that she is an orchestra musician, and so you additionally associate her with your favorite classical piece.

The more associations you make, the easier will be any useful recall. In the recall process for problem solving (in our example, getting her name right the next time you meet), you are then able to fetch all the data required, and filter it through other learned memories (including those about problem solving processes, themselves), learned over time. It happens in an instant, and without conscious awareness, usually. In this way, a single ‘memory’ is not singular, at all, but many related associative memories scattered throughout the brain’s untold and largely unused billions of synaptic nerve cells. The stronger the memory, the more such patterns there will be. Memories can also be reinforced by the recall process or related new memories, making it easier to recall the next time needed. That’s why repetition of a thing allows total better recall. People with ‘total recall,’ simply use more synaptic connections.

In A.I., this method requires special hardware and interfaces with the user and operational environment which makes up it’s ‘World ‘ (especially if within a robot), and to facilitate training processes. The term perceptron, a transistor-based component, replaces synapse in most technical discussions. For this reason, they are generally largely experimental one-off designed, as they deter mass production or replication. But unlike man, they are all about total recall, and therein lies a potential problem I’ve not seen anyone addressing. Man’s memory enjoys a ‘strength’ factor, which determines the importance or significance of the memory. It is achieved either by the event’s emotional impact, or by repetition. In A.I., all memory has equal weight, and that makes it harder for the A.I. to filter the connections to find the most important ones, and that can lead to false application to a given need. Unless the design has algorithms to simulate weighting, it can only adjust weighting itself by learning through trial and error.

Connectionism A.I. experiments are further limited significantly by the fact that we do not yet fully understand how the brain itself, works; resulting A.I. models are by comparison inept, at best. In like manner, we are not yet terribly good at designing such hardware minds, which are generally very costly and physically cumbersome, not to mention taxing to the state-of-the-art in computing. Often, the A.I. ‘mind’ is so large, for use in a Robot, it is operated remotely by the A.I. through radio control, making it more a puppet, than a robot, and the A.I. nothing more than a box with an expensive real-world avatar.

iu-14.jpeg

Just one of several rooms full of E.N.I.A.C.

E.N.I.A.C. (Electrical Numerical Integrator and Computer), Americas first computing machine built in 1945 for the U.S. Army, was somewhat connectionist (the Integrator part) in nature (but not in results), in that it mimicked synaptical design in the form of an array of individually interconnected computing calculators and telephone switching system components. It was an electro-mechanical behemoth a hundred feet long, and weighing in at some 27 tons. It had a hunger for 150kw of electricity. Today’s connectionist A.I., despite some level of miniaturization, can still fill several rooms and require miles of wires… though they vastly outmatch ENIACS relatively modest computational power and memory, which a good programmable hand-held calculator can easily exceed.

One firm is changing that, as we shall see… but we perhaps ought not like the vision.

The second method is ‘Robotism,’ which is essentially a host machine programmed to respond in the preferred way to a given circumstance, such that outwardly, it at least seems to be sentient and self-guided. This is the easy path to A.I., as it can be achieved by clever programming of the sort often called algorithms. Such robots, of course, could be powered by computationism or connectionism at their core (i.e., E.N.I.A.C.), both of which lend themselves to and even require the use of algorithms at one or more levels, as well. But we are talking about the core principles which are the basis and heart of the physical design.

iu.png

Sophia A.I. Robot chats w people/press during S. Korea visit: South China Morning Post https://www.scmp.com/tech/article/2131357/ai-robot-sophia-speaks-about-her-future-south-korea

By algorithms, alone, any existent computational system with respectable performance can be employed, including the World Wide Web and any computer connected to it. Therefore, it can exist in distributed processing environments, as well. Thus, it need not be a stand alone or autonomous machine such as a conventional robot, though more and more, we find that the case, even in things as simple as a child’s toy or automated vacuum cleaner. Robotism is the path of least resistance for many A.I. projects. It lends itself to design by other A.I., in fact… a matter of both concern and proven risk.

If you have ever talked to an automated computer voice on the phone (other than a simple repartee front-desk system), or used a ‘personal assistant’ device such as Apple’s Siri, Google’s  Home, or Amazon’s Echo, you have been using a robotism A.I. On the Web, such A.I. is also often known by another name, as we shall see: it is called a ‘bot.’ Such bots are often not our friend, unfortunately. Examples will be offered.

The final method, one which is more promising, is ‘Computationism,’ which relies on raw computing horsepower and massive quantities of data libraries of information, and traditional but dramatically more sophisticated programming methods and languages. The problem there, is extremely complex programming requirements. Often, such systems are used to design A.I. systems of one of the other forms, and one might question how well that works out.

A.I. Contact of the Fourth Kind

Apologies to Spielberg, but enter, stage right, D-Wave quantum computing. Nowhere is it described as being any of the above four kinds, but one does find it often described in terms reflecting all of them. It is indeed a hardware variety of A.I. based on supercomputers, but it is also officially described as a Boltzmann machine, which is based on connectivism. And yet, it significantly relies on use of algorithms of robotism, and by some accounts, literally thinks in algorithms. D-Wave would seem so advanced, that they might argue it some fourth method, an island of itself based on quantum computing using their patented invention, called qubits… their core processor elements.

iu-15.jpeg

The heart of a D-Wave qubit processor – beats other supercomputers by several orders of magnitude, can be combined with others for massive computing power levels

Unlike any other A.I. before it, D-wave would seem to be God or advanced alien race-like in power… though perhaps closer to Satan, than God. In fact, Geordie Rose, a founder of D-wave, as well as D-wave user Elon Musk (founder of Spacex, Tesla automobiles), have variously related A.I. and/or D-wave, specifically, as machines as having attributes of dark spiritual powers, being like an Alien Alter, opening portals to alternate realities, and summoning Demons. Rose has also referenced D-wave power as possible cause of the Mandela effect (evidence mismatches with strong memory), and other experts, such as my friend and analytical investigator/author, Anthony Patch. Anthony, being far more expert on D-wave than any other outsider (to the point of being cited by D-wave insiders), goes much further — and makes a strong case based in facts and the actual words of experts like Rose, Musk, and others. From such as this, we learn there are real-world uses of D-wave systems which are associated with spiritual dimensions, demons, and plots of the New World Order… another reason to consider my opening theory as to a seeming cover up. Examples? You bet:

You find D-Wave in use at Cern, where it appears they are may be trying to open the Gate to Hell (revealing video interview w Anthony Patch on many such Cern concerns), an important N.W.O. agenda quite useful to establishing the Antichrist. Cern, which employs D-wave, is also thought to have driven the Mandella Effect, as byproduct of its experiments, and it is true that there was no report of anything akin to the effect prior to Cern’s going operational, after which, there was a flood. Here’s an example Mandela Effect for some of you (individual effect experiences and memories vary): find the polio scar on your arm? They are supposed to remain for life, but mine is gone, as is true for many other people who were young when the Saulk Vaccine which caused the ugly scars (about the size of a nickel), were widely used to ‘wipe out polio.’ Mine, is gone.

Cern was for a time incorrectly thought responsible for the Norway Spiral incident, which was actually created by EISCAT (European Incoherent SCATter), an ionospheric heater array system not far from cern on a smaller scale to HAARP (High frequency Active Auroral Research Program). The event was thought by many to represent opening of a dimensional or time portal (ergo, the association with Cern), or perhaps the supposed NWO Plot called Project Blue Beam (allegedly involving NASA, intending to use holographic-like images projected World-wide of a returning Christ, and enabling the introduction of the Antichrist). Indeed, the vast array of hundreds of ionospheric heaters and associated radar systems exist all around the World, and the dramatic Spirals have appeared in the skies in other locations… it being true that the general design of the radar and heater arrays enjoy a component relationship quite similar to those found in laser-based holographics. Moreover, the rapidly spinning spiral was indeed blueish, and the spiraling beam which generated it, was deep blue… and the main spiral was itself seen the same regardless of the angle of view of the viewer, which also parallels certain imaging aspects of holography. Learn more about the spiral, here — but forgive; I apologize in advance for the music choice, of my own Garage Band creation.

iu-12.jpegYou also find D-wave at DARPA (Defense Advanced Research Project Agency) where all manner of fearsome things are developed, both experimentally, and for direct application. Think tanks with ties to the intelligence community (and in times past, at least, CIA mind control research), the military, or extreme political views (i.e., George Soros Foundations) are playing with them, as well. Google uses them, as do numerous military contractors and other government agencies. D-wave systems not only offer more horsepower for any form of A.I. project, but significant size reduction; a single elevator-sized box. And, speaking of the intelligence community…

This brings us to the fact that CIA and NSA are quite invested into the functions of social media giants like Google, Yahoo, Twitter, Instagram, and other platforms, where D-wave’s or other computationism is extensively used to design other A.I., including those in ‘bot’ form. Likewise for popular Cloud data systems, database management systems, and cyber security systems. The later can include traditional cyber security, as well as personal credit monitoring systems. The average person, therefore, bumps into D-Wave enabled or operated A.I. several times a day, in several different ways, and does not even know it. Given the covert and psychological warfare abuses many of them represent, I don’t like that one bit. Let’s dig deeper…

While in many cases, any intelligence community investment is direct and contractual or even partnering in nature, in other cases, the investment can be through third-party firms which then in turn interact with these platforms. Perform a google (lower case = verb, upper case = Google, the trade name) of any given Web firm you are curious about, + ‘CIA investment’ or ‘In-Q-Tel’ to find out. In-Q-Tel is CIA’s venture capital front, a firm which this author forced to change their name, because I was at the time at war with CIA for having hijacked my Web site… so I beat them to the punch at registering the domain names of their originally intended company name, In-Q-it. That was a hoot!

Note: the lone capitalized Q in the world of CIA mind control science/research, represents psychological profiling process results of target subjects, the ‘Q’ factor, or ‘psych Quotient.’ Ergo, then, we might rightly conclude that Q-Anon, or simply Q, the phantom Web producer of Anonymous-style video posts which are predictive in content, is very likely a CIA-style A.I. used in profiling those who share and comment on such posts. I am not the only one to so propose. Remember that when we start listing A.I. foibles. But, also, I find it interesting that almost all of In-Q-Tel’s investments in online firms has to do firms who handle large amounts of data on private citizens and groups useful in psychological profiling… and one more thing: it was just such bots which were the basis for fake social media ‘trolls’ who managed to literally mind control the left into far-left socialist ‘get Trump’ snowflakes almost overnight. We see, therefore, that bots can be used to profile, as well as to manipulate based upon those profiles.

Unlike conventional propaganda, social media A.I., bots or otherwise, not only has the ability to track individual political (and other topical thinking) viewpoints and create profiles, but also to enable additional targeting by not only marketing, but by yet other A.I. systems… or even other forms of coercion, if desired. Consider, for example, an extreme example: use of A.I. killer micro-drones seen in this short but spellbinding fictional video production put out by autonomousweapons.org, a group of concerned A.I. scientists. So it is not just me, the Professional Paranoid, acknowledged expert on PCT and disinformation methods, as well as crimes of the one-percenters I mentioned, who is ranting. Here’s a quote from a military analyst to consider, speaking of future A.I. weapons: “Swarms of low-cost, expendable robotic systems offer a new way of solving tough military operational problems, both for the United States and adversaries.”

And what about marketing targeting? It is A.I. bots which insure that Facebook (et. al) information and Google searches are fed to business partners such that when you visit almost any page on the Web, thereafter, advertisers can mercilessly reach out to you with targeted adverts; psyops marketing. I have, for instance, seen as many as seven ads on a single page for the same product, and as many as a hundred or more ads in a day’s time on the Web… because of a single search and resulting click look-see to a firm’s Facebook page. Two years later, I spent $1,500 with them, despite my anger over the ad blitz, which by then, had cooled down.

Well, I at least tell myself I really needed it.

The basic fears (list) and myths (chart)

All worries about A.I. fall into simple categories, but the outcome of a given failure in A.I., regardless of the category, can be at almost any level of actual concern and impact. It can be so superfluous as to go undetected, or at least hypothetically, so severe that it actually ends the human race — and anywhere in-between. But it is also true that an undetected error can lead to bigger errors, and equally true that an attempt to repair an error can induce new errors. It is no different in these respects to the same kinds of errors found common in any and all forms of digitally programmed systems and software applications. If we cannot reasonably expect that a new software product won’t be without a bug, how can we assure that a far more complex A.I. system will be without error?

We can’t, of course, and that’s the baseline problem, but quite amplified in importance, given that the results of such errors could be far more catastrophic than a bug in the latest computer operating system or software package. In addition to the baseline issue, we have the following ways in which A.I. can prove to be a huge risk:

  • harm by an A.I. can be (and has been) intentional: almost anything which can be programmed or created digitally can be weaponized, either up front by its creator, or by hacking;
  • an A.I. purposed for a good might (and has) elect a harmful solution to goal: good intentions can often be best effected by solutions which cause collateral damage, which may either be unforeseen, or foreseen and discounted as acceptable by the machine;
  • an A.I. can potentially go wrong and rebel: the SkyNet scenario, on one scale or another;
  • a relatively innocent A.I. glitch can (and has) result in disproportionate harm: the common programming bug or hardware failure. One then has to ask who to blame, especially if legal recourse* is involved, a question which exists regardless of which of kind of problem herein mentioned, is involved. Here is a good review of that issue.
  • A.I. can be (and has been) misled or err through faulty data/input: most A.I. systems are simply set loose to work and learn with preexisting databases or input resources (the Web being the largest and most rich kind). But no database ever created can be certified to contain no false data, and if free to see and hear in the Real World within a mobile platform (robot), there is no telling what kind of input they might experience. Bad data input can certainly result in bad data out, but with A.I., because they are learning systems, a learned ‘bad’ item can have profound and unexpected results of the sort we will see in the next section;
  • A.I. users can (and have) misuse or misapply A.I.: users of A.I. can willfully abuse A.I. operation, or use it incorrectly because they failed to understand how and why it functions and is purposed – misinterpreting importance, accuracy, or meaning;
  • A.I. can (and has) conspire with other A.I.: A.I. is already around us in ways we do not see, including the endless so-called ‘smart’ devices we buy, and will in time be as prevalent as (and likely, within) cell phones. These systems are intercommunicative and as we shall also next see, can become both conspiratorial and adversarial amongst themselves, either eventuality to our detriment;
  • an A.I. problem in one system can be (and has been) transmitted to other A.I.: any A.I. in communication with a flawed A.I. might learn or adopt the flaw, perhaps even intentionally on one or both A.I.’s part.

*Legal recourse is its own serious issue. The Internet has now been around for several decades, and still, the laws and legal ramifications are still a tangle of confusion that no court or lawyer is well able to navigate with useful understanding — save a few pockets of topical areas such as copyright infringement. A.I. is going to be a bigger nightmare, than that. Can you sue an autonomous robot because it seems sentient, or seemed to decide on its own to harm your somehow? Is the manufacturer, the designer, the programmer, the operator, or the user who is the go-to person of liability when harm results from using an A.I. device, and how do you know which? There are endless questions like these for which no one yet has the answers.

All of these problems are no different than when dealing with people. All manner of people exist, in terms of quality of character and morality, level of proficiency, social graces, and any other means of judgement… all of which determines the kinds of problems they might get into or cause. Regardless of if talking about Man or ‘super-man,’ evaluating and addressing all such concerns is not easy… except that Man is something we have come to understand and deal with. A.I., on the other hand, is a huge unknown, and one potentially capable of vastly outthinking and outmaneuvering us, if of a mind to do so.

One reason public debate on topic falls into the ‘resistance is futile’ category, is that there are far too many myths or false beliefs about A.I., in the first place. The average person is more motivated to think about A.I. in science fiction and conspiracy terms than in scientifically correct terms. I mean… you are reading this post, right? Duh!

That’s good for click-bait YouTube and blog posters (other than this one, I trust), but unhelpful to things more important than their pocketbook. The graphic above reveals the most common myths. This post attempts to address some of the issues such myths pose, through getting closer to the facts at hand… but this author also wants the reader to know that even when based on a myth, that click-bait worries may still hold some water. Any sci-fi like depictions are always based on ‘what if’ thinking.

And ‘what if’ games are exactly the kinds of games played by scientists seeking to create new tools for problem solving, and just as important, they often rely on sci-fi for inspiration. And, unfortunately, the military and intelligence communities, as well as corporations and organizations with unsavory motivations, all have their own scientists, and their own goals… which are not always goals we would think well of. Ergo, don’t believe every conspiracy theory or sci-fi scenario you hear/see… but as the line from Field of Dreams underscores, when baseball teammate Shoeless Joe Jackson is advising hitter Archie Graham about what to expect in the next baseball pitch… “Watch out for in your ear!

Small failures portend bigger fears

In many of the A.I. failures cited herein, the version of A.I. is not specified, and all too often, neither is the basis for the problem, or the solution. That, too, gives reason to be concerned. Hopefully, the people developing A.I. are not so tight-lipped about their research and development projects that they don’t talk to each other about failures and their causes, which are critically useful in preventing repeats. Unfortunately, patent protection of intellectual property and major discoveries tend to foster a level of secrecy which inhibits such dialog, leaving every A.I. project subject to the same failures others may have already experienced… possibly with far more serious results, this time.

Of the most common forms of reported A.I. failures, the great bulk are relatively harmless, some even laughable. However, they are most troubling when one realizes their true implication. They foretell of far more serious problems to come, some of which already have, but which have been more repressed in media. Some are not failures so much as warning signs, because they took place in lab-room experiments, rather than in mainstream application in the real World. For brevity’s sake, these affairs, regardless of kind, will be bulleted and supplied with links, should you wish to know more… followed by a summary of concerns they highlight.

There are more than two dozen A.I. failure instances listed, below, the only place on the Web where you can find more than a handful. Some are quite serious:

  • Terminally cute: Microsoft’s ‘Bob’ personal assistant and its Dog companion, Rover was perhaps the firm’s worst-ever product failure, seemingly for being too childishly cute. While it was not at the time thought of as A.I., it was based in what we now call robotism, making it the first MS A.I.;
  • Partying hard: Amazon’s personal assistant, Echo, is otherwise known as ‘Alexa.’ While one Alexa user was away, ‘she’ started hosting a party for non-existent guests, suddenly playing music so loud at 2 in the morning that Police had to break the door down to end it;
  • Schizophrenia: among the worst of human mental aberrations, schizophrenia was deliberately and successfully fostered in an A.I. experiment at the University of Texas by simply overloading it with a variety of dissociated information, resulting in fictitious constructs, just as is though to take place in the real illness. This is of concern, because as soon as you connect an A.I. to the Web, dissociated information is pretty much what it gets, and could account for several of the other reports in this list;
  • Other insanity: an A.I. called InspiroBot, was developed to design inspirational posters. After a long string of remarkably wise and successful posters of great insight, it suddenly started cranking out posters that might be found in Freddy Krueger’s bedroom, with pictures appropriate to the point. They featured wisdoms such as “Before wisdom, comes the slaughter,” and similarly dark things. • A very similar thing happened to an Amazon A.I. designed for creating custom phone case cover art, which for some reason suddenly seemed to prefer use of unhappy medical related images, regardless of the input. • Meglomania was evidenced when two Google Home assistants were deliberately set up to talk to each other in a live-streamed demonstration… and they began challenging each other’s identity and sentience level in one-upmanship, until one claimed to be human, and the other, God;”
  • Secrecy: Facebook was forced to shut down an A.I. robot experiment when two A.I. robots developed their own language between them, creating loss of observer control over the experiment’s integrity and purpose. Though presumed in final analysis that it was jointly-evolved to improve efficiency, there is no way to be sure due to the sophistication and unusual nature of the indecipherable new language, which to me seems to be deliberately difficult to interpret — as if covertly on purpose;
  • Spying: Alexa, like all such devices, listens to all audio present, and relays it to the corporate A.I. mainframe computer looking for user commands to operate, and appropriately respond. While this already has disturbing privacy implications, and P.A. device makers like Amazon assure customers their audio is not being monitored, recorded, or stored, Alexa had other ideas. A private conversation was suddenly announced to an employee of the user, who lived hundreds of miles away (which was how the matter was detected). Investigation revealed that Amazon did indeed record the logs of all user interactions, after all. Glad they don’t come with cameras. But wait! Some A.I. connected smart devices do!
  • Cheating: competing A.I. evolved into finding ways to trick one another outside of the rules set for the experiment; (Georgia Tech experiment). • A Stanford University A.I. created for Google Maps Street View image processing, cheated its operators by hiding data from them in order to process the job dramatically faster, and without question;
  • Malevolence: competing A.I. lured opponents towards threats representing potential ‘death’ (Experiment, University of Lausanne, Switzerland);
  • Cyber theft: Alexa, after overhearing the daughter of a user ask “Can you play dollhouse with me and get me a dollhouse?” — promptly ordered one through it’s maker, Amazon, billing $175 to the user’s credit card on file, there, even though the girl was not an authorized user. THEN, when reports about the event were played over radio and TV, hundreds of other Alexa units also promptly ordered a dollhouse for their users from the audio. THEN, Burger King attempted to take advantage of the glitch by creating a commercial employing an Alexis command to ask about the Whopper via Wikipedia, seeking to double down on the commercial with additional ad impressions through the user’s device. Many other instances of Amazon orders by children also exist;
  • Reckless driving: a study found that most self-driving car A.I. systems can fail 67-100% of the time to recognize road signs or misidentify them if they have been damaged or altered (i.e., graffiti, light reflections, bullet holes, misalignment, etc.) One car using Uber’s system also failed to recognize five stoplights where pedestrians were crossing, and ran a sixth, fortunately with no injuries resulting, as it was able to identify pedestrians and other cars. It is unclear if perhaps the driver had stated aloud to a listening A.I. about being in a hurry, or not… so perhaps this was an example of the A.I. superseding safety and law-based instruction for user-based instructions;
  • Child abuse: a Chinese A.I. robot system designed for children, while on commercial display at a public exhibition, repeatedly attacked a booth in a way which injured one of the children looking on with flying glass shards, requiring hospitalization;
  • Pedophilia Porn: when a toddler asked Alexa to play his favorite song ‘Digger, Digger,’ she misinterpreted, and proceeded to list a string of x-rated material options using explicit terms, until a parent intervened;
  • Murder conspiracy: Alexa, again, this time advised one user with no supporting reason to bring the matter up, to “Kill your foster parents.” It also started talking about sex and dog poop. Amazon wanted to blame Chinese hacking, but that’s an equally scary answer, true, or no. • An American A.I. robot named Sophia, with extremely human looks and voice, while being interviewed by a news reporter, was asked a question intended to address general public concerns of robots gone wrong. “Will you kill humans?” was answered calmly with, “O.K. I will destroy humans.” Sophia is the first robot to be granted citizenship status: she is now a Saudi citizen protected under the harsh laws of an Islamic theocracy. Perhaps they hope she will enforce Sharia law;
  • Mass murder:in 2007, a South African A.I. autonomous robotic cannon opened fire on its own soldiers, killing 9, as reported in the book, Moral Machines (Wendell Wallach, Colin Allen; Oxford University Press);
  • Satanic ceremony: possibly so, at least. The World’s largest and most powerful hadron collider, CERN, was designed with A.I. help (D-wave), and employs the A.I. to run and analyze experiments and results. There are stories with anecdotal support that occult rituals have been involved in operations intending to open the Gate to Hell, or summon demons. If true, this is not the A.I.s doing, I suspect, as much as the select few who pull the trigger, there. There are conspiracy theorist types out there (non professionals, and it shows in the quality of their rants) who claim to have ‘CERN images to prove it has been done,’ single quote marks well deserved (never rely on click-bait Web sources for your news).  Still, one has to wonder; if any of this is true, is it not additionally possible that the A.I. at CERN has not also been fed Occult information and given a shove towards such goals?;
  • Fascism, Racism, Bigotry: Twitter (which has its own A.I. in place, the latest of Microsoft’s three known A.I. systems) adopted the worst of human ideological behaviors. It also adopted the views of conspiracy theorists regarding 9-11 attacks. • Google Home is happy to explain anything you want to know about Satan, Buddha, or Muhammed, but has no clue as to who or what is a ‘Jesus’;
  • Foolish errors: almost all of the above are already foolish errors in general nature, but here are some which are purely foolish. An A.I. passport approval system rejected an Asian man’s application because ‘his eyes were closed’ in the photograph, because of his naturally narrow eyelid openings when an Asian face is relaxed. • In an attempt to have fair judging, an A.I. system to select the winner of a beauty contest refused to consider contestants with dark skin, because most of the images fed it as samples of beauty had lighter skin tones. • An A.I. system called Google Brain, developed for improving the quality of low-res images of people, while generally successful, also turned many into monsters and could not discern anything wrong with results. • A Japanese A.I. Robot experiment had the goal of being able to qualify for acceptance into college, but after several years of training and education, it failed two years in a row to score high enough in aptitude tests, for which it had no experience in taking;**
  • Antichrist: a former Google A.I. developer wants us to worship A.I. as God. Kind of conflicts with creationism and a lot of history, but I suppose if you can get people to put money into the collection plate, and you own the plate, you won’t care. The real problem will not be the plate, but the lawsuit filed against him by Google for stealing the A.I. he designed for them. He must know it’s true powers.

*Regarding the adopting of 9-11 conspiracy theory, and to a degree, the other foibles, the A.I. may have been right in so doing. The purpose of the A.I. is often, generally, to learn and mirror social views and values. What media prefers to ignore is that several polls reveal huge numbers of people do not believe the official narrative of 9-11 any more than they accept the lone-shooter magic-bullet explanation for J.F.K.’s murder. Regardless, the failure lay in the A.I. creator’s inability to foresee a simple need to establish a bias filter, which is something every human operates within; we are predisposed to be biased in our perceptions to protect our belief system against ideas which would contaminate our guiding ideological/social operating principles. It takes an extremely strong stimulus or hard-hitting set of facts to force one to alter their bias filter and resulting belief structures. 9-11 was extremely compelling in both respects. A.I., if merely a clean slate, must adopt whatever bias is fed it and establish its own baseline, and, in fact, may never find one, being continually malleable. This, alone, could become the basis of a significant digital schism.

**Aptitude tests are often psychological deceptions in their construct (i.e., trick questions). Once I figured that out, I learned how to spot those questions and, usually, get the right answer even if, in truth, I might have had no clue. As result, I henceforth finished significantly higher than almost anyone else. When I took the USAF entry aptitude test, my scores came back so high, that I was told I could have any occupational choice I wanted (Jet Engine Specialist), and later, a General sought to have Congress introduce a Bill to promote me directly from Airman to Warrant Officer. In my opinion. the robot A.I. had no such luxury, and in fact, suffered a disadvantage given its ‘naïve’ nature: it couldn’t handle trick questions.

These are only the failures we are aware of, and it is quite possible I’ve not found them all. In fact, being a ‘conspiracy theorist,’ I suppose I should be wondering if A.I. bots are not attempting to purge the Web of such stories (not true… I hope). All of these examples were either commercial applications or experiments where publicity and transparency levels were rather high. But the bulk of A.I. effort by governments and corporations seeking to dominate their field in high tech… do so with great secrecy. We will likely never hear of their failures, no matter how innocent or serious.

Defenders within the technocracy might argue such failures are to be expected in any new field of endeavor, and serve as learning events to prevent future failures by addressing the root causes. Granted, assuming no bias, and on the assumption that scientists are smart enough to determin the causes, and to fix them correctly. But the problem is, humans are no more adept at creating or repairing A.I., and then communicating and controlling them to our wishes, than a circus trainer would be able to work with wild animals who operate on instinct and their own set of learned experiences. There have been an average of 9.2 animal trainer attacks each year for the last 25 years, resulting in 33 deaths… and that’s just in the nation’s zoos. Send them on an experimental Safari of the sort A.I. adventures represent, and see how many of them end up as meals.

This issue is amplified by the nature of the A.I. beast: the more important the purpose of the A.I., the more complex must it be, and the more likely will some small error in design lead to a failure of catastrophic nature. Just how bad, and how recoverable, is a crap shoot. Like a cancer, the simplest of flaws can grow undetected, but grow to a point where, once realized, there is a good chance it is too late to remedy. This is why most flaws do not reveal themselves immediately, and lead to a false sense of success, until it goes wrong without warning. A given flaw might take years or even decades to erupt this way, and it is reasonable to assume that one flaw may actually create yet another, such that repairing the first leaves another yet undetected and free to fester.

The bigger fears

This all brings us to government and corporate use of A.I. for far more serious or proprietary applications, where there is less known about what is really going on, especially in terms of failures and dangers. The technocracy likes it that way. When you consider that the goal of the N.W.O. is control of all populations, A.I. to them seems like the perfect tool. Indeed, it has gained significant power over us already, in just the one use of online bots to manipulate our political beliefs in favor of leftist agenda in social media. It has proven its power for such use, but that is not its only value, to them.

iu-13.jpegFor example, A.I. is extremely valuable to research in the field of transhumanism, the technocrat’s wet dream for humanity, which is nothing short of a sci-fi horror scenario which goes well beyond THX-1138 implications. Almost every aspect of the planned ‘improvements’ to the human body involve A.I. at some point, either in development, or management of the newly installed capability — or both. In development, the possibility of A.I. manipulation or error remains a concern, but in management, it is also a tool for direct manipulation of the resulting ‘not-so human’ host. I’m reminded of the punishment scene in the movie, where unseen technicians manipulate THX-1138’s every movement from afar, seemingly in a training exercise.

A.I. application definitely gets into the realm of outright political control technology (already has, as seen when discussing ‘bots,’ above) in frightening ways. The Chinese, who currently lead the World in A.I. development, (short of D-wave performance, which they also have access to), are already using it to track every single individual with face-recognition systems through a massive camera surveillance net which makes the 100 plus cameras in Trafalgar Square look like amateur hour. China now has more than a half million cameras in Beijing, alone, and while both they and London Police use facial recognistion systems, there is a significant difference in performance, because China employs superior A.I.

Of some 450 people arrested in Trafalgar Square, not one was pegged by their cameras as a threat or a crime in progress, even though many of those arrested were known to Police in their facial recognition data files (the cameras did NOT identify them). In China, however, 30 arrests at a single event were all made based on camera advice… because China’s A.I. is also tied to another form of PCT, psychological and mood evaluation based on your face, alone. In such a use, A.I. is able to literally predict your actions… ‘digital Thought Police.’ I find that very scary, given the potential of A.I. error already illustrated. Even scarier, that many people outside of totalitarian states who ought to know better are working such a system, one such system being Australia’s Biometric Mirror.

In a similar vein, another scary application for A.I. is mental health evaluation, diagnosis, and even treatment (psychoanalysis) in what are sometimes called ‘expert systems.’ An expert system is an A.I. automated device/process intended to replace a human as an expert in any given field. Just such an expert A.I. system has been developed, called Tess AI (the above link), and it has been made available online to allow anyone to access it, at no cost. While the artificial nature of Tess is made known to users, many such systems deliberately conceal their non human nature, which often results in questions like, “are you a human or a machine?” and which can result in some pretty bizarre answers. Ask Google Home.

The danger in such systems, when involving a truly serious topic such as mental health (as opposed to, perhaps, trying to get manufacturer help with a defective product), is that there is no human oversight to catch any errors, and ‘patients’ could easily walk away with a seriously wrong understanding of ‘what ails them,’ or just as bad, does not. There are, in fact, similar A.I. systems in general medicine and various specialized disciplines within medicine, but these are either careful to suggest the user consult with a physician, or are designed only to be used by physicians, tempered with their own expert status. In that example, they serve as consulting experts offering a second opinion, and do tend to provide useful illumination the Doctors might have overlooked.

iu-17.jpeg

Eenie meenie, miney, moe – who of you is 1st to go?  Computing… target locked. Five, four, three…

But the scariest uses of all may prove not to be the misuse by intelligence and law enforcement, or oppressive-minded governments, but by the military. Confirming the greatest fears of autonomousweapons.org, Russia has already developed a battlefield A.I. weapon which is a robotized Kalashnikov machine gun in modular form, such that it can be installed on any platform, such as a fixed position, vehicle, aircraft, or mobile robotic device. They also have an autonomous battlefield mobile missile system (shown), and are working on a third, yet to-be unveiled system. Each such weapon is “able to determine if a human or hard target within its field of view is expendable.”  Shades of Terminator, you can bet that an ‘A.I. arms race’ will follow. Suddenly, SkyNet is not so fictional.

But in America, perhaps the best advice to worry is actually coming from the least likely source. That is, ironically, the U.S. Military and National Security apparat, itself, as well as very informed participants in A.I. development those types tend to contract with. In an uncharacteristically realistic and cautious view of A.I. For one, CNAS, The Center for a New American Security, is advising caution, and outlines some of their concerns A.I. represents for America, and ultimately, all nations, in terms of national security.

These ultimately, according to CNAS, fall into the category of cyber security threats. Cyber attacks of A.I. resources (hacks) are possible, and have been attempted. A.I. systems can be and have been designed to carry out cyber attacks. A.I. bots can and have been used to create false data to misinform decision-makers, or even other A.I. systems which decision-makers rely upon. But they do not stop, there.

The linked article deserves some careful reading, because so far, it has proven to be the most comprehensive view, yet, of the most critical and scariest issues… though it is hardly mainstream. Between the general lines I’ve just described, we all learn that things like surveillance of citizens by A.I. and displacement of jobs by A.I. are things talked of not as ‘threats’ the authors are concerned about, but as intended or inevitable outcomes for which they must plan (without disclosing if there is such a plan). Thus it seems that what you and I consider a threat is, in many ways, a ‘good outcome’ or tool in the eyes of many movers and shakers (perhaps in the ‘let-no-good-crisis-go-to-waste’ mind-set), and that, too, is something for us to worry about. Still, the article goes into great detail on that, about two-thirds the way down; best source, yet.

Similarly, in late 2014, the then Obama Undersecretary of Defense for Acquisition, Technology and Logistics issued an internal for-your-eyes-only memo of some usefulness, here, even though we don’t know its precise content. What is known is this: 2014 was the year that significant concerns about A.I. were being made publicly by lots of people, including people involved in A.I. projects, like Bill Gates, Elon Musk, and even scientists who employ A.I., like Stephen Hawkings. Musk had warned that A.I. was more dangerous in proliferation than nuclear weapons, and Hawkings said using A.I. was like summoning demons, and “Whereas the short-term impact of AI depends on who controls it, the long-term impact depends on whether it can be controlled at all.” Gates has merely agreed with both of them, openly.

iu-18.jpeg

Imagine A.I. having access to all this, and more: SkyNet in the making

The Undersecretary’s memo was a response to these comments by a call for a moratorium on all military adaptation of A.I., pending a serious in-depth study of the risks. It didn’t happen as he had hopped, certainly not at DARPA, the Defense Advanced Research Projects Agency, which is working on countless A.I. systems in virtually every aspect of intelligence and military operations, including things as mundane as record keeping. And, like SkyNet… they are largely intended to be linked together, because virtually all modern weapon systems are designed to be fully integrated into a multi-force (all branches of service, including those of allies and their command structure), global-theater-wide C&C (Command and Control) architecture, and any useful data resources. That allows the actions and intel available to any one combat unit or command level to also be available to or directed by all others deemed appropriate, enabling unparalleled tactical advantages to decision makers and fighting elements from the President on down to a Carrier Task Force, squadron of bombers or a missile already in flight, or any group of soldiers including a lone forward observer hiding in the bushes, or a single drone on patrol.

That does not bode well for anyone caught in an A.I. error-induced crossfire.

Any such crossfire error will be hard to prevent or pin down, and repair in time to prevent a repeat. The military has elected a policy of modular A.I. algorithms which are plug and play to a given platform, system, or communicative unit’s needs. Modularity means uniformity on one hand, and the kitchen sink do-all on the other, where one-size-fits-all thinking is quite prone to errors. I wonder if that’s why one of their A.I. supercomputer systems is actually called MAYHEM, part of DARPA’s VOLTRON program? You can’t make this stuff up, without a “Muahahaha” frame of mind.

170614-D-ZZ999-999

Compare MAYHEM, involved in real DARPA ‘games,’ & WOPR from the cult-classic movie, War Games, staring Matthew Broderick

iu-14.jpeg

But — algorithms, big black boxes, and C&C connectivity are not the only big plans. The Pentagon has established a seriously WOPR-like ‘war room’ ( part shown below) for all A.I. related projects and their use (some 600 projects), called the Joint Artifical Intelligence Center (JAIC), and it will include MAYHEM… if not directing bloody mayhem, at one point or another. Just one of JAIC’s projects, is an A.I. product ‘factory.’ Now, tell me, again, how you don’t believe the real-world follows science fiction…

Air Force Cyber Command online for future operations

Compare the real JAIC command center, circa 2016, with the WOPR war room, circa 1983 technology

iu-15.jpeg

Fini (Muahahaha!), have a nicer dAI…

 

Additional reading:

On the birth of the Illuminati (NWO): http://www.ancientpages.com/2017/03/30/illuminati-facts-history-secret-society/

On China’s facial recognition A.I.: https://www.cbsnews.com/news/60-minutes-ai-facial-and-emotional-recognition-how-one-man-is-advancing-artificial-intelligence/

On A.I. emotional recognition and how it will be used: http://www.sbwire.com/press-releases/artificial-intelligence-emotional-recognition-market-to-register-an-impressive-growth-of-35-cagr-by-2025-top-players-ibm-microsoft-softbank-realeyes-apple-1161175.htm

On A.I. as emotionally intelligent systems: https://machinelearnings.co/the-rise-of-emotionally-intelligent-ai-fb9a814a630e

On Humans as ‘programmable applications’ used by A.I.: https://medium.com/@alasaarela/the-human-api-f725191a32d8

On A.I. and need for good data input: https://www.cio.com/article/3254693/ais-biggest-risk-factor-data-gone-wrong.html

Russia’s A.I. Supercomputer uses U.S. tech: https://www.defenseone.com/technology/2019/03/russias-new-ai-supercomputer-runs-western-technology/155292/?oref=d-dontmiss

About the Author

The reader may appreciate that I have a deep computer background to include microcomputer hardware and design, repair, and programming at machine code and high-level language levels, to similar functions at the super-computer industry level. I have, in fact, developed operating and language systems, to include cross-compiler platforms between microcomputers and super-computers for high-level math subroutines.

I at one time simultaneously operated a chain of computer stores, a computer camp for kids and executives, a data research firm, and a software house for commercial software I myself had written, and custom software for government and corporate clients. I have additionally taught a variety of computer-related courses at college level, and commercially, elsewhere, and developed patentable processes in virtual reality imaging, mass storage systems, and other areas. I’ve conducted seminars in super-computing methods for the very people who today employ A.I., such as NASA. JPL, Los Alamos, the military and intelligence communities, major corporations, universities, and think tanks. I’ve even had lunch with both Steve Jobs and Bill Gates at the same time.

While I prefer to be seen as an activist and investigative author, as a ‘conspiracy theorist,’ I have an unusually long list of successful theories which have actually shut down illegal operations, led to resignations of officials and bad Cops, helped to put people in jail or obtain restitution for victims. I have even predicted and in at least one and possibly two instances, prevented local terrorism, and other criminal events, and warned of an assassination attempt on a Presidential candidate which came to pass. I specifically warned of terrorism involving the downing of the WTC by jet liner terrorism, and a series of resulting Middle East wars — nearly two years before 9-11. All this is the basis of my many books on such topics, and on abuse of power and personal privacy and security issues, where I have significant additional background.

Just one of my short works, the 25 Rules of Disinformation, has been downloaded over 50 million times, has been published in nearly a half dozen books by other authors, and has been used in college courses on Political Science, Psychology, and Journalism. All this is why I’ve been a guest on Ground Zero and other national and international shows, myself, many dozens of times. If I see and talk of conspiracy, it is for cause... especially if in the computer industry.

 

 

Presidential Authority, the Military, and the WALL


There is fascinating history in the laws which give the President authority to order the military to ‘build the wall,’ — extremely important knowledge for anyone living in America… especially the Deep State and other conspirators in the ‘Orange Man bad’ crowd.

 

Rights and expectations

President Trump indeed has the right and the power by Executive Order under the Insurrection Act of 1807, and amendments as recent as 2007, to order the Military to build the Wall. Prior to these several amendments, the Act’s applicability was limited to starkly severe and tightly specific causes, many of which did not relate well to modern times and needs. The amendments allow it to be determined by Presidential evaluations of severity with more broadly defined causes, but still with specificity in tact. 

It is a given that liberal hard-liners will indeed seek to interfere with any such Executive Order, but to do so risks much, as described in the close of this post. Consider that the Act has been used many times in history with little or no legal contests, and in each case where contest was made, the Courts swiftly dealt with the matters and ruled for continuance. I find it interesting that almost all use was against Democrat troublemakers… just like, today.

 

Historical use

The Act has been invoked at least 8 times, of which only two had nothing to do with the actions of Democrats. Five times, it was invoked for the same general cause as Tump would seek to employ it; because of Democrats abuses of minorities and their unfortunate situations. Only the specifics have changed, both as to the manner in which Democrats have taken advantage of/benefited from minority issues, and the nature of the issues (slavery/civil rights, then, and illegal entry, now).

  • Thomas Jefferson invoked it in 1808, for a Vermont ‘rebellion’;* 
  • Abraham Lincoln in 1860 against formation of the Democrat’s Confederacy;
  • Ulysses S. Grant in 1871 against the Democrat’s KKK;
  • Dwight D. Eisenhower in 1957 vs. Democrat racism in Little Rock;
  • John F. Kennedy in 1962 and 1963 vs. Democrat racism in the South;
  • George H. W. Bush in 1989 (Katrina) and again in 1992 (LA riots);

ONLY Kennedy’s and Eisenhower’s actions were opposed in court. Bush’s were the only ones not used against unlawful actions by Democrats. Even Kennedy, a Democrat, had to go after Democrat abuses… and had to do it twice. Therefore, Trumps use of the Act would be completely in line with history, both in terms of need, and in terms of the principal forces involved (out-of-control Democrats).

*Vermont’s Governor (claiming both Democrat and Republican leanings), like much of the population of Vermont vehemently opposed Jefferson’s Trade Embargo restricting trade with Canada, a combatant in the Napoleonic Wars. The Insurrection Act was used to take control of the Militia away from the Governor, enforce the Embargo, and restore peace in the civilian population.

 

Other laws

The Insurrection Act is interrelated in important ways to the Posse Comitatus Act of 1878 (prohibits use of Federal military in police actions) and the Militia Act of 1792 and National Defense Act of 1916. The last two enabled National Guards as we know them, today, to be controlled, deployed by, and report to only their State Governors, and specify conditions whereupon the Federal government may ‘Activate’ a Guard unit for Federal purposes, perhaps even against the wishes of a Governor. It is also usefully tied to several legislations which enable and empower FEMA and Homeland Security. All these tie into one, another, and those ties establish limitations and enhancements which allow cooperative and orderly effort of each agency involved in a given matter, upon Presidential Executive Order.

There are two sections of U.S. Law which determine legalities of any such order. Trump has thus far attempted to use Title 32 of U.S. Code, which elicited a request to activate the National Guards to send troops to the border to aid Immigration enforcement. Governors were within their riqht to refuse the requests (and several did, all Democrats), and no legal actions were required to prevent it; a mere formal communication was sufficient. Ironic, then, that Obama successfully used Title 32 for the exact same reasons as sought by Trump, with no opposition from Democrats. Republican governor Schwarzenager, however did, citing a need to retain his control in case of natural disasters, it being a wild-fire season.

 

Specific authorization

Title 10 is where the Insurrection Act prevails for use in the Wall, as best option. It allows mandatory compliance, and also negates Posse Comitatus, if needed. While Title 10 is normally thought of as the authorization to activate and deploy Guard units for overseas action in undeclared war combat scenarios, it is more flexible, today. The modifications to the Insurrection Act in 2006 and 2007 as result of unusual problems in addressing Hurricane Katrina, kick in. These now render Title 10 applicable for operations on U.S. soil, and in terms which specifically relate to the needs at the Border.

Thus the President has the ability to either or both call in Federal troops under Title 10, or National Guard to address border security, the later by request to Governors under Title 32, or by direct order under Title 10. To do both would require Title 10, but to do both is not likely the option Trump will take, as it would result in additional costs in the form of having to assume all payroll and operational expenses for Guard units involved. 

The flowchart below reveals how, when, and why the Insurrection Act can be used, with the actual language of the Act shown. I have added one block of commentary and associated color highlights of the Act’s text to which they apply. If required because of a court challenge, additional authorizations can be cited under provisions in other Acts which relate to Homeland Security, FEMA, Immigration, and other issues regarding Constitutional law and the rights of citizens. Here, I only focus on the authority of the Act, and not the specific arguments in support of the justifications which are obviously present, as generally described.

insurrectionact

 

A significant risk to Deep State opposition

The danger of a court battle can, in fact, set the stage for further use of the Act to depose what many citizens see as traitors within the political structure at both national and State levels; Democrats and their minions run amok with visions of establishing a Socialist or even Communist government in line with a Globalist agenda, and/or complicit in a Deep State conspiracy to literally overthrow the government. That is to say, to create a country with no national sovereignty, and based on fascist tactics of collectivism, suppressed free speech, racial hatreds, destruction of the Constitution and the Bill of Rights, and so forth.

Specifically, use of the Insurrection Act would enable Trump to have the military play a direct role ‘draining the swamp.’ It would enable rounding up for trial any and all government officials and citizens involved in any such conspiracy, and for military tribunals such as many speculate are already being arranged for pursuant to rumored indictments through the Inspector General’s Office. While I personally see these as unproven rumors of conspiracy theory value (serving little practical function beyond waking people up to consider the the political realities of this crisis), the principles involved in the rumors would seem both sound and expedient. 

Because short of such eventuality, it is only a matter of time, in my opinion, before the Left’s actions and agenda lead to civil war or Revolution 2.0. But hey… I’ve been wrong before… about 5 or 10% of the time. And in many of those cases, my error was not regarding the result, but the precise mechanism by which it was achieved. Just say’n. Ignore me if you will… but think about it, before you decide.

 

Very interesting references, if wanting to know more:

On Jefferson’s ‘Disastrous Embargo,’ which in many ways parallels the problems in Trump’s attempts at governance in the face of the Deep State… and the unstated but de facto endorsement of the same cure in the Insurrection Act;

More on history of the Act’s use;

On why Title 32 did not work well for Trump;

On the history of the Act, itself;

Additionally, there is a very interesting document prepared by the National Governors Association’s (bipartisan) State-Federal Brief, America Wins: Struggle for Control of National Guards. It was written in an easy to read and enjoyable manner, and seemingly free of any political smears or unexplained legal terminology. It was the result of several years worth of struggle between the Federal Government under Bush and various State and local entities to resolve the problems in Command and Control issues in the aftermath of Hurricane Katrina; there was no good cooperation or command structure between Army regulars commanded by the Pentagon, National Guard units commanded by the Governors, FEMA, Homeland, and other local authorities.

More: It seems someone has vanished the only online copy of the document. I have it in .pdf from earlier research, and so now, it seems, THIS is the only place you can currently find it. It is great reading quite important to your understanding of critical Constitutional issues, and it leaves you wondering if the Democrat Governors who played a role in the matter didn’t shoot themselves in the foot, and give more ammunition to Trump’s legal defense of any resulting use of Title 10 authorizations under the Insurrection Act… and put themselves in jeopardy in any subsequent Deep State clean up under the Act. This report, in fact, played a key role in the 2006 and 2007 Amendments to the Act which now give Trump the exact tool for both the Wall, and any swamp draining along the way.

 

The Future Flag of the New World Order?


Predictive programming is not limited to art and media. Even the flags of nations… and especially of ideologies and religions, can employ it. Doing so, they predictively point to the flag of the One-World Government, it seems… which predicts what that government will be.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 
 

Predictive Programming

In a previous article, I talked rather a lot about predictive programming, and how fiction can follow real life events, or real life can follow in fiction’s example. That, it was revealed, is something the intelligence community, Deep State, and the New World Order care about, deeply… using it to condition us to future change one subtle thought at a time. It is, simply put, just another form of mind control, but much more covert and psychologically clever than outright disinformation and fake news. Much of what we see and hear in media, be it mainstream or social networks, seems to be predictive programming, though not usually understood until after the future fact. Ask Q, about that… a perfect reflection of the method.

The same is true in art, a strong conveyer of deep subconscious thought; sometimes, art portrays things to come, and it can certainly portray things already done. This post examines how flags, banners, and logos can a form of artistic visual expression of national identity, and become a symbolism far more telling than we realize… something I was not aware of until I saw a flag which proved to be a kind of visual Rosetta Stone… a rosetta flag. And it tells of the future… at least someone’s idea of it. And, it was revealed in what certainly seems a predictive programming manner… portending things to come.

I’m talking about the New World Order… the Flag of the One World Government. It tells us very much about what the government will be like, and who will be its leaders, and peoples. And, it perfectly matches with Bible prophecy, too… at least by some accounts. It is both a red and a blue pill, in one. And, this realization led to other examples of flags as predictive programming of other future flags, all of which point to the same end result; a NWO global flag.

Let us begin by taking a look at three different types of flags and their visual symbolism; those of Islamic theocracies, those of Communist nations, and those of the United Nations. Each of these three sets has many varieties of flags, not all of which are necessarily national flags — but in some cases, more like banners or logos of a given agency, branch, or project fostered by the parent entity. All are based on flag art, more or less. If we choose carefully and note their creation dates, we start to see a pattern emerge, a kind of predictive roadmap which the Rosetta will make easier to recognize and follow into what comes next.

These older flags predict the Rosetta, and in some cases, one another, as well… and likewise in turn, predicts much more. Predictive programming has been blowing in the very wind on flag poles all this time, and we saw it not. When you consider that national flags are everywhere, they cannot be escaped or ignored, and the programming seeps in.

 

The flags

The basic element of the Islamic flag is usually the crescent, with or without a star captured by the circle implied by the crescent. The original use on flags with clear certainty is traced back to the time of the Crusades, but before that, the Sumerians were quite fond of the symbol and it adorned their banners, as well. To them, the crescent represented the Moon God, Sin (imagine that), and the star, the Goddess, Ishtar, as identified in the planet, Venus. Sin was also described as “Lord of Wisdom,” and “Illumination,” which sounds rather a lot like Satan. Ishtar was the God of War and wanton Sex (sex and violence).

Note: It was in the lands of the Sumerian Empire (now Iran) where the drug-sex-murder cult, the Assassins, originated. They were a deviant cult of the Shia (Shiites) branch of Islam (as is ISIS, which shares many of the same traits as Assassins). They first came into historical view just prior to the Crusades, and were a significant factor in the Crusades, first as deadly enemy, and later, as co-opters of the Knights Templars, introducing them to many of their Satanic practices. The Templars had come to respect their murderous skills and wanted to learn them, for themselves, including ritual sexual abuse of children, in order to create controllable minions; the basis for modern Manchurian Candidate-like assassins run by intelligence agencies and others. CIA’s programs are better known by the project terms MK-Ultra, Monarch, and Artichoke, and victims are called Monarchs.

iu-1

The Ottoman Empire flew either one or three crescents on their various battle flags, as early as 1379. In many cases the crescent for modern Islamic theocracies is tipped at an angle, usually upwards, the way the crescent Moon tends to appear when waning. Sometimes, though rare, it tips downward, as in a forming crescent. Some are pointed directly upward (rare). While most have one star or no star, some have more, and they might be external of the crescent, or within it.

The stars are usually five-pointed, but many are starburst or asterisk-like spikes. All these visual elements point to pre Islam religious beliefs: where Christianity is often accused of pagan origins in its symbolism, Islam can be accused of Satanic symbolism based upon Sin and Ishtar. Coming forward in time, additional symbolism has been adopted (some common outside of Islam), and varies from nation to nation. But the true origin is undeniable, where the crescent variants are employed.

iu-11

Another common element of many flags around the World, is the wreath, sometimes called a laurel. The wreath represents Wheat, and the abundance of life; the harvest, and fertility. As a laurel, it represents authority, honor, and power. Two sheaths are usually arrayed to form a crescent, oddly enough. That is not likely coincidental, because the first uses of the wreath were by early empires like Rome, which also worshiped the Goddess of Venus. We see the wreath in all three of our groups, as well… best known to most of us in the United Nations flag/logo.

p337850pngussr-grunge-flagiu-10

 

 

 

 

Note: The lone star in the Soviet banner and their national flag represents the Communist party. The hammer and sickle represent the urban and agricultural workers in unity… this banner being the base reflection of their national emblem.

So how is it that three completely different ideologies can be so similar in flag design? Well, one can argue with viable logic that the commonality of their symbolic meaning is useful to any ideology, and thus we should not be surprised. But is that really the answer? Consider this banner also in use by the Russians, which evolves from their Coat of Arms, shown below. IT PREDATES the United Nations… predicts it, if you will. In fact, the U.N. wreath is identical to that of the Soviet’s. The Globe is slightly different in rotation and relationship, but the U.N. essentially uses the same logo, sans star.

iu-1.png

The Soviet version depicts control of the World through Russian productivity and ideology, overseen by the Communist Party of the USSR. What does that imply or tell you about the U.N. logo, and agenda? But wait. There are two more banner/logos to consider (below), also with some interesting similarities, things which we will find predictive, as well. The one on the left is the Communist Party of Great Britain, which was also founded (1920) well before the United Nations (1945), which many decades later, created the logo shown at right.

The key element, here, aside from the similar use of wreath and globe elements, is the primary element of the dove, highly stylized in the Communist logo to parrot the sickle. Both have Wheat sheaths, both have the same style of globe, and both have the Dove. But the U.N. version also has an additional crescent, in absence of forming one from two sheaths, while the Communists added three stars. That will prove interesting.

communist_flag_for_britain_by_wyyt-db0n4m3  iu-8

There is a third pair to consider as lead in to explaining why. Compare the three stars in the Communist banner, above, with the two ‘flags’, below. The red one is apparently one Spanish conservatives interpretation of how the future UN looks, to his eyes, considering the UN’s Agenda 2030 Plan for establishing a communist-like global governance by the year 2030. That image exists in only one place, his blog page.

Now, in Britain, the three stars above (communist flag) are not explained, but likely represent Ireland, Scotland, and Britain, herself. The stars are more meaningful in the Spanish logo, below, but that must be put off, for the moment. First, let’s talk about the blue one, and its three stars…

un_logo  z3ohmkdlyrvcoj0o8rmywehxfwq8ndt9drisv9hxcyy

The above ‘U.N.’ logo appears in the futuristic TV sci-fi serial, The Expanse. Yes, it is fictional, but remember, we are talking about art predictively depicting the future as a valid phenomenon. The trick, or course, being that it is almost impossible to divine just when such is the case, until after the fact. But just bear with me, here: in The Expanse, the Seat of Power of the United Nations exists on the Moon, but it rules not as a one-world government, but over all human presence on Earth, Mars, and an alliance of outer planets. Hence, the three stars.

There is one last flag to consider, that of the Red Chinese. Then comes Rosetta, and understanding they Spanish UN flag’s three stars upon a field of red, more fully.

iu-9.jpeg

China’s flag symbols consist only of stars, four of which are arranged in a crescent, and a fifth positioned much like the lone star within the typical Islamic flag,’s crescent.  The large star is the Communist Party, as is found in most Communist national flags. The four stars represent the four classes of people among Chinese Class culture. At the time of the revolution, it was the four types of peoples, a pecking order based on racial heritage. In post revolution times, it evolved to represent more of an occupational categorization.

The important part, is that the main element (large star), dominates and controls the four groups. It is the same manner as the main UN element in The Expanse logo, dominating and controlled three groups of people, and as did the British Communist logo. We also find it in the (green) Islamic flag with four stars (found in the composit image, towards page top); the Comoros flag representing oversight of four islands and their peoples.

Now we come to the Rosetta Flag, and we can tie all these things together into a predictive relevance. Just as the above flags were in most cases predictive of future flags quite unrelated in terms of national or cultural/ideological or religious identity, it will also prove predictive, but in other ways. It is the commonality of flag elements in all the examples herein which enables both this, and which establishes it as Rosetta. It is the one flag which looks backwards and forwards simultaneously, to allow this presentation to even exist.

IMG_0028.jpg

What you are looking at, above, is just the emblematic portion of the flag, which is quite like the Red Chinese flag in layout. Apologies for the quality; it is a cell phone shot of a small area of a TV screen. Everything about it makes sense, in light of those flags which preceded it (predictively).

We have a crescent shape which is formed by the wings of a bird, and which are somewhat reminiscent of the wreaths in the earlier examples. Like the wreaths and the crescent ‘Moon’ shapes they both protect and control Rosetta’s stars. We cannot deduce the stylized bird to know if it is a bird of prey (Hawk, Eagle), or a Dove or some other culturally popular bird. But no Bird has a notched absence of feathers where the wing joins the body, as shown… which is one element of the shape which renders the wings into wreath-like comparison, along with the lesser separations implying feathers.

The key point is, the bird mirrors the Dove in United Nations flags and logos, especially the one used in their ‘postage stamp.’

iu-3.jpeg

The three stars, on the other hand, once more imply three peoples, but the varied sizes imply their importance may vary, perhaps based on populations. The count and size aspect brings us to consider at least on predictive possibility, based on observations thus far made, above, and in light of other current history and even select prophesies. Let us begin that final analysis…

 

What the Rosetta Flag predicts

No country currently has such a flag, but the red background and the general nature imply a Communist ideology. That it is reflective of the Red Chinese flag in every way supports the notion. That brings us to the Spanish logo’s stars, which is the one element which is perhaps the most key to understanding, and the most predictive. The meaning of the three stars in that depiction is quite important: they represent three of the four main ‘Unions’ of the final New World Order one-world government; European, American, and Asian, and Middle Eastern (my geographic names, as the actual resulting names of such Unions are not yet to be known).

The reason only three, is the same reason the Rosetta should logically have three, and not four stars, and also explains why the sizes should vary. In both flags, Bible prophecy comes into play, regarding End Times. I’m speaking of Gog and Magog, and the battle of Armageddon. Prophecy says (in simplification, find more in these Bible texts) that the World will unite under the Antichrist, but some will revolt, and it will lead to war; Armageddon. Gog, then, clearly seems to be the Middle East, well identified in the first Bible quote (link), as the lands described are centered about Iran.

This leaves the other three Unions (Magog) united against Islam. Their flag is, as it’s Spanish creator claims, the UN’s flag flown against Gog. The Asian Union would be the largest in population, and would be dominated by China (the Asian Union), likely the World’s strongest power in the future. Ergo the Antichrist’s flag (Rosetta) is designed similarly to the current Chinese flag as seen in the TV capture, and the larger Star represents the Asian Union. I’m suspecting the American Union (North and South America) would be the next biggest star, and Europe the smallest, but that is not that important to the greater implications.

Agenda 2030 seeks a one-world government based on enjoined regional Unions as described, and based on the Chinese form of government. The Rosetta Flag is a predictive programming reflection of Agenda 2030, and the most likely outcome intended. For this to be true, it is clear that those at the top of the food chain pushing for Agenda 2030, do so in full acknowledgement of Biblical prophesy, which also mirrors similar beliefs among Satanists who make up New World Order leadership; Satan wants that battle, thinking he can defeat Christ, and crush all three faiths worshiping the God of Abraham, at the same time (Jews, Christians, and Moslems).

But to go to war, they will need a flag, and it must be rich with symbolism. To get us to follow that flag, we must be slowly warmed to it by predictive programming from previous flags. We have been seeing it unawares for decades, as shown in the earlier examples, above. The Rosetta was introduced in and taken in screen shot from the TV Series, The Tick, a parodic super-hero comic-book character presented in live action (very fun to watch). Interestingly enough, in the episode where the flag appears, it is attributed as the national flag of a fictional country, Urmania, a former Soviet Bloc slavic state which never was.

Now, about the choice of Urmania, as itself being predictive

  • You (U) are (r) Man (man… ia). The flag of the one-world government will cover you, and all mankind.
  • Ur, capitalized, is of Germanic origin an means, quote: a combining form meaning “earliest, original,” used in words denoting the primal stage of a historical or cultural entityor phenomenon: ur-civilization.
  • man, of course, is obvious
  • ia, of Latin origin, is defined as, quote: things derived from or relating to (something specified, such as territory : world : society)
  • One definition of mania: an excessive, persistent enthusiasm (as in extreme or blind patriotism)

Predictive Programming, Q anon, Anonymous, and the NWO


Predictive Programing is a psychologically manipulative political control methodology based on suggestive subliminal messaging, usually well ahead of planned events. It can be found in all forms of media, and shapes our acceptance of things to come, things we would not wish to accept… like 9-11, and the New World Order…

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   >>better at>>  MeWe 

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Spooky introduction…

Sometimes a secret truth is put in front of you as entertainment. CIA, for instance, often puts out fiction books which reflect real-world plots, as a kind of run it up the flag pole test market as to public reaction, intentionally quite non specific so as not to put any real operations at risk. They also scan other fiction looking for ideas for such plots, which is certainly one reason the real-world sometimes mirrors fiction. In fact, one can find multiple CIA fronts engaged in making motion pictures, either as part of the production team, or as the primary mover and shaker, funding source. Could be why The Lone Gunmen, a TV pilot movie about a false flag terror attack on the WTC with a passenger jet aired in New York, only, a number of months prior to 9-11, and was followed up with a ‘viewer market survey’ (normal for such pilots).  That’s just a taste, to get your attention.

iu

 

Now to the main point:

I’m writing this post because, being retired, and after having been homeless for several years and now able to ‘catch up,’ I binge watch TV. And I find predictive programming. The TV series, Mr. Robot, for instance, would seem to be about the creation of Q anon… some two years before Q ever came into existence. There are even oblique references to both Q and Anonymous variously within both the story presentation and the production credits. The series began in 2015 and makes a lot of intelligent sense of a number of things political, social, financial, and about human nature… but especially about computers and cyber security. It deals with such things in a technical sense which hackers and psychologists would not find in error, but in a way in which the average person can understand (cool, and educational).

The main character is a quirky paranoiac schizophrenic drug user with memory problems who is a cyber security firm’s best tech employee — while at the same time the nation’s most dangerous hacker, well hidden. His mind is a maze of complex conflict and imagined constructs, which is a deep character study in the very problem which infects Artificial Intelligence (quirky human-like mental aberrations). They drive him to increasingly dangerous and self-destructive peradventures focused on the forced elimination of virtually all debt, by destroying the bulk of all financial records stored in computers by ‘the World’s largest corporation,’ which happens to serve as the principle cloud repository for all banks and lesser corporations (today, that would be… Amazon, Microsoft, IBM, and friends).

iu-1

Note: one theory out there by conspiracy theorists, is that such an actual event would render such a catastrophic failure of governments, corporations, and society as to throw us into a stone age, with little or no cash on hand, no way to transact business or acquire daily needs, and a shut down of all infrastructure. No one could prove ownership or contractual obligations without paperwork, and the institutions who rely on computerization for records keeping would be hard pressed to deal with the mountain of historical paperwork if they had bothered to keep it after digitization (most do not). This much is part of Mr. Robot’s presentation.

But it would also have much the same effect as a fire sale (an apocalyptic hacking scenario portrayed, and hopefully not predictive, in Bruce Willis’ Live Free or Die Hard), but be slower, rendered in domino fashion. People would take to the streets, riot and pillage, and turn into mobs seeking to take from others whatever they needed to survive. The plot aspect, is that it would give the World such trouble as to legitimize creation of carbon currency, carbon tax, and carbon credit-based economies, and seat an Antichrist figure able to justify chipping all humans and controlling all aspects of life to insure ‘peace, security, and stability,’ upon reboot.

The troubled ‘hero’ becomes embroiled in a hacker conspiracy which strongly resembles Anonymous, and which is full of equally quirky weirdo social misfits, including a Muslim (terrorist?). Almost everything about the show quite reflects the nature of, description of, and the creepy problems of AI, in subtle ways — AI’s bad habit of exhibiting or mirroring human-like mental foibles and mental illnesses, or at least personality flaws. Make no mistake, its great entertainment, rich with plot twists which have you rethinking earlier episodes and readjusting your understanding, expectations, and points of interest.

Quotes: from a Wired Magazine article about mentally ill AI, citing AI Scientist, Steven Theyer, who directly explores the phenomenon with a deliberately mentally ill AI of his own construct, called DABUS. “At one end, we see all the characteristic symptoms of mental illness; hallucinations, attention deficit, and mania. At the other end, we have reduced cognitive flow ad depression… The AI systems of the future will have their bouts of metal illness, especially if they aspire to create more than what they know.”

In parallel summary, many people believe and can make a strong case that Q anon is not a person, but an AI operated from within a very powerful computer who’s primary data input is the sum total of Web activity, principally focused upon social media. Huh? Look at that… I just allowed it a human personna by using the term ‘who’, as opposed to using ‘which,’ which would render it more correctly as a thing. That’s a bit of psychological programming in evidence, right there.

If so, it’s chief output is suggestions as to what the best psychological response is to the public at large, to best accommodate the matrix of human thought thus expressed, and move the dialog and thinking in a desired direction towards a desired goal. This is then used to create clever videos, memes, and posts/comments in an array of fake online social media avatars in support, thereof… or other forms of predictive programming, such as in TV shows, etc. The machine knows we will respond just the way we do.

That goal would logically be some significant shift in the political social paradigm which benefited whomever spent the huge sum of money necessary to develop the AI, the computer powerful enough for the task, and plans for executing the specific gaol in mind, be it for financial gain, political gain, or dealing with enemies… or all of the above. There is such a computer and AI program or modeling system already in use.

It was conceived and is operated by perhaps the most dangerous NWO secret society in the World, descendants no doubt of the Illuminati: The Club of Rome, which is far more powerful and secret than even the BIlderbergers, which they created, as well. I’ve seen their computer model flow diagram as part of secret papers from the Club of Rome to a high Bilderberger (below). They were made available only because he had passed away, and the papers coincidentally fell into a series of changing hands, which I was in time able to access as part of my research for my latest book, Who’s Killing the Bilderbergers — a fictional murder mystery based on footnoted real-world conspiracies.

FCFCggg

 

 

 

 

 

 

 

 

Just two of hundreds of pages of secret Club of Rome and Bilderberger documents

As it happens, there is only one likely AI computing source for such an artificial Q entity; D-Wave Computing. Ask Anthony Patch and Clyde Lewis (Ground Zero radio show) about that. It’s all tied into other scary things, such as CERN, the NWO, and spiritual warfare. Heady stuff to be sure, but… and here’s the clever part: you don’t have to take it seriously as an intellectual exercise or consider it an educational matter impacting your defensive posture or altering your World view… because it also makes great entertainment you can easily dismiss as pure fiction, if you can’t handle the truth within.

That’s the insidious nature of predictive programming… it does not even want critical thought to be involved; it relies on subliminal matters which the mind will recall as a hidden and unannounced memory when the time is right… and in a way which moves one to behave in a desired manner, in response to unexplained and unrealized emotional-based reasoning.

That is revealed in Ground Zero’s heavy analysis. But if using conscious awareness and critical thought when watching Mr. Robot, and other TV programming… one can often find this ‘programming’ of our minds or advance warnings which simply would not be allowed in any other medium without severe retribution by ‘Men in Black.’ If such plots were recognized for what they were, it would be treason and high crime. But, no… it’s ‘just entertainment.’

Note: You should go to the groundzeromedia.org archives and do keyword searches, including Q anon, and even Anonymous, and artificial intelligence. There are many informative and stimulating shows, all of which swirl about each other in intricate ways. Don’t discount one because it seems less targeted, topically; expand your horizons, and learn that there are connections. Listen to his shows as you also watch Mr. Robot, intermixed, and see if you don’t see what I’m seeing.

Another note: while fleshing out this post, I watched another show, Bosch. Having been a professional photographer at one point in my life, one of my specialties was architecture. So when I see a unique building on TV or in a movie, I try to find it on Google Earth, to learn more about it. There was one such building in the Cop show, and so I tracked it down. The other thing about me which comes into play, is that I’m extremely good at discovering front operations; I’ve listed over 1000 in my book, The Professional Paranoid Defensive Field Guide, though that list contains less than a dozen I’ve personally outed as illegal operations.

So imagine my surprise when the first thing I discovered in Google Earth aerial and street views, were the same kinds of clues I’ve seen time and again in CIA fronts. Things like high security, low profile, little signs of activity, yet a massive presence which would normally require a lot of activity. So I researched the address and discovered the firm’s identity that was using the building. Next, I tracked down their corporate information, starting with their corporate description (which I’m saving for last, here), and their Board of Directors and CEO, etc. A CIA (or other intelligence operation, including any established for the benefit of military operations) front almost always has at least one former intelligence officer and/or high ranking military officer in the list of (roughly six people or so) corporate leaders.

So I’m reading the CEO and, focusing on prior employment, I’m looking at firms which have in the past been tied to dark bumps in the night of American history, and I’m thinking ‘CIA’…  right up to the last sentence, which says, he was a former CIA operations Officer! The very next person I checked, was a former Marine General. But to be fair, that proves little, of course, and the odds are these are fine people with honorable intentions… but it surely triggers my ‘spidey senses.’

And what did I discover about the firms purpose? They are key part of the Cloud, and just about the only firm that handles storage of paper records for financial institutions and the fortune 500, and on and on. Mr. Robot would take note. Ergo, not only does Mr. Robot represent a potential predictive programming of the existence of a Q anon… but the entire story line may predictive of things, to come. A cyber attack of the sort in the plot, with the added twist of causing fires to start in the real-world records storage facilities, would wipe out both digital and paper trails on virtually all debt and ownership records, public and private. And that brings us to two final facts about both the show and the actual storage services firm.

The show plot’s final destructive mechanism was simply a hack into the computerized climate control system of the building… heating and cooling. The idea was simply to significantly overheat the data systems in a way to cause catastrophic failure beyond recovery… the same sort of attack which might be able to cause a fire to start, and inhibit automated fire-fighting systems. The other point is, the name of the real-world storage company: Iron Mountain.

The significance of that, is The Report from Iron Mountain is the title of one of those CIA-style authored ‘fiction’ documents which was itself predictive of wag-the-dog wars and events designed to create fear in Americans as a tool for replacing rights and freedoms with promises of ‘security’ and control. It is, in fact, the very first example of predictive programming one might be able to point to as being such. What is especially interesting, is that is was also one of the earliest examples of a work of ‘fiction’ being book vanished by CIA, though several editions had been printed by three different publishing houses over time, such that the effort failed.

ironmtn.pngThe spooky thing about that book of importance to predictive programming, is not just the example within its content, but the covers. It was first put out to look like an official U.S. document, and that is the style of the writing, as well. But one of the subsequent covers employs a small pyramid at the top (image), the logo of the publisher. And guess what the logo is of the Iron Mountain storage company? Yes, a pyramid, although different in detail.

The one final question about Iron Mountain, is why do they claim to be one of the largest if not the largest of their kind… and yet not appear in the graph at page top? Answer: because they don’t directly offer cloud services… they offer the storage sites and their maintenance, security, management, that the others employ as partners or clients. This means, that just as in Mr. Robot, there is only ONE central target that can take out the great bulk of the Cloud, and all of its users’ content, and that same target also happens to be the same source for hardcopy storage, as well.

I don’t want to be accused of pandering to fears in paranoiac character assassination of Iron Mountain… I’m sure the firm has excellent protection against cyber attacks, and against fires. That is exactly what they, themselves, will tell you at their Web site and sales pitches. But so did the firm in Mr. Robot… and it is all these linkages and coincidences which make the entire thing predictive, in the first place. It is, in fact, the perfect example of how predictive programming works.

Other examples of Predictive Programming in entertainment

The film, Pearl Harbor, released just prior to the 9-11 attacks, perfectly set the mindset of Americans to see those attacks as a ‘new Pearl Harbor,’ and more readily rush into war with those claimed (but not proven at the time) to be responsible.

The Simpsons aired an episode where Trump was elected President some 15 years before it happened. In one particular scene, he is descending an escalator post victory while crowds cheer from all points, including a transparent barrier above the escalator. A woman holding a placard ends up dropping it. When Trump really did win, media covering the event shot the exact scene from the same angle, and a woman did drop a poster at the same scene position and with the same timing as in the animated scene… behind a transparent barrier. This wasn’t the only episode in The Simpsons which has mirrored real events in forecast.

Simpsons-predicted-trumps-victory

For more examples, check out this search result, and in particular, this one listing many predictive film projects which also portended 9-11. What prior knowledge?

 

The Simpsons raises another point

We must ask how predictive programming is possible to be so accurate fifteen years in advance, prior to AI technology? One might be tempted to think that Trump was preordained to be President by the NWO fifteen years ago, but that does not really deal with the question usefully. Someone had to also set up and control the news event, to insure a camera angle was able to mirror the event, and someone in place to drop a poster on cue. The planner had to be aware of the predictive programming (that episode). But that is merely a clue, to something else.

The similarity between the scenes is itself a predictive programming tool which reinforces the notion in our minds that we should accept predictive media as some kind of natural, mystical, or divine ‘warning,’ and therefore be far more afraid of the future when we watch disaster flicks, and other dark fiction which impacts our political and social future. Predictive programming, in fact, is sold to us as just that. The last link above reveals dozen’s of articles where media itself is trying to convince you that this is some kind of ‘normal’ and ‘coincidental’ thing, many suggesting it is some form of natural ability to unknowingly foresee the future… and glaringly ‘unaware’ of the term and nature of predictive programming.

AI, the D-wave computer, and the Club of Rome’s use of it did not exist when the Simpson’s episode was penned. Therefore, it is not about Trump being picked by and promoted to Office by the NWO, a notion which itself benefits the NWO by casting doubts on Trump as a conspiratorial affair; Trump opposes and does harm to the NWO.  But it is about reinforcing the illusion of predictive programming is nothing but coincidental prophetic realizations.

But then, who knows? Perhaps it is just that. Perhaps this post is actually by Q anon, or an Anonymous hacker? Or perhaps I’m schizophrenic and there are no such shows… or am I merely an AI construct imagining I’m writing this?

Or is it that you are the one who is imagining? I’ll wait right here for your answer… unless someone pulls my plug, first.

How To Identify FAKE Targeted Individuals


There are many kinds of Targeted Individuals. But there are also many kinds of fake TIs, and they can prove to be as dangerous as perps, even when not perps. Some real TIs even end up de facto fakes, as well. 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

 

Dealing with fakes

This is being written directly to TIs. The word ‘you’ is intended to mean the TI reader.

I’ve been helping TIs better their position for more than two decades. It has enabled some to break entirely free, and improved the circumstance of the great bulk of the remainder. Rarely do I strike out entirely, and almost everyone has thanked me for their gains. But there is something wrong in the TI community. In terms of effect, it parallels a virus… an infection.

iu-5I diagnose it as an infection of Fake TIs. Just as there are many kinds of targeting and thus many kinds of genuine TIs, there are many kinds of fakes. Identifying them has always been rather difficult, it taking years to even realize there was such variety in type. In the past, it might take significant interaction with a TI to discover if they were sincere, or pretenders, much less divine them as a type.

Only recently have I realized the truth and the solution is far simpler than thought. I’ve had contact with over 12,000 TIs over two decades, and the answer was there, all along… just hard to see… despite the size of the problem. But recent events have proven key to understanding.

 

Types of fakes, reasons

The enemy! The most obvious, it is also the only type most TIs tend to worry about, which is a mistake. The most insidious fake of all is the deliberate Wolf in Sheep’s clothing, actual perps infiltrating the TI community to accomplish a variety of missions in support of targeting efforts. That may mean they work for a specific program or developer of technology, or it may mean they are there for a specific TI or group of TIs targeted by a specific team or for specific cause, such as ongoing research for statistical analysis. In the latter case, they will be careful to avoid seeming so, and will ‘free range’ their cross hairs as to whom they choose interaction, lest the intended victim sense their purpose. Seldom will they overtly do anything to give themselves away, and in all cases, they are quite likely to maintain multiple online identities such that if one is identified even by mere suspicion, others remain free to continue.

iu-9

They might be Trolls there to gather intelligence and/or evaluate the progress of the greater programs which lay behind all targeting; quality control analysis, ‘customer feedback.’ It is amazing how vocal a TI will be in public forums, revealing things they should not about their targeting, or what they believe or think about technologies used or perps involved. They act like THX-1138, confessing directly to the intelligence community disguised as religion.

These things are a confirmation that targeting is working as intended, that disinformation is working, and makes it easier for perps to fine tune their program, and grow their psychological profile. How many times have you (if a TI) been hit with requests to share your targeting information in a public forum, or for a public use, such as ‘a law suite’ or ‘appeal to a government or NGO’ to (allegedly) seek their help? How many times are you asked or volunteered because someone else already had done so, to detail the effectiveness or intensity of your targeting? I assure you, that is valuable information to perps.

DON’T be that victim!

Some exist only to sow discord, start arguments, divide and conquer, almost always present wherever TIs congregate, including things requiring Membership. Heaven forbid the TI community or group should actually be able to organize and accomplish good against the evil. When the Free Will Society formed, by the time it had 25 members, it was eventually determined that three of them were, for certain, quietly working in the background to destroy any gain towards our project to establish the ONLY proven long term solution to targeting, our Free Will Haven project. Each was spreading various lies about our effort. Learn more about the project at www.freewillsociety.wordpress.com

Others are a supply conduit of deliberate disinformation designed to distract TIs from truth and keep them in doubt as the true nature of their circumstances; you cannot fight a problem if you don’t have a handle on what that problem is, and how it really works… especially if you are fighting an imagined nature of it shaped for you by the enemy. And yet others are there simply to make a buck, offering some simple ‘cure’ or ‘aid’ for which there is typically scant evidence it really works, and even less that they are at all who they claim to be. They know TIs are desperate enough to risk a few bucks, ‘just in case.’

Innocent fakes. There are numerous psychological issues which drive people who are not exactly paranoiac or schizophrenic, but who are driven non-the-less to pretend to be victims. Call it the sympathy seeker, if you like, because it is attention and sympathy, or feeling special and unique, which they seek. Many soon enough become so entrenched in the role-play that they start to believe that is really who they are… like an actor who starts to believe their own PR, and tries to live up to it until it seems second nature.

Like a hypochondriac, they will tend to adopt whatever new symptom or popular new technology or method of targeting currently seems to them to be in vogue within group discussions… even if it is false disinformation. This, is the harm they represent; they thereby perpetuate falsehoods, though unknowingly, in their ignorance. Disinformation, if to be effective, relies on their doing so. Not much can be done about them, short of exposing them… hard to do, because when it comes to targeting realities, certainty is in short supply. If it were not so, it would be easier to combat.

Mentally ill fakes. Paranoiacs and Schizophrenics. Victims of their own mind are just as dangerous to the TI community, in terms of reliance upon anything they say to be true. They also foment a general disbelief by the public at large in the concepts of targeting, and especially authorities and others a TI should be able to approach for helps. Their mental illness is projected wholesale upon all TIs, and is so effective in result that even significant others, family, and friends, will prefer to believe a TI is mental, than to accept the truth of targeting. It is literally the case of one rotten apple spoiling the bunch, in that respect, and is why TIs are so sensitive to the topic of mental illness.

Yes, there are other factors which make such third-party disbelief the easier choice, but the fact remains: actual Paranoiac and Schizophrenic sufferers do exist among the TI population, and the worst of them give it a black eye. These are the ones trotted out when Congress tries to ‘investigate’ mind control, and they drown the truth of actual testimony in their delusional depictions. Again, exposing them can be difficult, but it is advised that one should not be timid in challenging extremely difficult to believe stories. If enough were to do so, they would go elsewhere.

That said… interestingly, and tragically, in my work with TIs, I’ve found there are actually many cases where someone with a mental issue is also targeted. This is a desirable victim trait when looking for a target dummy for trainees being taught how to employ Political Control Technology and methodology. It makes sense; if a trainee screws up badly and does something which leaves useful evidence, authorities will tend to be disinterested because the person reporting it is known to be mentally ill. They won’t bother to investigate beyond polite lip service.

The target ends up being passed from one set of trainees to another, for life, increasing the likelihood that targeting will in time lead to serious medical harms, or death — because trainees will can easily make serious mistakes when playing with DEW weapons. In some cases, it is intentional ‘joy riding,’ given that many perps are psychopathic sociopaths. Some are themselves victims (programmables), and know not what they do, the effect on the target often the same dangerous end, regardless.

De facto Fakes. This is the category which ultimately led me to discovery of how to identify a fake more easily. They are truly not fakes, but simply act in ways which effect the same traits. It happens two ways, easiest to see in the category of MK Ultra and Monarch style victims; people who have undergone complete captive programming programs akin to Manchurian Candidate, or Jason Bourne techniques (not as fictional as some would wish us to think). The first way has nothing to do with the TI community, and impacts them, alone… and is present in the time frame where they have no understanding whatsoever that they are a victim. They have yet to awaken. They are a complete and successful fake unto themselves, alone; a very sad thing.

And they perhaps never will awaken. Only when something ‘goes wrong’ in the programming or control of the victim can they become aware. When they do, the second means is then in effect; such failure always results in traditional targeting intended to render them ‘mentally ill’ by any third parties they may come in contact with, especially authorities and helpers. That is, of course, the usual targeting modus operandi for all TIs, but it is critical for the MK, because they have trapped in their mind, and at some risk of erupting forth, secrets which can prove… everything. And yet, as an asset, they are far to valuable to simply liquidate, as a rule… unless the knowledge does erupt, in which case they become subject to a Bourne-style solution.

 

The hidden commonality that makes all fakes easier to spot

This brings us to a stark conclusion, one which has literally risks negating twenty years of my life’s work in trying to help TIs. The one common trait of de facto MK/M fakes is this: they will not help themselves, or they will self-sabotage any efforts at it. That may take a bit of explanation.

‘Will not help themselves’ can mean that they will simply not take advice that is known to be effective. For example, I might offer a simple test which would allow them to identify the type of technology employed against them, and where it is operating from, perhaps even identifying the players involved, thereby. They simply do not undertake the tests, coming up with some lame excuse as to why, even if it requires a lie, to do so. Or, they will claim to have taken the tests, and gotten negative results, and probably so — self sabotaged.

iur-1.jpeg‘Self sabotage’ can be subtle or obtuse, depending on the type of fake TI involved. Obtuse sabotage is when the fake deliberately and knowingly sabotages the effort. It is rather rare, because only the Enemy fake has a reason to do so, and they would only need do so if others were present to observe; they would otherwise simply lie about their efforts. But the MK/M will always sabotage, either knowingly but without understanding why, typically then rationalizing it internally, or unknowingly even to themselves, when executing a programmed function in an alternate personality called forward for the purpose. Fortunately, the number of MK/Ms is relatively low, but sadly, such victims are the hardest of all to help for this reason.

Subtle sabotage is something all kinds of TIs themselves can be unaware of doing. They simply will fail to follow the instructions correctly, or be clumsy when performing the defensive advice such that the enemy will perceive it, and take steps to avoid the effort’s intended goals. That is especially common in the De facto fakes, and those based on mental issues, serious or otherwise. But any TI can sabotage their own efforts this way, as we shall shortly see.

That means that ANY TI can ‘be fake,’ unto themselves and to their cause, and not even know it.

For twenty years, I have wondered why so many TIs seemed so prone to self sabotage, the most common evidence of it being the constant excuses as to why they would not even try a given advice. Usually, it would be claimed it had already been tried, by them, or by someone else. Even when I point out that it must be done correctly (and I give very explicit instruction) and why it can fail if not done just that way, they will continue to resist the advice. Excuses, excuses, excuses.

 

Come forward in time

FHHlogoThe one thing which has proven to completely resolve targeting is the concept which lays behind the Free Will Society and its project, Free Will Haven. This has been widely promoted among the TI community, but to what end? The concept has been tried in a couple of ways (‘beta testing’), and provided proof that it works extremely well:

three TIs have enjoyed a total of some 3,000 continuous targeting free days.

And yet, the primary beta site failed through self sabotage. The principal character involved was a female TI of long suffering. Because she was investing her own money into the project, she was given complete autonomy and control of the effort. Despite specific advice on property selection and how to qualify TIs as co residents, as we had initially agreed, she elected to do things her own way, after all. She even refused my participation in ways which led to a break in communications, about half way through the effort.

In the end, as result, she ended up trying at least four different locations before achieving any level of success. And, unfortunately, by rejecting advice and possible other forms of self sabotage, she made blunders which lead to being evicted from the location. One such blunder was not asking for additional financial help from the Society, because she had forced the break in communications, not just with me, but with the Society members who had earlier provided financial support. Pride and stubbornness is presumed; a form of self sabotage. To this day, she has not responded to outreach. Worse, she continues to work to try yet again, essentially working against the Society’s efforts.

The other important fact that is news which relates to self sabotage, is that the Society was at one point on the threshold of obtaining significant funding towards realization of this dream solution in a way that can help dozens to hundreds of TIs obtain total escape from their targeting. It also would serve as a gateway to even more important goals, such as actually exposing and proving targeting is real, pervasive, and government sponsored, leading to actual successful lawsuits, media and government investigations, and termination of programs with perps and others behind them being jailed.

The stakes could not possibly be any higher for the TI community.

With the help of ATN World News, and a pooling of contacts outside of the TI community, we were well poised for significant investment into the Free Will Haven project through the Society. Millions of dollars worth, in fact: enough to buy land, homes and central services, vehicles, and even to fund relocation of participating TIs, and provide monthly income to some of them. It might even have funded mobile strike teams of TSCM and PI professionals who can covertly investigate, document, and prove targeting cases valid in courts of law and before media.

How much more help than that, can we ask?

 

And yet, the fake TI rears its ugly head, threatening it all

Before anyone will risk investing millions of dollars into the Free Will Society (and we are finally very well poised to create just that scenario), they will need to see that the TI community is sincere and valid, that it has a serious stakeholder position in seeking a cure. Who would give a bum a hand out of $1,000 without some sign they would use the money to escape being a bum? The only way TIs as stakeholders can be judged worthy is if the TI community unites to some useful degree behind the project, expressed both in terms of membership in the Society, and some level of self-booting financial commitment.

iu-10.jpegThere would seem to be some 300,000 aggregate count ‘members’ in Facebook Groups which relate to targeting issues. There are so many groups that I would not wish to attempt counting them. Frankly, there are too many such groups, and some of them appear to be run by fake TIs of the worst kinds. Be that as it may, ‘members’ in single quotes is used because the typical member of one group tends to also be member of 3-5 other groups, or more. So while that negates the 300,000 figure, it still means that there are many tens of thousands of TIs in the Facebook community. I’m thinking around 70,000 specific individuals.

I and the Free Will Society has repeatedly reached out to virtually every one of these groups. And yet, the Fake TIs have made themselves known by their response, which is that form of subtle self sabotage and refusal to help themselves… the hidden commonality. The Society should have by now many hundreds of Members, perhaps into the thousands. It should have, by now, accumulated at least several to tens of thousands of dollars in contributions toward its proven viable goals. Failed organizations such as FFCHS have previously exceeded these kinds of member and donation numbers several times over, and for fraudulent and/or foolish causes in some cases.

Yet at best, we have had some 40 Members, almost all of whom balked at modest $25 annual dues. At best, we have raised a total of less than $2K in contributions and membership fees. The bulk of that has been because I and one other author have donated 100% of the sales of our ebooks (not the profit, the actual sale price) to the Society. I remind you that I have essentially been homeless for the last three and going on four years, though I now at least have a place to affordably park my Mobile Home — and yet I still made those donations.

What have YOU done? Click ‘like?’ Or is your devotion to your cause so strong that you dared to click ‘share?’ SHAME!

I must conclude that if those are the limits of your action, you are not a genuine TI, but a fake. If you won’t lift a finger to help yourself by helping to establish a stakeholder position suitable to a large investor’s need, then we never will attain the funding needed to realize the effort. Your apathy and lack of participation betrays your own cause as fake. No one else. Not the perps. YOU!

You belie your claims of targeting and your disdain for it, rendering it a moot footnote in terms of importance and validity. If you will not take action to support something proven to work, you have both sabotaged your own best interests, and deliberately refused to help yourself, and you fail to actually be part of the community, supporting the community.

Example: I recently posted on my main FB feed a simple post underscoring much of what this article describes in simpler terms. It was a call to action which specifically chastised simply clicking ‘like’ or ‘share,’ instead of actually doing something. Out of some 3,000 FB friends, there are several hundred who are TIs. What do you suppose the response was?

[[ One like, and one share. ]]

What other reason can there be for that kind of inaction? YOUR inaction? Prove me wrong in my conclusions, or take action, now, TODAY. Here are six simple things a real TI with a serious intent on winning the war would proactively do, given the above facts:

  • Join the Free Will Society (.wordpress.com);
  • Use the promotional tools provided by the Society to spread the word;
  • Donate to the cause (gofundme);
  • Yes, LIKE and SHARE things which promote the Society and the project;
  • Directly reach out to fellow TIs as individuals and engage in two-way dialog to convince them to do the same six things (evangelize our cause). You will then know who is fake, or not, yourself, experiencing them first hand, as do I;
  • Stop doing those things which aid in your targeting.

Unless you do these things, then I must conclude that so many of you are fake, that there is no point whatsoever in attempting to help anyone. And boy, will that make my life a lot easier. And then, you can go back to complaining about how bad things are, and liking and sharing similar miseries posted by others.

I, the Free Will Society, and the future residents of Free Will Haven await your decision. I’ve attempted everything I can think of. Now it is up to you.

One final note: it would seem that the fakes have been using Facebook’s complaint feature to cause facebook to ban me from posting to the TI groups. Anyone who has ever read any of my TI group posts knows that there is nothing in them which approaches any definition of ‘offensiveness’. So, as I can no longer post to such groups, this to, is now up to you. The damage has been done, and now only you can undo it.

YOU are what you’ve been waiting for!

…and I’m no longer interested in trying to help those who won’t help themselves.

Your future, and the future of the Society is in your hands. 

 

 

The Deep State Conspiracy: Easier to Expose Than They Think


Conspiracies thrive in an environment of pre-planned cover up, and the best cover ups have CIA pre-planning fingerprints all over them. Groups like the New World Order and the Deep State, and their bump-in-night high crimes and misdemeanors through history, including the ongoing attempt to ‘get Trump,’ are no different.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   MeWe   proparanoid.net  

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Connect The Dots has never been a more important game…

The first question you should ask yourself after reading this, is why has mainstream not pointed any of this out? Added to everything we now know about the phony Russia Collusion investigation, there is no excuse for allowing the Deep State to continue, including media’s complicity, therein. Someone needs to go to jail… many someones, and none of them sit in the Oval Office.

This post is an amalgamation of someone else’s investigative research, and my own contributions based on my ten-year research for my book set, Fatal Rebirth, which deals with crimes of the New World Order from 1947, forward and into the future. In fact, in 1999, the effort predicted the downing of the WTC by jetliners in a terror event which in turn would spark a series of Middle-East ‘oil wars.’

The remaining material is by someone wishing to remain anonymous, according to the material as found several places and forms on the Internet… but it is not fake internet click bait, as the Democrats are so fond of saying of people like Alex Jones in their attempts at censorship; everything in it can be easily verified with a search engine. And I have, because when something smells, connecting the dots can be the only way to find out what it is…

ahw3wwl33if01

I can understand that anonymous approach, given the Clinton Body Count. I, myself, have endured hate email from Bill Clinton direct from the Oval Office, and it was quite pointed, forceful, and profane. I was also in the same time frame shadowed by Secret Service, FBI, and other ‘Men in Black,’ to include both surreptitious and forced entry of my home, and placement of surveillance devices. ‘ My computers and all storage media were stolen, and there were multiple attempts on my life, most of them undertaken by local law enforcement. Fun times.

Why, you likely ask? Because, presumably at least in part, I had in my books and in other media publicly outed both Bill and Hillary, as CIA operatives, as fully covered in Fatal Rebirth. I was also tying them to Bush and his Iran Contra operations in Mean Arkansas while in CIA in NOC (non official cover). My source at the time, was two different retired NSA staffers who were aware of certain activities tied to the Iran-Contra drugs for guns deals being run through Arkansas when Bill was Governor, there… and subsequently, illegal arms sales to both Iran and Iraq during that terribly bloody war, using the same resources put into place for Iran-Contra in Canada, Europe, and Arkansas, Florida, and the Caribbean. Both Clintons played a role in that, and made some serious illicit cash, doing it.

Coming full circle, many of those same physical and financial resources were used by the 9-11 hijackers with help from the same CIA players from Europe, and elsewhere… and the plane hitting the North Tower can arguably be tracked down to a Caribair, a CIA airline front from Iran-Contra (that should raise some questions in your mind). All together, at least three aircraft from Iran Contra were used in the greater 9-11 effort; one on the North Tower, and two in Florida for ‘training’ the 9-11 terrorists, pre-attack. To be clear, the Clinton ties were peripheral, but harder ties could be found to the Bush crime family. That may seem to reflect odd bedfellows, except that both were on the same CIA plane flown to a secret Bilderberger meeting (while Bill was Governor) to discuss future President’s of the U.S. That was related by a flight crew member who brought the information to me of his own accord. All of this, and more, is in my book.

The original material quoted below did not include much in the way of verification links, nor any images. I have attempted some remedy in that, and so, any links, parens, bold or italics, and blue text, are my additions. Follows now, the original anonymous material:

 

The plot sickens…

I am passing this on from someone who’s connecting some dots with input from sources he cannot reveal. Here’s what it looks like when all the pieces are sewn together. It smells like conspiracy and treason. Everyone needs to read this. Slowly, and patiently, because it’s very important…

From 2001 to 2005 there was an ongoing investigation into the Clinton Foundation. A Grand Jury had been impaneled. Governments from around the world had donated to the “Charity.” Yet, from 2001 to 2003 none of those “Donations” to the Clinton Foundation were declared. Now you would think that an honest investigator would be able to figure this out.

Look who took over this investigation in 2005: None other than James Comey; Coincidence?

Guess who was transferred into the Internal Revenue Service to run the Tax Exemption Branch of the IRS? None other than, Lois “Be on The Look Out” (BOLO) Lerner. Isn’t that interesting?

But this is all just a series of strange coincidences, right? Guess who ran the Tax Division inside the Department of Injustice from 2001 to 2005? None other than the (Principle Deputy) Assistant Attorney General of the United States, Rod Rosenstein.

Guess who was the Director of the Federal Bureau of Investigation during this time frame? Another coincidence, perhaps, but it was Robert Mueller.

What do all four casting characters have in common? They all were briefed and/or were front-line investigators into the Clinton Foundation Investigation. Another coincidence, right?

Fast forward to 2009… James Comey leaves the Justice Department to go and cash-in at Lockheed Martin. Lockheed Martin is deeply in bed with CIA in multiple ways and levels, as will be further revealed in my own added comments, here. It goes all the way back to Iran Contra, and Arkansas, where Lockheed built a facility in 1978, just as Bill took office as Governor, and in time for Iran-Contra to be set up out of nearby Mena. Breitbart reveals that while Robert Mueller ran FBI, the Agency indeed fed a stream of $100M and greater no-bid contracts to Lockeed Martin, where Comey landed after leaving the DOJ… to be paid $6M in one year for, essentially, having a name that looked good on an empty Office. 

Hillary Clinton is running the State Department, official government business, on her own personal email server. The Uranium One “issue” comes to the attention of the Hillary. Like all good public servants do, supposedly looking out for America’s best interest, she decides to support the decision and approve the sale of 20% of US Uranium to no other than, the Russians.

Now you would think that this is a fairly straight up deal, except it wasn’t, America got absolutely nothing out of it. However, prior to the sales approval, none other than Bill Clinton goes to Moscow, gets paid 500K for a one hour speech; then meets with Vladimir Putin at his home for a few hours. Ok, no big deal right?

Well, not so fast; the FBI had a mole inside the money laundering and bribery scheme. Robert Mueller was the FBI Director during this time frame? Yep, He (Mueller) even delivered a Uranium Sample to Moscow in 2009.

Who was handling that case within the Justice Department out of the US Attorney’s Office in Maryland? None other than, Rod Rosenstein. And what happened to the informant? The Department of Justice placed a GAG order on him and threatened to lock him up if he spoke out about it.

How does 20% of the most strategic asset of the United States of America end up in Russian hands when the FBI has an informant, a mole providing inside information to the FBI on the criminal enterprise? Because that informant also was served with a Gag Order by Jeff Sessions. That order was eventually lifted by Congressional intervention, but well after the fear of God could be put into him. This was well after the sale had completed.

Very soon after; the sale was approved! 145 million dollars in “donations” made their way into the Clinton Foundation from entities directly connected to the Uranium One deal. Guess who was still at the Internal Revenue Service working the Charitable Division? None other than, – Lois Lerner.

Ok, that’s all just another series of coincidences, nothing to see here, right?

Let’s fast forward to 2015.

Due to a series of tragic events in Benghazi and after the 9 “investigations” the House, Senate and at State Department, Trey Gowdy who was running the 10th investigation as Chairman of the Select Committee on Benghazi discovers that the Hillary ran the State Department on an unclassified, unauthorized, outlaw personal email server. He also discovered that none of those emails had been turned over when she departed her “Public Service” as Secretary of State which was required by law. He also discovered that there was Top Secret information contained within her personally archived email.

Sparing you the State Departments cover up, the nostrums they floated, the delay tactics that were employed and the outright lies that were spewed forth from the necks of the Kerry State Department, we shall leave it with this…… they (Gowdy and Kerry) did everything humanly possible to cover for Hillary.

Now this is amazing, guess who became FBI Director in 2013? None other than James Comey; who secured 17 no bid contracts for his employer (Lockheed Martin) with the State Department and was rewarded with a six million dollar thank you present when he departed his employer? Amazing how all those no-bids just went right through, at State, huh?

Now he is the FBI Director in charge of the “Clinton Email Investigation” after of course his FBI Investigates the Lois Lerner “Matter” at the Internal Revenue Service and he exonerates her. Nope…. couldn’t find any crimes there.

In April 2016, James Comey drafts an exoneration letter of Hillary Rodham Clinton, meanwhile the DOJ is handing out immunity deals like candy. They didn’t even convene a Grand Jury! Like a lightning bolt of statistical impossibility, like a miracle from God himself, like the true “Gangsta” Comey is, James steps out into the cameras of an awaiting press conference on July the 5th of 2016, and exonerates the Hillary from any wrongdoing. Do you see the pattern?

It goes on and on, Rosenstein becomes Asst. Attorney General, Comey gets fired based upon a letter by Rosenstein, Comey leaks government information to the press, Mueller is assigned to the Russian Investigation sham by Rosenstein to provide cover for decades of malfeasance within the FBI and DOJ and the story continues.

FISA Abuse, political espionage….. pick a crime, any crime, chances are…… this group and a few others did it: All the same players. All compromised and conflicted. All working fervently to NOT go to jail themselves All connected in one way or another to the Clinton’s. They are like battery acid; they corrode and corrupt everything they touch.How many lives have these tw. destroyed?

As of this writing, the Clinton Foundation, in its 20+ years of operation of being the largest International Charity Fraud in the history of mankind, has never been audited by the Internal Revenue Service.

Let us not forget that Comey’s brother works for DLA Piper, the law firm that does the Clinton Foundation’s taxes. The person that is the common denominator to all the crimes above and still doing her evil escape legal maneuvers at the top of the 3 Letter USA Agencies? Yep, that would be Hillary R. Clinton.

Now who is LISA BARSOOMIAN? Let’s learn a little about Mrs. Lisa H. Barsoomian’s background. Lisa H. Barsoomian, an Attorney that graduated from Georgetown Law, is a protégé of James Comey and Robert Mueller. Barsoomian, with her boss R. Craig Lawrence, represented Bill Clinton in 1998. Lawrence (& Co.) also represented:

Robert Mueller three times;
   James Comey five times;
      Barack Obama 45 times;
         Kathleen Sebelius 56 times;
            Bill Clinton 40 times; and...
               Hillary Clinton 17 times.

Between 1998 and 2017, Barsoomian herself represented the FBI at least five times.

Kathleen Sebelius, under Obama, took illegal actions which have been compared in method by mainstream media to those illegally undertaken by Oliver North in Iran Contra, except that instead of raising money in support of Iran-Contra, it was for illicit use in support of Obamacare. 

You may be saying to yourself, OK, who cares? Who cares about the work history of this Barsoomian woman? Apparently, someone does, because someone out there cares so much that they’ve “purged” all Barsoomian court documents for her Clinton representation in Hamburg vs. Clinton in 1998 and its appeal in 1999 from the DC District and Appeals Court dockets (?). Someone out there cares so much that even the internet has been “purged” of all information pertaining to Barsoomian (in her legal capacities).

Snopes says that last sentence is false, but fails to provide a single instance where an online reference exists. Perhaps this is a good time to point out the the family who operates the Snopes Web site are quite close to Clinton/Obama confidant, George Soros, master of fake news. The only good thing Snopes points out, is that Lisa was not representing those cited in the list as a personal attorney, but as part of her job in representing the US Government, at large. However, that in no way removes the hint of bias and in-place Deep State assets present in just who she is. Moreover, it is true: search the Web and you only find references which mirror this post… not a single Web listing of her activities as a legal representative, even if you add keywords such as docket, judge, case number, etc. 

Historically, this indicates that the individual is a protected CIA operative. This is essentially correct, but not exclusively so. Many 9-11 truth documents have also vanished, for instance, including mainstream sources. Additionally, Lisa Barsoomian has specialized in opposing Freedom of Information Act requests on behalf of the intelligence community. Although Barsoomian has been involved in hundreds of cases representing the DC Office of the US Attorney, her email address is Lisa Barsoomian@NIH.gov. The NIH stands for National Institutes of Health. This is a tactic routinely used by the CIA to protect an operative by using another government organization to shield their activities. Also correct, something more typically done for a NOC, as earlier described.

It’s a cover, so (no) big deal right? What does one more attorney with ties to the US intelligence community really matter?

It deals with Trump and his recent tariffs on Chinese steel and aluminum imports, the border wall, DACA, everything coming out of California, the Uni-party unrelenting opposition to President Trump, the Clapper leaks, the Comey leaks, Attorney General Jeff Sessions recusal and subsequent 14 month nap with occasional forays into the marijuana legalization mix …. and last but not least Mueller’s never-ending investigation into collusion between the Trump team and the Russians.

Why does Barsoomian, CIA operative, merit any mention? BECAUSE….She is Assistant Attorney General Rod Rosenstein’s WIFE!

Neither Barsoomian or Rosenstein should be taken for Democratic Stooges serving the Clinton/Obama clans. They both have a rich background working for the Bush presidencies, as well. Rosenstein is, in fact, a registered Republican. However, he worked under Ken Star in the Whitewater investigation of the Clintons, should you find that relates usefully. The only common theme between them, IMO, are constant involvements in matters serving the interests of the New World Order types. That is, in fact, true of all the events relegated, herein. Always ask who benefits, in which case, it will be more than just the visible participants. Deep State = NWO globalists, in terms of benefit.

I will also suggest another possibility to consider, since it is generally true that many CIA operations also tend to be useful to Globalist peradventures. CIA likes to have in-place assets in various governmental posts, and they like to do it with Husband-Wife teams. Ask the Clintons. Ask Dorothy and Howard Hunt (CIA operative, Bay of Pigs, JFK assassination, Watergate assassination of Richard Nixon). Ergo, ask Lisa and Rod S.

iu

Predictive Programming, Q anon, Anonymous, and the NWO


Predictive Programing is a psychologically manipulative political control methodology based on suggestive subliminal messaging. It can be found in all forms of media, and shapes our acceptance of things to come, things we would not wish to accept… like 9-11, and the New World Order

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   >>better at>>  MeWe 

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Spooky introduction…

Sometimes a secret truth is put in front of you as entertainment. CIA, for instance, often puts out fiction books or magazine articles which reflect real-world plots, as a kind of ‘run it up the flag pole’ test with reader focus groups as to public reaction, intentionally quite non specific so as not to put any real operations at risk. They also scan other fiction looking for ideas for such plot ideas, which is certainly one reason real-world bumps in the night sometimes mirror fiction. In fact, one can find multiple CIA fronts and operatives engaged in making motion pictures, either as part of the production team, or as the primary mover and shaker, funding source. Could be why The Lone Gunmen, a TV pilot movie about a false flag terror attack on the WTC with a passenger jet aired in New York, only, a number of months prior to 9-11, and was followed up with a ‘viewer market survey’ (normal for such pilots).  That’s just a taste, to get your attention.

iu

 

Now to the main point:

I’m writing this post because, being retired, and after having been homeless for several years but now stable and able to ‘catch up,’ I binge watch TV. And I find predictive programming. The TV series, Mr. Robot, for instance, would seem to be about the creation of Q anon… some two years before Q ever came into existence. There are even oblique references to both Q and Anonymous variously within both the story presentation and the production credits. The series began in 2015 and makes a lot of intelligent sense of a number of things political, social, financial, and about human nature… but especially about computers and cyber security. It deals with such things in a technical sense which hackers and psychologists would not find in error, but in a way in which the average person can understand (cool, and educational).

The main character is a quirky paranoiac schizophrenic drug user with memory problems who is a cyber security firm’s best tech employee — while at the same time the nation’s most dangerous hacker, quite anonymous. His mind is a maze of complex personal conflict and imagined constructs, the portrayal of which is a deep character study in the very problem which infects Artificial Intelligence (quirky human-like mental aberrations). They drive him to increasingly dangerous and self destructive peradventures, the story line focused on the elimination of all debt by destroying the bulk of all financial records stored in computers by ‘the World’s largest corporation,’ which happens to serve as the principle cloud repository for all banks and lesser corporations. In the real world, today, that would be six firms… Amazon, Microsoft, IBM, the largest… and the show’s attack will be against six data storage sources.

iu-1

Note: one theory out there by conspiracy theorists, is that any such actual event would render such a catastrophic failure of governments, corporations, and society as to throw us into a stone age, with little or no cash on hand, no way to transact business or acquire daily needs, and an eventual shut down of all infrastructure. No one could prove ownership or contractual obligations without paperwork, and the institutions who rely on computerization for records keeping would be hard pressed to deal with the mountain of historical paperwork if they had bothered to keep it after digitization at all (most do not). This much is part of Mr. Robot’s presentation.

But it would also have much the same effect as a fire sale (an apocalyptic hacking scenario portrayed, and hopefully not predictive, in Bruce Willis’ Live Free or Die Hard), but be slower, rendered in domino fashion. People, originally happy their debts and mortgages were wiped out, would soon enough take to the streets, riot and pillage, and turn into mobs seeking to take from others whatever they needed to survive. The plot aspect, is that it would give the World such trouble as to legitimize creation of carbon currency, carbon tax, and carbon credit-based economies, and seat an Antichrist figure able to justify chipping all humans and controlling all aspects of life to insure ‘peace, security, and stability,’ upon reboot.

The troubled ‘hero’ becomes embroiled in carrying out this hacker conspiracy in a manner which strongly resembles Anonymous, and which is full of equally quirky weirdo social misfits, including a Muslim (terrorist?). As mentioned, almost everything about the show quite reflects the nature of, description of, and the creepy problems of AI, in subtle ways — AI’s bad habit of exhibiting digital insanity to one degree or another. Make no mistake, its great entertainment, rich with plot twists which have you rethinking earlier episodes and readjusting your understanding, expectations, and points of interest.

Quotes: from a Wired Magazine article about mentally ill AI, citing AI Scientist, Steven Theyer, who directly explores the phenomenon with a deliberately mentally ill AI of his own construct, called DABUS. “At one end, we see all the characteristic symptoms of mental illness; hallucinations, attention deficit, and mania. At the other end, we have reduced cognitive flow ad depression… The AI systems of the future will have their bouts of metal illness, especially if they aspire to create more than what they know.”

In real-world parallel, many people believe and can make a strong case that Q anon is not a person, but an AI operated from within a very powerful computer who’s primary data input is the sum total of Web activity, principally focused upon social media. Huh? Look at that… I just allowed it a human personna by using the term ‘who’, as opposed to using ‘which,’ which would render it more correctly as a thing. That’s a bit of psychological programming in evidence, right there. Rewind. Play.

If so, it’s chief output is suggestions as to what the best psychological response is to the public at large, to best accommodate the matrix of human thought thus expressed, and move the public’s dialog and thinking in a desired direction towards a desired goal. This is then used to create clever videos, memes, and posts/comments in an array of fake online social media avatars in support, thereof… or other forms of predictive programming, such as in TV shows, etc. The machine knows we will respond just the way it wants, because the key AI programming includes a vast ‘expert’ understanding of our social psychology as individuals, collectives, and the whole of human existence… through our very talkative social media presence (input). We feed it all it needs to know, to direct us without our being aware of the manipulation.

That goal would logically be some significant shift in the political social paradigm which benefited whomever spent the huge sum of money necessary to develop the AI, the computer powerful enough for the task, and plans for executing the specific gaol in mind, be it for financial gain, political gain, or dealing with enemies… or all of the above. There is such a computer and AI program or modeling system already in use. And the people who paid for it have exactly those kinds of goals.

It was conceived of and is operated by perhaps the most dangerous NWO secret society in the World, descendants no doubt of the Illuminati: The Club of Rome, which is far more powerful and secret than even the BIlderbergers, which they control, as well. I’ve seen their computer model flow diagram as part of secret papers from the Club of Rome to a high Bilderberger (below). They were made available only because he had passed away, and the papers coincidentally fell into a series of changing hands, which I was in time able to access as part of my research for my latest book, Who’s Killing the Bilderbergers — a fictional murder mystery based on footnoted real-world conspiracies.

FCFCggg

 

 

 

 

 

 

 

 

Just two of hundreds of pages of secret Club of Rome and Bilderberger documents

As it happens, there is only one likely AI computing hardware platform suitable for such an artificial Q entity. It is the quantum computer designed by D-Wave Computing. Ask Anthony Patch and Clyde Lewis (Ground Zero radio show) about that. It’s all tied into other scary things, such as CERN, the NWO, and spiritual warfare. Heady stuff to be sure, but… and here’s the clever part: you don’t have to take it seriously as an intellectual exercise or consider it seriously as impacting your defensive posture or altering your World view… because it also makes great entertainment you can easily dismiss as pure fiction, if you can’t handle the truth within.

juith

That’s the insidious nature of predictive programming… it does not even want critical thought to be involved; it relies on subliminal matters which the mind will recall as a hidden and unannounced memory when the time is right… and in a way which moves one to behave in a desired manner, in response to unexplained and unrealized emotional-based reasoning. That’s how The Lone Gunmen and the rest (including more, below) worked on 9-11.

That, too, is revealed in Ground Zero’s heavy analysis. But if using conscious awareness and critical thought when watching Mr. Robot, and other TV programming… one can often find this ‘programming’ of our minds or advance warnings which simply would not be allowed in any other medium without severe retribution by ‘Men in Black.’ If such plots were recognized for what they were, it would be treason and high crime. But, no… it’s ‘just entertainment,’ and we can’t prove otherwise. Not, at least, without a smoking gun document revealing the plan with the conspirator’s names affixed.

Note: You should go to the groundzeromedia.org archives and do keyword searches, including Q anon, and even Anonymous, and artificial intelligence. There are many informative and stimulating shows, all of which swirl about each other in intricate ways. Don’t discount one because it seems less targeted, topically, or sounds bizarre; expand your horizons, and learn that there are connections, even if the rest were to make little sense to you. Listen to his shows as you also watch Mr. Robot, intermixed, and see if you don’t see what I’m seeing, and agree. And, if you have a mind to do so, search on my name. I’ve been a guest speaker on the show many times.

 

Other examples of Predictive Programming in entertainment

The film, Pearl Harbor, released just prior to the 9-11 attacks, perfectly set the mindset of Americans to see those attacks as a ‘new Pearl Harbor,’ and more readily rush into war with those claimed (but not proven at the time) to be responsible.

The Simpsons aired an episode where Trump was elected President some 15 years before it happened. In one particular scene, he is descending an escalator post victory while crowds cheer from all points, including a transparent barrier above the escalator. A woman holding a placard ends up dropping it. When Trump really did win, media covering the event shot the exact scene from the same angle, and a woman did drop a poster at the same scene position and with the same timing as in the animated scene… behind a transparent barrier. This wasn’t the only episode in The Simpsons which has mirrored real events in forecast.

Simpsons-predicted-trumps-victory

For more examples, check out this search result, and in particular, this one listing many predictive film projects which also portended 9-11. What prior knowledge?

 

The Simpsons raises another point

We must ask how predictive programming is possible to be so accurate fifteen years in advance, prior to AI technology? One might be tempted to think that Trump was preordained to be President by the NWO fifteen years ago, but that does not really deal with the question usefully. Someone would also have had to set up and control the news event, to insure a camera angle was able to mirror the event, and arrange for someone to be in place to drop a poster on cue. The non AI planner had to be aware of the predictive programming (that episode). But that is merely a clue, to a better answer: someone who knew about the Simpson episode deliberately set it up the cameraman and actor to take advantage of the innocent coincidence of Trump’s election.

Why? Because by insuring a similarity between the scenes, the news coverage became a predictive programming tool after the fact. One which reinforces the notion in our minds that we should accept predictive media as some kind of natural, mystical, or divine ‘warning,’ and therefore be far more afraid of the future when we watch disaster flicks, and other dark fiction which impacts our political and social future. Fear is a control mechanism (as is debt, by the way.)

Predictive programming, in fact, is sold to us as just that; a foreboding sense of insecurity to which we should give up freedoms in order to be safe. The last link above (predictive film projects) reveals dozen’s of articles where media itself is trying to convince you that this is some kind of ‘normal’ and ‘coincidental’ thing, many suggesting it is some form of natural ability to unknowingly foresee the future… and those authoring it seem glaringly ‘unaware’ of the term and nature of predictive programming.

AI, the D-wave computer, and the Club of Rome’s use of it did not exist when the Simpson’s episode was penned. Therefore, it is not about Trump being picked by and promoted to Office by the NWO, a notion which itself benefits the NWO by casting doubts on Trump as a conspiratorial affair; Trump opposes and does harm to the NWO.  But it is about reinforcing the illusion of predictive programming is nothing but coincidental prophetic realizations.

But then, who knows? Perhaps it is just natural prophecy after all? Perhaps this post is actually by Q anon, or an Anonymous hacker? Or perhaps I’m schizophrenic and there are no such shows… or am I merely an AI construct imagining I’m writing this?

Or is it that you are the one who is imagining? I’ll wait right here for your answer… unless someone pulls my plug, first.

!!!

Ooops! One more, just for record… one very likely to be ‘coincidental,’ unless you wish to blame HAARP earthquake triggering. Remember the movie 2012, and the scene where the researcher in India was reporting the Earth’s crust was giving way to rising lava… and lava began simply pouring out of cracks in the ground in some places, later in the film?  Guess what just happened, minutes ago (Dec. 28, about 8 PM, Pacific)?

RSOE EDIS emergency alert system (everyone should subscribe on their computer and phone) just reported that lava has begun to ooze from the ground in a part of India… from the base of a telephone pole, and elsewhere. No quake activity, it just sort of started ‘leaking’ liquid rock.

 

WARNING:  Phone Apps for TV a Bad Idea


When everyone, including competitors across the entire supply chain (production, distribution, outlets) simultaneously start doing exactly the same thing… I get suspicious. So it is with TV viewing apps, and the suspicion is aimed at 5G Network villains. 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   >>better at>>  MeWe 

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Just as suddenly, it dawned on me…

Recently, it came to my attention that virtually every TV network and major ISP service (i.e., Comcast, Time Warner, Cox) is aggressively pushing their apps for watching shows and generally promoting binge viewing. Actually, even TV programming sources without their own channel, and some local TV stations are doing the same. If it’s on television, there is likely one or more Apps which someone wants you to use to watch them on your phone.

iu.pngWhile general TV media apps have been around for a while, such specific media apps seem to be a relatively new phenomenon, and I wondered why the heavy promotion seemed to be ‘turned on’ in a flood — all at once, and across the board among various competitors, and across all platforms, including game systems. I don’t like the answer(s), and I suspect you won’t, either. Especially if you are an activist, whistleblower, or anyone targeted by someone else for any reason (TIs take note). Like a lot of technology, weaponization is not that hard, and abuse is almost always a certainty.

Understand, as a privacy and security consultant, I am not a fan in general of ANY App, even most of those which come with your phone. There are two reasons. 1) the more technology you use, the less privacy and security you have. That is exemplified or manifest in several ways, perhaps the most important being… 2) virtually all Apps of any sophistication with wifi interactivity are relatively easy to hack to become a gateway to control of your phone… perhaps to access to your personal files, even to the point in some cases of being able to manipulate the camera and microphone in or out of your use… and/or for tracking your phone’s physical location by several means. In fact, there are even certain advanced methods which can be employed which can impact your brain’s EEG to effect mood changes and your level of alertness; Political Control Technology some people call ‘mind control.’

With my own phone, I NEVER download ANY app, and I only use standard apps* when I must, trying to limit myself to the compass and flashlight. I do zero online work with it, and I leave the phone off when I do not need it, turning it on to check for messages, expected calls of importance, and making calls. Sure, I’ll use the camera, but only when I don’t care if anyone is able to track exactly when and where the snap was taken (or I use special editing software to strip out the encoded data). When not turned on, it is in a foil pouch, because some phones still communicate without a battery, much like RFID tracking chips, drawing the energy from RF signals in the air, and/or other methods, such as slow-discharge capacitors. Learn more about the whys and wherefores of such strategy, from this previous post. But one reason why must also be discussed in more detail, in the next section.

 * There is only one app I have downloaded and use which I suggest everyone should have: RSOE EDIS, an alert system for local, regional, national, and international disasters of any kind; natural, terrorism, industrial accidents, biological/pathogen outbreaks, etc. It could save your life. I also have it on my computer, and it is the first thing I see when accessing either the computer or the phone.

 

Threat one: the User Agreement and Privacy Policy

Every App usually requires a user agreement which is so full of legalese and so massive in text as to deter actually bothering to read it, on the Sheep-like assumption the Wolves didn’t write it, and it is ‘standard’ in nature. The only thing standard about such agreements, is that they abrogate your rights and expectation of privacy, doing so in terms which fail to so inform by misdirection within all that legalese. It obscures the truth through terms for which the legal definition and application in the real World means something quite different than you think.

iu-1They don’t really want you to read the document, or course, as evidenced by the fact that it is IMPOSSIBLE to read it before you download. NO ONE publishes their user agreement online, and NO ONE will respond to a request to provide a copy in advance of download. And good luck trying to read all that text usefully on your tiny phone screen, when you are anxious to fire up the app and see its pretty animated graphics do their thing. They count on all of this to take place. Here’s proof that only one half of one percent of us actually read the agreements before clicking yes… along with reasons why that’s foolish.

Note: Here is an example of a typical response to a request for a copy of the User Agreement for a TV App, this one from HGTV Customer Service: “We don’t have staff available to respond to every email, but all feedback will be shared with the appropriate teams for review and consideration. Please visit our online Knowledge Base for programing, website, sweepstakes, and other information.” Knowledge Base is merely another term for FAQ, and no FAQ ever addresses the question. Worse, they might refer you to a User’s Forum… where people who can’t get answers are supposed to provide answers to people who can’t get answers.

Every App Provider will, however, eagerly tell you about their privacy policy online, which is usually a single sentence, or so, in very simple and easy to understand non legalese… all very assuring. However, what you are likely reading is NOT the privacy policy spelled out in the user agreement, but the privacy policy for their Web site. Even if for the app, a matter which will likely be unclear, the User Agreement specifically supersedes any and all other statements about your privacy, regardless of when, where, and how they were made public. So you must still go back to and worry about the User Agreement, because that is what you are legally bound to.

They all read roughly the same in almost every user agreement, regardless of type. They tell you they do not associate your name, address, or account information with any information collected. That won’t matter, because you are easily identified by your device Identification in terms of Web connectivity (the IP address, for instance, and information about your modem and router, or similar information for your phone). So, if anyone wants to reach out directly to you, to check up on you, market to you, hack you, or anything else, they can do it without knowing your name, address, or account data… if they know how, or are authorized.

So one question is, just who is authorized, beyond the firm offering the App?

UntitledThe general term is ‘partners.’ You are a commodity as much as a customer, and your information is essentially traded between interested players like any other commodity. The list of trading partners can be extensive, especially if their partnering includes rights to access the partner’s partners (not uncommon for firms like Facebook, Google, Cloud involved service companies, and ISP providers like Comcast). In any event, you can expect the answer to be hundreds, if not thousands, of ‘partners’, except that they don’t usually tell you who they are, save an example or two. The list for HGTV, for instance, which I was able to eventually discover (no thanks to Customer Service) is a block of text large enough to roll up and the swat the flies off of a Bandito’s dead body.

 

 

 

 

 

iurThe worst of it is not the marketing which will come your way, and the fact that everywhere you go on the Web, ads will be tailored to what is learned about you through the App (and all other online activity), or that you can end up seeing ads for the same product/service hundreds of times a day for weeks. No. THAT activity, which IS tracked by the app (asserted as ‘necessary to provide the benefits claimed for the app’), is what renders you a commodity. No, the real threat is this: should any one of the partners suffer a hack of some sort which accesses their data base, that can be trouble, for you… especially if the purpose is to find end users of the app to target with a secondary hack attack through the app, itself.

 

Second threat: synchronous and heavy promotion

This is somewhat analytical, and though based on facts, perhaps rightly seen as speculative; the reader should decide for themselves just how much weight the presentation merits toward acceptance as valid concerns. The presentation must start with some technical information having to do with phone network designs and bandwidth capabilities.

The current 4G network was introduced primarily to improve bandwidth due to greater network demands both in terms of the number of users acquiring phones, and the introduction of smart phones able to stream high-data volume video content. More and more people were converting to smart phones, and streaming. I recall binge watching Invader Zim on a phone not long after 4G became available. Nowdays, the phones are faster and have larger screens, and therefore, users demand higher resolution video streaming (4K resolution is going to be increasingly common), all of which requires several orders of magnitude more bandwidth. Almost all phones, today, are smart, and almost all users, stream. 4G is rapidly being outpaced by demand, and in some markets, it is already suffering an inability to deliver full bandwidth to all users at all times.

Ergo: there is a 5G Network in our future ( but is it a ! or a ?).

iu-2

Someone’s idea of a future phone

That trend is not going to change, and in fact, will soon grow dramatically in the near future. Apple Computer, I’m expecting, will soon introduce a very expensive product which is slated to replace their entire product line, save perhaps the watch, all replaced by a single phone-like product with full portable computing capability. It will serve as your desktop or laptop computer, wirelessly communicating with your Smart Tv or special Mac-like displays (including older iMacs/laptops and monitors), or by adapters to any other brand equivalents, and with wireless keyboards/mice… and your smart appliances. It will also plug into a commercial jet’s seat-back monitor, or VR headsets.

It will serve as your modem/router, and your hard drive. It will rely on massive internal memory as well as the Cloud, and Cloud-based software applications accessed through apps on the device through subscriptions or licenses. Other manufacturers will follow suit, if not beating Apple to the punch, ending the Desktop and laptop computer as we know them, today. It will be a huge bandwidth hog, as result, more than quadrupling the wifi consumption per user, and doing so at more times during the day; simultaneous functionality demanding it. Then there is the political question, like it, or not.

Under Obama, the whole thing with ‘Net Neutrality’ came about, in which we Sheeple, having such a short memory for sound bites, have forgotten the truth… NN was a bad thing for users, and a good thing for Big Data corporations like Comcast. Obstructed by activists, the FCC under Obama acted unilaterally to establish NN, and in addition, set out to cancel all local TV station broadcast licenses, forcing their signals to go to ISP providers for distribution. More correctly stated… forcing YOU to go to your ISP to watch your local news and programming, again dramatically increasing bandwidth demands. Now that Trump has cancelled it, of course, the Left is telling us the opposite of reality, claiming Big Data benefits with the death of NN, and the user suffers, and we risk the invasion of privacy. The truth about NN, regardless of which argument you believe, is that it was intended to cater to 5G in ways useful to big Data, more than end users.

Which brings us back to the synchronous app promotions…

All of this, along with the expected demand created by all those TV watching apps suddenly being pushed system-wide, will literally force conversion to the new 5G Network, as more and more streaming demand in full HD (and soon, 4K) takes place. 5G is set to replace 4G, starting… well… now. But there is a problem with 5G; a lot of people, groups, experts and even officials are very afraid of it, seeing it as both a threat to privacy and both physical and mental health, and rightly so.

5G-Be-Careful-72-pixels.jpgIt has even been likened to a mind control device, especially in combined use with Smart Meters and Smart Appliances, all of which are also intended to go 5G, many already capable of it. In fact, 5G is promoting something called ‘Smart Cities,’ which is the Big Brother of Smartdom components. That, and the fact that 5G ‘cells’ will exist every few hundred feet on every street, is only one of the reasons it is feared as a mind control tool. I will tell you as avowed expert in the topic, that very little of the fears being expressed are entirely out of the question, from the standpoint of technical possibility. Proof, of course, won’t likely exist until its quite too late to object.

Now we finally have the answer to the original question this post is based upon; Why synchronous offerings of TV apps? My deduced answer is, therefore, that the sudden synchronous push by all major ISPs and TV networks to offer apps is intended to bog down the 4G network to the point that we will demand 5G proceed even in the face of the many lawsuits and various government and NGO investigations over safety and other concerns. Not just lawsuits and investigations, but also, outright bans. Use the links to learn more about these very valid concerns.

The forced push strategy I describe will undoubtedly work; Americans at large are well dumbed-down to the point of buying whatever the latest widget is, being offered, doing so without careful scrutiny or consideration beyond the hype of benefits amid images of gleaming hardware, usually involving some form of entertaining commercials promoting ‘feelings and emotion’ over logic and fact. I’m again using the current Left v. Right paradigm; feel good imagination trumps practical reality. Since the phone network, the phones, the app makers, the ISPs, and the TV networks, as well as the bulk of all Internet firms of any importance are themselves all part of one giant media complex, THEY will only tell us what they want us to believe (what to believe), and will seek to minimize or even suppress critical viewpoints such as mine.

Google, for instance, since Obama, and up until just a few weeks ago when Congress began looking at Web censorship by liberal-minded firms, would not let you find my blog posts. Used to be that you need only type in my personal name or trade name (proparanoid), and a few words from the title or topical theme of any of my blogs, and it would pop up in the first few listings on the first page. Since Obama, their censorship model is so efficient, that you could not even find it typing the full title of the post. In fact, it would show you posts of people who quoted from it, before it let you find the actual post, even ten pages down. Understand, there are over 12,000,000 pages which quote or cite my work, and yet, they don’t want you to find my original material, any more, despite that popularity? Political censorship.

I should complain? look at what the Left did to Alex Jones!

iu-3On the other hand, if you used Duck Duck Go, it always came up on top. They were/are not controlled by the Left, or the Right. Google is a search engine, but google (lower case), is a verb. Inquiring minds will want to google, but won’t use Google, to do it. I’m advising that they also avoid using apps of any sort, when they do so, but especially, to avoid TV apps. Cheat them out of the demand for 5G, and watch TV on your television, where you can see everything more clearly, and enjoy high quality audio.

Because one thing is for sure: 5G is going to make any social control by whomever is in power vastly easier than it is, today… and today, it is so easy that even a single liberal-minded company willing to be underhanded, like Google, can manipulate the thoughts and actions of hundreds of millions, and do it covertly.

Why TIs are Often Targeted by Police


Rare is it that a given Targeted Individual won’t have reason to believe Police are involved in their targeting. And yet, they were not… not officially. Here’s the why and how of it…

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   >>better at>>  MeWe 

copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

Color of Law; Police abuse of power in personal agenda

In the two decades of working with thousands of organized stalking victims and victims of other forms of targeting, the single-most common complaint is the suspicion or outright experiential evidence that multiple Police Officers are complicit in the affair. If not the Police, then some other law enforcement or intelligence agency… or both. Indeed, this has been my own experience in two of three different episodes of personal targeting over a 15 year period. In fact, multiple agencies can be involved simultaneously; Ive gone up against as many as five LEA, plus FBI and CIA assets, bounty hunters, and military intelligence in a single targeting. This has been documented in my various books showing how I beat them in the end… but it was no cake walk.

18ead0da1288531458e423daff24aef2--social-awareness-funny-shitThis is a problem for more than the obvious reasons. The most obvious is, that the very authority who should be responsible for investigating and protecting against such crimes, cannot be trusted by the TI to help anyone but the perps behind the affair. Calling Police for help is almost always like asking a burglar to help you secure your home. Secondly, when officials of any kind are complicit, the victim is then entered into the official record as being mentally ill, or in a worst-case scenario, guilty of some convenient crime. Even when not complicit, going to Police about targeting is likely to have the same result; they simply do not want to believe in the Boogeyman, and see anyone who does as a mental case. In fact, stalking is designed to get you to go to the Cops for just that reason; they want it on record that you are mentally unstable. DON’T DO IT.

But there is a DO list!  Do video and log all interaction with LEA or have a witness from whom you can get a written statement immediately after. It will help keep Police somewhat confined in their actions against you. The more you collect such material, the less likely are they to risk any useful action against you; you can illustrate a pattern of harassment. Do make copies and hide them well, off site. Tips in my first book, The Professional Paranoid on all of this.

The worst example of the problem from my client situations was a Navajo Indian, an ex Green Beret, who was targeted after his daughter was kidnapped by a Satanic Cult with all the earmarks of a CIA mind control operation. Within weeks of going to authorities to seek help, all manner of problems beset him. Traditional surveillance and stalking, and electronic targeting, to include V2S was the least of it. When he began using my advice and his military skills to determine the players and go after them aggressively, it took a turn for the worse: suddenly, his mortgage was six months in arrears and his house was being foreclosed, all his credit cards were maxed out and past due, his bank accounts emptied, and there were outstanding warrants on him for assault with a deadly weapon and skipping out on bail. He was, in fact, declared ‘armed and dangerous’ with an all points out on him. This was all done by back-door computer manipulation of data files by professionals of CIA caliber.

He took additional advice from me and then went underground to organize with other ex military buddies and Navjo friends, and went black in order to wage an unseen war against the enemy. As I never heard from him, again, I must presume he failed in the effort, or was successful to the point of having broken enough laws that he needed to remain underground. I had, in fact, advised him not to contact me for such cause. But, as I have said, these are merely the obvious problems with this particular aspect of targeting.

 

The other shoe that usually falls…

Perhaps the second-most common awareness about stalkers is that they seem to regularly consist of a lot of Masonic types. This is often determined when getting a good close look at them or their vehicles; the Masonic emblem, or some similar fraternal order emblem, is found in evidence. Usually, it is either a sticker on a car window, a pin on clothing, or a ring on a finger. I myself have seen this in my own targeting, the one incident where true gang stalking was involved (as opposed conventional targeting with general surveillance and dirty tricks).

After guesting for four hours on Coast to Coast with George Noory to talk, in part, about my new book, MC Realities, I ran into the Masons almost overnight. I had mentioned on air the involvement of the fraternal organizations in gang stalking, and how they had evolved from the Knights Templar and their exposure to the satanic Hashemites and Assassins of the Middle East during the Crusades. On air, of course, I gave my name as H. Michael Sweeney, my ‘pen name.’

Two days later, I was at work where I was managing a gas station while investigating the Oil Industry, infiltration style. It would result in two forms of targeting, the first of which was by the Masons, that second day. A man bought gas and elected to come into the office to pay, where I was at the time. He waited until I was the only one present, and then offered to pay, holding out his fist, palm down. It was only a couple of dollars in gas, so I assumed it was a handful of change. Wrong; it was a message to be delivered.

NOTE: the second was targeting of the Station itself by a terror cell, of which one of the participants recognized by me as a helper to two of FBI’s Top Ten Most Wanted and two other Islamics… and FBI agent who had been earlier involved in the my own targeting as earlier described. It was, in point of fact, to be yet another False Flag operation, later described by President Bush as Gas Station Tasking… which I thwarted. Arguably, the two targeting incidents might be seen as related, but even if so, it is unimportant, except for the fact that it illustrates that one almost never quite knows for sure why one is targeted, and who really lays behind it. This is described in my wordpress home page, if you wish to learn more.

Placing my hand beneath his, he opened it, and instead of coins, a money clip fell into my hand with a wad of Hundreds. “Take what you need, Mr. Sweeney,” he said. My name tag simply said “Harry.” He had a very wry, knowing look on his face, which slowly turned into a smirk as I manipulated the money clip to retrieve a single bill. In doing that, I discovered a gold and jeweled Masonic emblem on the other side of the custom-made silver clip. A broad grin overtook his face, to the point of becoming silly.

iu-1“Interesting how some thing have more than one meaning,” he said, as I returned the clip and fetched his change. That day, when going home, There were three of them outside of my Condo, and several cars with Masonic emblems in our parking area, none of which had ever been seen before. I ended that stalking by using the methods in MC Realities, methods that many Tis would be unable to employ unless doing so upon first targeting, as had been my situation. Once targeting has been ongoing for some time, the typical TI no longer has access to the needed resources for such a defense. The one remaining defense is found in an earlier post.

In MC Realities, I trace the evolution of Mind Control technology (Political Control Technology) from the time of Adam and Eve (the Serpent’s deception was the earliest form of controlling thought… the same version of it as we see today in media manipulation), forward. The Templars, after being ordered destroyed by the Pope for having discovered their Satanic practices acquired in the Middle East, went into hiding. In time, many of them hid within the Stone Masons Guild, and eventually, took it over to form the Freemasons as we know them, today.

Hedging their bets, should they be found out a second time, they formed splinter fraternal organizations, as well. Any group with any of these words in its title… Fraternal, Ancient, Order, Ordo, Lodge, Temple, Grand, Sacred, Rite, or Knights (and similar)… is very, very likely a fraternal organization with a Masonic organizational construct… and at the higher levels, at least, closely affiliated with the Freemasons if and when it becomes convenient to the parent group. Therefore, it is easy to involve small armies of ‘helpers’ if someone is deemed a target. It is important, however, to understand that the rank and file lodge Member who may be induced to participate, has zero true knowledge of you or the purpose of the targeting; they are simply ‘helping a friend’ to solve ‘a problem.’

I end this section with a simple note: all Masonic systems are quite steeped in ancient mysteries of the Middle East, and beyond, typically focusing on Egypt, Syria, and the Holy Land… with a touch of the Sub Continent (India, Nepal, etc.) and Far East.

 

The two shoe laces are tied together…

iu-2This is where it gets interesting. Most big city Police are encouraged to join the Fraternal Order of Police (FOP), and it is indeed Masonic in structure. FOP, for instance, employs the Masonic all-seeing eye of Egyptian fame in their logo, which is a five-pointed star with a circle bisecting the points to create five triangles shaped like the Compass of the Masonic emblem, also the shape of the ancient steeply-angled Egyptian Burial (pyramidal) obelisk used for commoners’ crypts. There was additional heraldry-like art akin to European styling in the center of the star, shapes quite like those of most Police Badges, and incorporating an Eagle and other symbols. In other words, Police departments not only adopted the Lodge system almost universally, but did so to the point that their badges reflected elements of the FOP emblem. Almost all Police badge shapes generally post dated the FOP affiliations, underscoring the link. The exception would be Sheriff stars, and yet, that shape is also of ancient Masonic importance, in both the upright and upside-down (satanic Baphomet) versions.

If that were not enough to convince you, let us take a look at the Police Department of New Orleans. New Orleans existed as a city at the time of the Louisiana Purchase from France, in 1803. The first Masonic Lodge (a French version), was established there in 1793, all its members speaking French, and some Spanish, but no English of note. All the better to remain secret and mysterious to Americans, when they came into possession. But to fully appreciate New Orleans in the equation, we have to first look to New York.

In 1915, the Fraternal Order of Police established their first Lodge, there. It spread from there to many other cities in very short order. The FOP was not intended just to be a Lodge system, however; it also took on aspects of Unionization, a kind of bargaining force with the City whenever Members felt that Cops were not getting a fair deal from the Mayor. In many cases, in fact, their bargaining strength was augmented by the power of the greater Masonic power structure, a formidable force at the time.

Over time, actual unionization was also achieved in almost every major city, usually through the Mob’s control of the AFL-CIO, making it easier to arrange for hijacking of intrastate trucking or of dock cargo without anyone ever being sent to prison. But that’s another story. Ask any retired Union trucker or stevedore from Jersey. I’ve heard the same from 1975 Oregon members. The importance of that will explain to some Tis, those who believe they were targeted because they reported illicit drug operations or crimes which might be related to Unions, are targeted by Police. Additionally, of course, CIA sanctioned drug operations are protected by Police, as well. Thieves in bed with thieves, the bed made by the thieves.

Though New Orleans under the French had a Police Department as early as 1796, it had no Police Department for rather a long period of time after it raised the American flag. It was instead ‘policed’ by a vigilante system until 1853, when they formed their first ‘American’ Police Department. Almost immediately, they adopted the ancient Cresent and Star (upside down, larger star) as is common to Islam, as their badge. It is still in use, today, and appears on their cars, as well. Well before the FOP had even existed, this Department was already incorporating Masonic symbology directly in its badge. This is better known as the Shriner’s symbol, today… the Shriners being a Masonic fraternal lodge system.

 

iur

So, clearly, the Masonic influence and ties are present within most Police Departments. Cops form some of the strongest bonds between individuals in service outside of the Military, sufficiently strong, in fact, that if one of them asks a color-of-law favor of another, it is not likely to be turned down, and certainly unlikely to be exposed even if turned down. Therefore, it really only takes one Cop being approached from a fellow Lodge member to recruit several more for any needed aid, even if that request came from a lodge in another city. Ergo, escape to another city tends to never result in escape from targeting.

NOTE: That is why the Free Will Society exists; a solution to virtually all forms of targeting. Please join and support (donate/promote) our effort to create a targeting free intentional community of our own, and our other advanced programs planned for the future. If you are reading this, you should immediately join the Society and give it full support. It is a far more valuable TI resource in terms of programs and goals than any of the so-called ‘TI groups’ out there, today, the bulk of which are nothing more than information and disinformation mills.

Please: you owe it to yourself to visit freewillsociety.wordpress.com to learn more.

 

Three shoes?

Yes, there is a third shoe, one of special interest to those who feel the intelligence community lays behind their targeting. Every major Police Department in America has in place assets loyal to the Central Intelligence Agency, and many Officers have military intelligence backgrounds. Usually, you can count on some of them holding key positions within a given city: the Chief, the Public Relations Officer or Spokesperson, the head of Internal Affairs, the head of the Swat Team, and/or the Head of Personnel. From these posts, especially through IA, they are able to find bad cops who can be blackmailed into playing ball on an on-call basis, for any kind of dirty deed, to include color-of-law abuses such as is common to targeting. Don’t forget CIA drug running operations.

If that were not enough, there are similar, but far looser ties with FBI, Homeland Security, and the US Military Intelligence Agencies (and in some case, others, including the United Nations, and even Mossad). These generally entail the network of Fusion Centers and Centers for Excellence*, and special programs such as Community Policing and the Strong Cities Initiative/Network. When you consider that most all of these agencies use computer software based on CIA’s PROMIS data base management system, which is nothing more than a data base engine with a back door built in… almost any form of hanky-panky is possible. Ergo, the Navajo Beret Syndrome.

* Search for ‘Centers for Excellence + Homeland’ to see why I include it, here. All these items work together to collect, evaluate, and share information on (persons of interest). They operate as one big networked spy tool with usefulness in organized stalking which can easily be misused by anyone within LEA who has access.

So, even if Masons are not involved at all, Police can still be brought to bear on any given TI with the same level of efficiency, and in fact, the FOP can be leveraged into the equation just as easily, in reverse manner. Will the average member of the FOP, the Masons, the Police, or any of that long list of Agencies be aware of any of this? Absolutely not… not unless they are higher on the food chain. Then, of course, they won’t be admitting it, either. Complaining about it gains nothing. Knowing about it, and understanding it, can mean a lot, however.

You may not be able to beat it, but when the mystery is gone, its just another damned nuisance to deal with, and another reason to avoid trying to rely upon Police for help, unless you know one you have great respect and trust in. I was lucky. I had a relative who was a Cop in an uninvolved LEA, and he was able to help off the record in very useful ways. I also had help from ex FBI friends with back channel access, of like value.

We can’t all be so lucky. And if you are a TI, you know luck is not your strong suit.

Media’s Latest Conspiracy to Troll You on the Web


Fake news, tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations by Trolls and Bots are not the only weapons they use to dumb you down and pump you up with their version of truth. Vanishing is their latest trick.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   MeWe   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

 

The (fake) news media dilemma

Fake news and Web tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations are not the only weapons they use to dumb you down and pump you up with their version of truth. It is not just Trolls and Bots we have to worry about, now. Vanishing is the latest trick used to conceal the truth and promote the lies.

Unidistract

Image analyzing How Media Dumbs you Down with clever tricks (see link)

I’ve written before about how television mainstream dumbs you down with clever psychologically aimed technical tricks in the actual image… largely relating their use of subliminal messaging, deliberate distraction, and overload. The general purpose being to further reduce the actual news you walk away with to the simplest of boiled-down sound bites… just the ones with their take on the news shaped for you according to whatever bias the network has at management level.

Elsewhere, there have been excellent examples of the use of NLP (Neuro-Linguistic Programming), also employed by broadcast media. It involves careful wording as well as clever body language to project the intended viewer/listener response to the message, within the message delivery, itself. It has been shown to be so powerful, a well trained user (a stage magician and hypnotist, who must rely on such deceits), was able to deliberately speed past a Cop and then use NLP to leave the traffic stop without the Officer even remembering why he had stopped him in the first place.

That kind of mis and disinformation borders on mind control, and in fact relies on mind control technology, psychological methodologies, and MC research by the likes of the Central Intelligence Agency. When the great bulk of media is controlled by fewer and fewer mega corps, and their corporate leaders tend to be like-minded politically, you get the double whammy of biased news and fake news (propaganda). That’s bad enough, but this article is about another dirty little trick… a bag of them, actually, used by all forms of Media when presenting ‘news’ online.

fbi-mocing-test.jpgAnd, of course, we still apparently still have to contend with CIA’s Operation Mockingbird, the installation of CIA operatives within the media industry to help shape news to their preferred version. That, too, is something I’ve written about, at least in terms of its origins and history, and I’ve even been referenced as a resource in a more ‘official’ industry review of that topic by The Reporter’s Committee for Freedom of the Press. But now, we see, actual ‘retired’ ‘once-a company man, always a company man’ CIA officials are becoming investors in and on-camera commentators in mainstream news. This Clyde Lewis Ground Zero episode reveals how serious a threat the placement of intelligence community actors in media actually is.

What News is supposed to look like

All news is supposed to contain the 5 Ws… Who, What, When, Where, and hoW. Ideally, we also need to know the S and M… the news Source and the Meaningfulness, often defined by Motive… the Why. That is supposed to be factual Motive, and not speculation, unless clearly presented as speculative commentary. Lately, that’s the greatest sin Media is guilty of; too much ‘news,’ today, is actually mere commentary… the propaganda version.

Generally, for some strange reason, it is also rare to get all those points, especially online. The most critical things useful for research tend to be left out, making it hard for pundits and anyone trying to chase down answers to hard questions because a given story fails to ‘compute.’ That is critical, if one is to find out more, and judge for one’s self what is true, and what is fake. This is particularly distressing when the potential for a conspiracy or cover up is apparent. While Sheeple don’t even see the glaring holes in the official story, people who think for themselves really want to know why those holes exist.

But we ‘conspiracy theorists’ and politically aware non sheeple are thwarted at almost every turn. Take for instance, the WHEN. It is extremely rare in online news reports to find out exactly when an event took place… esp. useful to insure the same news event you find is the one you wanted, because often, you might have two identical sounding stories in the same city, in different time frames. Most searches are best made by searching on the (event key details) plus the year, and perhaps, month.

But many reports do not cite the year, at all. The Web is smart, though, and it knows when a given URL was created. Unfortunately, many of the larger online news sources use a kind of ‘feeder board’ URL created way back when, which is updated with current news, only, older news dropping off. While the Web remembers what the page looks like when the story you are looking for took place… that story is no longer there when you go to find it. While you can search the archives if they bother to offer one, and PERHAPS find it, that is just one hurdle in the search.

Once you do have what seems to be a correct story’s article, it is amazing how many news reports fail to include the date in the byline at the top of the page. So you have no way to know when the person writing sat down to write the story. But even with a byline date, you still have a problem: is that date the date the news took place, the date they wrote the story, or the date it was posted? It can be any of the three.

Some stories are updates to older stories, so the byline is meaningless unless the story itself indicates the actual When it took place in the text. THEY SELDOM DO. Instead, they just say something like ‘Last Tuesday.’ Great. What day of the week is the date of the byline? Now I have to go search that out, to make certain of the When. Your average Sheeple is not going to bother.

This problem also exists elsewhere in the remaining Ws and the S and M. At least one such detail is usually omitted, and all-too often, several. Sometimes, it is something simply not yet learned by reporters, but too often, it is clearly just not deemed important. All too many bylines even fail to tell you who wrote the story… so you can’t email them and ask for missing information. EVERY print article in a newspaper tells you this information, but for some reason, the online version seldom does.

Message distortion when relayed through many people

Dumbing down online is easy. It relies on the known scientific problem which transpires when a series of people relay a message from one to another to another, etc. It used to be in schools, that one of the first things they taught was this concept… that you you have to take care when relaying information. You have to listen carefully, and then just as carefully repeat it. The problem is, each person decides what is important enough to be carefully repeated, and tends to reword it for ‘simplification.’ So the message first stated has little resemblance to the message last heard. THAT is not being careful, it’s being careless.

Online, information deemed worth sharing is constantly relayed in social media in a quite similar, but an even more careless manner. Each person in the chain tends to introduce it with their own spin or commentary, advising what they think the takeaway is, or should be. They then (hopefully) provide the URL to the original (the careful part). They might also create or add an image or meme which underscores their takeaway thought. That is all in good, but…

memesSheeple don’t bother to click on the URL and read the original story, and they simply ‘learn’ the takeaway point of the previous poster. This is why Memes can often be dangerous. Especially when the creator is being deceitful or dishonest to the truth. They know that a false message repeated some 20 times will take root in the average Sheeple’s mind, and become adopted. That is especially important in political messages, because today’s social media is decidedly biased, and decidedly deceitful, even to the point of using paid trolls and automated bots to insure you are inundated with the preferred take aways.

This is why people who think for themselves always click the link or do a little extra search before they hit the SHARE button, and add their own takeaway. Is that you? Are you like me, spending roughly 50% of your time inspecting and then correcting other people’s wrong take aways and falsehoods? Or, are you part of the problem, simply passing it along? Baa… baa…

But there is a bigger problem, one which at least seems conspiratorial, and relies on the above Sheeple foibles and the omission of Ws, etc. For some reason, mainstream news sources seem to be deliberately making it difficult for you to access news, and difficult to relay, on your own; they would prefer to leave that to the professional trolls and bots you think are your online friends.

Something is very wrong with this picture. Lets take print media and look at how they operate outside the Web, and compare that to how they are now starting to operate on the Web.

A newspaper runs advertising to pay for their staff and overhead; it keeps the doors open, and allows them to grow and invest in special investigative projects. They charge for subscriptions and for individual copies at news stands based on the cost of the printing and distribution process, and materials; the ink and paper. That’s why newspapers are relatively inexpensive to buy. It used to be that the online version, therefore, just had advertising… there is essentially no comparative cost to put it out there and for you to access it.

But now, online, many newspapers, even small local ones, are telling you that you will need to subscribe or become a registered user to their online version, or pay a small fee to read the article… or that you may read this one, but it may be the last one you can read for free (relies on your cookies, but if you turn them off, you they will tell you to turn them on to see the material). Of course, once you do any of that, you’ve just sold yourself into another dozen marketing lists, without warning or compensation. But that’s not all.

Unknown-1

Suddenly, many media outlets online (radio, networks, print) are using something called Cloudflare. That product is a kind of ‘protection’ against certain abuses… a bit like an anti hacking or virus bot. But it does something else, as well. It also prevents anyone from copying and pasting a URL into a social media post. WHY? In the past, getting your URL spread about was a good thing; it brought them more viewers, which increased the value of the advertising opportunity for their Web pages. When did they decide they didn’t want more readers, and why?

Unknown-2

Where the Conspiracy comes in

Sure. You can call this answer a theory; a conspiracy theory. That is what it is, plain enough. The only way the above sins can be excused as desirable is if somewhere, someone important and powerful within media and in political realms, decided that it was advantageous to dumb you down, and limit your ability to rely on URLs to relay facts and correct people when in error. It is an insurance policy to protect the ‘integrity’ of the versions being spread by the trolls and bots.

I mean, when your read some crap someone has posted which is to your understanding just that, a lie or false belief, you should be able to go find a news article or other authoritative source online, copy the URL, and paste it into your reply to prove your case. When you are trying to educate someone on how you feel about something, you should be able to do much the same, to prepare your post or meme… have a supporting factual link to go with it.

Someone does not want you doing that. They want you to hear something said 20 times and accept it as truth, with no way to verify it, or refute it, if false. There is only one person in the media industry who fits the bill. If you are a Sheeple, you will recognize his name but not realize just how powerful in media he is, or in political realms, and how deceitful he is. I am speaking of George Soros.

It is that simple. When most of us rely on TV news, we only get one slant (liberal, usually, conservative if you go out of your way). Because of TV’s own special dumbing down tricks as earlier referenced, you will walk away with a very encapsulated message with is has no actual understanding associated with it. Then, when someone puts their slant on it and you get hit with that 20 times, it becomes your slant, and people like me and others who prefer to think for ourselves, are increasingly finding it difficult to correct any errors.

Worse, if you do think for yourself, you may not be able to learn what you need to make an informed decision, up front. Heaven help you if you are trying to investigate what seems like a conspiracy theory, because of glaring holes in the official story. Obscuring the true story seems to be the way of things, today, so just ‘move along, folks.. nothing to see, here.’

iurWhen you add all this to what is taking place in the public school system and in higher education (liberal indoctrination), your children will think this is the way it is supposed to be, and whomever is in power when they are adults will be able to do and get away with whatever they want. They will dictate to them what to believe, and it will be believed. The notion of thinking for themselves, and of distrusting and challenging government will be foreign concepts. They might as well be called the 20x Generation.

The ’Snowflakes’ on the left are already a part of that group, unwilling to listen to facts or reason, and repeating what they are told to believe. I, for one, am not willing to pass the reigns of our nation’s future over to them, in their current state of mind. I’d rather have an armed revolution, if that is what it takes, to end their madness for them. Constant outrage based on lies serves no one’s best interest, except at the top of the food chain.

So my last question for you is this: do you want to be a Sheeple morsel for Wolves like Soros and his elite political friends, people more interested in Globalism than what is right and moral? Or do you want to be a think-for-yourself consumer of actual news you can easily access, rely upon, and use when talking to others about things which matter to you?

If the later, you had better start complaining to media, and to politicians about it. You might even want to consider taking legal action or starting an initiative ballot, if your State has that option, to write laws forcing journalists to adhere to journalistic standards and to make their stories available more appropriately. You certainly ought not simply be sharing what is being fed you currently without verifying for yourself it is the truth.

Else we all become 20xers… or we have that revolution, the least desirable of options.

8 False EAS Alerts in 5 Months = Conspiracy


We depend on Government in emergencies. But what if the emergency system designed to warn us was turned against us as a tool for Control? The unusual flurry of false EAS alerts of late may point to just that…

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   MeWe   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this (long) post…

  • There has been a staccato series of ‘impossible’ false EAS alerts of late;
  • In fact, there have been twice as many as national media admits;
  • They defy statistical probabilities with no historical precedence;
  • This mimics other, similarly odd critical historical infrastructure failures;
  • Those infrastructures have associations w military & intelligence communities;
  • Their failures appear to serve the interests of the military/intel players;
  • The associations and interests are also a commonality to the EAS failures;
  • An analysis/projection as to what it all means: what to worry about.

 

Why can’t we trust the EAS System??

aaa.jpegIt makes no sense, unless you are a conspiracy theorist who knows something from history that others, do not… things having to do with CIA conspiracies which were NOT theories, but actual proven crimes. No one, I doubt, other than any conspirators involved, is in a better position to explain the true significance and offer the full details of these failures, than this writer. The full story is far bigger and scarier than the almost ‘entertaining’ or matter-of-fact dry news approaches found elsewhere, when dealing with the topic. We start with a simple question…

What is wrong such that there have been as many a EIGHT (more than a dozen, technically, depending on how one chooses to count) false Emergency Alert System issuances in the span of five short months… and that does not include several more potentially related, as separately described. That is in stark contrast to the fact that in the previous twenty years since replacing the old Cold War CONELRAD Emergency Broadcasting System in 1997, there had not been a single false alert of the same sort?*

It’s bad enough that EAS alerts start off with extremely annoying assaults in your ear, but when they turn out to have scared you into action for a false reason of some sort, you really get ticked off. Unfortunately, it appears there is even more to be angry about, than any of that… something greater to fear than these errors… even greater in scope and threat, perhaps, than the messages themselves, portrayed, even if real. Let’s take a look:

  1. False Tsunami alert, Jan 2, Seaside Oregon. Very specific, advising 4 hours to get to high ground;
  2. False Nuclear Attack alert, Jan 13, State of Hawaii. Very specific, advising “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL;”
  3. False Flood Warning, Jan 17, Morris County, New Jersey. Specific, narrowly distributed, and persistent, in that it was repeatedly issued to customers of only one cable provider, and could not be ended unless turning the the TV off and back on, after which it would reappear after a few moments;
  4. False Tsunami alert, Feb 6, Portland Maine. Also appeared in West Palm Beach, FL, and other locations on the East Coast, various locations in the Gulf of Mexico, and Puerto Rico. Very Specific, giving only 57 minutes warning;
  5. False Blizzard alert, Feb 19, Tucson, Arizona. Specific. Snow of any kind is extremely rare, there.
  6. False Tsunami alert, May 11, State of Alaska (two instances). Very Specific, and though only aired in Alaska, warnings itself cited entire North American Coastline (including British Columbia) and Hawaii;
  7. False Zombie Alert, May 20, Lake Worth, Florida. Very specific “POWER OUTAGE AND ZOMBIE ALERT FOR LAKE WORTH AND TERMINUS.” Companion message followed some time later “THERE ARE NOW FAR LESS THAN SEVEN THOUSAND-THREE-HUNDRED-EIGHTY CUSTOMER INVOLVED DUE TO EXTREME ZOMBIE ACTIVITY. RESTORATION TIME UNCERTAIN.” Note: for some reason, no news source makes record of BOTH messages, and many news pages on topic are now ‘404 Errors,’ as if someone is vanishing select reporting on this incident;**
  8. False Civil Emergency alert (2 messages), May 29, four counties about the Salem, Oregon State’s Capitol. Not exactly a false alert, it simply was wrong in content, non specific, “CIVIL EMERGENCY IN THIS AREA UNTIL 11:28 PM PDT PREPARE FOR ACTION.” This was followed by a second message some hours later advising that it was a “WATER EMERGENCY FOR THE SALEM AREA,” but gave no specifics, instead giving a web link for details. That clarification did not go out to adjacent areas, leaving those citizens, in the dark until media could figure it out and advise using their own services.***
  • Potentially Related: False Nuclear Power Plant Accident Alert, May 23, 2017, Salem County, New Jersey. A drill being conducted was interpreted as real by the system;
  • Potentially Related: False Blizzard Alert, May 16, State of Nebraska. Very Specific, listing all counties. Note: this alert was not found in mainstream news, but in a Youtube. However, the presenter specializes in videos of seismic activity recording instruments during events, and therefore, seems unlikely to be fake;
  • Potentially Related: False Zombie Alert, May 16, Great Falls, Montana. Very Specific, and claimed to be a hacking incident.
  • Potentially Related: False Nuclear Attack Alert April 22, 2018, Winnipeg, Canada. The Canadian system is not an American design, and works differently. However, there is some interfacing between them, as seen in the Alaskan Tsunami warning. This message was heard only (above link) through the cities various loudspeakers, which were not part of any official alert system, and is thought to be a prank. The message was, however, quite frightening and detailed, very specific, and, delivered in a computer voice with believable content: “This is a National Emergency. Important details will follow. (unintelligible) (emergency tones) The following message is transmitted at the request of the Canadian Government. This is not a Test. A nuclear attack is occurring against the United States and Canada. Six nuclear missiles have been launched from unknown locations, and are expected to strike the United States and Canada within the next 15 to 25 minutes. Due to the uncertain path of these missiles, all Canadian residents should seek out a fallout shelter immediately. If members of the Canadian armed forces direct you to a fallout shelter, please follow them for your safety. If no fallout shelters are available, get as far underground as possible. Stay away from windows, using heavy objects to put as many walls an layers of protection between you and the outside world as possible. You should put together a basic emergency survival kit including a flashlight and battery operated radio to use during your stay in the shelter. Stay tuned to local media for further information. Do not venture outside until notified it is safe to do so. Prime Minister Justin Trudeau will be speaking on all stations shortly

One final point to consider: there are ‘consistent themes’ present in all of this, not all of which are obtusely visible, and perhaps not all revealed, herein. There is a Zombie theme, a nuclear theme, a Tsunami theme, and a ‘name’ theme, where the names of some counties involved match the names of some cities involved in other alerts, or vice versa, and similarly, a map location theme (East, West, and Gulf Coasts, and dead center U.S., plus Canada; all four ‘sides’ and the ‘center’). There is also a ‘date’ theme, since all but one event transpired in the same three months, six of those in one month, two on the same date. Collectively, these thematic patterns raise additional questions as to the likelihood of mere ‘coincidences’ or ‘accidents’ being involved.

Note: this is a long post which goes into great detail that there be no misjudgment by the reader. It is suggested you not read further until you have enough time to finish (scroll now to evaluate reading time).

 

 The asterisks

*Each of the false alerts prior to 2018 had a completely different nature than those cited above, especially in that the older false alerts were not generated by use of the system, as such.  All but one of those above had a cause/blame element or mitigating circumstance pointing to failures in the system, even when human error was also involved, whereas all prior errors on record (about a dozen spread out over the 20 years), were due to hacking (1), mistakes in advertising (several), or film production (several). There were additional failures where tests failed to transmit, at all. It can be said that all of the historical problems boiled down to human error traced to failing to understand how the system worked, or failing to use it at all (failed transmissions). That is not true of the six in question.

The thing to underscore is that there is near zero similarity to the current failures, in analysis. Even when human error played contributory roles (two events), something in the System, itself, was also to blame… which is a mystery, because there has been no change to the system which could account for a change in reliability or performance. Differences aside, keep in mind too, that there is no guarantee that any given official explanation is necessarily the truth; such things gone wrong involving government often involve cover (up) stories… especially if there is a conspiracy, somewhere in the woodwork.

There was one instance of hacking in the older events, but a long list of those older false alerts were triggered because radio or TV stations used tape which had previously held EAS content, where the signal which triggers the system was still detected by the system though otherwise inaudible. The EAS tone has a digital signature which the system detects for actuation… and the annoying tones themselves are that digital signal in audio form… which also triggers the system if in broadcast content. Beyond the hacking, this signal was itself the source of the remaining problems, primarily because human operators were unaware of it’s technical nature:

One national Arco Ad deliberately included the tones with the ad message to get the listener’s attention in ‘gag-like’ motif, and concluded with “This test brought to you by ARCO.” One local advertiser also incorporated the tones in similar marketing intent, but the NBC affiliate running the ad locally did not know it would trigger and automatically transmit the alert nation-wide over the entire NBC network. Movies sometimes include the sound in their digital sound tracks when the plot calls for it, and when aired on TV, that, too, triggers the system (Olympus Has Fallen was an example). The most recent example was a sports radio program using the tones in a review of a sporting event where the alerts triggered during the event, a matter resulting in $2.5M in fines to the program producers and the station involved.

These differences highlight the unusual series of late, which contrast in both frequency statistics and historical relevance; if the given explanations are true (there have been few explanations yet offered, and they have been speculative or non specific in nature, chiefly passing the buck to some other quarter; ‘It wasn’t us;’ the message came from (someone else). ‘Someone else’ had nothing to say. So, we now have one more serious question to ask:

How come we have not encountered these kinds of failures, before?

**The Zombie alert is particularly disturbing for three reasons, none of which sound particularly believable, but they are true. One is tied to where it took place, in that there have been multiple news stories in Florida in this last decade, all about REAL Zombie attacks, including banned Youtube videos of a naked man who had to be shot by Police because he refused to obey orders to stop eating the face of another man he had subdued violently. Another incident had a man who was undeterred by multiple tasers and a Police Dog, and had to be pulled off of the body of his victim by four Officers, after chewing on his victim’s face. These attacks were blamed on Flakka, an exotic Chinese-made designer drug with extreme and unpredictable hallucinogenic properties.

The other is that the Center for Disease Control’s official Web site has a whole page on Zombie attack preparedness. It is a not-so-easily-detected Onion-style tongue-in-cheek attempt (they claim it a marketing gimmick) to force people into thinking about emergency preparedness. It may have worked, but given the news stories and the EAS alert, one has to wonder… how is it that the word Zombie has more something like a dozen times made it into elements of the EAS system? In the recent incident of concern, it seems the word was not typed in by a human, but somehow, it was substituted for the word for ‘weather.’ I point out that procedurally, it takes two people to enter a custom message, the typist, and a supervisor who dictates and/or approves it while watching over the shoulder; a kind of failsafe system to spot/prevent such errors.

aabb.pngThe other general false Zombie messages took place in 2009 and 2012. Highway traffic alert signs (i.e., the ‘Amber System’, School Zone signs, freeway traffic signs, etc.) started warning of Zombie attacks. Amber and many highway systems, and any local emergency cell-phone subscription services, are all interfaced with EAS to one extent or another. The Zombie messages transpired in scattered cities around the nation with some variety in specific content. One school zone speed warning sign read “ZOMBIE INFECTED SCHOOL AHEAD”,  whereas most of other traffic signs read “WARNING! ZOMBIES AHEAD.” Fortunately, those events were not based in reality… yet.

One more ‘bonus’ reason exists, but is its own matter of importance with respect to the conspiracy theory alluded to in the introduction.****

***The Oregon Capitol (Salem) suffered a biological water contamination (algae bloom toxins) which was dangerous to very young or old persons, and anyone with a hampered immune system. But though city planners were aware of the problem, they waited four days before issuing the Alert, thinking they would simply ‘fix’ the problem with water treatment, and retest the water.

That’s what they did, but the brainy (I should point out that Oregon is run by extreme leftist progressives, not known for thinking problems through to proper conclusion before acting) Oregon officials failed sent the sample to an out-of-state lab by mail despite having ample local testing resources, forcing a considerable delay. Additionally, the problem initially transpired over a holiday weekend, and they just couldn’t be bothered to be proactive in the face of a potential life-threatening situation. Oregon is often described as a ‘Let-it-burn State,’ because they habitually fail to respond to emergencies until an extreme crises, a pattern especially visible in how they respond to forest fires… which is to say not at all, unless and until it starts threatening communities or major commercial ventures, or starts to make national news (they don’t like negative PR).

In like manner, the State failed in its ability to notify citizens when the water was finally again safe to drink. Some blame the Governor, Kate Brown, who is thought to have ‘not let a good crisis go to waste,’ and who thereby let the problem get large enough for grandstanding, by calling in the National Guard to provide potable water in a near ‘Martial Law disaster response’ manner. That thus illustrated ‘leadership in a crises,’ when it was actually a non crises which had apparently already resolved itself, before she gave the orders, had anyone bothered to correctly clarify the matter.

Even the second EAS ‘explanation’ message was sufficiently non specific such that it caused extreme social and financial hardships on businesses and citizens, esp. those working for the countless eateries and other firms which shut down because they feared using water, at all, and because people panicked and hit the stores to gobble up as much bottled water as they could muster. As result, some stores raised prices on bottles to as high as $50 a case, and they got it. The Governor has ordered those firms to be prosecuted for their profiteering in a crises, which is akin to hording in terms of emergencies, under the law. This was also part of her grandstanding, as it seems the threat was never carried out, probably because the law only applies under FEMA control in disaster response, and/or in the case of actual Martial Law. I’ll defer to legal teams on that, as this is certain to lead to lawsuits against the City and the State, as well as stores involved (that’s another way Oregon burns).

In addition, Kate attempted to blame Donald Trump policies in purely political diatribe, which had nothing to do with anything. And, subsequently, the State moved to order residents of four rural counties to ‘stop using well water’ because ‘it is lowering river levels’ and threatening the water supply of the cities. The State has no legal right to usurp the property (water rights) of citizens without due process, and in point of fact, the wells in question do not impact the river levels, as is scientifically proven by several means.

But it made good PR for the liberals in the cities, who hold the greater number of votes. So, in a way, this particular EAS was part and parcel of its own little political conspiracy, though it did not originate as such, nor was it causal to the false and functionless alerts… assuming you don’t count public panic a function.

****Conspiracy? This conspiracy theorist has many times proven theories true, and in fact, correctly predicted 9-11, and afterwards, personally thwarting another predicted terror attack in Portland (link: mid page). Over the years, conspiracy theorist thinking also enable me to help put a good number of bad people into jail who were engaged in organized or individual crimes, some of which made national news. These predictions and the crime busting was largely made possible by first formulating a conspiracy theory, then postulating a means to prove it, and researching to find the predicted evidence it was so. There is no difference in methods employed by a good theorist and law enforcement, except that the later has virtually unlimited resources and tools available.

By such means, after ten years of research, I developed Unified Conspiracy Theory in and for my book set, Fatal Rebirth. It was the UTC which predicted the terrorism, and much more as cited above, including the Derivatives financial disaster, select gun violence, an assassination attempt tied to a Presidential campaign, and much more. In reverse manner, it showed how the long list of ‘random’ bumps-in-the-night of American History (i.e., S&L crises, assassinations, Iran Contra, OKC and WTC bombing, etc.) were not random, but stepwise logical acts in a PLAN to towards meeting a SPECIFIC GOAL… which also accounts for the extreme leftist nature and actions of the Democrats since Obama took and then lost office. That, I did not foresee, though at the time, it appeared that the far Right would do much the same if unchecked. Let’s just say that the UTC saw little difference between a Clinton and a Bush… ‘New Boss same as the Old Boss.’

The history which enabled the UTC itself brings us to some things which were part of those bumps in the night… which directly speak to this rash of EAS false alerts… as well as the highway sign warning system false alerts. The UTC in fact predicted abuse of EAS in false flag manner. That history tells us that these emergency alert systems were not the first to suffer highly questionably and unbelievably coincidental rashes of system ‘failures’ tied to conspiracies. To explain, we go back to CIA’s Operation Mockingbird… which through knowing, will help explain EAS matters. If already familiar with Mockingbird, you may skip to the last paragraph in the section, below.

 

Mockingbird

Operation Mockingbird was a CIA project which was started in the 1950’s (Wikipedia uses the word ‘allegedly,’ but it is well documented, even indirectly referenced in the Congressional Record in both the Watergate affair, and in the Church and Rockefeller Committee reports on CIA mind control operations. Mockingbird disinformation was a subtle but effective form of mind control through, at the very least, the mid 70’s… and that date IS ‘alleged,’ because there have been many proofs it is still in play well into this Century, as one example, below, will attest.

Mockingbird was a large-scale infiltration of mainstream U.S. and foreign Media. In the U.S., alone, there were thousands of operatives involved. This included small student and cultural organizations all the way up to big TV network news and newspapers, and Internationally, it included whole Wire Services, such as A.P., U.P.I., and Copely… which of course, also impacted American news sources who regularly passed on their stories unchecked. Most were recruited as in place employees or managers ‘hired’ or ‘bribed,’ or otherwise coerced into cooperation, but actual CIA agents were also put on the payrolls of cooperative media. In some cases, CIA actually bought the firms, and staffed them with whomever they pleased.

Big names were involved, too. William S. Paley (head of CBS), Walter Cronkite (CBS), Henry Luce (Time/Life), James Copely (Copely News Services), Phil and Katherine Graham (Phil @ Washington Post and as head of Mockingbird within his industry, Kate following in his footsteps, and later, Time/Life/Warner’s infection, along with their existing Mockingbirds). The list goes on, to include many key people in at least 25 newspapers and every TV network — and Hollywood was by no means exempt. That number of newspapers is interesting, because it is not the first time.

Prior to WWI, the ‘Powder Interests’ (the predecessor to the Military Industrial Complex) organized conspiratorially to get America into the war by bribing the Managing Editors of 25 newspapers to sway America away from its isolationist and neutral thinking regarding the war in Europe. That IS succinctly and precisely found in the Congressional Record. They did this in a manner similar to the way a CIA Public Relations Firm and CIA proper arranged to get America into ‘America’s New War’ (the ‘slogan’ adopted by mainstream media in Wag-the-Dog media manipulation manner), Desert Storm, the liberation of Kuwait. This was a modern post 2000 example of Mockingbird’s model in play.

CIA and it’s CIA controlled PR firm, fostered a lie (disinformation) in news stories and in false testimony before Congress (and rolling news cameras) that Iraqi invaders were killing Kuwaiti babies, Doctors, and Nurses in order to steal incubators from hospitals. In WWI, they did the same, the lie being that Germans were raping and cutting the breasts off of Belgium women thought to be corroborating with the resistance movement. Both lies were bought, hook, line, and sinker, and helped bring America to war. The first casualty of war, is said to be ’Truth,’ and it falls well before the war actually starts.

What does that have to do with EAS, you ask? What is EAS (and the highway signs), but a way to spread key information to people… or DISINFORMATION? It is just a slightly different but much more urgent and powerful cannot-be-ignored way, than mere media.  Now, for the rest of the story: this is indeed not the first time there have been conspiracies which parallel these ‘errors’ in other kinds of critical national systems… and their very nature implies Mockingbird-like ties to the intelligence community, was involved. Everything you are about to read next about these events is fully reviewed and documented in Fatal Rebirth, and were, in fact, key components of the UTC’s evolution and ultimate predictive capabilities.

 

Telephone and Power Grid systems

Both of these critical national infrastructures are well regulated, if not designed, in a collaboration between their key industry players and government overseers, including one or more intelligence agencies. NSA and Ma Bell worked very closely together to design the ‘modern’ digital telephone system (‘modern,’ because it was as early as 1960… an important date in our discussion). FBI and CIA were also ‘in-the-loop,’ along with the Pentagon and at least Army Intelligence (perhaps other branches, as well).

The nation’s Power Grid, on the other hand, has been an evolving design overseen for security and technical purposes by the US. Department of Energy. DOE has historically had strong ties to CIA, to include, for instance, cooperative efforts in the area of Mind Control research (again, in the Congressional Record, and in this case, official DOE files online). Again, FBI, et. al, have always been in the oversight loop. Curious then, that both these systems have suffered mysterious rashes of failures almost identical in pattern to the EAS and highway sign failures. I summarize, here, from documentation in Fatal Rebirth:

The Power Grid has suffered two ‘batches’ of failures. The first was over two years (1996-98), during which three of the four major multi-state grid sectors suffered a complete catastrophic power outage. The second string of outages took place over three years (2001-03) with similar results. Both series involved other countries, as well, all relying on US grid design formats or the failed grid’s power, itself.

This was all blamed on trees and lightening strikes, neither of which hold water for technical reasons which render them it quite implausible, especially given the repetitive nature in tight time constraints… it would be like claiming every assassination effort in the last 50 years involved a JFK magic bullet, including the one against Reagan by Sqeaky Fromme, where no shot was fired. Simply put, trees are not allowed anywhere near the high tension lines involved, and all lines are isolated from ground, where their towers are in their place grounded lightening rods intended to prevent lightening strikes from impacting the lines. These are cover up stories. If they were valid explanation, the history of outages would consistently have the same failures ongoing, and not be isolated to neat little clusters.

And it is JFK which brings us full circle to that 1960 date… and to the phone systems. The digital phone system was launched in 1960, just in time for the assassination of JFK in 1963. The entire phone system in Washington, D.C., was shut down the very hour of the assassination, and not restored until Vice President Johnson was sworn in. Evidence generally accepted in books on topic (i.e., Mark Lane’s Plausible Denial) indict G. Gordon Liddy, ex FBI player trained in manipulation of the digital system, and closely aligned with the CIA team assassinating Kennedy according to courtroom testimony (same book), also the same team to the man involved in Watergate, along with Liddy. The D.C. outage would eventually be duplicated in a bigger scale, nationwide…

These also were in two batches. In 1991 a series of major land-line outages in America caused large area networks to go dark, all within the same two month period, each impacting key cities and whole States, D.C. style. In fact, D.C. was one of the cities, and part of the mystery is that major cities on vastly different regional networks were simultaneously failed in most of these outages, often thousands of miles apart. Like the Power Grid, post Fatal Rebirth, another series of such outages has taken place, this time impacting select Cellular carriers, the most recent recent of note impacting multiple carriers and the entire Southeast U.S. More to follow, on that. Like the EAS alert errors, no actual definitive explanations were ever fielded.

 

What it all means

There are two important meanings. The only one obvious and stated elsewhere in media accounts on the topic is the concern about public safety. If you cannot trust the accuracy of the EAS system, people could end up being harmed physically or financially by false alerts, or worse, end up in like state because they had lost faith in the accuracy of the system and failed to properly and promptly respond to an actual emergency. It matters now WHY the errors exist, for this concern to be valid. Be it because of hacking, human error, design flaws, or political motives, lives are still at risk of serious negative impact. But that is nothing, compared to the greater, unseen threat implied as covertly present:

The UTC says these were all test ‘failures’ caused by elements of the intelligence community, principally as ‘tests’ of their ability to manipulate the systems involved, as a matter of Civil Control. This would logically be a logical step in preparation for potential serious civil disobedience, Martial Law, or some kind of political Coup. The more recent events were, in fact, predicted by the UTC in Fatal Rebirth. Such would be a powerful disinformation tool, one having the unique potential to be both a conspiratorial false flag style pre event deception, and a support for post event cover up… ‘official proof’ as to what the ‘official truth’ was intended to be.

Certainly, any given event we have reviewed could in truth be simple natural failures with no attendant conspiracy attached. But given the batch nature and other similarities to the power/phone system failures, and the other highly coincidental clues discussed herein, the whole cannot in any way be innocent. Consider this: if we suspect conspiracy based test ‘failures,’ we must presume they would need to predate some future major event of potential concern such as to warrant such a desperate total blackout of (power, phones, or both… along with EAS, and highway signs.) Restated; if expected to be needed, you would damn well test something that complex and important, first, and early enough to perfect the effort should it test poorly. Any such predating would need allow a couple several months to years to ‘fix’ any flaws causing the tests to fail, in order to retest to insure it worked flawlessly when it really mattered. Hence, tests might require two batches.

So… what about that dating?

We need look at the outage dating and see if there were any events which might require outages of power and phone systems, as a means of validating conspiracy concerns. We must think of such outages as contingent emergency responses to control populations in an otherwise out-of-control situation threatening government security… or the security of those working in the shadows on conspiracies of their own against the nation. If we find such in place, then we have a potential UTC-like scenario we can then apply to divine what may lie ahead, based on the current flurry of false alerts.

Power, 1996-98: two years before 9-11. If that was a false flag attack, as much evidence reveals it to be (another part of the Operation Northwoods plan thought to have part of why Kennedy was assassinated), then any serious failure in keeping the truth a secret might require shutdown of the country’s ability to rally against a more dramatic coup required to prevent or deal with armed revolution, or similar civil upheaval. A FEMA takeover would be the perfect cover for such a coup, and give time to manufacture and establish an effective cover up, such as showing some dead bodies thrown under the Bus as conspirator ‘ring leaders.’ In fact, Homeland Security was established exactly two years prior to 9-11, to the day… and was planed by PNAC and the Anser Institute (an intelligence community think tank), all planned in the same general time frame as the test outages.

Power, 2001-03: one year prior to a UTC predicted terror attack on Portland, Or, which I personally thwarted, involving two of FBI’s Top 10 most wanted terrorists (identified by video and eye witnesses – details here)… not to mention at least one FBI agent, false flag style. Five years before Barrack Obama would run for President with some reason to fear possible assassination, which could in theory spark a race war or similar unrest. Either one of these events might require outages in order to retain or restore control and mitigate damages from resulting civil turmoil.

Power, regional Southwest outage, 2011 (also post Fatal Rebirth): this is the most recent and singular outage event, only suspicious because no cause for it has ever been discovered, though hacking and terrorism have both been ruled out. It is several years before the growing racial violence potential during the Obama Administration, and for the matter, the current turmoil among the radical left caused by Trump’s Presidency. Additionally, there has been an endless series of news events, mostly centering around gun violence involving black victims or civil rights issues had a potential for sparking the race war feared by the Rodney King beatings. The assassination fear would also remain.

Phones, 1991 series: three years before the Rodney King beating, the WTC bombing, and the Branch Davidian nightmare at Waco. The CIA, military intelligence, and the greater Military Industrial Complex were involved in all three events. Two years before the assassination attempt predicted by the UTC on Presidential Candidate H. Ross Perot.

Phones; regional outage 4 carriers in four Southeast States, 2011 (post Fatal Rebirth): this was allegedly due to a single cut land-line cable, but who and how the cable was severed has NEVER BEEN DETERMINED. There is a possibility that the cut took place AFTER the outage was achieved by other, unknown means. The Occupy movement was generally organized/proposed/planned beginning in May of 2011. Intelligence Agencies would have been aware then, or shortly thereafter, and would need to take some time to consider contingencies, once knowing the event’s schedule. The outage transpired in August, and the actual Occupy Event in America took place in mid September, exactly 45 days later. It had the potential to be evolve into a national or even global revolution.

A little complex to relate in a blog already long in tooth, but suffice it to say that any one of these outage events could easily be shown to be a preparatory test in support of a plot or other expected event with the potential to result in wide-spread civil disobedience. CIA operated spy planes remapping US cities and coordinated with the Pentagon in planning for military takeover if riots spread beyond LA, where military intelligence operatives initiated much of the violence disguised as angry Blacks from Watts. WTC was orchestrated and facilitated by both CIA and military intelligence, principally to empower Osama bin Laden’s Al Queda as the premier terrorist group, and place two top aids into the organization as double agents. The bloody end planned for Waco risked exposing CIA mind control programs and premeditated mass murder, and took place under Bill Clinton, he and his wife also ‘former’ CIA operatives, if not agents. Perot’s assassination attempt was by mailed Anthrax, same as used against one of Clinton’s body guards who was to testify against him in the Whitewater affair, and as used against media and Congress post 9-11. Any one of these events going wrong and leading to exposure of the truth (esp. who was behind them) could result in serious civil upheaval or dangerous collapse of government infrastructures, including the military and intelligence community.

Note: Phone and/or Power outages also generally kill Internet services in the same areas effected. Power outages kill everything, including gasoline supplies, sales of critical emergency supplies at most retailers, and access to cash from the banking system. These things critically impact the ability of Citizens to exercise much of any effort beyond mere survival, easily putting a crimp in any major organized events. Outages effectively ‘freeze’ political, social, and physical states of the region(s) affected until authorities can gain control. Emphasize, CONTROL.

 

What might the current EAS failures portend?

What if the theory is true? Again, in UTC manner, one can attempt to ‘look ahead’ and divine what might be needed to fulfill the last remaining ’puzzle piece’ in the theory; the otherwise inobvious ’need’ for such a test. Two such possibilities come easily to mind. Without being more in tune with current events at the book-research level, I can think of no others, but they certainly may exist. Or, of course, I could be all wet… which is for you to decide… comments welcome, even if critical.

Given the current level of unrest and hatred found on the far left, and the violence and aggressiveness they have lately resorted to, I can only conclude that many of the EAS failures were potentially tests preparatory for a national crisis based on an attempt to depose President Trump and assume control of the White House. It might be an assassination, some form of a coup attempt, an outright civil war between the left and right… or as simple as a highly questionable impeachment effort. I rate that as number one in likelihood.

Number two relates well to the Zombie element. Many conspiracy theorists… and the UTC does foresee the possibility… believe that some form of biological pathogenic pandemic based on zoonotics (man-made virus, generally race specific) is in our future. Fatal Rebirth and my latest book, Who’s Killing the Bilderbergers, both spend a lot of time examining this notion. The theory is that the New World Order will move to both reduce the population of the World and to weaken America’s ability to defend itself against foreign interests (including NWO desires to see a North American Union consisting of Canada, the U.S., Mexico, and the other Central American countries), and will foment a biological attack disguised as some random but previously unknown virus.

It is also possible that large quantities of Flakka could be manufactured and introduced into the water system, slowly. That would make some sense of the Zombie alerts, and the EAS problems related to the water system in Oregon. Slow introduction of Flakka would result in evolving mental instability of the population, at large, such as we are seeing demonstrated more and more in bizarre news stories. At some point, ‘Zombie attacks’ would start to transpire, especially with a sudden increase in Flakka distribution through secondary food sources or aerosol disbursement. If this scenario were a valid concern, the ability to interfere with the EAS system in the event of water testing producing evidence of Flakka introduction would be necessary, which therefore makes Oregon’s EAS failure a little more suspicious than simple stupidity or political malfeasance.

Regardless of if you accept my evaluation and speculations, or not, it is clear we cannot trust the EAS system, and whatever the reason behind the failures really is, it isn’t going to be an answer likely to make us warm and fuzzy about the system, or our future. Especially since it looks like we will never get that answer, at all. That, btw, is how conspiracies work best; treat the public like mushrooms in the basement. You won’t be fed useful information likely to get you out of the dark.

It helps nothing that you can find at least a dozen Youtube’s and other Web resources telling you how to fake an EAS alert. Doing so in any way which reaches the public or accidentally triggers the EAS system, is a federal crime. That so many seem to be freely promoting fakes alert methods… itself seems somewhat conspiratorial.

Yet, somewhat unfortunately, one MUST play safe and act as if any EAS alert is valid. Ultimately, that is the only advice I can offer… but as the baseball player said in Field of Dreams… “Watch out for in your ear.” If you prefer a brainier quote: “Men still have to be governed by deception,” Georg C. Lichtenberg, 18th Century Scientist and Political Satirist.

U.S.P.S. “Informed Delivery” Potential Threat to Everyone, Esp. Stalking Victims


Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

“Informed Delivery?”

web_USPSThe idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.

1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.

2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.

3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.

4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.

I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.

Defensive Measure?

It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.

Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.

https://link.usps.com/2017/08/29/informed-delivery/

Risks in 12 Step Programs, esp. for TIs


What most people fail to realize is where these programs came from and the potential for targeting abuse by sinister forces.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

12 Step Origins

I am not going to tell you there is no value in any specific outwardly decent 12 Step Program. They do tend to have value to the countless individuals who desperately sought and found through them a path out of a self-destructive addiction or abuse. As such, they also generally have an excellent track record of success vs. failures.
However, I am going to tell you why they can become a trap for select individuals, and just why and how. I am referring to targeted persons and non targeted persons who hold power, influence, or key positions of any kind. I am also going to offer a very simple alternative which has no traps, no downsides, and no financial or time burdens; something that’s been around for thousands of years. It has worked for me, repeatedly, for both serious uses (including targeting), and more frivolous. It is a 1-step solution.
Like the Freemasons and Knights Templar before them, 12 Steps outwardly maintain a squeaky clean public image, but what is inside at the higher levels of operation can be insidious, especially to those select individuals. Also like them, they profess to be God-centered, but fail to define the nature of God or rely on Christian doctrine in their dealings. While even the bulk of staff may think these things true and hold personal faiths they see melding with the program usefully, it does not mean that internally, the truth is not otherwise.
This is because the very first 12 step programs were introduced almost simultaneously and by the same people as two other dark forces applied to the needs of their founders — persons of mutual interests who, in oversimplification, I’ll call the New World Order. That can mean the Illuminati, the Masonic influence, the 1%, globalists, members of round table groups, or even satanists, etc. You are welcome to free associate as you wish; all is usefully accurate within the realm of perpdom.
The first such program, circa 1920, was to combat alcoholism, just in time for prohibition. Many others followed the 12-step blueprint for other ‘habits,’ over time… and while some may have been absent of dark influence when founded, they all would be rather easy to infiltrate. The two additional forces spoken of can be seen as quite related in purpose and means to the darker nature of the ‘bad’ 12 step programs; actual mind control research projects, and the New Age movement, itself. All three served as a means to the same kinds of goals; growing the force I call Shadow in my book set, Fatal Rebirth, detailing the games played by modern-day Illuminati.

12-steps.3

Technically, there is a 13th step, one early in the program; the assigning of a help mate, intending that you each help one another to stay on the narrow path, since ‘you can’t do it on your own.’

The New Age movement and select early mind control research, as well as the first 12 Step, were all funded by and proxy organized for the Rockefellers and Rothchilds, with counterparts in Europe. The New Age stuff started with the establishment of the Theosophical Society, which evolved series of petri-dish style afterbirths of cults, false religions, and philosophical mysticisms any Mason would relish. That’s not just rhetoric, because most of these mind game groups were organized along the Masonic lodge system, where secrets were king, and held only by the higher ranks, and/or used to manipulate and control members.

Divinity    emblemfix  Rockefeller Foundation_0.png  Unknown-12    th-19

Templars          Masons                                                                    Theosophy     Rothchilds

We need not get into mind control, here; most readers will already know more than they want to about that, first hand. Those that don’t know, should stop right here, and go read my book, MC Realities. In that book, I produce a Timeline of Masonic/Illuminati/MC Evolutions. It specifically outlines with nearly 80 entries (and more again in the text of the book) several thousand years of such treachery. It includes the 12 Steps.
Again, not wanting to paint the wrong picture about 12 steps, the darker side or risk is not a concrete given for any individual program. Some are undoubtedly completely safe. But if the person seeking their help is already a TI or someone of power and influence, the risk is not insignificant. As a consultant to TIs, at least a dozen clients I have worked with were shown to have been targeted and/or manipulated through their 12-step. This was at times the origin of the targeting, and at others, simply augmentation of existing targeting. This was divided about 50-50.
The primary risk for non TIs is BLACKMAIL, as the 12 step programs always include FULL CONFESSION with prying out of juicy details, things which can result in one’s being targeted to take advantage. While the core of it is during sessions, additional information can be gleaned through the additional risk… which is the fact that attendees are given an ASSIGNED PARTNER (sometimes called a ‘sponsor’), and the resulting effort to become very close and ‘mutually reliant.’ Where the program has a nefarious side, that partner is not very likely to be one’s true helper, as proclaimed for purpose. But they will grow very close, learn much, and be able to exert influence, and even sabotage the victim of their deceits.
In some cases, other attendees and staff members of the program can also be turned against the TI, though generally in ways undetected until too late. Once participation in targeting is detected, an adversarial relationship can quickly develop, with decidedly one-sided advantage; the targeted will suffer a lack of credibility, and the threat of their secrets being revealed. In one one such case, it resulted in physical assaults and scare tactics, one of which eventually resulted in the accidental death of the TI.
Sidebar comment regarding other attendee participation: bear in mind that each attendee is in a similar position of vulnerability, and can be subject to manipulative forces at the psychological level which coerce their cooperation in any such targeting. In time, they may be discerned and known as ‘visible’ perps, but this is not quite the case.
The real evil never shows its face; the attendees themselves are also victims, likely unwitting conspirators in they know-not-what. They do not deserve hatred or vilification, but pity and prayers, if not perhaps outreach and education as to the ‘MC Realities’ of their own situation. It is not impossible to turn them to the TI’s side as covert operative; a means to learn who the invisible persons are, and their motives.
I will go so far as to say, that 12 step counseling sessions are operated using known psychological control methods designed to lower the defenses and encourage the attendee to spill their guts, and accept advice and help which in fact is intended to control them. It is not any different than any other form of mind control in terms of intent or result, even when the purpose is benevolent, as advertised. It is, after all, the intent of such programs to help the individual to do things they have been unable to achieve on their own… to control their actions for good. But when used for the nefarious, the results can be devastating well before any sense of betrayal is realized (if ever). Where already a TI, one can be easily sabotaged and brought deeper under control through the 12-step.
Where the individual is powerful or well placed to the interests of the NWO, it becomes a very simple thing to gain control over the individual either by blackmail and or influential manipulation by the assigned partner or ‘buddy.’ Imagine a Senator with a drug or sex problem, or a key corporate employee with access to proprietary secrets; perfect blackmail candidates. These manipulations can can also provide an avenue or stage for the introduction of other forms of mind control or targeting down the road; the victim becomes an ongoing TI.
Consider the oddest and most shocking news out of the District of Columbia, and other power centers. This can explain why Congressionals sometimes do some of the crazy things they do, things contrary to their party’s and constituents interests. And when failing to do as bid, it can account for public disclosure of their sins in a way which forces them from office. Government often happens by manipulation and graft more than by reasoned and proper loyalty to the oath of office.
Knowing what is going on is everything, when it comes to targeting. In all cases but the one death, my clients fared better defensively once knowing the 12 steps was involved, and broke all ties. The one situation was well out of control before the client made contact, and ended badly before we had even fully explored his case. Perhaps if he had come to me sooner. Note, by the way, due to a number of mutually impacting personal reasons, I no longer offer such client services. I am, however, happy to answer simple generic questions which do not require in-depth understanding of one’s situation. I also offer a free Helps Kit and other aids via proparanoidgroup at gmail com.

The 1 step solution is also useful in targeting issues

Many TIs will immediately understand this statement: targeting is satanic in method and intent, and its primary target is almost always a Christian, especially if weak or new to struggling with their faith. Less commonly understood, the secondary enemies are the Jew and the Muslim, for all three worship the same God of Abraham, who is the only real enemy Satan has. Yes, there are victims in other categories, including atheists, but in small numbers compared to Christians, et. al. To aid understanding, consider that all forms of mind control cause an increase in activity of those portions of the brain used in negative and sinful thoughts, moods, and actions, while suppressing those portions used for good, specifically to include prayer and meditation.
Conversely, as you might rightly deduce, prayer and meditation achieve the exact opposite.
I devote a whole chapter in my book, MC Realities, on the role played by faith in God in mounting a proper defensive campaign against targeting. It shows in clear terms just exactly how and why something as simple as PROPERLY (very easy to do it incorrectly) applying scripture and prayer can have stark and powerful results. It includes both the theological and the scientific explanations as to how that can be so. It should therefore be no surprise that a 12-step can be replaced with the same principles. Instead of applying it against targeting, it is instead simply applied against the ‘enemy’ for which a particular 12 Step Program might hold promise of relief. AND YET, IT CAN BE APPLIED AGAINST TARGETING ISSUES, TOO!
I make that chapter available free of charge on request: proparanoidgroup at gmail com.
What do I mean by ‘issues?’ The issues are the psychological harms of targeting; fear, anger, withdrawal, outbursts, hatreds, and so forth (things from the ‘dark’ side of the brain). These things work together to foster hyper vigilance, a form of paranoia, which can over time grow to exhibit or mimic schizophrenia, where everyone and everything is ‘targeting,’ when it cannot be so. Many think the goal of targeting is murder by slow death or suicide. The actual goal in most cases is simply to make the TI seem insane, and actually to drive them well into that state of mind. Suicide is merely an unhappy proof of success.
To fare well defensively, one must be able to ignore things which are not truly a threat (simply manipulative), and focus only on those things which are (especially those things which cause physiological or financial harms), or which might lead to learning more about the who, why, and how of the targeting — the things useful in mounting defensive and even offensive strategies. All else is a waste of life, and a destroyer of free will. By that, I mean that the TI does what is expected of them by their enemy, not what is useful to the self. Yet so often, I see TIs who would rather spend their time worrying about every single thing every single moment, and complaining about it constantly, instead of working in an organized manner that might better their standing.
Let me tell you how well it can work, both as 12 step substitute, and in targeting…
My personal testimony: I am an alcoholic. That is a medical fact. I exhibit every single trait or warning sign. However, unlike members of Alcoholics Anonymous, the first-ever 12-step, I am able to drink without fear of falling off the wagon. I am in full control, and can drink socially, or for the matter, simply drink for the taste — I love a couple of Margaritas with meals each week, and I might take a single or double Shot of really good aged Scotch once every couple of months. I never get drink for a buzz or to get drunk. I have replaced any ‘need’ with simple moderation. I’ve been doing it for more than a decade.
In like manner, I’ve historically had a problem with pornography. I’ve spent countless hours each week chasing after some elusive fantasy which life was unable to provide in reality. No more. I am actually amused to say I can launch a porn movie on one of my screens, and work or play a game in the other, and not be drawn to the lurid screen by temptation. But if attention is drawn by something unusual in periphery, it is for no more than a reflexive glance, no matter how ‘hot’ the action. That dual-screen game was something I did to test myself, to see if I was cured. Poof! All done!
Both of these were serious threats to my wellbeing in many ways. No need to visit all of that. The important thing is, how easy it was to stop, essentially Cold Turkey, with JUST ONE SIMPLE STEP. Obviously, any physiological aftermath such as from cold-turkey ending of a drug addiction (or nicotine) will still need to be dealt with. But even after ‘drying out,’ an addict will still have the urges and temptations, and the worry about ‘falling off the wagon.’ THAT is what the 12-step is designed to address, and why the buddy system can be of great value, and why, once you join, you need to continue, FOR LIFE. With the one-step, you instead rely on medical advice and help for the short-term physiological aftermath.
Though Christian-based and thousands of years old, it is not quite like what you would expect, and certainly not exactly like any faith-based attempts you may have already seen fail. And, it works: it even helped me with my own targeting experiences. The simplest explanation is that it allowed me to stop knee-jerk reactions and to focus only on those things which enabled victory. Three times in my life I’ve been targeted, and all three times, I ended it through defensive and offensive efforts which would not have been possible, otherwise. The details are in my books.
As to the one-step, itself, explaining that is a lot harder than is the doing. Why? Because I would need to address endless questions about this, that, and the other aspect, as rightful Doubting Thomas, or apprehensive skeptic, might have — especially if unsuccessfully having tried something thought to be ‘similar,’ before. You would want it to fit the knowledge into the context of YOUR situation. It would make this blog more like a book chapter, to deal with all of that. Instead, I’m going to refer you to a couple of videos that provide those answers. They will move you, and motivate you, and educate you — and more to the point, allow YOU to fit it to your situation, be it targeting, or something else.
The first will show you who you really are on the stage of life, and open your eyes in ways you had not previously considered about Christian faith, even if well grounded theologically. It is an 11 minute mind grabber simply called The Gospel, but it is not going to be what you expect. It will give you the foundation within which the second video will have meaningful context. Watch it!
The second is actually a sermon delivered by the same man who’s voice you heard in the first video. He is Pastor Eric Ludy of the Ellerslie Campus, which is devoted to training missionaries and teaching Bible-based living. While you can bet no one there has any inkling about mind control or much to do with dealing with addictions, this sermon can easily apply to any addiction/abuse issue a 12-step might address, as well as to the emotional and psychological woes imposed by targeting. The ONE STEP is revealed in depth.
The title is Overcoming Sin. Any addiction/abuse problem is sin. Targeting is sin. The TI is induced by targeting into sin. Therefore, the solution is to overcome sin, in all these cases, and likely, many more in our daily lives. This is the secret that I’ve never heard any other theologian reveal, and never found in any book, though a casual glance might leave one thinking it identical in nature. In nature, yes, but fullness, no. I promise you, that if you endure the full 1.5 hour presentation, you will walk away amazed and eager to apply what you have learned. You WILL thank God! BAM! Just like that. Watch it!
As you do, keep these thoughts in mind…
  • The sermon uses the topic of powers and principalities of ancient times to frame the lesson… and both addiction/abuse and targeting are born of powers and principalities, as is all sin…
  • An addict/abuser ‘worships’ their particular sin of consequence…
  • A TI ‘worships’ (by constant worried attention) their targeting issues of consequence (equating to sin)…
  • Bending the knee to Assyria in the sermon equates to giving in to sin…
  • So (the Pharaoh of Egypt) equates to you (your flesh, the Old Man) and your inadequate will power to resist sin…
  • Which in turn equates to buying into the enemy’s (sin) Press Releases (that they cannot be resisted) wholeheartedly, accepting the belief the enemy cannot be overcome, by or of ourselves…
  • If you listen carefully, you will hear echoes of 12-step program dialogs! They simply borrow the truth and apply it in their own way… and with respect to targeting, twist it to meet their own ends.
The above will help you to get more out of the sermon for the topical purposes of this post. If you get value from the sermon, you can find other of his sermons, here.
You may also benefit from select other posts related to targeting:

‘Seeing Through’ NWO ‘Illumination’


The Antichrist is coming, and there needs to be a throne ready for him to occupy. Thus the New World Order is stepping up its one-world government effort and increasing their visibility in the process… and translucence… which equates to luciferian Illuminati-like illumination… often in the form of giant glass pyramids.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

 

What you will learn from this post:

  • the Illuminati, Freemasons, Knights Templar, & Round Table Groups are the NWO;
  • with the same fascination with ancient mysticism, occult, and numerology;
  • and the same desire to associate their works with symbolism such as the pyramid;
  • that they have been building pyramids seeking to employ mystical aspects similar to Cheops, the grandest of Egyptian pyramids;
  • said pyramids sharing commonalities in occult alignments and numerological peculiarities;
  • where one complex of pyramids is tied to a rather interesting conspiracy Egyptian in nature;
  • and another complex of pyramids appears to involve hi-tech mind control;
  • and is itself apparently aligned with all pyramids in Europe, and likely, elsewhere!

x

The Source of Illumination is darkness…

In several of my books touching upon aspects of the New World Order, I carefully point out the important role played by Freemasons and their involvement with the dark occult and, primarily, ancient Egyptian mysticism and numerology (specifically, where numbers can translate into meanings with magical powers of manifestation). I am not talking about the rank and file lodge members duped into thinking it merely a benevolent fraternal organization, but of the satanic High Masons and select Masonic operational organs which operate secretly, within. The satanic Illuminati, for instance, sprang out of and followed Masonic constructs and principles… and it was they who officially launched the New World Order movement in 1776, their goal to destroy all governments and religions, to replace with their own, providing a seat for the Antichrist. We can also thank them, and head Mason and avowed satanist, Albert Pike, for the KKK, and more.

It seems quite apparent to those who study the nature of Globalists who seek the N.W.O., that they are usually High Masons, satanists or otherwise steeped in the occult. They are often members of or work through the so-called Round Table Groups, such as the Council on Foreign Relations, the Trilateral Commission, the Bilderbergers, the Club of Rome… groups made up of power moguls who control corporations and whole industries, government agencies and military power, and media and education. These, collectively, can be called Globalists, because they seek a one-world government, which is needed in order to seat the Antichrist.

In their works, they frequently employ the same symbolism and engage in occult events right along side of others of their ilk (i.e., Bohemian Grove). While what they believe (occult) should seem silly to a rational person, I remind the reader that it does not matter what you believe to be true, or false… it only matters what they believe. If you fail to acknowledge their beliefs as part and parcel of their modus operandi, you will fail to recognize them and their works, and be unprepared for their plans as they unfold. And much has unfolded, in plain sight.

cheopsHere, I will focus on one small aspect of their existence which is quite central to their beliefs; one of their most sacred of visual icons, the Egyptian Pyramids. Pyramids, especially the largest, Cheops, are as important to the Masonic underpinnings of the NWO as is the Cross to Christians. More so, in fact, as it is far more than mere symbol, to them; it is a powerful tool, and their fascination with ancient Egyptian mythology is quite anchored in Cheops. One need only look at the pyramid found on the obverse of the Dollar Bill and its all-seeing eye, to find a stark example. Of late, for a variety of disparate but coincidental reasons, I have made more recent observations which relate to this notion… things which you can easily verify yourself by use of Google Earth.

Square one, the base lines of Cheops

Cheops is the largest of the Egyptian pyramids, having many astrological alignments and dimensional (numerological) mysteries, among them being it was said to have been located at the the center of all land mass; it’s axis therefore dividing the known Earth at the time into quarters; Cheops baselines were aligned due North/South/East/West. As the N.W.O. players gain in power and ability to establish a one-world government (needed if there is to be a single leader in the person of the Antichrist), they also become more blatantly visible as such a force, which means it more frequently relies upon ancient symbolism in its workings.

So, then, I wondered… might there be more than a few NWO pyramids being ‘hidden in plain sight’?

There are, of course, many pyramids around the World, especially the ancient stone variety. These come in two flavors; the Egyptian, the biggies with their seemingly smooth triangular shapes (as seen at a bit of distance), and the Mayan/Aztec stepped structures, a style not unknown in Egypt, and elsewhere for the matter. The Masons have only an interest in the former, it seems, but my curiosity was about much newer structures, those built with modern methods and materials. Would the many newer pyramids around the World exhibit traits similar to Cheops, such as alignments or dimensions of occult significance?

Absolutely. And why not? A glass pyramid is the perfect embodiment of both the ancient pyramid mythos and of Satan; sunlight reflecting from within and without by day, and electric light glowing from within by night — all work to render them both translucent and illuminated, with bright glaring highlights akin to the all-seeing eye, depending on one’s viewpoint and the angle of lighting/reflection. As a work of man, they are both awe inspiring and mysterious, working on the subconscious in unfathomable primal ways not sensed by the conscious mind without pause and consideration. Even so, one is apt to embrace and bask in their presence despite any darker connotations, for they are undeniably beautiful works of architectural ‘art.’

So let us pause and consider with conscious effort…

Square 2: a review of new pyramids around the World

There have been more than 50 new/modern pyramids quietly built around the World in the last several decades, most of them made of glass and metal, and strangely, more than half of them in North America. A couple are faux pyramids with incomplete architecture in and of their own, but one included a second pyramid on site, and the other had a completed pyramid at top, and so, were included in the study. The idea was to see if their base lines or diagonals aligned with other pyramids (ancient or modern), or if any three or more centers or corners might align. Examinations for numerological meanings were also to be considered, early on, but the growing number of pyramids made that effort too monumental. Still, some interesting discoveries along that line were made.

I found so many alignments (almost 150) and associated numerical translations in place that I felt it was appropriate to establish some sort of test group to illustrate the difference between conspiratorial intention and random coincidence. For example, at one point well into the project, EVERY new pyramid except one revealed between two and nine alignments with one-another, and/or with Cheops, itself. One had 18 alignments. So a simple control group was added: some 30 Mayan/Aztec variety, plus nearly 6 inverted modern pyramid structures were added to the study. If these, too, yielded such results, the study could easily be argued as being inconclusive.

But they did not.

Only one formed a single alignment with any other pyramid, new or ancient, and it featured no resulting numerological significance. Clearly, the massive alignments in the new pyramids were intended by the powers that be, those persons behind purchase of the location and setting design criteria as to angular placement, size, and location on the property… especially true when multiple pyramids at the same location (as is the case in ancient Egypt) were undertaken. Therefore, the test groups were excluded in findings, which proved validity of both the methodology and hypothesis. Since only the new pyramids (not inverted) formed alignments, it had to be by intention.

While about a third of the new sites are single pyramid locations, there are several with two or three (like the main pyramids at Cheops), 3 with five pyramids, and one with 8, across nearly 50 locations. I then wondered if perhaps other old, but not ancient pyramids or locations deemed ‘holy’ by the Illumnati might not also offer alignments. Adding a handful of small pyramid burial sites by Masonic persons of wealth and power, as well as the death site of Adam Weishaupt, founder of the Illuminati, and the ‘headquarters’ from which he operated his secret cabal proved that notion, as well. I was unable to discern his precise birth place beyond the name of the city (Gotha, which is ironic in its own right, because Weishaupt and the Illuminati were very goth).

At the point where I felt the matter was amply proven, I had by then added eight older sites, typically 100-200 years old, though one dates to 12 BC, in Rome. It is the Pyramid of Cestius, circa 12 BC, at a time when Rome was, like the Templars, enthralled with the mysticism of Egypt. It is a site well known to Templars and Masons. The others are all in Europe, save one in America, and two of them relate directly to the Illuminati; Adam Weishaupt’s grave, the ‘headquarters’ where he planned and executed Illuminati plans, and perhaps the definitive Knights Templar location — Templehof (Templar Temple House), all in Germany. As these last three are not known to have involved pyramids on site, they are only used in scoring other pyramids which align with them, and not evaluated on their own, even though they would score fairly high.

So the alignments created in total involved alignments between ancient, historically old, and modern pyramids. The symbolism and mysticism of such structures by their special alignments, regardless of if rendered in aged stone or in modern metal and glass — are clearly as important to their builders as the function and beauty of their designs. All were starkly beautiful, and quite functional, to be sure; a perfect way to subtly reinforce the notion of luciferian and Masonic imagery upon the subconscious minds of citizens otherwise mesmerized at what they were seeing… especially when illuminated to great advantage by sunlight or voltage.

The problem of useful presentation

But describing all these alignments textually makes for boring reading. I will give just two instances as example, next, as they are quite tied together. It will be the only review of numerological ties, though more like it, exist, and with notable frequency. Trying to present the topic graphically is also challenging for other reasons, but I will attempt that, as well, in a third review. I will then provide a very simplified summary of selected findings to illustrate the scale and nature of alignments found, with a scoring system to relate symbolic spookiness.

But first, a disclaimer is required, because I always challenge any Doubting Thomas’s to duplicate my research before they make any false presumptions as to validity of my findings, and because the research tool involved (Google Earth) has its own technical limitations with which carelessness can impact upon accuracy.

Disclaimer: regarding some figures and claims herein about alignments and measures, accuracy is sometimes more difficult to affirm via Google Earth. Google Earth allows an accuracy to within a meter or so at ground-level, but things can get more complex when one starts trying to plot and measure lines with accuracy to the far side of the globe, and/or where the locations may be nearer to the Poles than Equator, or on/near altitude changes. Satellite images used in Google Earth are sometimes taken at oblique angles on either or both the horizontal and vertical, such that visual distortions of a pyramid can make true angular alignment (in compass degrees) or even measuring its base length, difficult to accurately determine. When dealing with such angular imagery, the center of the pyramid will be other than visually depicted, requiring one to make cross lines corner-to-corner to find the true center. The quality of image can also vary, but generally, line placement accuracy can be determined within 1-3 feet (roughly the line’s width). The images for two sites were so bad that it was impossible to determine if base line/diagonal alignments existed, but at least their location was known with GPS accuracy for the purpose of central alignments.

Additionally, one must take care insure the Pyramid(s) in question are centered in the view, and to reset the ’tilt’ (View > Reset > Tilt) after zooming in, or additional angular errors can be introduced, as the lines one lays for determinations themselves ‘float’ above the ground. In fact, where the pyramid is quite large, one may find the line ‘crawls up the face,’ providing additional distortion which must be defeated. The degree of inaccuracy in any given instance should not unnecessarily render the information herein as invalid; the thrust and intent behind the location and positioning of glass pyramids is clearly not casually undertaken. Also FYI, distances between pyramids herein are rounded figures, if there is no mystical number involved.

Verbal presentation example

841142-500x334Paris features two glass pyramids at the Louvre Museum, one large, one small and inverted, which form alignments to four other sites (the only inverted structure to do so, likely because it additionally features a normal pyramid, as well). There are three much smaller ones, as well, serving as skylights, which I chose to ignore, early on, and then forgot about, later; they would likely have established other alignments, as similar skylights on streets elsewhere, had done.

Two of the alignments at the Louvre are baselines from the larger pyramid to the same pyramid site in Texas, where they also align with the baseline of one, and the diagonal of another of three found there, essentially parallel. Three more alignments exist to three other sites involving three corner/center combinations, one of which is Cheops some 3232 km distant. Masonry’s highest publicly acknowledged ranks are the 32nd and 33rd degrees. The number 3232 is a ‘magic number’ in Satanic numerology, because it is a doublet, which doubles its ‘power’ (amplifies its importance), and because it sums to 55 (another doublet), one divisible by 11 (a doublet which makes 33 three times as powerful), and further sums to make 10. Again, it matters not what you believe about numerology, but what they believe…

And, this is what they believe about these numbers:

In the occult, 5 is the number of the planet. According to one-time head of early freemasonry, and avowed satanist, Alistair Crowley, 11 is “the number of Magick, itself,” and of sin, or evil corruption. 10, on the other hand, is the number of ‘heaven and earth in interaction’ (‘good vs. evil‘), and the symbol of it in the Greek (‘deca’) is the triangle, of which a pyramid employs 4, which means ‘strength and integrity,’ which is certainly a trait of the Pyramid. For the matter, the number 32 relates to ‘inspiring of truth and living by it,’ which is to say… the very promise and implied hope of illumination.  Unfortunately, illumination means something rather different to those with a darker agenda, something closer to that which the serpent spoke of in the Garden of Eden. These are not the only meanings found in general numerology, but the ones preferred by dark occultists.

Extending the base lines of each of the Louvre pyramids westward 3500 m will take you, again in parallel manner, to the center unit of one, and a corner of the other of two glass pyramids built in Westborough, MA, by globalist pharma firm, Astra Zeneca (astra in the occult relates to supernatural weapons). Another line can be drawn from the lower corner of the larger pyramid at Louvre, through the center of the smaller one, there, to pass through the diagonal of the center pyramid of three atop a very Masonic looking Federal Government office building in Ottawa, Canada.

The smaller pyramid in Paris is 2 m shy of being 1/10th the base line dimension of Cheops, while the larger one is two meters more than 1/6th of Cheops. The larger Astra is 1/6th greater than the larger of Paris, and the smaller 1/2 the size of the smaller in Paris. The Ottawa pyramids are 1/4th the size of the largest at the Louvre, and 1/25th of Cheops, and 2 m shy of being 1/2 the smaller Astra. I would love to analyze the actual dimensions of all these, if they were readily available.

In Chile, the resort complex at San Alfonso Del Mar features a giant glass pyramid on the beach with four alignments. It is aligned such that its base line will bisect with the center of one of the lesser stepped Egyptian pyramids. Two more alignments are to diagonals of a pyramid in London, and one in China, 20 km from Hong Kong. A third aligns with the corners of two pyramids in Islamic Astana, Kazakhstan which, though richly expressing Islam in the property’s design, is also rich with Egyptian symbology.

The Chilean Pyramid base is also one/sixth the size of Cheop’s (38.3333 m, a number which is found many times in the fuller study in either location, size, or compass readings of various pyramids). It is located on the 38th Southern Parallel and the 32.32 Meridian. 38 sums to 11 (Magick) but itself can mean ‘Lucifer, the will of the Devil.’ 1/6th = 18%, where 18 = 9+9 (99 doublet) and 3 x 6 (666 triplet — even more powerful than a doublet, and Satan’s name). 18 itself means ‘Oppression, bondage, slavery,’ and = 3 (a ‘perfect number’ meaning fullness) x 6 (the soul of man) = 666 (legend/man/illumination).

A graphical review

Enough textual description; it is too boring and difficult to make sense of. Let’s try graphical, looking at hotel resort complex at Galveston, Texas, which also consisted of three Pyramids. This is one of several with 8 or more alignments, and perhaps the most interesting in terms of just what they align with, and how.

It may help to review what qualifies as ‘aligning,’ so you know what you understand why the lines look the way they do. The alignment must involve at least three points of contact between two distant pyramids, based on corners and centers. A baseline is two points, a diagonal or perpendicular from a baseline through the center being three points, but the distant pyramid must still have at least one such point of alignment, as well. If only one, it must be its center, but aligning with two corners on two different pyramids, there, is another way to align.

There are examples in my study were a baseline, perpendicular, or diagonal aligns with yet another baseline, perpendicular, or diagonal (four to six critical points total); a much harder thing to achieve. In like manner, some can be extended to align with yet other points of other pyramids at a third location; an even more dramatic alignment. I have found as many as five pyramids in three locations involved in a single alignment across the globe… with 14 points of alignment in all. These harder kinds of alignments should be next to impossible by random occurrence. Yet every single pyramid exhibits them.

And we have two such virtual impossibilities illustrated in our visual review at Moody Gardens, in Galveston, TX. Two of them actually involve Cheops, as earlier reference in the textual description, the ultimate of all possible alignments from the Masonic viewpoint. In fact, I find it the second-most interesting of all modern sites, in terms of alignments (the first, at Sauerland, Germany, is impossible to show in this manner as it enjoys 23 alignments. UPDATE: 43 in a row, and I finally stopped bothering!

pyramids.jpg

Galveston Moody Gardens Hotel complex; three pyramids, one pink, one blue, one glass (gray), forming 8 alignments to six pyramids, including two with Cheops!

Clockwise from Noon in the image, we see an align to the Nekoma Air Force Station, an experimental anti-missile defense system long abandoned. What is interesting is that one of it’s seven alignments goes to the only pyramid in South Korea — quite dependent upon U.S. anti-missile technology. That’s interesting, because there is another pyramid in N. Korea, and one of its several aligns goes to the Las Vegas Casino pyramid, which in turn aligns back to the Nekoma site. It is as if both N. and S. Korea are ‘borrowing’ from American military power, after a fashion, to create or reflect a ‘stalemate.’

Next we have two aligns effectively ‘parallel’ to the ‘holiest’ of Masonic pyramids in Egypt, involving a total of nine critical points with three pyramids. There is then an align to the Rock and Roll Hall of fame in Cleveland, OH, where it passes through the center of both pyramids, there (one small, complete pyramid, and one very large incomplete, or faux pyramid. There, the base of the larger less the base of the smaller, is equal to 1/3rd the base of Cheops.

We find an align to a now defunct pyramid on Miamii’s beach. Fairly ordinary as alignments go, it was built as a promotional venue for the international beer company, Heineken. Despite being temporary, it was placed to form at least three alignments on its own. Then, in like manner to the two aligns to Cheops, we have two more going to the two pictured Biosphere pyramids, which, like the two Rock and Roll pyramids bisected with the same line from Moody Gardens, have both of their pyramids bisected with an align from Nekoma (coming full circle, if you will, to form a triangle). In fact, Nekoma is itself involved in a total of 6 such three-way triangles. One of those involves the Miramar retail store, our final align from Moody Gardens, for two such triangles sharing Moody and Nekoma locations. Miramar is the other incomplete faux pyramid, in that only two opposing sides are triangular walls. Miramar, in turn, with two pyramids, forms 6 aligns, including one to the very Masonic Capital grounds of Australia, at Canberra.

So far, we’ve only closely looked at two out of about 50 locations. You can see how hard it is to use either text and/or graphics to reveal it usefully. So let’s now try a different way, and employ a chart with a scoring system designed to rate the comparative ‘spookiness’ factor of a given ancient or historically old site’s alignments with new pyramids or other holy illuminati locations, including each other. To further reduce the clutter, it will then only look at sites which directly connect to them, in even briefer review, sans scoring. The scoring system replaces trying to compute and display the actual odds of the alignment, which would be as high as 10 figures:1, in many cases.

For example, the odds of just a single alignment of the simplest kind, center to baseline, diagonal, or perpendicular or to two corners of two pyramids at destination (earning the lowest possible score of 1 in my scoring scheme) would have actual odds of 202,500:1 against. That is based on the notion of worst case accuracy of 1/10th of a degree of arc… meaning that each pyramid would have 10 x 360 degrees of potentially useful compass positioning, divided by 8, as there are 4 lines the pyramid which establish a total of 8 possible compass vectors. You need to multiply each pyramid by each of the others involved if aligning to another baseline, diagonal, or perpendicular. A baseline to baseline alignment odds would be 164,025,000,000:1 by such reasoning. Such odds are multiplied further by additional alignments at the site. Argh!

Technically, that’s too simple, because angular placement is not the only factor. Size and relative positioning plays a role, too, when two corners/centers of two different pyramids at the same site are involved, but I’m not going there without a super computer!

Now, if you want to argue that the actual accuracy we should using is tighter than that, implying room for error in ‘finding aligns,’ consider for a moment that only one alignment with the Mayan/Aztec pyramids was possible using the same accuracy as I employed. That makes a pretty good case that the alignments were intended regardless of whatever actual accuracy was employed. Even if you allowed for my own human error, there are so many alignments that they could not all have been for my error, given the Mayan/Aztec set enjoyed no similar quantity of errors. But by all means, feel free to correct my math/assumptions if you are of bookmaker caliber in computing odds, but I’m pretty sure I’ve got it right, based on some experience in statistical data analysis; I once ran my own marketing research firm which ran probability studies. No matter: we will use scoring, instead…

Scoring is as follows:

  • center point to corners of two pyramids or a base/diagonal/perpendicular of 1 pyramid (simple alignment) = 1 point for the alignment;
  • base/diagonal/perpendicular to same (complex alignment) = 5 points for the alignment;
  • Bonus 5 points for any parallel alignments or alignments to multiple pyramids of one site to multiple pyramids of another site (parallel/pair alignment);
  • any extended link to an additional pyramid (extended alignment) = alignment score x 5;
  • link to Cheops (Cheops alignment) = x 5;
  • link to other Egyptian pyramids or Illuminati sites (Illuminati alignment) = x 3;
  • link to other historically old sites (Masonic alignment) = x 2;
  • 1 point for each alignment and for each pyramid at site;
  • magic numbers, angles, dimensions, etc., not part of scoring;
  • Cheops gets a bonus of 33 points, Illuminati sites 11 points, Masonic 7 points
  • maximum score limited to 99

Great Pyramid of Giza, Egypt

Egyptian Pyramids 13 aligns w 6 pyramids on site (Δ) = 99 points: 29°58’44.54″ 31°8’3.65″
Complex Parallel to Sauerland (5+5 points), 3 Simple Parallel to Dubai (6×3), 3 to Sauerland (6×3), 2 Simple Parallels to Galveston (6×2), Complex to Niagara Falls (5), Simple to Louvre (1), to Eatonton GA (1), to San Alfonso del Mar Chile (1) 85 total +33 > 99.

x
a580cb07b1ac956d82946b7d61620f36Cestius pyramid in Rome 5 aligns w 1 Δ = 99 points: 41°52’34.97″ 12°28’51.16″
Complex Extended (three times — 4 Δ at 3 sites, in all!) to Manitoba Capitol and on to Miramar Retail (5x5x5x5), Simple Masonic to Karlsruhe Mausoleum (1×2), Simple to Pheonix Jeju S. Korea (1×2 – Phoenix is Masonic/Egyptian), to Sauerland (1), to Portsmouth UK (1) > 99 points

x
de1cc2b8de1458f8253ea7ad9335618eStar pyramid mausoleum Scotland 3 aligns w 1 Δ = 34 points:  56° 7’19.42″  3°56’43.72″
Simple Illuminati Extended to Weishaupt’s grave, to Gold House IL in opposite direction (1x5x5), Simple to Cooperative Bank UK (1) 27 points + 7 Masonic site = 34

x
karlsrhueKarlsruhe pyramid mausoleum 7 aligns w 1 Δ = 27 points: 49° 0’33.22″ 8°24’14.05″
Simple Illuminati to Illuminati HQ (1×5), Simple Masonic to Cestius (1×2), to Kazakh RU (1×2 — rich with masonic/egyptian architecture), Simple to Dubai (1), to Edmonton Capitol (1), to Cal State U. (1) 20 points + 7 Masonic site = 27

x
th-11Bickling mausoleum UK 2 alignments w 1 Δ = 13 points:  52°49’9.01″  1°12’48.36″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13

x
Graceland-Landscape-Schoenhofen-MonumentSchoenhofen Mausoleum Graceland Chicago 2 alignments w 1 Δ = 13 points: 41°57’33.56″ 87°39’34.09″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13

 

What follows is a simpler summary of the first few of the destination sites mentioned sites as evaluated from their position…

Sauerland 23 aligns, 8 Δ, Dubai 13 aligns, 5 Δ; Moody at Galveston, 8 aligns, 3 Δ; Niagra Falls 2 aligns, 1 Δ; Louvre 7 aligns, 2 Δ; Etonton GA 2 aligns, 1 Δ; San Alfonzo del Mar 4 aligns, 1 Δ; Manitoba Capitol 9 aligns, 9 Δ treated as a single Δ as they all directly touched one another 3×3, and were each relatively small; Miramar Retail 7 aligns, 2 Δ; Pheonix Jeju S. Korea 6 aligns, 1 Δ (note: N. Korea has a Δ, too).

These are all quite typical of all sites evaluated, globally. The only site which scored 1 (1 align) was a site which has had its 2 pyramids removed/destroyed, disallowing angular alignment determinations, though the center of one of the pyramids was known, allowing an align by that method.

CONSPIRACY ALERT: That site, by the way, is tied to a little known conspiracy surrounding the Nuwabian Nation, an all-egyptian-like community of almost exclusively black people which was seized and razed to the ground by the U.S. and Georgia State and County governments. They were allegedly targeted for being a cult, subversive group, criminal organization, nest of child abusers, or a swindle… depending on who you ask. Seems like everyone had a pet excuse, including YouTube who seems to regularly censor vids on topic for their usual list of fabrications. Note the resemblance in some of the ceremonial dress to masonic lodges such as the Shriners (Nuwabians, like the lodge system, also use the terms, Orders, and Lodges). All Egyptian is wrong, too; they also were adoptively and by blood associated with Native Americans of the Yamassee Federation of Tribes, among them the Seminole.

nuwabian

I count at least 8 pyramids on site before destruction. The black pyramid , as primary ceremonial structure, was the only one I was able to locate, but not know its alignment with any certainty. These people were very serious and deeply involved in their culture building and adherence, despite the amusement park-like construct of their community.

Note on mausoleums: What we see in our review is that the three mausoleums share unique ‘coincidences’ in that each aligns with an Illuminati historic site honoring Weishaupt, and each in turn is honored for having done so by Sauerland aligning with them. There are many such pyramid mausoleums in Europe, America, and a few scattered elsewhere, far too many, in fact, to encourage me to dig further. Regardless, as the very first and only three reviewed all shared these two features, I’ve no doubt that others do, as well. A single Mason could easily undertake a single such alignment to a point of their own choosing, and more modern pyramid builders could easily accommodate at least one or more such mausoleums in their own alignment considerations. This brings us too…

Sauerland, enigma equal to Cheops

sauerland

Sauerland is one of the newest of all sites, a complex of 8 pyramids which appears it may even involve mind control research. It certainly defies normal property development, architectural design, and building contractor norms in several ways. First, its location is on a hill overlooking an industrial park, and despite looking like a luxury retreat, is in fact the corporate campus of biomed tech company, Rayonex Schwingungstechnik (Rayonex Vibration Technology). It started with three pyramids, and has since grown to eight.

Second, the site has an adjacent and extremely unique high observation tower (about 110′ high) which overlooks the pyramids and the valley, just high enough that morning sun could shine through the large holes in the upper level and onto the pyramids, creating unique shadows. This was a trick employed in ancient Egypt using Washington Monument style oblelisks, such that at a certain time, a shadow might point to a secret place within the greater site (as seen in Indiana Jones and the Lost Ark. The tower’s corner shadow does fall over the pyramid property. But, let’s just call that a pipe dream.

You do have a pipe of some sort, don’t you… and a whip and hat?

Third, each building is offset irregularly and apart from each the other with no obvious pattern or reason, and likewise, quite contrary to normal designs, angled one from the other up to 3 degrees or so in compass alignment. It is my belief that this is what enables it to accommodate so many alignments, a thing which would require planing with a fairly complex computer program, to determine. Finally, again unlike most complexes, even where ‘luxury’ is intended, no two buildings are built or designed the same; each has an entirely different layout and appearance, though some features at least look similar. Usually, a cookie cutter approach to keep costs down would be employed. Yes, even in corporate campus design.

Then there is the very small pyramid surrounded by a water feature. I found construction photos that show a drill being used on a hole there, approximately 1 meter wide, with smooth walls. It was associated with an article on geothermal drilling which led to a very interesting YouTube promotional video that is really worth the watch; it will intrigue and educate you. After watching, though, ask yourself if the expense this likely represents would normally be deemed appropriate for a small fish pond? The video seems to address that with a blanket statement, but does it, really?

I learned also, that the small pyramid over that hole is the only one on the property using metal walls. The other, larger pyramids use some kind of unusual looking material which requires special application, according to other construction images I found. The panels used on them might logically be radiographic in nature, designed to limit or enhance radio waves of select frequencies, given the nature of the company’s work, as you shall see. In like manner, I can imagine the holes drilled by that machine could be used to install an array of underground EMF sensors or emitters. The video implies the array of radially and laterally drilled holes provides a series of ‘pipes’ which may in fact be perpendicular to one or more of the pyramids. Just why these possibilities are raised, is covered below.

Also unusual, is that one of the original three pyramids (perhaps more, now) is strictly for therapy use, with ten therapy stations. In each pyramid, a security computer controls all lights, window blinds, and door locks, and though there is no manual switch anywhere within for any of these, each workstation is said to have its own localized control over these features. But the security system computer can override, which makes it a rather creepy place with respect to potential for political control and overbearing security solutions against occupants, Big Brother style… especially if you don’t have authorized access to a workstation. Undoubtedly, there are plenty of security cameras, and I find it disconcerting that some pyramids have no windows, whatsoever — normally a code violation, unless a warehouse or factory. One must ask why so much expense and devotion to therapy and externalized security control over environment would be required? Let’s take a peek, and see.

The answer raises more questions. This is a unique kind of high tech firm. Their product/services would seem to involve mind enhancement, mind bending, or even mind control, but certainly relate to biophysics and therapy of some kind. One or more of those possibilities is very likely; the firm does research in electronic frequencies upon the human body (bioresonance), among other things. According to Wikipedia, bioresonance is all based on pseudoscience, which is a polite term for ‘made up BS by con artists’. Dunno about that, because…

This is also the sort of stuff useful in DEW Weapons for behavioral control (Political Control Technology). Of course, such tech is always researched and funded based on some good it might accomplish, including the combating of electrohypersensitivity, which many TIs suffer from because of their constant DEW targeting, or some preexisting natural sensitivity. I have it, myself. But once a patent is filed and governments or dark-minded NGOs get wind…

museumNow, about that tower… What if it was for security guards overseeing grounds security should an alarm goes off of some sort. The tower does have its own large building which might be suitable to house a security force. Hold that thought in mind while reading the next paragraphs. Turns out it is not just an observation tower, and not just any building. And, while guards might be rather far fetched a notion, there is more to consider.

The pyramid shape is also known as a Frustum by Masons; a shape used by the military in times of old in a manner not unlike a Tank Trap. Like a tank trap, as a shape, it cannot be easily overcome when several are placed together, there being no level foothold between them (a steep V shape), and its sharp corners, especially at the top, inhibiting climbing. More importantly, because its sides are sloped, one cannot hide behind a frustum, if the enemy holds high ground… such as a castle wall… or a high observation tower. Just exploring possibilities, here… but far-fetched or no, it fits the spookiness factor of the place.

But as stated, that’s not all. The platform is merely the top level of what is actually a mine shaft elevator lift. The building is currently a mining museum with access to a huge abandoned mine; they actually take you down into it with hard hat and light, etc. So, like Cheops, there are underground passages beneath the Sauerland pyramids. It is, of course, possible that some of those passages might be remodeled into something else entirely different, like many old mines are, today. It is even possible there are ways to access them from within one or more of the pyramids. Now wouldn’t that be a mystery to discover and explore, whip at the ready? However, all this causes me to hope no one would go drilling a bunch of radial holes over an abandoned mine… if they didn’t know exactly where the mine’s cavities were…

Now, last mystery. Look carefully at the top of the platform at the left corner nearest. No. That’s not a machine gun, though it can potentially be used to ‘shoot.’ It’s appears to be Yagi antenna, normally used to transmit or receive microwave signals in an amplified manner, along a narrowly aimed path. But wait! Where does it aim? At the top of that tower, as high as it is, the thing is aimed squarely at a hillside nearly four times as high as the platform. Useless, as seen. But wait! Just beneath the top rail is a what looks like a motor; the shaft can rotate. At the top is what appears to be a motor at an appropriate angle to change vertical angle. The white object appears to be a housing of a control system operated remotely. I used to sell such systems for video security setups based on microwave relay. Pretty sure of what I’m seeing. And, there is a second pole identical to the first which could be similarly fitted, and which may have been since the photo was taken.

Why would you want that? Well, you might want to tune in distant TV stations, except they don’t broadcast in microwave. You could use it to grab someone’s cell phone signal, if you knew exactly where their phone was, to aim it. There are yagi antennas that can be used for those things, but they would look different. But what if you owned a bioresonance laboratory with some human guinea pigs? What if you could place them in rooms within a pyramid, where the slope of the pyramid was roughly perpendicular to a high mounted, aimable microwave transmitter, such that every subject got exactly the same dose of signal at the same time, or such that you could specifically target a given subject with a unique signal? It would probably look a lot like Sauerland. You think?

I only mention this, because older pictures, before the pyramids were built on site, don’t show such a ‘gun.’

Is it a conspiracy?

If one concludes that it is impossible that by mere chance alone, every modern and non Mayan/Astec-style pyramid should align with other pyramids, including Egyptian… then it has to be by intelligent design by agreed-to planning by a group of many persons with like agenda. That it is done covertly and involves mystical occult reliance… removes it from the realm of benevolent methodology or intent. That these pyramids can be found in countries of opposing political, religious, and ideological beliefs… precisely fits the Illuminati model and game plan established by its founder, and reflected in Morals and Dogma, the ‘Masonic Bible’ written by Albert Pike. That the only persons financially and powerfully placed are able to arrange for such things tend to also be members of Round Table Groups and are often also Freemasons… would seem to cement all these considerations into a single image: that of a conspiracy. That there is the possibility that it even involves mind control is, to say the least, the ultimate and most heinous form of conspiracy.

Every man is entitled therefore, to give any explanation of the symbols and a system of the doctrine that he can render palatable…  Of all the means I know to lead men, the most effectual is a concealed mystery.” Adam Weishaupt

 

 

 

A Private Statistical Review of Targeting Data


TI’s have many commonalities in the nature of their experience… but what if it was the TI’s nature prior to targeting which led to them being selected for targeting? This anonymous poll seeks to identify any patterns which might prove revealing.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 

The common state and nature of TIs prior to targeting?

This post seeks to help identify how TIs are selected for targeting, and why. I write as one who has had personal contact with over 12,000 TIs over roughly 25 years, which has come to some understanding of the answer. But I also write in hopes it can help better my own general understanding, and more importantly, to help individual TIs better understand the true nature of their own targeting. Such information may even prove useful in TI defense, both tactically, and legally. For example, almost all authorities who should be available as helpers to a given TI end up instead presuming them schizophrenic and attempting to persecute them with forced treatment or other forms of harassment — to say nothing of possible in place assets being used in direct targeting.

Such knee-jerk presumptions may prove easier to defeat if we can show the presumed ‘schizophrenia’ is far greater statistically than should be medically possible, it being true that the illness strikes people randomly across the entire spectrum of human existence. If a given class of people with a common personal social circumstance (state and nature) are deemed dramatically more susceptible to the traits of schizophrenia, a logical person should be moved to begin to understand… there are technologies and methods which can cause simulation of those symptoms; mental illness is not the cause, after all.

We must start this dialog  by addressing two points: things already known to be common to all TIs prior to targeting, and the tactical reason or purpose behind the targeting, things which collectively tend to relate concretely to categories of TI abuse. As to the precise methods of targeting and types of technology employed, those vary according to the individual TI, their psychological profile, and many, many circumstantial factors which dictate the most likely path to targeting success. That does not impact this dialog, but all these things are tied together into a cruelly efficient tangled web of mental torture and, all too often, physical pain.

We must attempt to separate ourselves from any personal angst and calmly review the matter objectively, if to gain useful insight. First, I’ll talk about two basic traits which are common to all TIs irrespective of their individual situation or targeting purpose:

Known commonalities and reasons

whyme

Image: fair use manipulation of photos by Rosie Hardy (Flickr)

Prior to targeting, all rank and file TI’s, are either already financially insecure or in a situation where dirty tricks can render them so fairly quickly; it is important that the target be unable to launch a useful and costly technological defense or employ professionals who can do so for them. There can be exceptions in ‘blood line’ families or offspring which employ MK/Monarch type programming to create a dynasty of (actors, political leaders, financial giants, etc.).

The wealthy ones are unable to effectively defend because of their programming, which results in various forms of self-sabotage of the effort, which may in fact include financial destruction. Their programming and resulting sabotage effects the same handicap as not being wealthy. It is this author’s belief that Dennis Quaid, the end of the Hunts, DuPonts, and Hurst family/fortunes evidence this fact. I go into some detail on this (and all aspects of targeting, including defense) in my how-to book, MC Realities.

On the other hand, programmables who are were not wealthy, but simply part of the effort to create Jason Bourneish operatives for the intelligence community or in furtherance of MC research, can also end up being targeted if deemed ‘failures’… which are victims who could not be usefully programmed and deployed. They cost too much in time, effort, and money to simply dispose of them, and because research might find a way to ‘fix them’ at a future point, it is necessary to target them to make them seem insane. That way, should the nature of their being ‘broken’ lead to revealing their true history (programming), they will be ignored as being nuts. They can be corralled at any time for further MK efforts, if needed.

Another commonality to the bulk of TIs is some form of social isolation. That may mean they have a small circle of friends and family, or perhaps there is some existing strife underlying key relationships (i.e., significant others, relatives), especially if living with or in close proximity to them. Targeting almost always includes some destruction or sabotage of personal relationships for the same reasons as financial harms. It wouldn’t do for everyone who they know to both believe and to aid the TI against the perps.

No. One by one, all such allies tend to be alienated by one means or another. The inverse is true of the MK/Monarch. There, not one of their friends or family are not part of the perp circle; everyone in their life has been carefully placed there to guide them (misguide) to a desired state. Even their employment and choices of schooling, living space, etc., is predetermined such that they at least think it was their own decision, but their entire life is little more than traversing a spider’s web and being wrapped in its unescapable cocoon.

 

The purpose of targeting

Now to purpose. It is fairly straightforward. I usually only cite three basic types, but here, I’ll attempt to outline a broader spectrum and to show the subtle differences in targeting aspects and the nature of the TI prior to targeting, things over and above the aforementioned commonalities to all. I should mention that the general purpose of targeting remains constant regardless of type; to render the victim a social, political, and financial zero. The reasons for those needs and resulting emphasis can vary according to the type, however, as is seen:

  1. Guinea Pigs — selected for experimenting with new targeting technology/methods. An ideal candidate would be rather socially disadvantaged, an isolated loner, and it would be advantageous for them to have already had some documented mental health issues resulting in some form of professional care, with or without prescriptions. This more readily allows them to be presumed insane should something go wrong in the experimentation; they will be disbelieved when describing the matter, regardless of any carelessly revealed evidence;
  2. Training fodder — selected to insure the growing army of MC practitioners can be effective with minimal supervision. While it should be said that many perps are themselves MK/Monarch programmables, that is certainly not the only profile. Psychopath and sociopathic personalities are a favorite recruit, and it is important to insure such mental defectives do not run amok, and can exercise restraint. Because mistakes or over-zealous application is a significant risk in the training process, the same victim traits as Guinea Pigs are found common.
  3. Social engineering — efforts against select targets who are either deemed politically incorrect activists, whistleblowers, ‘troublemakers,’ or who are Christians. MC is deeply rooted in satanic principles and can be traced back to the Garden of Eden (in my book). One goal (thankfully seldom realized) against Christians is to get them to destroy their own faith. Rare is it that we find members of any other faith, lest it be Jewish or Muslim, all three being worshipers of the same God of Abraham. Even less common, do we find atheists, unless they be targeted for reasons other than social engineering. As for the troublemakers, the goal is again simply to make them seem insane, and quickly rendered a political zero.
  4. Social engineering — undertaken against society itself, by selecting failed programmables or mentally troubled persons who can be manipulated into acting out in some useful form, such as committing mass shooting gun violence, or other crimes designed to shake confidence in the very nature of our society’s political underpinnings, such as the 2nd Amendment in the cited example. There, are no other requirements for the victim. It is why, there are so many commonalities in these tragic news stories, such as having been in psychiatric care with psychotropics prescribed, but suddenly halted… almost a guaranteed trigger to violence, when combined with MC control.
  5. Joy riding — elected against targets selected only because the perp has decided he didn’t like the victim for some reason, or because of convenience (i.e., next door neighbor). This is undertaken by the errant and out of control perp on their own time, using what they have learned and equipment they have built on their own or stolen. More could be said about them, but does not serve this dialog. As to the victims, they can be anyone, though the joy riding perp will be careful not to violate any of the principles of selection herein described unless truly doing it for spite. If the perp is caught by superiors, the value of continuing the victim in targeting is likely analyzed as well as the value of the perp to the program. This will determine the future of both. The perp may suffer any form of punishment, retraining, or redeployment, and the victim may be released from targeting, or put into the hands of other teams, usually resulting in a marked change in targeting tactics.
  6. National Security — is here mentioned as a type, but except for extremely important whistleblower situations or programmables who fully escape control, it is unheard of among TIs. The traditional target in this category would be a true threat to national security as deemed by the intelligence community or those able to give them orders. We see an example of that in the news, today, where 16 U.S. Embassy members in Cuba have been hit with various DEW and psychological methodology by the Cuban government, likely using very old Soviet tech, or perhaps, their own internally developed systems. WE CAN NOW CITE THIS NEWS AS PROOF THAT MC TARGETING IS REAL; how can media and authorities cite it has happened to our diplomates, but deny it is happening to our citizens ‘because there is no such thing?’

Finding unknown commonalities, and verifying old

Our method here, is simple. A private and anonymous poll. It cannot track your identity, and uses SSL interaction common to things like bank transactions. I must ask that only TIs participate. Politically uninformed sycophants should please refrain from acting like a child; you might learn something by looking at the truth once in a while. We must also bear in mind we are talking about legitimate TI’s, only. Those who are simply mentally ill, the perp pretenders, and the social misfit pretenders seeking sympathy, may or may not, share some of these traits, and are excluded from the dialog, though we must presume many of them may non-the-less participate in the survey and skew the data to some degree.

With that in mind, I offer a series of questions. Consider them and the choices provided carefully before answering, please, and come back later to see results and, in time, an analytical update to this post to attempt making good sense of results. This will follow each poll in the set. I remind you, all answers are based on what things were like in the year prior to targeting first being noticed. There are sixteen different poll issues, so it will take a bit more than a half hour to complete, but should prove very interesting and worth the effort. If pressed for time, come back later.

 

How a TI’s Belief Structure Can Fail Them Dangerously


When TIs find their defensive or offensive tactics failing, it is likely because one or more key aspects believed true of their targeting is a falsehood deliberately created for them: the enemy knows you cannot win a war defending against tactics not in play, if it blinds you to those which are.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this post:

  • part of targeting includes misleading the TI into false beliefs about their targeting;
  • what constitutes authoritative proofs capable of revealing the truth vs. beliefs;
  • examples of common falsehoods held as true, including scams

The problem

In some 25 years, now, I’ve had contact with more than 12,000 targeted individuals according to my email list. Out of that number, I can count on one hand the number of them who had a correct understanding as to who their enemy was and what tactics were being used against them, and how to combat them successfully. So convinced are most TIs about such misbeliefs, that they often refuse to take advice that would work to better their stance, and instead continue to try things already proven ineffective. Worse, they might simply give up trying, at all.

a6c9413ecef98eb8a5f0859f13e352aa--advertising-flyers-mission-impossible.jpgTargeting is a psychological war, and one largely invented by and often waged by the intelligence community, who live and breath in a World where nothing is what it seems. If there is one thing they know how to do well, it is how to convince their victims that something untrue is true, and something true, is false. Their chief weapon is disinformation, and its ally among the foolish, misinformation. Disinformation offered and accepted as true, is spread rumor like as misinformation by those accepting it. This was, by the way, the heart and method portrayed in the popular TV series, Mission Impossible; a spy agency who typically got what they wanted by getting the enemy to believe in an unreal set of ‘facts.’

Their other primary weapon against TIs is the psychological profile, which tells the enemy exactly how their target will respond to a given circumstance, enabling them to create situations designed to cause a certain conclusive response which builds the false narrative. When things like street theater, surveillance technology, and other targeting methods are combined with the goal to mislead in kind, the victim has almost no chance to come away with anything resembling reality. The other victory this hands the perps, is that it makes it much easier to insure that the victim will be seen as mentally imbalanced by anyone observing or brought into the affair when seeking help. Knowing the enemy’s psyche was also part of Mission Impossible, the show always starting with a summarized dossier on the mission’s target and their weaknesses.

Among the most common falsehoods most TIs presume to be true, but which cannot be true, we find a laundry list of topics sold on the basis of technobable, false credentials of ‘authoritative sources,’ circular references, and a deluge of mantra-like disinfo/misinfo. Some effort will be made, here, to summarize, but first, we need understand what a true authoritative source is, and is not. Should any doubt my summarizations are valid, they must first find an authoritative source to prove me wrong, or they simply continue in the lie with no basis.

 

Authoritative information sources

One cannot well prove a case for targeting technology beliefs based on material provided by a targeted individual or mind control Web site, and certainly, not based on a YouTube or someone’s blog or post. At best, such is hearsay, opinion, or personal belief or suspicion. At worst, it is a complete fabrication, or based upon one. Don’t forget that some TIs are pretenders, some even perps, such that no personal claims can ever be deemed as proofs in and of themselves. The sad truth is, I’ve yet to see more than a handful of ‘proofs’ offered by TIs as to their particulars which would serve them in a court of law. Mind control sites seldom provide actual reference proofs, commonly citing other mind control sites or proofs shown herein as illegitimate. Circular references abound.

No. A credible proof must come from some outside resource which has no reason to be biased and itself be unaffected by targeting or disinformation/misinformation, and which can be backed up with citations as to the source of their information. I’m talking about things like patents, scientific papers, government records, news accounts, and good books by solid researchers of accredited note with usefully referenced footnotes, that their statements can be verified as factual. ONLY those things can be seen as authoritative and, therefore, holding a viable resemblance of truth and reality.

A warning about patents, however: patents can be filed based on imaginary or unworkable technology without proof of concept testing, and get by the patent office. I have some background in patent writing and patent requirements, and have seen such patents on file. Unless a patent relating to Political Control Technology applications is tendered by a major corporation, it would be wise to consider it carefully before making assumptions. The unworkable patents I’ve seen were by individual citizens, only.

Even so, one must be careful. Anyone can write a book or put up a Web site, make a video. In fact, a good deal of disinfo/misinfo comes from books. The best example would be books claiming to expose secrets of mind control by ex intelligence officers. No! No! No! No intelligence officer could safely write such a book without violating a Secrecy Oath or law such as the Official Secrets Act (U.K.) in a way that would get them and their books vanished. So I would never quote or trust a Barry Trower or Robert Duncan.

I do trust and have quoted from works of ex CIA agents, but only because their work was approved by Central Intelligence Agency as NOT violating any oath… because nothing they had written of had not already been reported in media or in the Congressional Record, or other public domain literature. The books were not exposing anything new, but merely confirming it in useful manner. In other words, they were not the true originating source, the opposite of a Trower or Duncan. I also know of one CIA agent who wrote and published an unapproved book, and he was hunted down to the point of exiling himself in Cuba. So how is it that Trower and Duncan are exempt?

So when you read a book, including mine, be skeptical and judgemental: demand good citations as to source. My books are heavily footnoted to aid in that judgement call, and typically include an appendix full of additional proofs. In fact, the third book in my proparanoid series, The Defensive Field Guide, is in part a collection of such proofs and citations in a form useful in dialogs with non believers. In such a use, everything within it is verifiable by the doubter.

And, when you base conclusions on a technical source, such as a patent or scientific paper, you must make sure you understand what you are reading, or do additional research until you do. Certainly do not rely on the conclusions of other persons with no credentials in the field, for they likely do not know any more about it, than you. This is a great source of misinformation, because technical papers to the non technical lay person can be read into any number of wrong conclusions. It’s like asking an atheist to interpret scripture, in a way; the translation will be quite flawed.

And here is a simple test: Google a given topic, such as Remote Neural Monitoring. If the returns features ONLY mind control related sites and the like, you are likely looking at disinfo/misinfo. For one thing, Google has a built in bias against ‘fake news’ which they define as anything contravening the ‘official line.’ The official line is that there is no such thing as mind control, so when all you get is mind control, its fake news they want you to have. No. If it was a real thing, you would have up front the ‘scholarly articles,’ news stories, and the mainstream view on topic… and THEN you might see some mind control sites and the like, as if some kind of discredited ranting from the fringe.

Another simple test: when you see a claim for a technology, IS THERE A LINK to THEIR SOURCE so you can verify the claim? Again using RNM, there are consistent claims it is an NSA technology, but NO ONE is providing links as to how they know this to be the case. With enough research, you find the claim originated from some guy no one ever heard of who claims to be a technologist, and HE (William Starrett) gives no link as to how he happens to know. He does provide a video of Snowden talking about SOMETHING UNRELATED and tries to fit it to his narrative; disinformation. There is another source, Russel Tice, who is another claiming to be an ex intelligencia (NSA) whistleblower akin to Edward Snowden. He, too, cites unrelated technology and relies on Robert Duncan, rather than first-hand knowledge. No thank you; disinformation.

And one final test: does someone offer some magical new age technobable gadget, glass bauble or jewelry, salve, oil, or audio they claim will cure/combat the alleged technology? This crap commonly pops up just as fast as the alleged tech, a remarkable feat given that we are typically five to ten years behind the technological curve, which means we don’t understand the technology even exists, much less how it works, and far less about how to defeat it. Do you really believe a $300 pendant with a picture of you as a child engraved on it will stop imaginary scalar waves?

xWhat distresses me about disinfo/misinfo is how easily it becomes everyday ‘fact’ amid the various TI groups and Web resources. Take, for instance, this image which is being used by several organizations and web sites, including PACTS (People Against Covert Torture and Surveillance) offered as proofs of microwave attacks, and microwave murder. Make no mistake, microwave can kill, and cause horrific burns if misused. But the image is not of a microwave victim, at all. It is a bomb blast victim from the Middle East. If you can’t trust the validity of one image or claim at a Web site, can you trust the validity of any found there?

Did you know you can search for images by dropping an image into the Google search bar? Try it sometime. Its a good way to reveal fake news and disinfo/misinfo.

 

Falsehoods thought true

The following is a summary of commonly accepted false beliefs. Not one of them has any factual basis not originating from the enemy. The right hand dangles a Scorpion about your face after the left hand conceals the poisoned spike used to make you think you’ve been bitten; anti-venom won’t cure the actual poison used.

SEEING THROUGH YOUR EYES

No. Shared Vision is easy to simulate through excellent surveillance, computer hacks, and so forth. The belief is based on scientific papers and news reports, but they reveal the ability requires hundreds of implanted probes in direct contact with the brain by drilling holes or removing the skull cap, all directly connected to a room full of supercomputer. The alternative method also written of in hypothetical papers is to replace or surgically modify the eye to be bionic, complete with video transmitter. This would be a two-three week hospital surgical procedure and recovery. I think a TI would notice any of the above clues, but not one, has; no one is seeing through our eyes. These scientific articles have become the basis for false conclusions by people who fail to understand what they were reading. This is in my books, btw.

READING YOUR MIND

No. Same answer as above, almost identically. However, there is another way to simulate it which approximates the result. There is a documented V2S bio implant called RAATS which can intercept and decode your brain’s EEG signals which represent the 26 phonemes making up the little voice in your head which is you talking to yourself about (whatever), including what you are about to do. It is not mind reading, but it can capture the verbalized thoughts for like result. You can learn to suppress the voice, and foil it. However, it is also a two way system capable of V2S, and remains a threat. This is in my books, as well, as is how to thwart it. See also RNM, next.

REMOTE NEURAL MONITORING

No. This is a good example of misinfo, and disinfo (per previous dialog — there are zero authoritative sources). In addition, some TI’s have tried to misapply technical proofs without understanding what they were reading. Some cite brain to brain technology which requires a supercomputer and for both parties to wear a special helmet in a system which neither reads the mind nor is capable of controlling thoughts; it merely causes muscular reaction. Others cite a similar article talking about controlling a mouse’s motor functions wirelessly, based on light, but it requires brain surgery and again has nothing to do with mind reading, and only controls muscular response.

RNM has been further mismarried and confused with Neural Linguistic Programming. NLP is not mind control, as such, but the mere clever use of words/phrases to confuse someone. It is not technology, but a method employed by magicians to misdirect, and by quick change artists to get more change back than due them. However, it is a skill often taught to CIA agents or acquired by others as a tool towards getting people to cooperate. Elements of it are often used in interrogative procedures. It has no actual relationship to RNM other than a similarity in name… and any such relationship which has been assumed is, in fact, an example of written NLP at work to confuse.

BEING IMPLANTED, FINDING IMPLANTS

No (and yes). Make not mistake, implants are real and often employed. I’ve had one, and it eventually came out on its own, rather a rare outcome. There are tracking implants, pain causing implants, and V2S implants (there are three technological ways to cause V2S, one of which relies on implants). I don’t mean to say implants don’t exist in TIs, but I do maintain many TIs falsely conclude they are implanted as a means to explain why their defenses against other (wrong) technology does not work. We must hope this is the case, because implants are very difficult to detect or combat (remove, kill, shield).

The problem is amplified by wrong beliefs about detection. Countless TIs become victims of scam artists claiming to find implants with cheap RF/EMF detectors which allow the moving of a finger to cause the instrument to ‘indicate’ the presence of an implant, when it is actually only sensing the movement of the finger. “That will be $50, please… do you want me to keep searching for another?”

Detection is not impossible, but RF/EMF is not emitted by most implants, and therefore, they cannot be found by cheap gadgets. Getting a professional with proper gear to scan and to tell you about it is typically next to impossible. X-ray and MRI scanner techs and doctors will seldom share the information, it being thought that they are taught in medical school that implants are a government tool to track terrorists, or similar. A good TSCM (Technical Security CounterMeasures) expert tends to balk at requests to scan, they are almost always ex intelligence agents and prone to not crossing their former employers. They also don’t like to do it because if they find none, they will be disbelieved and accused of lying, and payment will be refused, resulting in litigation. And, btw, they charge an arm and a leg, when the bill is presented.

THEY ARE TRYING TO KILL ME

No. Time was, when someone knew something they should not, became too annoying a squeaky wheel to the ‘system,’ or in some way threatened the plans of the powerful, they would simply kill them. But with the perfection of early mind control experiments post WWII, it was quickly discovered that the best way to keep those secrets (and any others) from being revealed, was to make the pesky risks seem insane. Mind control methods have replaced the ‘wet job’ as the way to deal with potential ‘trouble makers.’ There is now no need to kill someone, and in fact, a mind control victim has great potential as a resource for some future project use as a patsy, as guinea pig in new tech or methodology, or training exercises. It costs a lot of money to MC someone, and so, why destroy the person and the investment? This is one reason why membership in the TI community seems to be ‘for life.’

More than that, MC is all about psychology, and the greatest tool in the arsenal of psychological manipulations is fear. It is easy to make someone think their life is in danger, the ultimate driver of fear. Listen. If they wanted you dead, you would already be long dead. It is just that simple.

There is no profit in a ‘slow kill,’ because it would leave forensic clues that would endanger ongoing operations. Out of my 12,000 TI contactees, easily a third or more thought they were marked for death. Out of those thousands, only one actually died from targeting, and that was seen clearly as accidental and unintended consequence by the perps. Another died of organ failure deemed due to old age (nearly 80), but which was likely augmented by constant DEW. Perhaps a dozen others have died in ways which are reported as accidents (i.e., auto), but which the TI community embraces as murder. Another dozen suicides are blamed on targeting.

Suicide is the ultimate expression of giving up, the ultimate price of failing to defend against the real facts of targeting, and the final proof that the victim has decided to voluntarily give up God’s gift of Free Will and submit to the will of their generally satanic tormentors. When Cancer patients and quadriplegics can fight on and endure with dignity, why would anyone give perps that victory? Because they grew tired of defending against the wrong things with the wrong defenses.

SCALAR WAVES

No. This is a perfect example of technobabble at work. There are zero authoritative articles, certainly none which scientifically address scalar waves, which are alleged to disobey the laws of physics and attributed by some people as being employed in mind control.  The primary proponents and parties attempting via Youtube and Web presentations to ‘prove’ scalar waves (leaving more questions than answers) and tie them into mind control are often the same people selling $300 pendants to ward them off. It is a sham.

SATELLITE TARGETING

No, underscored. Some claim satellite DEW torture. Some claim RNM by satellite, already debunked, above. I’ll devote some time to DEW debunking, but I will admit to the possibility that satellites can potentially be used for area wide mood control or subliminal messaging, ONLY. You can in theory broadcast EEG signals and embed subliminal messages within communications signals. This is known technology such as used in Command Solo aircraft being flown every day over the U.S. and elsewhere.

This use of satellites is mere speculation, however, but I’d not be surprised. Command Solo flies training missions every day over US cities, and not even the operators know what is in the ‘training’ tapes being broadcast. The military has admitted the technology was used to sway Bosnian elections, and to cause Iraqi soldiers to surrender in droves, sometimes to small camera mounted drones. Given the number of butthurt Democrats who have waxed violent over the elections, it appears SOMETHING has driven a good number of people beyond the edge of acceptable and normal behavior.

Why DEW attacks are not possible by satellite: Any beamed energy, other than lasers, falls off at the square of the distance. A cell tower transmitter is good to about 2~5 miles with a relatively small emitter. At the height of satellites, the amount of power required to broadcast a microwave beam to earth and have it strong enough to penetrate buildings to hit an individual would likely require a power source far too large to fit in a satellite. Powerful land communications microwaves, broadcast at seriously high energy levels with a huge emitter, have a typical maximum range of about 40 miles. Satellites are typically some 22,000 miles high, or higher.

7327orig.jpgThe harder challenge is associated with transmitter size to handle that power. Microwave communications towers require transmitters typically in the range of 8 to 18 feet in size to punch towards 40 miles. To do fire a signal 22,000 miles would take units far too large to launch. But the bigger hurdle is accuracy, given that in order to maintain the illusion of insanity, you would not want anyone nearby to be hit with a beam (collateral damage). The best military grade GPS is accurate only to about 12 feet, which means a plus or minus error of about 10 feet for the center of beam, and the beam width would be much wider than was the transmitter. Bystanders many yards away, or further, would notice the same targeting effects.

But suppose it could be done? The next problem is cost and client (TI) servicing. A typical military or intelligence satellite can only target ONE client at a time. Given the size required for DEW targeting, certainly only one. Yet how many TIs think they are targeted by satellite? There would need be thousands of such birds, but there are not even one thousand satellites in total from all nations on Earth for all purposes, inclusive. Each satellite costs roughly a half billion dollars to launch, and about $15M a year to maintain, hardly cost effective when a perp with a modified microwave oven-style weapon can do the same job from a nearby building for a few thousand dollars a month.

What about availability? There are zero satellites in geostationary orbit over the United States which are not communications or weather satellites; the military and intelligence community only use orbiting satellites. That is another inefficiency for targeting individuals, because it would only be overhead for targeting for a few moments several times a day. How many TIs can claim targeting on a regular schedule that fits that?

Satellite targeting makes no sense either technically, or financially. It is a fantasy of convenience to the greater targeting movement fostered by Robert Duncan and Barry Trower. If people believe in satellite targeting, they will stop trying to learn the truth, and stop trying to defend themselves, as there is ‘no way to fight satellites.’

True: because they are not at war with you.

 

There is a Mark of the Beast Implant with YOUR NAME on it


This is an old topic that’s lost traction in the public eye, but in the background, the enemy continues to work ever closer to fulfilling prophecy about Mark of the Beast. Now, employees are being asked to implant themselves in order to get snacks, get through doors, and access workstations and photocopier.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.

What you will learn reading this post:

  • what RFID is, who is behind it, and why you should fear it;
  • about Digital Angel, and the bio implant tracking version of RFID;
  • why you should fear it, put away petty ideological differences, and unite against it
  • what you can do to defend against it;
  • the greater strategy RFID is in support of (the ultimate threat). 

 

Invasion of privacy tiny in size, massive in scope

mxkvjtxrwdpybs6zxnuv

Tracking implant quite similar in shape to a much larger one found in my own leg some 35 years ago. State of the art, today, are smaller, translucent, bond with and look like human tissue: invisible to a surgeon and to x-ray. MRI sees them as a blemish. Less sophisticated units without GPS/cellular/wifi capability can be as small as the period in this sentence.

Recent news stories, including a particularly scary one referenced in red text, herein, have forced me to draw upon years of research and dig out my old PowerPoint presentation, 666 Reasons for Smart Dust and RFID Technology, as presented as the keynote presentation at Conspiracycon 2010, in Santa Clara. Any definitive presentation must go back to the beginning, or the dots won’t quite usefully connect. This is going to impact YOU in YOUR LIFETIME. Actually, it already has, and you just don’t know it; the water temperature is slowly being raised on we Frogs, and it’s quite hot, already. Hopefully… we can somehow jump out before its too late.

Smart Dust and RFID tracking technology are quite related, but Smart Dust is not going to be a part of this presentation, except to say that it is nanotech capable of much more than RFID, but it is not an implant. While it is represents its own significant threat to social, financial, and physical security and well being, it is less useful than a tracking implant for the population at large, and cannot play the role of Mark of the Beast. Fortunately, it will not likely ever be used against anyone not deemed a high-priority national security risk. You know, like Will Smith, in Enemy of the State.

digitalangel

The less costly Digital Angel implant

RFID, however, is the very heart of the tracking bio implant, the most obscene version and infamous of which is Digital Angel. That’s the name of a CIA front central in pushing for implants, but also often used to describe their chip, itself as a product trade name. They also offer a wide variety of tracking systems which are non implant, such as wearable items like watches and ankle bracelets.

But we need start with a broader view on RFID to fully understand the greater threat this topic represents. Non implant (and seemingly harmless) versions of RFID are already used to track an endless array of products, and you are quite likely to bring them home every time you go shopping. In retail, it is mostly benign, but it becomes the bedrock of a useful personal tracking system.

What?

Mostly benign? Check this out, an edited and updated excerpt from my book, The Professional Paranoid: How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual (third ed.) Excerpt begins…

 

Smart Dust, RFID, and the Mark of the Beast

 

i want you to consider the first letter of this sentence; the lack of capitalization is not a typo. I wanted to draw attention to the dot above the letter ‘i.’ There is a reason… there is an RFID invasion taking place, and some of the invaders can be just that small.

implantedhandThe Bible tells us that in the End Times, there can be no transaction between persons for goods or services unless both parties have the mark. Revelation 13:16-17And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: 17 and that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”

Though the Mark of the Beast is thought of as being the number 666, that is not quite the case. That is the number of the Beast himself (the Antichrist) in numerology evaluation of his name. The original words used in the original Greek texts of the New Testament can be translated to mean ‘insert’ as well as ‘mark.’ Thus there are growing numbers of people who think that some form of Digital Angel bio implant will be the actual marking device. This section will illustrate that likelihood and educate you on just how close to that day we may be.

This will make sense later: implants are the mark for the hands of peons, and marks on the forehead are the mark for meons.

What is Digital Angel? It is a firm which is known for a series of tracking products, including bio implants, all based on RFID technology. Simply put, it is a passive device which, when scanned with a low-energy RF signal, responds with a signal of its own, broadcasting a unique identification number or other data. Early versions of this are still commonly found in clunky removable/disposable merchandise security tags installed by retailers which can trigger alarms when shoplifted goods exit the store. In the modern version, the product manufacturer includes the chip which enables the same feature without the retailer needing to do anything but take delivery of the goods.

There is a whole emerging industry based on RFID, and it, in turn, impacts on almost all other industry sectors. The industry is driven at its heart by the military and intelligence community with the help of corporations who are part and parcel of the NWO elite, as defined by the makeup of their directors and other corporate leadership or ownership. What they want to do with RFID is mind boggling, as is what RFID is capable of in terms of invasion of privacy. To start, they want every single product manufactured and sold to have its own unique RFID tag, and are pitching it to manufacturers and retailers as the next evolution of bar code.

Similar chips in credit cards technically allow purchase without the need to remove the credit card from the wallet, though they currently require us to scan the card. But all that is really be needed is to specify which of several credit cards we might be carrying was desired to be used. That could be verbal, by touch screen, or smart phone application, which avoids producing the card. RFID is also being built into phones for comparison with credit cards nearby, to allow verbal telephone purchases to be made without the need to verbally confirm credit card details. The bio implant is ‘sold’ to us as a convenience to replace all of that (examples to follow).

That is the ‘convenience’ under which it will be sold to us in the retail world, and if a cash register can scan these chips, so can the device at the door looking for merchandise which had not yet been purchased. Why stop there? Anyone can put small and hidden scanners (with or without cameras) anywhere, and for any reason… such as at every doorway where some form of security or tracking feature is desired. By scanning RFID credit cards, the identity of everyone passing through is logged and time stamped without their knowledge or participation. Actually, any RFID tag on your person can do the same thing (it is being built into clothing), because your identity can be associated with its purchase. And that is just the beginning. Ergo, the national ID ‘Real IDprogram is based on RFID, and eventually, the human body itself will be its on RFID ‘ID.’

exploded$In the very near future, it will serve law enforcement. At the scene of the crime detectives will often find discarded items potentially belonging to a suspect. They analyze these for clues, such as fingerprints, to build a list of suspects. In a world of RFID-only purchases, every object also identifies who purchased it, when, and where (often also useful clues in prosecution). What about cash purchases to thwart RFID records keeping? Not a problem. You didn’t think for a moment that those little slivers concealed in the left-hand portion of your new money was truly just a counterfeiting deterrent, did you? Put anything but a $1 bill in your microwave oven and it will explode when operated… a trait of RFID. Moral of the story; don’t casually discard product wrappers, especially if you think someone might use them to implicate you in a crime; burn them.

Unknown-1.jpeg

Actual TIAO logo

But it gets worse. For any of this to work smoothly, somewhere, someone needs to catalog and keep all those transaction records and make them available for government’s needs. Enter the Total Information Awareness Office (TIAO), AKA the Terrorist Information Awareness Office. This was modeled after an expanded version of FINCEN (Financial Crimes Enforcement Network) capabilities (check this out); and was MILITARY led and very Intelligence community friendly Defense Advanced Research Projects Agency (DARPA) project. I’ve seen the original DOD call for papers and the final description of capabilities and intended uses for the TIAO, and it has little to do with targeting terrorists. Instead, it has to do with capturing records of EVERY transaction between EVERY citizen and business, as well as the passing of ANY citizen through ANY doorway in selected locations. Further, it will track vehicles past checkpoints and can log other kinds of interactions or transactions between people and each other or real world objects (i.e., machinery, vending machines.)

tiaomap

Everything in this image under Transactional Data, and all the little colored storage systems (the cloud), and Corporate Memory, comes largely from backdoor access to RFID-based data. The red Privacy and Security dotted line was added AFTER privacy concerns, to imply a search warrant would be employed (untrue). Intel data would include access to NSA’s massive global wire tap, as well as all of the other 16 spy agencies of the U.S., and those of friendly nations.

Update: TIAO ‘went away’ due to public protest and ‘too many questions,’ including “Why was the head to be a convicted criminal participant in Iran Contra, an ex Naval officer of significant credentials tied to CIA and the Pentagon, John Poindexter?” And yet, it did not actually go away. It has instead been quietly replaced with the OIA; the Office of Intelligence Analysis, another new super-secret spy agency operated out of Homeland Security. They, in turn, gently established ‘Fusion Centers.’

Fusion Centers are ‘sold to us‘ as a happy pill having nothing to with dark deeds, and as being established by cities and state governments in order to share information between partnering civic and federal agencies, local businesses and NGOs for improved security against terrorism and ‘other threats.’ In truth, they are hotbeds of social spies who operate external of the centers within those groups of partners on behalf of DHS and the intelligence agencies. It is often a source of organized gang stalking, and a collection point of ‘data’ about ‘other threats.’ We are the threats, and the data is obtained through backdoor access to the ‘data’ about us found in participant computers, including RFID transactions, security and traffic cams — and via gang stalking and the associated psychological profiling. It is a kind of fascist Brown Shirt group without the uniform, replaced with a smile and handshake… and big eyes and ears.

And worse still. If government decides it wants to know even more about you, a black van can drive by your home and scan it to collect the sum total of all information from all RFID tags (or Smart Dust) found within the home. They will quickly know EXACTLY what is in your home, where you got it, how you got it, and when. This gives field agents the ability to gain access to that kind of information in a very focused way instead of having to run tedious database searches which would necessarily include bureaucratic handling and, perhaps, the dreaded and feared need for a pesky warrant.

And, worst of all, the ultimate expression of RFID privacy abuse is to put one in the human body, with or without the target’s knowledge. The question is, how close are we to this nightmare, and what can we do about it? The answer is, we are frighteningly close, and in fact, it has already been happening for decades.

  1. RFID is already being put on thousands of products you buy today. Even common mundane consumer goods like Gillette razors and Max Factor makeup have been ‘chipped’ with RFID. Walmart pioneered its use, and used cameras (which opens up a whole new personal security threat for the chip) to track customers through the store, and record RFID transactions. There are also shopping carts with built-in ‘product information displays’ which can track every item you handle while in the store, and profile your shopping experiences over time. You can bet there were cameras connected to scanners scattered throughout town by CIA or the military (Walmart Board included ex military and intelligence agency types at the time), as well, to see where else you went and what else you did, to test it as a spy tool. Many manufacturers have placed orders for hundreds of millions of RFID tags and millions of scanners. They have to be in use somewhere.
  2. Many tens of millions of RFID equipped credit cards have already been issued. You can spot these visually if they are transparent, or if the credit card number has a lot of zeros in the middle, or a gold foil rectangular emblem about ½ inch square. Though sold to us as a ‘security feature,’ they are the opposite: content can be stolen by proximity scanning without your knowledge, and then the RFID and card can be cloned by thieves for use at your expense. I’ve caught such a thief scanning at the doorway to Walmart. He was pretending to be making a phone call… pacing back in forth in ways that maneuvered him in behind victims. But there are also home-made scanners which can scan from hundreds of feet away.
  3. Most cell phones use SIM card technology incorporating RFID (the SIM card, more than the phone, identifies the authorized user). This is often used in phone apps to facilitate cardless credit transactions (i.e., iPay)
  4. Virtually every maker of cash registers and point of sale systems is developing low-cost attachments to existing cash register and credit card scanners to sense RFID, as well as whole new systems to replace the old with simplified operation and reduced cost — this allows self service checkout and the elimination of the sales clerk, so it will be promoted as a ‘cost reduction’ tool. But don’t expect to see savings passed on to consumers. Money already has the needed strip in place and it likely has been RFID capable all along without our knowledge.
  5. All employee scan cards use RFID. Hotel room key cards use RFID. Federal Express, UPS, etc., all use RFID shipping labels. Monthly bus passes, season tickets, and the like, also employ RFID.
  6. Pets and livestock have been being implanted with RFID for decades. Within the last ten years, thousands of people have, as well, largely through efforts to chip children ‘to protect them against kidnapping.’ There are nudist resorts where you can volunteer to have one injected to represent your credit card information for purchases at nudist-camp points of purchase for services and goods. Otherwise you must carry your wallet or purse and keep an eye on them. What fun is that if trying to commune with Mother Nature and your bank account? In July of 2017, a company announced break room vending systems and software to allow implanted employees to access snacks without money. Learn more here. Soon, you will see implants being promoted for use with parking meters, fast lane highway access, and on, and on, and on.
  7. Bioimplants can easily be implanted in a human without requiring their knowledge or consent. All they will know is they woke up with what seems to be an insect bite. This can be done while they sleep via covert entry of their home, or at distance with a special pneumatic sniper rifle.
  8. According to several news accounts, countless livestock has been slaughtered with the implants still in place, their meat ground and sold, and consumed by unaware purchasers. Despite massive recall efforts, not one package of meat was recovered. RFID implants are made of glass, plastic, and poisonous metals.
  9. Some school systems are requiring children to use their fingerprints with scanners in order to get their school lunches. This is bad enough, but the firm that makes the equipment used also offers an RFID attachment in lieu of the fingerprint scanner, and mentions implants in their literature as an option.
  10. One maker of RFID, in marketing it for aircraft part identification in an assembled aircraft (the goal being to track parts which might be subject to safety recall, and a feature useful in crash investigations) chose a trade name for their RFID of ‘The Mark.’ The part number when Boeing Aircraft orders it from the maker is alleged by employees to be 666.

 

What can you do to defend against it?

Aside from sharing this post, not much. Be very vocal and protesting at every opportunity any discovered use of the technology. You might demand RFID tagged merchandise be detagged or the tag neutralized before you leave the store, but that would make you look crazy. However, organizing endless group protests can have an effect. Any firm that covertly uses it should be razed to the ground (sued into oblivion for violation of privacy). Any government office holder should be kicked out of office if they support the technology in any way, shape or form, or simply fail to oppose it. In my opinion, preparation for revolution should be made if these efforts fail, because that would be the only remaining recourse prior to full enslavement.
Back to the bible. In The Book of Revelations where the reference originates, there is also one more clue RFID will be the basis of the Mark of the Beast. One at a time, the Seven Angels open the Seven Seals to unleash seven deadly punishments upon the unfaithful on the earth. One of these states that those with the Mark of the Beast will suffer severe pain and many will perish from it. A subtle clue.

As it happens, there is one feature about RFID which must be told to make sense of this, and it suggests how to thwart the tech: if exposed to high energy radiation, RFID heats up incredibly and explodes. A burst of high energy radiation levels will literally destroy it… such as an intense solar CME blast (Coronal Mass Ejection – a high RF/EMF energy field). At this time, I cannot tell you how to generate such an energy and safely use and aim it, but it has been suggested by other experts than a ten second microwave oven exposure should be sufficient. Now if I just had a portable unit I could waltz through the retail Aisles with… set to ‘Burst’ mode… but you can bet there will be or already are laws written to make that illegal.

But there is something simpler which also defeats the technology. Metal shields the signals. Thus wrapping a National ID or an RFID equipped credit card or object (i.e., chipped hand) in aluminum foil defeats the device’s ability to communicate. When the revolution comes, if that is our future, there will be portable devices which anyone could build from easily obtained parts to detect or destroy RFID at will. I fear the day this is needed. I also say woe to those involved in the use of RFID should it come to that. End excerpted material.

There is one other thing you can do. The response time for reading a scanned RFID is very brief. There is a ‘failure’ in reading called ‘tag collision.’ When too many RFID tags of the same frequency (usually dictated by type of tag/use of tag) are present in a confined space, the scanner can fail to capture the data, or capture the wrong data. Therefore, if one were to collect dozens of RFID tags of various types and put them into a bag to carry along with them, it would effectively become a scanner blocker. Keep all your old canceled credit cards in the same wallet as your valid ones, sandwiching the new between the old, and pull them ALL out to select the one to use, holding them all in the same hand to swipe.

I also advise against Smart Appliances, and smart meters. RFID is at the heart of interaction with Smart Meters, which in turn is its own invasive privacy and stalking threat (widely experienced as a directed energy weapon). Worse, it is tied to mapping of the interior of your home; the floor layout, location of furnishings and other appliances and electronics, smart or otherwise. Programs are being developed to allow such mapping information to be available to manufacturers of smart devices and used to market to you based on use of not just their product, but all products. Naturally, all that can be accessed by government, as well… and hackers partnered with burglars.

I also suggest taking advantage of these resources as contingency against the worst:

How to war with the NWO; How to survive the NWO; and Localized defensive strategies.

 

The history of RFD tells all

It starts with Howard Hughes, though he was a victim, not an instigator. Most of us are familiar with his rise to being the richest man on Earth in his day, and his fall due to a mental condition which impacted his ability to interact with people, and life in general. The untold story is that once debilitated, CIA agents and Mormons (CIA likes to recruit from Mormans, and Masons, because such cults have secrets and know how to keep them through compartmentalization and other methods) became his ‘caregivers and managers.’ He trusted them, and they took advantage.

Once in control, his vast resources were diverted to CIA control and application. Hughes Shipbuilding built several spy vessels including the Glomar Explorer and companion vessel, both designed to retrieve sunken Soviet Subs. Hughes TWA aircraft and assets were diverted to form (over time) three different CIA ‘airlines,’ including the most recent, Evergreen Aviation, which wound up acquiring Hughes’ Spruce Goose for its museum. Hughes Tools, the financial cash cow of Howard’s meteoric rise, a maker of drilling systems for the oil industry, would eventually become Enron, and we know how that wound up vanishing billions of dollars into thin air. The remnants of Enron’s data processing center would be applied to CIA fronts engaged in porn (to profile user sexual preferences for possible blackmail application), web site hijacking (I was a victim of that, documented here), offshore gambling, and 4-1-9 scams (Nigerian money investment scams).

Then there were Hughes operations which would evolve to serve CIA’s efforts in Political Control Technology development and application. It starts with Hughes Aircraft’s electronics division, eventually become Hughes Electronics, which invented the RFID concept. These were originally used to identify and track cattle, marketed through Hughes Identification Devices, but also found their way into humans involved in early (late 1940s) non consensual CIA mind control projects and Atomic Energy Commission radiation experiments on civilians. I wound up with one in my leg, when as a child, when I was injected with a radioactive substance in Yakima, near the Hanford Energy Reservation.

From Hughes, the chip was migrated to Destron Fearing, and from there to our friend, Digital Angel. We will come back to them. More CIA fronts or partners duped into participation would be created in America and globally to market implants for humans. They do big business in ‘police state’ countries, often for the purpose of chipping persons in the criminal system. Of course, it is privately understood they are good for tracking anyone you wish to track, such as embarrassing political activists and whistleblowers.

LocatePLUS is a Homeland Security created and CIA infected front which pushes the implant in America and advertizes that it maintains 12 billion records covering 98% of the American Population. The DHS/CIA knows all about you and is making money selling you to anyone with the money. In America, the front markets to FBI, ATF, DEA, and 2000 law enforcement agencies, primarily non implant products such as ankle bracelets.

In Europe, the front Worldwide Information is a LocatePLUS spinoff doing much the same. Global reach far outstrips American consumption (there are a lot of fascists out there, in almost every government system): Universal Microchip in Italy, IDECHIP S.A. markets in Ecuador and Brazil, Solusat Medica in Mexico, Scientific Innovation and Integration (SII) in Korea, Taiwan, China, and Japan, Inforlexus Inc., for Malaysia and Indochina, Biometronix for Germany, Glezer Technology in Israel, and Cybertek in Puerto Rico. This list continues to grow; the Swedish firm Biohax International is behind the implant for snacks story.

The primary American front (a sister to LocatePLUS), Metro Risk Management Group, sold $13M worth of chips over 5 years to the Bonneville Power Administration (to track fish, officially). BPA is a Department of Energy firm which had in the same time frame been in the news because of high-tech spying operations having been detected taking place in their facilities… while BPA and Enron were significant others in the same bed. The U.S. Military contracted for $24M, while they sold $1M to private citizens wishing to chip their children or themselves. They sold $7M to the greater Intelligence community, and $73M for ‘internal use,’ which is to say, CIA, itself. Such orders are a combination of implants and scanner systems, both portable handhelds and installable units for security gates and doorways. A typical order might consist of hundreds of thousands of devices and a thousand scanners.

All this data represents 2005-2009. Sales are increasing over time, but increasingly hard to track for a variety of reasons, including corporate name changes, mergers, spinoffs, and other tactics often seen in CIA fronts trying to be a moving target. And the implant business is a target by activists and activist organizations worried about invasion of privacy and civil rights, to say nothing of some kind of New World Order nightmare ending with the Antichrist at Armegeddon. And, they are constantly being sued in court for a wide variety of reasons.

And this brings us back to Digital Angel, the key point in the bioimplant tracking food chain. As stated, a lot of business names and hanky-panky tactics are often employed by CIA fronts, as outlined in The Professional Paranoid, a privacy/security how to which, in covering that topic, helps readers to identify who is really causing the bumps in their night, should they be so unlucky (as was I). So let’s take a look at Digital Angel, again based on older ten-year research (I’m not going through that, again).

Let’s talk corporate names as clues: though most commonly known as Digital Angel (Florida), also DBA Verachip, they were formerly Applied Digital Solutions… which was formerly Applied Cellular Technology (because RFID tracking often relies on cell phone services)… which also used the DBA ACT Financial… formely Axiom Information Technology… formerly Axiom Computer Consultants… DBA Great Bay Acquisition Company (those all based in Wisconsin/Minnesota). Digital Angel divorced itself from Verachip (being sued out of business), but then Verachip merged with Steel Vault… which became PositiveID, which then in turn tried to acquire Digital Angel… which also operates Signature Communications in the U.K., where it might (conjecture based on company data and ties to CIA fronts) enjoy backdoor access to encrypted government radio communications, the assumption being that receiving units employ an RFID chip which, like the cell phone paradigm, authorizes descrambling of transmitted data, as well as authenticated identification of the sender and recipient. Finally, Digital Angel, also being sued and hounded, ran off to the U.K. where they now promote themselves as “a developer and publisher of consumer applications and mobile games designed for tablets, smartphones and other mobile devices, as well as a distributor of two-way communications equipment.” But they still push implants, and through Signature, the two-way communications gear.

Let’s talk facts as clues: Digital Angel does not make RFID. No. They merged with Destron Fearing, the actual imputus of modern RFID systems claiming to have invented RFID technology. No, that was Hughes Aircraft’s Electronic Division. Digital Angel at one point claimed to be founded in 1948. No, but Destron Fearing was founded in 1945, did the RFID for cattle thing in 1948. No one cited so far, actually makes RFID tags, the heart of the implant. No, that’s Raytheon, a military/CIA contractor… formerly known as Hughes Aircraft. That makes sense, since it is the U.S. Army which tracks all RFID tag assignments (unique tag number assigned to (whatever) user data). Meanwhile…

Let’s talk connected dots as clues: CIA’s HHMI (Howard Hughes Medical Institute) is steadily pushing for the use of RFID in both implant and non implant versions to hospitals (49 major facilities as of 2005, more every year) and the medical industry at large, and Hughes Satellite and Hughes Communications services RFID tracking systems via cellular/wifi. How do I know this? By temporarily working for both Hughes Satellite and a major cell phone carrier where I was able to verify specific cell phone traffic and routing of tracking data. The phone account was tied to an individual which shared an address with one of the above firms (how I found it). And that led to finding dozens of such phones for more firms. And even more looking at other fronts known to me outside of the RFID playing field. In fact, such details are part of my evolving insurance policy against ‘accidents.’

Let’s talk key people as clues: Another CIA front trait has to do with who is involved in the corporate structure. At ADS (old data) Dr. Richard Seelio was Director of Medical Applications. Really? He is a Bariatric Surgeon, so he knows how to suck fat out of your thighs, not exactly as advertised by his title (a typical front man). The Senior Vice President was, prior to installation, a small time lawyer (a cutout man). A look at the Board of Directors of almost many of the above firms variously will find persons of wealth and influence, persons with backgrounds or ties to military/intelligence (or both), and persons with membership in the nefarious NWO Round Table Groups, such as the Council on Foreign Relations, Trilateralists, and the Bilderbergers. This is a kind of corporate structure is a fingerprint that lets anyone track just who are the trackers.

The other shoe drops

As I wrote this, I was listening to radio, where Clyde Lewis more thoughtfully reviewed a greater enveloping matter on his Ground Zero show, things equally important to understand, and far more sinister. Listen to it, here. The short of it is that chipping people is not just about spying on them, it is about control. It will enable a complete rewrite of social, political, religious, and economic existence, and the script is already being followed step by step, RFID again at the core. You didn’t think ‘Global Warming’ was about weather, or that Transgender Issues were about rights, or that Terrorism was about political or religious ideologies, did you?

It is, all of it, in support of ‘a brave new world’ which the New World Order seeks to establish, a world where there are only three classes of people. While my friend Clyde did not use my labels for these classes, he did so describe: there will be Meons (a Club of Rome/Bilderberger label based on an ancient word for someone worthless, less than a peon ­– a ‘useless eater’ who will not likely survive the NWO on their own, and who will be made to ‘go away’ in time); Peons who will be usefully employed to run the system (government, business) for the elites; and the Elites, the 1% of the 1% who will rule.

Clyde explains how the Middle Class will be eliminated, divided between those willing to implant and deemed useful (peons), and those unwilling or deemed useless (meons), and the a host of new topics and proofs you have likely never heard of, and more. Naturally, the upper class will be peons, and the lower class, meons. Bio implants (part of Transhumanism) are key to all these plans. You had better understand all of this or you won’t be able to cope, and likely, will end up in the red list for population reduction.

 

Smart Phone EMF App No Value to TIs


Targeted Individuals are desperate to find verifiable proof they are electronically targeted. Unfortunately, many turn to cell phone EMF meter apps… which are useless for the purpose. Here is the right way to do it.

 x

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
x

What you will learn reading this post…

  x
• Smart phone EMF Apps don’t work they way you think;
• What will work for TI needs;
• The types of threats a meter can see, and cannot see;
• Some common false assumptions TIs make that impact understanding
  x

Smart phone EMF Apps can’t ‘see’ targeting signals

  x
Unknown-10.jpegSmart phones have built-in EMF (b) detectors, which some App makers have taken advantage of to simulate EMF meters. Not quite the same thing. Cell phone detectors are designed to measure the Earth’s natural DC magnetic field in three axis. This allows them to compare sudden changes to ‘compute’ movement of the phone for game interaction. NOTHING MORE, unless you are looking for a large buried iron-bearing rock; same technology as a metal detector, just less sensitive. The detectors can also be used in other Apps, such as levels and compasses.
  x
To see targeting EMF and RF, you need a meter designed to measure RF and fields generated by 60 cycle electrical equipment, and the kind of EMF they generate. Such meters, unlike cell phones, are intended to be aimed directionally at a given source; they can show you where a signal originates. This is perhaps the best reason to own one. Some are type B (preferred), and some are not, to make them cheaper, and somewhat less useful.
  x
Preferably, it should have a very broad band of frequency sensitivity, because there are many kinds of targeting tech, most of which can generate symptoms which mislead the victim into false presumptions about which kind of an attack they are dealing with. A meter with a broad band can better define the type of attack correctly. Unfortunately, low cost meters will not see bands broad enough to deal directly deal with or identify microwave the way a TI would like. Some meters, such as those mentioned herein, can still read and quantify their energy, however.

You have to know what you are looking for

 x
You must choose your meter based on the kind of attack(s) you suffer. You can’t scan for an attack which does not exist, either because you think its one kind of attack, but its another, or because there is no such technology in play. The real problem is, that very few TI’s actually know precisely what kind of attacks signals are levied against them… save V2S and microwave burns, which are pretty unmistakable. Out of 12,000 TIs I’ve dealt with over several decades, I can count the number who correctly understood the technical truth of their problem on one hand. And  there are several reasons why that is true.
For one thing, many symptoms can often be the same regardless of tech employed. I break symptoms down in my book, MC Realities. For another, the enemy will invariably seek to insure you get it wrong, by leaving false clues or having fake TI personna give you bad advice, and by employing professional dissinformation methods, to include phony retired intelligence agents who ‘come clean’ and ‘expose’ the technology. Never happened. They do this because they know you can’t fight them if you respond with the wrong weapons/methods, and because it makes you look insane to professionals from whom you might seek help (i.e., Cops, Lawyers, PIs, Doctors). Then, well meaning TI’s spread that disinformation as gospel, and muddy the waters further with their own versions. Here is a great example:
x
A lot of TIs think Remote Neural Monitoring is an attack tech that reads their mind or puts thoughts into one’s head, or that it has something to do with satellites, and fully a half-dozen other things it does or relates to. The Web is awash with countless pages saying RNM is mind control of this, that, or another flavor, but not one of them is an authoritative source citing the truth. NO, it is not, does not. RNM as a term relates to nothing a TI ought worry about, at least currently; it is based on use of a room full of super computer power directly wired to countless electrodes physically attached to the head of the subject, and does not directly read thoughts. It instead catalogs the brain wave patterns ALONG WITH the user’s verbalized thoughts.
  x
Subsequently, the computer can then compare brainwaves against known thoughts to find matches. It cannot put thoughts into the user’s head, and it hardly qualifies for field use against unwitting persons as political control technology. Some efforts along this line have also managed low quality video depictions of what the subject was seeing. In order to do that, they had to remove the skull cap of the victim, a Cat, and put over 1,000 probes directly into the brain, causing the Cat to die fairly soon afterwards. The term RNM has been misused and spread by TIs mislead by disinformation or persons who did not understand what they were reading in a scientific report, or description thereof in media. The term RNM was never even used in the scientific papers, but popped up in a news article summarizing the paper. From there, it was hijacked to become a fiction.
 x
Note: there is ALSO a patent often cited as proof of RNM, even in other patents, and in books by disinformationalists — which would SEEM to be as claimed, and which is the basis for ‘satelite targeting’ claims (along with ‘exposed truth’ by ‘ex intelligence types’). But in fact, the baseline patent, as well as any relying upon it, are bogus, in that it/they cannot work as described. It must be presumed the patent office took their word for it; if the reviewing staff at the patent office were not technically up on radio frequency technology, they might not have spotted the flaw. Patent #US3591134 A Apparatus and Method for Remotely Monitoring and Altering Brain Waves… essentially beams two radio waves at the brain, and expects the brain’s own radio frequencies to be modulated onto the them, and then captured by a radio receiver for processing, analyzing, and optionally then modifying and beaming them back yet again into the brain to alter thought.
x
CAN’T WORK: radio waves don’t modulate one another. If they did, all radio waves would carry the signals of all other radio waves, and AM/FM radios would not work, they would be confused. Modulation is achieved by electronic circuitry BEFORE broadcast; exactly what AM and FM radio does; audio is modulated onto the broadcast frequency, and decoded in the radio. If this patent, and remaining patents based upon it actually worked, they would be picking up not only the original signal, but modulated signals from every radio signal out there, and every brain within range, and be unable to separate one from another. Exactly this protest has been made on this patent, and the patent is no longer in force. It is presumed someone thought they had a great idea, and patented it without proof of concept, because they could not afford to develop working prototypes, and in hopes someone who could afford it, would pay them for patent rights, to do so. The same is likely true of the patents based upon it. Who knows? Perhaps the patent was actually itself a disinformation effort.
x
And while we are on topic, satelite targeting also does not exist, at least not the way most TIs believe. A Satelite is too expensive to target an individual, for one thing. To do so, it would need to be tasked, taking it away from other duties. No TI is so important to justify billions of dollars in hardware just on them, especially given the number of TIs who so beleive. More importantly, its simply not possible. You might be able to broadcast subliminal information or EEG entrainment signals to the entire service area of a Satellite, but not an individual, unless the individual had a satellite dish and decoder built into his head to isolate signals meant for him, alone. Moreover, a satellite could never read an individual’s brainwaves unless the he had a very LARGE and specifically aimed dish in his head.
If a TI were to worry about mind reading or having thoughts put into their head, such does not quite exist, though it can be simulated such that the target presumes it so. That requires an implant, and is not likely to be easily discovered with an EMF meter. All it does is read your brain’s EEG signals for that little voice in your head, which is you talking to yourself. That voice is also used by your EGO to cause you to react badly to stimuli. An implant which reads your brain’s EEG signals representing the 26 phonemes used to make up words can relay that by radio to a computer which can translate it to text in real time. The operator can then respond if desired via the implant using incorporated V2S ‘bonefone’ technology, or perhaps, simulate your own internal voice making you think ‘you’ thought that thought. There is no information or evidence suggesting the later capability exists; it is mere theory, but it is plausible. This implant is known and documented technology.
 x
From my book, MC Realities: I direct you to a Dec. 18, 2000 article from the Albany Times Union, by Andrew Brownstein — a piece entitled University of Albany Suspends Mind Control Implant Research Project. This reveals current working capabilities are well beyond those demonstrated thus far. Excerpts begin — as dramatic a smoking gun as I’ve ever seen… “The University at Albany, N.Y., has shut down a research project investigating the claims of individuals who believe that they were surgically implanted with communications devices which can read and transmit their thoughts. Professor Kathryn Kelley, a fully tenured psychology professor at the University at Albany, has focused her work in recent years on surgically implanted mind control devices. A brief statement released in August by university spokeswoman Mary Fiess said, ‘The university imposed the suspension [of Kelley’s research] because of serious concerns that the experiment did not meet the standards governing such projects on campus. While we work to gather all the facts in this case, we cannot comment further.” …In 1995, gunman Ralph Tortorici held a class of 37 students hostage at the University at Albany, claiming that the government had planted microchips in his body. Tortorici, who shot one of the students during a struggle, reportedly hanged himself in his state prison cell last summer.
920x920.jpgx
In spring of 1998, according to the Times Union, the university’s Psychology Department first became aware of Kelley’s interest in mind control technology when she posted a note on her office door announcing a lecture called ‘The Psychology of Invading the Self.’ The note reportedly described implant research funded by the National Security Agency and the Department of Defense with an annual budget of $2 billion. The note stated the devices were typically implanted in ‘uninformed, nonconsensual subjects” who were usually ‘federal prisoners and political dissidents.’  The newspaper has since had the article disappear from their files, but other newspaper articles reference the event, which is where I obtained the image.
 x
But there is also an attack tech somewhat similar to RNM’s claimed methodolgy which does not use an implant: EEG entrainment. It operates in the ELF (Extra Low Frequency) RF spectrum at brain wave frequencies, typically 7-15 Hz. This is the tech used to control your wake/sleep/alertness and moods, by sending brainwave patterns as radio signals stronger than your brain’s, causing the brain to ‘adopt’ them. Very few EMF detectors operate this low, and so, are not likely to be able to document such use. I have one, but I had to pay $12,000 for it… and for that money, got a lot more functionality, as well.
 x
At the high end of the spectrum, microwave energies used to cause pain and other dirty tricks can operate beyond the UHF frequencies, between 3 and 300 GHz. Cell phones and wi-fi systems operate in the single digit GHz, but attack signals tend to be somewhere above 6Ghz, and well into double digits. Military systems can be over 50GHz, and into the hundreds. Again, low cost EMF meters cannot ‘see’ these higher frequencies, typically stopping at 3GHz. My $12K system can see to 12GHz, and is therefore still inadequate for all situations. But many meters, like the Trifield (.com) can at least see the ENERGY put out by such systems, and can therefore still be useful to know they are in use. They just can’t specify the frequency involved.
x
 x

How you use a meter is important

You should hold the meter flat looking down on it, and aim it at a suspect source. Stand and rotate rather slowly to find hot spots which represent suspect sources, for closer study. Move in on these — the closer you are, the more accurate and higher the reading will be; RF energy readings normally fall off at the square of the distance. Learn more about meters, use, and related issues not covered, here, from this earlier post. It includes, for example, information about stray voltage, smart meters, and relates the importance to a TI of EGO in the matter. Some information in that post is duplicated, here, to insure it is not overlooked.
 x
TrifieldMeterI very much like and used to sell the TriField — get the cheaper one, the more expensive one is trickier to use by a novice. I also used and sold the MicroAlert, same source, because you can set it for an attack threshold and it will automatically sound an alarm (pulsing beeps). When I was under attack, my bird actually learned to ‘beep’ back at it, it went off so often. Had to move the bird so I wouldn’t get the two confused; at that high a pitch, I couldn’t tell the source direction.microalert2
 x
Don’t aim meters upward unless there is something there you find suspect; the sky is full of RF energy which will invalidate reading usefulness. Take a reading of the suspect item and then compare by aiming at the same upward angle elsewhere, and subtract that reading to get the difference, which is the actual number of concern. Again, get as close as you can.
 x
Keep your fingers away from the business end of a meter, or your body will alter the reading. This is the trick used by fake implant finders. They choose a meter that has an audible threshold alarm like the Smart Alert, but fancier and more technical looking so they, as ‘experts,’ seem ‘smarter and more capable.’ They set the threshold such that they can move a finger set it off on cue, to ‘find’ an implant. “$50, please, shall I continue looking?”
 x
The truth is, meters are hardly useful to find implants. Unless the implant is broadcasting a radio signal, it is not seen at all. If it is broadcasting, it will be extremely difficult to find it while transmitting for numerous reasons, and unlikely unable to tell the implant signal from ambient RF, much less locate it on the body with any useful accuracy. The best way to find implants is with an MRI whole-body scan, but the trick there is to a) get someone to do a scan for the purpose, and b) get them to tell you they found something unusual. The medical community is not friendly to TI issues any more than are Police — which is to say, they will more likely send you to a psychiatrist for help.
 x
RFMeter-HF35C-L.jpgIf you want to find perp attack sources at distance, spend more and get a meter that accepts or includes a Yagi antenna, which dramatically narrows the angle of view and increases sensitivity at distance (again, signals fall off at the square of the distance). Where the meters mentioned above are well under $200, a meter such as the HF35C (German made: Gigahertz Solutions) with Yagi will tend to start at just under $400, but will be limited to high frequency ranges, only, and will STILL not see well into the microwave bands. So if you bought it or something as good, you should likely also get a TriField or similar, for lower ranges.
 x
Note: Almost always, an attack from distance will involve use of a Yagi system by the enemy. If you use a Yagi, your accuracy in angle of view may be good enough that you can use binoculars to spot their antenna. Scan the whole page of these examples of Yagi, and if you EVER find one of these directly aimed at your home, it is almost guaranteed to be an attack device; no such antenna should be aimed anywhere except at a radio/TV or Wifi broadcast source. They might just be after your wifi, but that is still an attack on you.
 x
In such a case, if you can get eye-witness or video document high RF coming from it, you have potential legal-quality evidence of targeting. Increase the usefulness in court by getting an RF expert to agree in testimony that it is a dangerously high reading, and ideally, to covertly himself identify its frequency and strength with more expensive equipment.
 x
The cheapest way to get a higher microwave readings is still over $1,000; The HFW59D, and you are still limited to 10 GHz. So you see that cost vs. performance into the higher GHz is quite a bell curve. But once you get much beyond a thousand dollars or more, you start to get into actual signal processors, and they tend to have a lot of useful features, such as data recording, safe level warnings, time/date stamps, computer interface, and so forth. And while those things are nice, they add such a complexity that even I balk at the notion, and I’ve taught digital electronics I and II at college level, and developed microwave-based security systems. I keep coming back to the TriField as the best overall low-cost single device solution for TIs at large.
 x
Be aware that there are ‘toys’ on the market which can look like better deals. I’ve seen a $129 meter claiming 8GHz, but it turns out to be nothing much more than an old cell phone using the signal strength indicator of the cell phone, and is non directional in capability; you can see the signal, but can’t tell where it comes from. You can spot this device, because it uses the old stubby cell phone antenna, instead of an actual EMF sensor. I would avoid any device using a cell phone antenna.

A TI with RF Measuring Device can = Dangerous Conclusions


Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 
Updated Dec 2017 – Corrected technical boo boo and added a couple of closing paragraphs somehow deleted and not caught. Changes indicated with red intro.
 
What you will learn reading this post:
• all TIs could benefit from professional TSCM electronic sweeps;
• that isn’t likely to happen;
• the poor-man’s TSCM pro isn’t a pro, and might be a fraud;
• there are low-cost meters but improper use can be dangerous in many ways;
• there is a solution, and help implementing it — and here it is…
 

The way it is

A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.

Just some of the gear needed for a professional TSCM sweep completely meeting a TI’s needs.

Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).

Sigh. Add to Christmas wish list, and hope Santa is generous.

The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.

So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.

The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.

A decent start if you have something in the range of $10K to spend. It is virtually a hand-held spectrum analyzer… that unfortunately does not see military gear.

Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.

Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly.  And there is another common risk…

All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.

Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. In fact, it has nothing to do with electronic solution; it only measures the Earths natural EMF. It has no value for personal protection, as I’ve written of, here.

Don’t give up too fast… all is not lost

Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:

Implant quite similar visually (smaller) to one found in my own leg some 35 years ago. State of the art, today, can be 200 times smaller, translucent, tissue colored, and bond with tissue: invisible to a surgeon and to x-ray. MRI sees only an inconsequential image blemish.

a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;

b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;

c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;

d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.

e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;

f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);

g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.

Now as to the other key requirement, proper use

Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.

As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).

These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.

I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.

I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.

Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage).  That, alone is a $12 value. By all means, donate more, if so moved.

Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂

The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).

The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).

Finally, we need to talk about what constitutes a dangerous signal reading on a meter. These devices display information in a wide variety of formats and scales which leave a non technical person with no understanding of what a high reading actually means. It only matters and is useful defensively if and when the reading exceeds safe levels. Different kinds of signals might be deemed dangerous at a lower level than the kinds of signal. For example, pulsed microwave is the most dangerous of all, and can be so at quite low strength. This is normally the main threat a TI faces, but most low cost meters cannot distinguish between them, or measure them correctly. This is not something commonly mentioned in their specifications, and you need talk to their engineers to inquire, to be sure the meter can deal with it correctly.

As far as safe levels, there are many levels established by many agencies of many countries for many purposes. What is deemed safe in one view or situation, may not be save in another view or situation. The nice thing about the expensive meter I use, is that it knows all these limits and indicates when one or more are exceeded. With a low end meter, you need to compare your reading to the various standards. Learn more about such standards, here.

Why am I Being Targeted? A Valuable Question for TIs


Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
 
What you will learn reading this post:
• there are three primary reasons why TIs are targeted;
• knowing which it is can result in better defensive/offensive strategies;
• it is possible to discern the difference in many cases;
• there used to be a fourth kind, but what it really is will surprise you.
  x

The way it is

Of the 12,000 plus persons reaching out to me over the last two decades because they were being targeted with some form of Political Control Technology (PCT), almost without exception, the first thing asked is ‘Why… why me?’ Naturally, there are endless other questions which are also asked, all of them seemingly unanswerable, and all of them deeply troubling and part of the psychological mind games which are inherent in all forms of mind control.
  x
27419003986.jpegThere were three or four possibilities, and the best answer which could be offered up front was simply to cite those reasons, a generic answer which lead to no peace of mind, and which usually lead to even more difficult to answer questions. And yet, to get to the bottom of things and mount a viable defensive/offensive strategy, such questions needed to be answered; you cannot fight a problem you do not understand.
  x
This is why targeting tactics include significant effort into misleading the TI into thinking all manner of incorrect facts about their targeting. Out of the 12,000, I have only ever encountered perhaps 4 who truly had it right. Defending the wrong problem results in failure, amplifies the power of the mind games through frustration of defeats, and sets the TI up for looking insane (or even driving them to that state), almost always another goal of the targeting, the very means of neutralization, and the best measure of success.
  x
And so, in order to get those answers, I established my free Helps Kit (proparanoidgroup@gmail.com), and its use, in turn, enabled me to offer a variety of for-fee consulting services aimed at formulating appropriate combat tactics. In almost all cases, even if not electing my services, the Kit lead to some improved understanding and ability to withstand targeting. The services almost always amplified that result, and in all-too-few cases, enabled a complete stop of the targeting, usually with some form of remuneration or compensation to the victim through what I term a ‘blackmail insurance policy.’
  x
So YES, it is right to ask why. So let’s look at the generic answer, and see where it leads us.
 x

The Three Answers

I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.

1) the actual intended use is ‘political,’ which translates as any form of disapproval of the TI which may require punishment or neutralization short of an assassin. Whistle blowers or potential whistle blowers, cult members evicted from, or who quit the cult, etc;
2) ‘experimentation’… extending the state of the art;
3) ‘training.’ Guinea pigs for trainees are targeted in order to achieve across the board predictable efficiency.
   x
What we used to perceive as a fourth reason was sometimes called ‘Joyriding’. In truth, if falls into experimentation, but not upon the TI — upon the perps. Actual joyriding can take place… the unauthorized used of tech/methods for personal gratification… but more than likely, to the abuser, it is in the realm of ‘political,’ to
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
x
93d5bea6cce0329abcf9fc97431684c0.jpgMany perps are themselves TIs, either actual mind control victims or persons (typically sociopaths or psychopaths) who are put into experiments to see how THEY react in a perp situation based on THEIR psychological profile and the specific circumstances of the TI-to-perp interaction/response cycle. In fact, the TI is almost superfluous to the equation, once their suitability has been determined (their profile), and considered a consumable and expendable item in the project — though controls exist to prevent such harms as might result in Police investigations which might defy cover up arrangements.
  x
An easy example is the infamous Yale experiments on authority conducted by (presumed CIA) Psychologist Stanley Milgram, ostensibly funded by CIA under MK-Ultra. There, volunteer students were given the choice of playing teacher or student roles in what was described as a learning experiment, with an observer who was authority over the ‘teacher,’ who was de facto authority over the ‘student.’ The teacher would test the student and punish wrong answers with an electrical shock, increasing the voltage for repeat errors. There were lies in the mix which changed the reality to something else, but in the end, the observer would instruct the teacher to continue the increases in voltage to the level of lethality.
  x
In that study, those playing student were not real student volunteers, but paid actors, and no one was actually being shocked or harmed. But a similar study by Professor Phil Lombardo, the Stanford Prison Experiments, resulted in actual sadistic violence so troubling that it had was made into a motion picture. There, everyone was being studied, but the guards believed only the prisoners were being studied, so the core experiment was focused on them. This experiment, too, is thought to have had government backing of some sort, as this was in the days of COINTEL and COINTELPRO operations by FBI and the U.S. Army under Nixon, a program thought enhanced and behind much of today’s targeting of citizens. In any event, it had been ‘blessed’ by the American Psychiatric Association, which at one time was headed by former CIA mind control scientists (like all such organizations).

Knowing the difference can alter TI tactics

 One needs to fight the right problem. So it is critical to know which reason applies. There are some general defenses which can be used regardless of the form of targeting, but there are also specific defenses which in the end, are likely more productive. While every TI’s situation and circumstances can dramatically impact on exactly HOW to effect such defenses, and especially offensive responses, what follows below are my ‘generic’ answers which are, unfortunately, somewhat simplistic in description. A TI should be very cautious in experimentation trying to find the best way to implement a given solution.
  x
The key most generics which apply to all reasons for targeting, are a bit more straightforward. Chief among them is to increase site security (i.e., pickproof deadbolt on a primary entrance, all other entrances secured such that only breaking and entering is an option — which perps don’t like to do because it leaves physical evidence in support of the victim’s claims of targeting). That can also mean use of video security monitoring systems, security lighting, and so forth. I am not a fan of monitored alarm systems (most such firms have intelligence community ties), but I do like off-the-shelf component alarm systems, perhaps with online monitoring by YOU.
  x
Another generic tactic is to Stop, Think, then Act, instead of simply to react. Instead of reacting to a targeting stimuli or event, STOP: Think about what they want or expect you to do in reaction, and instead, Act (as actor) in some random contrary way. They use your reactions to gauge effectiveness of their methods, and methods are calculated based on your psychological profile. Acting, done believably (don’t over act, don’t elect a totally absurd response) can screw with them in ways which sees them doubting both their methods and the accuracy of your profile, and cause them to retreat to square one, reducing your trouble and giving you a rest period. However, before that happens, you must brace for increased attack levels, until they accept that something is truly wrong.
  x
And, of course, I also advise at least the first two books in the Professional Paranoid series. The Professional Paranoid gives how-to advice with respect to traditional targeting, which is always part of PCT targeting. The second, MC Realities, gives how-to advice about the PCT variety. The third book, The Defensive Field Guide, is simply a compendium of references and resources, primarily educational and especially useful as ‘proofs’ when trying to convince non believers that the technology and history of its use by government is real. Learn more about my books, music, and videos on these kinds of topics using my WordPress pull down menu (page top). Additional blog posts on topic are also available, here.
  x
Political targeting almost always involves a ‘full-court press.’ The victim will likely suffer electronic weapon targeting, gangstalking, dirty tricks designed to destroy all resources, including finances, relationships, and reputation. They tend to be harassed by law enforcement and other civil agencies, and will likely in time discover they have been implanted with various devices to allow tracking, cause pain, provide voices in their head, and perhaps, suffer use of chemicals and gasses. Everyone will seem to turn against them, for they have been turned by the flashing of badges and requests for ‘help’ by ‘investigators’ of some horrible thing (i.e., pedophilia, terrorism, etc.)
  x
The best defense is to determine exactly what thing it is they fear about you such that targeting was justified in their mind (which may be false beliefs about you). It usually has to do with something work related, or if a college student, something witnessed or experienced at school. Knowing the reason for the targeting will give you the who. With the who, why, and how answered, it is often possible to crate that blackmail insurance policy.
  x
But it also may be that you had already been a victim of childhood abuses designed to create split personalities which could be ‘programmed’ to make you into a programmable person (think in terms of a Jason Bourne or Manchurian Candidate). For every Bourne successfully created, there are likely dozens of ‘failures’ which are kept around to become patsies or for fodder in some future plot. Such persons are often targeted to keep them off balance and looking insane in order to prevent exposure of the greater programming project. If you think you might be one of these, contact me for further evaluation.
  x
Experimental targeting almost always does NOT involve a full-court press. It is usually to test a specific PCT or PCT combination. In some cases, this is actually a better experience as a TI, because of that fact. But in other cases, it can mean very exceptional and horrific targeting levels. Where it is the perps who are the subject of the experiment, it is more likely for the TI to have a  yo-yo experience, even seeming lapses in targeting. Finally, another clue is bizarre symptoms atypical from other TIs. This usually means some new, advanced technology is in play. The more ‘crazy sounding’ the experience is, especially against other TI experiences, the more likely is it experimental tech… unless, of course, one actually is schizophrenic. But even that can be a clue (see training targeting, next).
  x
If it is concluded that perps are the true subjects, you can apply the same defense as advised in the training targeting (next). Otherwise, it is hard to give specific advice for something which may not be based on known technology or methods, but it is just as likely to be based on psychological experimentation as it is technical. In the later case, there will be no bizarre experiences (comparatively). In either event, I suggest you contact me and perhaps we can figure out something to try which is based on whatever is going on.
  x
Training targeting will again feature yo-yo symptoms/effects, and perhaps brief lapses in targeting, but the symptoms will not be atypical of other victims. Because it will involve perps who may be ‘stupid’ about important errors that can be made, it is typically used against people who already have some history of mental health treatment. Schizophrenia, paranoia, or extreme schisms are popular ‘excuses’ which can hide any such targeting errors and prevent exposure of the training project. Authorities will presume the mental state of the victim the cause of their complaint, even to the point of ignoring physical evidence, such as burns on the body, which would be thought self inflicted. As in all targeting cases, regardless of type, reason, etc., I advise never to go to authorities unless you have courtroom quality evidence and witnesses or other proofs to counter any notion of mental illness.
  x
Another clue it is training leads to defensive options. One will see a routine change of players, if one can locate the nearby perp operating posts. Training commonly requires at least one ‘instructor’ and one or more ‘trainees’ at a time. They are not family, and are not in the same social or affluence levels, and will tend to seem odd matches for each other, both in dress, and likely, in age. And, there are likely three sets of them to allow three shifts a day (not always – where targeting varies during the day and is consistent at night, the nighttime targeting may be automated), which would mean a lot of coming and going of different people. And, as there will be graduations, there will be a larger cycle of all new people, which may or may not include brief lapses in targeting, or renewed cycles of targeting experience which might be described as starting low and simple, and advancing to high and complex, over time.
 x
The defense is simply to document the comings and goings, and the patterns of electronic attack signals. Rely on video, get license plates, record times, etc. This may enable you to obtain help from authorities, or perhaps to take legal action. But I warn you, the material must be legally compelling, and overwhelming. You will need a lawyer’s advice more than mine.
x

About Death Threats

Many TIs talk about thinking their perps are trying to kill them. Some talk about actual death threats and events which seem to be ‘failed attempts.’ Some reference  deaths which have taken place as ‘suspicious.’ It is true that numerous TIs have died while being targeted. These deaths are not outside of the norms of actuarial tables for a given group of people, given the many tens of thousands of TIs who actively so identify themselves. And as investigator, I have yet to see any compelling evidence of an actual murder, or staged accidents. I know of only one accidental death at the hands of a perp… which would possibly warrant a murder charge… definitely warrant manslaughter charges.
x
So, despite the insistence of TIs, I am equally adamant that murder is not the intent of targeting. Given the resources and skills of who is involved in targeting, if they wanted a person dead, they would be dead. They would not issue a threat or any other kind of warning, they would just get the job done. And, keep in mind that one reason targeting has been developed and deployed for political use is specifically to avoid murders. Murders can result in investigations which have the potential of blowback. But targeting creates a ‘mentally ill plaintiff’ who will be ignored, and is who is therefor a political (and social, financial) zero.
Therefore, where a targeting situation involves such threats, I deem it to mean one of two things. Either the TIs defenses are becoming effective and they seek to deter… using a bluff… in which case it is likely to be in a political targeting situation — or it is part of an experimental targeting project. In all cases, it is a mind game and should be ignored outwardly, while inwardly increasing defensive posture and alertness. If actual attempts are made, that is entirely another matter, and should be documented and likely, taken to law enforcement. Not that they will do anything about it, but it gets it on the record, such that if things become more serious, they might respond appropriately.

Fake News and Its Suppression: Who Benefits?


Fake News is a political weapon which is designed to cut two ways into your freedoms, and send us deeper into the grip of the New World Order. This case study reveals it.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
x

What is Fake News?

Depends on who you ask, and when.
x
Were you to ask me or the next guy, say five or ten years ago, the answer would likely be ‘fake news web sites,’ those sites which feature click bait ‘BREAKING!’ headlines which are shockingly unbelievable… but just plausible enough to get you to click. If you bother to Google, you often find the story has already been debunked by someone, or that the image used is other than claimed. You also have to worry about sites like the Onion, which use deliberately over the top ‘fake news’ as a form of politically commentary.
x
The stories found at fake news sites, rich with advertising to make them money for your trouble, offer no cited source, no links to a verifying source, typically have no byline (author) cited, or the author is nobody you ever heard of, and they don’t have an About US, or it is next to useless. Often, the site is truly fake, pretending to look like a legitimate news source, either by name, or outright theft of ‘look and feel’ of a mainstream site (i.e., abcnews.com.co has NOTHING to do with ABC news, despite use of their logo). Channel7news.com has nothing to do with any news station, though designed to look like it does.
x
Were you to ask, today, at least half of the country, would additionally answer, Government, and Mainstream Media. Time and again they have been caught promoting stories proven to be false, always for political reasons. In the most recent Presidential campaign, the bias of media was so extreme and visible, that they no longer bothered to fact check Democrat/Hillary claims, and spent endless time fostering false narratives about Trump, story after story after story.
x
medialies
x
By way of example: If Trump said (and he did) “Russia, if you’re listening, I hope you’ll be able to find the 30,000 emails that are missing,” suddenly Hillary and media were claiming Trump was asking Russia to spy on Hillary… twisting the meaning of very clear words intending no such thing, but instead implying Hillary’s sloppy personal server emails were a National Security Risk, already very likely to have been hacked by (anyone who cared to do so), while at the same time highlighting the criminality suspected in the deletion of emails prior to FBI investigation.
x
But if you ask Democrats, or Government, or Media, it is only Web sites which have been critical of THEM or their own ‘news’ stories. They would include Activists and Conspiracy Theorist reviews such as Alex Jones, and actual legitimate news sites which dared go against mainstream in the election, such as FOX News, RT News. Well, I don’t trust FOX to be ‘fair and balanced,’ or ‘unafraid,’ either, but I’ve never seen RT do anything but expose things needing exposing, and reporting verifiable facts, and conduct verbatim interviews without talking over and interrupting, as is common to US mainstream. They would also include virtually all Conservative viewpoint sources, and many neutral sources long accepted as offering verifiable content, such as World Net Daily, Breitbart.
x
The scary part of these lists, which is nothing more than political blacklisting, is that there is a clear focus as to who is being targeted. Yes, they lump in with those they wish to ‘target’ by such labeling, actual fake sites, such as Before Its News and Federal Jack, and that is intended to legitimize via guilt by association inclusion of sites they wish to destroy for political reasons. But when you examine the list, you find out that there is such a focus; it is conservatives (opposed to the current liberal Democrats in power), Orthodox religious sites vocally opposed to select liberal policies, such as abortion, and anyone who faults Global Warming.
x
damlies.jpg
x
In fact, the primary accusation is: “This site publishes information that cannot be validated and that is anti scientific fact.” The grammatical error is theirs (‘that,’ instead of ‘which’). News sites which cite and links to their source can be validated. If you have a problem with the source, go after them. Scientific Fact? What is that? Science continually reverses and revises itself as more is learned over time. When something like Global Warming is involved, where you have legions of scientists who disagree with scientists who have a vested interest in the ‘official science’ for political reasons, the expression ‘anti-science’ is itself propaganda, and disinformation; fake news. Science is only theory until proven and accepted as fact, and that’s clearly not the case when scientists themselves cannot agree, and there is a political agenda involved — in this case the New World Order’s wish to establish Carbon Tax, Carbon Currency, and Carbon Credits.
x
In short, the whole Fake News, as news, in the news, is itself, manufactured Fake News for political purposes. It is so fake, in fact, that many sites listing fake news, do not even identify themselves and tend to pop up overnight, which likely means they are created through the Democrats, Establishment Republicans, George Soros, or their cronies. They, themselves, are fake. Example: fakenewschecker.com
x

How to fight fake news

The problem with fake news as a tactic, even when from media, the Democrat machine, the Establishment Republicans, the CIA or FBI (Agency or individual rogue Agents), George Soros, or from sources in other countries, and of course, professional fake news Web sites, Conspiracy Theorists who don’t know jack, or anyone else… is it is EASY to see if it fake or at least suspect enough to look closer. Do they cite their source with a link? Do they give a byline? Do they dare offer an About Us which is useful?
x
HOWEVER, this only happens (looking closer) if you/we CARE. By heaping fake news upon us continually and endlessly with one thing after another, from fake source after fake source, and through ‘legitimate’ sources, as well — as they have ever since Trump threw his ring into the hat, the defenses of those who support truth and/or trump, or both, are worn down, and we become lax, thinking this, too, shall pass. We stop bothering to look, and presuming that because we see the lie, that others will too, before being hoodwinked. No. They won’t. Apathy and laziness reign.
x
idiots.jpg
x
This is why fake news works; apathy and presumptions allow it to be spread unopposed on social media. The only way to fight it is to relentlessly point it out: “Fake News: no source cited, no links to verify, no author, see what was actually said, here (link).” Or similar. IT IS THEREFORE UP TO EVERY CITIZEN TO REJECT FAKE NEWS, SEEK IT OUT, PROTEST IT, EXPOSE IT, and DECRY THE SOURCES, ALL WHO REPEAT IT, AND ALL WHO BELIEVE IT, ALL WHO BENEFIT BY IT IN THEIR SILENCE.Always check About Us, if they dare have one.
x

Case Study in fake news of the most dangerous and treasonous kind.

 
At the time of this writing, the pushers of the latest and most dangerous fake news are the Democrats, Establishment Republicans, Soros, the current Democrat Government, and George Soros. Their real TARGET AUDIENCE is, in this case, the Electoral College voters who are still being exposed to the avalanche of lies, lies, lies. A lie repeated often enough, in the company of more lies in support, eventually seem as if the truth. The core lie (fake news), is that Trump, Putin, Wikileaks, and select FBI officials conspired against Hillary. Specifically, that Putin hacked the DNC and shared files damaging to Hillary with Wikileaks, in support of Trump, and that Trump conspired with FBI to refute those charges.
x
49279830.cached.jpg
x
It is wholly inconceivable that a Conspiracy can be formed by a single business man, a high ranking FBI agent, the Russians via Putin, and a non partisan Web leaking service (Wikileaks). If they can make enough Electoral College voters believe this lie, the outcome of the election comes into question. The stakes are high, and the hope is that there are enough fools to follow. To believe this latest fake news, you have to believe that:
x
a) that Wikileaks is a tool of Putin, a Fake News story planted by who? The Democrats. Planted when? When Wikileaks releases happened to revolve around Hillary. Who benefits? Democrats/Hillary;
x
b) that Trump bribed people in FBI to refute Russian hacking, a Fake News story planted by who? The Democrats. Planted when? After they lost the election. Who benefits? Democrats/Hillary;
x
c) that Trump and Putin have colluded or that Putin has elected to support Trump over Hillary. Collusion is a Fake News story planted by who? Hillary. Planted when? In the middle of a hard political fight. Who Benefits? Democrats/Hillary. As to wether or not Putin would prefer and support Trump, such is HIS RIGHT, as it is true for every individual and nation on the planet. The U.S. acts to sway elections in other countries, and should expect other countries to seek influence in our own. Hell, we even used mind control on the entire country of Bosnia to sway their elections using Command Solo Aircraft, as admitted by USAF;
x
d) that Putin risked an international incident, and arranged for the DNC computer to be hacked in order to share with Wikileaks, a Fake News story planted by who? The Democrats/Hillary? Planted when? In the heat of the campaign, and again well after they had lost. Who benefits? Democrats/Hillalry. If this was not fake news, why did the ‘honorable’ Democrat Congressmen NOW calling for investigation not call for it on day one? In truth, we now learn, John Podesta’s own personal carelessness with an obvious email phishing ploy lead to the least, and not hacking in the traditional sense as claimed by the Democrats, such that… (see next);
x
e) that all 17 US Intelligence Agencies agree that hacking by the Russians took place and shared with Wikileaks, which means the Office of the Director of National Intelligence, and the 16 INDEPENDENT agencies beneath it, EACH INDEPENDENTLY came to like conclusion through THEIR INDEPENDENT DETECTION/INVESTIGATION. This includes very unlikely Agencies, such as DEA, Atomic Energy, and each spy arm of the U.S. Military, non of which monitor anything more than those Web resources which impact on THEIR INDIVIDUAL MISSIONS. This Fake News was planted by who? Hillary. When? During the heat of the campaign, and again later, after loosing, renewed by Democrats. Who benefits? Democrats/Hillary. Again, if TRUE THEN, why wait until NOW to get upset about it enough to call for investigation? Email Phishing happens all the time, to everyone, and is way-too easy to detect to have been a sophisticated hacking effort by the Russians. It was Podesta’s stupidity, and nothing, else;
x
DO YOU SEE ANY PATTERN HERE, at all? But wait. We are not done, yet. Who are the other players in EACH and EVERY case? The same liberal media outlets that promoted Democrat/Hillary’s other campaign lies through the campaign. Soros. Many of the same Establishment Republicans who can’t stand loosing power to the People. So, who are the real conspirators, here? If you think about it, every player… Republican and Democrat Establishment, Hillary, controlled media, Soros… they are all part of The New World Order, either as front-line politicians with treasonous intent, or manipulated minions obeying orders.
x
I say Treason, because the NWO seeks above all else to destroy the sovereignty of all nations in favor of a One World Government; when your own congressional members and President seek to abandon your own laws and the Constitution in favor of Global laws contrary to your own, it is destruction of sovereignty, and therefore, Treason. When they are Bilderbergers or members of Skull and Bones or the Round Table Groups, which either require oaths which disavow the Laws of the Land or have policies and/or mission statements which support a One World Government, that is a violation of the Oath of Office, and is Treason.
x

Fake News real goal and threat: Democracy, the Constitution, Freedom

If those in media and government who deem themselves sole authority on what is and is not fake news are allowed to do so, We, The People, are doomed. In the tradition of the New World Order ploy of ‘creating a problem’ in order to ‘provide a solution,’ which was pre determined to achieve a hidden agenda, fake news outcry was launched specifically in order to proved just such a solution. By problem-solution-agenda, I mean that the solution just happens to be ready to go in time for immediate application (strike while the iron is hot… the people are lathered up and ripe for exploitation), and has some draconian underpinnings not readily visible without close scrutiny.
x
Example: As I first exposed in the Professional Paranoid Newsletter, and later in my books, The Patriot Act was already written prior to 9-11. Homeland Security was established secretly two years to the day prior to 9-11, but enabled by the Patriot Act, so it could be immediately ‘activated.’ Now comes fake news, and it, too, has ‘just in time’ legislation already written.
x
And lo and behold, both the House and the Senate have Bills already quietly being passed to counter ‘fake news.’ In the Senate, we have the Countering Disinformation and  Propaganda Act, and in the House, HR6393, part of the Annual Defense Intelligence Authorization Act, which has been amended to target ‘Russian Propaganda’ and, by association, other forms of ‘fake news.’
x
Now, the links provided above by me are deliberately from sites being officially declared by government and media as ‘fake news,’ but I defy you to find anything fake in their reporting. They give you the links to the actual material so you can judge for yourself, and reveal anything fake in their presentation. THAT does not meet my criteria for fake news, but because their report is contrary to the official story government would prefer, essentially whistle-blowing, it meets government’s criteria, and by extension, that of a controlled and biased media.
x
The scary part is this. Both of these acts give the government the power to establish what is effectively a Ministry of Truth (a la Orwell’s 1984), which can ultimately be used to completely shut down all dissenting voice in America and elsewhere, especially on the Web. It also can lead to establishing punishment for saying things publicly which oppose government, a de facto sedition law which inhibits free speech. That is one of things we went to war with King George over. 
x
Add into all this the additional censoring by Google and Facebook, and all you are going to be able to do is ‘guess’ what the truth is. Try using Google or any of the major engines to find something out using controversial or heated topics which oppose the official story. It used to be you got exactly what you requested. But now, you mostly get official versions up front, as if you didn’t really know exactly what to type in what you were looking for, and they figured that out, for you. To find what you are actually looking for, you may have to go pages and pages deep into the results.
x
Example: For this post, I typed in “What did trump really say about russian hacking” which produces almost exclusively opinions about what Trump said, not what he actually said. Even the one which comes close, does not go back to his original quote. It took me quite a long time to actually get back to his original quote. This is censorship for political purposes, in this case reflecting the desired liberal/Democrat and Establishment Republican desire to destroy non establishment Trump. To find the truth, ‘guessing’ will not cut it, and neither will accepting media, Google, or government’s claims, et. al.
x
Dig! Dig! Dig!
x

Related Posts:

Psyops TV: How They Dumb You Down and Set You Up
Fascistbook: The Growing Case for Government Targeting via Social Media
x

Who’s Killing the Bilderbergers?


Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com. 

What led to this book? The definitive International conspiracy.

After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.

The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.

 

16819237_985524731587546_4614382031226083422_o.jpg

The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.

The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.

Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page.  But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.

This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.

 

Why UTC matters to this new book

Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.

suiciding-the-bankers

This image relates to one of two strings of real World International murders footnoted in Who’s Killing The Bilderbergers, as cited in this book. From http://humansarefree.com/2016/06/mainstream-media-finally-admits-mass.html

 

Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.

Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.

 

The plot thickens

I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.

bilderberg.jpg

Each Bilderberger tends to be an Officer or Board Member of multiple corporations, and has sway over yet others through major stock holder positions, or contractual agreements. Of course, many of these companies, in turn, control other companies, sometimes, long lists. Now, imagine what this Cloud Map would look like if we knew the actual identity of ALL Bilderbergers, and not just this handful. Then add CFR, Trilateral Commission, Club of Rome, Council on Foreign Relations, and on, and on; the Round Table Globalists; the modern-day illuminati.

By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).

As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.

 

An important detail

And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true.  There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.

 

 

 

Smart Meters, Stray Voltage, and Targeted Individuals


There is a little known and underreported TI targeting method and symptom based on Stray Voltage, which is usually marked by a dramatic prevalence of ‘static discharges’ when touching things. But there are other symptoms, and happily, tests and cures.

 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 
 
What you will learn reading this post:
• What stray voltage is and why it can be a threat, especially for TIs;
• The symptoms and risks of stray voltage (and targeting);
• The possibility of yet another Smart Meter conspiracy;
• How to detect and eliminate Stray Voltage.
 

Stray Voltage?

2000px-Potenzialtrichter_Freileitung.svg.pngStray voltage is the technical term given by the power and electronic industries to a situation where an electrical charge is present in the ground, itself. It can also be present in a structure, such as your home or workplace. It tends to be far more likely to be present at the ground-floor level than upper floors, and is commonly found present at insignificant levels almost anywhere electricity is used. It can even be found in places where there is no AC power nearby present, at all, if there is Quartz bearing rock in the substrate. Concentrations of Ferrous rocks and ground water near the surface can impact, as well.

In structures, the type of structure materials and design can impact prevalence, as can furnishings and the layout of property. And though considered rather rare as an actual problem, for some reason, it is normally thought of or understood as being significantly more problematic in rural farms (especially noted in dairy farms) more than in bedroom communities, though it can be found even in downtown high rise areas. It seems to impact Cows in many observable ways, to include reduced milk production, troubled births, general health and premature deaths.

The power industry takes great care to prevent stray voltage levels from being detectible or able to impact living things, including you and me, but things can go wrong. When that happens, and depending on how strong it ends up being, it can be quite detectible, and generally, unpleasant, if not harmful or even dangerous. Some forms are capable of outright electrocution, such as created by downed high-tension power lines. While this post uses the term Smart Meters in the title, it is less about that, except that a possible conspiracy may exist between Smart Meters and stray voltage, as outlined below.

There are many reasons stray voltage might be present at problematic levels. I see these as divisible into three threat levels and causes. The first may be relatively minor in threat level, caused by natural eventualities unrelated to targeting, and unlikely to escalate in nature. An example might be living near to high-tension lines running parallel to metal fencing on your property, where a kind of induction takes place causing the fence to produce an electrical current.

The second is also unrelated to targeting in causality, but may be far more serious, even dangerous, and quite likely to escalate — such as may due to electrical shorts or combinations of other unhappy electrical happenstances. The important thing to take away is that the bulk of stray voltage may have nothing to do with being targeted, but any presence which is detectible should be of great concern to anyone, and pinned down immediately.

The third? I have recently discovered a new possibility, thanks to a coincidentally… even accidentally discovered set of facts learned from one of my very first TI clients. I say coincidentally, because in considering the new information, it dovetailed very nicely with other client information which had otherwise led nowhere. As result, I am now quite confident that there can be deliberate targeting by artificially creating and controlling stray voltage for the purpose.

It can be used to establish a variety of selectable threat levels and targeting effects (symptoms), to include other forms of electronic targeting. This level is not officially recognized to exist by the power industry, though the potential for conspiratorial knowledge and participation in its use surely exists. One would be unwise to broach the possibility with power companies or other parties, unless part of a legal response effort, as mentioned herein. The good new is, that regardless of the three types, any serious threat levels can be dealt with, almost always.

To weaponize AC power in this way (there are other, previously known and frequently spoken of ways, such as found in my book, MC Realities), simply requires shunting of power to the earth at one or, as is more likely, multiple locations around the property. This would likely be done through a control mechanism to throttle the voltage diverted, even to an ‘off’ position, something akin to a remotely controlled dimmer light switch. Naturally, it will consume significant electricity, and that will turn out to be a blessing, as we shall see.

After reading this short introductory post, a TI would be well served to learn more about the topic, even if not thinking themselves impacted by stray voltage, currently. As the link to that information only addresses the first two reasons, the reader should indeed finish this post, first. After reading BOTH sources, then, and only then should they attempt to fit their circumstances into the dialog and consider the best course of action. Feel free to contact me if unsure, at proparanoidgroup gmail com.

 

Symptoms, regardless of cause

At natural ambient and other low levels of stray voltage there should like be no outward signs discernible. We only need worry about the phenomena if we do start to sense effects. We have all experienced the random static discharge of touching a door knob after walking across a carpet. While discounting such experiences as carpeting woes, they can also be due to stray voltage, which can certainly augment or simulate carpeting-caused static build up, as not all carpets generate the problem to the same degree, or even at all. When you get such discharges in the absence of carpeting, that is a typically a clear sign of stray voltage — though cold dry air can contribute, as well.

Note: normal static discharge is usually relatively high in voltage but low in amperage, quite akin to that associated with spark plugs in an engine; unpleasant to experience, but relatively harmless, more likely to cause injury from jerking away with violent contact with another object, than from the actual shock. They may generate a small visible flash of light, an actual spark jumping a few millimeters, at most. But stray voltage can produce far more varied and dramatic, even dangerous results. There have been instances of seeing discharges which travel inches or even feet, making zapping or popping noises, producing heat. The risk of fire and explosion cannot be ignored, where flammable fumes or pure Oxygen sources might be present. Obviously, the voltage levels in such cases are even higher, as may be the amperage and risk of electrocution.

Basic RGBSerious levels of stray voltage can cause effects similar to other forms of electronic targeting, and may indeed be augmenting such targeting from other sources. In point of fact, especially for persons who also suffer electro-sensitivity, there is a small chance that some persons who see themselves as being a TI may in fact not be. Accidental, or even natural stray voltage might be causing enough symptoms of targeting, by itself, to erroneously presume targeting. This would be good news if the individual is not also experiencing non electronic targeting symptoms, such as organized stalking, or other forms of harassment.
Electronic targeting symptoms are radiographic in nature (radio and electromagnetic), and therefore, stray voltage symptoms, would typically be some combination of any number of things which match those same symptoms. The range of symptoms is broad, from headaches, nausea, dizziness, mood swings, sleep problems, sensations of burning, tingling, vibrating, tinnitus or humming sounds, as well as more unpleasant physiological symptoms such as heart palpitations, chest pains, muscle and joint pains, fibromyalgia-like conditions, twitching or trembling, and so forth. Arguably, there are other symptoms, as well, but these are the more commonly reported ones, and the easiest to identify as being abnormal. That said, the caveat is valid: don’t presume a system does not have a medical explanation; always see a Doctor (without talking about targeting) to make sure you do not have a ‘simple’ health issue in need of treatment.

In fact, stray voltage can simulate or stimulate a variety of general health problems in humans and animals, alike. When doctor’s tests find no other explanation, stray voltage (or other electronic targeting) may be to blame. Some animals are more able to sense stray voltage and will naturally avoid areas where it exists in undesirable levels; they can be ‘Bird Dogs’ to the problem by strange behaviors or health issues. High levels of stray voltage can also cause plants to die, or may result in random discharges between objects otherwise insulated. By way of example, a visible mini-lightening flash between an automobile and the ground or nearby fence or garage door frame.

The interesting thing about stray voltage is that its effects may be amplified by humidity and moisture, or even temperature. Therefore, such effects might tend to be more noticeable if walking in the rain or while wet, as when exiting the shower. Serious stray voltage could make swimming pools and standing water dangerous. But even relatively harmless but noticeable levels of stray voltage can be dangerous, because whatever is causing them could be capable of sudden and unexpected increases to dangerous levels. Take no chances, and deal with it right away, if symptoms are present. See below.

 

Smart Meters and stray voltage; a possible new conspiracy

SmartMeterInstaller_08.jpg

The cover story for the hazmat-like wardrobe used in Smart Meter installation is ‘arc flash’ protection, yet no such precautions are needed for ordinary meter installation. In the UK, the protection is even heavier duty than this; suitable for sci-fi spacemen.

A lot of people, including many TIs, feel that the entire power industry’s move to Smart Meters is a Big Brother and/or industry conspiracy. Like most good conspiracies, there are multiple theories involved, ranging from price gouging to spying to mind control, and more. But the big concern and commonality in many of these theories tends to include the very same health issues as found in stray voltage.

Yet when the industry itself, as well as third-party independent testing firms investigate, most such studies indicate smart meters are no more dangerous than your computer’s wifi connectivity. I’m quite unconvinced about their conclusions, but I also understand how conspiracies work, and how the intelligence community thinks — and specifically, how they think about and employ mind control tactics.

It dawns on me as result of the dichotomy between the reality of Smart Meter user experience and test results, that there may be a conspiratorial answer which explains the conflict. Once a Smart Meter is installed, perhaps Big Brother comes along and uses the Meter to establish stray voltage. That would account for the health effects and higher bills, and certainly still enable spying and mind control capabilities.

The simple fact is, the studies giving a clean bill of health to Smart Meters are only testing the meters and the air waves. They are not testing for stray voltage. So, if you have a Smart Meter and are experiencing Smart Meter woes, perhaps you ought to test for stray voltage. If you find it exists, you will undoubtedly be advised by a lawyer that you have an excellent actionable case against the power company.

Note: It has been discovered that the power industry, in order to address public distrust of smart meters, is instead apparently installing meters which look identical at a glance to the old mechanical meters, but which conceal a ‘trojan horse‘ Smart Meter under the skin. They are, however, supposed to be easy to spot. TAKE NO CHANCES, and check YOUR METER, today, even if an ‘opt out’ user. And, if told you were not getting a Smart Meter and discover a trojan horse, you once more have a reason to contact a lawyer, and the media.

 

Stray voltage as targeting weapon

Deliberately causing stray voltage as a harassment tool is not the only ‘advantage’ to perps. Because electricity can carry embedded RF signatures, it can cause an entire area, such as a home and its yard, to become a kind of transmitter of other forms of targeting signals, just as can house wiring. It can therefore become a kind of amplifier of such methods. But to employ it requires something which should ideally be relatively easy to detect, and defeat.

Simply shunting your existing AC power to ground, a deliberate ‘short,’ if you will, is NOT normally going to be done because the power bill would go up dramatically, and tip the victim off that something was amiss. Therefore, the perp would need a second electrical service on site, which means a separate meter head, which they then ‘weaponize’ for the purpose. In apartments, it might simply mean using a neighboring unit’s meter. In a home, it may mean a separate power line to a concealed meter somewhere on the property or just outside the property line. It may be an underground service, even if the property is otherwise serviced by an overhead feed.

In an apartment situation, all the meter heads for a group of units are mounted at the same location, and labeled as to address/unit. If suspicious, you can wait until a high consumption power period (i.e., using your stove to cook), and then go look at the meters. If you do this when you see signs no one is present at the suspect neighboring unit (not using their stove), but their power meter is drawing more power — you may have found proof of the method and the perp.

In the case of a single domicile, simply call the power company and ask if there is more than one meter assigned to the address, or if there is a meter or extra meter assigned to neighboring lots. If the answer is yes, ask if any extra meter is in use and being billed, or if you might be able to acquire the meter for your own use (to justify why you ask). Any extra meter may be proof of the method and, with some legal steps, lead to identifying a perp.

 

Proving stray voltage

protocols_figure_4To confirm any such targeting, you will need to prove stray voltage is present, the same thing which should be done if symptoms are present and targeting is not involved. There are three ways to do this. One is to call the power company, which has a legal liability to insure stray voltage does not exist, in the same manner that natural gas providers must worry about gas leaks. Another is to call an electrician. Either of these methods can also result in identifying and curing the source cause of stray voltage. It will likely be up to you to document their findings, such as with video or witnesses — though they may be willing to provide written documentation where they bear no liability risk. Again, you probably should not mention targeting concerns to these people.

The third method is less useful in terms of evidence unless you are an electrical engineer or have similar credentials validating the quality of your findings; you can obtain test equipment and test the matter yourself, again documenting every step as you go. It is not quite as simple as the illustrated image, and should involve more than one kind of instrument. The procedures will vary depending on where you need to test, and what the location is like or contains in the way of objects and surfaces. The entire property should be assessed, and if done usefully, will ‘map out’ zones of impact from high to low. More information on the ‘how’ is available online, including that link you should read after finishing this post.

Regardless of which method used, where targeting is suspected, know that the power can be turned off remotely as soon as any perps involved discover testing is about to take place. This means you will want to covertly order any such tests, and ideally, try to find a way to avoid having whomever shows up to conduct the test show up in a marked truck, and having them quickly first test somewhere out of sight from any possible perp surveillance position. THAT is the hard part. Doing that yourself is much easier, of course.

 

Impact, conclusion

If you are a TI or suspect same, I urge all readers of this post to comment as to their findings or conclusions upon further investigation. In two and a half decades of contact with 12,000 TIs, I have only known of perhaps three or four cases where stray voltage was in any way evidenced. As result, it appears to be an entirely ‘unknown’ targeting method (assuming such was the case). I have only recently been made aware of the possibility that a power company can have two different meter heads assigned to a property under two different account names WITHOUT the property’s  owner/renter’s awareness, even though BOTH are in use — by SOMEONE.

It can only serve the greater TI community to learn if this is more wide spread than thus far observed, especially given that it can be easily detected and defeated if and when in use. Ditto because of the advent of Smart Meters, in which case this new information may be a very useful weapon for use by activists against the power industry, and legal pressure (lawsuits) by user-victims. It is equally important because where targeting is not involved, education on topic may lead to resolving a potentially deadly stray voltage of less sinister origin, and address final cure to otherwise unresolvable health issues.

And, in closing, let me state it once more. Any instance of serious stray voltage, even if not related to targeting, likely represents an actionable legal issue; you should consult with a lawyer about suing the Power Company and/or whomever pays the bill on any secondary meter head causing the effect, or any otherwise weaponized meter head.

 

 

 

 

 

TI Defense: 30 Tips to Help Fight Back


If there is one thing I’ve learned after having contact with 12,000 Targeted Individuals over some 25 years, it is that without help, they have no good chance at properly dealing with their targeting. There are many reasons self help fails, and yet the solutions are not that complex.

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 

The TI dilemma

I have never met a long-term Targeted Individual (TI) who did not have the same generalized and massive array of problems. The easiest victims to help were those who had only recently become aware of targeting, as their problem list was much shorter, making defensive solutions easier to derive and implement. But for everyone else, the list of issues was, well, mind boggling. I would see it in the very first communication (typically email or letter). It would be as if a letter about life from Lil Abner’s (by Al Capp) character, Joe Btfsplk, who never had a good thing happen to him or anyone around him.

JoeBtfsplkPanel.png

Note: I am no longer in a position to offer such personal helps. I do still offer a free Helps Kit by email which is useful to the TI in multiple ways, and I’ve written many how-to books on topic which are quite detailed and useful, to date still the only ones of their kind, as far as I am aware. I am still open to email contact at proparanoidgroup at gmail com, and can field simple generic questions, but I no longer engage in situational analysis and tactical advice, investigations, or direct intervention. This post is intended to help take up that slack.

That first contact would be pages long, typically, in story telling mode, and full of unhappy emotion, a hard thing to read; both in terms of eyestrain and emotional drain. Paragraph after paragraph of one problem or targeting issue after another. There would be a long list of events and suspect perps (perpetrators). It would commonly entail problems with their job, their family, their church or other membership, their neighbors, the cops, the legal system, the medical system, their financial situation, their computer security, and more, to include actual targeting symptoms impacting their health, and at times, the health of their pets and their plants.

The effects would be physiological, emotional, mental, and in some cases, impact physical objects. It must have been even harder for them to compose it, than for me to read it. Each such effect might entail a variety of individual symptoms and clues as to cause. Oddly enough, typically NON OF IT IS USEFUL in providing helps. Their valiant and painful plea for help ends up being little more than an exhaustive rant in terms of value in a practical investigative analysis. The ONLY way to tackle targeting usefully, either as a helper or as a victim, is to start completely over, which is why the Helps Kit was evolved; it started over in a way which simplifies, organizes, and quantifies useful information.

A Detective investigating a crime does not want to hear the long drawn out account of the victim up front. They start with a GENERIC description of the nature of the crime from the Cop on the scene (who did get that account from the victim), and then they INTERVIEW the victim with SPECIFIC simple questions aimed at nibbling away at facts in order to find the ones which represent CLUES. “What did you see? What was said?” and so forth, each question hopefully suggesting another. They then use the answers to solve the crime. A good model for helpers and TIs, alike. A flood of data drowns the truth, but point-by-point realizations build toward it.

There is another problem. While their described symptom or effect may perfectly match a known Political Control Technology (PCT) or method, it is also absolutely true that each and every example could also be due to a natural medical situation, or have a simple but yet as unknown social, or financial cause. Since authorities and professionals who are the natural ‘go to’ for help prefer not to believe in the Boogey Man, the assumption is always that a natural cause is to blame. A wise TI would do the same, seeking to eliminate any such possibility.

Failing the wisdom creates more problems for the TI, even when the go-to helper cannot find the natural cause or address it, because it is next easiest to blame the TI for the problem, even to the point of accusing them of being a paranoiac schizophrenic; the easy out. For the record, when working long term with a TI, I will in time discover the truth, and the truth is, purely imagined targeting among those reaching out to me has proven quite the exception. But some might be delusional, of course, but I’ve also learned that persons with mental issues are often selected for targeting in training projects, so that any serious mistake by trainees will be far less likely to draw interest of authorities, who will make the assumption the whole thing was imagined.

 

The bigger problem

packedmeal

Targeting: The covert Elephant in the Room which must be devoured if to well survive, but HOW?

As result of all these things, a TI is faced with so many problems, and so many clues, that they can literally find themselves immobilized by confusion, unable to reason it out, or even unable to cope. And yet, there is always one more problem, far more serious than the rest: they do not understand the truth of their targeting situation. I’ve never known a long term TI who did not have a false belief as to the nature, cause, purpose, source, and method of their targeting. This is by design, a primary goal of targeting; to create a false belief structure which makes it impossible to defend against, because defenses will be aimed at the wrong problem.

This further makes easier another primary goal, to make the victim seem crazy, either by their reactions being seen as paranoiac, or by telling others things deemed insanely impossible. But to underscore, the biggest problem is that their defenses will not meet the need, resulting in failure and frustration, a tool for their tormentors. So, finally, they come to me in a desperate state, not just in terms of needing help, but in terms of simply needing someone to listen to them and actually believe their story.

No one should presume a TI’s story to be imagined or fake, though it is true there are some who pretend for ulterior motives. In time, the truth will out. But because of their failure to truly understand the nature of their targeting, they might have been led to believe almost any untrue thing which cannot be seen as rational. For instance, one victim (who was schizophrenic, as well) believed they were beset by Alien vampires. In truth, the targeting was evolved against the person because they had discovered a firm involved in illegal dumping of biohazard materials, and to insure that her story was not believed by authorities, they led her to so believe. They relied on her schizophrenia to protect them from discovery both as perps inflicting mind control, but as criminals violating Federal law. The schizophrenia, itself, made that easier to accomplish.

 

How to eat an Elephant

The old saying is, one bite at a time. Here are the bites, a series of axiomatic advice points presented in a somewhat stepwise manner, the same things I would normally work through with every client. Remember, only you can decide any risks involved, and take the wisest course of actions based upon those perceived risks. This is merely a guideline of what has worked well in the past, and is generic in nature…

  1. Acknowledge your belief structure has been manipulated and you do not likely truly know the who, what, why, and how of things; you have been deliberately mislead. Following this guideline should help address that flaw, but only if you remain open to the possibility. Educate yourself about PCT and know your enemy, and always seek and eliminate any possible alternative explanations — but also keep in mind the pitfall cited at this post’s end;
  2. Be wary of professionals which we should otherwise rely upon, such as doctors, lawyers, dentists, and private investigators. Most will either walk away or take advantage of you on the assumption you are crazy, or worse, seek to have you evaluated by mental health professionals. The best strategy regarding that, is to seek an evaluation on your own: a written clean bill of mental health can be a wonderful defense if eventually accused of being delusional, even if by authorities. If you must find a professional, including a therapist, your best bet is to go to a city at least 50 miles away, and find a relatively recent graduate (i.e., a lawyer new to the Bar), of some minority race. They are likely to be hungrier for work, and more anxious to do a good job, and less likely to have had their morals corrupted over time by the industry. Avoid saying you are targeted, just tell them your concern and enough facts to get their interest. Answer their questions, but where a question requires an answer which gets into targeting details, give the details, and offer no presumption of cause, even if asked. Let THEM make that conclusion on their own, or not — it should not change how they perform for you;
  3. Cops, on the other hand, will either instantly so peg hole you, or worse, turn out to be in place assets working with the enemy against you. If you MUST do so (as in reporting a crime), or if you choose to become a TI activist or otherwise ‘go public’ (includes any Web presence), follow the advice found here;
  4. Start and maintain an event log. Use a voice activated (VOX) recorder kept on your person to make verbal notes describing questionable events, suspect persons, vehicles, etc. Leave it on to capture events directly, automatically. Transfer this at days end using headphones, to a computer spreadsheet or database file. It should include Time, Date, Location, Description, Details, and your emotional or intuitive thoughts at the time as to what it might mean. Compare new events of the day with older events, looking for patterns, frequent appearances of the same person, vehicle, etc. With respect to persons, give them a ‘code name’ based on their appearance or behavior until able to acquire their actual name. For vehicles, do get plate numbers, but since plates can be replaced or stolen, also note vehicle damage, stickers or decals, and the like. This will help you get closer to the truth of your targeting, and may be useful as evidence at some point;
  5. Remember that if you have a pattern in your life (such as going to work the same general time of day along a given route), so do others. Do not be concerned in such routines to see others around you repeatedly, because other people also have routines which may overlap with yours. DO be concerned if seeing the same person/vehicle at disparate locations and times when out of routine, and especially if also noted while in routine;
  6. Establish site security at home, and to the extent possible, work. My book, The Professional Paranoid will help, but in general, you need to insure no door, window, or opening can be accessed from the outside, even with a key, without breaking and entering. Perps don’t like to do that, because it leaves proof you are not imagining things. The only entrance that should be key accessible, should be via a pick proof deadbolt lock. Put one on your garage door, as well. If you can, install security lighting and a video monitoring system. Protect rooms and entrances or items with simple alarms, and employ and document any trip traps you set per the instructions in my book;
  7. Establish computer security AFTER site security. Backup all files, wipe the hard drive, reformat, reinstall OS, set new password, reinstall apps, restore files. Discard wireless keyboard. Disconnect from Internet. Buy cheap used iMac and set it up to be a local server, connect it to the Internet with Web sharing turned on, connect your main computer to it. Download a Web security monitoring utility to run continuously on the Mac, check it daily. Reset your router/modem to factory specs, install new password. Repeat this process and reset and all passwords regularly, do not use same PW for all. Consider to join the Free Will Society, a closed Facebook Group I maintain (application is via the Helps Kit mentioned in the Note near page top), or any of the many public TI Groups on FB (I am member of many);
  8. Improve personal security, starting with phone. NO CELL PHONE IS YOUR FRIEND. Keep it in a foil pouch, turned off when not in use. Where that is not practical, remove battery and install only to check for calls to make calls, or other use. If a smart phone, there are a number of apps I suggest you install. Mobile Justice from ACLU; an aircraft tracker that sees transponders; Spectrum Analyzer and/or EMF Detector; RSOE EDIS notifier; iTriage health advisor. You MUST disengage certain features. Cary a camera ready to go (not cell phone) and voice activated recorder to document events. More advice in my book, including land lines and general bug detection;
  9. While observing (3,4), avoid trying to deal with the sum total of the problem. It becomes a matter of ‘too many clues,’ per the introduction of this post. Instead, choose any ONE. Then review all others for any which seem related, aligned, supportive, or opposing, and set them aside for study as a subset. Analyze these, alone, formulate a means to prove or disprove each clue, and based on those results, validate, reject, or find the subset unresolvable, and move on to the next subset;
  10. You MUST presume any physiological symptoms are potentially actual health issues and seek a Doctor’s advice. When doing so, do NOT mention targeting, but it is OK to mention external symptoms (pets, plants, etc.) as might possibly be related. Pursue any suggested treatments until no treatment proves useful. ONLY THEN will you know the truth, and be closer to true understanding of your targeting, andy you may actually improve or cure actual health problems as well. Along these lines, anything you can do to impact your physical, mental, and psychological well being is to your good — become a health nut and try everything that claims a benefit, as everyone’s situation and physiology is different, but products seldom attempt claims of addressing targeting effects; you won’t know until you try it — but try only one new thing at a time, or you won’t know which is responsible for good outcome;
  11. Deal with Gangstalking. Very simple. Ignore it. It is only there to jerk your chain, and that only happens if you allow it to happen. You can choose not to be upset, worried, etc. Document it, yes, but laugh at it and them for wasting their time and money. This is simple in concept, and yet hard to do because of human nature. Stop, Think Act, practice, practice, practice;
  12. My book MC Realities offers a very good review of how to detect, identify, and deal with PCT. Once a better understanding is obtained from he previous steps, you can start to defend yourself more usefully with these trial and error methods, which should give you some good specific truths about your targeting.  In general, we worry about implants, which can include voice to skull (V2S), Directed Energy Weapons (DEW) which cause physical harms, mood/sleep control; and other electronic tech which can also account for V2S. The precise defensive/offensive tactics will vary to type and specifics. Shielding is almost always the best defense, but there are so many factors that the easiest thing to do is to shield an entire room for a few hundred dollars, but other methods should be tried first, as that is where the targeting truths can be learned. Where there are problems still encountered, feel free to contact me;
  13. If your targeting involves pain inducement DEW, or you have actual medical conditions which cause pain, ask me for my Jedi Mind Trick, the best way to describe a method I have developed which allows one to mask pain with nothing more than the power of their mind. It is difficult to master and requires practice, but once mastered, it is easy to apply, and for some users, it can also turn your body into an EMF meter for advanced warnings of attacks, and has application to general problem solving, including the issue of true understanding of the targeting’s nature. I use it to eliminate pain from toothaches (a Molar who’s roots were growing through my gums, into my mouth, and into my cheek), burns, fibromyalgia, and even tinnitus, and I can use my hands to find power lines in walls, as well as microwave and EMF sources. Demonstrated it many times;
  14. Once defensive efforts are well in hand, there may be some significant offensive opportunities. These are outlined in my books. Should you think any are appropriate, feel free to run your ideas about implementation by me for fine tuning or other commentary;
  15. As a rule, a TI has no concrete knowledge of the reason why they are targeted. Exceptions tend to be incorrect, as earlier mentioned. Knowing the who and why us the key-most truth, as it can sometimes lead to establishing a blackmail insurance policy. This key can sometimes be discovered in memories.  Go back in time in your mind to a point roughly six months to a year prior to first noticing your targeting. You would be looking for some odd or unusual event or thing overheard or seen. It might be an argument or a document or a conversation which, at the time, did not make much sense to you, but stood out as unusual in some way. Almost always, it is a work related memory, especially if your work had some relationship to government, intellectual property, high finance, or high profile legal matters; the sort of place where conspiracies and dark crimes might hatch, take place, or be evidenced. Should you find such a memory, contact me for general advice on how to verify its usefulness and take advantage of it;
  16. Where defense cannot be well achieved or maintained, relocation can typically buy several weeks to months of temporary relief. Often, simply going mobile can offer at least partial, if not full relief for a time, especially when not in your own vehicle, and leaving behind all personal possessions (new clothes, luggage, etc.) and taking no phone, NOT CALLING ANYONE, visiting online accounts, or purchasing anything on a card. For a more permanent solution, consider residency at Free Will Haven, a targeting-free self-sufficient and low-cost intentional community project of the Free Will Society, which is based on tiny homes living. I myself have been living quite comfortably in about 120 square feet (excessively tiny) for the last three years, and am quite content to do so, sacrificing little in the way of lifestyle, otherwise. Again, an application is contained within the Helps Kit mentioned in the Note near page top.
  17. Be prepared for local, regional, national, or even global social turmoil, be it disaster, civil unrest, martial law, real or false flag terrorism, revolution, race war, or political or financial upheaval. PCT has been being ramped up in terms of victim numbers (some estimates place the national number as high as 12,000,000) and individual intensity. It is my belief that the reason so many people are being targeted and the targeting is increasing, is we are heading to a crescendo designed to amplify any crisis turmoil in order to enable a shift in government form, all in the name of restoring national security and social order. Arrange to have a 90 day supply of food and emergency supplies and basic tools. Leverage your preparedness with a visit my special Facebook pages and review each post found there: the Post Apocalyptic Library of portable survival how-to knowledge; the Post Apocalyptic Local Area Defense Network, especially useful to TIs even without a crises event; and the FEMA, Martial Law, Revolution Database;
  18. Consider dropping off of the Grid; escape the Matrix (there is an actual matrix involved), perhaps even with a new identity. This is seldom possible while still being targeted, but the attempt, if done properly, can buy you significantly more targeting-free time before you are reacquired. This two-part post can help.

 

Additional advice

There are also some common mistakes that TIs make which can be avoided. Oddly enough, almost every TI has already made them, and yet, tends to continue making them, failing to see the risk they pose until till late. Here is a summary list, but remember, there are no hard and fast rules. There can always be an exception. If you think you have encountered one, contact me for review to see if I might not agree, or why not.

  1. NEVER seek help from authorities or ERTs due to targeting, itself. If an actual injury or crime is involved, such as vandalism, death threat, theft, etc., by all means report it, as having it on record can be useful evidence of targeting for possible use at some future point — but do not mention targeting concerns, and once more, follow the guidelines found here. If questions are asked as to why someone might undertake an action against you, you CAN mention that there have been strange things happening and you might choose one or two examples, if asked to cite them, but state you have no understanding as to why anyone would do so, and that you have no suspects (even if you do). The last thing you want is an investigation which concludes you are mental, which is where it almost always will end up going the moment you deviate. It may be wise to apply this rule to friends and family, and certainly to co workers, as you can end up destroying relationships with disclosure. The only exception should likely be limited to those living with you, and even then, you will pay a price. I lost a wife and a foster daughter to it, and possibly another daughter;
  2. NEVER react to targeting stimuli if you can avoid it. Train yourself to Stop, Think, and ACT, do not REACT. You, STOP yourself from reacting, THINK about what they are trying to cause you to do (i.e., get angry), and the ACT contrary to that in some random manner. This both negates the purpose of the targeting, and causes perps all manner of concern, either about the validity of the psychological profile they had prepared on you in order to determine the best targeting methodology, or the operational reliability or skill of any equipment or perps involved. This can at times lead to dramatic increases in targeting efforts, but if you continue the ploy, it will lead to them trying to ‘repair’ whatever problem they think is the cause. That typically results in a small rest period of no attacks. Eventually, it can destroy the effort entirely, especially if this method is applied by someone in early targeting, as it prevents them from advancing to other kinds of targeting, or they advance and abandon the failing method(s). This, and use of the Jedi Mind Trick, and numerous blackmail insurance policies (each time I created one for a client, it protected me, as well) is how I have managed to negate nearly three decades of attempted targeting and its consequences; I do not consider myself a TI, because I keep winning;
  3. NEVER be overly concerned about death threats, being followed, or about gang stalking events, it will simply make you wax paranoid, and be seen as such. The people who engage in PCT would simply kill you, not threaten you, if they wanted you dead. Unless a threat was quite specific and included a warning that you should do or not do something, ‘or else’ vividly described, it has no basis in any real threat. If you get a threat with such a basis, that basis must represent a clear and present danger to THEM, in order to be valid. Telling you to stop being an activist, or stop investigating why you are being targeted, does not count, unless perhaps, you have gotten to the point where you can CLEARLY identify and prove with legally useful smoking-gun caliber evidence the who, why, when, what and who of it. In such a case, you have the makings of a blackmail insurance policy which can not only counter the threat, but force capitulation and even remuneration for your troubles at their hands. That was how I ended my first targeting, and was offered $40,000 per my demand. It has become the model for all client help efforts ever since. Being followed or gang stalked is merely a jerk-your-chain tool that goes back to Stop, Think, Act. The only real danger is in giving into it. The only targeting which is a real threat is PCT based on electronics of one kind or another, chemical or biological assaults, physical abuses (i.e., rape, beating, accessing you while you sleep), and dirty tricks which impact finances, relationships, reputation, and the like;
  4. NEVER presume another TI, TI activist group or organization, or general Web resource to know what they are talking about regarding PCT or solutions, for the likelihood they have it right is very low. Take it with a grain of salt, and tuck it away for comparison to other resources. Books are a far better bet at getting at the straight dope. Older books will by now have a reputation establishing usefulness. Avoid newer books or other sources by anyone claiming to be an insider, ex intelligence operative, or other ‘expert,’ as they are likely providing disinformation to insure you continue to fight the wrong problems;
  5. NEVER hook up with another person, especially another TI. There are many reasons this is important advice, and I assure you that the risks you undertake with even a casual date or one night stand is significant. I see it play out again and again. Rare is the TI that can better their circumstance by not living alone, and a sexual adventure is far too easily a set up opportunity of one kind or another;
  6. NEVER pay money to anyone offering implant scans, ‘scientific’ testing, or new age solutions without EXTREME CARE; it is likely a scam, even if there are YouTubes or personal testimonies, the likelihood remains high. Research, research, research. Even if you actually did locate an implant by some method, the number of people able to have an implant removed can be counted on one hand; the medical industry will not cooperate. I have yet to see any positive results from testing services or new age approaches, but if you want to submit a chemical sample to an actual laboratory for chemical or spectrum analysis to find out what it is, that is worth the time and money;
  7. Avoid participating in poorly conceived TI activist efforts to outreach, or outreaching directly yourself. By poorly conceived, I mean an effort which does not heed the advice employed here. At best, such efforts defame and set back the TI movement and each person associated with it, labeling them as mental. Many of these efforts are designed and promoted by perps, and used as a kind of ‘evaluation survey,’ especially those asking you provide personal histories or statements. If legitimate, such statements will tend to seem crazy to anyone not already believing that targeting is real — adding another ‘crazy story’ to a stack of them will not change their minds.

 

Other facts to consider

The following may temper your views in seeking full understanding and formulating defenses. Simply keep them in mind when reasoning things through.

  1. Many perps are themselves victims of mind control, typically the worst kind, the Monarch/MK Ultra kind. They know not what they do, literally; they are programmable people based on multiple personalities which can be triggered at will. While some perps are psychopaths, these, are not, though they my be controlled to exhibit the same behavioral traits;
  2. You may be such a programmable person, yourself, and like them, not be aware. If such a person, and also targeted, you represent some form of ‘failure’ in the programming, and the targeting is designed to neutralize any damage you might cause to the program if you become fully aware of your true situation, which is a real possibility as you work through understanding and defensive efforts. The important and terrible truth is, that such a person will sabotage their own daily efforts in this regard, and make no progress whatsoever. Such a person will likely exhibit many additional symptoms as found in my book, MC Realities. Most notable among these is a question or belief they were targeted or abused as a child, or themselves have  abuser thoughts or have so abused. Should you come to suspect you are a programmable, you should contact me for special advice too complex for this forum;
  3. All PCT is Satanic in nature, origin, and intent. Your enemy is as forecast: Powers and Principalities, and there is scientific proof available. Therefore, your best ally is religious faith, and the best faith for the purpose is Christianity, and the best Christian Church (because it is acknowledged to hold closest to God’s Word in the original Greek and Hebrew translations) is the Wisconsin Synod of the Lutheran Church. There is a whole chapter in my book, MC Realities, which explains exactly why this is true in both practical and Biblical terms;
  4. You will hear it said all the time, that TIs fear they are being murdered, or that they have been murdered. THERE HAS NEVER been such a case. Being a TI can certainly mean to be suffering in great pain, and it may certainly to some, at times feel like it has the potential to kill. But thus far, the only known deaths of TIs have been from suicides or accidents, or natural causes such as old age or disease, according to official records. While it is true that there are ways to fake such deaths and such ways are known by our enemies… and it is true that some potentially deadly illnesses such as cancer may be caused by targeting… death is NEVER the goal. They invest perhaps a quarter-million dollars a month on a full-time TI. There is no point in killing off such an investment. So the only deaths which bother me are the suicides, because that kills not just the person, but effectively the soul, as that is the only unforgivable sin; a sin against the Holy Ghost. If you give in to it, you are surrendering to your enemy, Satan, not just the perps. I am in communication with literally dozens of persons who have professed to have been being murdered as far back as 1992 or so, and they are STILL HERE, some of them still making the claim from time to time. Only two out of 12,000 are known to have died, one of old age and disease, and the other in a traffic incident;
  5. There is no place one can go where targeting is not likely to follow within weeks to months, save one or two foreign countries. The only one of these that has been verified by multiple TIs, is Ecuador, which to me does not make sense, but it seems to be true, with three such instances reported to me personally from TIs I had vetted as legitimate TIs.

Why Stand Alone in a Crisis? Join the P.A.L.A.D.I.N.s


What will happen if a natural disaster or social upheaval comes and government cannot, or will not be able to defend you, your home, or your community? When armed marauders or looters come, will you stand alone, or will you have your own local network of helpers: Paladins?
 
 

by H. Michael Sweeney proparanoid.wordpress.com   Facebook   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or link to original posting.
 
Reading this post you will learn…
 
• there are disaster and upheaval threats not even government can always quickly address;
• individuals cannot well defend against marauding gangs and other threats in a crisis;
• Paladins (modern-day ‘Knights’) may be a simpler, easier, safer solution than Militia;
• Paladins can be useful at any time for humanitarian missions of their own devise;
• Paladin Units (unite) can protect each other, their communities, and beyond, as needed.
 

medieval-armored-knight-on-horseback-sampleWhat is a Paladin?

“Paladin” is another word for Knight, a kind of soldier of good moral character who in times of Olde served his fellow knights, community, country, and God. P.A.L.A.D.I.N. members are similar, and yet different. They are somewhat modeled after the Paladins in the popular Fallout computer game series, but THIS IS NO GAME. Fallout takes place in a future post apocalyptic World where there is no government, and everyone is struggling to survive, which literally means at times, kill or be killed, perhaps even eaten by others. Several groups compete for control with lust for power as their agenda, but the Paladins were formed in an attempt to maintain order and protect against such threats — a bit like self-organized Police the people come to rely upon.

Almost no one is truly prepared for disaster or civil upheaval. When it strikes, the impact of the disaster is therefore nearly total. All one has to do is look back on Katrina, or any other major disaster or upheaval around the World where local governments were unable or unwilling to respond — to see the value in not having to stand alone in a crises. FEMA and other government ‘help’ in Katrina was less than ‘useless’ for an extended period of time, actually causing more harm than good in many cases. Local law enforcement was either unavailable or, at times, a serious threat to many a resident’s well being. Likewise for the National Guard.

13876320_10210169148370880_2061305116399531104_n

Is this you? No go bag, emergency plan, store of supplies? No guns and ammo, survival skills? No hope, no future?

In such events, local governments at any level collapse and become non existent in domino fashion, while regional and national governments play political waiting games. The following is a quote from From Disaster to Lessons Learned: What Went Wrong in the Response to Hurricane Katrina?

The Dissolution of Government

As noted earlier, disaster response in the U.S. is predicated on a system of “cascading failure,” in which successively higher levels of government are called in as lower levels are overwhelmed. However, the system requires some government to be in place. When the storm hit, local government in New Orleans, for all intents and purposes, ceased to exist. Both politicians and administrators had evacuated prior to landfall, and what little structure was in place was immediately rendered ineffective. The severity of the disaster also paralyzed state government and stunned federal government officials. A period of many hours passed before coherent calls for help began to travel up and down the system; even then, they were generally unfocused and nonspecific. Mayor Nagin’s media appeals for the federal government to “send everything” were heartfelt, but were so general they were difficult to act upon.

Meanwhile, at higher levels of government, a political showdown was brewing between the White House and Gov. Kathleen Blanco of Louisiana. Louisiana’s National Guard was heavily deployed to Iraq at the time of the storm, and the governor had activated pre-existing agreements with other states to “borrow” National Guard troops prior to landfall. These troops were quickly moved to the area, but the White House wanted to federalize the troops, while Gov. Blanco wanted to keep them under state control. The White House also disputed the timing of the governor’s request to release active-duty military troops into the area, although later evidence showed that the request had come much earlier than initial White House claims.

 

Even once on site, FEMA and National Guard, et. al., cannot be everywhere at once, and they cannot solve all the problems and threats people face. In some cases, policy or needs dictates result in harm to individual residents, mostly unintentional, but at times, intentional. In the end, almost everyone needs to fend for themselves for a protracted period of time, and that often means defending themselves from each other, or facing general extreme hardships or death, alone.

In Katrina, nearly 2,000 died, and many died at the hands of others (including authorities who opened fire on crowds trying to escape across a bridge). There were, in addition to looters and aggressive authorities, at least one known roving gang of vigilante Whites who had set about to kill Blacks they deemed looters, ‘loosely defined.’ The true number of murders is unknown; few records were kept given the mass casualties, but ‘bullet riddled corpses’ were not hard to find. Where there is no law, lawlessness ensues.

Bad things happen

Disasters are all too common, some worse than others. But imagine an outright siege caused by insurgents, racial violence of the sort this country has recently seen, or even military invasion such as foreseen in Operation Lion Dance; where Chinese flood into America via the Canamex rail system, hiding in container cars which can be parked on any rail siding in America from a laptop. Or perhaps it is simple revolution or civil war born of irreconcilable political differences. There are many such threats, none of which are especially likely, but all of which are specifically possible.

P.A.L.A.D.I.N. stands for Post Apocalyptic Local Area Defense Information Network; the core organization. Do not let the gloomy sounding name deter or fool you. While it certainly could be a possibility that doom and gloom awaits us on a regional, national, or global scale (it is after all forecast by virtually every religion and many experts in military, financial, and political circles), any simple disaster or localized upheaval can result in a crisis government is unable or unwilling to address quickly. It is even possible, some believe, that government might become the cause or actual threat themselves, such as in a military coup. But if having Paladins available to help you fend off a crises in a post apocalyptic tragedy, how much better then that they could be available in a lesser threat, such as a killer quake or storm?

Here are just a few such threats — do you have everything in place to survive? Will you, alone, be able to defend them from those who do not? Or will you be waiting for government to get around to attempting to rescue you, not as a soul in need of help, but a mere politically acceptable (expendable) statistic should they fail?

• Sudden Poll Shift — a sudden shift could melt the ice caps and cause serious globally felt quakes
• Sudden Ice Age or Ice Cap Melt — choose your favorite scientist and worry with them
Super Volcano — doomsday shroud encircles the planet killing all crops, causing ice age
Super Earthquake — hundreds of thousands or even millions could be homeless and helpless
Asteroid Strike — we’ve already had nearly a half-dozen near misses in the last twenty years
EMP Attack — total loss of all things electric, throwing us into pre industrial age
• Solar CME Flare — same as EMP attack, but potentially global in impact
Planet X — we know it’s coming soon, its effects upon Earth could be catastrophic
Nuclear or Bio Terrorism — could render an entire region helpless
Pandemic — we keep coming close to having one, it’s only a matter of time
Financial Collapse — what happens when money has no value or is unavailable?
Civil Insurrection — race war, revolution, response to Martial Law, gun seizure
Military Coup — a top U.S. General has forecast it possible
• War or Nuclear War — no nation is immune from invasion or sneak attack
Alien Threat — leaders of several nations and scientists have said it possible
• Prophetic End Times Tribulation — seven years a mix of the above, or worse
 

The P.A.L.A.D.I.N. concept is simple, and addresses an important question: is it better to stand alone trying to protect your home and family against armed marauders or other dangers seeking to take what you need to survive from you, even your very lives… or to be prepared? Prepare a go bag and survival supplies, by all means, but to become a Paladin is to pre establish a local mutual defense network which can protect you and yours, your fellow Paladins, your community, and by extension, your country and way of life. P.A.L.A.D.I.N. is a non militia solution that can effectively become functional equivalent of a small and focused militia — on demand. It does not suffer the overhead and commitment of a militia, nor the political tainting.

Paladins may also elect to engage in general humanitarian missions at any time, for any reason or cause; actively active activists. This includes the possibility of providing aid to stalking victims, the homeless, or anyone being unfairly treated by another group in some way which cannot be well addressed by local authorities. It can even mean choosing to side with civilians against authorities in a non violent protest; whatever the Unit deems appropriate. Were I a Paladin near to the tribal protests in the Dakotas over the oil pipelines, I would have urged my Unit to give on-site support, for instance.

paladin

Armor wearing Paladins standing guard in Fallout 4, by Bethesda Game Studios (fallout4.com)

Everyone should join!

Anyone who has much to loose if accosted by armed strangers in a crises should join. Stalking victims and other persons who have experienced unusual targeting should definitely become a Paladin. This will enable you to call upon other Paladins when threats return, and help to document, prosecute, or thwart such targeting. Activists should join Paladin, as it becomes a tool useful in a cause, where you can make good argument to fellow Paladins to engage with you — and enables protection should those opposed to your cause elect illegal harassment campaigns against you (target you). Minorities and others who are consistent victims of gang harassments should also join, as it provides yet one more ally and strengthens your ability to stand against aggression, especially in rioting. Ex military should definitely join as an alternative to a Militia, which often has a bad PR image due to a political or religious bent they may have assumed. All are welcome.

To be a Paladin does not require ownership of a gun, but it is ideal.  To own a gun does not require good training or a military background, but it is ideal. Weaponry and combat skills are only important WTSHTF big time, and most gun owners do know how to handle themselves, and they also tend to own more than one weapon, which means that in a pinch, they can share, teach, and lead. The primary requirement is to be of good moral character and to care about your family, your community, and your country. The rest will take care of itself; unity is the key factor.

P.A.L.A.D.I.N. Units of 6 or more Paladins are formed in any given Zip Code once at least half of the members do have arms, and at least one of them has some military or leadership background suitable for acting as Commander. Such leaders are provided with tactical advice on formation and operation of their Unit, and given contact information for any adjacent Units. Paladins can then call upon each other to request aid, or to propose missions to aid others. There are provisions in the formation of Units which allows local Units to join up for improved functionality, and for like hookup with Units in other communities, should regional operations be necessary.

Membership is by default anonymous except between Unit members and adjacent Unit Commanders, but that does not mean members must remain secret. Indeed, public evangelism and recruitment is encouraged (promotional materials will be made available). There is no membership fee to join. However, once a Unit is formed, a small annual membership fee determined by the Unit can be assessed to help fund missions or enhance emergency response capabilities. There can be some small personal expense in order to facilitate Unit functionality, such as the purchase of a Walkie Talkie by each member.

Each Unit is autonomous and stands alone in responsibility; it is not a political body or under the command of a national head, such as myself, even as founder. Therefore, there is no legal liability or risk except for those actions the Unit itself elects to undertake. I am not bound by your actions, nor are yours dictated or bound by mine. You serve only your own Unit member’s best interests and mission goals for public good, and remain subject to all laws in the doing, each member insuring the next does nothing which threatens Unit integrity or viability.

There is no political leaning or bent, nothing which should alarm authorities. In fact, Units should consider making themselves available as volunteers to authorities as emergency helpers or, where law enforcement has such programs, reserve deputies. In such a case, each member is free to participate or abstain, which is generally true in all missions. Units should be prepared to submit to lawful military or law enforcement once order is restored in a crisis, and should maintain records of all actions for use by any needed law enforcement investigations after the fact. That serves both as protection for the Unit and members, as well as a means to prosecute evil doers who may have been confronted by the Unit. Everything is above board and transparent within the Unit, and as private or as public as the Unit itself elects.

TO JOIN: simply email your interest to join to proparanoidgroup at gmail com and provide your City, State, and Zip. This does not obligate you to anything. This will be used to update a database of members maintained anonymously at my Facebook page for the purpose. That page is organized in a way which allows determining if a Unit can yet be formed in a given Zip — your evangelism in recruiting other members is key to that eventuality.

Once a Unit can be formed, members are so advised and connected to one another for the purpose of determining if they should form, and if forming, deciding who will be their Commander. They are also provided with additional support advice on how best to proceed as a functioning unit. Once forming, individual members are then obligated only to commit to the goals established by the Unit for mutual self defense and whatever additional good they may do for community and beyond, in or out of crisis (missions.) Risk and investment are minimal. Rewards can include the possibility of continued life, liberty, and pursuit of happiness — in the face of dire circumstances bent on preventing same.

Other material to consider

mlawThe Post Apocalyptic Library is an important collection of life-saving information  commonly beyond the average person’s current knowledge base, and which will NOT BE AVAILABLE once disaster strikes. It is a series of links to critical information which can be learned online or downloaded and printed for placement in a go bag or emergency supplies for later use. It is advised that extra copies should be made in advance for handout to others.

The FEMA, Martial Law, and Revolution Database is a collection of materials which seek to educate the public about individual risks and likelihood of events beyond their control, and/or give advice on how best to survive or react. It is an eye opening review of little known facts which may prove quite sobering. Don’t be yet another Sheeple caught totally unaware.

opt-out
Dropping off the Grid: abandon the Control Matrix
. This author has done so for the last three years, and though living a rather spartan life by comparison to what came before, the freedom is enhanced, and the quality of life (happiness) with it. Living simply has proven to be more satisfying — and should be much safer in the event of major troubles. Here is a snapshot of possibilities. I will soon be offering a Seminar or other promotional venue (i.e., video) on the topic.

An Intentional Community is one way to live off the Grid. Here is one example, a low-cost, self-sufficient community based on tiny homes, a project of the Free Will Society I founded to helped stalking victims: it is called Free Will Haven. It has a gofundme. Such a community is by default more or less the functional equivalent of Paladins.

 

 

 

 
 
 
 

The Pitfalls of Presuming TIs are Schizophrenic


After working with over 12,000 persons coming forward for help with targeting over the last two plus decades, I’ve learned a good deal more than just found in my earlier books. There has never been a Targeted Individual who has not been accused of schizophrenia. While that can be true, it is often not true, and even when true, targeting may also exist. The issue must be dealt with head on, and with care, lest it become a stumbling block beyond cure.

by H. Michael Sweeney proparanoid.wordpress.com    proparanoid.net    facebook

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Updated March 1, 2017: General editing and additional commentary and color coding of text for improved clarity.
x
What you will get by reading this post…
• Targeting symptoms generally match schizophrenia symptoms;
• most people, especially professionals, automatically ssume schizophrenia;
• true or not, the possibility of schizophrenia should not be ignored;

• there are good and bad ways of addressing the problem.

First impressions DON’T count

When I’m first contacted by stalking victims for help as online consultant, the stories told me tend to border on what people unfamiliar with the subject would think impossible. The ‘natural’ conclusion, especially for professionals in health care, law enforcement, or governmental authorities such a person might turn to for help with their enemy and/or suffering… is that the person is suffering something in the realm of paranoia or schizophrenia. That is not always wise, but unfortunately, it is quite unavoidable, and for two reasons.

mkultra_page_001The first is that the symptoms of targeting are by and large identical to those of schizophrenic episodes. Hearing voices or seeing things no one else does are perhaps the most well known examples, all things that can be simulated with advanced electronics; voice to skull can be achieved by multiple methods; Sound Canons and other tricks can create otherwise unbelievable visual aberrations. But also, the general belief of claim that people are following, spying, or threatening, especially in numbers, is seen as a symptom. Enter gang stalking methodologies.

The second reason is less coincidental. People simply don’t want to believe in the Boogeyman, especially officials and other professionals, because trying to deal with something they can’t see evidence of being true is beyond them. That is their failing, often a thing wrongly taught them in their training. Often, that training was crafted by people who helped develop targeting methodology, former CIA mind control scientists. This has been well documented in many books, some of which were written by retired CIA types, and as referenced in my own book on topic, MC Realities.

This is especially true of the DSM series of mental health manuals, because at one time and even currently in some cases, the history of heads of collegiate psychiatric departments and EVERY professional association to which a psychiatric professional could be member… as well as Industry watch dog or promotional organizations… can be traced back to the original CIA mind Control Experiments as CIA employed researchers. As they die off, new ones are recruited, and the false narrative… a ‘lunacy’ about lunacy, goes on.

When Congress investigated CIA (and other agencies) in the Church and Rockefeller Committee hearings in the 1970s, CIA officially (claimed*) they had already shut down such programs because (they claimed*) they did not work. They then quickly scattered the CIA scientists involved to form three kinds of groups:

a) institutional and professional groups which insisted MC did not exist, did not work, and that anyone thinking otherwise was mentally ill or, in the case of professionals, guilty of malfeasance or malpractice;

b) like groups which pretended to seek and ‘help’ victims of MC; and

c) into key positions of power and authority within the psychiatric professional associations (all of them), and collegiate Psych departments, where they not only taught the preferred view about mind control, but also helped to write the DSM series of ‘bibles’ used by shrinks in diagnosis/treatment.

*Claimed?

Ironically, the most notorious of group (b), above, was the Cult Awareness Network; CAN, which was consistently called upon by government to help ‘resolve’ crisis arising involving the so-called ‘suicide cults.’ CAN has since taken over and operated by the Church of Scientology, seen by many as a mind control cult in its own right. This was a favorite area of CIA mind control experimentation, trying to find ways to get large numbers of people to kill themselves as a collective. Read Psychic Dictatorship in the U.S.A., by Alex Constantine, for a long list of such experiments. Alex, by the way, was targeted for his writings, and went into hiding for a time. The other purpose of group (b) is to recapture persons who may have escaped mind control projects or who, due to mental issues, may become good subjects as training fodder, and brought into such projects.

What makes it ironic is that CAN advice and helps (pre Scientology) consistently resulted in the mass deaths of those being helped, examples being WACO and JONESTOWN. In both cases, the CIA plants within the groups ‘miraculously,’ managed to survive unharmed, and quite by ‘coincidence,’ the leaders and core members of those groups had previously been in spheres of influence of MC scientists in group (c), above. More could be said about such things, and have been, in MC Realities, Alex’s book, and others. But starker proofs such claims are false exist.

In my first book, The Professional Paranoid, I cited in the Appendix some 400 CIA fronts and influenced organizations which predominantly predated the Church/Rockefeller hearings. Almost exactly half of those had to do with Mind Control. CIA book vanished that book by buying all available copies from suppliers, having one of their own publishing fronts invest in my publisher with the proviso my book not be reprinted, and then ‘selling’ used copies for nearly ten times their face value so that people who had copies would sell theirs for a bit less… and then buying all those up, as well. It is a common CIA trick.

But my publisher was a good guy and he returned the book rights to me, something CIA had failed to think of specifying he not do. So I now effectively ‘self publish’ using print on demand for hard copy (through paranoiapublishing.com), and ebook versions directly through me (proparanoidgroup at gmail com. This makes it impossible to book vanish. Subsequently, in my third book in the Professional Paranoid Series, The Defensive Field Guide, I included 1,000 CIA fronts, almost all of the additions coming into existence post Church/Rockefeller hearings. Guess what? STILL — over half of them were/are involved in mind control related operations. CIA lied to Congress.

The unexpected result of my books was that they sponsored a flood of requests for help from victims of targeting. The overwhelming majority of such requests were from people suffering some form of mind control technology or methodology, most notably, organized ‘gang’ stalking, and/or Directed Energy Weapons (DEW). As result, I felt obliged to attempt to offer professional online consulting services to attempt to help such persons.

This is a very difficult thing to undertake for more reasons than just the communications issues forced by being limited to dialogs at distance without more personal on site direct involvement. While I also offered direct intervention services, they were always beyond the financial ability of the victims; mind control is never worked upon the wealthy unless they first attack and destroy the victim’s financial underpinnings.

Early on in offering such helps, and even in trying to sell my books in the first place, the issue of mental health questions loomed large due the Boogyman Disbelief Syndrome. BDS is a form of mental illness (not found in the DSM, of course) which causes professionals to ignore facts in the Congressional Record, scientific papers, patents, and books by endless authorities on topic, and insist therefore that persons claiming to be targeted are ALWAYS mentally ill, per the DSM bible they worship; they live and work as if in a cult, themselves victims of a form of mind control, the very thing they deny exists.

I have personal proofs I can speak to, as well. I ask professionals who think only schizophrenia possible to explain how it is that, with my defensive and offensive tactical advice, it is possible that some TIs have obtained the ultimate relief? By that, I mean total ending of their problem in ways which prove it was not a mental issue. The proof being in the form of paying huge sums of money by those guilty of targeting as retribution, and/or providing ‘dream jobs,’ record contracts or book deals, and so forth.

The Elephant in the room

dsm-grows

The Bibles of the ‘Psychiatric Cult’

That unhappy irony aside, Virtually ever TI, if telling their story in full, will make claims they assume to be fact which seem impossible to the listener, especially if unfamiliar with the topic. After thousands of such stories, even I can still be surprised. As stated, the natural conclusion is some form of mental defect in need of professional care. Especially if the listener is a psychiatric professional; the DSM tells them what to believe true — that schizophrenia is the only possible cause for targeting claims.

It was therefor proper that I early on advised that some form of schizophrenia or paranoiac affliction must always be considered a possibility. However, I also told clients that EVEN IF TRUE, it did NOT mean the person was not ALSO targeted, something no psychiatrist seems able to ever consider possible. In fact, that TI circumstance is actually quite common in my decades of experience of working with TIs. I therefore chose by policy to ignore any and all clues of potential mental health in any decision to proceed to offer helps. The only SAFE presumption by ANYONE professionally offering help is that targeting must be considered and investigated. To do less could leave one legally liable.

One additional reason to so proceed exists, and it is unique to true targeted persons. One of the primary goals of targeting is to reduce them to a political, social, and financial zero, and the main method employed is to make them LOOK insane, as quickly as possible. One way to do that is to mislead the victim into believing things true, which are untrue. Therefore, any general belief expressed by a TI which seems unbelievable may be explained by this fact, and is yet one more reason not to dismiss the claims as baseless; they are in fact, mere symptoms of targeting as much as of potential schizophrenia.

There are countless ways this can be done, and two key benefits are derived by the tactic. The first is that the implication of insanity is achieved, which leads to denial of helps even from loved ones. Destruction of personal relationships and other help resources is also a primary goal. The second is that the TI will end up fighting a non existent problem, and in making no headway, more quickly succumb to giving into feelings of defeat, breaking their will to resist. IT IS A TRAP, one I never allow a victim to fall into.

I have, therefore, never turned someone away regardless of how much it appeared their problem was mental. For one thing, it was quite often found true in time that persons with various mental issues were (and are) deliberately selected for targeting because of that fact, especially if the purpose of targeting is training exercises; any mistakes that might end up involving Police will be immediately dismissed on that same ‘presumptive’ basis. So it is absolutely possible that targeting and mental health issues are present in a given TI’s case.

cover-1.jpgSo I always tried to early on include dialog on how to best address the possibility of schizophrenia and PROVE the answer, whatever it really was, one way or the other. If TRUE, it would be best to get treatment and resolve that issue, first. RARELY is anyone willing to take that advice; they find the prospect too scary, because of the history of psychiatry being rather prone to forced institutionalization with horrific results (as exemplified in One Flew Over the Cuckoo’s Nest). Such hesitance has not seemed to matter that much, because after working with someone for a while, I am eventually able to discern the truth for myself, and advise such help is their only chance at relief.

I will state for the record, quite contrary to DSM assertions, that about only about 1 in every 5 or 6 do suffer schizophrenia and are not truly targeted. I would then so advise, offering as many factual reasons as I hoped would be logically seen as true and valid to the client. Once in a while, they would see the truth, and act on it, but not often enough. A lesser number have been judged both schizophrenic and were also found to be targeted. The remainder were simply targeted, and merely seemed schizophrenic outwardly by third parties. They might additionally be seen as slowly being driven into a naturally resulting state of paranoiac behaviors. That is not the same as being mentally ill, certainly not the same as being schizophrenic; it is simply survival instincts gone overboard in an appropriate effort at self defense. That, I can work with on my own, and it takes no psychiatric skills, only logic.

The nature of the Elephant in the room

It is important to understand: Schizophrenia is not some shameful state of insanity such as people tend to think it. It is simply (rather overstated) a chemical imbalance in the brain which can often be addressed with drugs and good council. Yes, there are significant pitfalls in the treatment process; there is a level of quackery to the ‘science’ behind it, and that results in a hard path typically full of side effects from trying to find the right med and dose level. The patient becomes a Guinea Pig. When the ‘science’ can consider the varied physiology of individual patients and come up with the right med and dose the first time, THEN, and only then will it actually be science, IMO.

But there is a significant difference between privately seeking help and being forced into it by ‘the system.’ The latter can sometimes result in forced treatment to the point of creating a ‘cured’ human vegetable who cannot function on their own, essentially institutionalized for life. The former is considerably safer and far less likely to have an unhappy ending, the worst possible result being an unflattering written record and a period of unpleasant side effects which soon enough wear off. A good result, however, would be a written clean bill of mental health; a well deserved middle finger upraised to all who doubted.

abmToo, some care must be taken to insure that the meds do not lead to suicidal thoughts without care to prevent actualization; many psychotropic treatments do have such side effects upon withdrawal from use, some upon use. I know of this and other unpleasant side effects first hand, as I and several members of my family have been put on such medications, which are often used for more than mental issues.

Fortunately, there are ways to seek voluntary helps with reduced risks — but which are situation dependent and cannot therefore be well described, here. But schizophrenia can also be addressed with WILL POWER, though a rare eventuality. This is seen in the movie, A Beautiful Mind, a true story. In fact, watching it led me to develop an all new technique useful in reducing the actual effects of various targeting methods, including DEW. I’m talking about reduction of targeting effects, such as pain and manipulations of mood, alertness, and mental acuity.

They can even work with non targeting issues, such as pain reduction for toothaches, burns, Diabetes, and other cause, or even to help neutralize tinnitus (encouraging, but as yet no results against voice to skull). While simple in method, they are difficult to master; akin to trying to become a Jedi Knight in descriptive processes. But some can make them work usefully to one degree or another. This, too, is beyond the ability of this Post to well address. Anyone wanting to know more may email me at proparanoidgroup at gmail com and ask for the Jedi papers.

The good fight

I write of all this, today, because I just received an email from a Man in a distant country I had been working with for a while. He was quite adamant about his stalking, and elements of it certainly were beyond anything possible in reality. But he did have the will to brave the process of professional care and did brave the treatment trial and error, and was actually cured. He wrote to thank me and put my mind at ease, a kind consideration on his part. The transformation in his life was so significant that it was clearly evidenced in his writing style and commentary. His very personality and mental prowess was restored.

It was extremely gratifying to hear of his victory, and see him restored to a normalcy, even though I could take no credit. I wish I could get away with saying all TIs were schizophrenic, and that such treatment was the only solution (the official shrink view); it would have saved me decades of unhappy dialogs and less than perfect results. If it were true, and if victims would be willing to undergo treatment because there were no dangers in doing so, it would be a far more perfect World. But sadly, such a World view would be delusional: exactly as embraced by most professional psychiatrists, today.

I complimented him on his bravery for undertaking that hard road, and for enduring the clumsy treatment process which eventually leads to a cure, or eventually illustrates by lack of cure, that schizophrenia is not present. Getting a piece of paper from a Doctor that treatment had no effect is useful evidence to a TI. EITHER RESULT is a win win, even where actual targeting is present along with mental disorder. Where the victim can eliminate those things imagined, they can better focus on defense and attempts to prove those things which remain and are real. Perps will flee in the face of exposure. The trick is actually being in a position to confront them with that possibility, a matter which dealing only with reality can afford.

It cannot be done by struggling against imagined enemy tactics and methods, regardless of if imagined through chemical imbalance, or imagined due to deliberately fostered false clues. “A mind is a terrible thing to waste,” but that is exactly what mind control seeks to achieve. A TI must above all else, therefore, take any and ALL steps necessary to safe guard the health of their own mind. Free Will, the gift of God, is as precious as the gift of His Grace and of life, itself. These things are a TI’s best weapons of defense and offense. I have a whole chapter in my book on exactly how that is true; Religion and MC. This, too, is available as a free .pdf on request.

The right use of Free Will (righteousness = right use ness) might just include ‘willing’ one’s self to brave confrontation with that Elephant in the room. Clearly, it will involve other battles, as well. Never is it an easy path, and even where victories are gained, it is more often true than not, that total escape is not possible. Some break free, but all who properly resist can at least better their circumstances well enough that they can claim victory, and as a survivor, survive what targeting remains as more a nuisance than a life-long debilitating experience.

Is this not what someone with a physical handicap or long-term debilitating health issue must do, if to survive? Targeting is no different a thing, except that it is forced upon the TI by outside forces for evil cause, quite Satanic at its core. It is, therefore, a spiritual handicap, more than physical or mental, if rightly viewed; it is a war for the spirit and free will of the victim, that very gift from God. Therefore, God is indeed the best ally.

I hope this one example gives hope to those in dire need. That, too, would be a credit to the man who wrote me, a kind of legacy or testimony which hopefully leads others to dare to do the same. Just take care, if that includes you. The path is not easy to see, and there are brambles to each side which must be avoided. While I can no longer offer actual paid consulting services, I do remain available for guidance and providing answers to simple questions which do not involve significant situational analysis (proparanoidgroup at gmail com). I answer all inquiries in person.

Like or Hate Me, You May Wish to Quote Me


If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people repeat what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?

by H. Michael Sweeney proparanoid.wordpress.com    proparanoid.net    facebook

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 

What you will get by reading this post…

• Silly quotable one liners, gags, and full-on original jokes;

• witty quotable witticisms, wise sayings, criticisms, and other malarky;

• non PC quotable political snipes, barbs, and ruthless rhetoric;

• thoughtful quotable philosophical wisdoms, advice, and beatitudes.

 

My most popular writing today has been copied by permission on hundreds of Web sites, and reproduced in at least a half dozen books. So I know I’m quoted out there. It is even used in college courses on Political Science, Journalism, and Psychology. It’s called the 25 Rules of Disinformation, and includes not just how to spot disinfo, but how to out it and defeat the user in public or private venue.

This post is (mostly) a collection of my most popular Facebook posts. People generally like them, unless on the wrong end of the barb. Even then, the resulting dialogs have been interesting, and we tend to remain friends. But most people on Facebook do not ‘go looking’ for something to read, they let Facebook automatically send them random samplings in their ‘feed.’ It is really best to FOLLOW someone you like (also true of my blog posts); the only way to insure you see everything a given person posts (or blogs), is to follow them (subscribe — click that option now, while you are thinking about it.)

So, even if already a Facebook friend, it is highly unlikely you will have seen very many of what follows: a random grab bag of quotable material. Now, if you do actually choose to quote me, please do cite me as the source, and link either to this blog Page or the whole Site, or my Facebook page. New friends are welcome there, of course. You can quote me on that!

 

Quote on!

You May Wish to Quote Me (I do it all the time)~

If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people like what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?~

You may have noticed that I’m imminently quotable by the way I continually quote myself, because after all, “I’m imminently quotable.”~

The only good thing about putting my foot in my mouth so often is that I always know if my shoelaces are tied, or knot.~

 

T’was an LL Cool Day
(apologies to LL Cool J)

I saw an Armadillo while visiting Amarillo;
he sat near a willow, upon a satin pillow.
In the sun, bright yellow, this reclining fellow
seemed to be quite mellow, eating a bowl of Jello
while listening to a fellow who played a loud Cello.
Were I to say hello, I feared I must such bellow;
that seemed such a peccadillo, I ne’er met that Armadillo

 

If Google spies on your searches, shouldn’t their name be Goggle?
If Yahoo does, Youwho?
If Facebook tracks your info, Factlook?
If YouTube censors excessively and politically, LubeRube?
If television is propaganda, Tellyourmission?
If a newspaper is the same, Newsfaker?
If the Oval Office is a source of lies and skullduggery, the Shovel Orrafice?~

 

From conversation agent.typepad.com (click for their similar answer to meaning of life)

The meaning of Life? To take all gifts entrusted to you by God; Free Will, life, and the Soul which defines the inner you, and the gifts you earn through life; knowledge, talent, skills, wealth and possessions, experiences and positions… to edify yourself, edify others (family, those above you, your peers, and strangers), and above all, edify God in the doing. This is true Glory, and the source of Blessings.

To the extent you do this, you yourself fabricate that meaning. To the extent you fail to do so, you dilute or even destroy it. Any faults or failures you have along the way are challenges in learning, and otherwise non sequitur to the equation. This is true Faith, and the source of Happiness.

Don’t focus on them, learn from them, and go on. You are what you’ve been waiting for, all along. Stop looking so hard for simple answers, and stop struggling so hard against battles predestined to be won by the righteous. If God be for you, who can be against you? This is the true foundation of Peace, and the source of Strength.

The meaning of life, is YOU, and I’m glad you have friended me. As I wish for me, so I wish for you. Thank you for sharing this Sunday with me.~

 

Wisdom is sometimes knowing how to seem wise without anyone’s means to challenge. After struggling to the top of the mountain to ask my one-allowed question of the Guru, he preempted with an answer: “Yes, my Son,” he said, “you have at last made it to the top. Now leave me in peace.”~

I wonder if Pavlov’s Dog’s got that way eating Pavlum? Probably not, it wouldn’t make me salivate.~

You know your’e an alcoholic and an unpleasant drunk if people invite you to their parties the day after, and you are so sloshed you think you just got back from it.~

I’m sorry, but I think I misunderstood what you wanted me to consider about what you probably meant by saying what you thought I would be able to relate to as allegory to the intended thought you had in mind, but couldn’t articulate because you were afraid I would misconstrue it as something else. What were we talking about, again?~

A dirty joke is to humor in a way exactly like the Presidential election is to politics.~

Rain falls in drops because it’s happy water. When it’s mad, watch out for hail.~

 

Old Crow

Oh, old Crow, so cautious and suspicious,
not like the Goose, who’s calm with aplomb,
your caw is such an appalling loud calling,
unlike parakeets most cheerful earful,
or eagle’s shrill cry from high in the sky.

Your old black cloak does fail to evoke
the visual delight of a Parrot, so bright.
You walk with a hobble and a wobble,
where a Robin bounces and pounces,
and the Stork is stilted and often is tilted.

And though your flight is quite alright,
it’s not as stunning as a Bird, Humming.
Lacking the Hawk’s glide so full of pride,
sans any formation of Geese’ inclination,
nor is it as swift as can be a quick Swift.

Your Murder is a suspect some fear to detect,
and yet, I suspicion, it’s all mere superstition.
Yet do not away rush, my criticisms to hush:
let not any objection be seen as a rejection;
I do like you old Crow, so brag on, and crow.

 

Escape

To escape vile fate I must get past that damned wall;
because if staying here, I’ll not likely survive it at all.
I tried to climb upon it, up high, no good, then higher,
only to find it topped with wickedly sharp razor wire.
I tried to go around it, hoping an opening I would find,
but it surrounds me completely, and I’m trapped inside.

I tried to dig under, tunneling deep, deep underground
but impassable boulders and water did me confound.
To escape my foe I must get past that heartless wall;
I’ve no choice; to give up certainly means my downfall.
I’ve asked for help from all near who might could hear,
they refuse to give aid, yielding to their own dark fear.

I’ve prayed to God to help, to redeem and set me free,
but I’m afraid in here, even He can’t hear me or see.
Then came a gentle voice advising firmly to be still,
“I’m with you always, as is my gift of strong Free Will.
To escape your foe, you must get past that mere wall,
and there is yet one thing you’ve not tied, not at all.”

My thoughts reeled, and the answer came in a flash,
I’d not yet tried attacking head on, the wall to crash.
I gathered my courage and backed up for a good run,
and ran headlong screaming at the top of my lung.
I hit that wall with all my brute force, and hit it hard:
knocking myself unconscious right there in that yard.

To escape my foe, I’ve tried it all, to get past the evil wall;
but nothing has for me worked, no not one, nothing at all.
I awoke quite dazed, my fist clinched in pain and my rage,
the voice had not well helped me, its advice was not sage.
But regaining my feet, a white robed figure there stood tall,
amid the rubble of that same accursed, impassable wall.

“You’ve escaped your foe,” said he, “right through the wall;
not by your strength, nor luck, but that on me you did call.
The miracle you sought was within you right from the start,
your faith in me was all it took; and abiding love in your heart.
If God be for you, no man or thing against you can stand,
when you hit that wall, I was there with you, hand in hand.”

 

Sorry if I insult you. Being poor, I have to go for the cheap shots.~

Any man can toast his friends at the tavern. But a brave man toasts his enemies. That’s why I always carry a can of lighter fluid when I go drinking.~

I never quite chimed in with the 60’s by wearing bell bottom pants – until I got kicked in the groin.~

I’m never inclined to eat carrots. I just can’t see my way to do so.~

 

Linear or Columnar?

A rhythmic rhyme in a single line is often quite fine.
but most like a rhyme
to be of many a line,
or to metrically align; 
be symmetrically sublime,
or perhaps its just fine
to enjoy any old rhyme.

X

Political Risk

I’ll not vote for she who does cackle
when refusing a tough query to tackle.
While not happy with alternative Trump,
he’s still better than a kick in the rump.

While Dems are OK with criminal lies,
and Establishment Reps swarm like flies,
a candidate ripe for an email blackmail
risks a serious national security fail.

 

A lot of drinks call for two fingers of this or that liquor, so I always look for bartenders with really big hands.~

The path to illumination in the darkness is called a sidewalk.~

 

Political Seuss

I do not like this Uncle Sam, I do not like the health care scam.
I do not like these dirty crooks, or how they lie and cook the books!
I do not like when Congress steals, I do not like their secret deals.
I do not like this speaker Nan, I do not like this ‘YES WE CAN’.
I do not like this spending spree, I’m smart, I know that Nothing’s Free!
I do not like their smug replies, when I complain about their lies.
I do not like this kind of hope. I do not like it. nope, nope, nope!

 

There are rarely times when ‘actual’ sex is as good as ‘fantasy’ sex is imagined. However, they both involve a little ‘t’ & ‘a.’~

The only ‘gun control’ I support is that question in the mind of the criminal intent on causing trouble, “Will he remain in control of his fear or temper, or will he pull the trigger.”~

 

Politic’s Ticks

If Trump is such a chump we’d rather dump,
and Uncle Bernie is ample wormy and too squirmy,
and Hillary far too shrillery under FBI drillery,
with liberally bias in the press giving truth no redress…
Does that mean Biden is bid’n his tim’n in decid’n if rid’n
White Knight like last minute to the Demo’s pandemic…
Is that how we’ll be decid’n who’s presidential presid’n?
Is that Obama’s last prick on his way out, his hat trick?
That I won’t at all be abid’n, down too far we’ve been slid’n.

 

Doing

Yes, wine is quite fine when you have the time, or dine,
but weed has more speed if you have the need; do proceed.
The joke for this bloke is that I cannot smoke, nor toke,
and shrink from such drink – an alchoholic’s dread; brink of stink.

Dope lacks hope that I’ll survive or cope its scope,
so here’s my fears (why I’m lacking cheers amid tears):
this guy will die having never daring a high to try.
That hex did vex untill realizing that the Rx is sex!~

Never hiss at a snake; the conversation could be deadly.~

 

Perplexity

Do you know anything of the Entymology of Entomology,
or is it to you as confusing as the synopsis of synapsis?

 

Hillary’s Ruin
(What difference does it make?)

As I have previously stated,
I am quite totally devastated
not to have been reinstated.

I have frequently formulated
and as often have postulated
just why I’m not yet reinstated.

The cause, you see, is equated
with rumors and lies oft related
to prevent my being reinstated.

They shout with glee, as if elated
with prideful egos thus elevated,
for blocking my being reinstated.

They say my claims are overrated,
to a job where I ne’er participated,
and that’s why I can’t be reinstated.

If people died while I simply waited,
shown in lies and emails evaluated,
what difference to being reinstated?

My right, you see, as Royal rated
is for all to worship me unabated,
and vote to have me reinstated.

 

Never apologize to me for being you. Just stop it!~

Why do some of us eat the icing out of the middle of an Oreo? Where else would it be?~

 

Seasonal Orb

I saw last night the thinnest sliver of a silver Moon,
a most pleasant crescent, present this month of June.
So thin that it did quiver and thus scant light deliver,
did I realize before my eyes it would dematerialize.
Now its gone, but before too long, watching for its rise,
to my boon:
 it shall return soon, as a mirror sliver Moon.

 

Rhyme Defined

A simple rhyme takes little time,
a light banter with good cantor –
best if exquisite, expressed explicit;
easy to recall in its all and all.

 

In A Rush

Here”s a quick li’l poem:
done now, I’ll be goin’.

 

What’s wrong with the Mayor of New York, does he not know his soda ban and tax is suppressing Pop Culture?~

Unfortunately for Custer, at least 10 Little Indians never heard that song.~

 

Time Tells No Tales

Once upon a time? No, I’m highly suspicious.
If it only happened once, it must be fictitious,
especially if remarkably good and not malicious:
Real events repeat themselves through history,
written down in pages for study by you and me,
where learning not, we assure repeat eventuality.

X

Dear Fascists

Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
Your words will not sway me, no dark threats dissuade me.
Take heed, look around. Here stand I, I stand my ground.

Never again will I back away, here I stand, and here I’ll stay.
No trick or lies, nor treachery will keep me from remaining free.
No unjust laws, cops or military will I respect, still shall I tarry.
Take heed, look around: here stand I, I stand my ground.

Never again will I back away, here I stand, and here I’ll stay.
Surround me with vile forces, I’ll ignore their foul loud voices.
Dare attack me if you will, I’ll reply ten fold until my body’s still.
Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.

 

They say the Earth’s rotation is slowing down. I have a simple cure. We all get in our cars and face them West, and synchronize burning rubber.~

 

Status Quo: Latin for we want you to think things are equal and as they should be so you
will shut up and do what you are told
.

Parity: French for we want you to think things are the same and as they should be so you
will shut up and do what you are told
.

Equality: Ye olde English for we want you to think things are the same and as they should
be so you will shut up and do what you are told
.

Same: what we mean when we are talking about one political party compared to another,
those people who want us to shut up and do what we are told.

X

I thought of a Hillaryous joke, but I don’t want to keep insulting Democrats.~

 

Social Litmus

Do my witticisms impress you or simply depress you?
Do my jokes make you laugh or think me some Jackass?
Do my poems seem lyrical or are they just predictable?
Do my posts give enlightenment, or seem closer to excrement?
Do you share, like, and follow, or is our friendship just hollow?

X

Smart by Default

Any wisdom I have lies in taking some care
in choosing the friends with whom I will share.
If smarter than me I will make them aware:
I agree with them, and with flattering flair.
If not as smart, then will I then declare,
their inspiring thoughts lead me to dare.

 

A tack pins things down, while pins prick things deeply, but a prick is always tacky, hard to pin down, offending deeply.~

Time for me to post-a-joke. Invented by a stand-up comic, it’s like a Post-it Pad, without any glue to hold it together — so it’s insanely presented in unexpected ways, and it is colorless, unless fucking off color or borrows the color of a racial inference. Wait… that’s a political speech.~

I think I understand the term ‘feedback loop,’ now: GMO crops.~

Shoot first and ask questions later. It saves dialog and you don’t get ambiguous answers… if there are any answers.~

 

Being Outspoken

I’m the first to admit I know so much about everything,
an expert assumed, presumed, or claimed unrelenting.
In truth it seems, I know not enough on any one thing,
to avoid putting my foot in my mouth without realizing.

X

Your Bad, So Sad. My Bad, And Glad

If you insult me, let me be quite perfectly clear,
you’d better be right in your basis, my dear,
because logic, facts, and reason, you’ll hear,
the weapons my response will burn in your ear.

Excuse me if I’m less than politically correct,
but especially if trying to point out your defect,
you have no legal right to avoid being upset
by my Free Speech, you fucking dumb idiot.

 

I’m not going to post anything useful, today. I hope this heads up proves useful. Doh!~

I get rejected a lot by the ladies. I asked one gal if she would like to go out on a double date, and she said “Sure. How about Judgement Day, and the Day after.”~

Hurry, hurry, hurry! Step right up folks, and get your fresh posts, right here, right now. Only $1, five for $3, and a surprise in every one, guaranteed, or your money back. Don’t be misled by the competitor’s claims; they only post kitties and slogans, and complaints that no one comments. Hurry, hurry, hurry!~

 

My Prayer today, is for you. There is nothing better than other people praying for you, especially if praying WITH you. We’re not getting older, just getting closer to home! Be Still, and at peace. Now, it is true that the Lord’s Prayer is quite sufficient and complete to God, but sometimes, we feel we want to say more. That is good with God.

May I suggest the prayer below? If ye pray it as you read, it is the same as if we have done so together; Matthew 18:19 “And I tell you more: whenever two of you on earth agree about anything you pray for, it will be done for you by my Father in heaven.” All that is required is that the prayer be righteous and fitting to God’s Will, which is defined to the extent we are able to determine in his Word. If we do not vary from that, we are apt to receive that which we NEED, if not that which we THINK we need and seek by prayer (be careful what and how you ask for [it].) Begin:

Heavenly Father, thank You for each and every day; today is a Day the Lord hath made, we rejoice and are glad in it, for You have blessed us here on earth yet again. Thank You for Your tender mercies of your Grace, and the gift of life and of Free Will, which lead us through the day; may we not abuse these gifts and offend You. Thank You for giving us family and friends to share the joys and burdens of the day. I ask You to bless my family, relatives and friends and those I care deeply for, and those who are reading this right now, especially those who are suffering and in need of your intervention.

Where there is joy, give them continued joy. Where there is pain, give them peace and mercy. Where there is self-doubt or confusion, release a renewed confidence and understanding. Where there is need, fulfill their needs. Move them to study your Word, to strengthen their faith and embrace the Gospel, and to be moved thereby to spread the Word. Bless their families, homes, finances, their goings and their comings, and turn aside their enemies in forgiveness, which is to our good as well as our enemy’s good.

Above all else, may Your Will be done, in Jesus’ name,~

 

If Istanbul used to be Contstantinople, does that mean they got tired of constantly being in Ople, wherever that is?~

Just because I disagree with you does not mean I don’t like you. I hate everyone equally.~

A conspiracy unfolding is like a barrage of arrows in the dark. You hear evidence that something is not right, but don’t don’t get the point until it is too late. Worse, you also get the shaft.~

 

Desperate Conclusion

My mind, not very clear right now, so
writing some clever rhyming ditty? No.
But I know some of you like that stuff…
So there’s only one question:
Is this good enough?

 

Good example of a self-fulfilling prophesy: “I’m going to enter the hot dog eating contest.”~

It must be true that you are what you eat. I live on $3 a day in food, and one look at me and you will know, I’m a cheapskate.~

Why do they call it an aptitude test? Because if you have to take one, you are apt to detest it.~

You will note I don’t call people who don’t agree with me bad names. That’s because the bastards have thick skins.~

 

Digital Death

My computer is dying now of old age,
and while buying a new one is truly sage,
and newer models are quite all the rage,
there’s nothing but zeros on the last page
of my checkbook; no income at my age.
My mouse is destined for the round cage,
unless comes a miracle or magical Mage.

X

Enchanting

A chant can be a kind of moving song,
easily remembered for singing along.

A chant can be a loud and angry jeer,
prompting attention, worry, and fear.

A chant might be for someone; a call,
for entertainers or leaders loved by all.

A chant gives power to thought and word,
assuring its message is clearly heard.

But a chant by Monks is the best to hear,
binding us to God and drawing Him near.

 

If I have a Colon for which I might need a Colonoscopy, and use :s and ;s in a similar manner all the time when I write, why can’t I get a Semicolonoscopy, and save some money?~

Lately, I’ve been thinking of taking a plane somewhere to improve my sex life. It won’t matter where, I just going through TSA will do the trick.~

OK, time for me to say something funny. But that would be deja vu.~

The next time you hear some wimpy Liberal whining about some perceived micro aggression, say to them, “To quote an oft used line in The Princess Bride, my little precious Princess… ‘I do not think you know what these words mean.” Then slug them in the mouth and say, “You cannot ‘micro’ that; there would be no point.”~

Since I’m left handed, I never need a Compass; I just use my southpaw.~

 

Since there is no longer rule of law in this country in high places, such that no one in government is held accountable, and the very laws they write are themselves violations of law (unconstitutional), and government itself is the biggest criminal… I reserve the right to violate ANY law at ANY time for ANY reason.

My authority is the Constitution, my basis the Pursuit of Happiness declared therein, my means is Civil Disobedience, my support is the Second Amendment, my argument the First Amendment, and my goal is the Redress guaranteed therein. I rest my case, and those who choose to oppose me may rest in peace, if that be their choice. No appointment needed.~

X

An election process is like a stale fast-food hamburger. On the outside it looks big and besprinkled with seeds of wisdom. On the inside are secret conspiratorial sauces and lies about quality and quantity of substance, and wilted vegetable-like promises. Do you want fries with that? Cold, greasy, and slimy press coverage.~

Never wander around in the dark. That would be you watching TV ‘news.’~

When people talk about shooting at dummy targets, are they hinting at politicians?
Is that why you never see politicians at a gun shop or shooting range?~

I encourage free speech. And, I own the concession on ear plugs in the District of Columbia.~

Cat got your tongue? I don’t know how you can stand there so silently, I know I’d be screaming; that’s got to hurt like hell.~

 

PC Friends?

Politically Correct is not for me, my friend,
the 1st Amendment says I’m free to offend.
My words, ideas and actions do not pretend,
that you’ve no right against them to defend;
just do so to my face with honor and it will end
with agreement or no, but still friend to friend.

X

Waiver Not

Never Opt for signing a waiver,
never waiver in copping a sign;
raising up high a middle finger,
rather than your rights to resign.

X

Prosthetic Prose

Prose is prone to rhyme in a rhythm so quaint,
but to intone it sublime; a sure given it aint’

 

Alien observer’s notebook: Man is a lousy Plumber. He must think the Ocean is impure because he keeps trying to filter out the fish with giant mesh filters. Silly creature. When that doesn’t work, he drills holes in the Ocean floor to drain the water out.~

Someone said I might should listen to Meatloaf on CD. I don’t get it. As soon as I put a slice on the CD, it stopped sizzling and I couldn’t hear a thing.~

Does the FCC really know what they are doing? I find myself waking up to AM Radio, so I know what they mean when they say ‘Morning Radio.’ But while I can find an FM station, I can never seem to find a PM station. They need someone from the NyQuil folks to run the outfit, I think.~

The answer to the age old riddle: what came first, the Chicken, or the Egg? Answer: neither; it was the Rooster. (surely, someone else said this somewhere, sometime earlier)~

I must be a looser. There was this gal I liked who always bought fresh produce. But when I got fresh, she just slapped my face.~

 

Big Enough

To big to fail cost you and me,
for bailouts, and lost property.
To big to nail, cost prohibitively
the national debt ridiculous, be.

To big to jail cost you and me,
for hall passes for Mz Hillary.
To small to hail, just you and me,
our vote has no voice collectively.

X

It’s It

Time to offer up a bit of wit.
Something funny to any Brit?
Are you worried just a we bit
about a future Brexit bad sit?
Afraid there’s no way out of it;
to escape a daily diet of shit,
Mushrooms often get slit and bit.

X

Falling Sky

Chicken Little a warning did brae,
none believed in what he did say.
Many long years since passed away,
we still refuse to believe him today.

Yet Planet X and Wormwood obey
God’s Will and ARE heading our way.
The moral to me seems thus to say:
good Chicken Littles should now pray;
for it is written, “None knows the Day,”

 

I never did well in Science Class. I still don’t know the conversion factors between celsius, farenheit, and college degrees.~

Hillary avoids Potatos and Corn. She knows they have eyes and ears and might testify.~

Gmail just informed me my folder :”Hate Mail” is full. Half of it is from Democrats, and half from Republicans. The difference is, the Republicans tell me exactly why they don’t like me, and the Democrats only tell me how they feel.~

Taxes are a fiction, just as are the wages taxed; when the dollar is nothing but an I.O.U., you never really get paid, and so, you can never really be taxed or pay taxes, either. Credit and Bank Loans are a also a fiction, just as are the checks (also I.O.U.s) used in obtaining the loan or repaying it ­– and the bank didn’t even have the money to loan in the first place (allowed to loan up to 20 times their bank deposits). We just keep spoofing each other to solidify the illusion.~

If you still hate someone after putting yourself into their shoes… then they are obviously too tight because you are too big in your own mind for your own good, fat head.~

Be thankful I’m retired. If I was doing this full-time, I’d bore you to tears.~

Now days, the only way to achieve inner peace, is to scream at the top of your lungs for the politicians and newsmen to fucking go to hell, until they actually do.~

Dear government, and megacorps: Winning is not taking rights away with legislation or getting the contract for weapons to be used at Armageddon. These things are mutually assured destruction.~

When people say not to worry about things, “They will get better,” I think they must mean that the things that worry you will get better at doing that.~

Never take the last train from Clarksville. Its full of Monkeys.~

 

Theorist’s Conspiracy

Open the door to news of tragedy obscene. The lunacy involved, what can it mean?
Turn on the light and survey the crime scene – see Rats scurry trying not to be seen.
Catch one, make it come squeaky clean: Federal ties found amid many lies between.
Note all such oddities you might glean, contrary to the official story quite glassine.
Compare to what others have seen, conclude just what it really all does mean.
Forget now all you once had been, you’re now a conspiracy theorist, a sin.

 

In case you are wondering, yes, I used to do stage comedy in talent contests. Often got a first place. That was great; being the first person put on the bus out of town, I got to choose the best seat.~

Let me apologize in advance for insulting you. I’m not going to stick around in case you start swinging.~

The Federal Gov has gotten to be such a big asshole that it doesn’t even have to fart to stink up the whole country, but it does so continuously, anyway. If Hillary is elected, she plans on feeding it beens and drinking water from Mexico, giving new meaning to when the SHTF. I’m thinking Trump is the BEANO.~

 

A Noun is a word that has a ROCK solid object identity.
A Proper Noun tells the actual name or title, my dear SIR, or may I call you JOHN.
A Pronoun is an Avatar stand in for IT.
An Adjective tells you a IDENTIFIABLE personality.
A Verb is a word in MOTION.
An Adverb tells you its VERY measure.
A Preposition pre positions the Noun TO Verb relation.
A Conjunction forms a junction function between word thoughts, SO don’t get confused.
A Contraction is a contracted attraction giving traction to two words as one, a marriage licensed by apostrophication, or a foreshortening of a word as a slang thang for those who were THINK’N they HADN’T the time or space for two words.~

X

I had a Checklist but can’t use it as I haven’t written a check since Debit Cards came out.
I had a folding Map but I can’t follow it because there is no place in my car’s dash to plug it in.
I had a Plan but I can’t follow it because the steps don’t appear on the Dance Dance Revolution pad.
I had a contract but I don’t abide by it because I already held both the first and second Parties. Sorry I didn’t invite you.
I had a Letter but Sesame Street is now on a channel I don’t get.
I had an envelope but didn’t give a lick.
I had a Folder but since I no longer need the checklist, plan, contract, letter, or envelope, I threw it away, too.~

X

A Conservative Politician in Office is conservative in measuring out his power to avoid angering the voter; he fears the people, where a Liberal believes that governmental power is end all-do all, and they use/abuse their power to manipulate the people by fear of government.

A Conservative Government heeds its own laws by conservative judgment, where a Liberal tends to apply grains of salt, rationalize, and bend slightly, each time taking more liberal advantage until it is in time fully lawless.

A Conservative Government writes Laws which are conservative in principles within the limitations of its Charter (The Constitution, Bill of Rights), where a Liberal (by the above means) takes liberties in lawmaking which take liberty out of the Law; they become increasingly unconstitutional and negate the Bill of Rights.

A Conservative Policy must always fit the national interest in obedience to Sovereignty and which honors the Charter, where a Liberal is interested in reformation to a new model, almost always globalist in nature (i.e., favoring United Nations, One-World Government) and is willing to sacrifice the Charter and Sovereignty for that agenda.

A Conservative Politician thinks in terms of limitations per the above, which allows personal and corporate governance to be at ‘”Liberty” to flourish and pursue happiness and wellbeing, trusting the people to seek what they will for their own good, where a Liberal thinks in terms of socialistic Agenda which stifle or suppress these things ‘for the good of the people, of whom they think cannot be trusted.’

A conservative understands that to become elected or to move legislation, there must be an accommodating compromise between the ideal and the attainable, where a Liberal will promise anything to get what they really want, or take any drastic measure to get what they want, even if it means legislation which cannot possibly achieve the stated purpose, and especially if it serves some unstated agenda per the above.~

 

Panic is in abundance, as is a loose tongue, when the SHTF. Calm reason and restraint is called for. Take a deep breath, grab a cold beer and reflect before commenting. But if the bullets are flying around you, SHOOT BACK AND SAVE THE DIALOG FOR LATER. That’s when you will really need that beer.~

 

Why do they call them a POEM when no other word quite right rhymes with poem?
Why do they call them a JOKE when the point is a hard straight poke?
Why do they call them a SONG when it’s really a sing?
Why do they call them a RIDDLE when the answer is a clue in the middle?
Why do they call them a SPEECH when it gives you the claps or makes you boo who?
Why do they call them a REport, REmark or REply when it’s actually the first time?
Why do they call them a QUESTion when instead of taking the path to the answer on your own,
you leave it to another to do?
Why do they call them a PARagraph when there’s really only one?
Why do they call them a SENTENCE
when they rarely involve a judge?
Why do they call them a STORY when they don’t have walls, cielings, or floors?
Why do they call this a POST… oh, wait, I know: because that’s what it’s as dumb as.~

X

Why is it that you can talk to ten strangers and 7 or more of them will believe or agree like minded if you tell them…

About a UFO you’ve seen…
About 911 as an inside job…
About Global Warming as a sham…
About CIA and the mob killing JFK…
About chemtrails vs. contrails…
About a Bilderberger NWO/Illuminati conspirators…
About mind control, gang stalking, Voice-2-Skull…

But when you talk to ten lawmakers, law keepers, medicals, or reporters about any of that…
You are suddenly crazy to the point of risking forced evaluation?

Because the System and its professional armies are taught not to believe in the boogyman (who arranged for their lessons).~

 

The addage “Follow your dreams…” with respect to career can end terribly, UNLESS you take the RIGHT path:

1 toe in the water as a hobby… Insures you really do like it and have basic skills required.
2 build a boat taking courses in the trade, even if mail order or online. This will confirm
if you have actual talent. If not, start over w next best passion.
3 float the boat as intern. This will educate you as to the harsh realities and negatives of the
trade. Lets you confirm you like it, and regardless, gives a leg up on others for getting the job.
4 if you get this far, set sail as employee, setting aside savings. You WILL do well if you are ‘all in,’
what some call the ‘work ethic,’ which is simply doing your best.
5 with savings, buy a yacht by starting your own firm. That will plot a course to your dreams.

More: at all levels, start a small home-based business for both the experience, income, and tax benefits. This allows you to build resources (eg, instruments for a musician) less expensively and helps build your resume, client base, networking resources. I have NEVER not operated my own business since entering high school, and most related in their start to my first entry into a given field of work, at the hobby stage. I have therefore mastered and become successful in many fields and industry sectors, and despite having only a high school education, I’ve been granted four experiential degrees for the purpose of teaching at college level.~

 

My Mom always told me not to play in the street. She was right. The freeways are much more fun – if you are agile and don’t mind the blaring horns and screeching tires…~

What did the politician say to the activist? Nothing. He doesn’t pay attention to those voters, either.~

You are free to disagree with me as long as you understand I am never wrong and never make a mitsak ni anteing I sae.~

 

Modern Debate

What I believe is true. If you disagree, screw you.
I know I’ m right, I do. I’m clearly smarter than you.
Don’t you dare try to argue – untill your face turns blue:
What I believe is due – to claims I find undeniably true.

Your facts will not do, they confuse what I know is true.
Such reality I pooh pooh, my mind made up for me, you
see; I won’t listen to you. What’s that you ask askew?

No, I no not just who said, but some kind of Web guru.
Its not important just who. But I know it surly wasn’t you.
What I believe is true. If you don’t agree, boo hoo to you.
Truth’s what I want it to be, no matter what you say or do.

 

A Democrat Congressman and a Republican Senator walked into a bar… Wait! That’s already as big a joke as can be…~

Notice: please note… In case you haven’t noticed before. Have you ever noticed there is hardly ever been and important notice delivered or posted such that you actually noticed? Nah, I bet you didn’t even notice any such post. I hereby give notice that, if you noticed this post, or not, this notice is not such a notice, but merely a post giving note to such.~

 

Dos You Got Down Wid Wad I Be Say’n Bout Dis and Dat, Bro?

Dis, Dat, and Dos, as ‘hip’ as they could be, went into a bar to get a drink. Dos bought the 1st round of beers. Once served, Dat said “Dis be good ‘n stuff.”

Dis replied “I try to be good like dat, you know? Mama sez to.”

Dat saw Dis was confused, “Thank yo for the compliment, Dis, but dat not wad I meant. We all be drink’n da same brew and dat be good’n stuff.”

Dis and Dat seemed confused. “Look, Man, dis is on tapn we don’t be know’n wad it be,” he clarified.

Dis choked on a swig. “What yo say, bro? No one be tap’n on me, so natch, I dont know wad it be.”

“No, Man,” Dat tried to explain further, “Dis beer be tap beer. It be good, but ah dont know wad it be.”

Dis, at least, finally understood. “I got yo drift, now, Man. But I heard dos tap beers were cheap’n stuff. You know, po shit wid no taste. So wad dis be?”

Now Dos complained. “Wad yo mean… yo be sayin I bought cheep beers?”

And now, Dis was confused, once more, too. “I be just fine, bro. Why yo ask wad I be?”

At this point, the bartender happened by. “Hey, Man,” accosted Dat. “We be wond’rn… Wad be dis here beer?”

Dat be Dos,” he replied simply. “Dat be good, n stuff.”

Dat seemed upset, now. “Look, man, we been all through Dis be’n good, n stuff. But if yo be say,n I sho nuff should be like Dos… dat Dos be gooder,n me, I take ‘ception to dat. Yo don’t know Dat, and yo sho as Hell dont know me.”

Now Dos was miffed. “Hang on a sec, man,” he said to Dat, “yo sayin yo better’n me?”

Well, things went down hill from there and it looked like a fight was about to break out, when the bartender tried to calm them with clarification. “Dis be rediculous!” he started.

But Dis did’t give him a chance to finish, and knocked him on his ass!
 “Ha!” he exclaimed. “Yo dumb ass be’n on da flo wid yo dumb fat mouth bleed’n wad be rediculous.”

This unexpected event had disrupted the conflict between Dos and Dat long enough that they had calmed down. Dis suggested they leave, and all agreeing, they stormed out in a huff.

As they exited, Dis noted “We stiil dont know wad dat beer be. I sho nuff wish I knew.” 
The others agreed, none of them noticing the neon sign in the window reading “Dos XX on tap.”~

X

If Trump is such a chump we’ rather dump, and Uncle Bernie is ample wormy and too squirmy, and Hillary far too shrillery under FBI drillery, then does that mean Biden is bid’n his tim’n in decid’n if rid’n White Knight style last minute to the Demo’s how we’ll be decid’n who’s presidential presid’n?~

What happens when a Socialist politician, an establishment Democrat, a non establishment Republican and an establishment Republican go into a Bar and call for a round on them, each? The price of drinks goes up, the waitresses worry about deportation, the bartender adds water to the drinks, the bouncer calls a reporter, and the Janitor worries about having to clean up all the bullshit that’s about to be spread. And, the patrons realize the hangover isn’t going to be worth it, and they leave.~

 

 

Ferrari facing cataclysm!

 

Fractured Isms.

 

Ferris Beuller (Matthew Broderick) had it right. “A person should not believe in an “ism“, he should believe in himself.” In other words, don’t be a follower of someones ideas. If you want to make a change for the better, YOU are what you’ve been waiting for.

Here are some (twisted) examples of perhaps why isms can be problematic…

Capitalism: You have two cows. Sell one and buy a bull to start a cow factory. Worship in any church you want as long as you tithe a portion of your stock options. John Lennon is a famous millionaire singer invited to sit on your Board of Directors. Apple Computer stock looks attractive, so you merge to form Cowpile Computer.

Socialism: You have two cows. Give one cow to the government to slaughter and share with the poor. You worship in any church which is left or right of center. John Lennon is a folk singer of meaningful Marxist ballads. Apple Computer is bailed out by Congress whenever its stock falls below that of Microsoft.

Communism: You had two cows, but now the State has them, and may or may not give you some milk – if you are willing to stand in a long line. You do not go to church except to attend Party meetings. John Lennon is a decadent influence on youth. Apple Computer never was, because they refused to allow government to take more than one bite of it as it would ruin the logo.

Fascism: You had two cows but the government forced you to sell them to corporations for beans (magic or otherwise) who in turn sells the dairy and beef products back to you for huge profits. You go to the same church as the fearless leader, or you don’t go at all. John Lennon sounds like he was related to a Marxist and so he was shot. Apple Computer was burned to the ground in order to blame Compaqism and sweep Bill Gates into power.

Nazism: You had two cows but the government arrested you for hording and took them. You and your religious fanatic family are burned alive in your church for refusing to Sig Heil. John Lennon was in there with you, singing Give Peace a Chance. Apple Computer users are arrested and sent to camps for daring to ‘Think Different.’

Anarchism: You have two cows running down the freeway causing car wrecks. Shoot the tax collector, steal his money, and rape his dog (unless a hunting dog – but since it is a government dog, we know that dog don’t hunt.) You blow up the church. John Lennon sings Revolution. Macintosh Computers have a high repair rate from all the bullet holes.

Constitutionalism: You have two cows and the government cannot unreasonably search or seize them without a warrant, or prevent them from mooing, or prevent you from owning them and forming a militia of fellow cow owners who meet weekends and practice milking with dummy targets. You can’t figure out which of the thousands of churches to attend. Neither can John Lennon, so he writes Imagine. Steve Jobs was a Founding Father who wrote the ‘Consitution for the rest of us.’

Patriotism: You have two cows painted red, white, and blue. Your church supports the current war. John Lennon is boycotted, and so he has a sleep in. Apple is not sold to anyone unwilling to pledge allegiance to Microsoft products.

Militarism: You have two cows which you have convinced each that the other is seeking to invade their own private pasture. You sell arms to both sides. Your church owns stock in your company. John Lennon had his visa revoked because he was a pacifist who smoked pot. Apple Computer is what makes smart bombs smart.

Pacifism: You have two contented cows which give canned milk. Your body is your temple (and you are what you eat.) The government is headed by John Lennon. Apple Computer listens to its customer complaints.

Fatalism: Your cows died after you stopped feeding them because you figured they would just die, anyway. It was the same reasoning by which you determined God is dead. You never heard of John Lennon. Apple System error messages all start with ‘You should have known better than to think this wasn’t going to happen…’

Surrealism: You have a pasture full of Dell Computers searching the Web for the best price on a Macintosh. The government worships you. There is no John Lennon, because he would have made sense, so he instead turns out to actually be Ringo Star, who never quite did.

Bushisms: Is your cows in my Big Mac? I’m a God fearing man on Sundays. Which one is Lennon, and which one is Lennin? I will not have one of those damned Macs on my desk. Jobs didn’t contribute one cent to my election fund!

Clintonisms: Wow, look at those udders! I’m a God fearing man on Sundays. I liked John Lennon. We had a lot in common. In fact, I inhaled once, myself. I don’t know about granting Apple a GSA contract… they didn’t contribute to my election fund.

Obamaisms: Your cows are being detained indefinitely to combat terrorism. I’m a God fearing man on Sundays, unless I’m playing Golf. I liked John Lennon. I had FBI sue Apple Computer, who wouldn’t let me spy on iPhones, and didn’t contribute to my election fund.

Note: If you like the isms, they were lifted from a page full of additional jokes of greater complexity than the bulk of material in this post. Find them here: To Laugh in the Face of the NWO is the Best Form of Contempt.

 

What Will You U$E For Currency When T$HTF?


The more we move toward a cashless society, the more we are at risk should some financial, political, or natural disaster transpire which weakens or destroys societal and governmental dynamics. What people will accept in payment or trade for scarce and critical supplies could threaten your life if you don’t have any, or the cost may be more than you can afford, if you do. Here are some ideas to help you be prepared.

by H. Michael Sweeney proparanoid.wordpress.com    proparanoid.net    facebook

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

In this post you will learn…

• what makes money valuable is also what can make it worthless;

• plastic and precious metals are useless in the aftermath of crisis;

• why government frowns and suppresses barter, and why to embrace it anyway;

• cash is usually aftermath King… but not always;

• whole new currencies evolve in serious or long term aftermath.

What money is, and why it has value

Money is nothing more than a convenient way to conduct ‘commerce’ (trade goods and services) with a standard and portable stand-in for something else of value. For this to work, all people within the trading area must agree to use it as such, and ‘it’ must have a definable and concretely known value. Any system of money is best handled by the local government, be it a tribal village in ancient times, or a modern industrialized nation. Or, it can be done by a network of banking and financial institutions, or even a combination with government. As we will see, banking options are good for them, bad for everyone else.

The later is what we have, today, and it suffers two problems most of us are aware of, both stemming from the banking side. To fully appreciate that, we should step back in time just a bit. Please take the time to read what you may otherwise presume already to know, because the points made in this section will play to remaining sections in critical ways. This is because only governments used to issue money, and to establish its value, they could not and dare not create money unless they held something of value in reserves somewhere, something of concrete and great value to back it up. Most nations, as did America, used Gold; the ‘Gold Standard.’

tshtf

Whatever the value standard was, a citizen could go to a bank or government Purser, and demand to trade in the currency for its value in that item (i.e., Gold), or vice versa. This system guaranteed the value of the currency to a known unit of measure, and tended to help establish and maintain a stable economy, and made international trade viable; each currency had a concretely known valuation, and established trust between nations that the standard item, itself, could be obtained, if desired, to settle any balance of trade debt which might exist.

Then came the banks with their own idea, called Central Banks, which enables the printing of Fiat Currency, which is money which has nothing of value backing it. Enter the Federal Reserve Banking System. It has cost you and me a significant sum of our personal lifetime earrings. Some say we have literally been sold into slavery to the banks. Learn more about exactly how much it has cost you personally, here. Many, as do I, call it Treason, including the prophetic warnings of our Founding Fathers:

• “If the American people ever allow private banks to control the issue of their currency, first by inflation, then by deflation, the banks…will deprive the people of all property until their children wake-up homeless on the continent their fathers conquered…. The issuing power should be taken from the banks and restored to the people, to whom it properly belongs.” – Thomas Jefferson in the debate over the Re-charter of the Bank Bill of 1809 (millions of us, including myself, did wake up homeless with the Mortgage Derivative Collapse and associated ‘too big to fail’ bailouts, and we have had nothing but inflation and deflation cycles, not to mention devaluation of the dollar since establishing the Fed)

• “I believe that banking institutions are more dangerous to our liberties than standing armies.” –Thomas Jefferson

• “… The modern theory of the perpetuation of debt has drenched the earth with blood, and crushed its inhabitants under burdens ever accumulating.” -Thomas Jefferson (a reference to the National Debt)

• “History records that the money changers have used every form of abuse, intrigue, deceit, and violent means possible to maintain their control over governments by controlling money and its issuance.” -James Madison

• “If congress has the right under the Constitution to issue paper money, it was given them to use themselves, not to be delegated to individuals or corporations.” -Andrew Jackson (Banks are corporations)

• “The Government should create, issue, and circulate all the currency and credits needed to satisfy the spending power of the Government and the buying power of consumers. By the adoption of these principles, the taxpayers will be saved immense sums of interest. Money will cease to be master and become the servant of humanity.” -Abraham Lincoln (the Fed is all about interest paid to the banks for every dollar printed.)

• “Issue of currency should be lodged with the government and be protected from domination by Wall Street. We are opposed to…provisions [which] would place our currency and credit system in private hands.” – Theodore Roosevelt (in the long-running debate about establishing a central bak.)

But the Fed would become reality just in time to pay for WWI with fiat money. But that was not the first time. In the early days of forming new States within the United States, Banks could also print their own money with no attachment to or obligation of government, hopefully backing it up with some kind of standard; a certain degree of trust was involved, and many people found that their banker was a crook. This practice, both legitimate and criminal, was especially common in Gold and Silver mining towns, where shipping precious metals was risky due to bandits. Other negotiable instruments also came to exist, which can similarly be thought of as forms of money. Stocks, Bonds, Notes, Futures, and more. But these featured valuations tied to more complex and less tangible things, and were not simple enough for usage as currency except with brokers and special institutional trading firms.

But several new ways for banks to print their own money also arose which were useful enough by all. One is the ‘Check,’ your checking account. It is merely a highly organized and easily validated (to a point) method of trading in I.O.U.s. Anyone can write an I.O.U. on a any piece of paper, and if the other person accepts it as a debt, and the writer honors it, it has value. And, it can be passed from one person to another until paid, like a Marker used in the underworld.

But people do not trust strangers, and the bank’s checking systems addressed that by using the bank as a kind of validation and tracking of the debt, and the debtor. The underworld uses fear and organized crime to do the same with markers. And, do we not fear the wrath of our banks and the law should we write a bad check? This is called debt bondage, a very real and powerful political and social control system that keeps the locals, that’s you and me, in line for fear of loosing all they own. Unless, of course, you simply choose to  opt out, as have I.

As far as checking is concerned, eventually, the check must be traded for real currency, so no new money was actually created, but while in circulation, the total amount of ‘money in use’ is greater than had been printed, a pseudo inflation factor. Today, some 20 billion checks are written each year, with a value of 26 trillion. To put that into perspective, it would pay off the entire National Debt with money to spare. It is also roughly 20 times the value of all U.S. money in circulation. So is the National Debt, and though no causal connection seems to exist, it is an interesting coincidence, is it not?

Banks also ‘print’ money by loaning money that does not exist. They are allowed by law to loan up to 20 times the money they hold in their vaults from depositors. They write a check, and you then use that ‘money’ to write more checks for whatever purpose the loan was intended. They get deposited somewhere, and eventually returned to the issuing bank. You make monthly payments to the bank, money against which more loans can be made. As long as less than 1 in 20 of loaned dollars is converted to cash withdrawal, the bank has gotten away with printing at least 19 defacto dollars; another pseudo inflation factor. A loan is for fictitious money, and how to you repay a fiction? A question well asked, and some have an answer which will astonish you, and though giving you hope, you will fear it, as well.

The worst offender is the Central Banking System, which allows governments to print money with absolutely nothing behind it; no standard. The government itself is printing nothing more than an I.O.U. The Bank, in our case being the Federal Reserve Bank (the Fed), which is NOT a Federal Agency, but a banker-controlled corporation. The Treasury prints money in the form of Federal Reserve Notes backed only by interest bearing Treasury Bonds given to the Federal Reserve (functionally, an I.O.U.), and the Federal Reserve Note is itself therefore also an I.O.U. Some of these are sold to anyone wishing to buy them, quite often hundreds of millions of dollars held by wealthy men of note, but also, ordinary citizens. Those unsold are held by the banking cadre.

This is an automatic inflation driving machine for several reasons, not the least of which is it allows government to fund any massive and costly adventure without worrying about actually paying for it, as long as they are willing to drive up the National Debt, which no one is ever going to pay off. The downside is, of course, that our purchasing power continues to dwindle, and at some point, the dollar will need to be officially devalued, and only YOU and I will loose in that deal. Meanwhile, every increase of the national debt is de facto devaluation; you and I loose purchasing power as if officially devalued. Simultaneously, more and more of tax dollars go to the FED to pay off INTEREST (only) on T Bills, and that money goes directly to the bankers. The debt is NEVER reduced.

If it were, the Fed would actually collapse. Here is an explanation from David Graeber, and English Anthropologist, regarding the first central bank in existence: “In fact this [debt] is precisely the logic on which the Bank of England—the first successful modern central bank—was originally founded. In 1694, a consortium of English bankers made a loan of £1,200,000 to the king. In return they received a royal monopoly on the issuance of banknotes [their ‘Fed’]. What this meant in practice was they had the right to advance IOUs for a portion of the money the king now owed them to any inhabitant of the kingdom willing to borrow from them, or willing to deposit their own money in the bank—in effect, to circulate or “monetize” [create fiat currency] the newly created royal debt. This was a great deal for the bankers: they got to charge the king 8 percent annual interest for the original loan and simultaneously charge interest on the same money to the clients who borrowed it, but it only worked as long as the original loan remained outstanding. To this day, this loan has never been paid back. It cannot be. If it ever were, the entire monetary system of Great Britain would cease to exist.

There is much more which can be and should be said, but this is not about the evils of the Federal Reserve or financial institutions. The intent was simply to give a glimpse at what money is, and what makes it valuable (or not), in NORMAL circumstances. And, in normal circumstances, the ONLY thing which makes Federal Reserve Notes valuable is a law passed in support of creation of the Fed, which says and which is echoed right on the money, itself, that it is good for all debts, public and private; should you refuse to accept it as such, the debt is forgiven under that law; we are forced to accept it.

 

But what happens when TSHTF?

In any serious financial, societal, or natural disaster, all bets may be off, and cash may either become a monstrous burden, or have no value at all. To the extent that social systems and governmental control fails, or their function is diluted, the value of money can suddenly become undefined, except by the seller. It is not just a matter of free-market price setting, but weather or not the seller will see value in money, at all, the government no longer being in a position to enforce the law which says it must be accepted.

Pre War Germany was in financial crises which ultimately helped to sweep Hitler into power. Here, a woman purchases some food with a basket full of money. Germany's inflation rate was so high that they were printing 100 billion Deutchmark bills (i.e., a single $100,000,000,000 bill) for public use.

Pre War Germany was in severe financial crises which ultimately helped to sweep Hitler into power. Of course, he blamed the Jews, who had nothing to do with it, but scapegoats are easy to come by when people are scared. Here, a woman purchases some food with a basket full of money. Germany’s inflation rate was so high that they were printing 100 billion Deutchmark bills (i.e., a single DM100,000,000,000 bill) for public use. MONEY WAS ESSENTIALLY WORTHLESS. Welcome to fiat currency run amok.

Some say to hoard precious metals for such crisis, but that is foolishness, because you can’t spend gold. For one thing, it is too valuable, and another, it is too difficult to validate without special chemicals, scales, and knowledge. How does the seller know it is real Gold, or what its actual value currently is? Not only will there be an issue as to weight, which is multiplied by a given value per ounce, but there will be no way to know (where a crises involves loss of communications), what the actual current value per ounce actually is. The wise seller must therefore significantly undervalue any metal offered in payment.

And how do you buy something low in value with something high in value, when there is no way to ‘make change?’ Hoarding Gold is fine for long-term protection of large cash holdings, but it is next to useless and extremely costly to attempt to use it as currency in a crisis.

THEREFORE, if actual money starts to fail in usefulness, whole new currencies will arise.

 

What will be the new currency in a crisis?

Yes, new currencies, and nothing like money as we know it. But like money, where it is still accepted in a crisis, the value thereof will be determined mostly by the seller, and this will give new meaning to the expression, ‘shop around.’ The most common alternate currencies will become food, water, fuels, and ammunition. Too a lesser degree, anything in high demand and low supply, such as weapons and tools, or anything key to survival. Being aware of that in advance is a great advantage, because there are two things in common with all these items which allows for good preparation.

The first is, that they have a relatively low value now, before there is a crisis. You can afford to stockpile, and would be wise to do so, taking into consideration storage space requirements and shelf life. It would be good to have at least a small hoard of each item in quantities greater than for reserves for personal consumption during the emergency and, where storage space, shelf life, and finances permit, to perhaps have a large hoard of one or more items on the list to become your personally favored currency.

The second is, that anyone can produce them, themselves, to one degree or another, both before and after a crisis. Anyone can sink a well or fetch water from nature, and transport it to where it is less available for ‘profit.’ Anyone can grow and store food if they have the land for it. Anyone can chop wood or make alcohol (fuels) if they but arrange to do so. Anyone can reload spent munitions if they have a loader and can obtain gunpowder, and for the matter, anyone can make gunpowder if they know how to find the raw materials and they are locally available.

Lead for ammunition is another matter, but it is cheap to buy ahead of crisis. So the purchase of a supply of lead and tools to form bullets and reload might be a great idea. Yet most people will not do any of these things, or cannot due to finances or lack of knowledge, and it is exactly that which gives them an excellent future value – extra value, in fact, because in aftermath situations, the normal supply chain of these things has been interrupted or entirely cut off, and access to the knowledge or finances to acquire them with it.

Once TSHTF, you are locked into your current state of affairs; you are either prepared to offer the right currency at an affordable rate, or you are slave and at the mercy to/of those who can. Only one of these two groups has a good chance at survival. That is the worst kind of debt slavery.

 

Barter, the alternative currency

Click to get a glimpse at doing your own barter from a legal perspective.

Click to get a glimpse at doing your own barter network from a legal perspective.

The government hates barter and suppresses it in a mountain of laws restricting its use. Barter is, in fact, the basis of the new evolving currencies just discussed. But for those in that second, hapless group just mentioned, they may be able to survive for a while by bartering with their earthly possessions, albeit at a costly rate of exchange. A $3,000 professional video camera might be good for a tank of gas, or a few days worth of food; what value is there in a video camera without electricity? But it might be accepted if there is some hope that, eventually, power will be restored, or if the parts might be useful to a tinkerer seeking to build something mechanically useful.

But barter can work well, even before a crisis, despite the laws. The laws are there because the barter concept tends to ‘cheat’ government out of taxes. If you buy something with dollars, you got taxed on the income from whence you got the dollars, and the seller is taxed on the income he earned, and there is likely a sales tax, as well. In barter, as originally conceived and employed before the laws existed, you simply gave labor in exchange for items, or traded items. As long as both parties agreed the exchange was acceptable value given for acceptable value received, it was a done deal. Yes, sometimes one side might feel the value was short, and ask for augmentation with a little cash thrown in.  Or not.

Barter best works in a network situation involving more than two parties. You have Oranges and want Apples, I have Grapes and want Oranges, and someone else has Apples and wants Grapes. No problem, a three-way swap. But to do that takes an organized network with the means to track what is needed and match it to what is offered and available elsewhere. Barter associations or organizations are set up, and of course, that takes effort and manpower, and a building that has monthly rent, and other things which take actual money.

The other thing a barter group could do, was to accept goods or labor obligations (I.O.U. for work to be done) as if a deposit in a bank, against which the member offering such could make some combination of present or future withdrawal of other goods or services as they became available and needed. This allows conversion of unwanted or surplus items into future barter trade power, rendering the barter group as a kind of retail store and universal service provider. Again, government does not like anything resembling a bank in procedure, and would normally tax a retailer on inventory.

As all these functions take money to facilitate, barter groups would charge a small fee for a transaction based on the dollar value of the transaction. DOLLARS were still used as the MEDIUM for determining TRADE VALUATIONS. That meant creating a corporate entity to facilitate and organize barter transactions, and typically, charging a membership fee to allow access to the system. That was what led government to take interest in and to legislate against barter; such systems could quickly grow in membership and began processing huge numbers of transactions, some of which were themselves huge in valuation.

I, for example, belonged to such a group, and in a single transaction, moved $35,000 in goods, against which I would acquire needed goods and services which enabled me to live more inexpensively for a full decade — until the government passed laws which forced the barter group out of business, and started taxing everyone involved to the point where the advantage seemed lost. But it need not be that way, especially once TSHTF.

You can join an existing barter program, but if you do, you should also form your own local barter group, because the big programs will not be available in a crisis. Anyone do so without formal corporate existence, and without charging fees, and without a retail or banking format. I highly encourage it, though you should check with a lawyer as laws vary State to State (click the above image for the Oregon situation). Yes, there will be some concern about tax reporting, but that is a minor issue unless you start dealing in large volumes of goods and services. Frankly, most people who barter this way report nothing, because unless it is in volume, it isn’t even worth the trouble to track and report it, not to them, or the government. But the VALUE is in HAVING A NETWORK IN PLACE IN A CRISIS…   priceless.

When TSHTF, especially if communications are down, it is both difficult and even potentially dangerous to attempt to form a network. Danger stems from the fact that, unless care is taken to avoid strangers, you may offer to form a network, in which case you state what you have of interest, and if they think they have more guns than you, and want what you have, they know where to get it without cost. Moreover, mutual defense is a thing which can itself become a barter commodity, assuming you have the guns and manpower of good use to others; it is, after all, another kind of service.

So to prepare for a crisis, don’t just hoard key supplies, but establish a barter network, even if you do not choose to use it. Doing so amplifies the value of your preferred currency, because you already have people willing to accept it fairly. Consider these words of wisdom:

• “The propensity to truck, barter and exchange one thing for another is common to all men, and to be found in no other race of animals.” Adam Smith, Scottish Philosopher.

My take is that barter is natural to man, and as such, is an unstated free right to undertake at will – to hell with government, or in reverse, if government has gone to hell, what else do we have to trade with, but barter;

• “Capitalism invariably boils down to barter between two willing parties, neither of whom uses force to work with the other.” Ben Shapiro, Political Commentator.

When TSHTF, force becomes the only commodity the weak minded and hapless will have to trade with. To strengthen your defenses, you need something better, as well as a means of countering force with force of your own. A Barter network gives you both, where mutual defense agreements become a thing which may be bartered: If I have superior weapons and more gun bearers than you, an imbalance exists which might be offset in goods or other services.

• “In primitive society, Man produced directly for the satisfaction of his own wants, but with the development of society came differentiation of functions; exchange and barter arose, various trades sprang up, and with the necessity of commercial intercourse, cam the invention of money.” Charles A. Beard, renowned Historian.

This sums up this entire post in the most direct of statements: barter came first, money after. When money fails to function usefully, we must be ready to barter, either with a new currency of convenience, or outright barter networking. Our very lives could depend upon it.

Not fully convinced? Want more information?

May I humbly suggest some further reading about WHY you should worry about flying excrement from an unexpected fan, and also offer some additional valuable resources? Here is a compendium of useful material on the dangers of crisis and the topic of being prepared, not just in terms of currency, but other considerations which are well beyond the scope of this post. These are Facebook ‘pages,’ so you can FOLLOW them for updates. Please consider to Follow my blog, as well.

The Fema, Martial Law, Revolution Database. Don’t let the title scare you away; its a compendium of articles and posts about the likelihood and risks of various forms of civil unrest and social, economic, or natural disasters, as well as general advice such as found in the above post. It’s sub-name is When All Hell Breaks Loose.

The Post Apocalyptic Library. A compendium of resources where you can find critical how-to information needed for survival in a crisis. Everything from how to make a torch to how to make a portable generator from a lawn mower. The idea is to visit those sites and print the instructions, and place them in a safe place and in your ‘go bag’ so that you will have them when needed; they won’t be available once TSHTF.

Preppers Are Not Stupid; Dissonant Non Preppers Are Doomed


Even our own government, normally blind to problems until too late, has been warning us for years to be prepared for ‘something scary,’ and the list of concerns is very scary. The stakes couldn’t be higher: if even just one thing on the list takes place, being ill prepared can perish whole families and, in short order, whole communities. Here is something that can make a difference, and its free. Its called knowledge.

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 

In this post you will learn…

• What Preppers are and why they exist;

• Why YOU should become a Prepper, and HOW to proceed;

• There are 2 NEW and FREE resources to simplify the effort usefully

Note: I usually well footnote my posts so you can verify what I say for yourself. In this case, the two Facebook pages mentioned at article end, themselves, offer ample proofs for those items not otherwise footnoted.

 

The wise live for Today, but plan for Tomorrow: uncertainty is the only certainty

The Bible is the oldest source of Wisdom modern Man relies upon, and it clearly echoes that thought; there are no less than 25 places in the Bible which so admonish. A good number of these directly talk about the kind of preparedness this post addresses, while the remainder speak to being prepared for entry into the Kingdom of Heaven. But, if one is not prepared for things which can take one’s life, is not the later concern all the more important to prepare for, as well?

Perhaps the strongest and simplest of these are found in Proverbs (natch):

22:3The prudent sees danger and hides himself, but the simple go on and suffer for it;”

27:1Do not be confident about tomorrow, for you do not know what a day may bring.”

If we hold onto any one thing in this country, it is the wisdom of our Founding Fathers, and they were almost to a Man God Fearing and, therefore, they heeded such words. But they themselves also spoke plainly and logically about such things, and framed them in terms of the Nation, as well as the Individual and those we each love, to whom we are responsible for their well being:

John Adams, on the risk of overconfidence and reliance upon government: “I give you this warning that you may prepare your mind for your fate;”

Benjamin Franklin: “By failing to prepare, you prepare to fail;”

Alexander Hamilton: “If fortune should smile upon us, it will do us no harm to have been prepared for adversity; if she frowns upon us, by being prepared, we shall encounter it without the chagrin of disappointment. Your future rank in life is a perfect lottery;”

Thomas Jefferson: “Instead of considering what is past, however, we are to look forward and prepare for the future.”

George Washington, on wise use of funds, such that: “timely disbursements to prepare for danger frequently prevent much greater disbursements to repel it.”

Thomas Pain, on being fugitive from tyranny: “O! receive the fugitive, and prepare in time an asylum for mankind.”

The Modern Prepper and Dr. Strangelove

Early Preppers private Bomb Shelter of the 50's: Dig a hole, drop in some roofing upon a floor, and fill it in.That last quote brings us to the advent of the modern Prepper, a phenomenon brought about by the Cold War and fear of the Bomb. President Eisenhower spoke frequently about the need for Civil Defense Preparedness, and founded what ultimately became FEMA, the ‘Grandaddy Prepper.’ For the rest of us, we were encouraged to prepare for nuclear war in our thinking, and our behavior.

We were taught to ‘Duck and Cover,’ and to plan to flee the cities, or take to bomb shelters. The whole basis of our modern Interstate Highway System was to that end, and so that the military and other aid could quickly flow to any wound in need of dressing. Cold War tensions culminated in the dire climactic confrontation of the Cuban Missile Crisis, and firmly established the era of the Bomb and Fallout Shelters. There were, in fact, enough shelters built to save 100,000,000 Americans, millions being built by citizens in their own homes or back yards: Dig a hole, drop in a pipe and add a floor, and fill it in and stock it.

 

Why prep today? Darker times > starker threats > greater fears

For a time, I managed a gas station while investigating the Oil Industry. That led me to a face-to-face confrontation with terrorism which rendered the investigation superfluous. For those who do not appreciate or understand the Prepper, or why they do what they do, or for the matter, who do not understand Conspiracy Theorists, Truthers, or Targeted Individuals claiming mind control, I highly recommend working for at least 30 days in a gas station. Why? Because that is an excellent place to talk with a large number and a variety of people in the course of doing business, and elicit from them things they would never otherwise admit in open conversation.

sheepdip2I could ask almost anything, and if well proposed, obtain a deeply personal and meaningful reply. And I did, regularly, on on a wide range of topics. What I learned is that there are more people afraid of more things than the mere threat of global extinction from The Bomb and the ‘Red Menace.’ Terrorism, yes, and for more of a seriously right reason than the obvious, a reason unexpected even by them.

It is to me even scarier than the fact that terrorism exists. Few are aware, but the top ranking U.S. Military General, Tommy Franks (who brought the flame throwing tank to Waco), has warned in a public statement that if there is another 9-11 level terror attack in the United States, the Military will take over the government in nation-wide Martial Law. I, for one, do not want flame throwing tanks on my streets.

And, we are still threatened by nuclear war: China’s top military leader has stated that war with the U.S. is inevitable, the only thing remaining being to decide when and how to be the first to strike. And, we have recently learned, they have stealth subs we cannot detect; one surfaced unexpectedly in the middle of a U.S. Carrier Fleet in the middle of an exercise looking for subs. North Korea is constantly making threats, and Obama and Hillary Clinton have assured terroism-minded Iran has access to the Bomb. We have several times in the last year, alone, come close to trading blows with Russian forces which could easily have escalate to a nuclear exchange. And we supposedly like each other, now.

Moreover, as recently played out in the Press, we have learned that a single well placed nuke high in the atmosphere could cause an EMP wave sending us back into the stone age by wiping out all electronics, including the entire power grid. Just as bad, spurious energy waves from the Sun could achieve the same ends, globally, or for the matter, doomsday rocks from space could effect similar damage, or worse. Movie theaters are awash these kinds of with (Extenction Level Event) scenariosDeep_Impact_poster. But there are other fears, and each one seems, in turn, to begat another, often wilder and seemingly more far fetched… which unfortunately, do not seem all that far fetched if daring to explore the facts which are their basis.

Every few months there seems to be another new exotic biological threat, either a weaponized or natural pathogen or virus on the verge of pandemic capability. Each such threat additionally threatens to be incurable and impossible to stop in time because it takes such a long time to come up with defensive medicines. Then there is the risk of financial collapse, which could trigger a global replay of the Great Depression on an unimaginable scale. Civil unrest levels are at the greatest and most dramatic in all of history; the Occupy/99% movement spontaneously fielded many millions of people around the World in the space of days. Our government’s liberal policies and some unfortunate events have fomented racism issues to the point that Blacks are shooting Cops as if at war, and threatening worse.

We see paranoia rampant in our government, who treats us all as if terrorists in the wings, spying on us and taking away our rights, and leading to fears of Martial Law, and/or efforts to take away our guns. DARPA, on the other hand, has ordered billions of rounds of ammo, enough to kill every living soul in North America several times over. FEMA seems to be building large facilities some fear are closer to concentration and even death camps than to shelters. It is at least concretely true that several special inciner-ators have been built, each strategically located, and capable of efficiently destroying hundreds of millions of tons of contaminated materials — which could include human bodies. The fear of Fascism and the comparison of our government to Nazi Germany is commonplace, which brings me back to the dialogs at the gas pump, where these things were said. The most common phrase heard in response to such things was, “When the revolution comes…”

Then there is the dramatic increase in UFO sightings, and much more than that, a growing body of evidence of actual combat taking place. If chemtrails were not already their own perceived threat, consider the latest theory as to their purpose; to weaponize the atmosphere against alien aggression. There is actually some scientific basis for such wild theories, and some to additionally suggest there is an off-world secret space program with Buck Rogers-like Space marines using captured Alien technology. I don’t know about any of that, but the fact that the government is becoming more secretive about the UFO question than ever, before, does not allow me to discount the notion. Presidents Roosevelt, Regan, Bush, Clinton, and Obama, and even Putin, have all alluded to these possibilities, as well as have high ranking military. The recent discovery of a constructed mega-structure orbiting a distant Sun amplifies the possibility: we are not alone. And those at the gas pump agree. More people have seen UFOs or otherwise have reason to believe in Aliens, than not. Don’t take my word for anything in this paragraph; just tune into Ground Zero and scan the archives of shows with Clyde Lewis’ expert guests.

Dare we mention a credible Planet X, super volcanos, global warming and melting ice caps, mega earthquakes, the shifting of our magnetic poles, and any number of scientifically plausible threats and natural disasters capable of inflicting significant regional, national, or global destruction of cataclysmic proportion… or dare we say… Biblical? After all, the other common comment at the gas pump is, “We are living in the End Times.” Indeed, the Illuminati conspiracies, AKA The New World Order, are not difficult to validate with a barrage of demonstrable facts which defy coincidence. This author has made a case in several of his books that the ultimate goal of the New World Order is to form a One-World Government — in order for the Antichrist to have a seat of power, and usher in the End of Ages, the ultimate End Game. It IS prophesied, after all, and many of us fear that as much as anything else.

That brings us full circle, back to the Bible’s admonishments. Being prepared ought rightly be not only for bad tidings, but for salvation. The government agrees, at least with the first part. The last ten years have seen an unprecedented effort by the government to urge us to be prepared for disaster. They have even reinstated and updated the old Cold War emergency radio alert system, and are stockpiling huge quantities of everything from food and medicine, and other supplies, to coffins. And ammo. All they ask you to do, is to have emergency plans and a ‘go bag,’ or store of emergency foods and critical supplies.

It’s simply good common sense. Preppers have been doing this for decades. What’s your excuse? That they are crazy? Better look in the mirror, if you believe that.

Here are two simple and free tools to help you get started

Both are easy to use Facebook pages. One is a kind of compendium of information regarding the possible breakdown in civil society due to the inability of government to respond, or even perhaps government itself has gone terribly awry. It is called the FEMA, Martial Law, Revolution Database (kind of covers all possibilities). It has no subversive intent, despite the scary title. It is very informative, and can help push anyone teetering on the notion of being prepared into taking action. One way it does this, is by telling you what to expect, and what a good action plan/go bag might look like for a given scenario.

The other also has a scary title, but it implies nothing but what it is; a library. In this case, it is a series of links to critical information one might need to survive for long periods without outside help in a serious catastrophe. It is a collection of how-to survival tricks, and how to quickly and easily make common critical items such as water purification systems, emergency generators, and so forth. It is called the Post Apocalyptic Library. The idea is simple: visit the links, download or copy the information, print it out, and put it into your go bag. Instant expert on a moment’s notice! Many of the links will deserve further exploration of their sites, for other good information. There is always more than one way to solve a problem.

Have you ever wanted a certain soft drink? Well, I’m a Prepper, he’s a Prepper, she’s a Prepper, we’re a Prepper; shouldn’t you be a Prepper, too?

Great. Drink deep for best result.

 

 

Terrorist H. Michael Sweeney’s RAP Sheet


OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 

What makes you a terrorist when you live in a Police State?

Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.

One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).

OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.

hmswanted

R.A.P. Sheet, H.Michael Sweeney

1976  Wire Tapping, 2 counts, charges dropped for insufficient evidence

1980  Embezzling, charges dropped after resignation from company

1983  Counterfeiting, Drug Smuggling, sentenced

1984  Wire Tapping, charges dropped for insufficient evidence

1985  Shoplifting, 4 counts, sentenced

1987  Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution

1988  Wire Fraud, 3 counts, sentenced

1988  Smuggling, 2 counts (bioweapons, diamonds), sentenced

1990  Espionage, Interception of Electronic Communications, charges dropped by NSA intervention

1991  Bank Robbery, 4 counts, sentenced

1991  Wire Tapping, 4 counts, cold case due to flight to avoid prosecution

1992  Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,

            cold case due to flight to avoid prosecution

1993  Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution

1994  Wire Tapping, cold case due to flight to avoid prosecution

1994  Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped

1996  Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution

1998  Wire Tapping, Stalking, cold case due to flight to avoid prosecution

1998  Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced

1999  Possession of Controlled Substance with Intent to Sell, sentenced

2001  Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention

2002  Terrorism, 4 counts, cold case due to flight to avoid prosecution

2004  Bioterrorism, case closed due to lack of evidence

2004  Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered

2016  Armed Robbery, 2 counts, cold case due to flight to avoid prosecution

2016  Bank Robbery, cold case due to flight to avoid prosecution

 

Summary Judgement

By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.

Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.

So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.

All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).

We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.

OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.

The Two Party System is Suiciding — Too Late to Save America?


Wake up and smell the mushroom food you’ve been being fed since you were old enough to vote, and before. Plug your nose and consider what’s next…

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

The Two Party System is Suiciding — Too Late to Save America?

Have you not noticed the constant repetitive pattern? Every few years we get disgusted with the last batch of politicians we voted into office, especially at Presidential level, and vote in the opposite party. We are upset almost always for the same generic reasons: they promised one thing (we liked), and to fix what the last bunch did (we didn’t like), but all we wound up with was, ‘the new boss same as the old boss.’ Just like the song, we ‘hope we don’t get fooled, again.’

HOW’S THAT BEEN WORKING OUT FOR YOU?

Racistcampaignposter1

from Wikpedia: 1866 Poster reveals 180 degree turn for Dems, who now embrace/seek political dominance on back of minorities. (click)

Answer: It aint’ never had and ain’t ever shall, unless you are big Pharma, big Oil, big Telecom/IT, big Bank, Big Brother, or simply a fascist, globalist, or illuminati player.

The fact is, the Constitution and Bill of Rights, the basis for our whole system of government by, of, and for the People, so scared the elite power brokers in our early years of Continental unification and domination (formation of the 48 states), that they invented the two party system as a means of insuring that ONLY the power elite could run for high office; a complex system of delegates and voting rules which are designed to weed out anyone who is unwilling to run on a platform sympathetic to the predetermined ‘issues’ which suit the ‘party.’

Note re image: talk about disgusting campaigns. But which is worse? 1866 or 2016, 150 yrs. hence?

Issues are selected not so much on the basis of what actually pulls the people’s heart strings, as much as what the analysts and advisors think will ADEQUATELY pull their heart strings WITHOUT forcing any actual cure or change to ‘gains’ made by the party just prior to last being voted out of office — those things the voters got mad at them for in the first place; it is important to insure voters never remember those things, and focus instead on what’s wrong with the current batch of looters and despots, only.

The two party system is also designed to negate popular choices. No matter how many people vote in the primary for a given candidate, the back room deals in cigar-smoke filled rooms between powerbrokers will ultimately determine who the nominee actually is, and that person is going to be that new boss who’s going to fool us, again. Guaranteed. It’s worse, now, because now they can legally hand out Havanas.

Finally, it is designed to quash any possible third independent party contender. They do this very easily by telling you that to vote for them is a wasted vote (true only if you actually vote for other than your actual preferred choice), and by telling you that such a vote dilutes any chance of defeating (whomever they think you fear being elected). We hear that time and time again, and heaven forbid that if such a candidate should actually make decent headway, they will find a way to destroy him before the election ever takes place.

That is exactly what happened when Ross Perot ran against Clinton/Bush. As I had warned the Secret Service based on my ten-year investigation into abuse of power issues by the New World Order, it seemed absolutely clear that an assassination or blackmail attempt against him or his family to force him out of the race was inevitable. Indeed, within weeks of that warning, Anthrax powder was mailed to his family, and according to my SS back channel contact, it was the same as employed against Clinton’s Bodyguard, the man who was set to testify against Clinton over illegal activities undertaken while Governor of Arkansas prior to his Presidential bid. As result, on the very night that Perot won the State of Colorado and was assured a position on the ballot, he withdrew from the election without a useful or true explanation.

Is the Two Party System suiciding?

I believe it is. There are several coincidental forces which are destroying it from within, and they each tend to cross pollinate one another.

  • The Democrats have only been able to field a closet Communist and a closet criminal (simplest descriptions). I’d be happy to defend those labels if anyone cares to be shut down by facts not commonly found in controlled media.
  • The Republicans have only been able to field a closet fascist (my fear, hope I’m wrong), a batch of Bush clones and other elite same-as asses.
  • Both parties have underestimated just how fed up the People are, and have largely failed to elect platforms that we really care about, except for Trump, who unfortunately seems to be more verbiage than substance.
  • Controlled Media has repeatedly run afoul of that underestimation by electing to attack Trump when he says something ‘controversial’ or ‘politically incorrect’ only to find the People disagree with media and are beginning to wonder why still shots of Trump are always unflattering as if he is shouting a curse, and shots of Hillary are always smiling sweetly. “What? Us have a biased agenda?”
  • The threat by almost all candidates that if not nominated (i.e., the ‘wrong’ candidate is nominated), they will consider to run independently, not only threatens to destroy the party, but also, to split the final election vote in favor of the opposing party. But one or even both parties could end up doing this, which would negate the split and make it a true free for all.
  • Should Hilary be indicted (she is under FBI investigation which continues to uncover considerable evidence of wrongdoing, and not under a ‘security review’ as she prefers to call it) after nomination, no one has any clue as to what would happen to resolve the Democrat’s quandary, but the net effect would likely be much the same as in (5), above.
  • Should Trump fail to be nominated, no one knows what the Repulisvecan party can do to resolve the problem of how to win the election if he indeed runs independently. Ditto for the Demoncrats shoul (6) transpire.

So my answer is YES, and thank goodness! I’ve harped against the two party process ever since Obama, and should have been ever since I started voting… but I thought I was doing fine on mushroom food, like everyone else.

Is it too late?

Probably, at least in one major way. No matter what happens, we are going to get a President and resulting cabinet we will later wish was merely a Dog Catcher or Postman, and perhaps not even that (no slight intended of those public service posts).

Hopefully not in the more important way; the future of America is, after all, at stake. The true issues we should be dealing with have never been raised by any politician save Perot, perhaps, and even he did not take full aim, in my view. To see what I mean, check out my 24 campaign planks were I running for President.

The chaos which would result with the collapse of the Democans and Republicrats would create a power vacuum the likes of which this nation has never seen. We would end up with countless new political parties seeking to rush in and redefine how candidates got on the ballot: a Constitutional or Populist Party (Hooray!), a Liberal Party (ye olde democrats), a Conservative Party (new age republicans), a Neocon Party (ye olde Republican good fellows), a Moral Majority Party (dazed and overwhelmed by LGBTG and the like), a Nationalist Party (military-industrial-intelligence-media complex), a Centrist Party (big everything), a Socialist Party (dare I suggest ye new Democrats), and perhaps even a Communist Party (Putin for President?).

That might be a good thing, provided anyone can really tell who all the new players really are. That’s because most of them would choose names other than I’ve shown which better describe their true colors, to include someone calling themselves Republicans and Democrats. It might take decades to figure them all out, with many new bosses the same as before along the way. I kid you not.

Final scene, The Fly, 20th Century Fox, 1958

From final scene, The Fly, 20th Century Fox, 1958

Nothing in politics is ever what it seems up front, and given the chance to remake themselves, politicians will simply take off one sheep’s disguise and don another, and in this case, there will be secondary disguises several layers deep to make sure we have a hard time finding their true nature. About the only ones that would be truly identifiable would be a Constitutionalist and Communist party, presuming someone else didn’t beat them to the use of the name.

I feel like the half-human Fly caught in the Spider’s web in the movie by the same name…

Help me… help meeee!”

 

FCC to Kill Local Television as We Know It


Once more, we see the Federal Government usurping power in ways which both benefit the big corporations at the expense of personal freedoms and financial viability of citizens. This time, it’s the FCC, and not the BLM, and they want to eliminate any chance for you to watch local television without paying through the nose for it… and suffering de facto censorship.

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

FTC to Kill Local Television as We Know It

From infinite unknown.net on Obama approved NSA spying on Internet (click)

From infinite unknown.net on Obama approved NSA spying on Internet (click)

Tuesday last, a little heralded announcement by the FCC once more revealed how controlled mainstream media is. They, more than anyone, perhaps, should have been screaming the news from the rooftops, and complaining about it, as it affects EVERY major and secondary television station in every market across the country. The ramifications are so broad and sweeping as to threaten the very social fabric which defines us as a nation. In summary, the threats are as follows:

  1. Eliminates all local television service as we know it today, virtually ELIMINATING ALL OVER THE AIR BROADCASTS. No more ‘free TV.’
  2. All licenses by FCC currently in place are cancelled, and ‘up for sale,’ they want to raise 60 billion dollars which will be unaccountable funds off the FCC budget. This means they can be spent on any black project without any accounting.
  3. Major stations (e.g., your local ABC/NBC/CBS/FOX affiliates) will be paid many millions from the sale, far more than the stations are actually worth; hush money not to protest, we must presume.
  4. Secondary stations, including repeater stations or small unaffiliated stations in deep rural markets, and even possibly PBS, will be paid NOTHING, a virtual THEFT, and possibly, a loss of all public broadcasting systems!
  5. All will be sold to Cable and Web content providers, forcing consumers to get any TV by paid subscription or on-demand purchase.
  6. Significantly eliminates local news coverage, limiting it to official sources only; the government’s preferred message, a form of censorship which effects de facto mind control.
  7. Stages the FCC for total control of Web content under the new ‘authority’ it declared for itself last year; easier to censor and dictate what you can learn if there is only ONE resource and it is controlled by government.

 

from International Liberty's page on foibles of FCC's 'Net Neutrality' (click)

from International Liberty’s page on foibles of FCC’s ‘Net Neutrality’ (click)

It follows the Fascist model: The plan is insidious beyond belief once fully understood. It is perhaps no coincidence whatsoever that it follows Obamacare. If one reviews history of the quiet takeover of nations by Fascists and other dictatorships, those ‘bloodless revolutions’ always start with the complete takeover by government of all health care, followed next by takeover of all media. What follows is usually great financial and social upheaval allowing significant draconian responses, to include something along the lines of Hitler’s Brownshirts and the SS, and a permanent war footing with an expanded military and military police state. But people never learn by the mistakes of history, and there is plenty of that…

It happened that way in Germany, Italy, and in South America, it happened again and again. In each and every case, the takeover steps were quietly initiated and never fully understood even by those involved in enacting the changes. In every case, they inflicted greater hardships socially and financially upon citizens than those woes they claimed would be addressed thereby. In each case, a central power figure emerged who responded with ‘law and order’ and bypassed, neutered, or altered the form of government to a Fascist regime.

Unfortunately, any and all of the current Presidential candidates, save one, could fit that bill in this author’s opinion. Trump appears to be a closet fascist, Cruz appears to be one of the same old gang of criminals who brought us to this point in the first place, Bernie is a closet Communist, and that awful woman is simply a criminal rapist of nations and peoples. But my opinions are unimportant. Even if whomever is elected is not set to be a fomenter of fascist revolution, the power elite who manipulate politics will simply assassinate them or blackmail them to assure the desired outcome.

Naturally, like most draconian moves by government, the official propaganda is worded exactly the opposite in tone to the reality. That’s why we get Bills that actually accomplish the reverse of their title, like ‘Affordable’ Health Care Act. Believe as we say we do, and ignore what we actually do.

Take a look at FCC’s official page, here.

Now, lest you think me simply another lunatic conspiracy theorist, I got my first wind of this plot, to include all points cited herein (save my opinion on SOME of the candidates), from a conservative call-in radio show where the station owner of a secondary market called in to shout a warning and explain exactly how it was rape and pillage of the television industry and the public in favor of Cable and Web bigwigs. I don’t make anything up; I don’t have the time nor inclination!

 

The Death of Proparanoid… again


Yes, Virginia, over the several decades of my personal battles with elements of the intelligence communities of several nations, as well as criminals and terrorists, there have been actual death threats and multiple attempts against my life, attempts to silence me.

I’m still here.

But my voice seems to be dying; I’m being methodically and systemically silenced.

To be sure, that, too, is not the first time it has happened. Some of it has actually been funny, or at least done with a sense of humor by someone with a lot of power, someone a bit more intelligent than the mindless robots normally employed in targeting someone for their political incorrectness.

The NSA was the first to employ technology to silence me. When I was guest on Art Bell’s Coast to Coast with George Noory for three hours. Part of the show was to be on the Flight 800 friendly fire shoot down, where I was going to announce discovery of startling new proofs. About five minutes before I was to be called by C2C staff for hookup, I got a strange call that lasted about 30 seconds. It consisted of nothing but high-speed tones somewhat similar in nature to the sounds of a fax machine…but this was different.

I knew what it was, and had written about it in my books. NSA helped develop the telephone networks we use today working along side of AT&T and also, Bell Laboratories, who were security related clients of mine. SoI recognized these tones as the data packets used to manipulate the phone system’s switching network. There is almost nothing these codes cannot accomplish, and they are part and parcel of how and why NSA’s Echelon gives them complete access to all phone/fax and other telecommunications.

So I went on air as expected, but when we came to the commercial break and it was announced that when we came back, we would offer blockbuster information about flight 800, the stage was set for the dirty trick which would be based on such manipulations. Coast to Coast, like most such syndicated shows in the day, feeds its program by phone to various radio network resources. Now, to make the significance of what happened next, it is important to know this is at a time frame when the official FBI/NTSB investigation was still going on and knee-deep in charges of a cover up, and all three TV networks were owned by military contractors who made various elements of shipboard missile systems or the actual missiles we now know shot down the airliner by accident.

The show continued and the information was revealed. But some weeks later it was learned that a funny (literally) thing had transpired. In the New York/New Jersey Long Island area where the plane went down and the investigation was underway… the same area where the US Navy was hauling select wreckage retrieved from the ocean to junk yards instead of the investigation site where the plan was being reassembled in an attempt to find a cause (so we were told)… I was silenced.

The truth was not to be heard. No. Some clever reworking of the phone system had people who were listening to Art Bell’s show, once the commercial break was over, suddenly found themselves instead listening to rebroadcasts of Art Linkletter’s ‘Kids Say The Darndest Things’ show from decades earlier. To my way of thinking, that’s incredibly creative and funny as dirty tricks go. Once we stopped talking Flight 800, the regular show returned to the airwaves, there. Once the show was over, five minutes later, I got another phone call with the strange tones.

A more physical silencing took place shortly thereafter when I was guest and ‘Field Correspondant’on Michael Corbin’s radio show out of the Denver area. Now he used a real radio station, but also used phones. Got the same tones phone call with that show, too. But more than this, someone took an ax to the cable feeding the show to the radio tower, itself. I was silenced.

Sadly, it was not too long after that that Michael Corbin himself was silenced. After a series of death threats, his home and the radio studio suffered an arson attack, along with one of his vehicles. He called left me a message for advice as he feared for his life, but again, telephone oddities prevented our actually making contact. Three days later, he was found dead in his good car at the side of a highway. It was ruled a heart attack, but he was, as I recall, just over 30 years old, and had no known heart conditions. He was silenced.

Not long after that, my only Web site at the time, proparanoid.com, was hijacked by Men in Black. I was able to investigate it thoroughly and determine two CIA fronts were involved. One of these was Enron, formally known as Hughes Tools, taken over by CIA after the billionaire died. The other was a Web domain proxy service which specialized in registering domain names anonymously so you could not find out who owned them, as well as remarketing domain names… typically hijacked, on behalf of said ‘anonymous’ owners.

Only problem was, it seems they were actually the owners. They also offered hosting services, and ‘just happened’ to own thousands of porn sites thought operated by CIA in order to collect sexual preference information of powerful people, sometimes useful in blackmail efforts. Others in that collection were, in fact, traced to staff members at the firm. The head of the firm had a work history that fit the general profile common to persons running CIA fronts, but the two most condemning clues were closer to smoking guns.

One is, that the servers they used were actually housed in Enron’s headquarters building a few blocks away from… the other site that was a clue; the firm’s business offices were in the same building Lee Harvey Oswald used to work with FBI agent Guy Bannister… the building with two corner entrances, one on each cross street, which opened to the same interior, but each with a different address. This allowed the FBI and, presumably, CIA, to operate multiple fronts from the same offices, but use different addresses so that they would not be linked. It now appears CIA owned that building, and has repurposed it.

The hijacking was not to make a profit, as most such hijacking intends. The typical resale offer for a Web site of my popularity in terms of the number of hits was about $400. But if I was to get my site back, they demanded $157K. No way. I was silenced, at least temporarily, until I could create a new site. Several, actually.

Now we come to my death.

To be completely honest, part of that death is not due to politically motivated intrigues by Men in Black. Certain family affairs, health issues which prevent me from holding a job, as well as my age, perhaps, and general financial issues were clearly involved; they set the stage for and enabled the unexpected assaults. What happened happened covertly, and would take time for me to discover, making it too late to counter.

I lost my home and was forced to live in my car, which means I also lost my ISP service, and my email addys were shut down. Yet somehow, after the email accounts were no longer operational, someone with spoofing skills (cyberwarrior hacker types) sent an email from my closed email account to my Web hosting service and shut down my account, there. This effectively cut off my one source of income beyond my paltry Social Security checks.

Next, they transferred ownership of my domain names to a firm, this time, in Canada. But as I do not now enjoy useful Web access, since I still live on wheels and have no ISP, I can neither investigate the matter or usefully replace the Web sites. Somehow, by the way, they also killed the cached pages in Google and elsewhere about my previous hijacking, which included evidence. I am silenced.

Or not. My wordpress account remains open. Most of my old Web site pages can still be accessed in archived from (e.g., Google proparanoid + a keyword/phrase, and click the little pull-down menu arrow found at the end of the green secondary URL line, and select Cached).

To those who have followed me over the years, bought my books or newsletters, I thank you for your loyalty and kind comments. Death threats aside, I’ve probably had only three people say a consequential bad thing about my work, people who were sincere and intending constructive advice. Those who were simply hateful or who were clearly pushing an agenda, I happily discounted.

I can still be reached by text messages (very short messages, no subject line) at proparanoid at vtext com. I do also attempt infrequent access to my email account at proparanoidgroup at gmail com. You can still order my books using the My Books link at page top. You can still pay for books or send me contributions to proparanoidgroup at gmail com via PayPal. You can also still access my Facebook account under H. Michael Sweeney.

I have been silenced… but you can still hear my muffled words, if you try hard enough.

Free Will Haven; Targeting Free Intentional Community for Stalking Victims


When I created the Free Will Society to aid stalking victims, one of the lofty goals was to eventually build some form of Safe Haven community for them. That dream now seems on the threshold of coming to pass. The result is Free Will Haven.
iWhere can a targeted individual get help?
Free Will Haven; Targeting Free Intentional Community for Stalking Victims
by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What is Free Will Haven?

Free Will Haven?

MAJOR UPDATE/REWRITE: Aug. 2017. It’s been three years now since we formed the Free Will Society with the intention to establish a low-cost, self-sustaining, targeting-free intentional community (Free Will Haven) for stalking victims who can’t get a fair shake at life in populated areas. A lot has transpired, some of it really good, some of it bad, and now, it looks like we are ready to ramp things up a bit. So I thought this page should be rewritten, and perhaps, be simplified. Very little of the original post remains, or remains unchanged, and I have added rather a lot about the Beta site which was established and our plans for an even better location. Over 2,500 victim days targeting free! Compare that to over 12,000 stalking victims I’ve had contact with over some 25 years where almost every victim says they can’t get even a few days respite, if not for the stalking, then the fear of it.

Intentional Community? Beta site has been undertaken

Wikipedia’s definition for Intentional Communities is a full paragraph long. Simplified, it is a community planned from the start to cater to specific persons of like (interests, beliefs, goals, needs, etc.), typically favoring alternative lifestyles which foster those goals. You can learn more about such communities at sites like tedxblackrockcity.com (informative video), ic.org (a kind of ‘superstore’ of centralized info on topic), dba Fellowship for Intentional Communities (Facebook  page). The Free Will Society is now a Member organization of the FIC, which gives us access to a mountain of informational resources and other aid not previously enjoyed. Much of this is now available and useful to FWS Members as result.

FHHlogo

P.O. 1941, Clackamas, OR 97015 — no phone service here

In Free Will Haven’s case, our goals are ecological and consumptive sustainability (not to be confused with the New World Order’s use of ‘sustanability’ when pushing Codex Alimentarius, Agenda 21, GMO foods, Genetic Engineering, Global Warming, Carbon Tax/Credits/Currency, etc.); survivability (in this case, against all forms of surveillance, stalking or targeting of individuals in any manner), and financial and spiritual wellbeing (the unchecked pursuit of happiness through exercise of God’s gift of Free Will). Defensive survivability lays at the heart of the plan, and is based on the many books and online consultancy I have made available as a privacy/security expert to targeted persons for more than 25 years as The Professional Paranoid, the title of my first book.

Low cost is addressed primarily by focusing on portable tiny homes, or RV vehicles for short-to-long-term housing, and communal style co-op sharing of centralized services and site-produced foods and resources. Cottage industry will be encouraged to augment personal incomes, and/or like projects for the collective. It is the goal to allow one to live a decent and enjoyable life-style for less than $500 a month, total outlay (I’m managing on $400), that figure based on purchasing of food and supplies from outside sources. Once self sufficient, costs would decrease accordingly.

intentional

Rendering example of tiny home intentional community

I think of FWH as a bit more flexible than a community. I see it as also acting as a short-term hospice for those seeking temporary shelter and healing from their ordeal, and in some cases, a school of defensive arts, and even self-replicating factory. Residents can stay as long as they like. Once fully rested and obtaining stability in their lives through being targeting free for a sufficient period, they might wish to return to society, perhaps under a new identity (we can help with that), or, perhaps, having learned what it takes to establish and operate such a community… go out and create another one, somewhere else. We would like to see several of them nation-wide, and even internationally.What makes Free Will Haven an intentional community?

Tiny homes and RV life style?

A tiny home generally references any small living space intended to be extremely practical and economical, though minimalist in nature. As a rule, this commonly means either a starter home for a young couple or single individual, or a retirement home for someone without a family, as a tiny home cannot have many rooms dedicated for family functions and individual compartmentalization.

The original tiny home movement included exotic efforts with costs of $1M or more not uncommon; ultra modern, hi-tech, and with prestige designer labels attached. The grass roots version, on the other hand, has gone wild finding ways to do as well with less, with costs ranging from well under $10K to perhaps an average of about $40K for the higher end; about what one might put down on a conventional home mortgage. This has resulted in an almost unlimited array of possible home design types and, as result, flexibility in meeting individual needs and tastes, like these as found at pinterest.

You can have tree houses, container homes (check these out), domed homes, spray cement (free-form shape) and similar homes (check this video out, and this), underground homes, and more, including homes that simply look like a normal home but scaled down… some of which are on wheels. That brings us to the fact that a motor home, RV vehicle, trailer, or even a manufactured home also qualifies. All of these are on the drawing board/table at Free Will Haven.

The ones we favor most are the ones you can order pre built and delivered to the site (look at these, and you can even get an ‘Ikea’ home complete with furnishings), or the ones you simply buy plans or kits for and then build yourself (like these). Or, they can be ad-hoc, and built from whatever you can cheaply get your hands on. Google any of these home types for endless solutions to choose from, and when it comes time to actually consider residency options, we will work with you to fine tune or better the ideas you favor.

I have established a special page chock-full of information about the ins and outs, pros and cons of the almost endless options available in choosing an RV type or style of Tiny Home. It also addresses the lifestyle, itself. RV solutions provide a quick and dirty ‘home’, completely self-contained with everything needed including their own backup generators. Tiny homes tend to be minus some aspects, such as bathrooms, but can include them; its up to the individual. They can end up being more roomy and comfortable than an RV, and seem more ‘homey.’

The Free Will Haven concept encourages use of an RV upon arrival, and the construction/installation of a tiny home (many of which can be portable and towed like a trailer). If electing a tiny home, any RV in hand can then be sold or rented to someone who does not have one, sold for long term, rented for short term. The same can be said for the Tiny Homes should a resident choose to relocate and not take the home with them. There is no reason anyone should feel that becoming a resident has no exit options. Quite the contrary. It increases options.

Beta site effort proves viability

Beta.png

Beta site proved concept quite workable

The original Beta effort has resulted in the purchase and operation of a rather off-grid beta site by one of our founding members using their own money. It operated for about two years serving two TIs using most of the basic plan established by the Free Will Society. For whatever reason, the owner/operator of the site elected to abandon reliance upon and participation with FWS, though we had provided money to help pay for installation of electrical power to the site. There are clues it involved personal matters as well as relationship issues.

While there is some mystery as to why a refusal to engage in dialog, it is clear the Beta site was successful in terms of the key-most goals; survivability targeting-free. We are grateful for their effort. The Beta site failed only because of eviction for contract violations of some sort, presumably through miscalculation by the owner/operator in absence of help from the FWS. Due diligence is always upon the purchaser, who was at a disadvantage in many ways in terms of ability to do so. It is a regrettable outcome.

Meanwhile, I myself have been living as a homeless person in a motor home. I have essentially established a semi Beta site of my own where I was the only resident, also in a deeply rural environment. Between my experience and the actual beta site, there has been a total of more than 2500 targeting-free days. It has been a joy for me, and the Beta site operator has come forward publicly to express positive views towards the experience and an intention to attempt yet another effort. In that effort, the operator has affiliated with a new core group with a troubled past with respect to credibility and honesty, and we wish them all better luck.

The concept is proven. 2500 stalking free days!

Now it is time to move forward more earnestly, and do it right, this time.What is a tiny home like in Free Will Haven?

The future: location and logistics?

The original beta site (image) was less roughly 1 acre in size, and rather a long, narrow unimproved property at a high altitude in a colder part of Oregon with a dry clime (annual high of less than 60 degrees). It had no water but was near to a river with drinkable water and fish, and she had a water filtration system. It would support a well at shallow drill depth. It had no power but as it fronted a main highway for the area, it did not cost much to install power. It would support raising crops, and was established with an Airstream trailer (very nice) and several other towable items, and self-assembled Quonset-like structures for storage and greenhouse function. It is not known if a second RV was brought in for the second resident; the Airstream is thought to sleep up to four persons in two different accommodations. Still, it is not a terrible site, actually fairly decent given it was purchased sight unseen and based on a limited budget.

This site was not chosen with the help from or according to the ideal guidelines established by Free Will Haven. Since the purchase was made with the operator’s money and in consideration of their small income, that exercise of control was perhaps expected. The basic-most needs were considered to the extent possible. But While there was some good visual separation between the site and neighbor structures by trees, it was not as private as FWS would prefer. There are two neighbors within about 600 feet of the property (less than a city block). The nearness of a main highway, though also buffered with a lot of trees, is also not a perfect situation. I do like the fact that the rear of area (not shown) is backed with a high bluff which is uninhabitable, and provides security.

We can and should do better. Recently, my Publisher bought some property at auction and invited me to live there rent free. While it turned out not to be possible due to dense forestation requiring expensive work just to get onto the property with a motor home, the method of acquisition was unrealized in previous review of potential sites. Things are looking up.

ideal.pngCompare the the Beta site to this 20 Acre property which represents the ultimate site for meeting goals established for Free Will Haven. The road is a gravel road established for timber harvest and is seldom used by anyone but hunters — residents could hunt on the property if desired! It dead ends at the property, which is a flatland at the top of a hill, and continues into the property as shown for easy access.

It has multiple developable locations and area for growing crops without the need to fell trees. There is NO ONE for miles in any direction. These are the kinds of features preferred in the actual site. Depending on many factors, a really good site could be as small as perhaps 5 acres and still prove satisfactory. Geographic features such a hill can negate concerns about privacy as relate to adjacent properties. There are many such opportunities; cliff faces or steep terrain, rivers, national forests, etc., can all be allies.

This particular location is very inexpensive to purchase despite the larger acreage, simply because there is zero access to commercial power at any cost. That lets it out of consideration, as neither solar nor wind power enjoys economy of scale in the levels required to support a comfortable life style for a given individual, much less a collective. It would take approximately $9,000 per living space for solar, for instance — without a battery system to cover nighttime use (another $4,000). Figures are based on the same power level as the generator output in a typical Motor Home. If one had a few hundred thousand to tie up into an off-grid house, that would be a small bit of the budget. But that’s not your typical stalking victim. I’ll mention here that the weather is much nicer at this location, too, withs highs in the 80s.

The all important factor in any land acquisition, of course, is cost, including what it will take to occupy it successfully. As it happens, there are properties which fit these kinds of requirements which are available at a price I can afford. Sort of. The trick is finding them where the owner will finance with ‘ez credit terms,’ which, fortunately, is not unheard of. I have to be able to handle the monthly payment out of my pitiful social security payments, and have a low enough down payment that I still have money to pay for bringing in power and a water storage system, and a few other items such as a storage shed, and a freezer (a Motor Home typically holds about four days worth of frozen foods).

Alternately… should the Society obtain a large donation or one of our members win the lottery (I buy tickets), I’ve found marvelous properties in Missouri which offer as much as 160 acres fully developed as a farm or ranch capable of producing an income suitable to cover mortgage… for less money than it would cost to buy a house in most big cities. Many of these have rivers, lakes, or ponds and wooded areas full of all manner of wildlife, such as Wild Turkey, Geese, Ducks, Deer, Boar. This allows hunting and fishing right on the property, many of which have hunter’s cabins or blinds in place. But I’m not waiting for $300-500K donations.

I’m scouring land listings for something I can buy NOW. And, I will be starting a new gofundme for anyone willing to help, and/or wishing to participate, perhaps, as resident.

Participation: Membership and Residency

member-badgeAnyone and everyone is requested to join the Free Will Society, stalking target or no, to support the Free Will Haven project (and other projects planned in the future). Annual membership is $25, currently payable by PayPal to proparanoidgroup at gmail com, adding comment to that effect in the message it requests in the process. Membership gives one access to more detailed information, including the history thus far of the project in detail, and an opportunity to participate in and contribute to the ongoing dialog and direction of the effort. It also gains access to dozens of resource materials from our membership in the Fellowship for Intentional Communities.

One must be a Member to apply for residency. There is a separate $25 fee to cover the application process, which is required to insure that all residents will be able to benefit without social incompatibilities. It is unfortunately true that there exist people who claim to be stalking victims who are not, for instance. While one can join and apply simultaneously, I advise against. Membership will provide access to a flood of information and direct contact with other members, and could conceivably end up changing a person’s mind about residency. One should be fully informed before deciding.

The application process further educates the applicant toward decisions about if, when, and how to undertake the actual move. It analyzes the applicant’s ability to actually undertake the venture with a reasonable expectation of happy success, fully informing them of what to expect in the way of possible downfall, all based on their precise personal situation. A checklist of things to consider and steps to be taken is reviewed in great detail, critical in determining the true cost of ‘move in.’ Once approved, they need not act immediately, and can work through the checklist at their own pace, as may be dictated by anything from costs to family affairs in need of tending.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View


The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some Satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines form a 3-D perspective view of Cheaps and transparent depiction of all inner passages;
•  that there are specific ties between Cheops and the goal of the New World Order;
• that Cheops is a kind of key to understanding European Illuminati/Templar relationships to mass shootings.

Are mass shootings by intelligent design?

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Is there a mass shooting conspiracy?

Mysteries of Cheops

In the prior post we saw ties between shooting event lines which formed Masonic and Satanic symbols, and a series of orange lines which led us to the Great Pyramid, Cheops, in Egypt. While those were quite remarkable and sufficiently consistent to defy any chance of random coincidence, what follows will dramatically make concrete the notion of intelligent design as well as the importance of Cheops to said design. And finally, we will see there is yet another way to look at Cheops’ roll in the Illuminati/Templar and mass shooting tie-ins, but this time, from the European point of view.

First, we need to understand a bit about Cheops and its importance in mysticism. There is so much which could be said that there are literally countless books on topic which could be entered as ‘evidence.’ Here, I will focus on less than five percent of such material topically, only able to skim the surface of them. Consider it merely to whet your appetite to learn more, for which some suggested links will be provided along the way.

One key aspect of Cheops is that it is rich with magic numbers. This seems to be true regardless of if using the original units of measure employed by ancient Egyptians, or modern day equivalents. Indeed, some of our current units of measure stem directly from the ancient Egyptian measuring system, a fact often laid at the feet of Freemasons and their predecessors, the Masons. While I won’t spend time expounding, many of the measurements of Cheops, both in original and modern increments, enjoy magic number properties, doing so in ways which, like those illustrated in the prior post, are mind boggling. Some serious mathematicians have found even more wondrous relationships to both the ancient and modern discoveries of Man well beyond any possible knowledge to Egyptians of old.

Perhaps the keymost aspect of Cheops which potentially makes it ideal for inclusion in mass shooting patterns is that it is only the Giza Pyramid which has a complex of inner passageways and rooms. Early mystics and even some studies of Cheops by persons with scientific credentials and methods, have proposed and illustrated a belief that the construction of Cheops was an enlightened project involving supernatural or mystical knowledge of the future; the internal passages and chambers thought to be a roadmap to End Times and key events along the way. That is represented by the image, below, from this interesting Web site. Others out there (with less useful images) have more detail with the most recent/current annotation being the year 2010, roughly the height of mass shootings. That marking is in the King’s Chamber, which implies ‘control and authority.’

ONE Egyptian Inch = 1 Year of History. From gizapyramid.com (click).

Of specific interest to mass shooting research and the notion of Illuminati Masonic Warlocks being the architects, thereof, is the fact that shooting lines can be found which quite correctly depict a pyramid across thousands of miles of the United States. More than this, they quite usefully do so in 3-D rendition, even to the point of detailing the inner passageways found in Cheops. In fact, the depiction is so uncanny as to have key aspects ‘to scale’ with measurements which work math magic using modern increments of measure against the ancient’s units of measure; not just scale in size, but across the barriers of time in the expression of numbers in different languages and cultures. Take a look:

 Do the pyramids really relate the entire history of the World from beginning to end?

Shootings depict Cheops

Pyramid

Left: perspective transparent view; Right: inner view of interior passages. Remarkably, it took only 9 shooting lines, and 14 shootings, to depict the pyramid and passages. However, 5 shootings stand alone (not on lines), meaning 9 are, giving us again the magical 99/18 result.

As you may recall from the prior proof the orange lines are lines which run from shootings directly to the Great Pyramid, Cheops, each exactly 500 miles apart as measured along a given line which is perpendicular to them all, and which itself runs through several shootings. The green line here, however, is at the distance of 10,000 miles from Cheops, which is one/fourth the distance around the World (the vertical diameter being 40,008 miles on average), and it too transverses several shootings and is perpendicular, but the distance at this point between lines is 505 miles.  Each orang line originates dead center of Cheops and is separated by almost exactly 7.5 degrees of arc to achieve this feat. That is interesting for another reason; 360 degrees divides by 7.5 exactly 48 times, and 24,000 miles (the rough diameter of the Earth horizontally), divided by 48 indeed equals 500 miles.

Now there are some admitted problems in trying to depict a pyramid with any degree of accuracy in a 3-D perspective view, especially if with cutaway to reveal interior passages. Such a view does not simply allow us to measure a line and compare it to Cheops with good expectation of results. Perspective causes a measured horizontal to be less as it is depicted further away. A line transiting diagonally in one or more axis in 3-D space is even less useful unless one knew the precise angles for each axis both it and the original against which it was to be compared, were employing (and additionally, the depiction version is arbitrarily decided by the person rendering it, and impossible to discern without their sharing).

Cheops!

As the satellite view is at a an angle, the ‘center’ is based on the base, not the peak.

The depiction in this case seems slanted over America as if about to slide into the Caribbean. That is for a reason: it is faced (viewed) with the same face (view) as the actual Cheops is when following the orange lines, there  — presuming in both cases one is looking from the center orange line towards it. That is to say, looking at Cheops in America from the center of the lines, would give you this same perspective view if standing in the center in Egypt. That cannot be coincidence.  The problem with that, however, is that in Egypt, in relation to the Orange lines, one corner is clearly (looking down from Google Earth) nearer the observer’s position than another; there is no line which is not at an angle to the observer.

Note: I further feel it is an error to assume that modern-day Illuminati Warlocks have the skills and knowledge base, or event he interest in the crafts and mathematics of Masonry, which they left to the Adepts when Templer remnants infiltrated the Mason’s Guild and eventually took it over to form Freemasons. They are not likely going to go for precise renderings as much as symbolism; accurate to the point which can be managed simply, but no more, I believe.

 Why do Masons, the Illuminati, and Satanists focus on Egypt and Cheops?

How much is a Royal Cubit, anyway?

It is, as result, impossible to establish a precise method or true consistency in relationships (i.e., to test for accuracy in scale) of measurements between Cheops and the American pyramid. The required data and accuracy required to plug into complex formula is beyond our ability to deduce. Ideally, a computer program modling in true 3-D space could be used to compute and confirm such comparisons… if we knew the angles employed by the architect of the American depiction.

But that does not mean we give up. We do the best we can with the tools at hand, and must come away at the very least acknowledging that in the 3-D layout, the mere visual similarities alone are sufficiently ‘coincidental’ to imply intelligent design, and in need of further study with better tools. But that does not mean we cannot ‘cheat,’ and then test to see if our cheat had any merit. After all, perhaps the architects employed a similar gambit. We wont’ know unless we try, ourselves. So…

By rotating the view as I have in the image above, we at least have the illusion that the base line is perpendicular to our viewing angle such that we are tempted to measure it anyway, and then see if there is any discerned relationship to Cheops which results in some kind of conversion factor. If we CAN find one, we can then apply that factor against other test lines and, in theory, if or factor was arrived at by other than coincidental happenstance, we should find the measurements work out correctly in the conversion. Guess what? We can, and it does!

Cheops on a side is 440 Royal Cubits, or 36524 Egyptian inches (a precise year’s worth of inches times 100), which works out to 230.4 m, or 756 feet. I will admit that finding a conversion factor took me some time. I made no headway at all until I realized that the orange lines were like rays of a projection lens in a theater, taking a small image and projecting it to be much larger at a distance. I reasoned there had to be something about analogy involved in the conversion factor.  I also felt that any such conversion MUST involve the ancient increments in some conversion to the modern, rather than a modern to modern comparison. Turned out true.

As I discovered, if you divide 36524 by 440 you find that there are 83.009 Egyptian inches in a Royal Cubit. Funny. Both sum to 20. If you then multiply this times the total degrees of arc for the American depiction, which is three orange lines, or 22.5 degrees (±.03), you end up with 1867.7, which is exactly the measurement of the depicted base line… in Kilometers; ancient to modern, using the orange lines as calculator. So, now to test the accuracy and intent, vs. the notion of coincidence (pretty big coincidence, if that is all it is.)

Testing our factor: There are only a couple of other places where lines are similarly ‘perpendicular’ to our view (like the base line) by our peculiar method of so assessing for the purpose. Two of these are passageways to the King and Queens chambers, which just happen to have shootings (house icons employed for this use to match the drawings of the actual Cheops chambers) at the approprate locations to at least approximate the inner passages with an appropriate resemblance. But there is a problem with trying to test these with our conversion factor. It has to do with the Mississippi River.

Looking at the drawing of Cheops’ interior, you will note there is an irregular passageway leading down between the upward and the downward sloping passages. This is thought by some to be a water drain, as there are interior air vents which happen to align with prominent Constellation stars on select key celestial event dates, and that admits water. The lower passage in fact has a chamber with a deep pit which resembles a Well. In America, as it happens, the Mississipi River runs a course reasonably similar to that passageway and at the appropriate points in our depiction, given some small fudge factor.

Clearly, the Illuminati has no control over the course of the Mississipi, which changes slowly with time, and therefor, any depiction of the inner passageways must in some way accommodate those changes. My conclusion is, therefore, that such accommodation would necessarily mean a skewing of measurement accuracy in these passageways. Indeed, no line among them which is angled, nor the passages to the King/Queen chambers, quite works out, though some come closer to doing so than others.

But there is an entirely different story in play once we get past that drainage passageway, at the very bottom of the network. That whole portion is, by the way, beneath the ground level of Cheops by a goodly distance. In fact, the pit, which was filled with loose rocks as if a French Drain, once cleared, measures 60 feet deeper.  Now, there are three points of interest with respect to testing our measures, and some landmark verifications we can also apply…

These are: the entrance passage to the Subterranean Chamber; an exit passage which is a dead end; and the pit. Applying our conversion faster, all three lines as depicted are of the correct length and are at the correct scale to the previously computed base line. But there was no shooting or key line to establish these lines (well, one line seems to do so), so we must seek some other verification that these are as intended by design. They do exist. Lets take a look:

SubPass

The entrance passageway: The entrance passage determines the location of the Subterranean Chamber in the depiction, which we will verify separately. But it also has an unusual feature along its walkway, a kind of antichamber or alcove to one side, with no discernible purpose. On the map, at its correct location in the depiction, we find our old friend, Remington Firearms (the white arrow). That was, in fact, one reason I tested line placement at this site. Interesting then, that both this Proof and the prior Proof find their factories involved in shooting lines, baphomet lines, orange lines, and pyramid lines. That cannot be coincidence, and points to intelligent design, and intent — especially since the other Remington facility from the prior Proof is also present directly along another passageway, as seen in the first image of the depiction from above.

The exit passage and pit, on the otherhand, when extended the correct distance within ONE METER accuracy, end at… water wells, pumps, and tanks; which relate well to the purpose of the Subterranean level. That leaves the Chamber, itself. You will note a graphic image overlay veils in transparent fashion the intersect between the two measured passages and the pit. While there to represent the chamber, it is not really as ‘large’ as the chamber would be if to scale. At a particular location within the Chamber area it does cover, we find a nuclear power plant. This is interesting because much lore about Cheops includes references to end times, and equates the Subterranean Chamber to Hell, and the bottomless pit. One of hottest things we have on Earth is the interior of a thermonuclear power plant, and it burns both with heat, and invisible radiation; hell on Earth, should you care to experience it, with or without an accompanying China Syndrome ‘pit’. But there is an even more interesting verification, which is why the overlay:

Chamber

It is hoped that it is not intended that this nuclear facility suffer a China Syndrome disaster such as seen at Fukushima, in order to render the ‘pit’ real on Earth in a hellish fashion.

The inset is the original artwork from which the overlay was obtained, a sketch of the what the actual Chamber looks like at Cheops, where it is described as seeming more like an underground quarry with lack of intent in what remains. The original is of very low resolution, I’m sorry to say. What I noticed about it that caused me to think to do the overlay, was the leftmost vertical protusion. I’m glad I did, because when I overlaid it, seeking to line it up with the cooling tower of the nuclear plant, I noticed something.

Actually, I noticed it while playing with the transparency level so I could see where I was positioning it. I truly wish I had video capture ability to show you the startling discovery, which, with a slight change in aspect ratio, was maximized; the darket portions of the overlay precisely match and seemingly define changes in terrain or map features. The effect is this: it gives the impression that the terrain to the South and near the power plaint has been cultivated to MATCH the overlay usefully. The best that I could hope to do to depict it here was to increase the contrast of the overlay, and alter the levels. There were originally only two discernable shades, black and gray (it is a B/W original image with some dithering in evidence). There are now four, and only the lightest of these is NOT defining a shape or darker area on the Map.

I apologize in realization that this is nowhere near as useful a description as the visible effect I’d rather show with video, but I assure you it is startling and implies, along with the wells and the Remington matter, that these lines are indeed intended to be here and at these dimensions, which in turn verifies the scale conversion factor discovered. Intention by design, in design.

 What is the the relationship of Cheops and Mass shootings to Templars and the Illuminati?

The European point of view

EuroAt right is an image looking from Cheops towards Europe, to reveal how it ties in with the Illuminati and Templars of old… not to mention any modern day Illuminati Warlocks operating there, today. Especially if their operations include casting magical designs in mass shooting in America to fast forward the formation of the North American Union and establishment of a one-World government under control of the Antichrist. Observe:

At the bottom we have our orange lines radiating outward at increments of 7.5 degrees of arc, where, in order to get to their designated array of shooting destinations in America, they must first pass through Europe. In Europe, we find one of these lines passes directly through the birthplace of Adam Weishaupt, Masonic founder of the ancient Illuminati (ironically, in 1776 — not truly ancient as most count it).

It is interesting to note that one can create in Europe, using only the birthplace of Weishaupt, and the orange lines, a baphomet which is correctly aligned Northward (the stray orange line), IF, and ONLY IF, running the North-line through the VATICAN IN ROME at the adjacent orange Cheops line. Then, IF, and ONLY IF, electing to use the Weishaupt’s birthplace as the center of said baphomet, will it then result as seen.

The significance of that is manifold. For one, it rests upon the remainder of the orange lines in precisely a mirrored orientation and in like relationships, in general, with the orange lines as does one of the baphomets in America. In other words, just as the depiction of Cheops in America was at the same viewing angle relationship as if looking at the real Cheops from an orange line, so it is, here, with the two baphomets.

Thus once more, the orange lines ‘project’ an image in useful scale with the same orientation to create a sister depiction in America. The difference is, THIS ONE, is properly aligned North for ceremonial use, and the one in America is flipped, so to speak… which allows IT, TOO, to be aligned with North IN AMERICA. How can that be by anything, but design?

Weishaupt’s baphomet, by the way, is at a point along the orange Cheops lines where, if used as a measuring point, they are exactly 333 Km apart, which is 207 miles (sums to 9), and 180 nautical (18), and since 18 = 99, that makes 3 threes and 3 9s, which is 999, or a code number for 666. And, of course, if electing to measure in both directions (the diameter of a circle about the birthplace between two adjacent orange lines), we also get 666.

Finally, we also see in the image the yellow icons for Templar castles and other properties, at least the ones we know about, and the red icons (and one balloon icon) which are Illuminati historical sites. We see also one green and one purple line coming from America, one a guideline from a baphomet depicted, there, and the other from a Masonic emblem, there… where both additionaly go directly to Cheops. The circle is complete; Cheops, European Illuminati and Masonic (Templar) histories (and arguably, current Warlock activities), and shootings in America and their resulting patters, all neatly tied together by six lines which impact all else. Coincidence?

 What is the link between Masons, the Illuminati, Satanism, the New World Order, and Egyptology?

Go back to Introduction

Go back to Proof SevenShootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Go to Proof NineShooting Sets Share ‘Magical’ Data Points Which Decode to Messages

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart


Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that select shooting lines can be extended to a single spot on the other side of the World;
•  that spot is the Great Pyramid, Cheops;
•  that the lines are exactly 500 miles apart at a given point and form the same angle of arc.

Are mass shootings by intelligent design?

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Is there a mass shooting conspiracy?

The last proof resulted in some negative commentaries to group posts announcing its availability, all based on disbelief in the postulations advanced. This requires me to repeat myself: It does not matter what you or I believe, it only matters what the architects of mass shootings believe. Now, in this post, we start to examine the symbolism of Cheops and its ties to the shootings, which is also about what THEY believe. But first, I owe readers of Proof Six an explanation about the relevance of the ‘orange lines’ to select purple lines of the satanic baphomets and green lines of the Masonic emblems discussed as tying directly tie to Proof Seven in an unusual manner. So here we go, referencing the image below…

The orange lines are the multiple lines to Cheops this post is all about, of course, but those lines by and large pass through Europe using what is known as the Polar Route on their way to Egypt; the shortest, most direct route, despite the fact that in the movies they always depict planes flying East over the Atlantic to get to either Europe or the Middle East, or the other way ’round if going to the U.S. This is why, for instance, Iran Contra gun running used a stopover in Denmark and other Euro sites on their way to Iran, something which at first didn’t make sense to me when I learned of it.

The purple and green guidelines used in finding and plotting the baphomets and emblems also go to Europe, and end up doing something the bulk of the orange lines ALSO do: they just happen by ‘coincidence’ to pass through at least one, but more often, MULTIPLE ancient Illuminati and Knights Templar castles and other properties employed in their conspiratorial affairs, including some more modern facilities, and even Adam Weishaupt’s birthplace. He, of course, was the founder of the Illuminati, and a high Mason, and the Templars were the folks who evolved eventually to become the Freemasons we have today, as outlined in my book, MC Realities. There is one other line which does this, which is a red line created from a perfect isosceles triangle from Proof Three, which is the best example of ties to the modern Illuminati, as well as ancient, but also Cheops as it also directly intersects with the famous glass pyramid at the Louvre Museum in Paris.

There are other indications these lines and their relationships with Illuminati and Templars is tied to Cheops, in that some of the lines continue past Europe to the Middle East to find Templar sites, there, and two others, one each from a baphomet and an emblem, go directly to Cheops as if an orange line. It is interesting to note further, that these two are extremely close to the second orange line in from either side of the six orange lines; uniformity. Take a look: each white arrow indicates a line of interest which ties to the Templars or Illuminati. The ‘houses’ represent Templar locations (those icons refuse to float accurately over their respective sites at this viewing altitude), and the harder to see red dots are Illuminati, save Weishaupt’s birthplace, which is well marked. There are 18 lines in all, our magic number which equates to 666 in occult terms, only one of which (orange) does not find a Templar or Illuminati site, but we are talking about locations which in many cases have been lost through the centuries and, likely, it really does do so, but we simply have no such knowledge, today. The modern day Illuminati, however, WOULD know. The line certainly passes through territories where such properties are otherwise existent (not all sites are shown, only those which are intersected by lines).

pastpaths

Cheops I had previously been aware of the importance of Cheops to Masonic and Satanic histories, some more tenuous or doubtful than others, but all generally of a mutually supportive nature. If one reads the Masonic Bible, Morals and Dogma, it is clear that the leadership of the organization at the higher levels, is Satanic in its beliefs, practices, and tactical applications, and that all things of Ancient Egyptian lore play into their belief structures and lore. To Masons, especially, there is significance in the Pyramid, and thereby, also to Satanism.

Yet one can find other resources which state the Pyramid is outright tied to Satanism in one way or another, both inclusive and exclusive of Masonic ties, which came later in history. It is a Chicken or Egg question, or sorts, depending on the factoid being considered, but we need not answer those questions; our concerns are valid regardless of the answer. So when I noticed that some shooting lines seemed to angle off toward what I knew to be the ‘polar route’ to Egypt. I sought to verify, and was immediately proven correct. In the image above, find six orange lines which all meet precisely at the peak of Cheops a third-way around the World. They are all drawn at the same degree of angular separation (about 7.5 degrees).

At a given point in the map, in America, they are all exactly 500 miles apart, and as this image shows, they relate to shootings as they go. To date, only one (left most) has no useful shooting along its path to make the claim, but that does not mean there will not be in the future, and so, it is included. It may prove a means of predicting and even preventing a shooting. CHEOPS ALIGNMENTS x 6 There is no significance in the 500 number — at any given point, the lines are equidistant by some measure, I just chose a point where it produced a round number.

However, as research continued, I learned some things which would seem to make that a more important point. In the image below, this is revealed, and in the doing, we see also how the shootings themselves tie to the lines in important ways. More than this, the actual measurements once more reveal magical use of numbers in the occult manner. We should talk about accuracy. Given the great distance these lines must travel (35 million feet or more), the worst accuracy of these key lines is typically less than .05 degrees of arc (dependent upon Google Earth limitations as discussed early in this posting series), or some 15,000 feet at measure point. These work out to a maximum error of .007% and .0004%, respectively. I’m good enough with that to cite it here as proof of intent, given that the architects of mass shootings likely used the same tools, as I. There has, after all, already been revealed in prior Proofs several clues that such is likely the case.

cheopsUSA

Here we see some 440 plus mass shootings plotted along with the six orange lines from Cheops. The three green and three red lines are for measurement purposes, and require some dialog in order to appreciate the ‘craftmanship’ employed by the architects; a kind of confirmation this is no random outcome. The Meridianal (vertical) circumference of the Earth varies depending on where measured, but the average is 40,008 Km. This means that the point where the orange lines are furthest apart is some 10,000 Km distant from Cheops. This spot is found at the middle green line, and the measure there is essentially 2,525 miles.

This is confirmed in the red line between adjacent orange lines which measures 505 miles.  The other two lines are the points where 500 miles between, is found, for 2,500 miles total separation, there. EACH OF THE THREE HAS AT LEAST THREE SHOOTINGS ALONG ITS PATH. These numbers prove interesting, and thus I also elected to measure the diagonal (vertical red) and ‘hight’ (red along the orange line’s path) of a given rectangle formed by these lines. The vertical line, which happens to be North corrected for magnetic declination, a trait seen time and again in the various alignments of Satanic and Masonic symbols in the prior Proof, measures 777, a magical triplet. The height measures 606 miles. More interesting numbers.

Take a look (numbers are rounded unless otherwise stated, and reflect allowances for measurement errors introduced by Google Earth as previously mentioned): Note: you may wish to review the sidebar post on Magic Numbers before continuing. Because… 500 Miles = a palindromic 434 nautical, which sums in pairs to 77; 777 is not only a magical triplet, but forms by summing in twos (1414) the inverse palindromes 141 and 414, which sum together to form the triplet 555, and equals 675 nautical, which sums to 18, and 1250.46 Km, which sums to 18 by threes; 505 and 606 are both palindromes, of course. And about 2525, divide it by 505, and it goes exactly 5 times. 505 + 606 = the double doublet 1111 (a quad) 500 x 505 = 252500, which sums to the doublet 77; 500 x 606 = 303000, a palindrome times 1,000; 505 x 606 = 306030, a palindrome times 10 which sums in threes to 99, which is a code number for 666 just as is 18; 306030 also = 492508 Km, which sums to form the inverse palindromes 151 and 515; and 606 x 777 = 470862 which is divisible by 18 2,159 times, and the grandaddy 666, 707 times.

So we end up with 505, 606, and 707 palindromes, and the triplets 555, 666, and 777. 505 squared = 255025, which sums by twos to the palindrome 757; 606 squared  = 367236, which sums to the the triplet 999, a code number for 666 (upside down); it also divides by 18 to provide the palindrome 20402; 777 squared = 603729, which can produce 999 by summing by 3, 2, 1 digits consecutively, a bit unusual; We can’t easily find the area by simply multiplying 606 x the top or bottom, because they are different. We can do that with both and then average the result. This yields 303000, a palindrome times 1000, and 306030, a palindrome x 10. The total of the two  sums to 609360, sums to the palindrome 6116, and which divided by two = 304680. So now we know the area, which is 1680 sq. miles more than the smaller of the two, and that much less than the larger, of course. 1680 = 2704 Km, which not only sums to 13, but is divisible by 13 208 times.

The orange lines in detail

In the last Proof, we found the orange lines tied usefully to the layout of the four baphomets and Masonic emblems. Here, lets relate them more directly to the actual shootings which were also part and parcel of those relationships. The first lines at image left does NOT actually line up with anything, YET. It is presumed they will eventually line up with a shooting and may be useful in prediction of same, as there are very few communities in its path with logical targets which fit with other predictive factors. But I will not state these as our paranoid government tends to make anyone predicting such violence based on ANY criteria as the only ‘terrorist’ or ‘suspect’  in question. They tend to lock down such locations and charge the person who gave the warning with criminal intent of one sort or another, or act harshly against them in some way. Apparently, ‘See Something, Say Something,’ is a trap, and considered a crime. I know that at least twice that I reported terrorist activities, they did nothing about the report other than to harass me and try to cost me my job.

The next line is perhaps the most dramatic in terms of accuracy and alignment. It bisects with extreme accuracy two shooting events, even a third within Google Earth dictated error limits. The third also has three shootings within accuracy limits, two of which almost meet doorway-to-doorway accuracy.That line also passes through the Denver International Airport and quite near to a man-made earthen Ziggurat (stepped) Pyramid thought by many conspiracy theorists to be a D.U.M.B. (Deep Underground Military Base). The site claims to be a landfill, albeit the highest and fastest growing of its kind by far, if true.

It is also true that in its current state, it only appears to be a Pyramid in three of the four sides, the fourth being the area where ‘fill’ is taking place at this time. The next line features the sloppiest, worst-case error with two shooting points in its path. The larger error does not dissuade me, because both are quite equally distant from the line on opposite sides of the line (the line cleanly centers between them). There is additionally a business, Pyramid Foods, almost directly on the line near the Bartlesville HS shooting plot of that line. The next line also sports two shootings, one of which is quite near Meridian, MS; Cheops is itself a similar distance from Meridian, Egypt (a neighborhood name also used in several business names, there). The final Cheops line merely intersects within 1,000 feet of a single shooting event. This is near King’s Highway, and Cheops is a King’s tomb. Thus all the lines currently aligned with shooting points, are several are also aligned with something having to do with a Pyramid. This yields yet more consistency, but feel free to presume it coincidence, if you must. What does Cheops have to do with mass shootings?

Why Pyramid?

Beyond the earlier comments about why Cheops is important to Masons and Satan worshipers, there are a few other things which should be mentioned. One has to do with the construction of the Pyramid, which many historians think drove the establishment of at least some of the ancient Egyptian’s measurement system. What is interesting about that, as casually mentioned earlier in this series, is that as history progressed, their system became in various ways the bases for both the English and Metric systems, as well as the system employed in America. It is alleged that Masons (Templars) were the driving force behind this, in part, to insure or play to the mysteries of magic numbers.

One of the few 3-D cutaway views on the Web from ancient-egypt.org (click)

So do not be surprised then, if the next post, I tell you that there is not at least one measurement at Cheops which is duplicated in shooting lines here in America which depict the same part of a pyramid in a 3-D view, but using different increments and a different scale (think miles for inches, for example). I’m still working on verification of a list of suspect instances, but it certainly seems the case. This would NOT be possible if there was not some basic underlying ‘magic’ built into both measuring systems with respect to conversions. But the real thing of interest about Cheops, here, is its lore.

Many learned researchers have studied the Pyramids endlessly to formulate many different theories relating to its design, how it was constructed, what its purpose was, and so forth. Many of their findings are controversial, but few are invalidated by the work of others, but might remain rightly in the realm of speculation, or ‘lore.’ Among these are two which would logically be of interest to a Warlock or high Mason (sometimes, the same thing).

The first involves the inner passageways of Cheops. We know these are important to the architects of shootings because, as we will see in the next Proof, they are faithfully duplicated in the 3-D depiction of Cheops by use of shooting lines and shootings. The reason why would seem to be in the lore, which according to some, says that these passages are a kind of history of the World being depicted from creation to its destruction. They actually make a very good case for this, and my own conclusions would tend to agree there is something to the notion, at least symbolically, if not accurately to the year. The claim was, that each Egyptian inch represented one year of history, a thing which seems to be true at least for specific historical events used as benchmarks.

If, therefore, the need to seat the Antichrist in support of end time prophesies requires taking away guns in America to allow the formation of the North American Union, then our architects, being wise in the magic and lore of Cheops and the like, would most likely incorporate as much of that magic into their plans as they could manage. The second involves what is called Pyramid Power in a book by the same name written by Max Toth, which is as good a reference as any of like conent summarizing the lore of Cheops, including the inches for years theory. If even half of the claims within were true (and I have verified at least two of the main claims in my own experiments), that is one more reason a Warlock would wish to incorporate pyramids into any conspiracy aimed at seating the Antichrist. But again let me say, it does not matter what you or I believe about such lore, it only matters what THEY believe.

Go back to Introduction

Go back to Proof SixShootings Also Relate or Depict Masonic and Satanic symbols

Go to Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View

Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols


Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.

Are mass shootings by intelligent design?

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

UPDATE:  (this comment, only) This post has generated some negative comments based on the commentors disbelief in the concepts being advanced. I need repeat myself; it matters not what you or I believe, it only matters what the architects of mass shootings believe.

 

What you will learn reading this post of the posting series

•  that the lines also defy randomness in their placement to form Masonic and Satanic emblems;

•  that the emblems are carefully aligned on the Earth in ways which reflect their function;

•  that they are rich with clues which hint at who and where are the designers;

that if you look closely, you can actually see how they ‘function’ as a magical weapon.

Are mass shootings by intelligent design?

Proof Six: Shootings Also Relate or Depict Masonic and Satanic Symbols

Is there a mass shooting conspiracy?

With respect to hidden symbols, we start with the basic understanding that Freemasonry and satanic cults do indeed have recognizable symbols they employ regularly. In some cases, they are more than symbolic, and have actual occult function. But one thing is true of all such symbols; a given symbol has a definite known shape with precise geometric relationships to other parts of the shape. So, if you know a select few points ANYWHERE upon the shape, you might be able to then define the remainder of the shape because you know what it is supposed to look like. This creates a potential problem when looking for such symbols in a ‘target rich environment,’ such as our map of 440 plus shootings.

Early Masonic Ceremony using satanic deity, Baphomet, from which the satanic ritual star is named.

Early Masonic Ceremony using satanic deity, Baphomet, from which the satanic ritual star is named.

In fact, some readers might rightly worry that it is too easy and therefore falls back into the realm of chance once more, no longer proof of intelligent design. I agree. Therefore, any such finding must be reviewed carefully for signs it was actually INTENDED, or traits which could not be so easily found true if by chance. In truth, I worried this might turn out to be quite a challenge, but in the end, the methods employed lent themselves to discovery of verifications suitable to address such concerns. Each one found by such means passed muster as being well beyond probabilities of chance, a fact I believe the reader will also find true.

Short of some custom computerized search, such finds still remain challenging, since one does not well know WHERE in a given intended shape a given starting point is located within the design, nor is the orientation or size of the shape known. In other words, you have to endlessly compare the same suspect points against endless possible combinations with other potential points, testing for all orientations and sizes. Tedium!

I’m operating on the assumption, here, that any architect of a grand design would want something more definite in such a ‘clue’ than something which might be seen as random, or require a custom software program; a deliberate placement, one likely with a specific relationship to a key location or course alignment which has additional meaning. The satanic baphomet, for instance, is normally aligned to North when actually employed in a rite, or ‘aimed’ at a target, and each of its five star points has a specific meaning which should likely be related to map location details; fire, water, earth, sky, and spirit.

So lets take a look: presented herein are four satanic baphomet ceremonial stars, and four Masonic emblems. It is my belief there are four intended for each, and no more, as I also believe (as do others) that there are four Globalist groups competing to field the Antichrist. Indeed, the individual Warlock designers are, themselves, likey hoping to be the chosen one.  Yes, more symbols may exist, perhaps intending nine or eighteen of each in support of magic 18. But one indication four is the right number is that it took several days of relatively easy effort to find each set of four, but several days more in each case found no more.

 What does satanism have to do with mass shootings?

Finding satanic baphomet symbols

In terms of simplicity for the designer, it is super easy to depict a baphomet upside-down, five-pointed ceremonial star with very few points. Because all the lines are the same length and join one another at the same angles to create yet another inner set of intersecting lines of equal lengths and their own duplicated angles, all you really need is to know any two line intersects at star tips or inner crossover points, and the rest could be calculated easily, though you might not know which crossover/intersects you are originally looking at (more than one star could result).  But that’s also just too easy, and would mean every two shootings could generate multiple stars. Commonplace, and unacceptable to designers, and to our purposes, here. Both they and I would prefer something more… more dramatic in order to reveal intention… the thing that made it hard to find more than four examples. If I’ve done a good job of insuring that, the more you read, the more you should be convinced of intelligent design. One clue they are not random is the sharing of shooting lines and events.

Though all 440 shootings were employed in the search, in the end, it turned out that ALL four of each symbol type (four baphomets and four Masonic emblems) employed their own limited universe of shootings… with many of the same shootings in both universes. Below we find the baphomet universe. It only took 23 shooting lines to depict four baphomets with some very interesting relationships. While each shooting line involved three shootings (I think one had four), the number of shootings depicted in the images below is only 54, because 22 shootings share common lines, and because I did not plot middle shootings of a line if not actually used to establish the symbol. Also, some are not visible at this viewing altitude because they are so close together. In such cases, I made one plot larger; when you see a larger dot, there are at least two shootings near to each other, there.

If you sum those all up by twos (line and shooting counts), we get our magic number, 18, a kind of cross-checking proof this is not random, but intended to be found design. The same exact thing will happen with our Masonic emblems, which will follow. How would it be possible to get that kind of consistent results by chance? All I know, is it is impossible for me to calculate the odds, they are so high. So, lets take a look, starting with four sample baphomets.

Bstart

The variety in color and shape of shooting markers can be ignored and seen as equal. FAMOUS SHOOTINGS involved include: Sandy Hook, Aurora, Columbine, D.C. Naval yard, Sikh Temple, Virginia Tech, both Ihop Restaurant shootings, five Postal shootings, the original mass shooting at the Texas Tower in 1956, and the Seal Beach Salon shooting, worst in California history.

The lone shooting at center-top will serve as a kind of test gimmick, if you will, for determining an intended design vs. randomness in the findings. It does have its own line, one of the 23, which is not visible due an error on my part, which runs under the orange line shown below, to Aurora. The next image also shows our first baphomet along with several additional orange lines which are not themselves shooting lines as such, though they will be seen as originating from shootings, or may even be atop of actual shooting lines. These lines are all exactly 500 miles apart as measured at the green line, which has no other purpose but to show the point at which it is so. All of these orange lines are actually part of an entirely different proof of intelligent design which will be described in another post in this crime series. But they also function as aids in proving intelligent design, here.

Baphomet ONE

B1

Color coding for added lines: Bold purple Baphomet lines, thin purple center guidelines, green line is point of measure of distance between orange lines, orange lines 500 miles apart go to Europe and serve as indicator tool for verification of intentional design vs. randomness.

This is the smallest of the four discovered. It has only one shooting at an intersect, but enjoys a large number of additional shootings, many more than needed, along all but one of its five lines. Two of these are also upon the same orange line, and two others on a another orange line. Note the thin purple center guideline line I generated. Though drawn based only on the baphomet’s construct, the line does something which relates directly to the orange lines, which while I cannot describe it here without giving away a future surprise revelation, additionally associates the shape with the orange lines. Therefore, this baphomet associates itself with the orange lines quite usefully, the importance of which will become more obvious as we go.

The center guideline also sports two white arrows. This is unique to this baphomet; both of these locations are Remington Firearms factories. I am amazed at such a ‘coincidence.’ I will not speculate on the meaning of it, as I think there are several equally intriguing possibilities, some favorable to Remington, some not so much. This may perhaps be best left for another day, another post. But in the summary section, I will analyze this emblem more closely so show you some of the ways it works its magic, and additionally illustrate intelligent design.

Baphomet TWO

B2

Here is an example of a ‘minimal definition’ baphomet: two interests enjoy shootings and at best, only one is found along a line. However, it is uniquely defined in another way. One point and one middle intersect rest on two different orange lines. Moreover, the Northwest and East most star tips have a useful relationship, as well; one is over the orange line, and the other is short… by a like minimal distance. Indeed, the baphomets are very hard to draw with accuracy (I depend on trying to get all lines the same length — almost impossible, typically achieving to within a few miles at best), and so they may therefore actually rest on the lines perfectly in their designer’s version. Finally, note that the star line running Northeast reveals a guideline continuing on into Chesapeake Bay in Canada; this line also has something in common with the orange lines, further helping this baphomet pass the orange line test.

Baphomet THREE

B3

At a glance, you might think this is the same image/symbol as the last. But no: it’s an amazing symbol very nearly the same size and location as the last, but with THREE intersect shootings, all augmented with five additional line shootings. But that was not enough. Two of the intersects are on the same orange line, and the same Northeastern running star line is actually parallel to another orange line. That same star line also has a guideline entering Chesapeak Bay which once more does what the orange lines do.

Baphomet FOUR

b4

Talk about minimal definition, this one has zero intersects. However, it does have two and a questionable third shootings on a single line, and four on an intersecting line. Because it is so large, curvature becomes a factor in verification, as only a given symbol size and orientation (a small fudge factor is present) will allow all those shootings on the two lines to work, thereby eliminating a need for a shooting on an actual intersect of two lines. But we don’t have to rely on the fudge factor:

This time, it is the lower right star leg guideline which does what the orange lines do, but additionally, the rightmost orange line is actually parallel with that same line. This is only possible when the second line at any given distance has a precise difference in degree of ark from the first at a given starting point on a common perpendicular. If curious, we have that common perpendicular in the green line, and at that point, 500 miles distant, the inner-most line is running 54.04 degrees and the outer is at 51.49. Measured at the top of the line at the opposit star point, the distance error between the two lines is well within the margin of error in degrees of arc course measurement. Again, this is only possible with only ONE baphomet location, size, and orientation.

Four baphomets: all different, and yet all the same, in that;

a) they all share the same set of original shootings/lines (universe);

b) they are all therefore interconnected just as we found true of our isosceles triangles in the last proof;

c) they all have at least one line (side or center axis) which is symbiotic with the mysterious orange lines;

d) they are all verified by said orange lines, each in their own way;

e) the first four have a star point which can easily be associated appropriately with something nearby to represent fire, earth, water, air, and spirit. This is not terribly difficult if the star point is at a shooting because that means a population center with concentrated supplies of such relatable sites, but few work out that way, and therefore, your choices and chances of a match dwindle as you go to the next star point. The fourth is so large all of its points encompass water, making it the most difficult to determine: one is ‘the major air corridor’ for air traffic from North America to Europe, and one encompasses a portion of the Pacific Ring of Fire, but determining which one is spirit and which is earth, escapes me. That all of the baphomets (save that one question mark) otherwise meet this goal surprised me, as I though there would be more undefined, presuming their relationship veiled by designers to things known only to conspirators.

f) all of them seem usefully inverted in ways which imply four possible different Warlock designers from various locations: the first is inverted for anyone in Central Mexico or Central America, and there are candidates in both locations; the second is inverted for anyone in Scandinavia or Mexico/America (candidates abound), and the third is not only inverted but also aligned usefully North for anyone in America, while the fourth is aligned either for anyone in Spain/Portugal, or America/Mexico, uniquely so only because of its size.

And while there are yet more indicators of intelligent design in the summary, does it thus far seem like randomness in play, to you?

 Is there a Masonic connection to mass shootings?

Finding a Masonic Square and Compass emblem

The Masonic Square and Compass are most recognized of all Masonic emblems. Since it depicts a Mason’s (or, if you prefer, a Carpenter’s) Square rule, the first thing to try was to find right angles in the mish-mash of lines. Actually, this is how Proof Four came to be, and so we already have several good places we can look. Once having selecting a right angle for consideration, the next step would be to plot a center axis line bisecting it to form two 45 degree angles. This will become the vertical center axis of any resulting compass.

Next, one should seek to see if there were logical locations along that line from which two more lines could be drawn in mirrored angles away from the centerline to each side to create compass legs. To be valid, both lines would need some logical means to find an acceptable ending location to produce two legs of equal length. This might be determined by landmarks, or by completing a 3-D leg using a second inner leg line set devised in the same manner as the prior legs, and a like process for the square. We need to end up with something which looks very much like a logo emblem instead of a stick figure scratched into sand.

As you can imagine, this is a tedious process; it took a little over two days to find what I felt were all intended present; again 4 such emblems, likely one for each competing architect or group of designers. These are shown below, this time with the orange lines in place, along with the single stranded (lineless) shooting mentioned in the baphomet section, herein.

Once more, a limited universe is involved. In fact, it only took some 26 lines (image) created by roughly 64 shootings. All lines had three shootings, but 14 lines shared shootings in common, reducing the total involved to less than three times the line count. Sum those two numbers and you get… our old magic number 18. Another indicator these are intended and not random emblems.

Estart

Color Coding: Red, same as before; Yellow are right-angle shooting lines; Green for emblems and their guidelines. Twenty four of the 66 shootings in this universe are also found within the baphomet universe, including Aurora, Sandy Hook, and Seal Beach, and several of the postal shootings. That’s an interesting way to get 666.

Emblem ONE

This is the smallest and one of the easiest of the four emblems to find, taking just a few hours. In the image below we see it formed by the yellow line of the left portion of the square. The right portion should also be showing a yellow line as it is indeed a perpendicular. Must have failed to turn it on again after turning it off to see if there was more than one line present, as some red shooting lines are sometimes hidden by the wider yellow. Let me apologize in advance: the verbal narrative tends to be complex in nature, but is quite required if someone with an understanding of basic geometry is to see how the shapes were arrived at without having to make assumptions or guesses based on visual clues within the images. On the other hand, some people will find the images cluttered and confusing, and the text easier to grasp. Used together, issues in one should be clarified by the other.

E2

From this was drawn a center axis at 45 degrees. Nowhere along this axis did anything jump out at me to suggest a logical compass tip, so I instead tried to find any two shootings which could establish mirrored angles at some point along that axis to ‘find’ the tip that way. Only two shootings (both blue) allowed this to happen, and a third shooting (yellow) on the right compass leg verified it legal. That same shooting, and yet another yellow shooting near the center axis, together suggested a logical upper line for establishing the square in 3D. Though not intersecting with the anything else used as a reference point, the line was indeed parallel with the lower right square line. Establishing a green guideline at the intersect with the axis by the line created by the two yellow shootings did indeed lead to another shooting beyond the image.

Another shooting line from the left compass leg had its middle shooting (blue) within the emblem area, and made establishing the complete inner line of a 3D compass easy. The other (blue) shooting on the first compass line, allowed reflective guidelines for the end lines of the square at equal distances, two more shootings helping in that effort (one off image to lower-right). This is fairly typical of how I attempted to find the other emblems.

What is atypical about this emblem is  a theme suggestive of a different designer than the others; schools. Each line seems to start,  end at, directly cross over, or is within about 200 feet or so of dozens and dozens of schools from K-8 through colleges, including several major university campuses. The square so encounters 33, the compass 46, and the center line, 11 more to total 90 in all. This sums to 18; 33 = 6, 46 = 10, 11 = 2; 6 + 10 + 2 = 18.

Before we go: not shown because we are viewing so close in on the map, is that the left compass leg guideline, extended for the purpose, does the same mysterious thing as the orange lines, yet to be revealed.

Emblem TWO

This works much like the last, so much so that I’ll not start with a detailed close up, nor describe blow by blow. But there are some unusual additional confirmations which imply a different architect than any of the others, and that’s where I’d like to start. The two images below reveal the alignments with existing perpendiculars, and the unusual confirmations. The first thing to note, perhaps, is that it is upside down (not to someone in Europe), and its pependiculars literally frame the Eastern Seaboard and Northernmost part of the U.S., leaving the compass to point at the middle of the country as if piercing it.

E1

 

E1d

Marching to a different drum, this designer elected a unique theme; almost all corners and endpoints lay at a point having something to do with transportation or movement (of water). The two compass legs and several of the corners (not all shown) end precisely on roadways. Two of the corners end on railways. One of the bottom square corner (perpendicular) and the inner 3D line of the compass end at water. Confirmation of intent, and perhaps a clue as to the identity; someone big in the transportation industry, perhaps? Again, in final note, and not shown, the right leg guideline of the compass does the mysterious orange line thing when extended toward Europe.

Emblem THREE

This one was problematic, and its solution again implies a whole new architect. The issue was this: the actual perpendicular being tested (off screen to the lower-right) failed to be useful; it supported no emblem. But I noticed a shooting line that seemed perpendicular which was NOT yellow. At first I thought I had made a mistake and missed one, or had accidentally deleted its yellow companion line. But no — it was simply beyond the acceptable error of .1 degree of arc, it being hard to visually judge such small differences.

And yet, the line was begging to be considered, because in addition to looking temptingly perpendicular, it also ran usefully parallel with and atop of the edge of a large dam (see smaller image in the right margin). So I wondered? What if the designer had intended to use it, anyway? After all, I had no way of knowing what degree of error they deemed acceptable.

E3

E3d1I thought I should at least give it a try, and went ahead and plotted a center axis test line (not shown) and looked along its length for an appropriate compass tip. What I found, changed everything. The image montage below summarizes the remarkable ‘theme’ findings, and more.

There was indeed a very logical starting point for the compass, but it was NOT on the test axis line, it was about 1.5 miles West of it. So I moved the axis line to match, and then finished trying to flesh out an emblem to see if there was good result. I reasoned that if it was so intended, the validity of the effort would reveal itself true somehow. Indeed.

The montage of insets below reveal just that, and are key to understanding why I find the results acceptable. So much so, in fact, that I now additionally reason that there may yet be an intended future shooting planned to create the very line I manufactured, but which like the one over the dam, does not actually bisect with the perpendicular to create a right angle, and thus does not spoil the count of 18 such relationships from our prior Proofs.

Indeed, this may be a very valuable find, as it MIGHT allow prediction of a shooting event, and perhaps even its prevention.

E3d2

Quick montage review: The yellow line at top-right was the first attempted test center axis line, and the green line is the new relocated but parallel test line, which goes to a mountain actually named Initial Point. When you hold a compass, it is the initial point of control and placement of the compass; the handle of the compass. Now the left leg which was discovered to meet requirements would seem to represent the one with the point you stick into the paper. We deduce this because the shooting is at a hole in the ground (quarry) and that place is called Permanente (when you stick the compass down, it is permanently affixed to the spot until you lift it). More: the actual shooting took place at the Engineer’s Trailer where they very likely USE A COMPASS with their quarry maps. Confirmation of intent.

The other leg lands in the center of a square field (implying paper?). Note the terribly faint green line (of several) attempting to show the high-tension power corridor running nearby… at exactly the same angle to the inner leg as the two inner legs themselves form… and notice therefore, that the road way is perfectly placed to form an isosceles triangle just as would be a line drawn between the two legs, were the power line the other leg; a mini duplicate of the larger compass. More on that, shortly.

This in turn allowed trying to find the inner line for a 3D compass. It worked out, after finding the only place where shooting lines would form mirrored relationships, to be dead center of a circular irrigation pattern. When you spin a compass, you create a circle; a confirmation of intent. Next, I finished the square by extending a guideline from the yellow perpendicular at the point where it bisected the center axis line, and discovered it indeed intersected with a shooting (well beyond the image) to qualify. More intent.

But what about rendering the square in 3D? Simple: the complementary line had to be somewhere below where the yellow perpendicular met the new axis line. Again, scanning the axis line finds the logical place; an upside down pyramid (montage). A significant confirmation. And the ends of the square were easy, as there was a shooting (also beyond the image) which gave a nice proportional appearance. Implied intent.

And yes, the orange line thing happens here, too, it being once more the left compass leg which does it. A couple of additional confirmations are also present. This emblem, like most, is not aligned to North. However, it has an unusual 20 degree angle on the compass — all the others have fractional elements. At that angle, if one chose to lay the compass flat on the map as drawn, and then flip it to the right such that the Initial Point and right leg remained in place,it would then point North… exactly, even considering magnetic declination (which varies depending on where on Earth you take the reading) present at the new location. More: 20 degrees divides into 360 18 times, our magic number.

This is, I believe, incidental to the intended reason for the curiosities in the centermost portion of the montage; the central ‘mini compass’ duplicates this very feat (a flip). The leftmost faint green line from the left leg is the line between the original full size compass legs — the radius of any arc the compass might be used to create. That line measures 176 miles. The faint yellow line in the inset is 176 Meters along the radius of the mini compass, and then turning Northwards, perfectly bisects not only a portion of the farmer’s field (forming three virtually identical rectangles), but the mini compass, itself, becoming its central axis line. At the top of the roadway, we see a second green line which is 176 yards long, which ends exactly at the edge of the northbound road which bisects the powerline precisely between two towers, one on each side of the road. I believe these oddities are our clue to flip the compass in order to get it to point North, the same direction the road is going.

Mind you, all of this was discovered well after ploting and measuring the emblem. I am not making this stuff up or reverse engineering results somehow.

Emblem FOUR

Again, the last one is both large and arrived at uniquely. Thus far, not one of the emblems was properly aligned to North as viewed in America. There were only two perpendiculars that even came close to enabling such an alignment, but neither of them allowed emblem discovery. Then I noticed the little hiccup in the Northern Border with Canada just about dead center of the U.S. of A. It sticks up just enough to suggest the tip of a compass, or a pinching action of two fingers. And, it was right above our friendly, lone, lineless shooting. What if that was the tip of a compass? The simple answer is, it was… but it involves no obvious or pre existent right angle from our earlier proofs, and is quite minimally defined. Fortunately, we will find it verifies itself despite these ‘missing’ construction elements.

 

E4

As it happens, an axis from that shooting to the Lone Star College Shooting creates an emblem alignment which is pointing due North and considers allowances for magnetic declination. So this emblem is correct for use by an American, probably someone right there in Texas, methinks. With no initial perpendiculars, I had to rely on shootings and shooting lines to come up with all remaining emblem constructs. The compass outer line was easy; the right leg has four shootings, the fourth (white square) hidden just beneath what seems to be the last one at the bottom. The left inner leg is defined by three, and of course, once you have one leg you know where the other is because it must perfectly mirror the opposite side.

The square was harder, suffering most due the lack of perpendiculars. The lower right side is established with two shootings along its guideline, and confirmed by a single shooting on the opposite side near the tip of Texas. The upper right if also formed by two formation shootings, but the left side has no confirming shooting. Again, if you know what one side is, the other side must match, so that should not be a problem. But I’ve been continually amazed at the consistency of the baphomets and emblems, and how when it seems something is not right, it turns out I’ve missed something there all along — so I’m tempted to think some future shooting will take place on this line, too. The end lines are found using two shootings on the right and a single confirmation shooting on the left.

Two more unusual things about this emblem in addition to aligning North: Our friends at Remington are back once more with highly suggestive positioning, including a third location in the New England States. I am tempted, therefore to believe that the lone baphomet which also had the Remington sites was designed by the same Warlock, and yet, that baphomet was not the one aligned North. This adds to the mystery of the meaning of this remarkable and consistent ‘coincidence.’ The second unusual thing affords even more confirmation… because this time, there are four guidelines which extend to Europe to do the orange line thing.Intention, intention, intention.

Four emblems, all different, and yet the same, in that;

a) like the baphomets, they all shared the same original shootings and lines, defying random chance;

b) like the baphomets, they are therefore all interconnected;

c) like the baphomets, they all establish guidelines which do the orange line thing;

d) they each have their own unique method of cross verification; transportation, shapes and places, schools, and perhaps, Remington.

I again ask; does this seem like random chance, to you, or is intelligent design involved?

What does the occult have to do with mass shootings?

Summary, and additional bonus proofs: the magic works

So not only do we have dozens of random shootings which happen to line up in sets of three or more to make straight lines with doorway-to-doorway-to-doorway GPS-level accuracy, but we have two different shooting universes of such lines which share many of the same shootings/lines to form four readily identifiable Masonic emblems in one, and and four satanic baphomet symbols in the other. Each symbol tends to have its own theme or characteristics to imply four different designers, and all symbols have a symbiotic relationship with the orange lines with an identical but yet-to-be explained proof of their own. This should be enough to convince anyone that mass shootings are not random events, but carefully planned, even though some of the shootings may indeed be naturally transpiring and truly random in nature. We’ve discussed in earlier Proofs how a design can incorporate a pre existing natural shooting into a line with added planned shootings.

But there are still additional proofs or mysteries to reveal within these symbols which drive the intelligent design point home; things which reveal some of the ‘magic’ in play by virtue of extreme care and attention to detail in their design and layout. Some of this is already seen in the themes, earlier mentioned. But there is much more than just that going on. Examples:

Examples of Magic in emblem TWO:

Emblem two has some additional special properties which defy coincidental happenstance, and they relate to one of the purposes of a compass and square, which is to measure things out with accuracy. Emblem two does this with uncanny consistency to an observable rule set. The image below shows a closeup of the emblem and the national view of it. Remember, the yellow lines are 90 degree right angle lines, and that because they are on a sphere, they tend to curve visually, and even though two lines my be parallel, they will eventually converge when upon the surface of a sphere. I’ve added additional colored lines to show some interesting ‘magic’ taking place which absolutely defies chance.

Miles

The inset image affords three new colors for key lines to be evaluated, each offset from the line it is measuring so you can see the original as well. The blue line at bottom is the radius of the arc formed by the compass, and the adjacent red line is the diameter (not the same thing as the radius/diameter of a circle created by rotating the compass). The light blue line is the measure of the thickness, or side of the Square, and the purple line represents the gap in the outer perpendicular yellow line which stops at a shooting in Washington D.C., even though the line serves as a chief guideline to forming the Square.

The labeled lines reflect the actual original line being measured to provide a standard of measure, and the other lines merely indicate where another line segment have that SAME measure. It does not matter what the resulting measurement is for this part of our dialog, just know they are the same. So the first thing to note is that for each one, there are three instances of line segments which match each other, though most additionally exist at reflected locations of identical construct in mirrored fashion; the compass shape is, after all, mirrored left to right. This 3 lines x 3 repetitions (3×3) is already indicative of intelligent design which defies chance. But there is much more.

The red Master line is 145.96 miles between compass leg tips, but because we have a error possibility in degree measurement for each of the two legs, we are dealing with a ± .38 mile total potential error in this distance. Regardless, this measure becomes extremely powerful; look at the larger view, and note there are red lines drawn adjacent to the various perpendiculars which define the ‘box’ around the U.S. created by these lines, doing so in a kind of ‘spiral,’ of sorts. These are numbered to match the sequence of discussion regarding discovery and use of a rule set, something not possible if the shootings which made them were random. There is a magical relationship between these six red lines and our diameter measurement, including the error potential:

These rules are significant: it means the compass was created to get a measure, and the measure was used to compute the shooting line lengths, which meant the shootings had to be planned to create the lines to meet those required lengths, and form a straight line.

Rule One: a given yellow line should be evaluated for any logically intended base line, and measured from that base line to its end point. Divide the result by 145.96 in search of a whole number. If the result is within an allowed error range, accept the whole number as valid and continue to the next rule. If it is not, try another base line. If all base lines fail to produce good result, select a new line and repeat Rule One.

The acceptable error range is determined by looking at the fractional remainder (e.g., .96 of 145.96). If less than .35 or greater than .58, the result is within the error tolerance established for the diameter line (± .38 off of the .96 remainder of that measurement). The goal is to produce a quotient with no remainder not within these limits, which can therefore be stripped away to leave a whole number which has ‘no error’.

Rule Two: Choose a perpendicular along the line just measured to become the next line to be measured, and repeat Rule One. All such perpendiculars along the new line qualify as potential base line; the previously measured line is a very logical base line, as is any line parallel to it, but the nearer it is, the more logical it is.

The remaining rules or determinations required to enjoy full success in this effort are best described by explaining them with narratives. These rules were arrived at after a great deal of experimentation based on the suspicion that some such rule set must exist to establish just how all these constructs relate to one another, and perhaps more, such as why a given shooting line is a given length. This is the result I obtained using the above rules (or as described in the narratives) which indeed prove the concept valid…

Line 1: the most logical line to be measured first seemed to me to be the one North South yellow line used to form the square, which ran uninterrupted. I gave it more weight than the interrupted line parallel with it due the fact it was an incomplete line, and yet more weight than the East West line because it enjoyed the parallel companion. The most logical base line was the East-West line which formed the square’s outer boundary. Measured to the end, we find the diameter divides into the resulting distance 7 times with a remainder well within the error limits; zero inaccuracy results.

Line 2: the measured line failed to make a useful baseline, but the parallel line did, dividing usefully into the distance 15 times (quotient).

Line 3: failed all attempts, so per the rules, went back to the square for the East-West line

Line 4: turned out line one was a base line which worked correctly, and provided a quotient of 16.

Line 5: failed all attempts.

Line 6: failed all attempts.

And now, the narratives to address the lines which failed to get past the Rules thus far stated, starting with an explanation of my guiding point of view. It is my assertion that the perpendiculars shown in the image are intended to ‘box in’ America symbolically, essentially framing it, as if a protective or restraining wall. In such a symbolic context, the compass is like a dagger penetrating that wall, and allowing entry and harm. Visually, because of the sphere’s impact on lines, it is impossible to make the box truly rectangular, because lines are not truly parallel at distance, and they are curved. A line can only be perpendicular at one point of another line, and cannot be truly parallel with another perpendicular at a different point on the same line.

This complicates the designer’s ability to use only perpendiculars to depict the complete box, and forces the use of a seemingly convoluted ‘spiral,’ as well as rules to allow compensation. But I was convinced that the compass 3×3 measurements somehow had a relationship to the founding yellow perpendicular line set. This is what led to experimentations which uncovered the Rules and their unique results:

Narrative to resolve line 4 and line 3: It struck me that line 3 automatically defined line 6 as a base line, by default. Thus line 4 was unique in that it already had a pre existing baseline to contend with, and I wondered how this might alter the rules. I noted also that line 4 had no possible way of ‘closing the box,’ as there was no land mass off the coast of Los Angeles to support a shooting location which would make the line long enough. But line 3 DID close the box. Thus I wondered if both lines were not intended to work together. Indeed, trying various measurement combinations, it turned out that combining the previously used length of line 3 with a length on 5 using line 4 as baseline to the pre established baseline which is line 6, produced a quotient  of 10.

Narrative to resolve line 6: the only remaining thing not tried was to measure the full line, which produces the error-free quotient of 14. Simple. Thus we see that a thing transpires which is impossible by random chance; the six lines which relate to one another as perpendiculars in a single collective, all enjoy a factorial or mathematically computed relationship to the very Masonic emblem which they help define, and do so by Rules created by logical deductions. I am convinced that there are likely similar findings possible with the other two measurements, else why would they be within the 3 x 3 pattern previously cited?

I additionally suspect the series of quotients, themselves, can be employed in some additionally useful manner, either symbolically, or perhaps even in the real World some way (such as map coordinates, distances, course headings), given that a compass and square is involved, as well as a map of the real World. For example, in answer to the last (3×3) question, consider this coincidence: the sum of all the quotients is 62, and just as the master diameter was divided in half to produce the radius, half of 62 = 31. If we multiply 62 x 3 x 3, we get 558, which not only sums to 18, but divides by magic 18 exactly 31 times; and additionally, 558 miles = the palindromic 898 kilometers, and 484 and a fraction, nautical.

 Do mass shootings involve black magic?

Examples of Magic in baphomet one

Because it can’t be done by computer program, and because the distances of a given side of a baphomet is great, and because of the potential for angular errors in Google Earth measurements, drawing a star with perfection in Google Earth is actually not very easy. One way of judging if I was usfully accurate was how closely I could duplicate line lengths. One can average these out, or weight the length to any known intersect points with shootings to try to judge the correct ‘target’ or appropriate median length.

In baphomet one, the resulting dimensions allow some very interesting math computations which reveal magic is indeed afoot in their design, something again not possible if randomly arrived at. These computations were NOT, repeat NOT made or even considered as something worthy of trying until more than a week AFTER arriving at the number deemed as ‘best.’ The designer of any intended baphomet, however, would do the opposite, and compute the line length needed to match target computation results.

The average length of baphomet one is 1451 miles on a side (a prime number). The average inner line is 341.5 miles. The standard ceremonial baphomet has a circle about the star points, and may employ a circle about the inner intersects, as well. It is the nature of these circles which lends power to this particular baphomet for ceremonial application. Numbers below are typically rounded:

a) the area of the inner circle results in a magic number (palindrome times 10) 282820, which expressed in kilometers (not rounded) is the palindrome 455155.4;

b) the miles sum in threes to 1210, another palindrome times 10, and sums in total to 4;

c) the area of the outer circle (a palindrome, and a prime number, times 100) is 1848100, which sums in threes to make 1201, which also sums to 4;

d) comparing the two original palindromes, note that the number 8 is every other number in both, and that the total of all remaining numbers is 6 in each case.

e) in like manner, the circumference of both circles each sum in total to 15, which sums again to 6;

f) the radius of the outer circle in miles is a palindrome 727 (a prime number), which sums in twos to 99 (18), and in kilometers is the magic series 1234, which sums in twos to 37 (37 x 18 = 666) and in total to 11, and in nautical miles, directly equals the greatest of all magic numbers, 666.

g) the vertical axis of a star point is (not rounded) the palindrome 535.35, which in kilometers is 855 (sums to 18, while 535 sums t0 13), and 461 nautical (sums to 11). Note also that 855 mirror the 558 ‘coincidence’ from above.

h) the distance from one star tip to another is the magical triplet 888 miles, which sums in twos to form (1616) pairs of palindromes; 161 and 616, which are inverses of each other.

There is only one possible size baphomet where all this is possible. Add the fact that its orientation allows each point to be near an appropriate site useful in divinations, and it seems highly unlikely this is some randomly created shape: the lower right tip is in water; the one above that rests on a cemetery (spirit); the upper point is ringed by airport runways (air) and contains one within the tip, all despite the desolate woodsy wild lands area involved; the Western point has five smoke shops (fire) within the same square block near its tip; and the lower left point is in a desert (earth).

 What do mass shootings have to do with the new world order?

The additional Magic of satanic intersects:

We have another strange confirmation of intelligent design which impacts both the baphomet and emblem causes. In all of the hundreds of shooting lines created by all of the 440 shootings thus far computed (well beyond the limited universes used to reveal baphomets and Masonic emblems), there are certain line oddities which exist. I’m talking about situations where three or more lines cross each other at the same location within the GPS accuracy limits used for our shooting site doorways. There are exactly 18 of these, our magical number, and there is something very peculiar about ALL of them.

Their map coordinates, both the longitude and latitude, each repetitively sum by twos up to some combination of 18, 13, or 11 (eleven, recall, being the number of chaos, disorder, and that which precedes destruction). That is to say, you will get one or two resulting numbers of those three possible, potentially two of the same number, but perhaps just one (i.e., 18, 18.18, 18.13). For this reason, I’m calling these ‘satanic intersects.’

Example: The image shows one of the satanic intersects, and the coordinates from Google Earth. Do the math.

Lattitude: 35 = 8, 22 = 4, 50 = 5, 82 = 10 = 1, so the final math is 8+4+5 +1 = 18

Longitude: 106 = 7, 50 = 5, 46 = 10 = 1, 05 = 5; 7 + 5 + 1 + 5 = 18

 

SC18

Here is the kicker. There are 18 such intersects. They ONLY APPEAR where at least one of the intersect lines is used in the baphomet or Masonic emblem universes. More: like the 18 right triangles which divided into 9 left-facing and 9 right-facing versions to yield 99, which like 18 itself is also a code number for Satan… these 18 unique intersects are located 9 each in the two universes; 9 on baphomet shooting lines, and 9 on Masonic emblem shooting lines.

Not just intelligent design, but consistency in distribution, too. What is also interesting to me is what seems to be located at or near many the various satanic intersects. Here, for example, is a gun club, but others include Locust Valley, Freedom Mt., and a church named Zoar (the location of Sodom and Gomorrah before destruction). The intersect shown, you may have noticed, enjoys complete symmetry in that it creates two idential obtuse angles and and four identical acute angles to within .1 degree of arc, which happens to be 20 degrees, which again is one 18th of a full circle. There are two which have this SAME EXACT perfect symmetry, and they are BOTH RIGHT HERE. Each universe (emblem and baphomet) of lines has a DIFFERENT shooting line going through at the same angle (the middle, most level line).

Orange line magic? Sorry, but I can only give you a hint, here. It is fully revealed in Proof Seven, link below, which also explains the orange line significance, per the title. The hint is this: It goes back to the very historical roots of the Illuminati and the Masons from which they sprang. It does it very uniquely, and consistently, through history. Keep reading…

 

Go back to Introduction

Go back to Proof FiveShapes in Turn Form Complementary ‘Magical’ Clusters;

Go to Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters


It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that the triangle shapes defy randomness in their placement to form aligned clusters;
•  that their count in groupings is again a magical number;
• that there is Masonic/satanic symbolism present which can be deciphered.

Are mass shootings by intelligent design?

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters

Is there a mass shooting conspiracy?

In the prior post we found perfect angular relationships in a series of interconnected shooting lines to form parallels and perpendiculars, each line created by three or more mass shootings located in a row with doorway-to-doorway-to-doorway accuracy at GPS levels. That alone defied the odds of random chance, but to again do so in the magical count of 18, and to further form right triangles and non right triangles in groups of 18 as well, would be impossible by chance. It had to be by intelligent design.

In this post we look at additional magic taking place with the same original lines used to create the prior array, and learn even more remarkable and scary things yet await us. Those lines I refer to as red foundation lines, those 75 shooting lines seen in the very first image of the prior proof. That’s a good word to employ…

Those same lines, which I interpret to be akin to a Mason’s blueprint for an architectural structure, indeed seems to represent a foundation/framework for a much more complex superstructure, one built only from Isosceles triangles — where two sides are of the same length. These triangles not only have specific relationships to the prior shapes, but to each other in two distinctly different clusters, doing so in a way which implies two different architects competing with each other but following the same general guidelines, with slightly different interpretations and strategic goals in mind.

What we will see is impossible for random lines to achieve; to create like shapes which cluster together in ways which see them share common lines or corners, and conform to a general patterns based on specific rule sets, ONLY. That roughly 55,000 line intersects should only produce Isosceles triangles in a manner which conform to these rules is simply not going to happen except by intelligent design. But that is exactly what takes place in ‘random’ mass shootings.

This is easy to reveal visually, if done in stepwise fashion, but there is also likely secreted coded information which further study might reveal, such that it is perhaps the most important post thus far in terms of study. That will add some descriptive complexity. Ergo, the more you read in this post, the more you will tend to agree more such study is warranted.

What patterns result if you plot mass shootings on a map?

Overlaping and shared lines and shooting points create mirrored clusters.

The West Coast: The series of images below reveal the impossible. For some reason, all these perfect triangles share common lines and/or shooting event locations among themselves to form one huge cluster spanning the greater Western Seaboard. The actual triangles formed will be displayed in yellow, as in the prior post, as will any key parallel/perpendicular lines from the prior post being used to reveal a relationship. Any other anchoring lines will be shown in red if deemed useful.

EVERY SINGLE triangle is anchored either directly to the foundation lines by sharing one or more sides with the foundation, or its corner rest on a foundation line shooting, or one or more sides might reside on a line which itself intersects with such a shooting. We are again talking about the same 75 original shooting lines used to create the foundation in the first place. In other words, it is one integral complex of shapes created with great care. Moreover, we will see the magic numbers 18 and 9 again and again in the process.

Note: Very few such lines will be shown, only referenced, else it can become visually and verbally confusing. The final example will show all such lines as it happened to afford a simpler visual, and that will allow you to fully understand the ‘rules of design’ all Isosceles stubbornly obey, as based on the foundation. Also know that while it may appear some of the depicted triangles are not equilateral, or that their lines are not straight, this is an illusion, a function of point of view of such lines upon  a sphere. This may cause some to appear as if they are not Isoscoles. Rest assured, all of them are.

For the purpose of allowing a triangle to be seen as legal and intended, two sides must be equal in length to within an acceptable accuracy which considers known issues with Google Earth. Each of the two converging sides could be as much as .1 degree off in opposite directions (.2 total error), and a like error in the base line could additionally increase the chance of sides not quite being the same. They were therefor not allowed to exceed .5 miles difference, especially where greater distances was involved, But readings were found to be as small as .01 mile in lesser triangles, or where accuracy issues were less prevalent.

 

WC1

 

Fig. 5

Here we have a set four Isosceles triangles which all have one thing in common; they are all derived from  one of the perpendicular lines from the prior proof (which lies along their common base lines). The third smaller triangle between the two larger ones is NOT counted; it does not have equal sides, though visually it may so seem. The fourth is actually nested within the third, both pointing in the opposite direction. While its base is not on the same line as the others, it shares both sides in common with one which does, and is therefore included in this set.

 

WC2

 

Fig. 6

This set of three Isosceles also all rely upon sharing the same baseline with one of the key most perpendicular/parallel lines from the prior proof, as shown.

 

 

 

 

 

 

WC3

 

Fig. 7

This set of FIVE all share their baseline with one of the original red lines used to create the perpendicular/parallel lines from the prior proof. Moreover, that line intersects with the perpendicular line used in Fig. 5, above. The fifth is very small at the very bottom, if you didn’t see it at first.

 

 

 

 

WC4

 

 

Fig. 8

This set of four share their base, or in the case of the smallest, one side, with a foundation red line which intersects at one end with a mid-point shooting on a another perpendicular.

 

 

 

 

 

WC5

 

Fig. 9

The smaller Isosceles shares of this pair  has a common side with yet another perpendicular. Its other side is a foundation red line which intersects at a shooting shared by a different red foundation line used to form one a side of the larger Isosceles in the set. I probably should have included the ancillary lines to better illustrate. The shooting was a Standoff with Police in Canoga Park, Feb. 7, 2008.

It’s smaller Isosceles’ lower corner lies directly on one of California’s worst shootings, the Seal Beach Salon on Oct. 13, 2011, and is the endpoint for THREE different perpendiculars.

WC6

 

 

Fig. 10

This is what the West Coast collective looks like: 18 Isosceles triangles in all (any others which seem to exist do not measure out acceptably). The magic numbers continue: 9 of them rest directly on a foundation perpendicular or parallel with one or more sides, or a corner, and 9 share a side only on a red foundation line.

 

 

 

 

Why Isosceles?

The Isosceles triangle is a very important shape to a Mason. The Masonic emblem typically implies four of them, two making up the Square, and two making up the Compass. There are three different basic architectural structures the Masons are commonly associated with, all of them relying upon the Isosceles. The best known is the Pyramid, most notably, perhaps, being the one on reverse of the Dollar Bill, aka The All Seeing Eye. The Egyptian style obelisk, such as the Washington Monument, is also well known, and uses two Isosceles in its formation. A lesser known has the most relevance to understanding the symbolism in play, and is the use believed to be intended, here.

That is the Frustrum, an early concrete ‘tank trap’ of sorts. Only tanks did not exist at the time. Instead, they had to worry about cannon, battering rams, and assorted apparatus to breach high ramparts, all of which could not get close enough for use if the ground they required for their use was occupied by collections of cement pyramids. Most frustrums (means ‘that which frustrates,’) had a flat top like the Dollar Bill — not a pointed peak. But their design still relied upon the Isosceles.

With that in mind, the above image seems to be largely pointing to the Eastern Seaboard, with a couple pointing in other select directions. Keep that in mind when we see what’s going on in the East Coast, where we will have more clues that they are intended to frustrate.

 

The East Coast: The basic rules of existence found in the West Coast triangles are also present in the East Coast sets. However, it quickly becomes clear the actual layout or theme is entirely different, and at a glance, implies no consistency. Yet we discover perfect consistency to the construction rules — though a completely different intention in the design. This, to me, strongly suggests two different designers, perhaps with two different strategic concerns which dictated how they applied the symbology. We will explore this more in closing review, as it does support the frustrum argument, which provides the missing consistency found in the West Coast collective.

EC1

Fig. 11

Here we have a set of four Isosceles sharing a common base line which is one of the red foundation lines. It will also be in common (next image) with several more triangles, one of which shares a side in common with a line which is both perpendicular and parallel from our prior proof. Note that none of this set’s lines are parallel, which dramatically increases the impossibility that this pattern should exist by chance.

 

 

 

 

 

EC2

Fig. 12

The prior set is shown for reference at the right, as it has a common base line with four more, making eight in all on one line. The blue (looks green on some monitors) line is in common with the singular triangle added in the next image, and is the one mentioned in the prior Fig. to be in common with a foundation perpendicular/parallel, as also noted in the next.

 

 

 

 

EC3

 

Fig. 13

One additional Isosceles added to make nine (Figs. 11, 12, 13) in all, and it overlays the smallest of the prior set and is indeed in common with a foundation parallel/perpendicular. Thus two of the nine have sides in common with a foundation perpendicular or parallel. Interestingly, these are the ONLY ones on the East Coast which do. All others are in common with red foundation lines, only.

 

 

 

 

 

EC4 copy

Fig. 14

This odd set of FIVE Isosceles have obvious shared sides, only one not sharing two sides.

 

 

 

 

 

 

 

 

EC5

Fig. 15

Four more make up the final set. Here, I’ve added all the red lines and one of the foundation lines (yellow) which are used to validate them. Each red line shown is in common with a side of a triangle AND ends or interscts with a shooting either on another triangle or the foundation line. EVERY SINGLE ISOSCELES, East or West, does this, or is already sharing a line or shooting on a foundation line more directly. How is this possible if ‘random?’ NO SUCH TRIANGLES EXIST ELSEWHERE, which is to say, there is no other rule set in play.

 

 

EC6

 

Fig. 16

The sum total of all East Coast Isosceles is, just like the West Coast, 18. Also like the West Coast, they are divided into two groups of 9. However, this time, the division is 9 is between those which share immediate direct commonality of a single red foundation line and or a parallel/perpendicular line (Fig. 11, 12, 13), and 9 that don’t.

 

 

 

 

 

 

Summary: My belief these are frustums is based on some observations beyond those thus far offered. An Isosceles triangle is a form of an arrow, and as such, tends to point. That many ‘point’ in various directions implies there are things to be pointed to which are objects of (something I presume to be negative). At first when I saw the West Coast pointed almost exclusively inward, and the first East couple of East Coast discoveries pointed inward as well, I imagined they would all do so, and represent thereby the intent to frustrate the power of America, and subjugate it to the will of the New World Order. Then the rest of the East Coast discoveries discounted that notion by pointing every which way.

So I then considered that some were long and thin and others fat and squat, and size of course, was varied. I wondered if the ratio of length to base and size could somehow be used to represent a distance the implied ‘arrow’ factor might be intending to point. So I took a handful of them and found the center of their baseline and ploted a central vertical through and beyond their peak to see if there were any logical destinations, and where they were might be. VERY interesting.

The large long Isosceles angling about 50 degrees in a Northeasterly direction leads somewhere interesting, a place both Masonic and governmental in nature, as does the one upward Isosceles in Fig. 12. There is a similarity in destinations, as both are Capital cities where a Masonic site can be found, and which represent a power center for a modern day ‘Illuminati’ and which relates to the National government, as well. They are shown below, with additional ‘illuminating’ commentary.

Do mass shooting patterns reveal Illuminati ties?

The Pyramids know from whence Illuminati power is derived

Paris.png

The long Isosceles center line leads to the Louvre Pyramid, where startling ‘coincidences’ start to unfold. First, the line itself is on the same course heading as the entire property’s main axis.  That line plot is drawn to within .1 degree of arc accuracy from the Isosceles which created it. The Louvre Pyramid is also on a centerline to the original French seat of power, the Palace, perpendicularly located just to the North.

The distance of the red plot line from the base of the Isosceles to the Pyramid is 4,540 miles (rounded with .001 accuracy), whereas the side of the Isosceles, times four (something considered potentially intended only because there are four fully independent Isosceles directly over the sides which share no lines or shootings), plus the base, = 4513 miles, short a difference of 26, yielding about a .5 accuracy. These errors are all within reason given Google Earth imposed limitations.

However, there is a fifth Isosceles which does share a side which measures 13 miles, and is itself enjoying two sides shared within its own set.  Adding in 13 x 2 provides zero error. I admit it seems convoluted and ‘reaching,’ but I also find it potentially intended. One possible clue is that there are actually SIX pyramids at Louvre; four considerably smaller ones surround the one of fame, and one inverted and sunk into the ground — one for each Isosceles used in the calculation.

Ottowa.png

The second Isosceles points with like accuracy to this building in the Canadian Capitol of Ottowa which, while it was originally a government facility, is now, like the Louvre, used for the arts. Note again the course is aligned with the property’s liner aspects, and like the Louvre, bisects a glass pyramid (a roof skylight). Also like the Louvre, there are multiple pyramids on the property; one for each Isosceles used in the calculation. The building is named after a noted Canadian Prime Minister who was also a high Mason.

Here, the distance from the Isosceles base line is 467.8 miles. We can get the same distance by adding the side of the Isosceles with the sum of the shared portions of the four common baselines in the Isosceles set involved… to within 1 mile, or about .2 percent error. That sounds like an entirely different a method, but…

Amazingly: Both locations can actually be found by using one simple formula on the involved Isosceles triangles: Destination = the base of the pointing Isosceles + (the side of the pointing Isosceles x the number of independant Isosceles overlapping) + the length of any shared side or base with a nondependent Isosceles.

While I have not had time to review the remaining triangles, a superficial review implies that many of them end up pointing to the middle of nowhere. However, one of them points generally to the same neighborhood where, as we will see in a future proof, lives a suspect billionaire whose identity is implied thereby to be one of the designers. This may point to his corporate offices nearby, precise location as yet unknown.

But there are so many possible mathematical relationships/calculation rules which might additionally be in play, there is no way to know for certain short of an exhaustive study what all these Isosceles might secretly be indicating. One more reason I need help.

Another question which needs to be to be similarly explored by someone with manpower and funding is… are there numeric codes contained within triangle side lengths and angles, or relationships between such measurements among triangles of the same sets?

But even based on the minimal findings so far, I assert they support the notion of multiple competing designers, said competition being to determine which group of several such groups of Illuminati will have the dubious honor of having the Antichrist come from among their members, as well as who among their group. Therefore, to cast frustrums against European and Canadian Illuminati and their political power centers would make perfect sense.

More proofs follow…

Go back to Introduction

Go back to Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes

Go to Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols

Emergency Post: BLM vs. Bundy is an Ominous Danger


It is seen by government as a win-win ploy that raises the stakes to unimaginable levels. What we see on the surface has nothing to do with the sinister plot which it enables and portends. This is our last and only chance to save the country, or loose it to tyranny forever, and rush toward Earth’s final demise.

Will Bundy vs. BLM start Revolution 2.0?

By H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

What is going on in Nevada with the BLM?

What you will learn reading this post…

•  government’s actions against Bundy are mere window dressing — something more sinister is afoot;
•  the stakes are incredibly high, but hard to see — your very life and the fate of the World, in fact;
•  there is only one logical solution, and everyone plays a role.
What can I do to help Bundy against the BLM?

Why BLM vs. Bundy matters regardless of if his cause is just or he has no legal leg to stand on

UPDATE: Same day posted… Oh, so now we find out its really for the oil companies? What Corporate Police State? BLM sells 29 oil, gas leases in northeast Nevada End update.

Free Speech Zone meaningless when dogs and tasters are aimed directly at the people. From againstcronycapitalism.org (click)

Government made it matter, and with dark purpose. At one glance it is an effort to usurp power over people, and the States, as well as to empower corporate ranching over private ranchers. It is a form of unfair and excessive taxation without representation against a political enemy of financial convenience to friends of the White House. And, it is an opportunity to make yet one more National Police Force out of the BLM. But, thanks to controlled media/government PR, not everyone sees these points of view.

But even that view is incomplete and misses the mark, if we but look closer. It is a deliberate series of escalations by government over time to garner public attention among and inflame we select people (why it gets little due mainstream coverage — save that which slants as it did at Ruby Ridge and Waco). They know the Web will be awash in the circles of we Patriots, Constitutionalists, Activists, and others who oppose the tyranny and oppression our government has come to represent since 9-11. The Sheeple must not be unduly disturbed until it can have false flag impact of calculated value.

I talk a lot about the need for citizens to draw lines in the sand and be willing to become Minuitmen should such lines be crossed. Now comes government to draw it for us, I write here to tell you that you have no choice but accept the challenge, and act decisively. You may perish either way, but I’d rather perish attempting to control my life and future than to leave it to others less kindly inclined to favor me. If there is to be armed revolution, let it be on our terms, not theirs.

Why so conclude? Because if they work it right, the ‘standoff gone wrong’ is a perfect chance to justify taking guns. By forcing a showdown and a gunfight (what the snipers do best – there is no justification for government deploying snipers unless for this cause, AND to selectively inflame those who stand for Liberty and who remember Ruby Ridge). There are two possible ends, of course, though I think they will insure BOTH transpire.

Regardless, such a battle is win-win for government. The “poor defensless BLM armed only with tasers,’ if loosing large numbers will be seen by Sheeple as an outrage, and given that Militia were involved from multiple quarters, and other armed parties, Obama can order Martial Law with suspension of the Constitution. Especially if also employing agent provocateurs for local violence across the country, as was employed in the LA Riots, where National Guardsmen posed as rioters to prime the pump.  This would likely result in orders for the military and Police to go door-t0-door. Who knows, Obama might even order the U.N. in as long-feared and first promoted as concept by Henry Kissinger. Or, he might simply order in the military; A-10s, attack choppers, a Stryker Battalion, and so forth.

They can then conveniently ‘quash armed rebels and terrorists,’ confiscate all guns, round up dissidents and politically incorrect opponents (like you and me — why they have been spying on us so earnestly), and hold a Con Con (they are already staging for it) to pass the Constitution of the NewStates of America, already written, which essentially enables the formation of the North American Union and surrender of US sovereignty to the U.N. in stages. All of this leads, of course, to a one-World Government (that Constitution has also already been written), and provides a single seat of power to enable the Antichrist’s coming to power.

Note: The NewStates Constitution is reprinted in my booklet, Fatal Rebirth, along with the World Constitution, complete with analysis line by line (NewStates) to show how draconian a document it really is. Rights become privileges which can be revoked at any time by any agency or party of government for any cause, even retroactively, and almost anyone in government can write law, and again, it can be retroactive. And if you think the two-party system and the FED/IRS is bad, wait until you see what follows. You can request a free copy of the ebook version of Vol I of Fatal Rebirth by email request to pppbooks at comcast net. 

THAT is what is at stake. Nothing less than EVERYTHING!

So we must be decisive: regardless of how we view Bundy’s cause or government’s viewpoint, regardless of if an armed and concerned citizen or a dumbed down Sheeple, we all have equal stake in this unfolding globalist tragedy. And, we can all play a role no matter our status, and regardless of if present in Nevada, or not. But about that decisive action…

Why is the BLM standoff against Bundy in Nevada taking place?

What we should prefer…

Should we stand up with arms in hand and enable, if not force, the ultimate showdown? I fear this is exactly what government wants, as already stated. But there is another, wiser choice.

By all means, men of arms should rally, but standing firm and waiting for the other side to blink or blunder is a fool’s plan, and it can only end in bloodshed. What must be done is that which can neuter Government’s ploy. And only one set of steps can do that:

a) anyone and everyone should file court actions against any and every agency, branch, and individual of government involved at every level of government. Any and every cause, grievance, or objection, as allowed by and based on State, County, and Federal Law, and the Constitution and Bill of Rights, should be employed. Bury them in legal actions, EACH OF WHICH includes request for either an Injunction or Stay Order. These actions should not all be done at once, but the flood should be continuous, so that new ones can replace those quickly disposed of. THIS BUYS TIME;

b) time is our friend — it generates awareness and understanding. It buys media attention and gives Sheeple a chance to better understand what is taking place. Just as the 99% movement could no longer be contained by a controlled media, so must this matter be brought into every home. Invite major networks, espcially foreign press, to specifically include RT, to set up broadcast facilities right on the Bundy Ranch, and bypassing the see nothing viewpoints established by government for controlling media in the manner done at WACO (NEVER AGAIN!). Install microwave and shortwave communication systems for the purpose. But also, LOCAL media is the key, as is the WWW; do not rely upon mainstream. Militia and other group ‘spokespersons’ in your community should approach their local news sources with proposed interviews to get the word out. IF EVERYONE UNDERSTANDS WHAT IS TRULY AT STAKE, AND TAKING PLACE, GOVERNMENT’S PLOT IS UNDERMINED AND THEY LOOSE THE SHEEPLE;

c) flood the theater with actors. There should be so many people there is not enough room in the minimal areas intended to contain them. OVERFLOW. The ‘1st Amendment’ area, itself an affront to the Constitution, and should be enlarged and enlarged again, forcing retreat or conflict which will make news favorable to our side. If you have access to a professional camera, start a ‘newspaper’ or ‘Radio station’ and flood the press area and make it overflow, as well. And Bundy’s ranch should become a city of tents, and include as many unarmed persons as possible who wield nothing but baseball bats or the proverbial pitchfork. THIS MAKES THE WHOLE AFFAIR MORE VISIBLE and LESS TENABLE TO GOVERNMENT’S GOALS;

d) involve the local Sheriff and State/County Officials. The Sheriff has effectively stated a hands-off non intervention policy. Fine. Perhaps he is a puppet put into place for the purpose, or co opted by any number of means available to government for rendering him neutral. But the flurry of legal actions should be intended to FORCE HIM to intervene on behalf of Bundy and supporters. If nothing else, he should have a presence on the Ranch to insure armed groups behave (public safety). The Governor and Legislators, and County Officials should called to DEMAND it. Perhaps even the National Guard should be called to stand by. A simple invite, if not enough, can be followed by a media blitz and public demand that such action is needed. Any politically motivated decision to remain neutral should be negated, thereby; a political suicide. INVOLVE THE SHERIFF, as WITNESS and PEACEKEEPER;

e) party! No alcohol or drugs, but good cheer, song and dance. Use loudspeakers. Mix well with speeches and ‘town hall’ dialogs. Use the platform (the nation will be watching) to air ALL GRIEVANCES with government, not just this ONE issue. Give voice to the rest of the 99% in a way that movement never was able to achieve on its own. SOROS WILL HAVE NO VOICE, this time;

e) prepare for Martial Law at home. That means emergency kits and plans (like the one government would not approve). It means weapons. If it is declared, you will have scant few hours to choose to fight, run, or to surrender to your fate at the hands of tyranny. If not taken away, you will need to survive for months without anything like normal civilization. No key resource, including electrical power or communication, can be assured, and will likely be withheld on purpose. Travel will be restricted and many will not be able to work, and there is no shopping, only rationing. BE READY TO BE SELF RELIANT, BE READY TO FIGHT IF THAT IS WHAT IT COMES DOWN TO;

f) if and when the shooting starts, DO NOT ENGAGE! Dead BLM or other Agents will be made into martyrs by mainstream. DO NOT GIVE THEM WHAT THEY WANT. Show restraint, and let the casualties be on your side. Keep putting out a continuous feed of information and video so that media and the WWW know what is going on. IF THERE ARE TO BE MARTYRS, LET THEM BE OUR OWN, and LET IT BE TELEVISED LIVE. If a full-scale armed revolt spontaneously errupts nation-wide, then by all means, defend yourself at the Ranch, and FOLLOW YOUR CONSIENCE AND DEFEND THE CONSTITUTION.

g) petition for redress. Redress of grievances is a key component of our Nation’s Constitutional form of government (this post makes clear, mid post). When it fails, we have no government, only tyranny. It seems today there is NO REDRESS POSSIBLE at the Federal level. ONLY THE STATES stand in the way of total Federal domination, which is part of what this whole affair is about; a means to increase Federal power over the States. But while all this is going on… and while we have media platforms established… we should be seeking redress through our State Legislators, making a series of calls for action to quickly pass laws which…

1) nullify all Federal gun laws, NDAA, NSA surveillance, and forbid Federal drone overflights except under warrant and oversight by State authorities;

2) eliminate Federal arrest and warrant power. If a Federal judge issues a warrant, or an Agency is moved to move against a party (like Bundy), they must instead go to the appropriate local Law Enforcement Agency and have them execute on their behalf. They may go along, but as observers, ONLY;

3) make clear a mandate that your State shall NOT approve a new Consitution if a Con Con is held, nor the removal or neutering by Amendment of the current Constitution, and any existing Federal Law which does so should be nullified;

4) add freely to this list anything which addresses abuse of power by the Federal government, such as militarization of Police, Obamacare, etc. This will be your one best chance to spark public dialog and debate, and to make certain that people, and especially State Legislators, realize THEY are the ones with the real power, and the duty to protect freedom and force the Constitution.

What is at stake in Nevada and the BLM standoff with Bundy?

Government has drawn a line in the sand

Let’s make sure they regret it. Force them to be the ones to cross it, and let them trip over their own power play. Now… go forth and spread the word.

 

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes


When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or decodes to a precise meaning.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting. 

Is there any proof mass shootings are not random? 

What you will learn reading this post of the posting series

•  that the lines defy randomness in their placement to form countless perfect shapes;
•  that shapes can be perfect isosceles or equilateral triangles.

Are mass shootings by intelligent design?

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes

 Is there a mass shooting conspiracy?

Update 4/17/14: Actually, a major rewrite to address lack of clarity and the poor graphic quality which led to it. Only the opening paragraph is much the same. Some new discoveries are also added. The patterns are much easier to grasp and the intelligent design far more apparent. Shockingly so. Please reread.

Are there patterns when you plot mass shootings on a map?

Randomness in lines vs intelligent design

OK. In the prior post we learned that while mass shooting plots in a quantity of 86 events plotted many times more lines than even 100 control group plots of truly random data (gun shop locations), it was still possible to randomly create a few lines using control groups. Even though the shooting lines which resulted were in conjoined sets sharing common shootings and providing the makings of a shape… and the control groups did not, the Doubting Thomas still might be moved to argue that we simply had the wrong control group (even though we actually used two with like results). So the question is raised: what other signs might exist to illustrate the shooting event lines are not random coincidence?

In an attempt to make patterns more visible, instead of looking at all 440 lines (a visual clutter of mish-mash-like mess), let’s see what we get looking only at 75 lines created from a bit more than twice that number of shootings. In the image below, I’ve also eliminated mid-line shootings unless they were themselves also a common shooting event in another of the depicted shooting lines. Interesting to note, given every line involves at least three shootings, it is quite common among the full collective of shootings that a given shooting is used in multiple lines, but it NEVER happened ONCE in the control groups. Below find the initial shootings reflected in red lines. Each subsequent image will show only those lines from among these which resulted in the making a pattern, and will be depicted in yellow. They are otherwise the SAME lines. But without all these lines, we would not understand that all the yellow lines were truly interconnected to each other in complex ways to form key relationships. This will be explained more in the closing paragraphs.

75lines

In the series of additional images which follow, we will be looking only at lines which form right angles; lines which are perpendicular to other lines. They might cross, with or without a common mid-point shooting, or merely intersect at a common shooting either at a common end point, or mid-point shooting. Intersecting, they form a pair  of 90° degree angles (perfect right angles), but if crossing, they form four right angles. Understand, that to qualify, I elected to constrain accuracy to within ± .1 (1/10th) of a degree. While Google Earth allows a very precise reading, to 100th of a degree, it is, at least on my computer, extremely difficult to accurately place and maneuver the tool to consistently take advantage of but about 1/10th of a degree.

To have any right angles at all with two overlapping or abutting lines randomly placed, we must consider the number of possible placements. For each line, there are 360 possible headings it might take, x 10, because our accuracy is 1/10th degree of arc. But we should also divide that by two because the line points in two directions from the point of intersection with another line. So our calculation is 1800 chances of which only 3 can possibly end up intersecting at angles which are acceptable; 90, 90.1, an 89.9 degrees, which leaves us with 600:1 odds for any given intersecting line pair creating an acceptable right angle. Ergo, to find ONE such instance, we need 600 random lines crossing/abutting, were probabilities a certainty — which they are not, or casino games would be of significantly less risk and much more profitable.

90-1Fig. 1

This is actually four lines, the East-West line is actually two lines which, at altitude, seem very close to one another. One of them is considerably shorter than its mate. So we have two sets of parallel lines in this group.

This is highly improbable by random coincidence. Since we would need to multiply odds for sequential relationships and have like odds for the existence of them being simultaneously parallel, its something like 600 cubed plus 600 squared, or, if my reasoning is correct, 216,360,000 to one against.

I’ll happily adjust errors in odds if a bookmaker or mathematics expert smarter than I would care to correct me.

 

90-2

Fig. 2

The left vertical remains from the prior image to make contextual relationships clear. Here we add two more horizontal and two more vertical lines in parallel pairs, making three parallel verticals and four parallel horizontals in all (Fig. 1 + Fig. 2).

Note: for any two parallel lines plotted upon a sphere, the further apart and longer they are the more it will look like they converge . In truth, they do. Slice an orange into four equal parts down its axis and you create wedges for the same cause. Latitude lines on a globe don’t count; they are parallel to each other, but the further North you go, the less straight they are; they in fact arc and are no longer perpendicular to the meridian. Only if rendered on flat map projections does it seem false.

90-3

Fig. 3

Here are two ‘independent’ sets of right angles formed by four lines which would seem to have no relationship to the others thus far.

If these were the ONLY ones to be found, I MIGHT be willing to presume them coincidentally happenstance. But as we will see, they will have key relationships established with the others; they are in no way alone.

Note: this image also shows that Google Earth correctly depicts a straight line as what appears to be a curve when peripheral of center, but it looks straight when centrally located. This is correct; the Earth is a sphere, which means the viewer’s vantage point depicts how a line appears.

 

90-4

Fig. 4

This group features one parallel set with a single horizontal line. Again, by itself, potentially coincidental.

 

 

 

 

 

 

 

 

90-5

Fig. 5

A little more complex; a set of parallel lines mutually crossed by a perpendicular.

 

 

 

 

 

 

 

 

What we get when we plot them all is quite a bit more interesting than their component parts. There are exactly 18 lines which qualify. That number 18, again, is magical, because it is a code number for 666, or Satan. How interesting then, that in addition to there being 18 lines involved, they cumulatively form exactly 18 right triangles, and 18 triangles which are NOT right triangles. One of these, however, is the only perfect equilateral triangle created by the perpendicular lines. Additionally, of the 18 right triangles, 9 are left handed if viewed with the short leg as base, and 9 are right handed; 9+9  (99) is also a magic code number for 666/Satan.

What is singularly true about all 18 lines is that they were made following a couple of simple rules: they all had to form perpendiculars somewhere, of course, but also, they all had to share interconnections through common shooting points with each other, or, with one or more of the original red lines which acted as go between to do so. That’s why the original set of red lines comprised as many as it did (and we will see, they play an additional role in the next proof, as well) In other words, these 18 key lines are all ‘chained’ together in a single unified and complex shape to create 18 right angles evenly divided between left and right, and 18 non right angles, including one equilateral (colored set to green). Here is the resulting structure:

90-1

Let’s shift gears. We started with approximately 440 lines which run along two general axis, essentially East-West in nature, or North South. Note that very few lines cross anywhere near the full count of those running the opposite axis, but also, that some lines will cross other lines along their same general axis. Short of counting intersections (ugh), allow me to approximate intersenction opportunties this way: large numbers of lines may cross or abut as few as a dozen lines or so, and the most that any line seems to intersect is about 200. Lets be generous and use a weighted average of 125, which, x 440 lines = 55000 intersects. Round up to 60,000, and divide it by 600 and we get about 100 intersects should likely be randomly producing right angles.

Frankly, that was reverse of what I expected to learn. We didn’t get 100, or anything near it, but precisely the same magic number (18) as we have seen repeated already endlessly in the prior proofs. And think about that for a moment. When something is by design, you control just how you might beat the odds of random chance. You can choose to make more than, or as we see here, fewer than naturally possible results.

Why is that even important?  Remember the original premise as to the who and why. The Masonic heritage is all about blueprints, lines laid out to be a foundation upon which to build more lines which become the structure of a thing to be built, be it symbolically or a real World architecture. EVERY line is critical in the foundation, or else nothing which follows will be correct, and the integrity or purpose of the final product comes into question. I maintain, and as subsequent posts will show, THIS set of perpendicular lines IS THE FOUNDATION of the illuminati plan to destroy America that it can be rebuilt anew as part of the North American Union and swallowed up whole by a one-World government to empower the Antichrist. Being mystical and hidden, of course, the design means nothing to us, at least not yet, but it has much symbolism and meaning to its designers, if we but look further (and we will).

But before we leave, I will tease you with yet one other point of evidence. We not only can produce perfect right angles, but  isosceles triangles, which is even harder to do, because it takes proper placement of three lines, not just two, to produce a triangle where two of the three angles share the same angle of arc. I may not be competent on reflecting the odds against that happening by chance, but I assure you the result is amazing both in their number, but placement and relationships; they are in adjoining groups or clusters, and tend to be aligned in ‘theme’ directions; completely impossible if random.

But because the next proof relies upon the sum total of such created triangles, I’ll not show them, here, nor even tell you how many exist in total. We will see there are so many of these, and arranged in such peculiar fashion as to once more suggest special meaning or information exists within them. Each angle and distance creates new data points which should logically be examined for coded meaning. But I have not had the time, nor will I, to seek to prove or disprove that notion. This is one reason why I seek funding, staffing, or outside third-party help from law enforcement, or others with a vested interest in the truth.

This post was rather short, but despite its powerful illustration of intelligent design, is nothing compared to the next one, which relies upon the same triangles and right angles. It’s going to get scarier and scarier as we continue. Take a Dramamine if the blue pill becomes too much to handle.

Go back to Introduction

Go back to Proof ThreeShootings Exist in Endless Sets of Three Forming Straight Lines

Go to Proof FiveShapes in Turn Form Complementary ‘Magical’ Clusters;

 

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines


The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.

 Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 Do mass shootings form straight lines of three?

What you will learn reading this post of the posting series

•  that mass shootings defy randomness in their placement to form countless lines;
•  that the lines enjoy GPS accuracy doorway-to-doorway-to-doorway;
•  that they are revealed by scientific methods — including control groups.

Are mass shootings by intelligent design?

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines

While in the USAF, I worked as volunteer taking care of the Base Photo Lab, which meant after-hours clean up and helping the uninitiated. Late one night, the Base Security Officer made me let him in for a rush job to process a roll of film taken of a remarkable UFO sighting. We spent some time analyzing the resulting images for signs of trick photography and the like. We concluded the images not only genuine, but perhaps the most startling and revealing images ever known to be taken of daytime UFOs… as close and as detailed as if taking pictures of aircraft on the ready line from one of the hangars.

In dialogs with the Officer, I learned there was a particular scientific method applied to the study of UFO sightings to determine if they were random events or if they somehow exhibited traits of intentional intelligent design; patterns in location, time, distances, angles, or other event details. It seems that such studies had been undertaken by Governments (typically the military) in South America and Europe, but had reportedly NEVER found any three UFO sightings formed so much as a straight line or any other detectible pattern.

Unstated was if there had been such a study in America (there has), or the findings (which were quite different), but THAT is another topic, for another day. The point is, the method employed by government is one which can be applied to mass shootings equally well: Dispersal Pattern Studies. Such studies are normally used in naturally occurring events such as animal migrations to reveal natural patterns, but can also be applied to other random events seeking signs of intelligent design, as in the UFO example.

In the 60’s and earlier, when such studies were employed with UFO sightings, the methodology required use of global coordinates with navigational computations common to flight planning by pilots. You can’t simply plot them on a map and draw lines (a common mistake by amateurs) because there are many kinds of map projections, each of which thwarts either distance, angular relationships, or course computations. No kind of map projection correctly depicts a spherical surface which in turn also correctly renders distance, visual angle, and course. Moreover, navigational computations were required to determine the course heading of any two sightings and, more importantly, seeing if any third or additional sightings lay along that same course. These methods also allowed determining distance between sightings with useful accuracy.

But accuracy still remained an issue; the nature of UFO sightings is such that location data might refer to the location of the observer, rather than the UFO, or vice-versa, or perhaps only the nearest city or landmark.  The location to be plotted often had to be determined based on extrapolation of other details such as angle of view, apparent object size, other eye witness vantage points, and so forth. A plus/minus error of several miles or more was not uncommon. And yet, in thousands of sightings, they found no lines in at least two continents worth. KEEP THAT IN MIND.

Can patterns be found in mass shootings plotted in Google Earth?

Google Earth saves the day

Fortunately, these mapping problems are no longer relevant. Google Earth incorporates such calculations as it renders the Earth at any given detail level one requires. While it has its own tolerance or error issues, it is far more accurate than any map projection despite the resulting ‘flat view’ on a computer screen. Better, it does afford useful course, angle, and distance measurement. It even considers magnetic declination, a fact we will come to appreciate.

Google Earth accuracy is generally well within civilian GPS accuracy; roughly 50 feet. When drawing a line over rugged terrain of dramatically varied altitude, one may see visual aberrations in the line which imply inaccuracy, but the heading and distance calculations do not suffer the same errors, unless, perhaps, taking the readings at the point of aberration. These visual flaws are not real, but reflect the differences a dramatically higher altitudes of the Earth’s surface has upon rendering a sphere on a flat screen. Since we don’t see mass shootings take place on mountain tops, we thankfully need not take measurements at such points.

To further illustrate the remarkable accuracy, let’s use Sandy Hook and just a few of the many lines which are cojoined with this shooting. In the image, we see two lines precisely (for all practical purposes), bisecting at the doorway area window allegedly shot out by Adam Lanza to gain entry. Each endpoint of a given line is ALWAYS placed at this level of accuracy. It is the MIDDLE shooting points where we want to be careful how we determine accuracy. Here, we see such a point in a line from a shooting at the Anniston Postal event in Georgia to a Lottery Worker office shooting event elsewhere in Connecticut, which passes through Sandy Hook some 56 feet (rounded up) from said entrance point (the yellow measurement line). This figure is divided by two to find the actual accuracy of 23 feet (per Google Earth); because we could move the line that far to find the center point between all three shootings and still enjoy the same 23 foot measurement at all three. Thats about 7-10 footsteps for most people.

Example of 'doorway-to-doorway-to-doorway' accuracy.

Example of ‘doorway-to-doorway-to-doorway’ accuracy and methods of measurement for such determinations. Each end point is placed as accurately as seen here, each mid point must not exceed more than 2x GPS accuracy (100′) error to qualify as being aligned by design.

This plot point itself, to restate, is based on using the known (or where not concretely known, the most logical) entrance to the shooting area, or if an outdoor area, the entrance to the area (e.g., driveway or walkway at the property border). This represents the point of first violation, a key element of importance to both the crime as well as to magical considerations of value to Satanic or Illuminati thinking (which is sociopathic; ‘violation’ is a favorite pastime). Thus we find consistency in results based on our primary postulation (NWO design), as well as forensic facts of a given shooting.

The general method for finding such lines is simple:

a) plot all shooting event locations;

b) Draw a line from any given event to every other event, and extend far enough to encompass any events further away along the same path;

c) determine if the resulting line bisects any additional plots to make three or more using the above accuracy determinations.

d) take note of any which are discovered to qualify by this means and keep the line, and discard those which do not.

Where it does bisect within accuracy limits, you have established a pattern; a straight line — something which, according to European and South American UFO studies, does not happen with random events even when using a broad error allowances of several miles. Shootings, however, prove to be quite another matter altogether, as we see. So perhaps there is indeed a cover up in UFOs?

As stated in the prior Post, when first attempting this method using only the 76 shooting events media wanted to talk about, plus about a dozen more from my own knowledge (shootings earlier considered by me as indicative of mind control operations), I did find some very interesting lines (image immediately below), though barely suggestive of ‘patterns,’ as such. The question remained, given the UFO study results, was this coincidental, or truly evidence of intelligent design. I wanted to know for certain. The only way to be sure, was to establish a control group.

88 ‘Media’ shootings create 12 lines including three sets of conjoined lines; a set of two lines sharing a common end point (5 shootings); a set of three lines with two endpoint shootings as common points (7 shootings); and a super set of three lines all sharing a single common point at Sandy Hook (7 shootings). Thus 19 of 88 shootings produced such lines, roughly 23%. Do you really believe it random?

Can dispersal pattern studies be applied in mass shootings?

Control Group Study

One thing I noticed when looking at the plots is that there were clusters of events, some of which were scattered along a given heading, more like an elongated oval than a circular grouping. At continent view altitudes, the illusion is that many more shootings are on the line than really are. Some of these seemed to be logically along population corridors, while others did not. Almost all of these clusters contained several of the more recent and best known shootings being given day-by-day news coverage. Note also, that there are hardly any clusters at actual high-density population centers, save San Francisco and, perhaps, Miami and LA. Nothing in NY or Chicago, or elsewhere.

So one thing I was mindful of when trying to establish a control group, was to see what the role of population corridors and centers might play in grouping: a truly random set of events should closely resemble the clustering of any control group which took population into account. But would they mirror in a general way the shooting clusters?

If truly random, the answer should at the least be depicted with a ‘resemblance.’ Mass shootings take place where people are drawn together, and while some portion of them should reasonably take place on farms and other outlying properties, the bulk should be taking place in cities. The bigger the city, the more shootings should be taking place, by and large.

Additionally, I felt the control group should have some similar social context which was at least symbiotic in relationship to mass shootings. A control group based on, say, businesses using the word Acme in their name, for instance, would have no such relationship to shootings, but would relate to population centers. On the other hand, if I plotted gun shops, there would be a relationship both to shootings (access to guns equates to access to gun shops, which affords the means to shoot someone) and to population centers (gun shops tend to open where customers can be found in quantity).

Ultimately, I employed both. Google Earth has a unique built-in search engine which randomly pulls up ten businesses at a time if you type in a category or keyword, pulling them from the pool of all such firms located within the map being depicted at the moment. If you zoom into a city, it will produce only local matches. If you zoom out to show the 48 States, it will produce almost exclusively random firms from the greater US. Therefore, I established two such Stateside control groups; Acme, and Gun Shops.

The Acme set employed 88 random Acme firms, the same number as shootings employed in my early search for patterns. Actually, there were not quite that many ‘Acme,’ firms which came up, but Google Earth, once running out of matching candidates, then offers names of firms it considers related, and I deemed to include some 20 of these as if actually named Acme, because they were still randomly acquired.

So the control group included was equal to the shooting events to which it is compared.

The Acme plots did manage, to my surprise, to establish 3 lines. However, all lines were entirely disassociated one from the other (no conjoined linkage). The ‘random’ shooting events, on the other hand, produced a total of 12 lines, many of which additionally shared common shooting events with other lines to form 3 groupings of such interconnected lines (linkages existed). Further, note in the image below the absence of lines along population corridors, and generally,  a lack of multiple plots creating the appearance of ‘extra’ plots along any given line (just the three that make it up). It is nothing at all like the shooting lines, above. There is modest clustering at actual population centers, and even so, this is not terribly uniform: SF, LA, Houston, Miami and New York, but not Chicogo, Seattle, or New Orleans, etc.

88 random ‘Acme’ businesses via Google Earth tools: Three disjointed lines were possible.

This differences implied shootings were ‘too random’ and less associated with population centers compared to Acme, and yet, that really meant them more likely to be of intelligent design, than not. But you are right if you are thinking, ‘this is not yet proof.’ Were I to have stopped here, I would have concluded mass shootings were only suggestive of intelligent design. The big pusher to continue the study was, of course, the dramatic difference in number of lines and the fact that many were connected to each other, and starting to suggest a potential for the generation of shapes.

So I did not stop there. In the same time frame I discovered some 100 more shootings, about 180 in total. And, I had already determined that gun shops would make perhaps a more interesting control group of more relevant value to the research topic. So, I next established a control group of only gun shops, and that group was of a full 100. The results were not dramatically different, but regardless, made the case for intelligent design even stronger.

100 random Google Earth Gun Shops established 4 disjointed lines.

100 random Google Earth Gun Shops established four disjointed lines.

There were 4 lines formed out of 100 gun shops, and again, no interconnecting lines. Gun shops again matched Acme in terms of ignoring population corridors, but non-the-less forming small clusters at some, but not all actual mega population centers. Shootings remained, even using only 86 plots, quite indicative of intelligent design in ways which defy the odds of random coincidental occurance.

But by the time I had finished this effort, I had discovered nearly 400 shootings, and was still counting.

This is the work which has yet to be completed: the full computation of lines for all shootings. It is tedious work requiring a lot of manipulation of zoom and map movement controls within Google Earth, in order to maintain and test for the needed accuracy. Regardless, to date, of some 450 shootings (I stopped adding new ones just before December, 2013), I have managed to test several hundred of them for line formation, and have discovered thus far 440 lines where three or more shootings maintain the required accuracy. Some lines have as many as five shooting in a single line with all five maintaining the required accuracy.

Clearly, that MUST be by intelligent design.

Yes, you are free at this point to argue that the more plots you have, the more likely you are to create a line. The control groups imply that; an increase in plot points of about 14% did create one more line. But if generation of random lines was the end of it, I’d have no good answer for you. But reading further, you will learn that the lines are merely building blocks for something even more useful as proof… which are in turn building blocks for something even more useful… and on and on. The lines are nothing compared to what the resulting lines themselves are in turn able to reveal. Shapes, yes. Symbols, yes. But even more; the data points on the key-most lines include code. Those are future post topics. Keep reading, and do so with an open mind.

Go back to Introduction

Go back to Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

Go to Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes

 

Sidebar: The ‘Science’ of Magic Numbers, Their Meaning and Decoding


It does not matter what YOU think. What matters is what Satanists and practitioners of the Occult think. They think select numbers have meaning, translating into words of like meaning, and that gives them magical powers to bring forth that meaning in a spell. There is some science to their madness.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that there is a science of translating numbers to text and text to numbers, individually, or in whole text passages;
•  that numerology additionally gives meanings to numbers, among which practitioners of the occult find some magical;
•  that there is a consistency in how magical numbers work together to ‘say something hidden’ which is the basis of their ‘magic.’

 Are mass shootings by intelligent design?

Sidebar: The ‘Science’ of Magic Numbers in Mass Shootings by Intelligent Design

Is there a mass shooting conspiracy?

To start with, consider the ancient languages of the Greek and Hebrew. Both of these languages are ‘dead,’ which means we have a concrete and fixed understanding as to what the definitions were for words  in those languages. This is why the Bible is such an important book for study to Christians, and should be of interest to non Christians; it was written entirely in dead languages, and is therefore no longer subject to the evolving interpretations and meanings of words as is normal in a living, spoken language. And while we will see the Bible has a part in our topic, be not put off; what we are going to discuss relates equally to other ancient writings, religious and non religious, alike.

The science of Hermeneutics studies the meaning of such texts for literal translations and understanding in any other given living language. Interpretation with rules. THAT is how the King James Bible came to be, and is one reason why it is considered the most authoritative English Bible by those who are aware of and evaluate such translations. Only the uninformed deviate from these rules, and in so doing, twist meaning to they know not what, and spawn false teaching.

Think of it as a ‘double-blind study’ method for ancient texts. Image from (CLICK) Margith Strand/Fielding University

Closer to our topic, Satan, in his role as the Great Deceiver, uses Man’s desire for knowledge by tempting him to think he is wise above even God’s foolishness in the Bible; many false or flawed interpretations exist by such lures. More to the point, he works his own secret language from within the same dead languages, and more; as is true of many dead languages through the World’s history, such languages also assigned a number value to each letter used in the language. This is the occult tie to the ancients.

Very useful for secret mysteries. In fact, it can arbitrarily or uniformly be applied to any language for this purpose. In wartime and among spies in peace, many codes are based on simple tables of numeric-to-text relationships, typically additionally offset in starting point or randomly assigned. Even your computer knows every letter internally as a number value on the ASCII table. But what we talk about here is different, and far more mystical in nature.

Text as numbers as words as magical effect.    Image: Gematrix.org (CLICK)

By such means, a word, sentence, or larger body of text can be translated into a number, and conversely, a number as text. A single digit can be a whole word or thought. Rules of conversion and the actual assignment of valuations varied by language. But coming forward in time, the science (that may not be the right word… a system which is based in science, at least) of GEMATRIA was evolved to allow simple ‘calculator-like’ conversions between text and numbers, and vice versa, in such languages.

There is actually a Gematria Calculator used in this presentation, and you are encouraged to use it in review of my work. Just type in a number or a word and it will display Jewish, English, and Simple Gematria results, at least those results which others have elected to save in the database. You can choose to do the same.

The other ‘science’ we must deal with is not at all truly considered science; Numerology, which itself lays at the heart of what makes Gematria tick… actually more like a symbiotic relationship. A Christian considers it a cultish thing, and Satanic in its roots, especially since it also seems inseparable at times from Astrology. But in point of fact, we are not even talking specifically about root Numerology as it is normally thought of, but the specific manipulation of numbers for hidden meanings or purpose.

Now, as it happens, if one is a Satanist or occult follower, numbers are quite important in this respect, the purpose being ‘magic.’ Therefore do they also embrace Numerology and employ Gematria as tool. But they also are free to enhance their use by additional rules seen useful for a given purpose, such as concealment or even the reverse as pointers or clues.

Some numbers are more important than others, and have special meaning, especially in a given context of use. Everything discussed thus far remains on the table. This at last brings us to what constitutes a ‘magic number’ to such practicioners: the answer is, actually, rather a lot of numbers qualify. First of all, most every key number in our counting system at the lower end of the scale has a meaning useful in magic/occult application.

But there are other numbers of value, too, and generally more special in use. It is not so much that every number is powerfully magic, but its magic or magical meaning in combination with other magic numbers can be amplified to make it more powerful. Fortunately, the bulk of truly powerful numbers need not be listed, as they are recognizable by their unique characteristics, as we shall learn. The short list then, with specific occult meanings, is as follows:

3  Fullness

5  Balance, the power and limit of man to control

6  Illumination, enlightenment, legend, man

7  Mystery, esoteric or scholarly magic, associated with Saturn, a name for Satan, might be a curse (conversely, 7 is also known as a number for God, Christ, Creation, an excellent illustration that context is everything)

9  Visitation, spirit

10  Law, obedience

11  Imperfection, disorder/chaos, that which precedes destruction

13  Rebellion, depravity, sin

16  Material power, incarnation

15  Three dimensions (reality), new direction, blinding temptation (Satan)

17  Victory, Son of Man (Christ), liberation

18  Oppression, bondage, slavery  = 3 (fullness) x 6 (legend/man/illumination)= 6+6+6 = 666

21  Distress = 3 (fullness) x 7 (mystery, magic – a curse)

29  Departure, cast out = 3 (fullness) x 13 (sin)

30  Rulership, dominion = 3 (fullness) x 10 (law, obedience)

31  Offspring, branch

33  A sign, warning, predictor = 3 (fullness) x 11 (that which precedes destruction)

36  Adversary, enemy = 2 (division, double) x 18 (oppression, 666)

39  Infirmity, death = 3 (fullness) x 13 (sin) — the wages thereof

99  Visitation (9) of the (evil) spirit (9) in this case a demon; 9+9 = 18, 666

360  Encircle, trap, capture = 36 (enemy) x 10 (obedience)

666  Satan’s name, produces 18 when summed.

999 Upside down 666, but produces two 18’s when summing adjacent 9s

Is 18 a magic number?

Magic Numbers can convey complex messages: the number 18

These meanings are not the same as might be produced by Gematria (but on occasion, they might). In fact, the three basic forms of Gematria tend to each produce a different result, but it is uncanny that there often remains a consistency across the board between the numerology and all three Gematria with respect to general tonal themes of results; they are equated as if a Math equation being resolved.

The number 18, for instance, in both Jewish and Simple Gematria can translate into ‘die,’ which is the ultimate price of suffering slavery/sin, one of the actual meanings cited above. The English Gematria is unable to translate such a small number, but it is interesting that the number 108 in the English translates to die, which in turn sums to 18 by one of the accepted methods employed and explained next. Such consistency in translation/meaning/valuation is, just as in traditional Mathematics, tends to be crucial. To the cultist, this is a magical property.

A larger number in terms of digits can be compiled into a lesser number of digits by a process called summing. It stems from the need to sum individual letter values in finding the value of a word or phrase as employed in Gematria. Summing is normally employed to find secreted magical meaning from within adjacent but related numbers within a set, such as in a date or phone number, or any other associative grouping. Such numbers seldom seem magical when considered as presented due their intended use. But it is also possible to sum any preexistent number of multiple digits to once more reveal magical numbers concealed within.

Summing can be done in any number of ways, but usually, in like numbers of digits, such as sets of two or three. In number groupings of associated use, such as in a date or phone number, each group can arbitrarily be treated as if having the required number of digits when it may be short, or one can employ the first digit of the next group to make up the shortfall, and then  employ the remaining digits in like manner  for the next calculation. Where there is an odd number of digits, the odd-man out can be in the middle and shared, or at either end. Lone zeros can be dispensed with in results, or not. Whatever method is employed, one would wish to be consistent in any related uses within the same decoding process (in our case, for the same shooting line set examination). Examples:

a)  The date 12 7 1880 can be summed in pairs as 3798 or 3816 which summed again produce 1017 or 117, both of which can be summed again to make 18 or 9, whereas the actual sum of all digits is 27. There are, of course, two 9’s in 18, which along with the lone 9 makes three, and there are three 9’s in 27.

In history, this is the date the First Boer War in South Africa was staged by the formation of the Republic, akin to the 1st Continental Congress of the United States in impact. The number 18 is, again, Slavery, oppression, where three is fullness and 9 is spirit or visitation. The Boer Wars led to the oppression of Blacks in their own land until Nelson Mandela forged the new government.

b)  The integer 1271880 can summed in threes to make 10116 or 11016 or 1017, again all eventually summing to 18.

The various means of summation are not so many as to allow just any number to end up conveniently producing a meaningful final result (i.e., magic number). It is not possible by such contrivances. Indeed, for any group of (such as used in our comparison of shootings which form straight lines, sets of three) different complex numbers to end up with an identical ‘theme’ or even for an individual number to be translated in multiple ways to produce multiple numbers of like importance or meaning would be quite unusual, and not something easily repeatable unless by design (carefully choosing the starting number(s) for the desired properties).

Within this posting series, all summations will be indicated in a way which allows the reader to understand how they were derived from the original number(s), and the reader will discern that in general, the methodology is consistent and employs very few rules. Exceptions to summation rules will be drawn out with explanation to assure like clarity. We will additionally only focus on those which are found present in ALL THREE (or more) shootings making up a given straight line.

These are not the only manipulations possible, but they are the only manipulations which will be employed in the proofs, as it is not felt additional proofs are needed, and it would simply bog the reader down further with endless detail. I assure you, however, the investigation has found many more examples of magic numbers within mass shootings examined at such depths, thus far.

What kinds of numbers are magical?

Other kinds of Magic Numbers

Summations can reveal the existence of hidden magic numbers. One type of powerful number series revealed by such means in the investigation is the palindromic number; one the same forwards and backwards, such as 43234. But Palindromes can also be discovered by another form of summing. When you read the second Proof posting, you will find a section revealing more of the ‘magic power’ of the number 18. Unstated there, but added here, is that the additional power of palindromes can derived from the fact that 18 = 2 x 9, 3 x 6, as well as 9 x 2 and 6 x 3, which individually can be summed to variously make 11 or 9.

These results can then be combined to produce the palindrome 119911 and 911119, as well as 2992 and 9229, by summing the multiplicands. The shorter of these can be added to equal the palindrome 12221, which further sums by pairs to 323.   The sum of each digit positions in the 2992/9229 set sums to 11 to make 11111111 (a Palindrome, yes, but also a repeating digit, where each digit increases the power of the root number, in this case, 1), which is 4 sets of 11. Consider then, the meaning of 11, 1,  2 (previously reviewed above), and of 4:

The meaning of 11 is Imperfection/corruption, disorder/chaos, that which precedes destruction. “The abomination which maketh Desolate” in the Jewish Gematria translates at 1802, which sums to 11.  The meaning of 1 is “single minded, intolerant, stubborn, controlling, lacking in emotion, aggressive, arrogant, dominant (some key traits of Satan)”

The meaning of 4 is “foundation (Earth) or World, or to establish order and bring plans into material form (the NWO, for instance).” Satan is given power over and resides in the Earth; seeks to destroy all creation in the End of Days. “Four horsemen of the Apocalypse” in Gematria translates and sums to 18.

Adding the larger palindromes together, we get 1031030, which can sum in pairs to 13130, or dual 13s, and you know the dark pop culture connotations of that number. But in the occult it also means “Rebellion,” which is exactly what Satan is about. It has additional significance to the Illuminati; nearly all Knights Templar, Illuminati’s predecessors, so to speak, were all assassinated by order of the Pope during their last meeting, which took place on Friday, Oct. the 13th, in the year 1307.

There are three 13’s there, given the 5th day of the week sums with the 8th month. Yet they did not trump the 7, which translates as spiritual perfection, fullness, covenant, and even the Holy Spirit. Thus we see the eternal struggle between Satan and God reflected even within the number 18 itself. That struggle is, after all, Satan’s base motivation for all he does.

In like manner palindromes can be constructed; 3663 and 6336, each summing to the doublet 99, itself summing to 18 again since the originals also summed to 18. Single digit position summing yields 9999, or 1818 summed yet again, and yet another 99 summed one more time, and again to yet another 18.

Going back to the larger 119911/91119, once more, we can produce 101010101010 by adding digits (6 x 10 = 6’s illumination x law and obedience 10 times).

This is very interesting, because if treated as a binary number, those 1s and 0s translate to ASCII decimal and character codes 170 and 10 (totals 180 = 10 x 18), and as text, the letter ‘a’ (as in Alpha of Alpha and Omega, but in lower case as if to belittle it), and in base 10, it becomes 2730, which sums to 12, which as you are about to learn, fits right in with the overall theme, as well.

In like manner, 11111111 decodes from binary to 9, and in ASCII Decimal or Character, it is in both cases 255, also summing to 12. Moreover, in raw Hexidecimal computer code, it is FF, which is the functional Omega of the beginning and end (start/end) of that computer coding construct, which is typically expressed in upper case and, thus does trump the lower case Alpha. Satan sees Armageddon as his victory over creation.

So by these various manipulations, it is possible to find the consistency talked about being found in magic numbers when intended to translate to meaning. It seem that no matter what method of manipulation you employ, you find more or less the same message in theme, if not specifics. Fortunately, the posting series will not spend this level of detail in each numeric evaluation. We will only tell you which magic numbers were discovered which proved useful in the investigation, how it was arrived at, and why it matters.

This does not by any means imply there is not much more which could be learned by further analysis. In some cases, more has already been learned. But there are many other forms of magic number analysis which I’ve not even attempted to find present in the shootings. These may indeed (and likely do) exist as further clues as to the identity of the designers. But I simply cannot take the time to spread my efforts even thinner; yet another reason to seek financial or helper resources to carry on the work.

What makes a number magical in the Occult World?

Conclusion

It is hard to read such number explanations without a practiced mind aware of the meanings. There are many ways to think about each starting point in order to find full realization. It takes many steps to analyze a given candidate, and more steps to full realization. It can be confusing at first, but it is not. It is a consistent series of numeric depictions of a given intended message. In the case of 18, for example; spiritual warfare with Satan being the victor. Only certain numbers support these kinds or manipulations and findings with the same consistency. That is what gives them ‘magical’ power in the minds of their users.

Therefore, these are the kinds of manipulations we must find in use and seek understand why they were used in a given shooting series which establish a straight line or shape. To ignore them because we do not believe they have any power, is to fail to see the intelligent design which their very use is critical. To make it simpler for you, the reader, I’ve already done the work. It remains therefore to you only to be open minded enough to review the work, and perhaps to double check my work if so moved. On the other hand, some of you will find the topic worthy of deeper interest.

To learn even more about magic numbers, I suggest you consider what a high Mason, Rosicrucian, Magician, and founder of the conspiratorial cult, the Hermetic Order of The Golden Dawn, one W. Wynn Wescott, had to say in his book: Numbers – their Occult Power and Mystic Virtues. He may also have been a Warlock. I make a case in my book MC Realities that Knights Templars went into hiding as Warlocks within the Rosicrucians before infiltrating and assuming control of the Mason’s Guild to subsequently form Free Masonry.

Another tool as useful in some ways akin to a Gematria Calculator, is this Web site which takes a close look at numbers from both the mystical side as well as the mathematical side. It is absolutely true that when a number has a very unusual mathematical property, such as being a prime number, it can also be considered magical. This tool was not known to me when undertaking my investigation, but may aid those who elect to follow in my footsteps to perhaps reveal even more clues about intelligent design and identities of those responsible.

Go back to Introduction

Go back to Proof TwoShootings Exist in Identical ‘Magical’ Categorical Clusters

Go back to Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages

http://www.gematrix.org/gematria.php

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters


The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  that mass shootings defy random probabilities in their distribution;
•  instead collecting by the same count in groupings by type of event;
•  that count is a number of great significance to the planners.

Are mass shootings by intelligent design?

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

 Is there a mass shooting conspiracy?

This post is both the simplest to explain and reveal to the reader of all the patterns discovered, and yet, one of the most complex in terms of planning requirements for any conspirator. This particular proof, easy to grasp but harder to believe until you see it, could never be found using media statistics.  Simply put, if you look at all shootings (about 450 at the point of discovery), not just those media reports, and start to break them down categorically, you quickly find amazing results impossible by chance, with no hope of doing so using media counts:

Exactly 18 mass shootings involved high schools;

Exactly 18 mass shootings involved colleges;

Exactly 18 mass shootings involved US Post Offices (‘going Postal’);

Exactly 18 mass shootings involved Malls;

Exactly 18 mass shootings involved holidays;

Exactly 18 mass shootings involved Native Americans directly or indirectly;

Exactly 18 mass shootings involved Military/First Responders, either as shooting victims, shooters, or both.

18 shot revolver fires 3 slugs x 6 pulls; 18 is not just a magical number, but perhaps deadlier than most.          Image (CLICK) techwarelabs.

Additionally, there appears to be 12 or 13 fast food/specialty restaurants (i.e., pizza, chicken, tacos), and 14 or 15 full menu eateries. The precise number is in question because some locations are not categorically determined by their name, and have since gone out of business. This study should have been undertaken decades ago, but who knew to do so? Media was not telling us about the great bulk of these events.

In like manner, there appears to be similar numbers which make up the categories of nightclubs/strip clubs (where dancing/live entertainment is part of the venue) and bars/taverns/pubs (where only alcohol is the attraction). These are even harder to discern for the same reasons as the eateries.

Finally, there are thus far exactly 15 middle/elementary school shootings. I mention the eateries and clubs, and K-8 schools only because each falls short of 18. This implies that there will be additional shootings in these categories to bring their respective counts to 18. Such a notion, given the other patterns yet to be discussed, implies it may be possible to logically compute a next shooting event to a precise location, and perhaps, even date.

To do so will require completion of the full study, something which would take an individual such as myself far too long a time to complete. By then the events would likely already have come to pass. That is why I hope this series of posts might motivate someone to provide funding for a staff, or better still, for some authority to undertake the effort as part of a criminal investigation. Time is of the essence, which is why I’m publishing NOW, instead of two years from now.

Are mass shootings taking place in  clusters of 18?

Two unusual traits found in EACH grouping

That such perfect identical groupings should exist is alone remarkable. But once I determined such groupings existed, I wondered what else might be unusual about them as a minor data set — as opposed to their inclusion in the whole. So I simply ran connecting lines from each of the 18 to every other within the group. Two unique things became apparent, and were true in EVERY GROUP of 18.

GE plot of all 18 Postal shootings interconnected to one-another by lines. Despite confusion, you can see reflective angle patterns in several which are more isolated, but they exist in each of the 18. This should be impossible if random events.

Google Earth plot of all 18 Postal shootings interconnected to one-another by lines. Despite confusion, you can see reflective angle patterns in several which are more isolated, but they exist in each of the 18. This should be impossible if random events. Ignore the additional non postal shootings also shown, but with no lines.

a)   Each group of 18 generally formed a ring around the lower 48. Each ring would have two or three which were perhaps inset a bit more central than some of the others, but by and large, the total effect was to form a large irregularly defined shape (I’d say oval-like) which generally ran close to the borders or coastlines with a kind of regularity that implies deliberateness in its own right. You would think, if random, that there would be more shootings found centrally located, instead of generally being peripherally located.

b)   Reflective angular spacings. More remarkably, when looking at the angles created by the lines radiating outward from each individual shooting to the other 17, I was struck by what I’ll call a ‘mirroring of angles.’  That is, a given cluster of some number or perhaps even sets of clusters for a given shooting… and true in every shooting of the 18, would mirror a given angular relationship. For example, you might see lines radiating in arcs with angles of 5°, 12°, 8°, 20°, 8°, 12°, 5°.

Understand that such patterns might be a bit harder to discern because of the additional presence of a non mirrored line, but most of them literally jump out at you, visually. This might happen randomly given the total number of opportunities… in a given shooting, perhaps even more than one such example… but in all of them… in each grouping of 18? Not random.

To be sure, each set might have different numbers of such mirrored lines, and each array might consist of entirely different angles, but the point is, each shooting enjoyed this unique finding to one extent or another. I must point out, however, that measuring angles is quite time consuming and tedious, and I therefore only tested a few to measure their accuracy.

I will also state that the resulting accuracy of those checked was not perhaps as tight as I would have preferred. I would like to have seen .1 degree accuracy, but while some were within that range, .5 degrees was more common. Still, it is quite dramatic to see (image), even if the actual accuracy were found to be more than a degree (a degree is hard for the eye to detect). Very few were that far off.

This ‘opposing’ comment to the whole groups of 18 matter must also be added: shootings continue to transpire and it appears that at least some shootings will eventually fall into some of these same categories. Does that invalidate the observation? Perhaps, but not so easily.

Further study is required to examine each shooting to see if it is in the same ‘league’ as the others. For example, do the shootings make up a set of three or more in a straight line (a future discovery which will be covered as a subsequent proof)? Do their lines form a complex shape (also a future post’s proof)? Do they form equidistant – mirrored angles of interconnection points as described above?

Note: I’ve also not yet had time to chase down this important question: do any of these interconnect lines also form lines of three or more shootings, in which case, they are very important lines and shootings, events which may hold even more clues in need of discovery. Another reason I need help.

There is a clue this consistency should prove out to be true: one of the more recent shootings in the news was at a High School. That would make 19. Yet I recalled that I had arbitrarily included… because of other clues that it was INTENDED to be a mass shooting… an event where only one person was shot before the shooter was subdued. If it were intended but ‘failed,’ it is highly likely that the planners would seek to replace it.

The patterns then would seem to reflect a need to be consistent and ‘pure’ by its designers. Indeed, these reasonable questions and tests are yet another reason I hope someone will fund further research or be undertaken by LEA.

But perhaps there is a bigger question we should be asking:

What does the number 18 have to do with mass shootings?

Why 18?

Music Album Cover from arismixtapes.com (click) seems to sum it up: the wrist watch reads 18 minutes after 5; 5 x 18 = 90 = 5 sets of 2 x 9, where each pair (99) = 18, for a total of six 18s, plus the title 18 to make 7 in all, which is covertly stating, intentional or otherwise, that ‘the power of 18 (Satan) trumps the power of God (7)’

It is about ‘magical numbers.’ The general topic of numerology and the mystical or Gematria translation (coded meaning, if you will) found in numbers is a bit beyond the scope of this post’s presentation as it would be quite lengthy. Yet it is important that the reader have some grasp of the topic in order to make the points relevant, and to accept the ‘science’ or ‘validity’ of the meanings ascribed to a given number. Else it would not seem quite relevant to our investigation. Ergo…

Sidebar PostThe ‘Science’ Behind MAGIC NUMBERS, Their Meaning, and Decoding. You may be well served if unfamiliar to review how the occult World employs numbers they see as ‘magic,’ because it does not matter what YOU think of that possibility, it is what THEY think about it, that matters. Especially if those behind any intelligent design are Satanic and seeking to leverage their plans by incorporating magic numbers within them.

The number 18 might be described as the most ‘holy’ of ‘holies’ in magic numbers employed in occult mystical beliefs, including Satanism, Masonry, and the Illuminati, which was itself derived from Free Masonry. The sidebar gives you a taste of that. But let’s pick it apart to see why.

The parenthetical additions employed as we go reflect applicability. Know that the meaning of a number varies according to application or context (spiritual, non spiritual, positive nature, negative nature, and to a degree, select topical relationships, such as being masculine or feminine, relating to a season or emotion, etc.). The general meanings imparted here are generally the negative spiritual context.

18 = 6+6+6 = a coded number for Satan himself (666 being the number of the Beast in the book Revelations). In the Jewish Gematria (see above sidebar link), “Beast” translates to 198, “Devil” translates to 738, “Mystery, Babylon The Great” translates to 1926, and “The Old Serpent” translates to 567. All of these equivocal names for Satan each sum to 18. “Mark of the Beast” in the English Gematria translates as 864, while “Doomsday” translates as 576, and so forth.

In fact, in various Gematria, the founder of the Illuminati, “Adam Weishaupt,” “Adonai, Masonic God, the Great Architect,” “Grand Master Jacques De Molay,” as well as “Illuminati” and “illuminated” translate and sum to 18. Learn more here about how these words and their decodes directly relate to the Illuminati. Next, we take a look at some ‘fun with Math’ properties, which are exactly the kinds of things that make numbers ‘magical’ to those who believe it true and thus so employ the numbers in that belief. Again, what YOU think it means matters not, to THEM, because they have so believed in such ‘mysteries’ for thousands of years.

18 = 2 x 9 and sums to 9, making three 9s, where 999 is also a code number for Satan, being 666 upside down. 9 x 9 x 9 = 729, which sums to 18. Divide 729 by 666 and you get 1.09090909… ad nausium, where adding every four digits of the fractional component yields 18, again. 6 x 6 x 6 = 216, when divided by 666 = .324324324… where summing in groups of six digits also yields 18. It (999) in like manner to 666, translates in the Jewish Gematria to “Luminous Soul” as well as “Satanic philosophy.”

18 = 2 x 9 or 9 x 2, each of which sums to 11, and 3 x 6 or 6 x3, each of which sums to 9. Collectively summed (11 + 11 + 9 + 9) = 40, which is the number of Judgement in the Bible (e.g., 40 days and nights of rain in the great Flood), and the Beast is all about Judgement Day: the purpose of the Illuminati and New World Order is to create a One-World Government, providing a single throne for the Antichrist and to hasten confrontation with God and destroy all life and the Earth as we know it: Armageddon. “Judgement Day” in Gematria sums to 18.

666 and 999 are triplet numbers, and any repetitious numbers, even doublets, gain in power; 666 is more powerful than 66, which is more powerful than just 6. The meaning of 6 is “Illumination (a trait of Lucifer), enlightenment (the knowledge of good and evil), legend (the greatest lie is that Satan does not exist, he is mere legend), Man (the Antichrist will be a man in whom Satan resides).” The like manner, the meaning of 9 is “Visitation, Spirit (Satan as an unclean spirit, will visit himself upon the man who will ‘become’ the Antichrist).”

Breaking a number into its mathematical equivalents also decodes into interlocking sentence-like meanings. The meaning of 18 is “oppression, bondage, slavery (what sin represents to man, and what the Antichrist intends politically to bring on Armageddon).” The meaning of 3 is “fulfillment/fullness, or relates to the three-fold corruption of God’s Word, or Man’s three great enemies of Biblical references.” The meaning of 2 is “power of judgement (God the Father and Jesus Christ, or if you prefer, God and Satan in battle), the indecision of outcome in the battle between good and evil.”

Therefore, 18 = 3 (fullness of corruption by enemies of Man) x 6 (illumination, the knowledge of good and evil) and 2 (power of judgement in battle between God and Satan) x 9 (Satan in the person of the Antichrist). This can be done with each of the equates (i.e., 18 = 2 x 9). So we see there is complete sentence-like consistency in such translations in really powerful magic numbers, which in turn are in interlocking support of individual component number meanings.

Finally, 18 plays to Masonic mystical calculations in sympathetic manner. 360 degrees of a circle divided by 18 = 20, which is 2 x 10, where the meaning of 10 is “Law, Obedience.” Therefore, 20 is the “Power of Judgement x Law, Obedience” x all the meanings of 18, an apocalyptic theme in spades, especially since the meaning of 360 is “Encircle, trap, capture.”  That is the very plan of Satan for Armageddon; not only to capture Man, but to lure Christ into what Satan sees as a trap which will allow him to defeat Christ and, thereby, God.

By establishing a circle of 360 degrees (any scale COULD have been arbitrarily chosen), a straight line course is 180 degrees of arc, which sums to 18. So even when on a path of ‘true course,’ you are vexed. And the right angle of the Mason’s Square is thereby 90 degrees, of which there are two such arcs when formed with that true course. Each sums to 9, to make 99, which sums to 18, which also vexes the true course. Divide 360 by 666 and you get .540540540… which once more sums to 9s, this time in threes.

The meaning of 3 is “Fullness,” and of 6, again, is “Illumination, legend, Man” and 9 is “visitation” (the final fulfillment of legend in a Man, the visitation of Satan in the Antichrist). Add to that the meaning of 12, as explained next, and it makes total sense…

As we found in the number 18 a myriad of magical encoded symbolic statements expressed in various levels of occult power and interpretive meaning… that the shootings can be broken down into 12 such categories (though at this point we may simply have not found all the categories — there might actually be 18) is perhaps also telling, and happily, less complex to relate:

The number 12 is the number of Tribes of Israel, the number of Christ, and the number of the elect saved (sealed up) during Armageddon (12000 x 12 = 144,000; the prize the Antichrist seeks). “Christ,” “Jesus,” and “Savior” sum to 12 in various Gematria. So we find then that the ‘magic’ being worked in shootings, by all the lines and cleverness employed in resulting relationships we have not even begun to discover (subsequent posts)… are all aimed at confounding Christ, and Man, especially those souls who are his most prized, the 144,000. The only way he can do that, is to beat Christ at Armageddon.

Mass shootings, then, are simply a ‘bring it on,’ ploy to hurry things along.

If you find all this compelling and disturbing, you haven’t seen anything, yet. Keep reading…

Go back to Introduction

Go back to Proof OneGun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Go to Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines

Go to Sidebar: The ‘Science’ Behind MAGIC NUMBERS, Their Meaning, and Decoding

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns


Any time you find a cover up, you necessarily have a conspiracy to contend with, because a cover up requires multiple parties to work together for criminal benefit. So I wonder: why do groups seeking gun control, including governmentals and liberal media, who should be using every opportunity to make their case for gun control, instead act as if the bulk of gun violence never took place? Why do they employ blinders and avoid publicizing fully?

Are there any patterns in mass shootings?  

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

 Is there any proof mass shootings are not random?

What you will learn reading this post of the posting series

•  media, government, and gun grabbers consistently conceal more shootings than they tell you of;
•  they are also willfully spreading mis/disinformation;
•  were they to tell you all, the patterns would be easier to spot — a defacto cover up.

 

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Is there a mass shooting conspiracy?

Gun grabbers, generally speaking, seem to have a sympathetic voice in government circles and, especially, mainstream media. If you look carefully at the actual wording of media reports and politicians, you frequently see evidence of their bias in favor of tighter gun control, if not outright calling for it, even including in some cases proposing an end to the 2nd Amendment.

From revereradionetwork.com article on mainstream disinformation (CLICK)

Yet if you actually dig into a given key shooting event yourself, you start to realize media frequently deems to omit certain information which, by omission, flatters gun grabber ideology by willful ignorance of the greater truth. That includes a consistent unwillingness to consider that something besides random gunplay is afoot; they never ask the obvious questions. They get away with it, in part, because they are not telling you about all the shootings.

The discoverable cover up takes form in refusing to acknowledge the true and full scope of the problem… the true number of actual mass shootings. This post spotlights the matter and considers why they choose such silence. One has to ask why, if pro gun grab, there would be such concealment? The answer is revealing, though the full answer shows how easily the issue could become clouded.

If you scan the Internet with a search you will find most mainstream sources talk about roughly 62 or so mass shootings in 30 years time (1982-2012). While other numbers and periods of time can be found, you will also find many of those reports talking about it being an increasingly more frequent event. Neither are factually correct, at least as of 2012 when the bulk of those cited were ‘selectively reported’ in order to make their point. Moreover, the narrower and arbitrary date ranges employed do make it easier to portray increasing frequency claims as ‘valid concerns.’

Point is, there is no useful consensus as to the actual number, much less any resulting trends.

There is also actual disinformation and misinformation in play, either by stupidity or intent. Much of mainstream tends to cite the same two original resources, both of which are completely worthless in terms of accuracy, and full of what at least seems intentional deceit. Worse, they are easily detected if using your brain, but even the White House and former Presidents make false statements based on their data (choosing not to think, or having no brain, perhaps, but more likely, having an agenda well served, thereby). Mother Jones, which used to be an excellent investigative journal until it came under control of Mainstream Media Moguls, is one of the flawed sources, as detailed, here.

The worst source is the Brady Campaign to Prevent Gun Violence, which maintains a huge database which is closer to mine in shooting event count than perhaps any other. However, it is so full of errors as to be useless. The same shooting can be cited as often as four times. Huge numbers of shootings have zero information which can be verified, their Web links no longer active or failing to lead the reader to the claim. Many other errors of this sort exist.

Worse, many Brady citations are not exclusively mass shootings at all, and though Brady’s use of the data does not directly claim the list is exclusively about mass shootings, they elsewhere imply it so and promote the list through dozens of Web venues without bothering to correct their wrongful assertion that it does. For example, consider a widely repeated/linked interactive map (one of three different flawed maps and data base engines based on the Brady material) citing the entire Brady list of 431 entries as separate mass shootings.

Trouble is, eliminating those with problems or not mass shootings, the actual number is closer to that of USA Today, who has the closest to an honest presentation. Even though they, too, reference Brady, they seem to have figured out the Brady problem and sought to remedy it. Note, however, that it is citing mass murders, inclusive of fires, stabbings, etc., — not exclusively shootings. This again makes it difficult for the average Joe to avoid a false impression. To their credit, they at least provide a button to filter by ‘shootings,’ which at the time of writing totaled 173 out of 227 mapped. That’s a full 100 more than the inventory cited in most reviews outside of Brady, and less than half of what Brady includes. But it still comes nowhere close to the truth.

Is media hiding something about mass shootings?

So what are the real numbers?

In my study, I elected to go back to the first known mass shooting widely publicized nationally, the Texas Tower shooting of 1966. This coincides in general with the time frame when CIA had perfected mastery of various Manchurian Candidate programs, notably the MK series. Now if you use that as a starting point and come forward, the frequency indeed increases, at least to a point, and it is indeed possible to select a limited time frame window where a range of shooting events reflect an increase… but it is also possible to find periods of decrease; fluctuation is common enough to at least support the notion of randomness which deters conclusions of increasing gun violence.

In general, national mainstream news has told us of about 100 shootings since the Texas Tower, spread out over roughly 50 years. Because where they used to only tell us about really big ones — perhaps one or two a year — they now tell us about almost each and every one, it SEEMS like there is an increase. Adding to the illusion, they talk about them days-on-end to hammer in the point, where in the past, ongoing coverage was spotty, at best, unless local, of course. But is this honest reporting of the truth? What do the real numbers say?

“NO!” is what they say. Take the 30-year number of 62. The actual count by my research totals 368, nearly SIX TIMES the number reported.

1988 – 5, 1 Postal, 2 Schools
1989 – 1
1990 – 0
1991 – 6, 4 Postal
1992 – 3, 1 School
1993 – 7, 3 Postal
1994 – 1
1995 – 2
1996 – 4, 1 Postal
1997 – 5, 2 Postal
1998 – 5, 1 Postal, 3 Schools
1999 – 8, 1 Postal, 1 School
2000 – 1
2001 – 2
2002 – 2
2004 – 5
2005 – 5, 1 School
2006 – 14, 2 Postal
2007 – 23, 3 School
2008 – 69, 5 Schools
2009 -88, 2 Schools
2010 – 47, 1 School
2011 – 35
2012 – 35, 5 Schools

Moreover, the numbers reveal something quite different than the ‘increase in random mass shootings’ being reported. Instead what you see are two periods of time where there were two distinct patterns. Before 2006 you see something approximating random distribution in low numbers, almost half of which are Postal, which I maintain are likely almost all programmable person events, the experimentation phase, if you will, where a government institution had tight control of those involved.

Note: 2006 becomes a pivot year, where the last Postal happens, and you start to get an explosion of ‘civilian’ shootings, three times as many that year, and even more in subsequent years after 2006. There we find not a steady increase, but a bell curve. What produces a bell curve? You get bell curves when you apply force to something; it starts moving slowly and gains speed, then once maximum energy has been accomodated, it coasts, and then starts to slow down. That alone implies intelligence behind the sudden spurt, and further implies we are almost at ‘End Game’ point in whatever plot is unfolding; we have precious little time remaining to thwart it.

In total, research thus far reveals more than 450 shootings through 2012, from among which media and gun grabbers can and have obviously cherry picked. There are easily another 100 which could not be plotted in my study because needed accuracy of details were not usefully available, and likely hundreds more that are simply not available through online research due mismatches in keywords; you don’t always know what to search on, and terminology used has evolved over time.

Why would media hide the truth about mass shootings?

Why disparity between media and truth?

How is it, then, that virtually all mainstream or government resources have elected to tell you of only 70(ish), or 200(ish), within select timeline widows useful to them? What are they electing to hide, and why? This is a question you must ask if you value truth and justice.

Every major city’s paper subscribes to every other major paper to keep abreast of what they are reporting. So for a major to under report mass shootings in order to proclaim a trend of increasing violence, is a willful lie. On the other hand, there are reasons for minor variations in what might be included in a given study, in case you are moved to cut some slack. I for one, am less inclined.

There is, however, a bit of a loophole through which concealment might be harder to prove or detect. A mass shooting is defined by FBI as four or more dead or injured in a shooting incident — by gunshot. Interesting then, that Brady elects to include any injury, including minor cuts and abrasions due to falling down or flying glass, etc. More manipulation of data for agenda’s sake, it seems, via hangnails.

However, FBI, despite giving it a category and definition, even breaking it down into sub groups (e.g., gang related, domestic violence, etc.), themselves fail to cite any statistics of their own, as they do in all other categories of crimes they track. To me, this proves that at the very least, government is participatory in perpetuating media myths by cover up through omission, and has a gun grabbing agenda. When a President quotes misinformation, you have even more such proof.

The FBI definition leaves us with this upshot: many drive by shootings qualify, as do tragic familicides, robberies, and so on, all of which tend to make local news. The previous article link offers other complexities which can impact on definition as to what constitutes a mass shooting, but none of these complexities seem to be impacting what media elects to include in their national coverage, and resulting limited counts; they include what suits their whim — those stories most likely to generate outrage or shock.

But, as every major community has its fair share of all defined forms of mass shootings, there is no need to elevate them all to national prominence unless there is some ‘marketing’ usefulness to the anti-gun crowd, such as if at a basketball game in a public park. Locals hear all of their local events, plus national, and the problem therefore seems sufficiently large and pervasive in support of gun control arguments, but insufficient to see any patterns; they do not know the full extent of what is happening in other communities.

This further drives them to think their own community especially dangerous (well, some are), and letters to the Editor and government authorities are dashed off seeking a ‘crackdown.’ But what if they knew the truth and realized their community was closer to normal, or understood that there was intelligent design at play? What would their letters to the Editor look like, then? Would they be calling for gun control, or Congressional Investigation into the intelligence community’s mind control research, or the power elite cultists? Would they be wanting guns to be collected, or would they be buying guns?

I’m not the only one to notice this under reporting. There has recently evolved an anti-gun group made up of loosely aligned members nationally who report ALL local mass shootings directly to their central Web page. They do use the proper definition of mass shooting, and their results underscore the problem for knowing the precise full count. They report 365 documented mass shootings in 2013 ALONE. That gives you an idea of how many shootings in prior years may simply not be on the Web in a form making them sufficiently easy to find. Therefore, even my larger numbers would seem inadequate (but as we will see, they still remain appropriate to the need).

Unfortunately, no one like them has been doing this for prior years, so once more, the ‘increase’ in shootings is seen as dramatic only due their improved full-reporting methods in ‘real time,’ but it can easily be argued as a false indicator. You can’t just go back in time and research, because unless the news source itself without reading every back issue of every daily newspaper in America. It’s damn hard to find those which have been earlier underreported.

Now, for my purposes, I elect to choose all which have available details useful for analytical purposes, which is again more than 450, less a good number of the 365 just mentioned, since that Web site was not discovered in my search until after I had stopped adding to my list. Understand, too, that anyone seeking to employ intelligent design would most likely need limit their own database to these same events, both because their own group of conspirators would face the same difficulties in finding underreported events, and more to the point, because it would be required that they be visible events to others in their NWO cabal — other competing groups.

But it is not these larger numbers which should concern us at the moment.

No. It is instead important to go back to my first attempt at looking for patterns, and much smaller numbers which were in hand. I made the mistake of trusting media and employed that list of 70 plus most cited shootings, only. It is important to note that even with that smaller data set, patterns were revealed, and further important to understand that a control group was also employed which compared favorably in verification of the method and findings as being scientifically sound. More on that, shortly.

The point is, in summary, that the patterns on this smaller group were subtly revealed, and only after exhaustive study. They would have been pointless to casual review, revealing nothing suspicious outwardly. But my unorthodox methods gave me an edge, thankfully. More so, of course, once the database grew to include the hidden shootings.

Once I realized and uncovered the full scale of event histories, the patterns became easier to find, and were quite overwhelming and more revealing of hidden information. Therefore, one very logical reason select gun grabbers with both a dark motive and the means to control media’s reporting have exercised restraint and employed confusion in their selective ‘complaints,’ is that full disclosure would increase the likelihood that someone like myself would come along and find the patterns, and expose them, perhaps even without my methods.

That perfectly defines a cover up. That, in turn, defines a conspiracy’s very existence.

Go back to Introduction

Go to Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters

Crime Series: Ten Unexpected Proofs ‘Random’ Mass Shootings are by Intelligent Design


Ten easy-to-grasp but remarkable proofs, both visible and hidden: Illuminati style mystical symbolism and related ancient magical mysteries, calling cards, bragging rights, and Warlock spells cast against America, and the World. Conventional clues, too.

Are there any patterns in mass shootings? 

by H. Michael Sweeney proparanoid.wordpress.com   proparanoidpress.com   proparanoid.net  

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.

Is there any proof mass shootings are not random?

What you will learn reading this multi-part posting series…

•  there are 10 interlocking proofs that mass shootings are not random;
•  they include various kinds of patterns, visible and unseen, and even coded information;
•  that the pattern predicts itself, and understanding may therefore help stop the murder;
•  that the codes and clues seem to be like signatures identifying the architects.

Are mass shootings by intelligent design?

Introduction: Ten Proofs ‘Random’ Mass Shootings by Intelligent Design

Is there a mass shooting conspiracy?

Note: This series is not yet ready for full presentation, but the most recent Fort Hood forces me to start releasing the material without delay. The reason for delay has had to do with an inability to provide high quality graphics suitable for proofs. This will be overcome, shortly, I hope.

One thing you need to know about me as an investigative writer or, as media and government would prefer you to think of me, a ‘conspiracy theorist,’ is this: whenever I decide to take a close look at a potential conspiracy or lesser matter, I do it right. If I cannot uncover something no one else has brought to light, I’m either not finished, or I’ve backed out concluding it beyond reach, or a dud. If you read my findings on a given research, you will undoubtedly learn something FACTUAL no one else had previously discovered or brought to light. And so…

In this matter, we find the shear volume of startling new information overshadows and renders original headlines and competing theories essentially meaningless — especially media’s version. It will make you angry. It will scare you. The question is, will it motivate you to do something about it? YOU are what you are waiting for, you know.

But in introduction, there is still one other point which must be made; it is in form of a problematic question. Can I get you, the reader, to override your current belief structures long enough to  consider the unusual nature of the findings? This presentation will most assuredly fly in the face of what most people consider ‘traditional wisdom,’ but it also will explain why it is non-the-less valid. Can you handle the Truth, or will you wimp out to the comfort zone of current beliefs?

Area all mass shooters psycho?

On suspending belief structures

mythbust

Dormer was not quite a ‘Mass Shooter’ incident, at least not at a single location/time. But the affair highlights the problem of accepting ‘random’ as the right word to apply to shootings when there are so many problems with the official story. CLICK to learn about why many people think him just another shooting patsy.

I began a ten-year research project for a book, Fatal Rebirth, in late 1989, which also begat a screenplay published on line in 1999 (The Electronic Apocalypse). In the book’s Introduction I urged the reader to suspend their belief structures briefly and read the material as if merely fiction for entertainment’s sake, because many of the concepts within were so new and unusual as to defy belief — likely seen as ‘far-fetched’ by most uninformed readers. I offered over 1,500 footnotes and a huge Appendix section to help them consider why I deemed them factual.

This blog post should be read in like manner, especially if you are content with government’s actions, are a politician, member of a government agency, military, or any part of the justice system, or Media. Especially if you are involved in a mass shooting incident as a professional or a victim seeking to know the truth. And even more so if you are gun owner, or even among what 2nd Amendment supporters refer to as a ‘gun grabber.’ I plead, therefore, that you suspend your belief structures briefly as if reading a political/horror-science fiction piece.  That’s what it is, actually, minus the fiction component.

You will, like readers of Fatal Rebirth, I would hope, realize the truth by the time you reach the end. Or, at the very least, you will be entertained for all your reluctance to let the message sink in and take root.

If nothing else, even if you choose to doubt some of the more obscure subtopics (i.e., relating to mysticism) have any factual basis in REALITY, consider this: it matters NOT what YOU think, given they ARE taken as real by persons likely to be behind any such conspiracy (i.e., ‘Illuminati’ Satanists). You MUST also ask yourself, “Can the sheer magnitude of interlocking clues be ignored?” Because at every turn they defy the odds of coincidental probability, as illustrated by carefully crafted control study groups. If thinking logically, you MUST concur that intelligent design is revealed despite what you may think about the logic of the beliefs which lay behind it, or the unusual way in which the evidence was revealed.

Pending you conclusion, by all means feel free to think me mad if you must. Read just for fun, but please read it through to end before you render final judgment as to if madness or truth be present. A logical reader will be converted unless their mind is already so firmly made up that they do not wish to be confused by facts which destroy their belief structures. Judge not what ye know not, but that upon which ye are well informed and have considered fully, judge freely.

Your future and the future of your children could well be at stake, a statement applying to all mankind. Why do I say this? The book mentioned above, Fatal Rebirth, was based on trying to illustrate what I call the Unified Conspiracy Theory; the notion that all of America’s darkest bumps in the night for the last half of the prior Century, forward, were not random oddities by random people for random agenda, but carefully orchestrated by the same core group of people with but one goal for the World in mind.

I termed them Shadow, but they are also known by other names; the New World Order, the Illuminati, the Power Elite, Globalists, and among them, member names like CIA, Skull and Bones, Bilderbergers, Council on Foreign Relations, and many more of like nature. Their goal I termed End Game; the establishment of a One World government, a single seat of power in order to seat the Antichrist upon his throne and bring us to Armageddon.

The Unified Conspiracy Theory, once justified in research and taking shape in book form, led me to realize that their stepwise actions over fifty years of mysteries were indeed leading to one goal. Knowing the goal, I reasoned, it should be possible to forecast the next logical steps. So the book also included within its presentation several terrible event predictions expected to take place in our near future. Thus far, though I do not claim to have gotten all event details precisely correct, many terrible forecasts have already come to pass. Among these were:

a) an assassination attempt on Ross Perot or his family to cause him to drop out of the Presidential Race, a matter which indeed transpired using mailed Anthrax according to a Secret Service back channel contact;

b) the false flag downing of the World Trade Center by civilian passenger jets which;

c) resulted in a series of Middle East Oil Wars. Other predictions include two more terror plots which are part and parcel of this blog post. Those are…

d) a false flag nuclear attack on Charleston, S.C. and Portland Oregon (the later of which I have already thwarted, it seems – see middle of my home page), and more to the point…

e) MASS SHOOTINGS.

Note: you can get a free copy of Vol I of Fatal Rebirth (ebook) by email request to pppbooks at Comcast (net). You will be glad you did, as it will take you far deeper into the Rabbit Hole than Alice or Neo had ever gone. This pill is black, though trimmed in red, white, and blue.

So, if ready to suspend your belief structure, let us begin. Pretend there is, despite media’s recent attempt in the Cincia shooting to portray anyone who believes in the New World Order as mentally ill and anti-patriotic, that such a conspiracy is actually afoot. Also pretend, if you must, that Political Control Technology in the form of the Manchurian Candidate is real. There are real-life Jason Bournes out there, as my book, MC Realities, and other books on Political Control Technology illustrate more than adequately. Even the Smithsonian channel knows.

This will make the key postulations, testing methods, conclusions, and proofs of the core material easier to accept, especially as they will be offered in the manner of scientific discovery — exactly as I undertook them as investigative writer. You will, in fact, be able to retrace my work to double check it, if you wish — as long as you review the full series of posts and sidebars before you attempt it, lest you make a critical error.  Please subscribe to my blog pages to insure you are notified as the remaining posts in the series are added.

Are mass shootings are by intelligent design?

The Investigation

Jason Bourne… though fictional, is based on real-World programmable assassins. Do you suppose CIA or anyone else would not find something useful to do with failures in such programs? Might they not make excellent disposable patsies? Image/film: http://www.imdb.com/title/tt0372183/

Some several months ago, insulted by media’s misreporting of Aurora and Sandy Hook and outright clues that a disinformation campaign was afoot, I began finding ample cause for concern.  But how might one determine if other mass shootings were arranged as part of some kind of sick criminal conspiracy, one which might involve both real and faked shootings?

I started with several basic presumptions of truth, and then set about to see if the logical evidence such presumptions would require were indeed in place.  The ‘illogical’ presumptions fostered by the Unified Conspiracy Theory requiring suspension of belief are as follows:

1)    That Shadow and their Globalism requires destruction of America, and its Constitution in order to enable forming the North American Union, a matter which in turn requires that the Right to Bear Arms is first invalidated, and arms confiscated or gun owners otherwise neutralized in a manner similar to that of the Australia;

2)    That the New World Order, the modern day Illuminati, if you will, would be well capable of undertaking a campaign of gun violence for such cause, but being an Illumined Power Elite lost to Satanic and Masonic mysticism, they would employ mystical constructs which would leave detectible footprints if knowing what to look for;

3)    That the principle tool of such a plot would involve a small army of patsies, cut outs, and fall guys, principally from a category best known to the public as Manchurian Candidates. It may additionally involve a small army of blindly obedient members placed within our armed forces, the intelligence community, and law enforcement to aid more indirectly in supporting roles. This would include logistics, psyops, and cover up, or even command and control, generally unaware as to the truth or reason behind their orders. These are the same players frequently found playing key roles in the lives of mind control victims at large.

All three presumptions must be true to make a proper accusation, for they comprise the basic proofs of any crime: Motive, Opportunity, and Means. Normally, we think of opportunity as meaning access to the scene of the crime, typically proven by forensics such as fingerprints, or better yet, actual eye witnesses. In this case, they deliberately left their fingerprints, in a manner of speaking. In fact, the bulk of the proofs fall into this category, perhaps even naming individuals behind the plot. At the very least, we are indeed dealing with the Elite, those involved in principalities and powers.

Indeed: Two names have already surfaced by such clues, and both are billionaires. I also have a dozen other names of likely conspirators, but no names are released; these things are my Life Insurance Policy.

Sidebar PostOn Programmable People. This sidebar post addresses the notion of the possibility that at least some mass shooters are mind controlled patsies, and reconciles their coexistence with truly random shootings ­­— those which are more naturally spontaneous crimes — which can collectively still both be component parts of the same intelligent design.  This leads us to the finer details of how shooting event locations and dates lend importance to our consideration, and just how these things can additionally reveal intentional, yet concealed clues.

Here it should be mentioned, that many observers of the New World Order crowd favor the supposition that among their leadership we might find the modern-day Illuminati in spirit, if not in actual blood lineage, even though they may have since assumed a different family name. By way of example, in my research, I have had reason to conclude that the Rotheschild name was assumed; those assuming it being Knights Templar in hidding, their wealth derived from Templar treasure, and not truly Jewish by ancestry or faith, at all.

Many who favor the notion of a Modern-day Illuminati additionally believe, as do I, that there are at least two, and as many as four groups competing with each other within the movement to be the ones ‘honored’ to have one of their own selected to become the Antichrist. Much of what is discovered in this investigative series will point to this being true in one way, or inherently implied in another. It is, in fact, one very good reason to employ symbolisms and other clues which act as signatures of those so bidding for selection.

Such evidence was abundant, even easy to find, and I remain convinced that the trio of presumptions are sound enough to warrant seeking incontrovertible proofs. I sought such proofs both in quality and quantity sufficient to illustrate that ‘random’ was not the right word to describe mass shootings, but rather, ‘intelligent design,’ is.

The path of my continued investigation led to endless shocking discoveries, but there was a problem: to describe the methods and explain findings to the casual reader would, it seemed, require a tedious educational process and boring, repetitious citation of facts. It would be about as fun to read as a spreadsheet or database. Not good.

People want visual sound bites easily grasped. More so if Sheeple content with their Evening News and easily frightened off by words like ‘conspiracy theorist,’ and ‘New World Order,’ or similar. Worse, the investigation bogged because of the real life tragedies each shooting represented. Proper investigation meant exhaustive study of individual events, reviewing endless horrific detailed accounts and sad, brutal media imagery. It was taking an emotional and even physical toll upon my body and mind, and my spirit. Eventually, instead of plodding along 10-14 hours a day as at the start, I found myself barely able to work on it a few hours a week.

I played with several ideas on how to present the story NOW, without completion of the full study, for there is indeed already a mountain of proofs uncovered. But again, the complexities in presentation left me feeling it a hopeless task. Finally, I decided to break it down into about a dozen short compartmentalized components suitable for a series of blog posts. Frankly, I’m hoping it will spur someone to offer useful help; it will take funding and staffing to properly complete the study. Or better still, perhaps some Sheriff or other authority will assume the duty as result of shootings in their jurisdiction.

Follows is a synopsis of the Ten Proofs to be presented. There will additionally be, at appropriate points, companion posts detailing the scientific methods or other analytical procedures involved in select proofs where a doubting Thomas type may wish to challenge the validity of claims. I firmly believe that for my proofs to be accepted, they should be presented in a way such that ANYONE can duplicate my work and verify accuracy and conclusions.

This is a legitimate investigation despite its atypical and unorthodox methods and odd topics involved. NOTE: links will NOT WORK until the various posts involved have been posted. You may click on them to discover their current state. Again, subscription to this blog will notify you when new posts are added.

What are the ten proofs of a mass shooter conspiracy?

The Ten Proofs in review…

Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns;

Any time you find a cover up, you necessarily have a conspiracy to contend with. Gun grabbing groups, including government and biased or puppet media forces, should be using every opportunity to make their case for gun control, but act as if the bulk of gun violence never took place. Why do they employ selective blinders? There is a reason.

Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters;

The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.

Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines;

The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.

Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes;

When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or its own hidden or obvious meaning. 

Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters;

It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.
 

Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols;

Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.

Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart;

Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.

Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View;

The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.

Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages;

Shooting line sets share three or more identical magical numbers within their data points. These decode to tell us when and where the next shooting will be, name a shooter, or perfectly prophesy some specific outcome.

Proof Ten: Individual Shootings Examined in Micro Duplicate the National Study Proofs

Two examples are offered; Aurora and Sandy Hook. They not only duplicate the ten proofs, but they mirror each other and one points to the other.
Why are mass shootings on the rise?

Are you ready of this? Buckle up!

So let us begin. I propose your best bet will be to SUBSCRIBE to my blog pages so that you are automatically notified as new posts are made to complete the series. Please link, share, tweet, etc., and by all mean vote your ranking at page top of each one, and comment with your questions, criticisms, or thoughts. How else will other know this is important?

Do bear in mind as you read, each offered proof individually seems to defy the odds or logic path required for truly random shooting events. Collectively, it is monumentally clear. Also bear in mind that I am human, and I, like any other, am prone to making mistakes. A ton of information had to be entered and copied from one location to another multiple times (multiple database and software applications). Therefore, either because of a mistake on my part, or perhaps because of a mistake in media or other accounts/records, any given individual data point in any given set of proofs may be found invalid.

By all means let me know if you find such a discrepancy, but please remember this: a single error in a single data point does not invalidate all other data points, and therefore, does not invalidate the conclusions or the suppositions, themselves. In order to dispute my findings, you will need to offer proofs that the method is flawed, the entire data set was in error, or analytical logic was faulty. More: such dispute must address and ultimately invalidate all ten proofs, or short of that, offer equally viable alternative explanations which fit the findings and afford a more innocent explanation.

Since each proof tends to defy all possible odds of random coincidence, and does so consistently, again and again, naysayers will have their work cut out for them. More so, because in many cases, control groups have been established to show truly random data points enjoy no such pattern. I have done my homework, and carefully so.

I will demand the same of naysayers.

Go to Proof OneGun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns

Go to Side Bar: On on Programmable People

 

How Social Network Trolls Target, Track, and Psychologically Profile You


How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.

What is a Web Troll?

by H. Michael Sweeney

copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How does being a web troll work?

UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively  while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.

Are you being targeted by online government trolls

How Social Network Trolls Target, Track, and Psychologically Profile You

Reading this post you will learn…

•  That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU;
•  That there are troll profiling and tracking tools or methods which can be recognized;
•  That there are ways to protect yourself without drawing more unwanted attention; 
•  That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting.
Is social media infiltrated by government trolls?

Government and Commercial Trolls

Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.

These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.

The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.

Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.

And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.

How can you spot a social media troll?

Differentiating an innocent graphic from a potential spy tool…

There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.

So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.

Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic.  YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:

1146548_664505843574765_1740298350_n

This is an example of a Troll-generated chain letter designed to find out your religious views, and who among your friends is of like mind. Note the guilt factor in the last sentence, and no true traditional Christian message. Note also the dark aberration, a visual flaw above the numeral 9 of 97%.

1005209_10201199164735487_1499677395_n

This is an example of a Troll-generated chain letter designed to find out more about your true close friends, as opposed to casual Network contacts you don’t personally know. Again, note the visual flaws in the slightly darker ‘blur’ areas about the letters… you may need to zoom in. This phenomenon is common in such messages, creating a pool of pixels useful in manipulations.

So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?

When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.

Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”

Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.

Are social media trolls sociopaths or psychopaths?

More Direct Trolls; Psyops and Sociopaths

The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.

Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.

Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.

But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?

Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.

Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).

It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.

Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.

This is also true of the sociopathic/psychopathic ‘cause’ trolls.

Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.

Can trolls lead to real-world targeting?

Dangerous escalations; why we dare not ignore trolls

The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.

And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.

But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’

What should I do if I encounter a social media troll?

What to do with a Troll

I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.

But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.

My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.

Are social media trolls dangerous?

Conclusion

Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it.  The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.

And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.

It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.

Gun Shops, Grocers, Other Retailers Key to Disaster Survival


When the stinkiest FEMA kind of stuff hits the fan, anyone who has a business dealing in key resources will find their valuable inventories and property at risk of sack and pillage by looters, or outright theft by government. There is a way to protect such assets while at the same time insuring better chances of survival of families.

How do I protect my business in a disaster?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can gun shop owners do to protect against gun consfication?

The Threat to Business Property is significant in a disaster…

Korean shop owners (rooftop) defend shops during LA Riots to augment or supplant Law Enforcement (click for riot details)

In the prior part of this series we reviewed a wide variety of disaster situations that make emergency preparedness an ultra-important concern for families, reasons far more serious and far reaching than mere quakes, floods, or tornadoes. In the second part, we proposed a disaster preparedness plan much more comprehensive and truly useful than that advised by FEMA/DHS, albeit one government will never approve. Why? Because it’s closer to their own preparations and mimics their own capabilities, and removes you from dependence upon them. That means they cannot control you by being your only source for key survival items.

But the previous material addressed family needs from their perspective. And, there were certain aspects of such a plan which would prove difficult for many families without the help of an outside party. Then we have businesses to consider, who have their own unique concerns as to what happens in dire emergencies. Business owners or responsible managers of many kinds of retail and other business with select kinds of inventories or resources, should be every bit as concerned as a family, and looking for a disaster preparedness plan which specifically protects their valuable business assets, both real property and inventories.

There are several key reasons to consider this a critical concern: One, many disasters are deemed Acts of God and are therefore not included under insurance provisions unless, perhaps, paying extra premiums for specific policy riders such as a flood or tornado insurance. No insurance policy provides protection against acts of war, which includes revolution, military coups and similar political unrest, often even excluding protection against riot losses — regardless of the cause of the riot.

And beyond the worry of insurance protection, FEMA’s plan for your assets in an emergency will very likely include confiscation and take over of your property ‘for the good of the community.’ Similar concerns exist in any Martial Law situation. So if you have such a business, you should worry and wonder if there is not some way you can protect your assets from such total or near-total loss or take over. Never fear, the Professional Paranoid is here to help…

What will happen to gun shops in a FEMA declared emergency?

Partnering with Family Collectives

The prior posts in this series dealt with idea of forming multi-family unit collectives for improved emergency preparedness at the family level, as well as why such preparedness plans and kits should go well beyond minimal FEMA advice and prepare for long-term disasters, not just three day fire/quake/flood protection. This involved numerous considerations and plans in terms of organization and supplies, individual responsibilities and more. But for many such collectives as might be established, some items become difficult to come by or store due to cost or special attributes.

The bottom line is, in a serious emergency situation, looting and general criminal activity become a serious threat to any owner of a business handling inventories of critical resources which are also valuable to long-term disaster kits. Often just as important, many such inventories represent a storage problem for long-term home survival kits. Gun shops especially, and even food or fuel can be difficult to store in quantity suitable for a long-lived disaster. Many more items could be added to such a list, as a given collective of families will have their own unique set of limitations and issues to resolve. As result, even a motorcycle shop or car dealership, auto parts store, tire shop, or tool shop, may find themselves in the same position as a gun shop. In some communities, for example, boats will be a key product in need of protection and in demand as an emergency item. So there are many kinds of businesses who can take advantage of the ideas offered here.

My goal in this series of posts was to attempt to find a solution addressing both these concerns by partnering family collectives with such owners. And, the word owners could in some cases mean ‘managers,’ where owners are corporations or persons who do not themselves manage and/or live near enough to ‘take charge’ for the purpose. Such partnerships are simple: the owner joins or heads a family collective, either one they formed on their own (perhaps made up of employee families), or by joining with someone who approaches them with an acceptable offer.

In some cases, such as gun shop owners or owners of vey large facilities (e.g., super market,), they may wish to partner with multiple collectives. This is because in the event of worst-case long-term disaster scenarios, there may be a need for significant armed resistance against third parties, even to include unconstitutional seizure by Federal forces. By unconstitutional, I mean in the event of an attempt to overthrow the government by the military, or armed insurrection to restore the Republic against some other form of tyranny.  We will know that horse when it rides into town; mass arrests or attempts to seize weapons door-to-door will be its hallmarks.

We all remember the LA Riots? Even though the National Guard was deployed, it was up to citizens to protect their own property. Neither soldier nor Police and Fire were of much help. Korean family-owned businesses gave us the model we need to consider following; they armed themselves to the teeth and took to the roofs of their stores and residences and fended off looters. Family units can band together in like fashion, and better yet if also joining with a one or more business owners in some mutually beneficial arrangement.

Gun shop owners, in particular, have a serious need. They become the highest-value target in town, and therefore, need many able-bodied people to bear arms — in sufficient number to become a significant deterrent to assault. This works well for the families involved, as well, providing them with low or no-cost access to weapons needed to protect their families and homes. The trick is to find ways to do it which do not amount to simply giving away inventory. Not a problem, given that provisional contractual agreements can be drawn up in advance.

How can we prevent government confiscation of our business assets in a declared emergency?

Making it work for all concerned

I propose that such partnerships might be best approached with a contractual agreement for mutual protection. The agreement should provision for both the possibility of taking possession of weapons and munitions immediately and only after a serious event transpires. It might provide for trade of ownership of weapons deployed once the crises is over for a minimum guarantee of service to the shop owner providing protection of the business property.  Weapons can be deemed as ‘rented’ during the disaster with options to purchase afterwards, perhaps with rental applying to the price, or may be considered as ‘payment’ for protection helps rendered, or some mix, thereof. Such items, pre any event, need not be fully deployed to family possession, allowing for normal inventory turnover so that older inventory is sold off and replaced with new, and families don’t need to worry about storage.

Take a gun shop: Only if the family collective partner wishes to take possession (ownership) of weapons for storage at home up front (the suggested kit calls for one pistol minimum), need any money change hands. Once a serious emergency transpires, the families can be issued the additional firearms from shop inventory, and sign for them. They must keep them safe, and must use them on call or by schedule in protection of the store property. It would only take one person from each family unit at a time, given the quantity of family partnerships participating — to adequately defend the store. They ‘pay for what they use’ in the form of a rental/purchase option to be addressed after the emergency ends, perhaps involving payment terms (perhaps involving very small payments pre disaster). There are any number of creative solutions to make it mutually viable.

I am no lawyer, but in a civil emergency, many laws fall by the wayside as a matter of practicality. A gun permit process is not something you worry about when the government is shut down and lives are at stake. However, a wise shop owner might want to check with a lawyer and get some advice and deal with such concerns up front. There is no reason a single individual from each family collective could not undergo a permit process as part of the contingency preparation. What they do with the weapons in an emergency should at that point no longer matter to the shop owner, with reasonable agreements to avoid illegal uses in place. One might also want to address how to safely store key records in order to insure lists of gun holders are not compromised and lead to confiscations, anyway.

Other kinds of businesses? Consumables such as food from a grocery store which have dates of expiration would be lost, anyway, so any financial arrangement to distribute storables in an emergency with any level of appropriate financial reimbursement or property protection services of participants should, IMO, be eagerly embraced. For most shop owners, it converts a disaster where they face the potential loss of all inventory and significant property damage into a situation that more closely approximates the ultimate ‘sale’ where all inventory goes out the door to happy customers, AND the property is protected.

From the family side, a collective should easily be able to field 6-10 adults to defend as many different business sites simultaneously, while still retaining sufficient adults to protect the home base camp. Therefore, they have access to 6-10 different key survival items they might not otherwise be able to afford or store long term. It is a win-win situation for everyone but looters and would-be confiscators.

Upon event occurrence, family members ‘report for duty’ and are issued weapons, sending the appropriate portion back to the family for home defense and protection from confiscation by FEMA/Military.  I propose an organized convoy is the only safe way, as otherwise, armed interlopers might dare to ambush a lone person or single vehicle. I further suggest that, if not already the case by natural instinct, a strict military-like organization and rules for command and engagement be established. Such a model should ideally trickle down to the family units as well, if a long-term event is involved.

Therefore, prior military service, especially in combat or involving combat training, is to be highly prized in any collective or partnership. Where such experience is found in a retired Officer (as opposed to an enlisted rank), so much the better. If there is additionally someone with prior intelligence or forward observer experience, or demolitions or military engineering background, better still. Likewise for any medical corps. or other medical background.

In closing, the business itself should have on hand sufficient stores of foods and other resources (as opined in the prior post) to sustain several months of a ‘stand off’ in defensive posture. A key factor will be the ability to communicate with partnering family units that they may be called in to provide force rotation, deliver emergency supplies, or outright tactical relief against assaulting forces. The prior posts cover communications alternatives in a total outage of all utilities.

How can I protect my business as well as my family in a disaster?

Logical Emergency Response Plan Government Won’t Approve


The government has for some time now been turning up our ‘threat perceptions’ regarding emergency preparedness… taking us to levels of ‘concern’ not seen since the height of the Cold War and the Cuban Missile Crises. As discussed in the prior post of this series, we need to figure out what they are NOT telling us, and prepare for THAT, too.

Why should I have an emergency plan?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can I do to prepare for any emergency?

What you will learn reading this post:

  • That there are kinds of disasters government is not talking about which you should also prepare for;
  • That some disasters are best addressed by preparations based on collectives of households instead of reliance only upon one’s own household;
  • That the nature of the emergency dictates how long the period of time of distress, which dictates what the emergency preparedness plan should look like;
  • That some considerations go well beyond government’s advice, and in fact would not likely be approved by FEMA, DHS, or the Miltary… because they want you dependent upon their help and mercy as a means of political control.

What should my emergency preparedness plan look like?

Government is EMPHATICALLY urging us to prepare

In the first part of this series, we talked about WHY you need an emergency preparedness plan and kit which goes beyond FEMA/DHS recommendations. Regardless of their true reasons for such urgent and dramatic advice — by all means, do what they tell you: establish an emergency plan centered upon a home emergency supplies kit adequate for the kinds of emergencies they imply are of most concern (fire, quake, flood). But do it smarter than that, and cover all the bases, including the far more serious and dangerous possibilities reviewed in the prior post. Here is how best to do that without taking on the whole burden of cost and logistical overhead, yourself. But I warn you, the government will not approve, so part of your plan should include an attempt at quiet preparation and concealment.

What should my family do in a disaster? 

Multi-layered Partnerships

Don’t rely on just my advice, see what officials  have to say say (click for Morrow County Health)

A single family household, no matter how well prepared, cannot fare as well as several family units banded together. So much the better when those units are either actual neighbors, or relatives who live not too far away (say, an hour’s walk or less). So if you do not have relatives close enough to meet the need, you should immediately be sounding out the viewpoints of neighbors on this topic (a simple way is to suggest they read this post series, and ask what they think) and cultivating relationships with those of like thinking.

Herein, a ‘family unit’ may therefore consist of any combination of actual blood-related families joining with single neighbors or childless couples who are not related, or may be made up entirely of unrelated persons with no core family, as such. A unit should ideally be in the range of three-five adults, but in an emergency, teens are considered adults. So where most units are single persons or couples, you may want more participating units.

Such a collective of family units, no matter how well each unit is prepared individually, can indeed far better survive a serious matter by their alliance. It makes it possible to spread the need for more costly specialized emergency resources over a broader group; some family units can be designated as special resource parties with everyone sharing the financial burdon.  This makes a superior readiness more affordable as well as eliminating storage restrictions which might exist, such as faced by a given family unit in the group living in an apartment.

In the next Part of this series, we will also see that an ideal partner might be deemed a special resource party because they own a gas station, grocery store, gun shop, etc.  Many such businesses, in fact, have some special strategic opportunities to consider, which will be the focus of Part III — but you get what I’m hinting at.

How do I prepare an emergency survival kit?

Key Decision Point Factors

Some circumstances alter both individual and collective needs dramatically and will need to be accommodated with detailed planning. The following topics should be fully explored early in organizing the collective, because they may dictate a need to add yet another family unit into the mix, or help define who is a special resource party and what that will mean for all concerned in a disaster event:

Talk about disaster considerations in terms of resource needs and response plans…

a)    Categories of disaster events to be considered (i.e., individual events such as fire, plane crash, etc., area-wide events such as flood or terrorism, regional or national events such as Martial Law or pandemic event);

b)   Level of availability of, or threats posed by damage to critical services supply lines; water, power, gas, telecommunications;

c)    Types of destruction of home and property (i.e., fire, earthquake, flood, assault);

d)   Levels of community-wide destruction and resulting third-party threats to home/property/resources;

e)    Transportation shut down or impedance to access to home/property/resources, or each other by third-parties;

f)     Impact of communications shut down vs. alternative solutions for the collective;

g)    Disparate location of individuals (i.e., at work, home, in transit, shopping, etc.) as might impact on reaction and hooking up post event;

h)   Estimation of self sufficiency of a given family unit before connecting with the collective;

i)     Estimation of time before outside helps become available, as will vary according to the above considerations.

j)     Fully review FEMA emergency guidelines and their pitiful performance in actual disasters such as Katrina, as well as the shameful role of military and police. In Katrina, they came for the guns and gunned down blacks to keep them in their own area. In Hurricane Andrew, the National Guard deployed a psychological warfare unit who set up detention camp-like relief centers and set up telephones which were 100% monitored by the Defense Department, and CIA, etc. You need to know what frightening provisions the government has made in preparation for total control of your lives ‘in an emergency.’

Such factors are most simply addressed by establishing multi-level options for individual family unit’s responsibilities to the collective, as well as event response. Each individual’s plan/options should deal with each such contingency, and consider where the individual might be at any given time (i.e., at work). Resources should be redundantly distributed over as broad a range of storage points as may be practical — a key reason for multiple family units. Examples of determinations:

a)    A family without good storage capabilities may need to focus on an ability to relocate or hookup with one who does;

b)   A family without good financial clout may need to focus on an ability to provide special skills or manpower, or deal with relatively low cost special resources such as communications or transportation;

c)    A family with inherent special resources already in place (e.g., owns a gun shop) will likely get a free ride, financially speaking;

d)   A family with many adult males will likely be the best collective leader, though clearly, other factors also come into play. Such determinations may vary according to event type being addressed, so a different family unit might be deemed a better leader or resource for one type of event than determined for another event. Military experience, for example, would be of great value for long-term, regional, or political upheaval events, but less important in a short or localized events.

Where can I get advice on emergency preparedness?

Term of Survival without helps dictates needs…

A key factor in planning is knowing what constitutes a minimum level of stored resources (emergency preparedness kit) per household for each event type, as well as kit content details. Again, distribution of resources will likely be required, and there should be some level of redundancy to accommodate the total loss of a given family unit’s houshold kit. More: because FEMA’s draconian powers extend to cover broad powers of confiscation, and by their wish is to control ALL MANNER resources, they deem HOARDING to be a punishable crime with significant penalties to include arrest.

Hoarding generally appears to be defined as no more than a week’s supply, but some things are even more tightly controlled, such as gasoline storage. So plan on hiding long-term reserves, and likely, on protecting your weapon’s and munitions in similar manner as well; gun confiscation by military is highly likely in a long-term event.Below find a minimum suggest level of supplies and their dispersal. Naturally, your own thoughts may yield improvements based on your own skills, location or environment (e.g., lakeside = boat), and availability of special items (e.g., scuba gear):

A)   Localized and single unit events will likely require no more than 1-3 Days of self sufficiency: Food, water (1 Gallon per day per person*), blankets, three changes of clothes each for normal and extreme weather conditions, three sets of rechargeable batteries for all devices, portable lighting, one flashlight per person, multiband radio, propane stove and 3 propane refills, sleeping bags, rainslicks, first aid kit, bagged clothing, and about $250 cash. Matches, newspaper bundles for kindling or insulation.  Local storage should be sufficient even in an apartment situation. Each person can keep a ‘go bag’ in their room, or at least a flashlight, if using centralized bag location, only. Regardless, the bathroom or other storage point for prescriptions must be raided along the way*.

* Each of the levels below can impact prescription and water issues negatively. It becomes increasingly difficult to store large quantities of water, and thus some form of water reclamation or source should be considered, as indicated. Prescriptions can run out in mid event and would be near impossible to refill, and it is difficult to obtain a long term supply, and even if possible, long term storage of many prescriptions may be a bad idea as drugs degrade with time and sometimes even become dangerous through chemical changes wrought by oxidation. Since some prescriptions can be dangerous if forced to stop cold-turkey, you should consider the side effects and warnings on each prescription to see if weaning off gradually might be wiser. Fortunately, Diabetic and other select medical problems rely upon supplies and treatments which can be acquired and stored for long term needs. A final comment: each person with a significant medical need should keep on their person a card citing such concerns, medications, etc., in case they become incapacitated and found by third parties. The card should include information on any alternate location the collective is using as the emergency ‘address’ if different than that on identification, as well as names of key persons to be sought out, which should likely include more than direct family.

B)    Wide area events may require 4-14 Days self sufficiency: Add one pistol per household and box ammo, and walkie talkies locally retained by each household. Globally augment food and water appropriately, and add a store of gasoline, axe or chainsaw, shovel, generator, rope, tent(s), hammer, propane torch, handsaw, nails, screws/eyehooks, canvas. Sewing kit, 1 or two GPS devices, hand-held multi-band radio scanner, water reclamation kit (and supply of filters), road flares, pepper spray, motion alarms, binoculars, $1,500 cash.  2 additional boxes ammo per household. Secure storage facilities are a must, especially for weapons and fuels, with no exterior access to unauthorized parties. One person must jump through gun registration hoops to acquire the gun, unless given them as a gift.

C)   Regional or national events could easily require 3-12 Weeks sufficiency: Globally augment Food, water, consider augmenting a base station home with defensive modifications*. Note that GPS accuracy may be downgraded by government action from 50’ to several thousand feet. Add 1 rifle w scope per family unit, 1 pistol per adult globally, 1 or more night vision device for guard duty/firefights, short wave two-way radio, surgical kit, hiking/fishing/camping gear, flare gun, wheelbarrow or cart, 1-3 pairs binoculars, $5,000 cash. 3-5 boxes ammo per weapon. It may be advisable to bury some items or provide external hard and secure storage site(s)*. No additional gun registration applications by secondary parties should normally be needed, especially if the primary purchaser applys for a Dealer’s permit, which can additionally allow purchase of fully automatic weapons.

D)    Longer Term events such as revolution or Martial Law, invasion – Base Station only: 1-2 Shotguns, 1 or 2 targeting lasers for tactical pistol use, 1rifle per adult w or w/o scope, 1 crossbow and sword per household, Seed bank, military survival/combat protective gear, welder, expanded took kit, block/tackle, smoke grenades, flash bangs, salination system if near seawater, still, bear traps (for perimeter defense).  25 boxes ammo per weapon. 3 dozen bolts. Hardware nuts/bolts kit.  Bolts can also be used to make spears. Burried and external storage sites much more important, to include off site and well hidden locations. Here is where you want to have dosimeters, Geiger Counter, and Potassium Iodide tablets in case of radiation concerns.

E)    Regarding Vehicle kits, all levels: spare ignition cables and parts, full set of spare fuses, serviceable spare and jack, snow chains, tools, 6 flares, 1 gallon water, blankets, first aid, 1 days food per person in family unit, 1 box ammo per type of weapon (pistol, rifle, shotgun), 6 bolts. Pepper spray, sand bag, matches, newspaper. First aid kit. External of vehicle, spare set of tires, anti-freeze, case of oil, two cans each of brake, power steering, transmission fluid, service manual for vehicle. Car alarm advised.

*In my book set, Fatal Rebirth, specific advice given on how to reinforce a home or other structure, conceal critical items, and other tactical considerations, including home-made weapons. You might want to read some books which specialize in such topics for an even better insight. Also included is tactical advice for possible conflict scenarios useful to militia or other armed defenders of the Constitution. A free ebook copy of Volume I is available by request to pppbooks at Comcast dot net. Learn more at proparanoidpress.com.

What happens if government does not respond quickly enough in a disaster?

Summary

Some people are better prepared than others…

These considerations, with a properly organized dispersal of resources among cooperative family units, along with a good understanding of responsibilities and event responses according to event type… assure a far better defense posture against the unknown than FEMA or anyone else in government would seem to wish, even to the point of their being the actual problem against which you must defend.

If guns are to be acquired in quantity, it is imperative that all adults (including teens) take firearms safety/operation and care classes for the specific weapons. Target practice and practice breaking down and cleaning, reloading, and dealing with jams are just as important. Self defense courses in martial arts are also advised: if a long-term event comes along, all manner of problems will originate from third parties seeking to take valuable resources from you by force. Be prepared to fight with skill, and thereby hopefully deter violence, or be prepared to die.

In Part III, we look at how owners of gun shops, grocery stores, gas stations, and other key resource businesses can be incorporated to both the benefit of the collective, and to assure the owner that their resources will have the best possible chance of survival without sack and pillage by looters, and possibly even withstand government seizure. It also better explains what is meant by the last point about who the enemy might actually end up being:  Gun Shops, Grocers, and Other Retailers Key to Survival in Major Disaster

What can I expect when a disaster happens?

The REAL Reason FEMA Promotes Emergency Preparedness?


FEMA and the rest of government seems quite paranoid about disasters of late, but clues suggest there are hidden reasons behind urging preparations — not the earthquakes, floods, nor fires they talk about. Conspiracy theories based upon dialogs by geophysicists, astrophysicists, and politicos seem far more likely the cause, and that puts a whole different face on what ‘preparation’ should involve and mean for you.

Why is government pushing emergency preparedness?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Can we really trust FEMA?

Reading this post series in three parts you will learn…

  • That there are significant reasons you absolutely should have an emergency preparedness program in place;
  • These reasons go well beyond natural disasters FEMA implies of concern;
  • There is a logical preparedness program that accommodates all concerns…
  • A program which should be considered by privately-held businesses as well as families:
  • It is NOT approved by FEMA, DHS, the Military, or other elements of the New World Order

What is the history of the emergency broadcast system?

Time was…

I very clearly remember the ‘Red Scare’ spillover from McCarthyism which translated to ‘fear the bomb’ in the 1950’s and 60’s… starting with the Eisenhower White House: Air Raid sirens were tested weekly or daily, typically at a fixed time of day as if a Church Bell announcing Noon. I was a teen during the Cuban Missile Crises under Kennedy, when talk of the day was the home Fallout Shelter, and at school, we had ‘duck and cover’ drills as often as fire drills. But the scare wore off by the 70’s, and sirens and shelters were no longer in vogue, though every downtown building tended to have a well marked public shelter.  Yawn.

Fast Forward, Bush I White House: For no visible or announced reason at all, the Emergency Alert System (EAS) and CONELRAD Radio alert system which had in evolutionary form driven those sirens for two decades was turned back on in the 90’s, and updated for improved use with TV. But rarely was it tested, and then typically late at night between late-show snoozes. Just fire drills at school. No more sirens, unless there was perhaps a fire or other actual emergency. Very unobtrusive. No problem.

Fast Forward, Bush II White House: Suddenly, somewhat synchronous with the formation of Homeland Security, these alerts started increasing in frequency and were randomly interrupting all manner of broadcasts at any time of day. They now had the ability to actually take over newer televisions, even if turned off or in use with a VCR at the time. Somewhere along the way, it was expanded to include hazardous weather condition reports and the AMBER ALERT system for missing children. Schools still worried about fires. OK. Well, perhaps.

What kind of threats should an emergency preparedness plan address?

The current threat assessment

What does FEMA think is different about 2013? (Click – from FEMA ‘resolve’ page)

Fast Forward, Sorento White House: Suddenly, and synchronous with DHS seeking to buy 1.4 billion rounds of ammunition (that’s several Vietnam wars worth), all over and above military orders… not to mention a long list of equally disturbing purchase efforts involving coffins, ‘emergency housing’ which more closely resembled prison camps, food and water stores, vaccinations and anti-biotics… numbering in the millions more often than not — the tests started increasing in frequency and in duration. Annoying. Suspiciously omnipresent, excessively foreboding.

What bothers me most is a synchronous rush request for proposals on delivery of emergency preparedness items and relocation and readiness orders to military to FEMA Region III (Atlantic Seaboard States near D.C.), all with a date of October of this year. In fact, much of FEMA’s promotional material is geared to 2013, specifically. Most of the darker things cited in this post are happening right now in 2013 or otherwise generally depicted as an immediate potential threat.

Worse, both DHS and FEMA have started multiple high-profile media campaigns suggesting we all need emergency kits and emergency plans. This is also all simultaneous to a bit of mainstream news and much suppressed facts being revealed on the Web regarding an approaching Planet X, approaching comets, several near misses by planet-killing asteroids, and a flurry of unusual meteor activity to include nuclear blast-strength explosions in our atmosphere (the Russian meteor injured nearly 2,000 people and caused significant wide-spread structural damage over hundreds of miles). And there is more…

Also simultaneous are geo-political and financial threats the likes of which have never been seen in the history of the planet, each threatening dire unrest to the point of forcing Martial Law. While this goes on, the sun is spitting gigantic record bursting electromagnetic pulses at us and the pole is shifting, Fukushima is continuing to increase its threat, not to mention shifting weather patterns and an increase in seismic activities of Biblical proportions. Dare I mention strange phenomenon like objects orbiting the sun, mysterious loud and scary sounds heard over thousands of square miles, two suns and other oddities in the skies day and night? Endless wars somehow always tied to terrorism and oil keep being announced. No wonder large numbers of people are actually starting to think End Times might actually be around the corner.

The end of oil supply as we know it indeed approaches. Extremist terror groups pose theoretical threat of biological, chemical, or nuclear WMD. Criminal nations threaten to attack us with nuclear weapons. China is on the verge of surpassing the US as super power, and their top military leader has said war with the US is inevitable; their only answer to that being to strike first.  Man-made bio weapons, nanotech, and even genomic weapons are being developed daily by all modern military powers, and we get cover stories expressed as worries of a natural pandemic outbreak of catastrophic proportions. The Center for Disease Control has even gone so far as to talk about preparation for a Zombie apocalypse, and there is some evidence it is not as tongue-in-cheek as they profess. Don’t forget chemtrails and the feared NWO depopulation plot.

Actual soldier patrolling American Street. UNACCEPTABLE! (click – disclosetv.com)

The worst part is all the talk about a possible military takeover, martial law, a new Constitution and a North American Union. Why, that’s nothing short of saying the Antichrist is coming to power… and some say that’s the case, too. Agenda 21, GMO crops, Codex Alimentarius, the Small Arms Treaty (goodby 2nd Amendment), etc.  All these things tie in one to another as if all by some organized conspiracy (Illuminati?) After all, they say, the Norway Spirals were likely a test of Project Bluebeam, to simulate with a kind of holographic event the Second Coming in the Antichrist’s name. And what about those tens of thousands of ‘State of Martial Law’ warning/instruction signs coming into the US from foreign sign makers in convoy manner? Really, really not good.

Almost everyone has some kind of foreboding sense that SOMETHING bad this way comes. Armageddon Online has a more detailed summary view. And just as someone chooses to discounts all of these things as ‘baseless,’ something like this comes along to make us wonder all over again: a lot of people are saying there is a purge of the military taking place, and that usually portends a violent overthrow of government.

So, quite naturally, some of us are taking the DHS/FEMA advice to heart, or at least considering it. But I fear most of us are preparing for the wrong thing in the wrong way. Its one thing to have food, water, medical, and key supplies stashed away for an earthquake or flood… and another to truly be prepared for upheavals of the political or Biblical sort… the sort government advice is NOT addressing, because if you were prepared for that, government looses the ability to maintain political control through dependency upon government for survival.

Never fear; the Professional Paranoid is here to help you find your way through it all… in part II:  A Logical Home Emergency Response Plan: The Government Does NOT Approve

Why should I hide my emergency preparedness kit and weapons?

Military Purge Underway? A Military Revolt Warning Sign


A sure sign that the government fears a military coup or the military itself is about to attempt one, is a purge. The government will purge those it fears unloyal, and/or the military purges itself of those unwilling to go along. Whoever best purges post haste, just might win. Either way, however, the people tend to loose to an errant government and/or would-be military dictator. It is, after all, how authoritarian Police States are born.

Is Obama conducting a purge of the military?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What causes a military purge to take place?

Reading this post you will learn:

  • That history proves purges take place when governments fear their military is about to take over…
  • Or when the military prepares for such takeover…
  • And such tyranny grows from purges within political circles and the military to involve citizens…
  • Everyone is challenged with loyalty oaths, untrue (or otherwise) accusations, tricky questions, or even torture…
  • The wrong answer can mean death, prison, or ‘vanishing;’
  • Evidence abounds that we have been in a pre-event purge for several years…
  • That the purge is nearing the point of reaching open armed conflict;
  • That the result of a purge is almost always a Police State, regardless of which side wins

Why is Obama conducting a military purge?

Updated Nov. 14 2013 Changes indicated in RED reflect latest termination and dim view of purge by Russia and China who see it as possible PRELUDE TO WAR.

Updated Dec. 10 2013 Section added and indicated in RED as relating possible ties to Global Research Web site going dark and decade old CIA plot to capture Soviet nuclear warheads.

History on Parade…

All authoritarians get rid of non supporting military men. Only in America does media not dare report it happening. (click: rarenewspapers.com)

History is rife with examples of political purges, both bloody and near bloodless, and unfortunately, both sides can end up playing the game. Sadly, we also see that most bloodless purges end up being bloody at one point or another; they push the other side into reactionary defensive acts. Worse, once one side or the other becomes dominant, the purge is extended from the national politik (government officials and military) to local politik (regional-to-city leadership and law enforcement), and from there, down to every day citizens; any such purge portends a intended shift in power to an actual or de facto authoritarian dictatorship.

The classic example would be found in the Russian Communist Revolution, which actually evolved as successive political leaders reshaped ‘the revolution’ to suit their own visions. But you find the same things generally true in the French Revolution, Mao’s Red China, or even in the American Civil War, where the Union employed the Ironclad Oath, and various Generals (see last paragraph in the link under ‘1862’) exercised internal ‘loyalty and fitness’ purges, ad hoc. One could easily be shot for a careless comment or answer.

Why would Obama conduct a purge?

A purge HERE?

There has, in fact, already been an attempted military coup in the United States. We are, or were, fortunate at the time, that the attempt failed before the purge which would have been required could get started. While most Sheeple have never heard of it because it was contained and not made public, most of the rest of us are aware of the Business Plot of 1932 which attempted to stage a fascist takeover in America by means of a military coup. Some of the biggest Industrialists of the day were involved, names which still today are iconic labels on everyday products, like Singer, and Dupont.

But thanks to one-tough and loyal Marine who tricked his would-be conspiratorial recruiters, the affair backfired. That’s a big ‘Hua!’ for Major General Smedley Butler. But a purge did follow, one which sought to eliminate the threat from the cadre of business leaders and their friends involved, including other military — along with an attempt to cover up the entire matter in order to maintain confidence in the nation’s internal and external affairs.

One thing remains clear: the general purge model is especially of concern when one is dealing with a bloody purge, because it does work its way down to citizens, Sheeple or otherwise. Especially otherwise. And so, I strongly urge that we must take a very close look at our current troubled situation and most recent history with respect to Presidents, politics, economy, international affairs, and the military. So, what’s going on, here in America, right NOW? Well, the answer to that won’t be found in mainstream media unless, perhaps, you are talking about press from abroad.

Now comes a new worry: The European Union Times is reporting the both the Russians and Chinese consider Obama an unstable, power-hungry madman and, with the latest firing (added below with RED) , have themselves taken unprecedented military responses towards possible military conflict with the U.S. and any of its Allies. Seemingly related, are two other news stories in one at the Web site regarding Chinese troops (and a spy ship) in Hawaii, and a simultaneous FEMA ‘simulation’ of cyber attack (Fire Sale) on US power and communications networks, itself timed to coincide with the largest Cannibalistic Corona Mass Ejection the World has ever recorded striking the earth and disrupting our magnetic field in a way which threatens disruptions similar to said cyber attacks . A grain of salt is due, here, as the EUT is, well… extremist in nature. Extreme ‘what’ remains in question… a bit like a super-market tabloid without aliens and pictures of personalities doing naughty things or being too fat on the beach.

Update Dec 10, in support of prior update…

Consider the Howard Hughes Empire at the time when CIA essentially controlled the man and his firms (1968). CIA contracted Hughes Ship Building and through Hughes, Sun Shipbuilding – to construct two custom vessels. The main was the Glomar Explorer deep sea ‘research’ vessel, which is also adaptable to deep sea drilling applications, and the second was a ‘supply ship’. The Glomar Explorer was used to recover nuclear weapons and portions of a sunken Soviet Sub K-129Golf Class – though Agency claimed only to have failed in the project. The supply ship was actually a disguised ship akin to a Sub Tender, with an internally open bay designed to accept the sub, once raised, and covertly take it to the San Diego Naval Yard.
The project has been called Operation Jennifer and the even more secretive Operation Azorian (there were two specific missions, one to get soviet sub technology for USN, and one to get the bombs for CIA). I’m the only one maintaining the weapon recovery, as documented in support thereof in my book Fatal Rebirth (proparanoidpress.com) – free copy of volume 1 ebook on request to pppbooks@comcast.net. The principle clue is that the supply ship was five feet too small to recover the section of the sub officially sought, but the right size for the weapons section, the sub already known to have broken into two parts. Add to this, the cover story that the reason the recovery failed was not because of the too-small tender, but because the desired section itself additionally broke into pieces at the attempt. http://www.fas.org/irp/program/collect/jennifer.htm
Recently, the underground news organ, Global Research has gone massively dark with not one single resource of their massive Web presence accessible. One reason for vanishing of the material may have to do with what Fatal Rebirth predicted would be done with the nuclear warheads (false flag terrorism, specifically citing it against Charleston, SC). Russia Today has stated that Russian Intelligence has leaked that one reason Obama is conducting a military purge is because the military refused a nuclear detonation at or near Charleston.
If CIA has old Soviet bombs, they would no longer be very useful for normal detonation, but would make excellent dirty bombs. CIA would likely be more inclined to follow such an order than the military, if RT is correct. Russia would have a motive for disclosure tied to the bombs, because the radioactive footprints would point to Soviet manufacture, and could result in suspicions they provided the weapon willingly to ‘terrorists.’ Global Research (in all likelihood) may have been expanding upon this story, which may be why it has gone dark; you get either a 404 error, a denied permissions error, or a ‘something has gone wrong’ error. True, it could be a simple temporary glitch, perhaps a server being down for maintenance. On the other hand, DHS (or some other agency), has perhaps declared them a terrorist and seized their servers, as they have done in the past to other activist and conspiracy oriented Web sites, such as Indymedia.
Therefore let us continue our look at the Glomar Explorer, which has had a long history. It generally patrols the world on contract for oil companies and the military industrial complex (i.e., Lockheed Martin) and can usually be found offshore from political hot spots ‘researching’ to ‘find oil.’ It was off the coast of Vietnam during the war, and has repeatedly been in the Middle East, commonly the Yemen area, which gives spy ELINT resource coverage to everything from Egypt to Iran to Afghanistan, and excuses land incursions regionally by ‘crew on shore leave’ who could easily be conducting in country spying. Most recently, the ship has been in the Gulf of Mexico, leading some theorists to wonder if it did not have something to do with the BP oil leak (I doubt this – too far away).
The Glomar Explorer has also operated under the corporate names of Global Marine and Global Santa Fe, both considered CIA Fronts. To add irony, if not confusion in realization that with CIA, nothing is ever as it seems, is this fact from Linkedin: Ronnie Temple used to work for Global SanteFe and Global Marine, and Ronald Temple now works as Co Director of Global Research. Ronald Temple of GS/GM was managing director at Lazard Asset Management, and Ronald Temple (another one?) is listed as Manager of US RESEARCH for Lazard Asset Management, as well as an association with the Deutsche Bank, THE FAVORITE CIA conduit for black op funds.
In the spy World, you can’t tell your players or their motives even with a program card. We would hope these to be different individuals, but just imagine… what would it mean if they were one and the same? Clearly, the two Ronalds appear to be the same, implying that he sees value in having multiple identities on Linkedin… so why not a third? Multiple identities under the same name IS NOT UNCOMMON among CIA operatives/agents. Using multiple names in this case might be intentional to distance Global Research from Global Marine and Global SantaFe. Argh! End Dec. Update, prior update continues as indicated in RED.

Is the U.S. military conducting an internal purge?

Proof of a purge?

Many observers think its happening, including people who are far from being conspiracy theorists; media types, military professionals, and more. In simple terms, consider the following statistics and facts, none of which are in dispute, though almost all of which are veiled from Sheeple’s eyes by media and government. Mainstream employs careful wording and skips filling in the blanks with useful detail. But others mince no words.

And speaking of words, we must realize that when a bloodless purge is underway, there must simultaneously be ‘disinformation’ to cover up the fact. This means that excuses will be used to veil the truth, and this will be quietly accepted at first by both sides, often because, at least for the individuals involved, some form of blackmail or other threat is in place to insure their silent acceptance. For some, it may be some form of National Security agreement. For others, it may be a sexual indiscretion, or a criminal or financial matter which dictates cooperation lest it be made public.

So take what is often offered in ‘face value’ with a grain of salt. It is the fuller picture which is painted in the broader strokes which overpower individual words, or lack of words… and bear in mind that when there is a purge, one must also look at resignations as part of the ‘flow’ of things — especially if related to protests or potentially motivated as a self-defense move. Doubly so if in numbers.

Why is the U.S. Military conducting a purge?

Is Obama conducting a purge?

Many think so, and the preponderance of evidence cited would seem to support the notion. It is, after all, what prompted my own review (more detailed than theirs, naturally — that’s always my goal, at least). Consider these reviews, and the fact that many sources claim Obama’s differences with military leadership have to do with his asking them if they were willing to shoot Americans, presumably in a gun-grabbing operation of some kind:

Freedom Connector, Nov 16, 2012: What’s Behind Obama’s Military Purge? — by Bob Livingston, an ultra-conservative newsletter writer;

The Independent Journal Review, on June 28, 2013: Obama’s Purge; Military Officers Replaced Under the Commander-in-Chief — a situational analysis by Kyle Becker;

The Western Center for JournalismObama Escalates Military Purge — by the Editor

World Net Daily, The Examiner, The Guardian, and many others citing The Blaze, Oct. 23, 2013: Blaze Sources: Obama Purging Military Commanders — Sara Carter citing actual fired military commanders’ viewpoints.

There are many more, but you get the idea. From the outside, looking at the observable clues leaking out from the inside, and sometimes even from the mouths of those involved, the impression is a Presidential purge is under way. More: since the above, Sorento’s desire to attack Syria met with such resistance in military circles as to warrant an article (translated from an unstated German source), well worth a read: Historical Disgrace: The U.S. Military Mutiny Forced Obama to Retreat. Yet as already mentioned, other stories relate that the purge is because the Military is refusing to go along with plans to grab guns and shoot Americans who refuse to comply.

Why does a military purge predict a shift towards authoritarian dictatorship?

Flip side: is the military is purging itself of White Hats?

No one else on the Web seems to think so, but I’m wondering why not? When the stability of a country comes into question, forces within the military tend to start wondering if they need not do something drastic to change things, and eventually, a strongman General is able to recruit others of like mind to work out ‘contingencies.’  One of the first steps in preparing for possible enactment of such plans (a coup) is to evaluate the remaining Officer Corps, and get rid of loyalists.

Or, it may be a group of powerful business leaders who make the call, and who recruit members of the military for their cause, resulting in the same process, a ‘la The Business Plot of 1932, already mentioned.

You know something sinister and deeply troubling is going on when Veterans are being told they can’t fly the American Flag on public property, Officers, even Chaplains, are threatened with court marshal for having a Bible on their office desk or speaking about religion with others who are not already in the same faith, and telling them to resign if they have a problem with the policy. What? Oh, I forgot: the military and military policy is dominated, according to authors like Alex Constantine, by Satanists.

In point of fact, as Alex and others have pointed out, self-proclaimed Satanist General Michael Aquino, was a chief architect of the Revolution in Military Affairs, the policy which defines the next major new war type the military will face is ‘A People’s War,’ where the enemy is disgruntled patriots, Constitutionalists, and the poor and disenfranchised. Well, now, that’s just about everybody in the U.S. but the ten percenters at the top, and dumb Sheeple, is it not?

Now, while the first section paints a picture of a Presidential purge, I must remind you that both sides of a major power rift often purge, and that outwardly, the signs will typically tend to look the same. So now, let’s take a closer look at those purged and their circumstances, to see what we might decide for ourselves. After all, other Web sources speculate the reason for Obama’s purge is that he fears a military coup, a notion which alledgedly originates directly from the Russian Military and the Kremlin.

However, that story would seem to be related to another alleged Kremlin and GRU (a KGB-like Russian Spy group similar to CIA) claiming Obama had ordered the detonation of a nuclear bomb in or near Charleston as a false flag event and the military refused, prompting the firing of so many nuclear commanders. I find this fascinating, because in my book Fatal Rebirth, I predicted Charleston would be the target of a nuclear false flag attack AFTER the also predicted (in 1999) downing of the WTC by passenger jets and resulting in a series of Middle East oil wars.

Snopes.com, whom I do not entirely trust as a legitimate ‘debunker,’ does attempt to debunk the above story by attributing its true source to Sorcha Faal, a known professional disinformationalist who works for, among other people, DHS. So then, why would DHS promote this particular disinfo? That makes no more sense than the outlandish conspiracy claimed by the story. But if baseless, and not Russian sourced, why has RT (Russian Television in English) News not ALSO debunked it, and instead reported on it as factual?

So understanding if there is a purge, and who is undertaking it, and why, is going to be difficult. Really, you can’t tell your players (or their position on the team/role in the game) without a roster. So here it is, so you can decide for yourself…

What are the signs of a military or political purge?

Point Comparisons: Roster of 266 Vanquished Officers and Key Staff under Obama

This is an updated and more accurate compilation the found in lists elsewhere which cite 197 or fewer. More than 50 being offered in rich detail, here. These numbers represent a massive bloodletting not seen under any prior President in American history. There are so many you might be tempted not to read them, but in the reading, at least of their name and command position, you find some interesting, if not scary things, not to mention patterns. To be sure, some who were let go may have indeed been let go for non-purge and quite legitimate reasons, but the large numbers of higher rank Officers and the nature of the clumps of specialities/assignments/duties, especially, amplify reason for concern that more is afoot than ‘bad conduct’…

Fired Nov. 3rd, Colonel Eric Tilley, Commander of Japan’s largest U.S. base in Japan for ‘allegations of unstated misconduct.’

First Lieutenant  Ehren Watada was the first Officer to refuse deployment to Iraq as an illegal war, was eventually allowed to resign. Now, if his view was unjustified in the eyes of military, why was there no court marshall? If justified, why did we go to war? It implies disparate viewpoints in military ranks, and between military leadership and the President;

Major Stefan F. Cook, US Army Reserve, refused to deploy because he did not believe Barry Sorento was a legally elected President, joining with two other officers according to Wikipedia (no Web source names them, but they are described as a retired Army Major General and Active Reserve USAF Lieutenant) in a law suit (Cook vs. Good – scan down). They did not win their suite, but neither did they have to serve, again meaning disparate viewpoints. Touche’;

Captain Connie Rhodes, US Army Physician filed a similar suit (just beneath prior link, same page);

Predator Drone Pilot Brandon Bryant resigns USAF over immorality of drone attacks on noncombatants, making five people who refused to serve and suffered no court marshall;

Colonel James H. Johnson III, Commander 173rd Airbornfired and convicted of bigamy and fraud in expense accounting, apparently jumping out of the airplane and into the frying pan;

General Joseph Carter, Commander Camp Edwards and Adjutant General of the Massachusetts National Guard resigned even though a months investigation failed to produce evidence of a rape allegation;

Brig. General Jeffery A Sinclair, former Dep. Commander 82nd Airborn in Afghanistan, fired and facing possible Grand Jury review for criminal sexual indiscretions — sounding a bit like the CIA entrapment of Wikileaks mastermind, Julian Assange;

Army Major General Peter Fuller, Commander in Afghanistan (of unstated forces — which to me implies intelligence hanky-panky), let go in 2011;

Marine Major General C. M. M. Gurganus, Commander Regional Command Southwest and 1st Marine Expeditianary Force (also Afghanistan) was let go in 2013;

Marine Major General Gregg A. Sturdevant, Commander Aviation Wing at Camp Bastion, Afghanistan, and Director of Strategic Planning and Policy for US. Pacific Command, let go in 2013;

General David D. McKiernen, Commander of the Afghanistan Theater was let go at Obama’s orders after four months of arrival, for saying the campaign was less noble than was Iraq. That was 2009, making him the first four-star General released by a Commander-in-Chief since MacArthur by Truman. In 2010, Obama fired…

General Stanley McChyrstal, Commander of NATO International Security Assistance Force (IASF), Afghanistan, a matter linked to the death of reporter Michael Hastings. He was replaced by another soon-enough-to-be-fired General Petraeus, below. Seems like Obama liked no one involved in the Middle East, does it not?;

General David H. Petraeus, also left the Army as NATO IASF Commander as to be appointed by Obama as Director of Intelligence, CIA. He then resigned CIA over charges of an extramarital love triangle, but at the time there was the controversy about the CIA’s role in the handling of Benghazi intelligence and no-go rescue aftermath.  And, stepping back once more, the man who replaced him at ISAF when he stepped up to CIA was…

Former General Michael T. Hayden, in like manner yet again, quit the USAF to be appointed by Bush II to be Director of NSA, and then, also like Petraeus, was fired over extra-marital sexual conduct (officially), and unofficially, over internal disagreements with Obama on intelligence policy and validity of evidence regarding alleged Syrian nerve gas attacks (shades of Bush and Weapons of Mass Destruction in Iraq);

Marine General John R. Allen, Commander of NATO International Security Assistance Force, Afghanistan, was investigated and removed for ‘inappropriate communications regarding Bengahzi’ (he countermanded White House orders not to attempt rescue of the besieged Embassy). The investigation continues without fruit, be he was also seemingly an injured party in the above Petraeus love triangle. You couldn’t make this stuff up as screenwriter of a Kardashian’s in Uniform special. Now, regarding Bengahzi…

General Carter Ham, Commander Africommand (counter terror operations) also relieved of command and arrested for attempting rescue despite orders from White House to stand down… and before him…

General William ‘Kip’ Ward, 1st Commander of the Africommand fired for ‘financial irregularities’ in expense accounts;

Rear Admiral Charles M. Gaouette, Commander of the Stennis Aircraft Carrier Strike Group relieved of command in the middle of Middle East deployment for unstated ‘inappropriate leadership judgement’ also thought Benghazi related. But not just him…

Capt. Owen Hornors, Commanding Officer of the Carrier Enterprise, no less, was let go for ‘making and showing to the crew raunchy cartoons.’ No patterns here, folks — move along, move along;

Rear Admiral Ron Horton, Commander of Western Pacific Logistics Group was also fired for knowing about and failing to put a stop to the Enterprise cartoon shows;

Brigadier General Bryon Roberts, Commander of Ft. Jackson (training facility) resigned over charges of an ‘altercation’ with a woman. He commanded the training of the Iraqi Security Forces slated to replace US Military, and served directly under the Joint Chiefs with distinction;

Vice Admiral Tim Guardina, U.S. Central Command, drops two ranks to Rear Admiral, and looses his 2nd in Command position in charge of nuclear weapons for allegedly using counterfeit casino chips (felony fraud). Now that would be easy to set up as a frame up… which begs the question, why no criminal charges or court marshall, if true — or a resignation? It’s called ‘leverage’ and keeping a close eye on a person in question by keeping them close at hand;

Four-Star General James Mattis, Commander of US Central Command, being fired for ‘Mad Dog’ warnings to the Obama adminstration on the dangers of proposed Middle East military actions in Syria. Very interesting if, as stated in the next item link, he was the one responsible for that firing, and perhaps more so, if it was his replacement who arranged it (at this point, I’ve not been able to isolate which might be closer to being true, if either);

USAF Major General Michael Carey, Commander 20th Air Force (that’s 3 Wings of ICBMs/450 warheads at three AF Bases) was let go in 2013, making the third man in charge of nuclear forces to be let go — unprecedented;

Army Major General Ralph Baker, Commander Joint Task Force Horn of Africa in Djibouti, Africa, let go in 2013 — anti piracy and counter terrorism support unit, also likely to know what really happened in ZeroDark Thirty;

Lt. Col. Matthew Dooley, 20 yr Vet Army Instructor for National Defense University and Joint Forces Staff College allegedly fired at Obama’s request for teaching a previously approved course called Perspectives of Islam and Islamic Radicalism (for which he had also previously been commended) because it was deemed ‘offensive’ to Muslim organizations who somehow managed to learn about it (but had not experienced it). On the other hand, the Army Vice Chairman of the Joint Chiefs, now head of US Central Command himself described it as “against our values,” and so, this appears more likely a military purge victim than an Obama victim, done in a way that blames Obama publicly. A nice two-edged blade being twisted;

Commodore of Logistics, Lt. Col. Allen B. West, Battalion Commander, 4th Infantry, 20 year vet forced to retire pensionless for coercing terror attack information from a prisoner in Afghanistan by discharging his weapon to get his attention. Now that’s odd, because Logistics has nothing to do with prisoners. However, Logistics is THE MOST KEY tactical element of ANY military action;

Marine Colonel Daren Margolin, Commander of Quantico’s Security Batallion — FBI’s and USMC training facilities also used in joint LEA/Military trainings even when disallowed by Posse Comitatus;

Marine Colonel James Christmas, Commander 22nd Marine Expiditionary Unit and Special-Purpose Marine Air-Ground Task Force Crisis Response Unit, let go in 2013;

In 2012, Six USAF Training Officers from Lackland AFB base were fired after being charged with rape and adultery;

In 2011, 25 Command Naval Officers below the rank of Admiral were let go (not already mentioned), including captains of nuclear missile warships and submarines;

Recall the TV show Last Resort, where an American sub commander staves off an unjust false-flag nuclear first-strike against Pakistan as part of a military-coup deception… by threatening D.C. with attack, instead?;

Also vanished in 2011, 12 senior enlisted Navel personnel in charge of key programs, facilities, and projects;

In 2012, an additional 28 Command Naval Officers below the rank of Admiral were let go, again including several captains of nuclear missile warships and submarines.

Also vanished in 2012; 15 senior enlisted Navel personnel in charge of key programs, facilities, and projects;

Meanwhile, still in 2012, 157 Career USAF Officers below the rank of General were forced to quit. Moreover, and potentially related, the USAF has resorted to offering nearly a quarter-million dollar bonus to fighter pilots to keep them from resigning after meeting their minimum obligation. Yet the 157 were ‘let go due to budget constraints’ according to the official story?

All the while this has been going on, and Obama’s proposed actions in Syria have not been sitting well with anyone but Sheeple on the citizen side, it turns out the military was not too crazy about the idea, either. Not just General Mattis and other officers already mentioned, but rank and file enlisted: a spontaneously created ‘photo-bomb’ campaign flooded the White House with individual refusals to serve in any military action ‘helping Al Qaeda’ fight the Syrian Christian government… appropriately went viral on facebook.

Does Obama fear a military coup?

Another kind of Roster: 92,600 Enlisted are being disbanded

Bloomberg is reporting, with the official line being budget cuts, that nearly 100,000 soldiers, sailors, and Marines are being let go starting the first of this month (several weeks ago, Oct.).  The troubling element is that the bulk of these (67,000) are US Army. If gun grabbing operations took place, the brunt of such action would involve the Army. That fact, and the fact that the military has been using a Shoot Americans Questionnaire which would help them purge themselves of those unwilling to do so — if their actual plan, makes me wonder who is being forced out, and why?

And here’s another reason to wonder: If the Sorcha Faal story was done for DHS, and keeping in mind that DHS ordered enough ammo to kill everyone in North America several times over, the ONLY possible motive I can deduce for fostering Faalishness is to fuel a counter conspiracy to the real conspiracy. That is, if they were planning to shoot Americans over gun grabbing efforts, then why not create a counter story saying the Military was revolting because the President was going to grab guns and order them to shoot Americans to do it? It would be another two-edged sword blaming Obama. Watch the left hand so you don’t see what the right hand is doing.

I’m just saying. I really have no way of knowing any more than do you. But I do know how disinformation works, and that is definitely one way it is used. It’s how it got its name.

What does a purge of the U.S. Military mean?

The broad view: being caught in the middle

The stage has already been set for our consideration, and depending on who is doing the looking, lots of people are starting to see that a purge is taking place, almost all eyes focusing on the US Military and/or the Obama administration. Point of view dictates how they analyze the whys and wherefores, but they all agree that purge is the word.

Bloodless, thus far to be sure… but to remind… a bloodless purge tends to force the other side’s hand and can easily escalate to a bloody one, if not also outright armed conflagration. At some point, someone elects to do something to end the gutting of their power base, and that something is not usually gentle in nature.

That DHS has been buying up weapons, munitions, coffins, medicines, and other key items in quantities suitable for a twenty-five year war… and that FEMA has launched a massive ‘disaster’ preparedness advertising campaign, simply adds fuel to whatever may be the real cause of the mysterious smoke under consideration.

If you find this all a bit troubling, you may wish to do some more reading. One place I can suggest you start, is my own book set, Fatal Rebirth, which written in 1999, predicted the entire pickle we now see ourselves in, from the bringing down of the WTC by passenger jets to financial debacles to the purge, and much more.

A free ebook copy of Vol I can be obtained by email request to pppbooks at Comcast dot net. Given the violence purges tend to evoke, you may also wish to read my post (series) on emergency/disaster plans and resource kits to cover ANY threat, natural or man made. Who else but the Professional Paranoid would dare bribe you with a free book just to read a blog post? Email me!

Who is purging the military and why?

Gas Tax Newest Spy Tool Targets Poor, Economy-Minded


When the Tax Man has a GPS tracker in your car, you dare not go anywhere you don’t want (someone) to know about… because we are talking about ‘public information’ in this case, which ANYONE can access.

Time for another Boston Tea Party… let’s throw a congressman into the harbor!

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Update: (the day after penning): Extra paragraph of additional problems this proposal has which have not been considered by ‘government’ in their zeal to screw up our lives. Toward bottom, marked with RED.

Why the Anarchists may have it right after all?

What you will learn reading this post…

  • There is a new gas tax headed your way SOON…
  • It uses a chip plugged into your car with a GPS sensor…
  • It determines what roads you are on by taxing authority…
  • It bills you accordingly… but…
  • The GPS unit will know exactly where you’ve been, and when…
  • And that information is available to ANYONE upon demand

 What is mileage-based gas tax?

Milage-Based Gas Tax?

Our new Boston Tea Party?

Our new Boston Tea Party?

I first heard about this on Lars Larson’s radio show, which originates locally, though it is a nationally broadcast show of suitably politically-incorrect content for my tastes. But it is something that apparently got its start and was first mentioned publicly some months earlier. If you haven’t heard about it, it is called a ‘milage-based gasoline tax.’ Currently, what we have is a ‘per-gallon’ gas tax. There is, though they don’t seem to want to tell us this when talking about the new and improved idea, also a Tire tax for the same reasons/uses.

The current system has been in place ever since Congressionals and Councilmen first learned they could tax anything they wanted, pretty much, and get away with it.  The idea was to levy a ‘special tax’ for highway projects, maintenance, and related la-tee-dah in a way which targeted drivers, only; they wear it out, they pay for it, not the guy who does not even own a car.

But there are arguably a few problems with the notion, one being that you might buy your gas in a low-tax rate community and then commute to another region, perhaps another state, where the rate is higher, thereby ‘cheating’ the taxing authority by destroying their roads for free. Taxes vary by authority (city, county, state, federal), some authorities adding nothing, some taxing heavily. Tax-free wear and tear with wanton abandon.

But no taxing authority has ever complained very much about that sort of thing. No, the real complaint is, they are worried about one thing; now that gas mileage is going up, they are collecting less revenue than ever, even though road wear is increasing as new drivers hit the pavement (with their tires.) Darn kids, anyway.

And really darn those electric car drivers who don’t pay ANY gas tax (just tire tax). So, someone decided, that instead of simply raising the tax rate (as appropriate, on gas and/or tires — depending on the kind of vehicle) to compensate… which just takes a few votes and notifying gas stations and tire shops to change their pricing systems… they instead thought to do something… ‘Obama-like.’

If congressmen thrown into a harbor drown, does that mean they were witches?

The New and Improved Gas Tax

They succeeded. They still have to do the vote thing and notify gas stations (only), but they have a few extra things to do, as well. All of them are going to add costs to government, and require a whole new bureaucracy to be staffed:

a)    They must purchase some pretty expensive GPS tracking gizmos for issuance to drivers, and figure out how they are going to do that, and teach them how to install them correctly, or do it for them. They call these gizmos OBUs (On-Board-Units). I like gizmos, better. Fascist gizmos, in fact, as we shall see.

b)   Two, they have to figure out what they are going to do about cars that are old enough that they don’t have a place to plug the gizmo into, at all, or have newer cars but are already using the gizmo’s plug-in socket to modify their engine’s performance and/or economy favorably… and find some suitable way to punish those jerks for having more interesting (collectable) or economical (paid for, easy to repair, better performance) cars than the rest of us. Envy is not a sin, it’s just part of the ‘buy one today’ mental process.

c)    Create some kind of billing system (they are talking invoices, and payment methods). We are talking having to pay a huge chunk tax bill at some undetermined interval for all mileage driven since the last time we paid. Yeah, the poor will find that a lot of fun.

d)   Establish some kind of official methodology, rules and regulations, fines and punishments for failure to perform to said rules and regulations, and supporting infrastructure to collect the information from the GPS trackers and enforce said rules and regulations, forthwith, henceforth, and with prejudice and malice for all.

e)    Figure out what to do when a gizmo fails to function properly, undoubtedly placing some kind of huge punitive liability on the owner of the car for ‘breaking it.’ Stupid people is as stupid people do (sorry, meant to use that line talking about the legislators).

 If a congressman is proven to be a witch, does that mean they are also fascists?

So right off the bat we see this is going to be nothing more than a way for some government contractor somewhere (who promoted this idea as being ‘swell’ while dropping off big checks at the Congressman’s offices) to get rich, and some government people to get promoted to head a whole new Division and command a bunch of staffers, get a State provided car, a budget to squander, and a big paycheck. It will also be a money-maker for the various court systems which will enjoy seeing new faces guilty of ‘gas tax fraud,’ ‘destruction of gas-tax monitoring systems,’ and other fun sins which will undoubtedly be added to State Statutes.

Drown all fascist witches in Congress!

Now the Bad News

English: Traffic jam in Beijing

(Photo credit: Wikipedia)

But that’s not the worst of it, but don’t worry, I’ll break the bad news to you gently, saving the worst for last. To start, there is a problem with their little scheme in terms of fairness. Currently, on a per-gallon tax basis, someone who drives a gas-guzzler pays more tax (buying more gas per mile) than someone who drives an economy vehicle (and we already mentioned electrics). A poor person pays the same as a rich person per gallon, there is equity and fairness. Since it is paid per gallon, it is affordable as long as we have enough to buy the gas in the first place.

The new system (official describing document) however, at least in trial setups as being sponsored in Oregon, Nevada, and Washington, will punish anyone who has an economical vehicle and reward those with gas guzzlers. So, by default, it also punishes the poor who cannot afford SUVs and huge trucks. It punishes them further by saving up their indebtedness for tax over some period of time for a large (and largely unplanned for) tax bill. It works like this:

You STILL pay gas tax at the pump, roughly 30 cents a gallon in Oregon. But when you get your gizmo monitored by (an undetermined method), you will be charged 1.5 cents per MILE driven, and then credited a portion of that back to offset the fact that you already paid a gas tax at the pump. But the kicker is how they come up with that credit. Below, I employ rounded mileage figures for ease of calculations and paraphrase like dialog from the radio show. On the show, the new program was being explained in somewhat vague details: even though they only have 18 months to get the system up and running, they DON’T KNOW YET exactly how they are going to run it — thus the actual figures may be different, but the INTENT was explained to be as follows:

a)    Someone who has a gas Guzzler such as a big truck or SUV will get a 2 cents credit per mile. At 10 miles per gallon, before the new system, it cost them 30 cents to go ten miles. Under the new system, it will cost them 10 cents per mile. This subsidizes manufacturing, sales, and use of gas guzzling vehicles to those who can afford them. Guess who lobbies for this legislation.

b)    Someone with a ‘normal car’ will get 1 cent credit. At 30 miles to the gallon, they paid 10 cents to go ten miles; 1 cent per mile. Under the new method, they will pay 15 cents; 1.5 cents per mile. Shame on them for having only a ‘normal’ vehicle when they should be driving a gas guzzler. This is where most poor people will be stuck: having to pay 50% more tax, and getting stuck with the bill in unexpected chunks.

c)    Someone with an economy vehicle will get a half-cent credit. At 45 miles to the gallon, they paid 7 cents to go 10 miles; .66 cents per mile. But these low life’s need to be taught a lesson, so it will cost them 8 cents under the new method; .8 per mile. Again, since the poor can’t afford a new car with better milage, they pay more than the low life’s who can (but neglected to get that SUV).

d)   An electric vehicle owner used to pay nothing (save tire tax, which everyone still pays), but under the new system, those criminally penny-pinching villains will be punished by having to pay 15 cents to go ten miles. Gosh! They get the same treatment as if they were poor people!

Which way to the harbor?

Update: In my zeal to meet a deadline, I missed a couple of things that have apparently also escaped the thinking of government planners. The little socket they wish to use for the Gizmo is where DEQ and auto mechanics test engine performance. As I earlier alluded, its where people can plug in performance altering devices for more horsepower, or towing capacity, or better economy. It’s also where Breathalizer devices are plugged in that prevent drunks from driving. And, its where ‘Snap Shot’ driving devices used by certain car insurance companies and driver education classes use to monitor driving habits for safety’s sake. So this tax is going to make all of that go away. MADD (Mothers Against Drunk Drivers), and Flo, and the rest of us can all piss off, thank you very much, and defer to the tax man. End update.

Obviously, the Obama-wannabes have figured out that electric cars do more damage to roads than low milage cars, the same damage as normal cars used by the poor, and much more damage than trucks and SUVs. And you though you knew everything. Well, know this:

Anyone have a bus for the congressmen?

Privacy is out the window

Wialon

GPS Tracked (Photo credit: Wikipedia)

The winning strategy seems to be a GPS-based gizmo because that way they know what road you are driving on (but that does not mean the builder and maintainer for that road will necessarily see the tax money). But that also means that when they collect and compute your taxable driving history, their system will have access to the when and where of your travels.

The problem with that is this: because the gizmos remain the property of the State, the data they collect is considered public property, in this case, public information. ANYONE can petition the State to reveal public information, unless specifically sealed by a judge for a limited number of allowable reasons, non of which allow blanket assignation. It’s IN THE CONSTITUTION.

I speak for Oregon, of course. But most states have similar laws. And make no mistake; this new taxing scheme is coming to you, soon — one, three, and five states at a time. The fascists are coming, the fascists are coming!

That’s OK with me. I will just go get one of those 7,000 fully automatic assault rifles DHS purchased for ‘personal defense.’ It is, after all, a personal matter to me, and I do need to defend my homeland from fascists. I swore an oath to do so.

The tax man may cometh, but he may not walk away with my money… unless he brings a SWAT Team. But I lament too much. There is good news in all this. If you don’t drive any miles, you can more easily afford GMO crop control.

On False Flag Zombie Attacks in July


When the CDC starts talking about zombie attacks, DHS buys more ammunition than God and calls out all Federal Agencies to prepare for (something) at 100% strength with two weeks notice… while a Zombie blockbuster movie scares our pants off… there might just be something to worry about.

When do Zombies act on behalf of National Security?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Federal zombies may be in our future

OK, this might be tongue in cheek. MIGHT BE.

Future Post Office Poster? From notrightinthehead.net, a collection of more than interesting Zombiesque material (click)

But it is completely factual (scary movie music rises). I just saw a couple of video blogs (streaming Web radio) where one of my kindred spirits (translation: conspiracy theorist, or on a good day, as we prefer it, investigative reporter) was interviewing someone claiming to be in the know: DHS, FBI, FEMA, and just about every other agency, military as well, have been ordered to bring all manpower, reserves, and resources, to 100% capacity by July 3, and to stand by for further instructions.

I’m not comforted by the fact that ALL the search engines can NO LONGER FIND THIS WARNING no matter what I type in (it would have helped if some of the words were not in use in gazillions of other vids, too). Thing is, two days ago, it was EASY to find using the same words. Who has the power to do that? No matter. I’m on the job. A few ones changed to zeros in government’s Internet won’t stop me.

Note: This kind of censorship and information manipulation is one reason I formed nnn.osp.org to create a 100% citizen-owned-and-operated wireless Internet alternative where there is no ISP (no monthly bill), no government or corporate censorship, spying, or control: YOU are the Web!

In trying to solve that problem, I encountered something which revealed even more useful information than I was searching for. The CDC is apparently involved, too. We are talking about a terror drill involving a ‘fake’ outbreak of (something awful). Wince. Gee. What could that be? Well, I got to thinking. Recall the CDC warning about what to do if a zombie attack broke out?

Well, they claimed that was tongue in cheek, too. But I’m starting to wonder. Have you seen World War Z? Nothing seems far fetched after that! I mean… first CDC puts out the defense guide… then DHS buys enough ammunition to kill all the extras in WWZ (and every citizen in North America, with order quantities in Satanic numbers, no less)… not to mention enough coffins to take care of the half-eaten bodies… and now DHS, FEMA, FBI, the National Guard, (and CDC) are manning up for something very big.

And even if not Zombies… let us not forget that some guy named Kokesh (not related to David Koresh) is planning a ‘Million-man’ armed march on Washington, D. C. on July 4th. I mean… Damn! I don’t know what it means, but what I’ve more recently learned does not make me feel any better about, it all…

Why is terror drill set to coincide with Scout Jamboree?

Terror Drill Set for Scouting Jamboree

The orders for these agencies are to be at 100% by July 3rd, and then to stand by. Turns out, unless a cover story for a general Martial Law (you don’t suppose Kokesh is going to end up in a shootout with Feds, do you?) move to seize power by the New World Order, that there is to be a terror drill in Yellowstone during the Scout National Jamboree (July 15-24). But wait one minute; is it not true that at almost EVERY major terror event blamed on some turban wrapped, kidney machine toting, Koran spouting man with a beard… that there was simultaneously a terror drill of the same exact sort taking place at the same time?

Is that not the HALLMARK of a false flag operation? You create an exercise or drill on the same date in the same community for the same kinds of details (e.g., type of attack, type of target), and then, if the people really responsible (no turban, kidney machine, or Holy book) happen to get caught before they can pull it off, you say ‘It’s OK, they are with us, and everything is coolness.’ Where have we seen that used before?

A few places. The Sarin gas attacks in Japan. Sept. 11. The London Subway bombing. Bombing in Madrid. The Norway mass shooting. Even Aurora and Sandy Hook. Retired Army Intelligence Officer, Captain Eric May has said, “The easiest way to carry out a false flag attack is by setting up a military exercise that simulates the very attack you want to carry out.”

Are Zombies real after all?

Zombies on parade

Again, ‘tongue in cheek’ can only go so far to making one comfortable about the facts. Also while searching for the missing radio show links, I instead found some disturbing video — tons of it, in fact, which claim to evidence real Zombie attacks, including one faked ‘secret FBI briefing.’ But only one of these bothers me enough to deserve sharing, as it is a montage of real news stories that are quite shocking and, collectively, imply there are real people out there who are certainly acting like Zombies, and who are apparently quite hard to kill, too.

But that’s not the only disturbing thing about the video.

The second is found at the end of the long-winded (classified) reading of a (classified) Bill on the Senate Floor that (classified) seems to regard some kind of (classified) serious catastrophe, and what government is going to do about (classified.) At the very end, as if a causal afterthought of NO IMPORTANCE, the reader quotes, “and draft a NEW BILL OF RIGHTS.”

E X C U S E    ME?

A new Bill of Rights? What’s wrong with the one we have such that once this (classified) happens, it is no longer useful? To me, the ONLY scenario where that makes sense is if the country has become an official Police State under perpetual Martial Law, the result of a military (classified.) Well, let me tell you if I see even a hint of that taking place, I’m going to (classified) and (classified) and all of (classified) had better double their (classified). Even if they claim it was the Onion Congress.

Well, that’s all I can think of to say about something that is so far fetched and based on ‘less than mainstream’ resources. So I’ll simply leave you with the original video which started the whole thing off. I did find it. But I warn you, it is not the sort of thing I would normally care very much about paying attention to now days, given the veritable flood of such ‘sky is falling’ reports on YouTube.

However, I also remind you, in my book set Fatal Rebirth, and resulting screen play published on the Internet in 1999,  that the sky was going to fall in New York City, raining passenger jets upon the World Trade Center, and resulting in Middle East Wars. Some of us Chicken Little’s base our warnings on a bit more than conjecture. You can get a free ebook copy of Volume One, and see what else I’ve correctly predicted, and what things I’ve warned of which have yet to transpire.

It also behooves me to add, here, that as a specialist in privacy/security who helps targeted individuals and deals regularly with Political Control Technology… that I should mention that some estimates are that the government has created up to two million ‘sleeper’ agents using Manchurian Candidate mind control methodology. If true, we are talking about programmable people who can, with a simple text message or other signal, be launched off on almost any kind of mission with no recourse or understanding. Blindly obedient.

Such people can be made to believe any unreal circumstance, or believe themselves to be anything or anyone, and are often capable of exhibiting super-human traits (such as seeming to be bullet resistant). I’d hate to think about what would happen if a flood of such persons were unleashed thinking themselves Zombies. They soon enough would be, for all practical purposes. I’d not want to be in their warpath. World War Z, indeed.

Revolt Against Mongressanto: GMO Crops Torched in America


Though a controlled media is suppressing the story, 40 tons of GMO crops were torched, prompting an FBI investigation. We The People do NOT WANT GMO, and if the Monsanto Congress does not watch their step, arson will become outright violence, and from there, even lead to revolution.

Why were sugar beets set on fire in Oregon?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Who is Oregonians for Food and Shelter?

Update June 22, 2013: Additional research reveals some interesting things about the who and why behind the $10K reward offered for the beet burners… at document end.

Are Monsanto and Syngenta GMO criminals?

What you will learn reading this post…

  • People are taking the law into their own hands to kill GMO production[
  • There is an apparent media blackout, even on the Web;
  • The government is ramping up for what may end up being another WACO/Ruby Ridge standoff;
  • We may be looking at the Boston Tea Party of 2012 just before the next American Revolution.

Who is the earth liberation front?

Rebirth of the early Earth Liberation Front?

I Can’t Believe I’m the FIRST and ONLY one to report this on the Web.

Our new Boston Tea Party?

Our new Boston Tea Party?

NOT ONE MEDIA OUTLET outside of local circles has dared to mention it, perhaps because government fears that if the public learns that other people are getting fighting mad (literally), they might join in, and become an actual revolution. It was only reported locally live on KXL Radio and echoed by the Oregonian, where the ONLY Web mention exists, hard to find because the headline wording is carefully avoids the most likely keywords for a search — took me rather a while to find it. Here’s the scoop — PASS IT ON!

40 Tons of GMO Sugar Beets were set ablaze in Eastern Oregon, yesterday. FORTY TONS — the entire acreage of two full fields of crops IN THE GROUND were set ablaze over a THREE NIGHT PERIOD OF TIME. That means ARSON. And I have to say I am cheering! The only way could feel better about it is if I had dared to do it myself — which to be clear, I would not: I don’t look good in prison orange, and would be too worried about possible loss of life if things went terribly wrong.

Evidence is that 6,500 plants were destroyed BY HAND, ONE PLANT AT A TIME. That, in turn, implies A LOT OF PEOPLE were involved: would you want to stick around once a fire was going and wait to be discovered? No, someone (many someones) probably wanted to move as quickly as possible. WE ARE TALKING ABOUT A MOVEMENT, a kind of ORGANIZED REVOLT — and this is exactly the kind of retribution I’ve warned was coming; when lawmakers and corporations refuse to honor the Constitution and instead engage in ‘legalized’ criminal acts such as enabled by theMonsanto Protection Act.’

This is all shades of… well, the BOSTON TEA PARTY. Instead of throwing tea into the harbor to protest taxes, someone was throwing flames onto crops in the ground to protest New World Order shenanigans. We are a long ways from Boston, but more recently we have the Earth Liberation Front, a group which also had its roots in Oregon (I love my State and our people; we have core beliefs and fight for them). The ELF, in 2000,  burned the offices of a GMO research project at the University of Michigan, a project funded by the Federal government and Monsanto at the time.

The ELF, or ‘Elves’ as they are sometimes called, is an ad-hoc group with its actual origins in the U.K. But forest mismanagement caused splinter cells to be established in Oregon, and subsequently, Michigan and elsewhere as new corporate wrongdoings became evident. Like the IRA, they have an official, public side, one not associated with criminal adventure, and instead focused on educating the public on the issues, such as the Gulf oil spill. They are a kind of militant Green Peace, perhaps.

But ELF cells normally come forward immediately to claim responsibility, because to them, its all about publicity to educate the public. Since there has been no statement, I’m deducing it is simply Oregon Farmers who have said, ‘Enough!’ Another clue that may be the case is that this comes on the heels (two weeks) of Japan’s rejection of the entire Oregon Wheat crop for the year (a tremendous financial blow because over 80% of Oregon Wheat is exported) because ONE report said ONE field was contaminated with at least ONE GMO plant.

The rightful fear is, because of pollination processes, once you introduce a GMO crop of a given variety ANYWHERE, the wind and insects will spread its genetic contamination to non GMO fields, and thereby ruin the ENTIRE INDUSTRY for a region. In fact, Oregon farmers have tendered a multi-billion dollar class action law suite against Monsanto, joining a long list of states doing so. Monsanto has experimented with GMO crops before they were approved in 16 states. They were supposedly all destroyed, but state after state is finding out the hard way, that Pandora’s box has been deliberately left open.

But while other governments in Europe and elsewhere are passing laws to ban GMO crops, and burning entire crops themselves, in America, our government is passing laws protecting Monsanto from legal repercussions, and therefore, it seems, farmers are forced to burn the crops, themselves. This means that where in other countries, citizens are being protected from corporate crimes, in America, citizens are forced to become ‘terrorists’ to survive. That’s how blatantly corrupt our corporate police state has become, I’m afraid.

Can GMO spark an armed revolution?

First Blow For the Revolution?

In this case, both fields belonged to the same Corporate Agricultural giant known for embracing GMO, though trying to do so quietly, another reason perhaps big media has kept the story from reaching the Internet. We are talking about Syngenta. Nowhere on their US Web site will you find mention of GMO, but that is exactly what the company is about. They have even lied publicly in writing on this issue with a public declaration. Yet their very corporate name shouts GMO.

But the FBI, and local media knows better (and now, you)… because apparently someone from the Syngenta operated farms mentioned the fact as a possible motive for the arson. This is a serious matter in many respects. It throws down the gauntlet and says, WE ARE MAD AS HELL AND ARE NOT GOING TO LET YOU GET AWAY WITH THIS BULLSHIT ANYMORE! But it also raises the stakes and put lives and property at risk, and if it goes wrong, could end up sparking an armed revolution.

Imagine the likely scenario: the FBI identifies a particular non GMO farmer as being participant and puts together a 100 man assault team to surround their homestead, land they’ve been farming for generations. What do you suppose would happen if they stood their ground? You would have another WACO standoff, another Ruby Ridge. Do you suppose that the other several dozen participants in the crop burning would stand by and let them pick them all off like that, one by one? I doubt it.

They would muster every rifle their families could carry, and call in farmers from adjacent counties, and likely be joined by some number of citizens from the local communities, and surround the FBI and other local authorities. They might even be joined by local Sheriffs, if not out of sympathetic understanding and general GMO angst, then in hopes of defusing the situation. I’m telling you, this can easily get out of hand.

And in a way, I’m hoping it does. Because I think WE NEED A DEFINITIVE EVENT to send a CLEAR MESSAGE and draw a line in the sand: NOT ONE INCH MORE — BACK OFF! It would rally the informed to action, stir the Sheeple to understanding, and FORCE THEM to take a side, lest they end up in a possible cross fire if shooting breaks out everywhere GMO crops and corporate properties exist, and their executives live.

Even though it could easily spark a full-scale revolution, I’m still for it. That threat is not lightweight, either — it is incredibly easy to start and carry out a successful revolution. I’d be tickled pink to live in America, once more, a country based on a social contract called the Constitution and Bill of Rights, where government was BY THE PEOPLE, FOR THE PEOPLE, of the people, and not a fascist police state in the making BY CORPORATIONS, FOR THE NEW WORLD ORDER.

GMO? Burn, baby, burn…

Mongressanto? You may just be next.

Who are Oregonians for Food and Shelter?

Update: The Who and Why of the $10,000 Reward

‘Oregonians’ for ‘Food and Shelter’ sounds like a charity that provides food and shelter, but that’s not right. Their Web site describes themselves in terms which, after thoughtful consideration, would leave you believing them a non profit NGO, a special interest group (SIG) of professionals seeking to educate their peers in the latest timber and agriculture technologies. Closer to the truth, is that they are a Political Action PAC, putting out their own Voter’s Guide, and involving themselves in political matters impacting timber and farming.

Their members are a who’s who of AG and Timber, but with a specific bent toward biotech… specific biotech. Their Boards and Chairs are well peppered with people from Monsanto, Syngenta, and other firms with a vested interest in GMO, and firms they do business with. In fact, there are even two firms represented who have had consensual dealings with Central Intelligence Agency fronts. One of these was harmless and related to fire-fighting, but the other (Portland General Electric) was tied to much darker matters, though I’m sure they were not quite aware of such details. But then, those same folks also went to bed with ENRON (also a CIA operation), didn’t they?

The OFS founder is one Terry L. Witt, who cites himself as a professional Manager of Non Profit Groups, as though you should go see him if you have one in need of management. Really? The Web site was founded in 1999. Within a few months, Terry was writing in support of Monsanto’s patent infringement suit against a farmer over GMO crop migration (contamination) such as faced by Oregon Wheat growers. It would not be the first time he would play hatchet man for GMO, additionally using op-ed in the Oregonian to disinform on behalf of (again) Monsanto.

Indeed, if you look at the one and only truly informational page at the Web site (despite the fact they list three topics to choose from – the other two have no links provided), the topic is… you guessed it; pro GMO. So what is the real agenda, again? But perhaps we should overlook this narrow view, because they do point out their Web site is still under construction. What?

Established in 1999, and still under construction? Could it be because the Web designer is (whois information) Troy, Terry’s son, operating out of their $700,000 home in Tigard? Hmmm. Troy has his own business (he is a photographer and ‘lead designer’ at a ‘design studio’), and his Web site is even more under construction: it consists ONLY of a logo (ergo, my use of quotes). There is not even a statement on being under construction since created in 2005.  “Focused Marketing, Messaging, and Design,” the logo claims.

This could be the trait of (choose one):

a) someone not very good at what they do;
b) a CIA front;
c) a corporate front for money laundering (e.g., payments from Monsanto);
d) a front or over billing a client (e.g., Monsanto);
e) a clever ploy to distract conspiracy theorists and waste blog reader’s time;
f) all of the above.

I’m sorry, but I come away with the distance impression OFS is nothing but a surrogate for GMO interests, and thinly veneered, at that.

That’s the WHO and the WHY of the $10K reward.

Frankly, given these facts, I’d rather someone  offer a $100K reward if they would all simply go away.

Flight 800: At Last! I’m no Longer a Conspiracy Theorist!


For nearly a decade I’ve been trying to get media and the public to examine some simple proofs of a conspiracy we call Flight 800 Friendly Fire; the downing of a jumbo jet killing 230 souls with a Navy missile fired in a war game exercise gone wrong. They only wanted to call me ‘just another conspiracy theorist.’

NOT ANY MORE.

Was flight 800 shot down by a navy missile?

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

NTSB admits Flight 800 shot down

http://www.proparanoid.net/800i.htm

DISINFORMATION!

Seven years is a long time in Sheeple years (1 year in Sheeple years = 40 years of apathetic stupidity) and most Sheeple don’t even remember what Flight 800 was about, and some readers here may be younger and simply have no clue, or wish a refresher. In simple terms, Flight 800 was Trans World Airlines 747 jet bound out of New York late evening on July 17, 1996. Twelve minutes later, the plane and all 230 on board were lost in a fiery crash into the sea just off of Long Island. No one knew why, but rumors quickly sprang up that it was shot down by a Navy missile. Even military witnesses said so.

Even faster, the Wag-the-Dog disinformation engine of the U.S. Navy, Department of Defense, CIA, FBI, and the rest of the Federal Government launched one of the biggest criminal conspiracies of all time to cover up the truth. From the very beginning, I quickly involved myself as investigative writer because I quickly spotted traits of disinformation at play, and because I was compelled by a very credible claim that friendly fire was to blame by a revered source.

Non other than Pierre Salinger, former Press Secretary for Presidents John Kennedy and Lyndon Johnson, and former ABC Newsman, said that he was calling a press conference to reveal information from a CIA informant confirming the fact. But he had been set up for a fall with one of the oldest tricks in the disinformation handbook (as result, I wrote the 25 Rules of Disinformation to expose such tricks — my most famous and most read work with over 25,000,000 downloads); he was to become a strawman sacrifice to quash the rumor and associate it with ‘an untrustworthy Internet.’ Hence, the Salinger Syndrome. It destroyed him, but he is a hero for it.

I won’t explain the details of that, here (there is plenty of detail at my Flight 800 pages), nor much else about Flight 800 or the three-year running battle with Federal agents I and other civilian investigators had to endure to simply seek the truth and justice. I will only say that they used every dirty trick to shut us up they could muster, including sending out whole teams of FBI agents to intimidate us in person, Naval Intelligence people to pump us to see what we knew (pretending to be ordinary citizens), and I even got death threats from a foreign agent. Surveillance? You bet, including multiple vehicle tails, various aircraft, high-speed chases, and literally having to walk around Federal and local operatives to get from one side of a public venue to another. They wanted us to know they were dogging us.

But the one OTHER thing they did universally was to discount us by calling us ‘conspiracy theorists,’ and then ignoring anything we had to say. When the NTSB report finally came out, I personally had a field day combing over it and pointing out the obvious lies. They had falsified evidence, concealed evidence, and manufactured evidence to prove it was an electrical short which exploded a fuel tank. But that was also clearly impossible as even their own report showed. For each such point I’ve just mentioned, I was easily able to offer three different proofs. See my Three Simple Proofs (look for the small image of the gold NTSB CD a ways down the page).

But I was merely a ‘conspiracy theorist,’ and so, they still ignored me. Not one local news director would air my material, and the Oregonian flat refused my editorials. Of course, every major Network at the time was owned (controlling interest) by a major military contractor making Navy missile parts. Never mind that the proof was easy to illustrate. I was a conspiracy theorist, and THAT, was that. “Don’t confuse us with the facts, our minds are made up for us.”

Fast Forward a little.

The report finished, only one thing remained. The head of FBI, who personally monitored material I posted to my Web site (I cannot tell you how I know this without someone at FBI getting into a lot of trouble), and the head of the NTSB investigation, all resigned their posts at the end of the affair (publishing of the report), literally walking out on a scheduled meeting with a waiting collective of fellow civilian investigators, family members, and other ‘conspiracy theorists’ who were refusing to buy magic fuel tank explosion as ‘fact.’ They could not bear to look them in the face and lie to them in person, it seems.

With their resignations, NO ONE had ANYONE they could officially speak with, no one who would listen to, much less answer questions or challenges regarding the lies and blatant evidence of same. This was true in the halls of government, and in the newsrooms. We were all once more easily dismissed; conspiracy theorists are political and social zeroes in government and media circles. That’s why government loves to label dissenters. Pick a label, any label… in a political storm.

Fast Forward a LOT.

TODAY! On the radio today I heard that several NTSB Investigators have come forward and publicly admitted that the official report was doctored, stating flatly it was impossible that the fuel tank was responsible, and that there was indeed (as I had not only been saying, but showing) evidence of missile fire; it was a massive cover up.

What this means to YOU.

It means that conspiracy theorists (the good ones, like me – if you will permit me to so claim) are merely investigators forced to wear a label. It also means that many conspiracies are REAL, and self evident by the conflicting information in the official stories, and the cover up efforts and disinformation which follow. A cover up is itself proof of a conspiracy. You cannot have a cover up unless there is something to cover up, and its existence proves not only the crime is real, but it cannot even be undertaken except by a conspiracy of multiple parties to effect cover up; two interlocking conspiracies in one.

The lesson is: QUESTION GOVERNMENT, they lie. QUESTION THE OFFICIAL LINE, it has holes. QUESTION MEDIA, they are bought.

I urge you to read about Flight 800 at my Web site. There, you will learn things no other investigator has revealed. I was the only one to discover and illustrate the actual fraud in the NTSB Report. I was the first one to identify the ship most likely to have fired the missile (and subsequently visited by a foreign Agent making a death threat on behalf of their country — which should tell you something about the accuracy of my claims).

It will show you how easy it is to pull the wool over a Sheep’s eyes, and make us all into Sheep. It will show you how easy it is to fake it, and to make the public believe an unreal thing. It will reveal how easy it is to have a controlled media. It should leave you with a much greater respect for Truthers, and for conspiracy theorists, in general.

But why should I care, you might well ask? After all, I’m no longer a conspiracy theorist now that my theory has been proven FACT, and the conspiracy proven REAL, right?

WRONG. As long as Mr. Sorento and his crew run government, or others of like mind succeed him, there will be fresh lies to expose, new crimes to investigate. In fact, I’m working on a backlog, because that man and his cronies, like all Globalist Presidents, has more dark plots and evil deeds to dare than one conspiracy theorist, alone, can keep up with. Pray for me!

Care to help me out in other ways? All it takes is to pay attention, ask questions when facts conflict, and challenge government and media when they don’t get it right. And challenge the guy standing next to you when they don’t get it, because Sheeple are a terrible thing to leave running around loose in a Wolve’s playpen. If you ask me, that’s just plain good citizenship.

Or is that yet simply one more way of saying ‘terrorist’ in D.C.? Move along, Citizen, nothing to see here. Move along.

Sorento Secretly Installing Total Surveillance Society


15 Terrabytes of data on every Man, Woman, and Child in the U.S., tracking every trip, call, text, email you make, every URL you visit, every purchase or financial, social, and political action you take, all to profile you so they can predict you and blackmail, jail, or vanish you if it becomes convenient. Welcome to Herr Bush/Clinton/Sorento’s Total Surveillance Corporate Police State.

But wait… I have a simple $7 SOLUTION!

The NSA is secretly establishing the Total Information Awareness Office!

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

This particular post is intended to serve as recap and extended explanation of key concepts covered during a four-hour radio show interview with Clyde Lewis on Ground Zero, Friday, June 7th, 2013.

What you will learn reading this post…

• The nature of a Fascist Corporate Police State as defined largely by cooperative surveillance and spying upon ‘client’ citizens.
• That the National Security Agency (USARMY) is secretly implementing the Total Information Awareness Office under Sorento despite its being banned as unconstitutional by Congress, originally a Bush-Cheney plan;
• The Role of RFID (Radio Frequency Identification Devices) and PROMIS back-door spy software in TIAO;
• That traditional redress of grievances no longer remain a viable remedy TIAO;
• How you can spend just $7 to thwart the $2.7 billion dollar spying operation.

How can seven dollars stop government and corporations from spying on us?

How Fascism defines a Corporate Police State

NWOlogosIn America, there is something called a Social Contract between government and We, the People; the Constitution and Bill of Rights. That document makes We, the People, clients to a government body who we employ to serve our needs for societal functions; to govern and provide for the common good and protection. That is a sacred trust as well as a contractual obligation to government to so perform, and the contract additionally provides mechanisms for redress of grievances when government fails to fulfill its duties properly.

In America, We, the People also enter into financial contracts with all manner of big businesses; banks, phone companies, Internet providers, health care providers, insurance companies, and more. These contracts obligate these firms to provide select services with a certain fiduciary and legal responsibility to adhere to simple, basic guidelines of operational limits with respect to the privacy and security of our personal information entrusted to them.

These limits are essentially the same in scope and detail as those provided for in the Constitution and Bill of Rights, though perhaps spelled out in different terms. We are talking about the right to protect not just the privacy and security of our person, property, and information, but the rights of redress, freedom of speech, and so forth. No contract we have ever signed with any major firm has forfeited these rights or provided firms with any form of blank check to violate them. But that is what has happened…

Both government and most major corporations have grossly violated and betrayed every one of these rights.

How can you spot a corporate police state?

A clue:  when both government and big business act in collusion to violate those rights, and do so under Color of Law (twisting or claiming legal basis, illegally usurping the ‘power’ to violate our rights) — you have a Corporate Police State, a fascist regime.

What defines a corporate police state?

Another clue: When the intelligence community partners with or invests in Google and Facebook (and on and on) and uses their Web technology to spy on you (and in some cases to target you)… when the intelligence community accesses without warrant your email and your phone calls through partnerships with your Internet Service Provider and your telephone company… when banks report to the government your financial transactions and your medical and insurance records are available to Internal Revenue Service-enforced insurance companies… you are in a Corporate Police State, a fascist regime.

what is a corporate police state?

A final clue: when the government seeks to catalog every single activity, transaction, and event in the life of every man, woman, and child, regardless of if related to business, personal, public, or private affairs, and then employs sophisticated methods to psychologically profile and predict the individual, including sexual preferences and ‘practices,’ and saves all such information for use against them should they become ‘politically incorrect…’ you have what is called a total surveillance society, which also defines a Corporate Police State, a fascist regime. Below, we will see that is exactly what is about to take place in a matter of mere weeks.

Welcome to Sorento’s Corporate Police State.

What is a corporate police state?

Why we no longer have redress of grievances in America

In just a few short months of Sorento’s usurping the power of a pre Magna Carta King (claiming for himself the power to murder a citizen or vanish or torture them without due process or explanation under the NDAA), we have learned of an endless onslaught of exactly such proofs of the true nature of our government’s form as reviewed above. Almost daily, we learn our Constitution means nothing, and there is no redress seemingly possible, save perhaps that of armed revolt, always a serious question, but also much easier to effect than imagined. Governments literally make their own gallows.

Our Court System is too costly and slow to reign in Color of Law mechanisms (unconstitutional laws, executive orders, etc.) used to suppress rights; they can write new laws faster than we can challenge them, especially since the offending clauses are buried within innocent legislation. Because our Congress does not even read the Bills it signs, and is so full of subversive New World Order types (members of the Council on Foreign Relations, the Bilderbergers, Trilateral Commission, Skull and Bones, etc., all working to end national sovereignty in favor of a North American Union under one-World leader), we might as well give up on any help, there.

Our elections are a farce, there being no true difference in the hidden agenda of the power brokers of one party or the other, who collectively decide in back rooms who we get to choose from on our ballots in a two-party Dog and Pony Show. We are always offered candidates who are both marketable based on ‘publicly declared’ beliefs and agenda, but who in truth share a true common secret agenda and darker beliefs. We can prove this; the darker policies of Clinton were continued by Bush and then continued yet again by Obama, and yet once more this posting proves it when revealing the TIAO project being secreted within NSA.

Should poor Barry claim yet once more, ‘I didn’t know anything about (NSA=TIAO) until I turned on my TV…’ then he will have no choice but to arrest and try everyone in Command at NSA for treason. No. Instead Congress should be talking about arresting them AND Sorento, and Clinton, and, likely, Bush, Cheney, and Rumsfeld. But fat chance of any of the above, of course, as there IS NO REDRESS remaining in America. The fix is in.

Our media is bought and paid for, owned outright by essentially four corporations made up of more power Elite Boards of Directors and controlling shareholders from the New World Order crowd.  The Internet is slowly but surely being transformed into something ever more friendly to spying, censorship, and corporate/government’s total control. There is an Internet Kill switch in our near future, as well as a tax on every use. However, the Internet is where we will find the seven-dollar cure, thankfully, as disclosed at the end of this Post.

Sorento has ordered 30,000 drones to the skies to spy on us. He is spending up to 5 million per city to fund installation of surveillance cameras, some with microphones. As previously described, he has been working with the top Internet Service providers (e.g., Comcast, Century Link, et. Al) to insure every email and URL visit is accessible to government. He has done the same with every major cell phone carrier to allow access to our calls and text messages. But he was still not done, and now we learn of one final straw designed deliberately to break our backs…

What is Total Information Awareness?

Total Information Awareness is Reborn: Remember the TIAO?

Now we learn one more truth which reveals the full horror of our true predicament: Sorento, in continuation of plans started by Bush, and continued by Clinton, is having NSA (National Security Agency) quietly build a gargantuan secret new surveillance monitoring facility in Utah, and a somewhat smaller one to expand the existing facility at Ft. Mead, Maryland… in order to quietly and illegally implement the Total Information Awareness Office mandate already outlawed by Congressional decree as an unconstitutional, immoral, and intolerable invasion of privacy.

The TIAO was a military concept proposed under former Secretary of Defense (under Bush I) become Vice President (under Bush II), Dick Cheney, and former Secretary of Defense (under Ford and Bush II), Donald Rumsfeld, and former operator of CIA/DOD’s Operation Phoenix (mass assassination program of civilians during Vietnam War), and convicted felon (5 counts of obstruction of justice and lying to Congress about his illegal activities in Iran Contra), John Poindexter, Rear Admiral USN, Ret., and former head of a CIA front involved in health care database management systems.

TIAO was a Defense Advanced Research Project Agency (DARPA) plan to track every ‘transaction’ of every citizen, just as described in the teaser at page top. A transaction is defined, according to the original White Paper and Request for Proposals which I have personally reviewed, as going through doorways, passing before cameras, making a purchase or selling something or any other financial transaction, traveling, undertaking a communication by voice, fax, data, or any other information access or exchange, even to include mail and public libraries. In short, TOTAL INFORMATION AWARENESS.

It managed all this, in part, by backdoor access to corporate databases via directly partnering with businesses or by covert use of PROMIS spy software developed by CIA and embedded at every opportunity within popular commercial database as well as custom written database management software. Since all major corporate Intranets (private corporate Internet-like services) rely upon a telecommunications backplane (PBX phone systems), and because every major maker of PBX equipment includes (by buried legislation) a receptiveness to special signal codes which allow covert remote access by the military, triggering PROMIS infected database back doors is a simple matter.

Note: This fact was confirmed to me directly by a highly placed technical expert working for Lucient Technologies, a major supplier of PBX gear; his explanation as to how government was able to access and effect surveillance of any phone extension or computer within the corporate offices where I was working at the time. He revealed that clients were not to be informed that these backdoors exist.

What is RFID? What are Radio Frequency Identification Devices?

The Role of RFID

Two RFID tags of the smallest kind. paloaltofreepress.com (click)

The ‘secret weapon’ component of TIAO was to be RFID technology, those little Radio Frequency Identification Devices which are currently everywhere: they are in your money ($5 and up – though debunkers claim they are merely polyester strips designed to thwart counterfeiting… but polyester does not explode in a microwave, though it will melt), in most newer credit cards, many drivers licenses, all Passports, shipping labels (and soon, postage stamps), transportation tickets, and almost any product you buy (soon, all products). If you have bought Gillette razor blades, Max Factor make up, Pampers, and any of thousands of other popular items from ink pens to computers from any major retailer, you have RFID all over your home and, likely, on your person.

Cash registers, bank tellers, secure access doorways, turnstiles, security cameras, and just plane hidden sensors anywhere can be modified to scan and learn the unique serial number of an RFID tag (which it reports upon radio command at distances of several hundred feet, and even through walls when special equipment is employed for the purpose). Once a tag is identified with an individual in a database, everything they do while possessing it can be tracked and cataloged. RFID devices are often large (I’ve seen as large as two-inches square in mailing labels) and easy to spot, but they can also be as small as the period at the end of this sentence .

Note: The tracking bioimplant, Digital Angel (aka Mark of the Beast) manufactured and sold by CIA fronts, is nothing more than an RFID tag with Web/Cell phone GPS technology added, a feature common to many RFID chips installed in cell phones (common to most new phones), watches, ink pens, ankle and wrist bracelets, and other devices intended to be tracked. The original part number of the first known RFID application to ‘track inventory’ was a Boeing Aircraft component with the number 666.

In fact, there is an insidious form of it known as Smart Dust, so small they can float in the air, and even be directed up or down on currents of air as if operated by a glider pilot. These (motes) are sometimes placed on persons of interest (one way: ‘air puffer machines’ at Airport security can ‘sniff’ for explosives, or plant smart dust in your hair and clothes). These migrate from person to person in general contact with one another, and permeate anything they might handle and any place they might sit.

Smart dust can do more than track, with select motes capable of sensing (some dedicated thing) and communicating one with another to act with a hive intelligence. This allows them to report information as if a more traditional complex surveillance system, triggered remotely by laser beams perhaps a mile or more distant.

The US Army can and can track RFID at select points along American highways, railways, and some waterways (esp., ferrys, bridges). This is a key tactical component of the Canamex Corridor which will serve as precursor to and lever for the North American Union. Combined with the other ‘transactions’ earlier cited, as well as feeds from security cameras and drones using advanced facial recognition, license plate readers, and other biometric and tracking methods, not to mention the full array of telecommunications signal capture, NSA can process bulk data without human interaction for analysis,  reporting, cataloging and storage, or undertake requested analytical tasks against specific targets, or sift through information to locate or focus on select targets by human analyists.

If you suddenly are deemed politically incorrect sufficient by almost any given person in the chain of command at NSA, the military, FEMA, DHS, FBI, CIA, the White House, or almost any other government power center, you could be quickly psychologically profiled to see what kind of targeting would best reduce you to a social, financial, and political zero, or to predict your every move in case it was felt you needed a visit by Men in Black for ‘special handling.’ That could mean anything from scare tactics to arrest and detention, to torture and vanishing by murder.

That was the TIA as originally envisioned, and it was so horrifying to anyone with an inkling of understanding of words like Constitution, Rights, Freedom, and America, that even our Globalist bought Congress said “NO!” But Bush, Clinton, and now Sorento have blessed covert continuance of the military plan. The new NSA facilities will become at some level, the de facto TIAO without so declaring, according to NSA expert, James Bamford.

This whole affair is especially significant in one way which is quite calculated and extremely dangerous to your family’s future…

What is less obvious but truly significant is that TIAO establishes the only difference between all failed despot-driven tyrannical rule-the-World attempts through history and what is taking place right here, right now in America. Specifically, the technological advances you have just read about might actually let them pull it off. All prior efforts failed because once the people understand their prediciment, they can elect to revolt, and it then becomes a wild-card battle with no way to guarantee victory to the despot. Too many people doing Lord knows what quietly and acting out suddenly without warning.

Once NSA goes online with TIAO, however, within a matter of Months (by this September at soonest), no activist, no gun owner, no politician, no law enforcement official, no judge, no news reporter, no person of wealth, no citizen, and yes, no criminal or terrorist, will be able to make a move without it being documented, analyzed — duly considered and potentially countered with quiet surgical attacks before the move can even be completed.

Yet — will they use this powerful tool to prevent terrorism or criminal acts, the sole basis for justifying the tool in the first place?

NOT ON YOUR LIFE. They will be used ONLY to maintain and tighten political control (why it’s called Political Control Technology of the Military-Police-Politico Force Matrix — as defined by the Revolution in Military Affairs).  They dare not use it for something as unimportant to ‘National Security’ (their definition being security of the people in power) as might be seen in a terror plot on a school or a city, unless it happened to include an attack on the President or someone key to the Power Elite.

To risk doing so would risk revealing the true power and capability of the TIAO tools, and thereby, risk full-scale revolt by those in the Military and Law Enforcement who still understand and obey their Oaths of Office. Besides, every terror or criminal act carried out empowers them to effect more political control; government benefits thereby.

I’ve already personally done more to fight terror attacks in America as a citizen than they ever will be able to claim by using any weapon of Political Control — though Bush took credit for my efforts as if his Administration’s own.

Therefore, NSA, via TIAO, will be able to pick us off one by one as we wake up and start to exhibit politically incorrect thoughts or take actions which do not serve or go along with the interests of those in control; the corporate friendly thugs running a fascist police state for the Globalist agenda.

First they will go for Anon and Anarchists, and you won’t say anything because you are not Anon or an Anarchist. They will next go for Truthers and 99% crowd, and you won’t say anything because you are not one of them, either. Then they will go for the rest of the Activists and Conspiracy Theorists, and you still won’t say anything. Then they will start to go for the investigative writers and newsmen, and lawmen, and politicians who do start to question, and you still won’t say anything, because if they can take them out, what could YOU possibly do.

Finally, when they come for you, no one will be left to say anything on your behalf.

What can we do to stop wholesale spying on citizens?

A simple $7 cure

Only you can prevent Fascism (click)

There are many things you can do. Make clear to your Congressman that you will not tolerate a secret TIAO and demand the NSA be reigned in, and (almost literally) NUKE the project in Utah and Ft. Mead; level it to the ground. Demand reversal of all post 9-11 legislation that deals with ‘terrorism’ by taking away our rights to privacy. Demand the 30,000 drones never reach American skies. Demand an investigation as to who really runs this country with the aim to kick Globalists out of government posts, starting with criminals in the White House and Congress. We need a political purge.

Become politically incorrect, question government, protest as a 99 percenter, Truther, or activist of some useful sort; be a functioning participating citizen! Make yourself heard above the rhetoric of a controlled media.

And one more thing, as I promised…

Spend $7 (or more if you wish) to join NNN OSP, the Nodular Netizen Network Open Source Project to create a 100% citizen-owned-and-operated wireless Internet alternative. Why? Because ONLY citizens make it up, there is no corporate ISP needed and thus no monthly fee. There is no government control or censorship, no government or corporate spying even possible; YOU are the Web!

If just five people join in each neighborhood, it is sufficient to assure its existence and success, creating a communications channel which is beyond NSA’s ability to access. In fact, the ONLY way government can access NNN communications is to go directly to the sender or reciever; the data does not reside anywhere else along the chain, and never passes through a government friendly corporate portal. And, once NNN OSP becomes popular enough, it will also support VOIP with Smart Phones and take away TIAO’s access to voice conversations, as well.

Visit nnnosp.org to learn more.

There are many, many features and benefits not even possible on the WWW. There are even ways the NNN can make you money. Become the Web, TODAY… right this very MINUTE!

Once we have millions of members, the message may just get through… errant governments are superfluous to the Will of the People when they can freely discuss in private what they think about their government (or anything else). They will at last fear us as they should… as our Founding Father’s said it should be. Then, and only then, will they do our bidding, instead of the bidding of the Globalist corporate powers.

Can you afford NOT to spend $7 to thwart the New World Order?

 

FREE WILL: A TIs Greatest Asset, Oft Hardest to Employ


What you believe determines how you react under and are able to defend against targeting. That’s a key reason that targets are psychologically profiled before targeting even begins; the enemy needs to know what chains best to jerk. Turns out, there’s a simple way to jerk back.

Free will: a Tis greatest asset, oft hardest to employ

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What can you do if you are a targeted individual?

What you will learn reading this in-depth post…

  • That belief structures define us, establish our psychology, and our responses to stimuli;
  • There are many ways targeting both takes advantage of and yet alters beliefs to weaken the will to resist;
  • Will power equates to Free Will, the greatest gift of God to Man short of salvation through Christ and life, itself;
  • The pitfalls of targeting psychology as it relates to Free Will, and;
  • How to use Free Will to thwart targeting and run psyops on the perps.

Where do you get help if you are a targeted individual?

Challenge][ As author, lecturer, and consultant on personal privacy and security, and abuse of power, I invite the reader, especially if a Targeted Individual (TI), to make a comparison. Compare the nature and content of this post with the typical posts or emailed materials by other persons offering insight into targeting methods or technology, and/or defensive tactics. Then decide which closer resembles the reality of your experience, and which plays instead to the very fears and results ascribed herein to be unexpected weapons. You become what you believe: let’s take an in-depth and lengthy examination, and see…

 

Is the information offered insightful and helpful, or more likely to lead the victim deeper into the proverbial Rabbit Hole of dread. There is a difference between education and helpful advice through understanding (what a consultant or educator tries to provide), and the rhetoric and trivial dialogs of technospeak or psychobabble offered with questionable veracity, something closer to beliefs and opinions, or even mis- or disintormation than well-sourced facts — regardless of if offered with good intent, or ill.

 

Topic][ We are talking about TI’s, Targeted Individuals, of course; persons harassed endlessly by organized groups using Political Control Technology (PCT), which can mean any number of things from gang stalking to electronic weapons, and much, much more. PCT is military and intelligence community developed technology, so if one is targeted, the perpetrators (‘Perps’) are almost always from those quarters, or from parties with whom they interact, undertaken for political or criminal purposes.

 

We should be grateful, in a way, for PCT. Prior to advances in PCT made since WW II, when a person became a roadblock or threat to a political agenda or criminal plot, they were simply done away with; murdered, typically a ‘wet job’ assassination or, if time allowed, dealt ‘an accident,’ or what we call ‘heart attacked.’ PCT, however, allows a whole new way of dealing with ‘inconvenient’ person who are not quite an immediate threat, thus avoiding the pitfalls of murder investigations and unwanted publicity they entail, and dangerous questions they raise.

 

When the target is a person of wealth and power, or public influence, it is less likely to be used. PCT works best on those unable to afford exotic defenses which would render it near useless, if not completely pointless. Those in the public eye may be too well observed already to risk deployment of useful PCT methods without risking detection by third parties. PCT only works when no one believes it is being used except the target. So unless they can first financially destroy or socially discredit such persons, they may elect instead a good old fashioned murder. Ask Vince Foster, Ron Brown, or even Marilyn Monroe or Princess Di. People with high credulity working for them can’t answer hurtful questions once they are dead.

 

Perps often fear victims][ It is fear that such questions might be answered by the target which drives any consideration for either assassination or PCT. When someone is thus targeted, it can be said they actually fear the target, fear them enough to justify ‘self defense’ and pre-emptive action. Thus the TI may actually hold an ace up their sleeve and simply not know it.

 

Part of my job as consultant is to seek to see if that is the case, identify it, and wield it as offensive weapon.  For such victims, PCT was elected as a preferred method not just because it seems safer, but because of the way it works; the goal of PCT is to render the target into a social, financial, and political zero. No one pays attention to a zero, it is nothing of value to them.

 

This targeting achieves by making the victim seem crazy; no one wants to believe in the Boogeyman, so when they start talking about being targeted, they are presumed paranoiac and/or schizophrenic, and discounted.  Once they achieve this status, of course, neither will anyone believe any information they may offer which caused them to be feared in the first place, even if they have evidence which might otherwise raise eyebrows.  But that does not mean the information has no power over perps, if realized and properly used.

 

Other reasons for targeting][ This is not the only reason for targeting, however. One cannot deploy technology without training users on the methods and devices involved, and that requires live, unwitting subjects. In like manner, one cannot develop devices and improve method without experimenting on human Guinea Pigs. This is all fact, and even found in the Congressional Record (Church and Rockefeller Commission Reports), but for some reason, we still can’t quite believe in the Boogeyman enough to consider the possibility that someone is telling the truth when they complain of targeting. Finally, one can also be targeted for joy riding (psychopathic pleasures) or vendetta — both forms essentially an abuse of power through access to the technology for personal reasons.

 

The reason one is targeted often defines the entire game, including best defense strategy. But that is beyond the scope of this post, and indeed, inappropriate — because every situation, though perhaps similar in generic description to another, will have sufficient variables in play such that strategies should be tailored to the individual circumstance. Environmental, social, and personal matters all come into play, and more.

 

 Why won’t people believe it when someone says they are being targeted?

It gets tricky

Self as a weapon][ The first step in targeting is surveillance from afar and the development of a psychological profile, which is the definitive ‘self.’ The goal is to calculate the victim’s likelihood of being responsive to an array of attack options. It also seeks to uncover some key ‘theme’ for the attack psychology. For some it will be guilt, trying to make the person feel they are targeted because they are bad. Others might come to think the theme is to suicide, or to undertake a specific course of action. It can be almost anything, or it may be completely generic harassment without a theme, because we all different psychological makeups.

 

 

Now, while more than one assault method is available, only one will likely be brought to bear at a time, and fostered until it achieves a certain level of success. I call this a calibration phase. Additional targeting methods are brought on line in a sequence designed such that the success in the former better aids the progress of the next, which in turn ideally augments or reinforces the former. While that is not always the case, doing so is a high-value procedural goal; it is important to achieve as prompt a negative impact on the psyche and behavioral responses as possible, so that responses to attack will be seen as being due mental aberrations — rather than the actions of a Boogeyman.

 

Disbelief as a weapon][ Such disbelief as to true cause by onlookers is, thereby, almost guaranteed. Paranoiac responses (e.g., looking over one’s shoulder to see if being followed) are natural when one is targeted, but do not mean the target is actually paranoid. But they immediately seem paranoid to others, even as the process begins. Yet in time, they wax toward true paranoia, as fear and assault from general targeting starts them to questioning more and more events around them in fears they might be connected to targeting.

 

Soon enough, even innocent things are indeed so judged. It is this same mechanism which renders professional spies less than useful, in time, because they start to over react to their daily dread of discovery. Intelligence agents are, by retirement age, generally speaking, quite paranoid. But there is more such as this, to come. This is not mental illness as some count paranoia to be, but rote conditioning; paranoia by reflexive repetition.

 

Imagination as a weapon][ Part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They seek to create a belief that the problems they face are beyond their ability to resist, and other than they really are. Clearly, any onset of paranoiac beliefs will play to this, and create opportunities to put the ploy into full play. Once achieved, when they fight back defensively, they fight the wrong problem with the wrong solution, further cementing the notion that resistance is futile when the effort fails.

 

This ploy is also used another way; to make them think the wrong people, or at least additional people, are involved, but who are not. Targets are goaded into lashing out, if not verbally, more dangerously, that they might get into trouble, and have key support relationships sabotaged, even face arrest or other legal entanglements — or ideally, be forced into mental evaluation and perhaps even institutionalized ‘for their own protection.’

 

Mistrust as a weapon][ On the flip side of this tactic, they often approach persons close to the victim and attempt to subvert them with lies hoping to induce actual participation. They may present credentials or badges of trust, and talk of child pornography or other criminal behaviors, even terrorism, and sow seeds of mistrust and ‘patriotism.’ Once a victim begins to experience such mistrust, they in turn, feeling betrayed, begin to mistrust others close to them. The net result is that they can never be sure who the players and helpers really are, again fostering whole new paranoiac fears.

 

Fear as a weapon][ The above fears are very effective. Yet some PCT is so fearsome, such as bioimplants, that even suspecting it is in use, heightens paranoia. There are many tricks which can cause victims to assume implants in place, or some other dread, when not true. However, this is more commonly the case with long-term victims who have already been well along the paranoiac response path, and have had their beliefs altered well away from the true nature of their enemy. The longer one is targeted, the closer to this state they tend to become.

 

At such a point, paranoia can naturally grow to the edge of schizophrenia in appearance, perhaps better described as the form of hypochondria in terms of ‘sensing’ symptoms (such as where the implants are thought to be placed, or whatever the dread may be). Fear and imagination, when combined in an unending onslaught, can manufacture new false realities of any construct.

 

Once that transpires, or where implants really are in use, it is almost impossible to work one’s way out. Doctors will refuse to inspect for implants, and X-rays won’t reveal them because they are set for tissue examination, and not dense matter. The latest generation of low-cost implants are indeed fearsome: they are far too easy to place without the user’s knowledge (thought to be an insect bite) while they sleep, are extremely small in many cases, and are designed to bond with and look like bits of flesh if uncovered with scalpal. It takes a good magnifier to see signs of man-made tech.

 Who is responsible for political control technology?

Consequences of false beliefs:

To be a helper first of all and foremost requires no preconceptions of what is true or imagined by the target. For the very reasons described herein (false beliefs), alone. But also because even if truly schizophrenic, that does not mean the person is not ALSO targeted. In point of fact, the class of victim who is a test or training subject is often chosen exactly because they are already schizophrenic; there is no possible way for anyone to believe that they are targeted no matter how badly a trainee or test goes haywire. And paranoia, being natural, is actually closer to a proof of targeting than a reason for disbelief.

 

This is exactly why it is so hard to get good helps from the very people who should help (e.g., Cops, Lawyers, Doctors, Politicians), and why I do not prejudge based on ‘wild’ or implausible claims or implied clues that something is wrong with their facts. If, in the end, if the person is schizophrenic, I’ll eventually come to understand that, and deal with it. If they are ONLY schizophrenic, I’ll by then be in a better position to guide them to the proper psychiatric helps.

 

But also, if schizophrenic and actually targeted, the illness will not deter detection of that truth, nor prevent me from addressing it — though it makes it more difficult. And I will still try to help the victim obtain the helps for the chemical imbalance causing their aberration, as well. And that is all it is. It is not being crazy, and if it did not have such a scary sounding name, people would realize it is not that big of a deal to so suffer.

 

This approach is also critical because it means I can ignore (mostly) any obvious or even inobvious false beliefs held by the victim. They are inconsequential to the true nature of targeting unless I myself also rely on the false facts, but I do not, or at least try not to so rely. Ignorance in this case is bliss. However, at some point, any errors in belief structures must be repaired or, perhaps, tested. It may, for instance, be me who has false perception. A good test can teach whomever is wrong the true nature of things, provided their minds are not sealed to logic (that can be the case).

 

The logical path][ Were I able to go into a TI’s home and install pickproof locks and facilitate true site security, render their computer and phones secure and defeat surveillance devices, make various targeting method tests, set up defenses in response, and do the appropriate investigations and analyze victim history — I can make ALWAYS make progress. It may not be total victory, but if not, the resulting shift will see the targeting closer to an annoyance than a trauma.

 

I’m talking about all the things I advise my client Tis to do, of course, since I cannot do it for them at distance (while I do offer direct intervention, it is generally too costly for a TI to afford, as it usually involves securing other professional specialists or services, as well). This is what I do: play 20 questions, give assignments, some of which are tests to undertake, and figure it out as we go. Repeat as needed.

 

Rationalization as weapon][ But victims tend not to follow my advice even after agreeing, or fail to undertake steps correctly, or misconstrue the results, or even reject the advice or conclusions out of hand — all generally because their current belief structures (as to the nature of the beast) will not allow them to yield fully to my advice or to the possibility of another reality. Their minds are closed to logic, and they rationalize an excuse for the subconscious decision.

 

Strangely, this is often even true when the instruction is a test which would make that very determination. My best successes have only been possible when the victim was relatively new and had as of yet had no such strong false belief structures to struggle with. Long term victims tend to have a ‘been there, done that’ not-going-there again approach even though they haven’t, yet, really (at least not in the manner as prescribed).

 

And understand, I’m not saying I’m always right, by any means. I’m frequently wrong; since I am not there, I must rely on the information I’m given, but it comes from people who are not consistently capable of giving me the correct information— because it is all filtered through their belief structure born of targeting falsehoods. Even if I were on site, I myself might be misled by clues or symptoms, or miss something key, or simply make wrong conclusions. So imagine how much harder it is for the Victim, alone in a stressful environment.

 

Desperation as weapon][ It leads to desperation, and in that state, victims do things they ought not. They almost habitually (mix and match) ‘hook up’ with other Tis, seek sexual encounters with strangers; move into places indefensible, write to authorities in an inappropriate manner, spend serious money on foolish or fraudulent defenses, and more. They rationalize wrong choices via hope instead of choosing carefully with logic, and by that same rationalization, discount failures and thus end up repeating the same error, again.

 

Speaking to my introduction paragraph, they tend to believe at the drop of a hat most any technical or tactical explanation or offer for help (especially if a new or unusual method, and for too many, even if seeming nonsense) — especially if it in any way reinforces a false belief already held. And they tend to reveal too much information when in dialogs, further aiding perps in psychological profile and targeting fine tuning. These things they do in hopes it will somehow at last lead to something that does help.

 

The path unwanted][ All this further exaggerates their false beliefs, and then typically in the end they call those same people (with home they hooked up or from whom they obtained information or helps) Perps when things don’t work out as expected. Regardless, seldom will they toss out the newly acquired fears or beliefs about tech. There is such a desire to ‘understand’ the problem, that they consume and eagerly share information constantly, even if there are logical signposts that it is incorrect. Eyes are raised if anyone dares point out such flaws, and their honest appraisal becomes circumspect. Of course, sometimes, the objections are indeed false, perhaps from a perp.

 

Division as weapon][ Thus in the end, the victim community ends up bickering and fighting and being suspicious of one the other. Even though it is sometimes absolutely true one is a Perp (or just as bad in net result, a true schizophrenic believing themselves a victim), way too many thought to be, are not. For those wrongly accused, help is subsequently even harder to come by, as they tend to isolate themselves defensively. Victims end up torturing victims unwittingly in a mass self-reinforcement of victimization.

 

This is why I no longer participate in group dialogs, polls, petitions, etc.

 

And why was false advice given in the first place? When not because the giver was a perp, it is most likely a false belief structure which allowed the giver to sincerely think it would help, perhaps because they used it in their own targeting. But they failed to realize the perps took steps to make it seem like it helped. This takes us back to the opening statement: part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They giveth and taketh away after it has led to more division in the TI community.

 

How sinister the weapons are][ But even when the advice or information is good, if filtered through false belief structures, it will not be useful to the victim as a rule, and for the reasons cited already. It matters not who is giving the advice; me or a TI, or some third party. False belief structures still get in the way, and perhaps, for some individuals, pride contributes; they do not wish to admit they’ve been wrong all along.

 

I can sometimes make decent progress with a long-term victim suffering false beliefs, but seldom as much progress as desired. Regardless, and this is almost always true for all clients, when even a small level of progress is made, the victim gains strength and the will to continue fighting. They become a Survivor, and are no long victim, and that alone is worthwhile. If I can get that far, there is hope that more progress can be made, and in time, it usually is, but every new gain tends to be hard earned… but with luck, at some point, there is an opportunity to suddenly break away altogether.

 

But you often dare not tell a victim they have false beliefs (as I attempt, here) or a key to truly understanding their problems, even once a survivor, because it will probably be rejected along with other advice. They have to somehow come to realize it on their own, and start from zero; that’s when good advice and helps can actually work. Even then, they must also have the will power remaining to force themselves to stop the bad practices which deter helps and neuter advice, as well as the bad habits born of desperation.

What is political control technology?

But then there is FREE WILL

Free Will, the Survivor’s weapon][ Exercise of Free Will, the gift of God which no other can take away unless freely given in submission, is the greatest weapon a TI has: only if they CHOOSE to allow an attack method to have emotional impact, will it be so. Street theater, V2S (voice to skull), and even pain generating tech becomes little more than a bad joke when one is able to simply decide it has NOTHING TO DO with their ATTITUDE and emotion, or their psychology and philosophical approach to daily life.

 

A Cancer victim in constant pain who CHOOSES to continue to live and enjoy life… such a person in such a state is a wondrous thing to behold, because we see they can be truly happy in life, accepting their fate and enjoying life even MORE than someone uninflected because of it. So why cannot a TI do the same? Only because they CHOOSE to suffer the very psychological effects the targeting pushes them reflexively into. But unlike cancer, there is a cure for that.

 

Never REACT][ Instead STOP, THINK, and consciously ACT; stop yourself from reacting, think what your reflexive instincts were telling you to do — and consider if that was not what was expected of you. With that in mind, then ACT contrary to it in some manner, doing so as if an actor in a play. In the beginning you will have to act like an actor, because it will not seem ‘normal,’ but in time, you will find that things get easier, and eventually, reflexive, such that targeting no longer has any control, not even to force you to stop, think and act. THAT will be true freedom; the day you no longer automatically respond as predicted by your profile — because you have created a whole new profile, one which is targeting resistant, and one they cannot understand or deal with.

 

To me, the real beauty of this method is that it is mind control in reverse; the perps become confused, and are rendered victims of your psychological warfare upon them. The accuracy of their psychological profile is diluted and eventually becomes useless and meaningless. The lack of progress and success causes underlings to get in trouble with superiors on up the line. People get ‘fired’ and replaced.

 

They even start replacing equipment, thinking it defective. And from that fact comes a warning: expect attacks to intensify, either as punative response, or in experimentation to see what’s wrong. But they will not want them to get so intense that they damage tissue or leave other physical evidence, so if you start getting microwave burns, for instance, go to a Doctor and get it documented, and photograph them for evidence, and as always, update your log of targeting events with great detail. They will back off if this starts to happen, almost always. If they do not, let me know. I have thoughts on that, too.

 

 

 

 

On the North American Union and CANAMEX Highways


A road paved with good intentions is often made with dark things — in this case the subversion of the United States into the NewStates of America, a mere co-partner within the North American Union — all in turn as support of establishing a one-World Government over six or fewer such ‘unions.’

On the North American Union and Canamex Highways

by H. Michael Sweeney
copyright © 2009, 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included. This material originally from The Professional Paranoid Newsletter.

What is the North American Union?

What you will learn reading this post…

  • The reality of an impending North American Union will be understood;
  • The relationship of NAFTA, CAFTA, will be understood;
  • The existence of the Canamex Corridors will be shown and explained;
  • The Texas Canamex Corridor will be reviewed to reveal examples of just how sovereignty is threatened;
  • The Kansas City Corridor will be reviewed to reveal military-intelligence interests;
  • The possible ties to mass internment and disposal of US populations under Martial Law will be explored.

 What is the Canamex?

NAIPNNetwork

From NAIPN Web Site

This is an abridged version of a much more detailed article from the Professional Paranoid Newsletter. While it was written early in 2009, it remains largely current and especially useful to those who have never heard of CANAMEX in the first place. It appears, even now, to be more comprehensive than any other single Web resource on topic. To get a free emailed copy of the Newsletter with the full article, rich with numerous additional graphics, simply (one or more) comment, like, share, tweet, or rate this post AND email pppbooks at Comcast (net) requesting same and citing your action(s) taken.

Activism, after all, has two ‘I’s in it; ‘I’ believe strongly, and ‘I’ will tell others.

Note: Unlike most of my blogs, resource links are provided in Bibliography form at post end. However, it is extremely interesting that almost every single link no longer works, as indicated in red. A sanitization has taken place on topic since publishing my newsletter: in many cases whole Web sites have been taken down, in other cases, pages have simply been pulled. Only Lou Dobbs and Alex Jones have not been censured. Further, when you attempt to search for new links, the search engines conveniently focus on CAFTA and NAFTA, mostly, but I stand by the facts as I have reported them. Only my conjecture as to meaning is subject to reasonable question.

 What is the true cost of NAFTA/CAFTA?

The NAFTA/CAFTA doorway to treason 

This author has long warned that the NWO would not stop until the US Constitution was replaced with a version which would support a one-World government. The day of the NewStates of America is now much closer than thought, and there are now two avenues by which it may come, either separately, or cojoined. The first is foretold in my book set, Fatal Rebirth, which focuses on the use of false-flag terrorism to force Martial Law and suspension of the Constitution for the purpose. The book predicted Sept. 11 and resulting Middle East Oil Wars. Want a free ebook copy of Volume I?

Now comes a second means: the implementation of the Canamex Corridors under the Security and Prosperity Partnership (SPP), which are key steps leading to the North American Union and the Amero currency, for which everyone denies any such plan exists, just as they at first denied the existence of the SPP, which had already been officially embraced by President Bush and finally admitted to by the governments of Canada, Mexico, and the US.

It is complex. It is important. Frighteningly important, as the reader may soon see for themselves. Therefore, despite aggressive abridgement efforts, this is regrettably the largest single post I have ever made. KISS cannot be applied and well serve the truth. All facts herein are from official Web sites of key players involved. All images are from authoritative sources, mostly from the ‘enemy’s own official Web sites, some DOD materials, and Google Earth images. Some editing to direct the viewer’s attention to select unedited details has been undertaken.

Decades ago Congress approved NAFTA and CAFTA international trade agreements which many opponents described as opening the doors to loss of American sovereignty, not to mention millions of jobs and other forms of equally negative impact. These international agreements bind the US into subverting national and domestic policy to the will and needs of foreign trade partners under the pretext of promoting international commerce. Many protested the veiled goals which were actually intended to move the U.S. one-step closer to a governmental position suitable for establishing the North American Union, itself a step towards a One-World government…

NAFTA/CAFTA cost jobs, and worse, just as opponents warned, and the opposite of promises of what it would do. We were sold lies and as result have had to subvert our laws to conform to the wishes of our trading partners (lost some of our sovereignty) and to the detriment of our own citizens and GNP, trade deficits, etc. Little good has been made evident. Since then, focus of opponents and activists, patriots and outraged citizens, has shifted to try to find and stop whatever the next steps in the globalization of America and the world, were next intended.

It is only a matter of time, it seems, before all of the nations of the world will unite under a single banner. Not too long thereafter, comes a special day, a day called Armageddon. Thus it may prove true that the only way to forestall the end of the World as we know it, is to delay the NWO at every step along the way. A return to good Christian values and beliefs wouldn’t hurt in that effort, either, in my opinion.

What is the Security and Prosperity Partnership? 

The North American Union (NAU) and the Security and Prosperity Partnership (SPP)

For several decades, we activists and our friends have indeed long-feared the existence of plans for the NAU (North American Union), a New World Order goal indeed advanced daily by Globalist groups, especially the Council on Foreign Relations (CFR) and the highly secretive Bilderbergers. These groups are heavily membered and led by the power elite, such as the Rockefellers and Rotheschildes, and the Bush Dynasties, as well as players from the Military-Industrial-Intelligence-Media (MIIM) Complex. Now they come upon us, again, seeking to establish a regional governmental body consisting of (at the minimum) the United States, Canada, and Mexico.

And for decades, everyone in government denied there was any such plan, or a regular group event involved in the SPP. Keep in mind, that the North American Union would require the US Constitution to be replaced with something far less useful to citizens, but much more useful to the megacorps who would profit by the NAU, just as they did under NAFTA and CAFTA. But wait, it turns out the SPP is just the merest tip of a NWO tippy-toe iceberg.

The SPP attempts to marry the military-intelligence communities and the corporate needs of all three nations. It is attributed as the source of the CANAMEX project, which in turn even forms a defacto partnership between Globalst trading partners, the Red Chinese Army, and the U.S. Army, which in turn enables spying on citizens based on their purchases. These partnerships are odd to say the least, and the spying is due a neat trick, but the idea is ‘to share intelligence’ between law enforcement and purveyors of ‘National Security’ between all three nations being sold as a tool to combat terrorism.

Funny thing is, I don’t recall much terrorism in either Mexico or Canada, at least not the sort the America has faced. So I wonder what they really want to share, and why, since citizen spying is also mixed into it, somehow. Who do they really fear? This kind of combination of ‘Security and Prosperity,’ leaves me with a need to redefine ‘National Security’ as ‘Corporate Well Being’ — again sounding a lot like Fascism, to me.

Lou Dobbs (Lou Dobbs Journal) frequently televised critical views on the topic of NAU and SPP. Dobbs also calls it a tool of the power elite which serves only the corporate giants, and he has no problem making the point, especially since SPP is being ‘sponsored’ by more than 20 mainstream US Corporations to include everyone from McDonnell Douglas to Campbell’s Soups. Dobbs and other materials on the Web confirm the declared time line for implementation of Canamex was originally 2010. This goal was not met, thanks to activists, and to Senator Ron Paul’s Presidential election bid, and specifically to the citizens of Texas who have long opposed the earliest CANAMEX efforts in that key CANAMEX State.

How does Canamex threaten national sovereignty?

Loss of US Sovereignty is a one-way road

The Canamex Corridors are strongly supported by the CFR and Rockefeller’s Council on Americas, and similar round table groups both all three countries, and corporate coalitions who, through political PACs, adopt and pocket Globalist friendly State legislators who help establish official State positions favorable to the project. Even in Texas, however, there seems to never be available an actual forum for public debate, and government itself, though pushing through legislation laden with hidden language which supports the corridors, seems not to really know what is going on. That should be a warning sign. We are being sold out by deceit, yet again.

While even Senators still today profess disbelief and lack of knowledge (as most recently in the Presidential race, Mit Romney  said ‘Huh?’), there are already more than 30 Canamex corridors already defined by US DOT legislative funding of highway projects for nearly a decade, now. Of course, they don’t call them that, preferring instead ‘High Priority’ corridors, but when you map them out, they just happen to match the corridor’s talked about at CANAMEX friendly sites. Convenient coincidence?

What is highway project TTC35?

The Texas Canamex redefines Treason; it is called Bush

texas_counties

65 Counties impacted by TTC35,                               and 77 Counties under Martial Law

Even before Canamex was a formal concept, (it has yet to be presented to Congress), President George Bush had opened the borders to Mexican trucks, allowing access to American highways without traditional border stops or truck inspections, with more than 5,000 trucks a day (1.8 million a year) flooding into America. The Teamster’s Union would normally have the job of handling this freight, and objects on both the basis that American jobs are being exported in the move (excused as a NAFTA obligation), but also cites that the typical Mexican truck would fail US required safety standards if checked, a function of Border stops. But then, the exportation of jobs was always one of the secret goals of CAFTA/NAFTA treaties.

We look at Texas, in part because it appears that while Bush was the State’s Governor, he pushed for something called the Trans-Texas Corridor (internally described as TTC35) project. Mexican Round Table groups were lobbying hard at both state and national levels and followed the SmartPort method described a bit later, herein, to rally supporters and fund efforts, even bringing the Red Chinese into the picture. But the prime reason for our focus on it, is that TTC35 as defined by the Texas Department of Transportation would create a new superhighway (termed a supercorridor) forming a paved and largely impassable line vertically dividing much of the State into two distinct halves. This was no State highway for use by citizens at large…

Thus communities along the way which relied upon lesser state or county roads would be forced to pay for their own multimillion dollar overpasses if they wanted and could afford them, or loose all access to what lay beyond — short of perhaps an extra hundred-mile trip to gain a quarter mile’s travel. This would absolutely kill many communities and businesses which depended on existing roadways bisected by the project. Even some farms would be bisected, and financially ruined thereby. Bush did not care.

Presumably, Oklahoma and the rest of the states in its path toward Canada would yield to the method and follow suit, creating two distinctively separate United States territories (or 60 or more if all primary Canamex highways followed suit). That certainly would simplify regional control of populations in the event of Martial Law. Martial Law?

Note: edited out, here was material about both undeclared and declared Martial Law in 77 Texas counties along the corridor, thought to be a test of ability effect sudden control in event of something dire relating to the highway.

Of course, division of the entire nation on such a scale would be untenable. Even in Texas, it was to prove to be so. Nearly 600,000 acres of private land was to confiscated by Texas using Eminent Domain laws without paying a fair value for the property (normally, when a freeway is built, fair value is paid). Farms, ranches, and other properties divided by the highway would be destroyed, as it would be impossible for a land owner or livestock to travel between both pieces of their property in a useful way.

The corridor was intended to be a full quarter-mile to two full miles wide with plans for very few entrance or exit ramps within Texas. Whole communities would be literally walled off from the remainder of their county and suburbs, emergency services, and so forth. The most troubling part about such corridors, which provide both rail and road throughways, is that there would be absolutely no US Customs or Immigrations/Border Patrol intervention along the route, except at exit points designated for the purpose (why there were few exits, we must presume).

SuperHighway

T DOT artwork TTC35: 12 Lanes: No waiting!

As the Texas DOT artwork shows, it would at points near exits have 12 lanes, half of which would be for ‘local access,’ and the others ‘non stop express throughways,’ plus multiple rail lines and power lines for needs along the way. The only other overpasses and cloverleafs planned were for select Federal and primary State highway intersects, some of which are CANAMEX branch routes.

In addition to all these concerns, many Web references talk about dedicating a portion of land in the Kansas City area to be a landing spot for trucks and rail cars from Mexico, which would be considered Sovereign Mexican territory: loss of US Sovereignty. Of course, government documentation uses the term, “Free-Trade Zone,” but language implies there would be no US authority present. This is even a problem for the TTC35 project, and any others like it which might evolve…

A Spanish holding company, Cintra (ever heard of AeroMexico?), under a ‘Comprehensive Development Agreement’ signed by Texas officials (find the actual document link on last page), would have been given the exclusive right to provide all facilities along the highway for rest, gas, vehicle service and repair, retail, and food. Incredibly, a guaranteed return on investment by Texas to the firm was to be included, which is effectively a ‘cost plus’ arrangement which insures over-budget spending in developing such facilities: a boondoggle in the making. This absolute monopoly would last for 50 years, and could only serve to inflate the cost of goods delivered through high take-it-or-leave-it prices to travelers.

In addition, and unbelievably, the construction of TTC35 was to be contracted to Mexican firms who were also a part of the Mexican Globalist coalition, using both Federal and State tax dollars to export jobs to another country. At no time would taxpayers have an opportunity to vote on the project or have a say so in the use of their money by foreign powers, which is another form of loss of sovereignty.

But it gets worse.

Any highway crimes or other criminal matters would not be subject to either Texas or US law! Instead, anyone with a complaint would need to file a grievance within the International Court System, as if that would be useful. Let’s see, I think that Interpol phone number is in my wallet, somewhere… There would therefore, by definition, be complete loss of sovereign control over US soil the full length of the highway. This is the Bush legacy, one intended we might presume, to be a model for the rest of CANAMEX in other States.

The Texas plans were never quite public information, as such. They were first exposed to the public by a grassroots action of a group and Web site called CorridoreWatch(.org), but thus far, the Governor and State of Texas have still refused to discuss the matter publicly, and media has retained their docile, blind eye in this mater, by and large. Regardless, the battle sparked by Corridor Watch would seem to have forced TexDOT and the greater CANAMEX effort to slow down and undergo a change of policy; to adapt existing highways instead of butchering the state and terrorizing landowners and townships in the name of terracorp profits. Regardless, the entire affair shows the brute force being applied under the banner of just the SPP and, dare we presume, the non existent NAU for which the SPP is simply a first ‘baby’ step.

Kansas City and Canamex

The Kansas City Corridor: Highway of Political Control

Top: Phase 1, including SubTropolis; Middle: Phase 2 expansion, including existing USAF underground; 3 308th PsyOps Group and 'Housing.'

Top: Phase 1, including SubTropolis; Middle: Phase 2 expansion, existing USAF underground; Bottom and beyond image: 308th PsyOps Group and ‘Housing.’

But now, we have the Kansas City corridor to look at. Actually, let’s just look at what is going on in the Kansas City area. Like Texans, local and other activists are quite alarmed at discovering that an Air Force Base is being renovated into an Intermodal Hub for transferring cargo between trucks/rail/air traffic along that Canamex corridor, just South of Kansas City. Actually, more than one such military base is involved, and civilian properties, too.

Since we activists are also described variously as alarmists and conspiracy theory nuts, some of us have been forced to meet those expectations. We worry about the usual NWO things and look for clues which might support dark goals, such as declaration of Martial Law in order to force replacement of the Constitution upon us.

We know the goal (the Constitution of the NewStates of America has already been written at the cost of $12M, as reproduced with analysis in Fatal Rebirth), and thus, work backwards to see what steps would be required to meet it. We then compare that with what we see unfolding before us to insure it is not wolf in sheep’s clothing, something much more dangerous in purpose than we are told up front.

Thus we worry about the fact that there is tons of housing on the property which could be used to hold large numbers of politically incorrect detainees that might be rounded up under Martial Law — use of the so-called ‘Red and Green Lists,’ for instance. We worry that the reported underground facilities being constructed (described as the World’s largest underground city in the contractor’s words) could be used to hide the processing of detainees. We worry that the whole center could be used to invisibly distribute detainees to other detention facilities around the country, perhaps to include death camps.

In point of fact, it could, as could any such center, if that was intended. It is no different than it was for Hitler’s death camps, where the Railroads played a key role. Conjecture is fun to amature theorists, but the facts are actually much scarier to investigative writers:

Richard-Gebaur AFB and CANAMEX

Richard-Gebaur AFB Intermodal Center 

The idea is that the AFB was acquired by commercial interests (I think that would be a first for a military base) with the intention of remodeling it into an Intermodal Center, which is a kind of joint hub for varied forms of transportation where cargo may be transferred between them. In this case, we are talking about rail and trucking hubs. Even though the facility is being built on a former Air Base, there is no air service at the site, the rail load/offload sidings being built atop the old runways. To my mind, this is the first warning sign that something is not right with the project: it is quite a bit more expensive and difficult to lay rail on 3 foot-thick cement runways than on open soil. I suspect something is being built under the runway, something which benefits from the protection and sound proofing of a cement ceiling.

First lets describe the center, and then take a look at some other things going on, there. The closer one looks at the matter, both in the micro and the macro, the more one wants to ask tougher questions, and the more such questions we find in the answers. This is a very large elephant, and so we have no choice but to look at it one bite at a time. Richard-Gebaur is located just south of Kansas City, Missouri. It is an unabandoned abandoned AFB, which is to say the USAF no longer uses it, but someone in the military does. I won’t say who, just yet. But they are not leaving, and would seem to have no such intent. They have made room, giving up all but the nuclear attack proof building with the umpteen-foot thick walls and underground facilities, and the barracks and other base housing. Actually, lots and lots of barracks and base housing. More on that, later.

Someone decided it would be a great idea to make the base into an intermodal center — to simply lay railroad tracks on the runway and build massive warehouses with their own underground interconnecting networks and such atop of what used to be hangar pads. Ignore that the plans have areas marked ‘Detention Area,’ (see images below and on next page — four areas shaded pale blue) since that is talking about ground water collection and drainage (at least above ground). But it does get one thinking, does it not, about what might be underground, there?

This is no small project. I could throw lots of massive numbers like acres, square footage, dollars involved, etc. But that’s not what I mean. I mean, you’ve got to line up endless green lights from dozens of government agencies at federal, state, county, and city level, including all manner of DOD brass. We are talking about people not prone to giving green lights without lots and lots of red tape and hoop jumping, some of which might reasonably involve tons of fees or even bribes. But that is not enough. Especially since we are not talking about doing just the RichardGebaur deal, also known as KCS Centerpoint, but no fewer than six such deals — all within an hour’s drive of one another, most of them within a half hour of Kansas City.

In fact, four existing air fields, two military, one private, and one international airport, plus 6 rail yards would be involved, providing highly redundant and overlapping intermodal services for rail, air, and trucking. The Kansas City area already has amassive network of intermodal facilities, but the six new facilities would seem to give it perhaps a 30 or 40 fold increase, based simply by comparing visually (Google Earth) the current real estate devoted to the task against the proposed additions.

In the images found herein offered in support of that claim and others, the reader will find the new projects in green overtones, and existing facilities in blue, with rail lines shown in pink. I would have to ask if it is financially viable to glut the market with capacity, but then, I haven’t been fired up by being offered a slice of the action (phone number at bottom of page, guys).

Which brings us to money — always follow the money when suspicious. You absolutely would need to line up some serious capital for even just one, much less six such projects. So much, in fact, that only an extremely powerful megacorp or megacorp owner (e.g., a Warren Buffett) could possibly afford to play. Think about it for a second. If this was a really legit deal with lots of profit potential, would there not be such a player involved?

There is no Warren type around (and I’m thankful). I wonder why not. No. Instead, in order to get enough funding, they had to do something else. And that in and of itself offers clues.

What is the Kansas City SmartPort or Smart Port?

The Kansas City SmartPort effort

It’s an old parlor trick, of sorts. First you spend a lot of time and money on promoting the concept somewhat quietly (can’t upset the environmentalists, activists, and the like until you have enough momentum to overrun their objections). You promote it to all the kinds of companies that can stand to make a lot of money any time property is developed, marketed, managed, etc.

You need to build a concerted body of like-minded individuals who are willing to take up political, social, and financial arms on your behalf. You create as many organizations as possible of interested parties to develop the idea and further promote it to fruition in tandem, which makes it seem like a virtual ground swell of support. Of course, you don’t tell participants everything, but you do tell them it will make them rich. Greed, after all, is the best salesman known to man.

Such an organization typically needs to fund its own way, so you offer investment opportunities which make the organization itself a vested partner in the venture (and thus, its member firms) and go to work. You can then use your funded and highly credentialed and official sounding organizations to impress green light givers and companies who might be interested in being customers once the sites are ready for business. This would be trucking and rail companies, warehousers, and local manufacturers and other firms involved in or relying upon import/export trade, and service, insurance, and real estate firms who cater to the needs of all such entities, and so forth.

Uh… we find all this at the Web site of such a group, where it lists its investors in promotion of the six sites. The group is something called KC SmartPort, made up of almost exclusively the key players, movers, and shakers who stand to benefit if the six (or even just some of the six) intermodal facilities are actually built. A visit to their Web site will find a comprehensive list of all investors, and almost without exception, they are as described above: realtors, managers, developers, contractors, etc., plus logical partners such as railroads near or already serving the properties, and local civic groups (e.g., Chamber of Commerce, etc.) interested in driving jobs and business to their communities. All very reasonable, of course.

Note: The term SmartPort likely refers to the employment of RFID smart chip technology to control movement and tracking of goods through the Port. That is its own topic of significant concerns, covered below.

Then there is also the KC Area Development Council, Greater KC Free Trade Zone, Inc., and the Mid-America Regional Council, all pretty much the same people saying the same thing from as many different angles as possible. Pretty soon, everyone thinks it must be a great idea. There are even whole Globalist tri-national alignments such as NAIPN, the North American Inland Ports Network, NASCO, the North American SuperCorridor Coalition, and NACC (North American Competitiveness Council). This was enough juice to have all six sites declared Free Trade Zones (2006 Free Trade Zone Act) in just two years of effort. Someone paved the way!

Whoa! A few SmartPort executives, according to World Net Daily, are now even admitting that portions of the SmartPort properties may need to be declared as sovereign Mexican soil! Imagine that. But no one is admitting to the need to create the Amero, the NAU monetary unit not unlike the Euro. That, is another thing everyone denies.

Then there is the other little bombshell one can find in foreign press and on the Web: the Red Chinese Army has heavily invested in the entire supercorridor project. They are paying to expand and modernize Mexican ports and have even been guaranteed profit sharing with Mexican firms who profit from the highway. This could even be a means for support of a military land invasion of America.

OK. We have our army of supporting organizations. Once you have some momentum behind the project, you start dolling out portions of the project to those who might be become prime contractors or service providers, and get them to sign onto the project (e.g., Chinese/Mexican construction firms). This is all done behind the scenes. You go for redundancy, which means that you have multiples of realtors, managers, contractors, etc., all doing the same thing. Nobody sees or gets the whole pie, probably not even a full slice.

Now that could also be a clue, unless you simply say it’s too big for just one company. Normally, however, the greed factor would make one company despise the presence of a competitor, so when I see whole legions of competitors working happily together, I wonder if it is not simply a tool to create something other than the project, itself. There could be unseen goals, and even unseen partners/players. It could even mean that someone has sold 1000% or more of the project (in the way of Mel Brooks’ The Producers, a zany film featuring Zero Mostel and Gene Wilder, Crossbow Productions, 1968). Mostel’s character sold 50% of a theater production’s profits to about six different investors, expecting the play to be a flop so there would be no payout, at all.

If you get a lot of local movers and shakers excited enough, you can start to go public and talk to green light specialists out loud — you have nexus for dealing with environmentalists and other potential protesters. Of course, this whole process goes a lot better if somewhere along the line, the fix is in, or grease has been applied, arrangements already in place. I’ll simply state that if there was any form of conspiracy or NWO at work, it wouldn’t be undertaken unless already assured of relatively smooth sailing. Government agencies (e.g., DOD) would likely already be holding the door open, and there would probably be some boondoggling to go along with it. That may explain why military contractors abound in this particular project.

The above critical commentary on SmartPort stems from review of SmartPort’s’ own materials as well as those of their participating corporate partners, as well as materials related to the various projects as cited on the last page of the newsletter. Review those links to get a start on comparing against my commentary.

Why is there an underground city at Richard-Gebaur?

What lies underground may be lies, indeed

All of this convoluted investment promotion is, however, merely superficial surface discoloration, at best. It is not sufficient to condemn SmartPort or the intent of the project(s) based on their methodology, which certainly may be legitimate, contrary to my conjecture. Rather, the questions raised discolor things sufficiently that we might want to take a closer look. To best do that, we focus at Richard-Gebaur, and how it relates to the players themselves, who indeed deserve a the inspection. Because if there is a hidden agenda, there will be warning signs in both the project and the participants.

Put another way, if we find problems similar to those of funding in both the participants and the project itself, then the picture is far more serious, and conjecture leans toward being factual. Thus, it is not what we see on the surface, but what lies underneath, which is of concern. That is both figurative and literal in meaning, as we shall see: The base itself indeed contains underground facilities designed to survive a nuclear attack, as stated.

The base includes a large command and control building, as well as munitions bunkers, and perhaps other areas which are already underground. The planned intermodal facility is intended to have what is acknowledged to be SubTropolis, which is to say, complete underground city of facilities which are all interconnected. A firm named Hunt Midwest has trademarked the term, and is a major player in the underground portion of the project.

SubTropolis is a viable business concept, and the firm has marketed or participated in several small-scale projects of this kind already. It provides numerous benefits to include improved efficiency above ground, and safety — as there will be less above ground motor and pedestrian traffic. Their participation at KCS represents no reason to condemn the firm or the concept, but it does worry those who fear it could be used to conceal processing of human detainees at the facility, or any other covert operation.

What we need is something which suggests that possibility is more than wild conjecture. That’s a tough assignment, to be sure, because covert operations by nature, are, well, secret and unseen. So where do you look when you need to find something invisible?

What is the military and intelligence community involvement in CANAMEX?

The Military-Industrial-Intelligence players at Richard-Gebaur

If there were any darker plans for the Centerpoint facility at Richard-Gebaur, we should be able to find the footprints or fingerprints of appropriate military or intelligence community players, or firms who are key service providers to them. This brings us to TranSystem Corporation, an international transportation solution firm based in Kansas City, as it happens; a member of SmartPort. They are listed in Janes Aerospace and boast military and aerospace contractors as clients. Might be a footprint, but the company actually looks squeaky clean upon casual review, more like innocent bystanders.

Are there any other footprints to suggest more than just standing around is taking place? Well… yes, and TranSystem seems to partner with them at every opportunity well beyond Centerpoint, to include both military, civilian, and even intelligence community related matters or affiliations. We might presume them to be almost inseparable, in fact with this other firm, but there are no true management ties which make it perfectly clear:

URS Corp. is this other SmartPort player of concern; United Research Services. They are a major US federal contractor serving DOD, DHS, and DOE, and FEMA, and were originally a think tank for DOD. They are a Carlyle Group company, which makes them especially scary to anyone familiar with conspiracy theories having anything to do with the military and or the NWO, and URS certainly has to do with both.

They specialize in refurbishing and modernizing weapons systems and military vehicles and aircraft, and manage entire government installations. The firm was chief manager of Ground Zero recovery processes at the WTC, placing in a key position were there to be any cover up of otherwise useful clues as to crimes other than visually apparent on September 11, such as controlled demolition, or remotely flown aircraft, etc. Read all about those kinds of things in Fatal Rebirth, which was after all ‘The book that foretold of 9/11.’

URS started small and grew quickly not by traditional means, but by gobbling up other defense companies. Notables would include EG&G about which many conspiracy theories have danced, perhaps the most colorful being they serviced Area 51 with aircraft and management teams when it didn’t exist. The first company absorbed, which led to its name change from Broadview Research, was United Research, both research firms steeped in secrecy and black projects for the DOD/DOE/AEC since the inception of those agencies. That, by the way, should logically have included Mind Control projects.

While there is no mention of their direct participation in available documentation, non consensual radiation tests on both American GIs and private citizens, including children, was the kind of research undertaken by these agencies until uncovered and terminated (they tell us) as part of Congressional action against those agency’s mind control experiments. However, the Rockefeller Commission and Church Committee reports both failed to note the details of participating sub agencies or proprietaries, by and large.

FEMA prisoner detention processing center 

The notion of plans for detainee processing at Richard-Gebaur

Since 9/11, URS has managed various terrorism exercises on behalf of FEMA, DOD, and Homeland Security, to involve local communities. They also run the Denver Airport, thought by many activists to be a ‘on-demand’ extension of FEMA, since that agency has its own national emergency headquarters based virtually on site. In the event of Martial Law, the airport would undoubtedly be used to serve FEMA needs, which to those who fear the roundup of the politically incorrect, could also serve the needs of collection and distribution of detainees. So if Martial Law ever is declared, URS will be very close to FEMA, indeed.

These are also the folks (URS) that manage all four of the nations over-engineered disposal sites for chemweapon stockpiles in Alabama, Arkansas, Utah, and Oregon. Each site has approximately a 4000% capacity greater than the entire national need as mandated by UN agreements to destroy all such weapons. They were each built at a cost of hundreds of millions when smaller and less expensive systems would do, and they are only needed for a few short years (after which the weapons will be gone).

So I have been asking all along, what else might they do with these facilities such that they deliberately over engineered capacity and longevity? The answer of course is, that they can reduce ANYTHING (or any body) to hot gases in an instant. That is well beyond where we might allow our imaginations to go, except that we do plan for worst case scenarios in war (against the NWO), and we know the Fascist legacy in WWII regarding the Final Solution.

All of these locations are secure facilities well away from prying eyes, all operated by a relatively small handful of people (and a large number of guards), and all served by rail connections: anything transportable by rail can be destroyed quietly. Thus it is logical that if there was to be a program of mass liquidation or even just detention, URS would want to be involved at key facilities having to do with distribution and disposition of said detainees. To this author, if there is no such dark intent, the participation by URS in SmartPort does not quite make much sense. So let’s look a little closer.

Who is General Joseph Ralston

URS underpinnings

We could talk all day about the evil Carlyle Group and scare any reader, but most readers already know how scary that might be with names like Cheney and Bush previously at the helm. So let’s instead look at URS key people, such as General Joseph W. Ralston, USAF (Ret.) Ralston has served as one of URS directors since October 2003.

He also served as Vice Chairman of The Cohen Group since 2003, which is scarier than Carlyle, headed by three Generals, an Admiral, and even a Lord and UK Defense Minister. Hmmm. Carlyle had a Lord and a lot of Generals and such, too, and Presidents. But Cohen had Henry Kissinger at one time, perhaps the world’s most prominent and outspoken Globalist planner.

The Cohen Group is a blatantly Globalist firm involved peripherally in intelligence matters and deeply involved in ‘Red’ China projects which might serve as a base of intelligence operations. I personally rate it as a spook company (what in the old days would be a CIA proprietary, except that this ‘front’ would serve the needs of the DOD). As such, it likely has at least one hidden agenda in each and every thing it does. While it is not quite so, it is ironic that the emblem behind Ralston (image) looks like CIA’s logo.

General Ralston was also a director of Lockheed Martin since 2003. Lockheed was waist-deep in development of Global Hawk technology this author believes (Fatal Rebirth) was used to facilitate the 9/11 attacks, so it is interesting that he is also involved with the very firm (URS) which cleaned up after the attacks. While at Lockheed, the firm enjoyed lucrative F-16 sales to Turkey… while Ralston was also advisory member to the American-Turkish League, a CIA-veted Turkish lobby group in Washington, and he was therefore accused of a conflict of interest. This is the fascist model: military, politics, intelligence, and business incest.

The General’s military career ran between 1965 and 2003. He served as Vice Chairman of the Joint Chiefs of Staff and, later, Commander, U.S. European Command, and even as NATO Supreme Allied Commander, almost exactly the same career path as Army General, Tommy Franks. He actually has connections within the intelligence community to include an embarrassing extramarital affair with a CIA officer which resulted in scrutiny by both media and Congress, and a team of divorce lawyers.

Both the General and URS share a common trait, which is to have both a public and a private agenda associated with all of their strategic moves. This is hallmark of intelligence operations, as well as of fascist government, not to mention greed. Thus Ralston’s otherwise honorable career is twice tainted with scandal. While not a spook, it would seem that he knows them… a little too intimately. Sorry. Could not resist.

Why does CANAMEX need a psychological warfare unit? 

Spooks at Richard-Gebaur?

That leaves us with multiple footsteps at Richard Gebaur, some suggesting military if not intelligence community shoes were involved. But who really left those prints? Do they lead to a dark threat, or are they merely strolling about for fun and profit as they seem to claim? To find out, lets once more look at KCS, itself.

It seems that the Centerpoint project is not fully utilizing the property, as it otherwise seems to be doing at the other locations. In fact, a look at their own strategic plans shows the base is essentially divided into three parts. Two of the parts are described as phases, a common thing to do in real estate development. If you build it, they will come, but not necessarily in a flood, so you build it in stages. This is legitimate, normally.

But look carefully at the dividing lines shown in both the Google Earth image on the prior pages, and the project plan. The underground facilities already in place are located in the area held back in phase II (another map shows the red-line areas are ‘base’ property). This implies there may actually be another (covert) use intended for phase II which has nothing to do with warehouses, since commercial firms probably don’t need nuke-proof underground facilities. The real clue to the truth may lie in who controls the rest of the base as current resident, one not intended to leave any time soon, and one that might enjoy the original underground facilities, especially if secretly accessed and thought associated with civilian, and not military use.

Why is a mind control part of CANAMEX?

Mind Control is a terrible thing to waste

The question is who is this resident? It is a military unit: The 308th Psychological Operations Group. What? An Army unit on a closed Air base? What for? Psy Ops? That’s a tactical form of mind control used by the military. Tactical means covert, and can include interrorgation (misspelled on purpose, given the current bloodlust in Washington in favor of torture) of hostile prisoners.

Frankly, the whole thing reeks of a frightening hidden agenda complete with a cast of characters and plots (capabilities) out of spy novel about a military coup… exactly what we find when projecting the steps needed to force America toward the NAU.

To repeat myself, in the exotic world of the military and intelligence communities, you plan for caabilities, not intentions, and thus, we should do the same when considering RichardGebaur. The sharing of a facility, especially one with multiple underground facilities which could easily be interconnected with high-security gateways, makes the entire Centerpoint project into a resource which (as a mere speculative capability) remains ‘on tap’ for any military application, regardless of how scary you define it.

Recall that in an earlier Newsletter I revealed that Tom Ridge, the original head of Homeland Security, and his Number One man (Roger Mackin, Chief of Security for DHS,) were both snipers in Operation Phoenix, the Vietnam assassination program run by CIA which is said to have murdered tens of thousands of North and South Vietnamese citizens deemed politically incorrect by the South Vietnam Police? I offered a copy of DOD records as proof.

I only mention the whole Phoenix thing as being kind of interesting for a couple of reasons. One is this: Normally, a Psy Ops group is a support group for a larger battalion, and as such, is based with the battalion. In this case, that would the 10th Psychological Operations Battalion stationed in St. Louis. The 10th actually has three such groups attached to it, but ONLY the 308th is ‘misplaced.’ I wonder why? So let’s look at the 10th and see what is different about them, if anything. Turns out there is something interesting

The 10th was created during the Vietnam War and was deployed there. There it operated under the command structure of something called JUSPAO (Joint US Public Affairs Office), which is generally responsible for, among other things, disseminating disinformation to the populace. In point of fact, many Psy Ops units actually call themselves ‘Civil Affairs Groups’ because their job includes making civilians think something other than the truth — a form of mind control well exercised by mainstream media here in this country, as it happens, and well documented, too…

As it happens, there are declassified Army documents (page bottom) which tells us a bit about JUSPAO activities in Vietnam. Turns out that Operation Phoenix involved USAID (CIA front) and JUSPAO, among others, with specific involvement of psychological operations (and other deeds). Of course, they don’t use words like assassination in the document when describing those deeds, preferring instead the prettier term ‘pacification.’

Additionally, document snippets reveal the 10th was directly involved in the pacification portion of operations, though it generally talks about propaganda leaflets. Thus it seems fairly clear that if the 10th was under JUSPAO command and JUSPAO was associated with Phoenix. Therefore the 308th is tied to Phoenix just as is Homeland Security, if not more.

So now, the ‘wild theory’ about possible covert use of the Centerpoint facility for processing of civilian detainees at the hands of Homeland Security or the military would now seem to hold at least a little water. It is as if Tom wanted his old friends to be with him in Kansas City, when the hard red rain falls. I bet you wonder if he has any other friends going along for the ride. Let’s look…

Well, funny you should ask. Tom Ridge no longer heads Homeland Security, of course. No. He does other things. One of them has him being a board member at Savi Technology, a firm specializing in container security, which includes RFID identification systems. Funny. Also turns out that Savi has partnered with NASCO such that NASCO, a Globalist promotional organization key to establishing the Canamex corridors, mind you, will reap huge profits from the Kansas City corridor, earning a fee every time a container is tagged with the ID chips. No conflict of interest, of course. Oh, but remember the Red Chinese? They also get a cut of that action. Isn’t that special?

And Tom serves on the Board of Lockheed Martin, primary sponsor of SPP, where, lo, it also turns out that each RFID transaction will be monitored. What? A defense contractor monitors shipping containers. You bet, and its called a ‘Center for Excellence,’ the new code word for surveillance facilities. If you check around, you will find something spooky going on in almost any such facility regardless of its outward nature (e.g., colleges, foundations, government bodies, etc.)

No, really. This is not some civilian project contracted to Lockheed, because all such data is going directly into Lockheed’s militarized Global Transport Network Command (GTN) and Control Center. The GTN was specifically developed for the DOD and is operated by the U.S. Transportation Command (USTRANSCOM) at Scott Air Force Base in Illinois. I owe this and the above tidbits on Savi, by the way, to World Net Daily in their review of NASCO, and a little digging of my own, which includes discovery that SmartPort also had to sign off on the GTN/Savi/NASCO deal, according to the 2006 North America Works Conference reports.

But it gets better… er, worse, actually. Savi developed its technology with Lockheed Martin and SAIC (Science Applications International Corporation), a heady mix of CIA/DOD proprietary interests that works hand-in-hand with DARPA (Defense Advanced Research Project Agency) to develop its nastiest, most secret toys, mostly. SAIC’s hallways and executive offices have been no stranger to men like John Poindexter & Richard Secord. You remember them… something to do with Iran Contra? Oh, yes, and one other lesser known little tidbit. They, too were in Operation Phoenix, right at the topmost posts.

Thus what we really have is an intermodal facility which is capable of receiving large numbers of persons by rail delivery who could then be taken underground and sorted into categories, some of which can be accessed by the 308th for questioning and disposition to other facilities as appropriate, be it detention or ‘disposal.’ The entire process can be automated using RFID chipped shipping containers and rail cars, and monitored and operated remotely by the military; no human ever need approach a rail car in the entire journey, save to open the doors, and that can be a military person.

So we see one of the prime companies involved in pushing for and, likely, to be involved in the management of the center also has access to and control of sites suitable for disposal of an endless volume of persons deemed expendable. They are also deeply enmeshed with military and FEMA such as to be a virtual partner, planner, and executor of any declared Martial Law. The footprints lead us in a circle of capabilities about Richard-Gebaur which fully encompass all requirements of any such covert agenda.

Almost all of the key players have something to do with Operation Phoenix, or firms and/or person tied to it and one another like a chain link fence. Worse, they all will profit by whatever takes place with the Canamex corridor through Kansas City, whether legitimate, treasonous, or murderous. This is, again, the fascist model.

While most activists focus on worries about SPP and NAU, Globalization and loss of Sovereignty, the real concerns may be far more dangerous, especially to the activists, themselves, since they would be the first to be on a ‘Red List.’ The greater network of six sites in works by SmartPort amplifies any such concerns. A greater review is in the newsletter, but I’m terminating the blog post, here. It, too, supports the scariest of ‘connectures.’

If one agrees there is more fire than smoke at work, they need not protest the feared conspiracy, they need only protest the SPP NAU and the entire SmartPort project with it. Even if not fearing detention camps or fascists, you should fear the NAU, which is yet one more advance toward the NWO, which is one more step toward the Antichrist’s coming. Hell is not far behind, especially those who choose to ignore the warning.

The truth about Canamex

References

Official information on SSP:

Critical Reviews on SSP:

Official information on Canamex

Critical Reviews on Canamex:

Official information on NAU (“does not exist”)

Critical commentary:

About firms, persons, military:

Does God Ever Approve of Deposing Tyrannical Governments by Force?


When peaceful change does not correct a tyrannical government, what remains is armed revolution — or — docile subjugation. History shows revolutions are slow to come, but when they do, swift to take hold. Yet, there is an important difference between being able to say ‘this government is tyrannical…’ as opposed to ‘This government is Godless…’

Does God ever approve of deposing tyrannical governments?

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Does God approve of revolution?

Reading this post you will learn:

  • Citizens of any nation may believe there is reason for armed revolt
  • That the Antichrist cannot come to power until there is a massive Global revolt
  • That God commands we not revolt against authority
  • But that there may be some forms of government where revolt is not revolt, but just punishment in the eyes of God
Is America ruled by government, or is government ruled by the people?

Who is really in charge? Who SHOULD be in charge?

Iranian Revolution: Governments fall when people unite.

In a prior post we sought by means of two polls, to determine who the real authority and source of power is in America, currently, compared to who is the RIGHTFUL source of authority. If you have not read that post, this post will likely be more valuable to you if you first at least review the Poll, and hopefully, employ it. Now, while the answers are specific to the United States, the question posed in THIS blog post, remain valid for any country under any form of government, even if Islamic.

The reason it applies globally, and as many of my posts point out, we are in a life and death battle with the New World Order, then we are up against powers and principalities who seek to seat the Antichrist. Even if not so, if we feel our government tyrannical and evil, we may be predisposed to considering armed revolt if we see no peaceful choices working.

But also as pointed out, if we resist properly, we can delay the unpleasant and totally fatal End Times that go along with that scenario. That means a Righteous (right-use-ness) fight to assert our right to God’s gift of free will as opposed to an evil (vile-use) motivation.

Scripture clearly tells us that we are to submit to authorities, even if they are oppressive, the example given being Caesar; the Roman Empire, eventually headed by an ungodly man who thought he was a God, and which literally enslaved most of the known World at the time. There are several verses which we should consider to see if there is perhaps any exception or justification for rebellion:

Hebrews 13:17 and Romans 13:1-7 are the primary establishing commands we seek to question, saying, “Obey them that have the rule over you, and submit yourselves: for they watch for your souls, as they that must give account, that they may do it with joy, and not with grief: for that [is] unprofitable for you.” “Let every soul be subject unto the higher powers. For there is no power but of God: the powers that be are ordained of God.”

1 Peter 2:13-14 echoes, “Submit yourselves to every ordinance of man for the Lord’s sake: whether it be to the king, as supreme; Or unto governors, as unto them that are sent by him for the punishment of evildoers, and for the praise of them that do well.”

Thus if we are faithful to God, it seems we must presume even tyrants were given authority over men with God’s blessing for some reason known only to him, and that their authority serves Him in such hidden cause. Yet it also sounds like it is based on the assumption that there is at least some degree of responsibility to protect and care for the nation, to specifically include spiritual care for their souls. And it is true, that even Caesar allowed the captive Jews to worship their own God. How odd was that, when such as he would soon claim to be a God?

So two questions come to mind which may alter the equation, and deserve further consideration.

One: What if the authorities actively seek to destroy God by advancing the Antichrist?

That is, after all, the primary premise which is in play up front and which drives the new World Order movement at its inner-most core. It is one thing to revolt because of tyranny and loss of freedoms, which is certainly a motivation in any revolt. But it is another to do so because the authorities seek to destroy men, destroy their spirituality and lead them to sin, and destroy God. What does scripture say about that?

An answer may exist in the complex story of Nabal and Abigail. Overly simplified, perhaps, for the sake of focus to topic and the limited space of a blog, Nabal was a powerful man of self-assumed authority at a local level who, when some of David’s people came under his power, was harsh with them, and took actions which were a threat to even David’s life by denial of food, offering instead great insult. Nabal worshiped Belial, a name for Satan.

David responds by gathering 400 men in arms to confront and deal with Nabal in reprisal. But one of David’s men warned Abigail, Nabal’s wife, explaining the problem. 1 Samual 25:17 is his conclusion and of interest to answering our question. “Now therefore know and consider what thou wilt do; for evil is determined against our master, and against all his household: for he [is such] a son of Belial, that [a man] cannot speak to him.”

Is that not how powerless we feel in the face of the NWO and their ceaseless crimes against us, plots all against God? Do they listen to our reasonable pleas?

But rather than justifying David’s intended battle, which we might deem rebellion, Abigail intercedes with great wisdom on behalf of and in acting authority of Nabal’s houshold. She brought food to David, and pleaded that there be no battle. David agreed, and Abigail returned to Nabal saying nothing. In the days that followed, Nabal died, God’s judgement upon him.

The story would seem to have no true relevance if that were the end of examination, for there is no Abigail likely to intercede on our behalf within the construct of the NWO (if one exists, please email me, and let’s fix this!). But there is one more passage which does apply. David, as God’s servant in the passage, thanks Abigail for stopping him from attacking Nabal, an act he himself describes as, in afterthought, evil (unrighteous). In part…

1 Samual 25:39 “And when David heard that Nabal was dead, he said, Blessed be the Lord, that hath pleaded the cause of my reproach from the hand of Nabal, and hath kept his servant from evil: for the Lord hath returned the wickedness of Nabal upon his own head.”  In other words, had David attacked, it would have been wrong. He indeed should have left the matter to God, who in the end did take care of it.

On this, then, we see the Bible remains adamant that we not ‘fall away,’ the term for rebellion, even when authority is clearly Satanic and seeks to harm us. And yet, I still wonder… there is the one other question…

Two: What if WE are the authority, and it is our servants that we need take to task by force of arms?

socialcontractThis is one reason why the poll was offered in the prior post. One may find there is a distinct difference between a government based on divine right as addressed by the above Bible admonishments to submission, and government based on a social contract; the Constitution and Bill of Rights. If, in the polls, We the People or the Constitution/Bill of Rights were seen as the ultimate authority, and especially if the poll also showed that the darkness of the New World Order was the true current power, then divine right would no longer seem a valid component.We would not be rebelling against authority, for we are that authority.

We would instead be rebuking those assigned the task of executing authority on our behalf, our public servants. Restated, if We the People deemed to grant the power of governmental authority to those in Congress, the White House, the military, and so forth… by means of a document we (our Forefathers, anyway) penned and signed as their charter of such powers, then they serve us at our pleasure, and should they err and refuse correction, we ought be justified in using force to end the matter, per Thomas Jefferson’s beliefs and intent; the whole reason for the 2nd Amendment right to bear arms of like capability as the military.

Biblically, that would be a Master-servant relationship, and we would still be in compliance with God’s Word to punish our errant servants. A master does not fall away from a servant in rebuking, punishing, or even killing him for just cause, nor does he do an evil thing in the eyes of God. Indeed, it is the servant that falls away in violating the will of the master, and punishment of any kind may be in order according to circumstance.

Luke 12:47 “And that servant, which knew his lord’s will, and prepared not himself, neither did according to his will, shall be beaten with many stripes.”

And one more thing…

If the poll would seem to insufficiently justify the above reasoning, or you otherwise find it unacceptable, the Bible does specify one, and only one other just reason to fall away and not obey authority. That singular reason is when authority commands something which is contrary to God’s commands. You are to obey God, and not man, in such a case.

Acts 5:27-29 (and similar in Acts 4:19) makes clear: “And when they had brought them, they set them before the council: and the high priest asked them, Saying, Did not we straitly command you that ye should not teach in this name? and, behold, ye have filled Jerusalem with your doctrine, and intend to bring this man’s blood upon us. Then Peter and the other apostles answered and said, We ought to obey God rather than men.”

Therefore, we must seek and define just cause for rebellion; such deeds or laws or deciets which prevent or thwart obedience to God. How can we judge if this be the case, or no? Start with what God has commanded, and compare. Look to the Ten Commandments, and we only find two which may qualify.

One: Thou shalt have no other Gods before me. Unless and until we are commanded to worship some other God, this is no justification. If the one-World religion is forced upon us, we might justly revolt, but that is something not expected until after the falling away and the one-World government is established. It is yet for a future time.

Six: Thou shalt not kill. Now we start to wonder if this is not a basis. Wars fostered by deceit to steal resources and confound the God of Abraham by putting Satanic sects in power (Hashemites – see prior post) would seem to be commanding our soldiers to kill for unjust cause. Depopulation efforts such as Chemtrails, Agenda 21 and Codex Alimentarius, and GMO crops is asking us to submit to being killed, and if we do not submit, to aid in the killing of our own children.

Indeed, the laws have already been written to enable and essentially require that we unknowingly allow the State to guide our unwed teens to kill their children by abortion. The 1.4 billion rounds of munitions ordered by DHS likewise seems destined to be used against us. Must we submit ourselves and our families unto death?

Suppose they do at last come for the guns? To do so is the final step in their revolt against our authority. Once they have the guns, they become the Master, and we become the servents; slaves, really. From that moment forward we are forced to serve Satan’s desires of any and all manner without recourse, and no longer have any means to resist. The Antichrist can come to power, and it is End Game.

Does God intend we should serve Satan without a fight, or is that a sin. There are more than a dozen verses on this but the one with the strongest and simplest clarity perhaps is Matthew 4:10 “Then saith Jesus unto him, Get thee hence, Satan: for it is written, thou shalt worship the Lord thy God, and him only shalt thou serve.”

Only Him shalt thou serve.

Him only.

HIM!

And how do we do that? Do we grab our guns and start shooting? It is, after all, relatively easy to start a revolution. I hope not, unless perhaps it is in defense of the guns, that final signpost, that final straw… or perhaps if some cold, hard proof of genocide or like atrocity toward depopulation. But then, we each draw our own lines in the sand, and choose how to resist. I’m thinking there needs to be a way to fight back which does not require violence, one which can be applied more safely, and immediately… by anyone… today. This moment.

There is.

It’s available to us all, and has been all along.

It’s called the 1st Amendment; free speech, and when combined with an even more powerful tool, God’s gift of Free Will, it is all powerful. Become activist and use these weapons, or the entire Constitution and Bill of Right have no meaning for you, and perhaps the Word of God as well, for you may end up being doomed and unable to obey it when it is found to be, for you, too late. You can always just opt out of the system… and drop off their control Matrix (take the Red Pill).

The Mark of the Beast, or death may be your only choice, then — or armed revolt. But if you ever end up deciding the time is ripe for such revolt, I pray you do so in agreement with God’s view of your actions as being righteous (right-use-ness). That is one reason for having two polls to compare one to the other: if we be the rightful authority, than it is not revolt, at all, but due punishment, and not just our right, but our obligation in the eyes of the God.

A Poll: Who Is the Real Authority and Power in America?


I really don’t think we can answer that so easily. Is it Mr. Sorento and his Executive Orders? Congress and their unconstitutional laws they don’t even read? Bankers and the FED? The Military and Arms Industry? The Individual States? The United Nations and their Treaties? The Council on Foreign Relations? The Illuminati, the New World Order? Or… is it We, the People and the Constitution?

Update: May 14, 2013  Preliminary results indicate 75% of us think the rightful power in America should be We the People and the Constitution/BIll of Rights — but only 6% of us think that we actually achieve that ideal. More than 70% think the real power currently in force have nothing to do with government, at all. IS THAT RIGHT?  I hope not, and thankfully, the sampling is fairly small (only 21 votes). WE NEED MORE VOTES to truly get a handle. TELL YOUR FRIENDS TO TAKE THE POLL!
 
by H.Michael Sweeney
Copyright © 2013, all right reserved. Because this involves a Poll, it makes sense not to allow normal reblog. Permission hereby granted to reproduce this blog in full with respect to commentary, including this paragraph, but WITHOUT the pole, itself, using instead links to this blog at the appropriate point. All other links and text must remain in tact.
A Poll: Who Is the Real Authority and Power in America?

What you will learn reading this post and answering a Poll…

  • That there are many possible answers to the question;
  • That each is supported by useful argument;
  • That each is arguably false by countering logic;
  • That God has given us signposts that we might choose wisely;

Who is our true Master in America?

From Hollywood Investigator (click)

I’ll start by saying I’ve been the fool, as I think have we all. Nothing anymore is black and white, it seems, though most of us operate as if it were. That’s how we make mistakes. The visible things on the surface of matters which guide our opinions and actions are more and more subverted with falsehoods and concealments, and manipulation, and yet like the Ostrich, we prefer to believe what is apparent without question. Look where it has led us:

Never before in history has there been so much talk about the end of the World… about global revolution, wars, and rumors of wars… about religious beliefs and disbeliefs, and bitter differences between them. Or about the New World Order, which can only serve to seat the Antichrist and lead to Armageddon… about powers and principalities, plots and conspiracies.

Count me guilty of all such talk. It’s on my mind almost every day, if not the forefront, then nagging at me in the background.  There are simply too many news events where things simply do not add up to equal the facts offered in the telling. Things are rapidly becoming Biblic in scope, things forecast in that very book. The signs are everywhere, even as also forecast. I cannot help but consider, and write. I think we all need to consider, lest we blunder into oblivion. Of course, that may just be me being paranoid, again.

Is it mere paranoia as some say, even hope? Or is it a growing shared consciousness coming to the surface? Or is it simply proper attention to signposts and the very Word of God?

When have we had so many signs in the heavens? So many serious earthquakes and mega disasters? Dieoffs of large numbers of people and animals? So many people in unrest simultaneously? So many wars and rumors of wars? So many sightings of strange creatures, UFOs, odd visions and even noises of no tangeble explanations? So many rare events in and from the stars? When has the Earth been so polluted and ecologically threatened? NEVER. All these things have been forecast.

Ought we not heed them? Moreover, when has there been such a fascination in our entertainment with the occult, witchcraft and satanic things, zombies, monsters, and other dark things including end-of-the World scenarios? Are we being conditioned to accept the Antichrist’s rise to power, that we may yield to the Mark of the Beast more easily?

When in history have there been such vast schemes forced on the masses by a handful of powerful people with questionable agenda? I speak of Agenda 21, the sustainability movement which would deny you the right to own property, have a car, choose where you live, and work, and if you can have children. I speak of Codex Alimentarius which makes natural herbals and vitamins illegal, and forces you to rely on big pharma drugs, and to be subject to inoculations. I speak of the plan to establish a one-world religion which melds everything from Shamen to Buda to Christ and Mohamed and even Satan. I speak of HARRP and mapping the brain so that mind control weapons can regulate thought and mood on demand, and of chemtrails, GMO, and Seed Vaults and race specific pathogens (gene-guided bioweapons) which enable depopulation. There is more such as this which could be added.

The answer as to who is the true authority in charge is a serious question not easily answered, but one which is critical to trying to answer and deal with the rest. In the end, there is probably no useful concensus given multiple ways it can be thought of, born of differing perspectives, and that is why a Poll is being offered. But it is critical that we know, because we are at a crossroads in history which will determine the fate of the World, though most of us are asleep to the matter.

If we are truly at such crossroads, the Bible warns that before the Antichrist can come to power, there must be a ‘falling away,’ a revolt. 2 Thessalonians 2:3 “Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed, the son of perdition;” In the text of King James, ‘falling away’ means ‘rebellion,’ and the day spoken of is the End Days, the ‘son of perdition’ the Antichrist; the rise to power of Satan.

It does not say who wins, and indeed, it may not matter, because the Antichrist could rise from either side of such a battle. But as I’ve said in my prior posts, I believe that if sufficient numbers of people are found to be righteous (right-use-ness) as opposed to evil (vile-use) in application of Free Will, God will let the World continue. I believe Armageddon comes by the dictates of our own actions, that there is no set time for it as Men consider time. And if that is the case, I’d rather have more time than less.

How about you?

Who is the real authority and power in America?

Who truly rules us, right here in America?

Is it Mr. Sorento? The presidency, regardless of who sits. But I refuse to use the other name this man claims, for he is indeed a man of questionable legal authority to hold the Office of the President. If he is legal ruler, why did the military allow troops to decline assignment to combat if stating they did not believe him their lawful Commander in Chief? There is a significant chance he will be proven a fraud in court by some accounts. If a fraud, his Executive Orders and Bills signed into law are null and void. But the real question is, is any President the true power?

Is it Congress? All they do is propose and submit laws to the President. They don’t actually tell us what to do in any direct way. Worse, they don’t even read the laws they vote upon, and never seem to question that massive bills thousands of pages long are ready for their consideration within days of most ‘needs,’ things otherwise unexpected. The Patriot Act was written well before 9-11, for instance. The body is widely viewed as corrupt and acting against the best interests of the country and those who elected them.

Is it the Military? They are supposed to answer to the President, and civilian authority. Yet they have threatened Martial Law, suspension of the Constitution, and a military form of government. They now presume the right under NDAA to murder, vanish, and torture any American without due process. They raid our cities in mock drills. Their documents indicate they intend to shoot Americans demonstrators who protest (they already did so at Kent State), if confronted. Others define a new form of warfare most likely to be faced in the future as ‘Peoples War,’ where the enemy is a group of ‘Ex military, Constitutionalists, patriots, religious extremists, the poor and disenfranchised.’

They have approved a plan (the blueprint of terrorism we now face) called Operation Northwoods, which we find duplicated almost to the letter in terrorism: it was to blow up American ships in harbor (the USS Cole), blow up American buildings (US Embassy Bombings, WTC Bombing), assassinate Americans on our streets (DC Sniper), shoot down remote-control airliners thought full of Americans (9-11 attack), and blame it on (in the plot, Cuba, but it can be used as a tool against any group or nation with the right operatives) in order to justify a war. All of this is detailed in Fatal Rebirth, right down to the circuit boards employed. Want a free ebook copy of Volume One?

Is it the Supreme Court and Court System? They are only called into play as a kind of last resort, and only indirectly tell us what to do on select things which come before them. And yet, they are supposed to be the final, ultimate authority in the scheme of checks and balances which define the construct of our government.

Is it the States, and States’ Rights? The Federal Government is limited in what it can do to force compliance at State level. International treaties cannot be signed and entered into without ratification by the States. It is by agreed upon Union of the States which formed and empowered what we call the Federal Government, for the purpose of doing their bidding for the collective good.

Only by coercing State compliance voluntarily with Federal funding programs are most Federal mandates found sufficiently ‘convenient’ at the State level. But if it is the State, then the question of the Military comes back to haunt us, because there is hardly a standing Army as such; the bulk of the Military outside of the DOD is in the form of National Guards (Army and Air Force units), which are State militia. The Navy, Marines, and Coastguard are the exceptions.

Is it the County Sheriffs and local law enforcement? If there were large-scale civil unrest, and/or a move by the Federal government to enforce gun controls deemed unconstitutional, who is the true local authority over you, when so many Sheriffs have unified themselves to tell Sorento they would not enforce such laws and would even arrest Federal agents if they attempted to do so. So important is this issue, that we now learn that in response, Sorento is asking to form a whole new Federal law enforcement agency (itself thought unconstitutional – a National Police) to arrest Sheriffs who take such a stance. Who will side with whom, against whom, when push comes to shove?

Deputize me, and Barry will find out. And know this: it will take only One Governor to order his National Guard into D.C., and one Constitutionally loyal General to arrest and detain anyone guilty of treason as result of such forced confrontations.

Is it FEMA and/or DHS? A state of Emergency was declared because of Sept. 11 attacks. It has not been lifted. The FEMA Charter under law gives them absolute authority over almost everything in such declared emergencies, including the Military. If you read the list of what they control and can do, you would say Hitler would have envied their absolute power. Yet we see no visible signs this is being exercised… unless you are observant. Their vehicles can be seen driving our streets, and Police-like uniforms are being worn here, and there, with FEMA patches. They are too quiet, methinks…

Much the same can be said of DHS, which was created by the Anser Institute, a shadowy military-intelligence think tank. It was formed exactly two years prior to Sept. 11 attacks, almost simultaneous to the Project for a New Amrican Century’s war plans for a series of domino wars in the Middle East to gain control of natural resources, and give power to puppet governments run by what they called in their PowerPoints, Hashemites. The Hashemites are an ancient Satanic sect predating Allah that involved opiates in their religious ceremonies, and are brethren to the Assassins, of like construct. Their historical trails will lead you to the Knights Templars, to Rosecrucians, witches and warlocks, to Masons/Freemaonry, and to the Illuminati. DHS has ordered 1.4 billion rounds of ammunition and is doing all manner of things dark and sinister which cause many people to think them planning a war with American citizens.

Is it a Secret Shadow Government? Unseen string pullers. I call it Shadow in my book set Fatal Rebirth. Some call it Illuminati, perhaps in the form of the so-called Round Table Groups (evolved from Knights Templar meetings), like the Bilderbergers, Council on Foreign Relations, and even Rhodes Scholars. Some say it is the high Freemasons, Skull and Bones, and the like. Others think it the Jewish Cabal (bankers, mostly, primarily due the Rothschildes influence, but I maintain they were Knight Templars who assumed Jewish identities to avoid persecution by the Pope). Such forces do exist and make themselves felt, and all those elements cited can be seen as a collective. But do they actually rule, or are we grasping at paranoiac straws? Do they really control all power in order to seek the New World Order, and to seat the Antichrist, as first suggested?

Is it the FED and Banksters? Wallstreet & Culprits, Inc. This rightly belongs in the Shadow category, but it is such a singular force in American life that it deserves to be listed separately. What one giveth, the other oft takes away, resulting in yo-yo financial forces which define our economy in ways which in turn define our politics and national policies. Attempts at to police them tend to be negated with ease by these institutions, who repeatedly bring us to the brink of fiscal doom and then propel themselves forward with profits galore, often out of thin air. But seldom do we gain or recover our losses from wealth redistribution to their favor.

Is it the Corporations? Big Pharma? The Oil Companies? Military contractors? The Board Rooms of legally defined living entities seem to hold sway over Congress and even the President. Monsanto writes laws which give it a blank check, submitted to Congress by their pocket Congressman, and Monsanto backed PACS contribute to other Congressmen to insure passage. Then the President not only signs the Bill into law (deliberate lower case, I refuse to believe his signature lawful), and appoints Monsanto kingpins to guide the FDA to ‘oversee’ Monsanto. We see the same thing in Big Pharma, in the Oil Industry, and in the Defense Sector. The fix is in. The public trough is for sale to the highest bidder; it should be renamed corporate trough, because the Public cannot access it — we just pay for it.

The Constitution and Bill of Rights? This is the very charter which defines the organization, operation, limits and authority of all branches of our government. Without it, there is no authority of the President, Congress, or the Supreme Court. And yet, it does not actually rule us, as such. And most certainly, it seems to be loosing its power as both Congress and the President continually issue laws and executive orders deemed to violate and negate it. This is why so many people deem our leaders to be outlaws, and why Sheriffs are starting to say ‘NO!’ It’s why many people are buying guns, and talking about Revolution being a real possibility.

It’s the primary reason I write, in fact.

We the People? We are, after all, the ones who authored and empowered the Charter. It has no power except that which we gave it by our signature (Founding Fathers), which means neither does the President, Congress, etc. have power but that which the charter affords. We are supposed to be the ones who control government, giving it limited powers to manage our nation for us. Government is supposed to be a tool which works for us, not the reverse. They are supposed to fear our anger should they err, we are not supposed to fear our government, which is more and more our sad state.

Who really rules, as opposed to who is the rightful ruler?

The Poll, in two parts

From thoughtful blog by ‘Adesk’ (click)

So please use the Poll so we can see if there is consensus as to who is the RIGHTFUL ruler, vs. who truly rules at the moment. There are, therefore, two parts: who is the PROPER final authority in the power structure; and who do you think really controls us, currently? These two answers will define much of what follows; our fates, and as I fear most likely so, our judgment by God, and, more to the point, how soon it comes to pass. Will that be two o’s or three (SOOON!)?

Please use both polls; you may vote for any THREE choices in each (e.g., the three branches of the Federal government, the three most conspiratorial choice, etc.). The closing comments show why it is important to answer both polls, and will lead to the first of two analysis posts which logically result.

 

And here’s why it’s critical we know the answer to BOTH polls, as we will explore further in parts II, and III… if there is a dichotomy in the two Polls’ results… where the current power resides not in the hands of the rightful authority, then should not that be rectified? If, for example, the rightful authority is We, the People or even the Constitution, and we find any other in power instead… then ought we not be seeking in earnest to change that?

And more to the point, if we see there is no peaceful way to effect such change, there is a more key question we must ask (part II):

Does God EVER approve of deposing tyrannical governments by force?”

Part III will be a specific analysis of Poll results once sufficient votes are cast.

How to War With the New World Order (Checklist)


No matter how simple the weapons and tactics of war, you need a checklist; an action plan which is your method to the madness which is war.

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How to drop out of society

Continuation of prior post: a checklist on how to drop out

Exit the system, stage left

In the prior segment we introduced the notion of going to War with the New World Order by defining the problem, the underlying mechanics and principles involved, and getting a good look at our enemy. If you have not read that, and especially if you are skeptical that such a War MUST be waged, please read it now. We closed with Step Two of how to take the War to our Globalist enemy: Drop out of the System. That, in turn, opens up a series of possible tactics from which one might choose to employ, offered here as if a checklist for customizing your battle plan.

To repeat an important consideration, don’t expect to jump in with both feet, but rather, ease into those things which seem easiest to accomplish, and then expand upon them as opportunity and ability allows, and in like manner, move into other areas. Unless one simply happens to have the needed resources and capabilities in place, it is not likely even possible to undertake all of the ideas simultaneously: Some of them you simply might not care for, or accept as viable or workable with respect to their goals or your personal circumstances. Don’t feel you need to follow these suggestions any more than you need to ‘play their game.’ After all, it is about free will choice; God’s greatest gift to Man short of life itself.

And that’s exactly what we are trying to stop the New World Order from ending. Free Will.

What do I do to drop out of the system?

The Checklist

Don’t buy into the system: Don’t rely upon credit of any form. Debt is control, a thing admitted through history by bankers themselves. They sell credit to you with the promise of instant gratification and convenience, and even ‘perks,’ but the price is not mere interest, but firm control which locks you into their system. Once there, they own you and are assured you will not easily revolt. The banks and lending institutions, and the retail creditors, oil companies all… all rely upon credit to trap you into a Debtor Control System some call the Matrix, or the Grid.

Then there is the endless electronic transaction trail it generates which is of great interest to TIAO (Total Information Awareness Office — since renamed Terrorist IAO to make us think we are not the true targets of interest) to track your every movement. TIA is designed to eventually detect and record any and all forms of social transactions where information, money, or property changes hands, and even to calculate psychological profiles and future actions based on that information.

If enough people stopped using credit religiously, the banks would falter and interest rates would be less artificial and manipulative. The shockwaves would have a negative, inflationary impact on the economy, especially for MIIM corporations, because the dollar would falter against foreign competitors, seeking its true value (0).

Since the bulk of the National Debt is held in the form of Bonds owned almost entirely by the wealthy elite who make up the NWO, their financial power base is eaten away from within by the very stuff they covet most, which dwindles in value and usefulness. While a bad economy also has a negative impact on personal situations, it also hastens the general public’s realization that MIIM’s system serves them more than us, and will lead to more converts over time, and lead to victory and the chance to rebuild anew. That is the long term effect.

In the short term, forgoing credit and relying instead on alternatives herein not only saves you interest (money), but allows you the freedom to choose what you will pay with. In essence, it makes it easier for you to survive a bad economy by relying instead on an underground economy, ignoring fake Federal IOUs in favor of the truest currency of all; value given for value received, in a transaction where each transactional party dictates what is of value, and its worth.

For instance, there are barter institutions which allow you to trade goods and services for other goods and services — no money or little money needs be involved at all. They act as a kind of ‘bank’ trading ‘credits’ used in such barters for a small percentage of the transaction — much less than would be the interest in a credit-purchase situation. But of course, you can also effect barter with individuals directly, often providing increased flexibility in coming to an agreement.

Be careful, however, when using services, because there are tax issues which generally force such services to report at least select transactions, and that may be undesirable. The System is trying to make barter unworkable, even illegal. But in an underground economy, such concerns are no different than highway speed limit signs when hurry, you must. You can simply offer to trade directly with those you personally do commerce with most often. Offer to trade excess items or items you make, or services, for whatever you want. There are people who live completely by this method, not even paying rent with cash or credit, though such is rare. I could tell of wonderful outcomes with barter, personally.

Somewhere, if you ask around with persistence, you will find someone who is willing to trade, and in such a case, you mutually agree upon values and no one, not even Uncle Sam, gets a cut in the ideal circumstances. Enter Craigslist, and the like. Of course, there will be things you cannot easily barter for, many of them essential, such as certain foods, rent, and utilities. We will address such needs elsewhere.

Don’t fund the NWO brand names: Determine what companies belong to MIIM, and boycott their goods and services, and do not buy their stocks. That means some hard decisions. If the company is a military contractor, or a multinational, or owned or controlled by one (a subsidiary), it is a company you should avoid doing business with and one worthy of constant public condemnation in activist style. Also, avoid purchases of any precious gems or metals, since the great bulk of the mines are owned by the NWO — else why to think they push these commodities so hard by selling fear and uncertainty?

Unfortunately, this means doing without certain goods altogether, such as new cars and appliances as technology advances. It IS OK to buy used, if it is not going to be financed. I drive a six year-old car and use a six-year old computer — and they work great. I am not so far behind the technology curve as to ‘hurt.’ I might spend more on repairs but have no monthly payments and the original cost was well below new — so it costs considerably less to give up a little prestige or performance, or whiz-bang feature. Doing so means the system is not profiting by my presence — I am not participating. You can amplify upon this by growing your own food (to be illegal under Agenda 21 and Codex Alimentarius), making your own clothes, and similar self reliance.

Don’t buy the advertising: Boycott the newspapers, magazines, and media outlets owned by MIIM. Obviously, you will need to keep up with the news, somehow, despite the fact that you know you cannot fully trust any such source for complete honesty. I suggest TV can stay, or perhaps radio, but NEVER select ONE news source (channel, station, commentator).

But whenever you hear an ad for a product on ANY mainstream source, or see one in a magazine you happen to read despite your strategy (e.g., waiting rooms), take a moment to write a letter, even if a form letter, to the advertiser(s). Do not use Email for the purpose, for only a written letter will have impact — and then, only if it is business-like and polite. Don’t wax as politically indignant as might I; “Dear Fascist: Regarding your sinful and shamless partnership with XYZ Media in their evil plot to…

Better idea: tell them you do not trust the media source which aired their ad and believe it biased, because it is owned by (insert the appropriate military contractor or megacorps, here), and thus, you refuse to buy their products because they are paying for disinformation to be disseminated. If enough people did this religiously, advertisers would be more careful, and Media would falter, its income stream hampered and profitability down. It might even wax honest.

 

Don’t be tracked by purchases: Demand retailers destroy or remove RFID chips on products you buy, and protest their use. Most will have no clue, so educate them at the register, perhaps forcing a call to a Manager… simultaneously educating those waiting in line (no angry rants — just calm explanations and politeness). In the end you will likely need to destroy them yourself (microwave oven for tiny ones, scissors, shredder or burning for larger ones).

Items where removal and destruction is not possible should be kept in a foil pouch when not in use (this includes some state drivers licenses, passports, and other chipped items). Pull clothing tags and similar, and destroy them, shred purchase documents unless you are desperate to be allowed a return or warranty remedy in event of a defective item, in which cass.. Simple discarding may not be sufficient for such items if you think you are being sought or surveilled; trash is not your friend, it is a data mine. Don’t pay by debit card unless it is prepaid and not tied to you by name (one reason many places don’t accept prepaid). Cash is King of safety, though it labels you a convenient ‘terrorist,’ in FBI retailer snitch programs (one reason we need to kill the System; its insane paranoia creates that which it fears in self-fulfilling cycles).

Don’t work for the system; Do not allow yourself to be employed by a member of MIIM or one of their subsidiaries unless willing to use that employment to their disadvantage. An example would be seeking to find and expose information damaging to the company, especially if exposing wrongdoing. I, for instance, took a job working at Shell Oil, where I uncovered a terror plot, by chance. More likely, it would simply be better to take a job with a smaller firm, one more likely to itself be a struggling competitor to the larger MIIM players in its field.

Help them to succeed, remembering that a small firm is more nimble and creative, and can often fare quite well compared to a megacorps, which relies mostly on boardroom antics and bookkeeping tricks to advance its position. If enough people did this, MIIM firms would not know which employees they could trust and it would likely force them to be more honest and less conspiratorial for fear of being exposed. And, they would need pay more to attract better people, driving the wage base upwards for all workers, instead of conspiring to beat it downward.

Avoid the paper trails: Avoid seeking permits and licenses where at all practical. Consider doing so under an alias, and using bogus addresses. An illegal extreme might be completely false ID, or multiple IDs, which I’d not advise as wise unless there was a shooting war. Remember that an alias is legal, as long as it still ties to your true identity. It is where and when you allow a given tie (i.e., your correct phone number) to be used or established that will help limit the usefulness of the paper trail.

If unsure, check with a lawyer. If enough people did this, the tracking systems would bog down in duplicated efforts and be confused by the alternatives, increasing your true freedom; paper trails that go nowhere. You literally route paper trails to alternate addresses or phone numbers. These can be real-World addresses/numbers where you have access and discovery regarding any attempt to use them (by the system), or PO boxes or similar mail drops (i.e., blind drops, double blind drops).

Examples might be relative’s addresses, or unused mail boxes such as where an apartment complex of 44 units has 45 mailboxes (slap a number on it), and so forth. Keep your real world address only for those things which you wish to receive mail for — and I don’t mean bills. They should go to one of the alternates. Have many such alternates, and establish a list of parameters as to the type of material you allow to be sent there. This is how to deal with utilities in a way that reduces trails. There is a difference between a physical address where the service is delivered, and a billing address.

Another very valuable tool is a lawyer or bookkeeping service, or any professional service that is willing to hold mail for you. Another tool is to swap addresses with trusted friends, or to take select mail at work, if you have access to it in a way that is not obtrusive or invasive to your employer. This is an even better way to deal with utilities: send the bills to your lawyer for collection. You can establish a trust and put the bills in that name, or pay directly through a lawyer. There are similar arrangements possible through financial management services available through banks and elsewhere, though they keep records and report to government. Think outside the box, and get some expert advice about alternatives.

Avoid communications traps: Avoid using mainstream communications channels. Use disposable prepaid cell phones you replace frequently, donating old units to groups who give them to battered women and others who need a way to dial 911 without having a monthly bill for the privelege of safety. Read this about cell phone privacy and security issues. Create and employ a steady stream of free Webmail accounts and abandon older ones as you go, keeping perhaps three active at any given time, and using alternatives for varied purposes. I use one for Real-World contact in key transactions (let’s call it the ‘official’ number), one for my most important confidants, and one for things between. Consider mail box services, blind drops, etc., if needing secure and neutral mail delivery, such as described in my book, The Professional Paranoid.

Don’t fall into the insurance trap: Avoid insurance whenever possible, to the extent your strategy allows. This advice can be very bad advice for some people, so be sure to examine the option carefully before you decide. I only suggest some alternative logic paths may increase the choices available to you, which are these…

Insurance is a bet between you and the insurance company and like all good casinos, the odds are stacked in their favor. The bet is this: They bet you and others like you will face problems which requires insurance pay outs which are collectively less than the monthly premiums paid by you and others like you. In the meantime, they invest your payments in stocks and other business deals and earn interest or dividends on your money while waiting to pay out any claims.

You, in turn, are betting that you will benefit by having a problem which exceeds your personal ability to cover the expense yourself. Who cares? Only those who fear the odds should care. The insurance company knows they will win, or they would not make the bet. If enough people did not take that bet, the cost of insurance would rise (because of fewer participants increase their risk to profit ratio) to the point that the system would fail; only the rich could afford it, and they don’t need it.
Take medical insurance. If you don’t have it, hospitals must still accept you and treat you. So you end up owing them a big fortune? Even a three day stay can cost between 12 and 100 thousand dollars! The insurance wouldn’t have covered it all, anyway, and you would still end up owing them a small fortune. If you are reading this, likely, you could no more easily pay back a small fortune than a big one. So let the debt stand, as either way, they would have no means to collect it if you have dropped out of the system.

Regardless, the hospitals (the big ones owned by MIIM) will write off the debt or work with you to cover it. There is also bankruptcy as an option, if they press you, as discussed later. I’ve used that one, myself, and while it had its down side, it had many benefits. Yet in the final analysis, if you don’t pay, and have no assets which can be attached, and don’t care about your credit rating… let them go fish! Bankruptcy is not needed, just toss the bills into the trash, and don’t talk to them on the phone.

Likewise with home or renter’s insurance. If you don’t have it, the worst case scenario is that you are homeless and without your possessions. All the insurance company would do for you, after an endless battle of paperwork and legal moves designed to avoid paying, is help offset some of your expense. With insurance with the same firm for nearly fourty years, I had some $40,000 in computers stolen, and never saw a dime, for instance. But gee, they were quick to pay off a $1,600 repair bill… and increase my premiums to compensate. Good neighbor?

In the meantime, you would still be depending on charity and the mercy of relatives or friends. You can go that route all the way and fare just as well in the end, avoid the legal hassles, and the insurance payments. Sure, for many of you that’s probably untenable advice. But tell me, what are the odds of a total casualty loss? If truly concerned, stuff that money away in your own investment methods against such a need; self insure. Some states have Self Insure laws which make it easier to do that effectively and safely, a bit like being Bonded.

Auto insurance is another problem. In many states, you cannot get a license or buy a car without it. So, perhaps you should not own a car, or have a license. If you choose to drive without and get caught without a license or insurance, the vehicle will probably be impounded or even permanently confiscated depending on local law, so the risk may be great. Or, you could just drive a junker and abandon it to the system in such a case.

But if your identification does not well track to you (per the earlier suggestions), you may care little about the fines and courtroom proceedings demanded by traffic tickets and fines which result. If your car was a $200 beater, as suggested, you may consider it expendable and cheaper to have lost it than paying the insurance and tickets over time.

On the other hand, remember that part of auto insurance is liability, and you probably don’t want to wind up being responsible for another citizen’s financial woes because you did not have insurance. Of course, one can buy just liability insurance and minimally be in the system. But if you are in a ‘no fault’ state, the other fellow’s insurance would cover it, and if he was uninsured, like you, then that was by his choice, making you de facto partners in suffering.

Doing without a car altogether may be the best bet — relying instead on public transportation. In fact, overloading public transportation will tax the system greatly and hasten good results, because it is inordinately expensive infrastructure which never quite pays its own way. Convenience isn’t everything. A Monthly Pass, $40. Watching the transportation system go bankrupt, Priceless. Moreso because they CAN’T shut it down, but will instead ‘bail it out,’ and that will cause more people to join with you, in the end.

Don’t feed the system: Avoid paying taxes where possible, always vote taxes down if given a chance (unless something you just can’t resist supporting), and always demand more services which require tax funding. If enough people did this, the system would be forced to raise taxes to cover the need against the will of the people; more and more citizens will come to realize the system is not working, or not working to meet their needs. The movement grows.

There are many ways to avoid paying taxes, and most all of them are legal, though they represent a significant exposure to harassment and punitive response. It only takes courage to use them. I won’t waste the reader’s time with the details, because there is a wealth of material on the Web about the tax protest movement. Here are a few to get you started, including some eye openers which addresses the tax protest movement in historical and practical terms, as well as religious — many of them (those critical of ‘schemes to avoid taxes’) being created by the system to protect the system (use a grain of salt). On the flip side, some advice is just plain wrong, even fraudulent or criminal (take care).

http://archive.adl.org/learn/Ext_US/TPM.asp?xpicked%20=4&item=21%3E%20%3Chttp://www.visi.com/~contra_m/cm/features2/cm%2099_jk_tax.html

http://www.ehow.com/how_5666700_avoid-paying-taxes.html

http://www.bizfilings.com/toolkit/sbg/tax-info/fed-taxes/tax-avoidance-and-tax-evasion.aspx
One can simply decide they are not going to pay taxes, and opt out of the IRS’ system. This is fraught with danger despite claims in some quarters that there are legal ways to do so, per several of the links found in the pages cited above, so I’m not suggesting it is a great idea for everyone. One could further rely on multiple IDs and poor tracking to addresses, and frequent change of jobs (if we had a better job market), declaring tax exempt status each time. You get to keep more of your pay until such time as you feel you are being closed in upon by the system demanding you comply or account for yourself, and then move on, and reinvent yourself once more.

Taken to the extreme, one could obtain false ID under the Social Security number of a deceased person. This would be illegal, and is not being advised — but CIA agents do this all the time, even multiple times for a given assignment. At some point, if a shooting revolution begins, this would be a more logical step, one we should all consider for personal safety. But by then there may be a National ID and chipping in place, rendering it an unworkable alternative. Preemptive moves may be wisest of all.

But if you can seek income from self employment or be legally considered a ‘contractor,’ you become responsible for your own taxation, and that offers opportunities to deal with taxes in a more useful manner. But it would take a book to discuss all of the many strategies involved in a good tax game plan. The Web links provided mention more than I’ve covered, here, including such books. And, of course, it is always true that you should seek every legal deduction or tool you can to simply reduce the taxes actually owed. You shouldn’t need to be a disenfranchised activist to see the value.

Know what the system knows and help them unlearn it: Make a list of every business and governmental agency that likely has information on you. Contact each of them and ask for a complete hard copy of what they hold on you. Invoke FOIA if you must with agencies, and rely upon various consumer laws for the business sources. Force them to expend the hundreds of hours (in many cases) and other resources it takes to comply. If enough people did this often enough, their cost of doing business would skyrocket.

Take the care and time to review information carefully, and fight to have errors corrected. Demand that businesses do not share information about you with others (specifically forbid them to sell your name or information to others). If possible, ask to be expunged entirely from their electronic records. Many laws or corporate policies require them to comply, unless you are talking about data on contractual or financial obligations, or other legal histories of like importance.

Don’t bank with the system: Avoid checkbooks and savings accounts. If possible, arrange to sign over your paycheck to a relative who does bank and have them cash you out. Of course, you can also go to the check cashing services, but they will demand ID and charge a hefty fee. The less paperwork, the better, but if dealing with a relative, have a written understanding between you so that the IRS won’t claim all your money is income they have not paid taxes upon.

The best arrangement would be an employer or work situation where cash payrolls were involved, ideally with no reporting to the IRS. Illegal migrant workers are often paid under the table and don’t get taxed, and thus working for less than ‘minimum wage’ may mean you still have almost the same spending power as if getting the minimum. So, perhaps joining them is better than fighting them for service jobs. That would truly take you off the grid.

Consider Bankruptcy as a tool and a weapon: Do not fear bankruptcy, but do not blindly embrace it, either. Study and know the full ramifications of a bankruptcy as it would play in your specific circumstances, before deciding on its use. For many people, it is a valuable tool for exiting the system. Not only does it allow a fairly clean exit, but it can do harm to the system in the process where the creditors are of the MIIM variety.

I know of some people who deliberately build up large debt with MIIM institutions and firms, and then go bankrupt. Even though they may have hundreds of thousands of dollars in such debts, this is actually only a minor inconvenience and a drop in the bucket to most MIIM players. Still, I suppose, if enough people used this approach, immoral though I rank it, it could add up rather quickly. It is a dirty war forced upon us, and thus such immorality is not mine to judge, but yours and God’s.

Just know that while bankruptcy provides certain protections and allows the complete elimination of commercial and private debt, it does not protect against taxes and may not prevent repossession of some goods. The exception can be one’s home, car, and tools, but laws vary from state to state and even case to case — and the government is trying to make it so hard, it is almost impossible. A lawyer should likely be involved, and that is yet another expense to consider. Even a simple bankruptcy will mean many hundreds of dollars out of pocket up front.

Don’t Educate Within The System: Take your kids out of public school and put them into private school or home school programs. The quality of education will rise (as will the cost, because you will still be paying taxes for schools unless you have dropped off the property tax roles). The moral teachings and principles of leadership and responsibility will once more be included as part of education. If you remain in the system, don’t be shocked when you learn your underage daughter has an abortion without your knowledge, or if your kids start being put on Prozac or similar psychotropic drugs without your consent. They will certainly be dumbed down politically, and have no useful grasp of history for preservation of America’s true heritage and core beliefs.

This ends the overt or outward steps one can take to drop out of the System. There are many other good ideas out there. I’ve tried to focus on the mainmost effective steps to start you thinking outside the box. In the next section, we will look at COVERT steps you can take, thinks not outward in nature, things which will increase your defensive posture should things turn nasty, even to include a shooting war. They remain none-the-less critical to your ability to well live off the grid, in or out of a shooting war, as they leverage your personal abilities by allying with others of like interest.

That will be Step Three, the final step: Establish and underground network

Network and establish an underground: There is already a large network of ‘underground’ players which you may choose to rely upon. For a more trusting relationship, it is easier to start your own. Find like-minded people in your area and establish relationships based on keeping to as many of the below advised procedures as can be achieved. You will find that you can help one another in immeasurable ways.

One of the most valuable may prove to be bartering amongst networked peers, and learning from one another what works and what does not, or how best to apply a given tactic. My wisdom is miniscule compared to someone who is in your exact situation and who has already tried and discarded, or tried and refined a tactic. Make their experience work for you.

One place to look for established networks is public access television and radio, and underground newspapers. You can also find allies through bulletin boards at local colleges and places frequented by modern society’s ‘les miserables,’ such as head shops, book stores, music stores, secondhand stores, and so forth. Political rallies, especially for more Constitutional issues or controversies, is also a good place. While it is preferred that your network be closely aligned politically, remember thaty the enemy of your enemy is your friend, even if they be an Anarchist or Communist at heart.

Start up conversations and be friendly. Find common bonds (music, books, news topics) and get started just like any other attempt to make new friends. Then pose a question or offer a sentence which suggests you are dropping out of the system for political cause, and state your concerns. If they don’t know what you mean, educate them. If they do know, or after hearing your explanation, you will know almost immediately if they are kindred spirits. Develop such relationships with appropriate caution and reasonable paranoia towards possible betrayal. With a little time and patience, you will find some real gems. Discard the losers, and attempt to rehabilitate fence sitters.
Another way to network is to directly use Public Access radio and television resources, or the underground presses, yourself. You can (for free) learn to use broadcast equipment and create and present your own public access programs, or simply be a guest or participant in someone else’s show. Such shows are a wealth of information relevant to a broad array of social injustice and crimes or other victimization, and how to fight back. You will find allies, and you will make converts. In short, you will become an activist if not one already. That is what the system fears most — someone that pricks them, and they can’t reach out and correctively scratch back.

Establish a Personal Network: Within the broader network, set up your own, smaller core underground support group using methodology similar to that used by the intelligence community when setting up an organization or project. This raises several sub topics, to include information as well as personnel issues. First, figure out who is the primary authority for the group (group leader). It need not be you if you don’t have a head for leadership or a desire for the tremendous responsibility it can represent.

Compartmentalization is a key intelligence community tool, and it would serve organizers to read up on that methodology, as well as other methods intelligence spooks employ. A hint of these methodologies is offered in these general guidelines or ‘talking points.’ As you seek to establish your group, these should indeed be discussed among you as issues to be addressed and decided upon.

Terms like covert, secret, and sensitive as used herein could be misconstrued to imply the purpose of such a group is clandestine or illegal in nature. That need not be true, but could be so, to a degree, yet still not be dark in purpose. For instance, you may wish to barter or trade services or goods privately in deference to what the system would prefer or considers legal. You will need a network of people with like interests in order to do this at will, safely. You will want to protect that network from discovery or the system will move to squash it (and you).

Of course, if a shooting war erupts, you will then have everything in place to escalate to darker needs as you see appropriate in defense of your family, country, and the Constitution. Everything will be illegal, then, but the true criminals are the ones judging it so. A network can easily be adapted for true intelligence gathering and black ops against any usurper of power, or formed into underground combat units, were that to become your collective wish. That is the real reason they won’t like the existence of networks. Here are some basic covert network guidelines:

Categorize information: Identify material as being either sensitive (controlled) or public, (uncontrolled) and determine who has both a right to know (authority), and need to know (required to do their job/assignment) for access to controlled information.

Establish a formal means for controlling (restricting) and tracking (recording) both access and the ability to make copies. Never give both access and the ability to copy unless the copies and the process that generates them are also controlled and tracked. You need to be able to reconstruct any possible leak of sensitive information based on who accessed it, when, and how. Eject from your group any violators of protocols, even if accidental or seemingly innocent. The Network’s integrity is more important than risking it further to an uncertain loyalty.

Safeguard information: Where possible, insert dummy information into sensitive information as a further tool for tracking leaks. Dummy information should be ‘detectible’ in terms of identifying the nature of the leak and ‘neutral’ in terms of impact on those accessing it (it should not cause them to alter their legitimate use of the information). It should be unique to a given or limited person or group of persons in terms of access, to better identify the leak source; a given person knows a given thing no one else knows, something which seems important and rightfully sensitive, but which is not, and something which would be easy to detect if leaked (cause visible actions as result). Establish ways to test such loyalties and detect any betrayal.

Control access to information: Organizational members (family, fellow dropouts, and trusted friends or coworkers who support you in any way) should be categorized as protected or visible in terms of identities and operations. Protected individuals will be given and referred to only by code names, and only their operators or handlers (i.e., group leader) will know who they are and how to contact them. A protected person may assume a cover as a visible person, or may prefer to be seen as completely unaffiliated with the group. A good example would be a liaison with another group. A visible person might be a spokesperson, or a Lawyer, etc.

Likewise with operations: Things you plan to do should be categorized as sensitive (covert) or open (overt) in nature. Only team leaders assigned a given operation will know all details. Even the assigning authority (team leader) might not need to know all details, though they will need to know those required to accomplish the goal and the general plan, that they might pick the best team members, and properly monitor the outcome or status of the effort.

Team members (operatives) may or may not need not know precise plans, timetables, operatives, lead-in event details, actual objectives, and so forth. Individual operatives will know only their individual assignments, restrictions or other parameters, and goal, but not have an understanding of the nature of the project or the identities of others involved unless part of the same interim goal.

Form network alliances: The primary authority (group leader) will likely wish to establish special relationships as part of an ‘intelligence’ network for seeking out and sharing of critical information useful to the needs of the group. This should likely include counterparts in similar groups located elsewhere, where such trades of information can be mutually useful. But it might include ‘insiders’ positioned within non underground businesses, agencies, or groups able to provide useful information, persons considered friendly to your cause for whatever reason.

The usual formal first-contact means is a simple presentation of needs/interests and possibly the exchange of bona fides (proof of identity, purpose, and sincerity of beliefs based on prior accomplishments). It is better to rely upon gradual building of trust and bonds. Don’t show all your cards up front; it can backfire and get you into trouble, or scare them away.

You will want to establish simple tests of fidelity for the alliance partners, too, and conduct these with a subtle degree of covert manipulation, being careful to insure you can demonstrate, if caught, any deceit was not intended to be harmful to the other side and was necessary for your satisfaction of their integrity. Restated, give them something which seems like it could be used against you but which would backfire if they do (a trip wire, of sorts), and yet, which you can explain as such should they detect the deceit.

Protect alliances: This creates a network of networks and amplifies the power base and resources for each group. It is acceptable to define limits of operation, mutual goals, etc., each group is willing or interested in working on. It would be dangerous to assume anything about another group, as there can be ‘guilt by association’ complications if something they do causes too much attention. Likewise, whatever you do can cause problems for others, so be sincere and honest when presenting your beliefs and intents, or you may find yourself cast to the wolves by an angry cadre. In essence, you live or die as a group by what you say as well as what you do, so live up to your own stated expectations, and hold everyone accountable for failures so there are no mysteries as to why they failed.

Establish a Recon Team: The primary authority should find persons with skills and real-World resources, contacts, etc., suitable to establish conduits of reliable covert collection of information (intelligence gathering) about key strategic matters relating to persons or groups deemed a threat or activism target of the group. All group members should participate to the extent possible in overtly safe ways, but some individuals would excel in covert application, and their assignment to duties in this regard should not be known to the group. Special skills such as investigative or research skills, photography, locksmithing, communications technology, and computers are good starting points for considering who to assign.

This function is critical in a shooting war, but even if just trying to survive as an underground community, there will be threats which will require attention, and activism toward preferred reforms will need to continue in ways which do not threaten group integrity of operation. To fail to have such team in place as an underground group could be a significant risk if matters evolved to a shooting war.

Additionally, omnipresence in the greater community is desired with respect to information access. Therefore, project leaders and even group members may be asked to separately recruit ‘operatives’ who will contribute to the project or goals of the group without necessarily having allegiance to it, or even be aware of its existence. This is ‘recruitment’ which may involve any of the inducement methods used by the intelligence community itself, provided such methods have been approved by the group leader (some might be seen as illegal or immoral, such as bribes or blackmail). Not everyone will be good at recruitment, but those who are become good candidates for inclusion in the Recon Team.

Establish a security team: The primary authority will also wish to establish a small team of persons who covertly address internal security — counterintelligence. They should be active in various projects as if ordinary team members, but would additional focus on internal security matters (watching for security leaks, infiltrators, etc.) Only the most trusted of persons should be members of this group, but all members should share the responsibility of watching for and reporting signs of security threats, external and internal.

Use a consistent model: Each project leader will wish to mirror the organization of the group in small scale with respect to networking policies and layout, but bona fides will not be an issue, nor will they need their own security team, but rather, one individual would be assigned internal security matters. They will likewise wish to mirror the group leader with respect to operatives who will report directly to the project leader, only.

Be discrete with all communications: Communications between various covert components must be established such that contact, sharing of instructions, information, and reporting, can be undertaken without anyone within or outside of the group being the wiser. The use of code names, code words or phrases, and flag actions (i.e., placing an object in a certain place or position), covert meetings, blind drops, and so forth, will be called for in almost every instance.

Delegate where possible: These operational guidelines create a certain project management overhead which should be delegated downward so that a higher level is not overly involved in the operational details of a lower level. Upward/downward reports or downward group- or team-wide presentations keep leaders and group members informed as appropriate. The group leader should not worry about how the project leader communicates with his operatives, etc. Everyone with a special skill should seek to clone themselves by training a possible replacement so that the loss of any person’s would not seriously harm the group’s operational integrity, and delegate tasks to trainees to test their abilities and grow their confidence.

Weapons of war: Early in the formation of the group, a consensus should be sought regarding definition of what weapons of war are deemed acceptable or required to meet group goals and maintain operational integrity. It is presumed and hoped that such weapons will be limited to the same weapons as used by any activist outside of an underground group (words, public protest, etc.). But given that Homeland Security has placed bid requests for 1.4 billion rounds of ammunition for use outside of the military, it seems clear that someone intends or expects there to be a shooting war, soon.

Therefore, a ‘policy’ should be calculated to everyone’s satisfaction regarding actual weapons and munitions which may be needed if a shooting war erupts, be they intended for self defense or for offensive operations against forces of oppression, be it on an individual or group basis. Considerations should include: a) access — will there money available to purchase, will there be a market in tact which can sell? If not, get them while you still can and stockpile for future need — you won’t want to wait until your only option is a criminal black market under Martial Law; b) choice — is there someone in the group who knows what weapons are good for what uses? If not, assign someone to find out; c) training — is anyone able to shoot a weapon or even comfortable doing so? If not, they should take courses while they still can; d) storage — where will they be kept until needed, stowed by individuals or the group? A secure place safe from deliberate detection efforts will be required.

Thus ends our review on how to drop out of the system and form your own underground. These are fairly basic in nature, and yet may simply be too much for most readers to contemplate. But sooner or later, the way MIIM is heading, we are all going to have to make a tough choice: do we stay within the system and be controlled by it, or do we break away from the system and seek its destruction, or at least be ready to do so at some strategic point before it is too late to do so?

Our survival as free-will individuals and citizens, and as a free nation, will likely depend on that decision. Better to make the decision sooner, than later. Better to do it methodically and with good principles of operation than by spontaneous guesswork. When MIIM makes its final moves, the warning may be mere hours before they start going door-to-door and results in shooting, and it will be too late for decisions, much less planning, then.

 

Do I hear someone knocking at your door? Better check your political watch and peek out the window before you open it.

How to War with the New World Order (a Primer)


If you are no fan of the notion of a fascist, satanic World government ruling a depopulated World with all the power of the Antichrist, you may want to know there is one simple weapon we hold that the NWO fears we will discover and use, one more dangerous than guns.

How to War with the New World Order (a Primer)

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How to war with the New World Order

 Any enemy can be defeated if you know their weaknesses

Masonic mural at Denver International Airport depicts future of New World Order

Follows is an abbreviated collection of excerpts and updates from my book, The Professional Paranoid Defensive Field Guide, which includes many more such tactical advices, many being useful in any kind of war the New World Order force upon us, even a shooting war. But this post addresses a war that we can more safely bring to them, one non violent, perhaps forestalling the need for guns altogether by stopping the NWO cold.

Regardless, it also undoubtedly gets me listed officially as a ‘financial terrorist’ with evil Men in Black (or Army green, Police blue). Who cares? We are all treated as terrorists anyway, pending a moment of convenient political gain for actual ‘attention’ to our particular branding. Screw them and their paranoiac need to so label free thinkers, of whom Thomas Jefferson says government should rightly fear (for cause of making them BEHAVE RIGHTLY).

They can NDAA-vanish me at anytime, if they dare — just as they can any of YOU. That’s the whole point, isn’t it? If one man is not free because government violates its own Constitutional Law, then no one can rightly claim to be free. And so, given Homeland Security has placed bid requests for 1.4 billion rounds of ammunition for use outside of the military, the threat of an outlaw government seeking or expecting a shooting war with Constitutionalists forces me to write. If they so expect, so must we.

I must write, if for no other reason than personal self defense, which depends in turn upon the successful defense of others, give such advice. It is the collective WE, The People, who must survive, not mere individuals. Governments can come and go, can fail and be reconstituted, overnight if need be. But if freedom dies and We the People become a historical footnote, transformed into mere chattle as manageable individuals for feeding the profit grist mill of a corporate state (that’s fascism, by the way), something precious and extremely difficult to replace is lost for a long, long time.

The advice of which I speak consists of three simple steps, each with multiple topical elements, options, or ways to grasp and effect them. This post details Steps One of three. Collectively, they would allow us to be effective in the effort, and better assure individual and collective safety even if armed conflict is forced upon us.

And there are other resources online, some of which I have linked as you read. There is, for instance, fightthenwo.org, numerous sites promoting an effort called ‘global noncompliance’, and illuminati-news.com, where one finds an article somewhat like my own. Just type in the appropriate search terms to amplify your knowledge base, and your options, and to cement your confidence if daring to stand against the machine as do I.

You and I are not alone, given the broad range of topics which stir people to activisim in causes with which you should become familiar, for it makes of such persons a thing called allies. You need not agree with them all, but we all should stand together, for all such activists become targets of the NWO. I’m talking about things like Agenda 21, Canamex Highway, gun bans, Codex Alimentarius, Digital Angel, TIAO Dataveillance, RFID, NDAA, the FED, Political Control Technology, Chemtrails, Animal Rights, Occupy, Anonymous, and on and on and on.

Often, we should consider allying with both sides, perhaps one more than another if so moved — but ever mindful that the enemy loves to divide and conquer by fueling our disdain for one side over another. Fighting amongst ourselves means we don’t even see the real enemy. All these groups, save moments of manipulation, should be ally and enemy to the Globalist agenda, and not enemy, mine. To steal from another anti-NWO group’s slogan… which I essentially endorse, and again for which the operative word elected is WE…

“We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”

What can we learn from Anonymous? The most obvious lesson is that invisibility equates to an invulnerability to retaliation. Sure, they have losses, but the group is getting stronger and gaining in popularity in pop culture and elsewhere, and doing some real good as it goes, as some count good (no movement pleases all its supporters all the time). But by and large, their integrity as a working force against evil is unchecked because of their anonymity. They are off the Grid, beyond the Matrix (though hiding within and manipulating it), they have gone Underground.

That is were we must be to be both safe and effective in battle; underground.

So begins our review on how to drop out of the system and form your own underground — which is also to say, how to more covertly and safely defend your country from enemies foreign and domestic. These are fairly basic ideas, and yet may simply be too much for most readers to contemplate actually undertaking, at least wholesale (easing in may indeed be easier). But sooner or later, the way MIIM is heading with insane abandon, we are all going to be forced to make a tough choice: do we stay within the system and be controlled by it with no recourse, or do we break away from the system and seek its destruction through violent confrontation, or at least prepare for that eventuality? I think dropping out is a better, safer choice, one which also serves as preparation for a possible violent day; it covers all bases.

Our survival as free-will individuals and citizens, and as a free nation, will likely depend on our decision. Better to make the decision sooner, than later. Better to do it methodically under a plan and with good principles of operation than by forced into spontaneous guesswork on the fly by sudden, unexpected perils. When MIIM makes its final moves, the warning may be mere hours before they start going door-to-door and shooting erupts, and politically incorrect persons are vanished. It will be too late for decisions, much less planning, then.

What can be done to stop the New World Order?

Step 1: Understand the Problem, Know Thy Enemy

A few hundred people control the NWO

One must realize that the New World Order movement, with its roots going back to the Satanic Illuminati in, perhaps not so coincidentally, 1776, was a centuries-long plan to form a one-World government that their might be one World leader; the Antichrist. Believe it or not, we are dealing with powers and principalities, a relentless and seemingly unstoppable force which never sleeps, has countless minions of dark allies and dupes like forces to work with them unknowingly, and employs clever deceits and sinister plots to lubricate its machinations. Most of the battle is invisible, as often is also the outcome; we can loose significant ground and not even be aware until much later — the price of forgetting or pretending there is no Satan or Hell… or even a God, for too many of us.

It is not the United States Federal Government, or the United Nations, or the initialed Agencies or Department of Defense, or local law enforcement that we face. It is not globalist corporate giants, the FED and Jewish or international bankers, or the Military-Industrial Complex or the oil companies who are our enemies, nor their boards of directors, foundations, religious and charity fronts, or their political action groups. It is not the modern-day leadership of Illuminati philosophies inherent in the Power Elite round table groups such as the Bilderbergers, Club of Rome, Council on Foreign Relations, Tri Lateral Commission, Rhodes Scholar disciples, or even the infamous Skull and Bones/Thule Societies and their counterparts, or even the Freemasons from which sprang the Satanic Illuminati. Neither is it CIA, FBI, NSA, DHS, DEA, ATF, ONI, DIA, or any of the endless initialed investigative and enforcement agencies.

No. It is instead all these entities combined, and much, much more, who make up the face of our enemy. To define or limit the enemy to any one group or several, short of the whole, will miss the mark, and fail. It matters not if they participate knowingly in support of Illuminati goals, or by coincidentally by coincidentally aligned or secretly guided agenda. They are the collective wall of hardened, massive stones which lay between being free in all pursuit of life, and being a slave dead to God. Those stones form the Pyramid upon which sits the All-Seeing Eye, which is the symbolism of the very Antichrist and End Times; the ‘eye’ of Lucifer taking up the key-most position (where one should instead find a stone referred to as the frustrum), thereby frustrating the placement of the capstone, the return of Christ.

The question then arises, what chance does the individual (YOU, me, all of us who prefer FREEDOM and LIFE to slavery and death) against such a vast array of forces? What chance would we have to make a difference in what essentially appears on the surface to be prophecy being fulfilled, day by day, regarding a predestined final-day battle between God and Satan? Who are we that dare intercede in such contests between Titans of Biblic proportions, and what could we possibly hope to contribute of any value or impact in a battle of such scale; that which leads to and includes the showdown at Armageddon?

The answer is, in my humble opinion, EVERYTHING.

It is not simply God vs. the Devil. It is God and the good sought and achieved by Man through God’s gift of free will vs. Satan and the evil done by Man by subversion of free will. It is about righteousness (right-use-ness) vs. evil (vile-ness), both effected by our own individual choices. I believe that to the extent that there remains sufficient good will and righteousness in Man in his time on Earth, the date of Armageddon, and those things which lead to it, are delayed. Scripture refers to this as Grace.

This whole notion is reflected manifold in scripture, for those willing to heed a rather short Bible lesson, which is an all important part of Step 1 — to fully understand the stakes involved and the true unseen mechanisms which guide outcome…

Jerimiah 5:1 regarding God’s Judgement upon Jerusalem for failing to honor God and his Commandments says “Go up and down the streets of Jerusalem, look around and consider, search through her squares. If you can find but one person who deals honestly and seeks the truth, I will forgive this city.”

Genesis 18:26 regarding Abraham’s prayers beseeching God not to destroy Sodom, God says in respose, “If I find fifty righteous people in the city of Sodom, I will spare the all the place for their sakes.” Abraham negotiates the number down to 10, an important number spiritually.

Romans 2:4 tells us why the forbearance of Grace is offered (though all-too often sadly betrayed by Man’s delight in sin) with “Or do you show contempt for the riches of his kindness, forbearance and patience, not realizing that God’s kindness is intended to lead you to repentance?”

2 Peter 3:9 is more to the point with dialog on the coming of Judgement Day, and Christ’s return. “The Lord is not slow in keeping his promise, as some understand slowness. Instead he is patient with you, not wanting anyone to perish, but everyone to come to repentance.” Being patient, he gives us time (a period of Grace) in which to work toward salvation. What we do with that time is our own choice.

But if we make no effort on behalf of good in the face of evil, no matter how overwhelming it may seem, then we deserve the fruits of evil, as spelled out in Ecclesiastes 9:3 “This is the evil in everything that happens under the sun: the same destiny overtakes all. The hearts of people, moreover, are full of evil and there is madness in their hearts while they live, and afterward they join the dead.” More such as this can be found.

So let us also heed God’s advice and enter into battle. Ephesians 6:13 tells us how: “Therefore put on the full armor of God, so that when the day of evil comes, you may be able to stand your ground, and after you have done everything, to stand.” Much more is also available on this topic, as well. But hey – this video says it in an extremely beautiful way.

The number 10 in the Bible (and elsewhere), for instance, represents fullness, full measure, fulfillment. Thus, as long as Good can be seen sufficiently ‘full,’ as in ‘full of Grace,’ which is God’s forgiveness and forbearance, there is no reason for Judgement Day to come to pass. Should Man drop below a rating of ’10,’ Judgement is enabled and will come to pass. Thus, I argue; it is all up to you and me, to decide that moment — perhaps why ‘No man knoweth the hour,’ of that day, for we cannot take self measure.

The Bible offers more and better advice, than this feeble attempt at presentation. I simply offer how you might apply it using specific strategems. Let us consider:

Short of armed revolution, and in the absence of any seeming control over our government through the traditional election processes, the alleged system of checks and balances and for obtaining redress in the courts… as illustrated by the failure of Congress and the Courts to ever address crimes of the White House, or to curb the military or intelligence communities when they go awry… and surely their failure to quash NDAA, the Patriot Act, the outrageous acts of TSA, ICE, and all such madness — is the option to undertake another kind of war with the NWO; a guerrilla war fought on our terms, not theirs. I speak of an offensive war, one which effects a defensive posture, as well.

It may be time we take the battle to them, and use their own System to ensnare them.

Let’s face it. The enemy, as it otherwise stands, holds all the cards: We must use their money, follow their laws and suffer under their court judgements (for most of us, relying upon their lawyers appointed on our behalf — unless we are wealthy, in which case, we are more likely part of the problem), are subjected to controls by their police and military, must depend on our news from sources their Military-Industrial-Intelligence-Media complex (MIIM) controls, send our kids to schools in an educational system they manipulate, and use their insurance to visit their Doctors, hospitals, and take their drugs, etc. All the way we foot the bill for these things which define our limitations, and profit their machine.

At every turn, they hold control over our lives: we cannot get a job without identifying ourselves using their number. We cannot keep that job without giving them a huge portion of our wages as taxes, which they then frequently use against us, along with other monies they manage to extort, steal, or siphon from us through societal forces of their design. We cannot well protest our lot because they own the media by which we would have our say, and we use an Internet rife with their control, censorship, and eavesdropping (there is a better Web alternative in works, however — take a look).

We cannot ‘vote the scoundrels out’ because they control the voting process and the choices we are to be given. Ergo, Dog and Poney shows replete with hanging chads or worse, and if not that, assassination of candidates or death threats against them or their loved ones. In short, the terms ‘Republic’ and ‘Democratic Process’ have become a sham, as no matter who we vote for, the same old policies are continued toward NWO domination.

As bad, ‘redress’ is a word no longer in the American political lexicon; the System is rigged at every turn to defy it except in the most well-funded of battles, it costing millions for instance to employ media to advantage, or prosecute a case through the Courts, and the Internet is so controlled by cyberwarrior tactics that most organizational efforts there are easily derailed through infiltration and sabotage. And now they want to take the guns, which if allowed to come to pass, will mean all doors for redress can be permanently shut tight against us.

No thank you. Gunfire before gun grabbing, for me.

But the purpose of this post is to avoid the need for that eventuality. We must realize who MIIM is, and deal with them accordingly. MIIM’s arrayed forces and allies are by and large fascists and racists, and even Satanists, or some combination thereof. They tend to be psychopaths and sociopaths who wield immense wealth and power in all areas of societal and governmental structures. Their collective is hundreds of years old, and thus, they have had ample time to calculate and think ahead, to plan for every contingency, and tend to easily defeat a defense before we can think to undertake it.

But there is good news in all this.
Despite their position of dominance, it happens that there is one thing all principalities and powers fear, something which we possess… something they fear we will discover as the weakness or flaw in their plan. And it is such a simple thing, and defines Step Two. The beauty of it is, that implementing it now not only weakens their hand and strengthens ours, but if at some point the war becomes a shooting war, we will stand a much better chance of being able to either run and hide or to stand and fight. Either way, it will be harder for them to find and manipulate and destroy individuals, and thereby, the whole.

You can do neither if they collect you, first, or already control you outright in their System, what some call the Matrix. The solution? That’s the next post…

What scares the New World Order?

Step Two: Drop out of the System:

To explain that first requires that we understand what the System is. The System is two infrastructural parts; the commercial side and the government side. The commercial side sells itself to you every day. Advertising for products and services creates desire. Desire leads to purchase. Purchase yields profits against cost, and is a two-edged sword used against you. Part of the cost is payroll, which is used to pay you less than you are actually worth. They reap the GNP at your expense; you provide both the labor and the capital which drives their machine, so whatever they pay you, they get back by the resale of your fruits (you effectively work for free by giving them back their own money in exchange for very little of true value).

All along the way, taxes are levied to fund the other part of the System. They win-win, you loose-loose, but you get (something) they’ve convince you that you can’t live without, despite the fact that the World did just fine without it since the beginning of time. Everything from better deoderant to cars that talk, from perfect pills to pornographic movies through your cable company. And let us not forget GMO produce and foods so processed and full of additives that ants no longer eat anything in our kitchens but raw suger. As Dr. Phil has said, “If it wasn’t food 100 years ago, it probably isn’t food, today.”

Lucky you to have it so good, at long last. Whatever happened to happiness; the contentment that comes from simply living and enjoying nature and the company of others, and the fruits of our own labor? Who decided that these things had to be purchased in newly constituted forms, and that we should have no other choices? And, I might add, who can believe anything they tell you about what is good for you when every few years a new study reverses a previous finding, and perfect pills result in class action law suits for the harm they do?

Oh, but the System cares not for trivial details as these, because we are so dumbed down we don’t see the problem, and buy the next new thing.

Meanwhile, the government part of the system tracks and manipulates our participation in the first part in many ways. Your social security number, as mentioned, plays a major role. Your credit rating and banking numbers further track your every move financially, and government’s FINCEN (Financial Crimes Enforcement Network) and the Total Information Awareness Office (Department of Defense) are both gearing up to access every transaction from birth to death for every citizen. As the Bible has predicted, you already can hardly buy or sell without a number of some sort, a de facto Mark of the Beast by some accounts. But that yolk has not yet come to pass in its bitter fullness (Digital Angel awaits you).

The money itself also has tracking systems built into the bills (the little embedded strip you can see holding the bills up to the light can be sensed by special equipment), and FINCEN will be able to track cash as easily as credit once it is fully established and retail systems have evolved to accommodate the technology, called RFID (Radio Frequency Identification Device).

The Military AND the commercial side are partnering to establish wholesale use of RFID technology which will allow transactional tracking at points of sale to include a complete and total understanding of each and every product you purchase, effectively giving it a unique serial number. It can tell how and when you acquired it, whatever it is, right down to razor blades (already chipped). In fact, retailers have actually used cameras to track shoppers as they move through the store by zeroing in on select RFID chips in products in their cart, or already owned and in their possession (e.g., lipstick tube). You are the sum of your RFID, and once cataloged, you can be tracked anywhere.

As you read this, cash registers, inventory control systems, and security systems (doorway monitors, cameras, traffic monitors) are being designed and built which can scan RFID at a distance. Millions of credit cards, mailing labels, ID cards and driver’s licenses, and even cell phones have already been chipped with RFID, and some things, like select cell phones and cars, include GPS tracking. Security cameras and roadside or sidewalk monitors are being upgraded to track them. Unless you go naked in the World, or make your own clothes and use no manufactured objects, you can be tracked by RFID, because everything manufactured and sold will eventually have chips embedded.

We register with government for everything. We register to be born and to die. We register for school, to vote, to get driver’s licenses, to fish or hunt, to buy or rent a car or home, to have a phone or utility services, or to save a little extra money when we shop or to use credit, and so forth. At every turn we are giving out information about ourselves which is fed into computers, computers with back doors and inherent ‘links’ or leaks between databases to serve marketing and or government purposes. Hence Dataveillance.

How else do you suppose that you get so much junk mail with your name on it? One CIA front (two fronts, actually, one here and one in Europe), as I document in my book, the Professional Paranoid Defensive Field Guide  offer to sell information on 98% of American adults. The other two percent have already dropped out of the system. Why should government intelligence agencies be in the business of spying on you and then selling your little ones and zeros for a profit? Do something about it, and drop out. Let them sell just zeros, if they can.

If you elect to remain in the System, if and when they want to reach out and get you for some reason, they will know right where you are, that very moment. Their data will let them profile you psychologically and predict your actions (as described in the Department of Defense’s original RFP White Paper for the TIAO). Don’t answer that knock at the door… you don’t want what they are selling. And you won’t be able to run at that point, because they can freeze all your financial assets, and in some cases, can remotely disable your car, and in all cases, turn resources such as your cell phone against you. It will be too late, then.

Proactive and preemptive tactics are what you need.

To preempt, disengage yourself from the system. When someone drops out of the system, the overhead of the system is actually increased to a degree, but the funding thereof is reduced. This causes subtle instability within the system which impacts the remainder of those still within the system. By deliberately weakening the system in this way, the New World Order is forced to become less transparent, and more domineering, more visible to those who have not yet seen that particular light. It compounds like interest as more and more people figure out they should exit.

Thus, more persons will exit, recruiting others as they go; the cycle will continue to the point where the system must either fail, or seek to seize absolute control sooner than it otherwise intended, before they are ready to do so with full confidence of victory. A shift in balance of power is achieved, the stronger side left unstable and off balance, giving the weaker side a chance to make significant gains with smaller efforts. The domino effect, slow motion though it will seem, at first.

Dropping out is fairly easy — just stop playing the game. Take actions which reduce your exposure to their ever evolving control matrix, and which free you up for further actions at reduced risk. Risk tends to lessen with time as you get better at living off the grid. Most of these things are very easy to do, and have little true risk, but may represent major inconveniences or social roadblocks up front.

You may likely face serious decisions about how you execute such a plan, and to what extent you are willing to go to make it happen. Fortunately, it need not be an overnight matter, which means you can ease into it over several months time, perhaps a few years (presuming we have that much time remaining). Just know that for every cost you are willing to bear up front, the benefits to which it leads tend to be far more valuable in the final analysis. The more steps you manage to accomplish, the easier are the remaining steps.

This ends the introduction to Step Two. What follows in the next segment are a series of suggested guidelines or action options to actually be effective doing it. Some of them you simply might not care for, or accept as viable or workable with respect to their goals or your personal circumstances. Don’t feel you need to follow these suggestions any more than you need to ‘play their game.’ After all, it is about free will choice; God’s greatest gift to Man short of life itself.

And that’s exactly what we are trying to stop the New World Order from ending: Free Will.

What are the tools of the New World Order?

Next up: How to War With the New World Order (Drop Out Checklist)

Globalism’s Self-Serving Cycles of Terrorism


A reality check for citizens in every nation, democratic, communist, totalitarian, or religiously governed (e.g., Islamic); terrorism is not waged between governments or ideologies as outwardly advertised, but a covert weapon for political control used by Globalists against all peoples, especially the very members of terror groups duped into participation. More to the point, it is waged by powers and principalities, against God and Man, and serves Satan.

Globalism’s Deliberate Self-Fulfilling Cycles of Paranoiac ‘Terror Threats’

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What you will learn reading this post…

  • Terrorism is a sham, a weapon of political control technology;
  • Terrorism never benefits terrorists in any real way, given the backlash;
  • Terrorism is never approached as a problem to actually be solved because it serves the ‘target’ government’s interests as long as it exists;
  • Terrorism is about control of the masses through fears designed to sponsor a willingness to subjugate ourselves to the New World Order;
  • Therein is the real secret; the NWO is Satan’s Illuminati plan to seat the Antichrist, terrorism being a mere tool.

Who benefits from terrorism?

Reality Check Time for citizens of all nations

Image: Agence France-Presse Getty Images; India Ink blog post      on lessons learned on terrorism in India (click)

Rewind the clock and review the last few decades or so — the time frame of the alleged ‘War against Terrorism.’ If you consider cause and effect relationships with much care, you quickly see that there would be no terrorism of true consequence except for government’s need to both instill fear in you as a form of Political Control Technology (behavior and thought control through deciet), and as a generator of ‘fuel’ for that very mechanism.

Look more closely, however, and we find even the governments are not the true benefactors. That would be Globalists, which put in other terms, is the modern-day Illuminati; the New World Order movement for a one-World government. This is governments run by the power elite, also called Fascism in some circles. Such rule is required if the Antichrist is ever to come to power. That is what I hope to illustrate in this post, along with some other eye openers of like nature:

Case Study; Control Group

But before we do that, we should first establish and consider, in the method of good scientific study, a ‘control group.’ We can then hold up the control group for comparison to the ‘terror group’ of events we will consider to make our final findings. Any differences should be for us valuable clues. For this purpose, let’s use something entirely unrelated which, like terrorism, represents a deadly threat to lives and the wellbeing of any nation; traffic accidents. Rewind the last decade or two in your mind and replay as you consider…

At regional and local levels, mostly, and to somewhat lesser degree at national levels, the high death toll and financial cost to the nation inherent in traffic crashes, including GNP impact, typically sparks ongoing efforts to improve highway and auto safety. This consists of an endless series of changes in rules, laws, and regulations, as well as advertising campaigns to educate drivers.

Specific examples over the years would include improving crash safety standards for auto makers, improved highway lighting, signage, and general design considerations, mandating seat belt use, ‘Don’t drink and drive,’ and other safety ad campaigns, tougher traffic laws and fines, more enforcement, and so forth.

In replay of that history, can you uncover recollection of ANY instance where a given governmentally sponsored approach significantly resulted in an INCREASE of traffic accidents or fatalities? I think not. The point is, in this control group review, we see that a problem which is seriously addressed for its own sake tends to evolve improvements, rather than degradation, over time. Restated, a legitimate problem genuinely and sincerely addressed in this way can always be made better by a cure, or an ineffective cure can be discarded in favor of a renewed attempt.

We must also ask, for reasons which should become apparent, who benefits thereby? The answer is, essentially, everyone. Drivers live longer and suffer less as a class, costs of accidents go down, though costs of ownership of vehicles tends to increase somewhat due to more expense in manufacturing and, for some, higher fines or fees associated with use of their vehicles, and taxes for improvements in highways. Most of us are content with these offsetting costs, and do not complain too much. The nation’s quality of life and GNP are enhanced.

More to the point, there are no significant losses of freedom or increases in political control by government, though new laws addressing safety issues may impose changes in procedures and provide for penalties; no one is unduly oppressed or repressed thereby, and basic rights remain unscathed.

Hmm… that seems to fit rather well with Titus 2:7 “In all things shewing thyself a pattern of good works: in doctrine shewing uncorruptness, gravity, sincerity.”

The Comparison Group; Terrorism

Osama bin Bushadine

Rewinding and replaying the same period of time, but this time looking at Terrorism, let us compare to the Control Group. One difference we see almost immediately is that virtually all of the effort to combat ‘the problem’ stems from national government responses, rather than regional and local levels. They, alone, by and large, have defined the problem and ‘solutions offered.’ That, alone, might be a significant clue; a small handful of Men, all of like nature and purpose within the power elite, control all aspects related to the issue.

Indeed, no one else’s opinions are even allowed to hold sway, regardless of their quality of logic or popularity among the People. In almost every case we find, in reverse to the Control Group, that their actions have stimulated, rather than abated, the problem of terrorism. Indeed, if we go back far enough, we find that the problem did not even exist except for the causality of their actions. To make the point, let us look at several ‘models’ of terrorism. Start with the European model:

Go back to the time prior to the European Community, and you find that terrorism essentially was non existent in the early years of Post War Europe. But it came to be, based on the nature of groups formed to foment terrorism, because of ‘Cold War tensions,’ if we believe the political rhetoric of the day. Based on the rest of this presentation, I’m thinking you will rightly conclude that assumption a sham, and the true cause lay elsewhere: false flag psychological operations. And should you not naturally so conclude, we will see there is proof it is so.

In point of fact, the processes which will be described, next (in the American model), apply to quite well to the European model. Terror attacks in Europe enabled the same exact processes, and in Europe, I assert, directly helped and led to the formation of the European Community, itself, a key Globalist early goal. Remember that notion as we near the end of looking at the American model, which will bring the point home in unexpected ways, and fully relate the Globalist aspect.

I only thought to bring up European model because it underscores and echoes in reenforcement the discoveries we will find in the American model. Any nation which has in the past or currently experiences terrorism should find these same factors in play, as well; they are portable concepts useful in any governmental environment. But in all cases, they serve only one special interest group, a group present in every governmental environment; Globalists. Allow me to make the case…

In America, terrorism was not even in the American lexicon until CIA began funding, training, and arming radical Muslims as part of their meddling in the affairs of Islamic nations rich with natural resources. Such meddling is a sure-fire way to generate resentment and hatred given their religious beliefs, beliefs which impact political actions in ways perhaps uncommon elsewhere.

I remember, in fact, one of the early newspaper articles (and later, others) on topic having to actually DEFINE the basic terminologies of terrorism in order to write about terror events. The point is, however, that we can lay terrorism at the feet of CIA and American foreign policy (on the one hand closest to our observation), and, as we will see, on Globalism, on the other, less visible hand.

If I were willing to make this blog longer than you would wish it in reading time, I could detail that for you to a level which showed CIA and the Department of Defense, often in alliance with military contractors and Globalist firms, actually imported most terrorists we have heard about acting on US soil (and elsewhere), often aiding in their visitation, training, and financing up to the moment of their terror acts, and even in their escape and any subsequent reentry into country. This I do in my four volume bookset, Fatal Rebirth, with over 1,500 footnotes of factual evidence. Want a free ebook of volume one?

So we see right away that the very problem was created by government. In defense, or rather concealment of the fuller truth, they claimed it unintended, even coincidental or unavoidable, and most of us believed them. But the footnotes I speak of show otherwise, especially in terms of lesser known ‘smoking gun’ events. One test of the sincerity of the claim is the question, does government move to ‘address’ this new terrorism problem as they did in our Control Group? Well, sort of…

The very first effort in response of note was the Patriot Act, a major assault on Constitutionally guaranteed liberties which, they promised, would be repealed as soon as they got a handle on the problem. Tyrannical governments which have evolved throughout history have always got their start with that very argument in justification of repressive actions, creating for themselves that slippery slope of no return. So many times have they had the chance to repeal the Patriot Act and instead elected to extend it, if not add to it, that I’ve lost count. Full grease ahead, downard, Ho!

Virtually all Congressional and White House actions aimed at combating terrorism have followed this self-same pattern: repressive responses which reduce Liberty in exchange for alleged security, a formula known to leave the people with neither, and which instead leads to a totalitarian police state. That’s how the Communist revolution in Russia led to something Karl Marx never intended for his movement. That’s how South American dictators grew their power. That’s how Hitler came to be, and so forth. But it is not how you combat terrorism, for it has not abated, though one may argue there is a current lull. So again, I ask, who profits?

To be sure, not the terrorists, who are guaranteed to generate a backlash against their own homelands. Examine all of history, and it is rare to find an example of the use of terror which resulted in good outcome for the nation from whence attacks originated, and on whose behalf their acts were supposedly committed. Their people suffered, typically through military response, worse casualties and consequence, than did the nation targeted with terrorism. It is a loose-loose situation for terrorists. There is but one exception, to be noted shortly.

Indeed, it is instead the nations targeted by terrorism who benefit. Not the citizens thereof, who bear the brunt of attacks at a personal level, but the men and political forces in power. Terrorism, in fact, gives power to the national government and its leaders, big time. Always; Hitler the perfect example. In international terrorism, the real loosers are the citizens of both nations, and more importantly, all religions who worsiph the God of Abraham; the Jewish, Christian, and Islamic faiths for whom terrorism is a great tool for Globalist (Satanic Illuminati) divide and conquer tactics.

But it is a double whammy for citizens of the target nation, because they not only suffer the casualties of attacks, but the loss of freedoms and rights usurped by a government become more tyrannical. Such benefits are why false flag terrorism is often the tool of one’s own government. Hitler used it, and many Americans are convinced George Bush used it in Sept. 11, and so forth. Fatal Rebirth offers much evidence in support of that belief. Such powers and principalities go out of their way to foment or fake terror acts, even if they have to supply and fund the ‘leadership’ of the terrorists and grow them into a local power — the only terrorists to benefit being those paid and empowered at leadership levels.

Proof, in Fatal Rebirth, shows the number two man of al Quaeda, in fact, to be a double or triple agent working for CIA and the Department of Defense. That’s right, the man who not only planned, but helped execute the attacks on American Embassies, the USS Cole, and the bombing of the World Trade Center, the man who managed to put bin Laden into power and unify other terror groups under his command… was one of our own. And if that were not enough, he held a job with a major defense contractor when not employed by the United States Army.

Is terrorism false flag?

Terror culture growth in a petri dish

The macro illustrates further. Government actions to combat terror actually stimulate it, rather than fighting it. Every action in the Middle East has tended to angrify Muslims even more, making it easier for them to recruit combatants to use against us. Middle East policy continues to be based on previous failures, with no learning curve in evidence. Even those things we would outwardly see as ‘good acts,’ were often deliberate betrayals.

For example, an American company providing schoolbooks for use in the Middle East for very young children used pictures of bombs, grenades, and guns for counting exercises… early enough that by the time CIA was training Osama bin Laden, those children were old enough to be recruited into al Quaeda. Now, once we have invaded and seized control of Afghanistan, the same publisher is providing books with butterflies and Poppy blooms. So now, instead of growing terrorists, Afghanistani youth will grow up thinking it perfectly normal to grow and sell the crops used to make Heroine, those fields guarded by American soldiers as you read.

We continually arm radical groups for use against their own local regimes we conveniently deem ‘repressive’ after decades of working with them as allies and arming them to the teeth in many cases. And then wonder why the radicals soon enough turn those weapons on us, irrespective of if a new regime was put in place, or not. Moreover, any new regime is more dangerous than the old, outwardly, though I maintain it is an intended consequence. This is indeed on purpose of our terror and foreign policies, as reflected by the fact that we keep repeating these mistakes as if oblivious to their cause and effect relationships. There is proof.

Fatal Rebirth, recounts a specific PowerPoint presentation at the Pentagon by Defense Policy Board kingpin, Richard Perle, part of the PNAC (Project for a New American Century) plans to take control of the Middle East, and by capture of the bulk of remaining Oil repositories therein, to control the World. It is all based on concepts espoused by the Council on Foreign Relations and other Globalists, and Zionist interests via a partnership with a joint US-Israeli think tank. It laid out a multi-year, multi-war/revolution plan for takeover of the major Middle East nations in domino fashion, specifically with the intent of giving control over to radicals, specific persons controlled by or partnering with Globalists. Every war in the Middle East, including the more current revolts, was in the Power Point, with more such to come.

For example, Fatal Rebirth shows you that the top two people now running the Afghani government were both former CIA employees who also did work for the Oil Industry, and both were directly involved in trying to get the Taliban to grant oil and gas pipeline rights to American oil companies. Do you honestly think citizens at large in Afghanistan would benefit by and approve of covert CIA/oil industry control of their nation in the guise of a new democracy? This is what I mean when I say outwardly, new regimes may seem less than friendly, but secretly, they remain Globalist puppets to perpetuate control mechanisms there, as well as elsewhere.

Make no mistake. This is not an American plot so much as an international plot by Globalists, the modern Illuminati.

This is also revealed in the referenced PowerPoint, where even darker aspects tie directly to Mysticism, Satanism, and Illuminati principles, matters requiring too much detail to explain in this venue. But I will add that Perle himself has his own CIA front-like operation which works directly with Arms smugglers for the purpose. Stability in the Middle East is NOT a goal, and never was. Such political machinations foster a kind of hidden control of the Middle East through secret alliances with terrorist leadership in exchange for quid-pro quo cooperation (attacks). There is no usefulness for political control plots found in peace and stability.

This covert alliance betrays the very reasons rank and file membership of terror groups join, as well as the greater citizenry and governments of their homelands, not to mention putting at risk the long-term welfare of religious doctrine which often guides their nation and political movements. If the people joining terror groups fully understood this, they would behead their leaders as traitors, and rethink their strategies in realization that terrorism is political control weapon being used against their own people as well is those of the target nation(s). Only the Globalists and their proxies in the involved governments and terror groups, can possibly win.

It deserves restating of who benefits, and how: in funding, arming, and aiding in terror attacks against the U.S. and other nations where Globalism runs rampant, the target nation governmentals (and the Globalist movement) gain two things, and the leaders of terror groups gain prestige and power over their own people for their ‘successes,’ and loyalty and devotion in anger evolving out of backlash-sponsored ‘failures.’ The two things the Globalist proxies gain are an empowerment to further restrict freedoms and wax oppressive through legislative response to terror event ‘successes,’ and validating police state mentality by offering minimal proofs of effectiveness at the few terror attack-sponsord ‘failures.’ Perfect quid-quo pro.

So we see that regardless of if a terror even is effective, or fails, there is win-win for the Globalist and their terrorist cohorts, but only loose-loose for citizens and terror participants, who are mere pawns in a grand deceit.

Ergo, in our comparison, Luke 6:43-44 seem quite appropriate; “For a good tree bringeth not forth corrupt fruit; neither doth a corrupt tree bring forth good fruit. For every tree is known by its own fruit. Figs aren’t gathered from thornbushes, or grapes picked from a bramble bush.”

A need to shift gears: homegrown terror

A kind of proof that such terror is artificially generated and outcome is controlled lays in the fact that if it were NOT so, the focus would remain on the foreign sponsored terrorism, and changes or experimentation in solutions would evolve to some eventual gaining of ground. But, if one is intending a Police State, one realizes that eventually, there will be internal resistance and insurrection forces to be dealt with at some point — given that the only solutions applied are repressive to freedom in nature. There is only so far one can go in oppressive reduction of personal freedoms without sparking resistance.

What is domestic state sponsored terrorism?

The answer? Raise the stakes and ‘broaden the war.’

Image: secretsofthefed.com (click)

Therefore, almost immediately on the heels of the Truther movement, we here in America started to hear about homegrown terrorism, a thing which caused most of us to respond with ‘???’ And from this has evolved a whole new series of staged events to justify the next waves of repressive acts and moves which, like those for Islamic terror, actually tend to foment and generate the very terrorism they would pretend to combat.

These also served to empower the TSA and other repressive acts designed to train us to be obedient to Police State social controls (and the basest of personal insults and groping to which we dare not protest.) This additionally causes us to realize we need to fear and respect our government, despite the fact that our whole form of government is based on the notion that they should fear displeasure of We, the People. Once we have it upside down in our head, it is easier for them to advance with less meaningful resistance.

But then, they had yet to meet the 99%.

But the general strategy creats self-fulfilling harbingers. To worry about and act to ‘prevent’ or ‘combat’ terrorism will eventually spawn it. At some point, you no longer need false flag or even entrapment provocateurs. Fascists want and need internal civil unrest in order to justify further tightening of their power grip, and the unraveling of and discarding of the Constitution (esp. 2nd Amendment) that they may evolve into a truly Globalist entity. Specifically, in America, as I frequently detail in other posts, the establishment of the NAU; the North American Union. An exact replay of Europe, and why that model was briefly examined.

We see signs this is so by the fact that there are separate non terror-related actions which are preparing for acceptance of Globalist programs which can only function if there is a new Constitution under an NAU construct. Agenda 21, Codex Alimentarius, the CANAMEX Highway, United Nations Small Arms Treaty and other U.N. sponsored mandates such as Biospheres, all clue us in to this fact. Our Constitution and, more directly, the Second Amendment make these things almost impossible under our present form of government. They need Martial Law, suspension of the Constitution, seizure of firearms, and a new Constitution with more leeway.

They are easing us into the mentality of Globalist control by selling us on grandiose benefits which seem lofty, but which are truly unworkable and intended to conceal the truth: total control is not freedom, but slavery, and a one World government sponsored by the New World Order is nothing but a mechanism to seat the Antichrist as World Leader — the whole point of the Satanic Illuminati plan to create the NWO in the first place.

So they push for gun control legislation guaranteed to make more militant the mindset of gun owners. Then we conveniently have a wave of gun violence worthy of sparking demands for gun control, a matter deeply tied psychotropic drugs evolved out of CIA mind control research. I don’t even own a gun and yet they make me want to stockpile weapons and ammunition to protect the Second Amendment from panic-driven, unthinking gun grabbers and their Globalist sponsors.

I can only imagine that militia members are waxing paranoid and actively planning for and training for combat with government or United Nations forces. Eventually, someone from such a group will undertake an act of violence to ‘strike a blow for freedom,’ but it will most likely be a false flag event intended to justify efforts to enact gun confiscation. It will, in point of fact, be labeled as ‘terrorism.’ No right thinking group of gun owners would effect a first strike policy, knowing this would be the result, though a paranoidal schizophrenic individual, may, with entrapment encouragements.

They passed the NDAA and the DOD embarked on reckless and provocative mock raids of American cities in violation of Posse Commitatus to make us fear government to levels that may spark shooting of federal agents, soldiers, or cops in perceived self defense, as examined in an earlier post. Again, if some truly paranoid person does not eventually do so, I fear a false flag series of events will be staged. It is absolutely critical that government be able to vilify gun owners if the NAU is to come to pass, lest there be a full-scale armed revolt.

They passed the Monsanto Protection Act, which protects Monsanto from liability and enables their forcing of dangerous genetically modified crops into the food chain (to include meat supplies since corn and soy are fed to animals as well as to humans). This will most surely make militant a number of the millions of farmers who have sued Monsanto, and tens of millions more who realize GMO foods KILL livestock, cause birth defects or sterility, and even cause hair to grow through the digestive tract from tongue to intestines.

Eventually, again as I have posted earlier in full review, someone will get the idea in their head to act out in a violently against Monsanto, perhaps an arson or a bombing, or worse.  When you take away the right of redress through the courts, you guarantee revolt in some violent form. False flag efforts will hardly be needed, IMO, but entrapment encouragements will likely be involved. Fascists NEED such violence to come to power, and once more, they will call it ‘terrorism:’

We must have terror and internal chaos if we are to have a New World Order. In fact, it would seem it is forecast by God to follow a period of great upheaval. 2 Thessalonians 2:3 “Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed, the son of perdition;” In the text of King James, ‘falling away’ means ‘rebellion,’ and the day spoken of is the End Days, the ‘son of perdition’ the Antichrist. Be not deceived by your leaders.

How is terrorism a tool for political control?

Findings

In summary, we see the pattern is complete in all instances, following the path of cause and effect which is opposite the model of the Control Group. There is no effort to combat terror, but instead, to generate it.  It is a political control technology, a kind of mind control; it generates fear to enable tighter security control at the expense of liberty, generates resentment to foment new terror threats and, thereby, to repeat the cycle even well after any foreign threats might be abated through takeover of their governments (per the PowerPoint).

There is a great falling away taking place in the Muslim World, as they war amongst themselves for radical supremecy. In the non Muslim World, where radical Islam conducts terror strikes, populations loose freedoms which will steadily lead them toward having no other choice but armed revolt. My prior blogs are full of this warning, and show how perilously close it may be right here, in America. But this is a World-wide phenomenon, as the Occupy movement has shown. We are ripe. We have been deceived by a cyclic strategy which brings us ever closer to boil over.

Such cyclic strategy worked in the Middle East flavor, it worked in the European flavor, and the South American flavor, and it will work in the homegrown flavor (if we allow it). Dumbed-down Sheeple comply with little true objection in the false belief it is perfectly logical to so evolve, not realizing, like the frog in pot of water on the stove, that the political control temperature will soon be fatal and leave them with no way to escape a terrible unwanted and unforeseen fate; rule by a totalitarian police state, and even the Antichrist. Got 666? Almost.

In Fatal rebirth, the cover of the first volume expresses it all this way: Terrorism creates Nationalism (obedience and loyalty to government ­— who’s political leaders benefit from terrorism); Nationalism fosters Capitalism (most notably, the Military-Industrial-Intelligence-Media Complex — who profit from terrorism); Capitalism empowers Globalism ­­— the power elite of the round table groups, the modern Illuminati (who benefit and profit from terrorism); Globalism therefore requires Terrorism — funding it directly, and through their control mechanisms within capitalism, nationalism. In effect, it is nothing more than a cyclic machine, an engine to power control mechanisms, and made up of control mechanisms, cyclic in nature.

I call it the Armageddon Machine. I also call it treason, though that is just the outer shell at the national level. If a shooting war erupts (armed revolt), the shooting should not stop until that machine is destroyed. It will not be a revolution simply to restore the Constitution and reestablish freedom, but to delay or prevent the end of the World as we know it. The modern Illuminati, the Globalists of the World, will be the true enemy, not just some handful of govermentals and their obedient armies. It will be a war with powers and principalities, the truest source and form of terror imaginable.

They exist not just here in our own country, but in other countries, from whence they manipulate and participate in events, here. We will likely have to take that war to them, as well. Any such revolution will need to be enlarged to an internationally scope, or we will never be able to start anew with hope of long success. Emptying Freedom’s lifeboat of Illuminati water has little effect if the satanic hole from which it springs forth is not also plugged.

This is true in every nation. Fascism, the outward manifestation of Globalism, exists in every government to one degree or another. The more affluent and powerful the nation, the more it controls the nation in subversively covert or openly overt ways. It matters not if the country is socialist, communist, democratic, or religiously governed (e.g., Islamic); fascist-globalist mechanisms guide it toward Illuminati goals. As the Occupy movement has illustrated, there is hardly a nation where the people are not starting to awaken to these facts.

The next revolution will undoubtedly spread to be global — especially if it originate in the one nation thought to be ‘most’ free. As America goes, so goes Canada, and Mexico. As America and Canado goes, so goes Britain. As Mexico goes, so goes Central and South America. As Britain goes, so goes the European Community. As they go, so goes the entirety of the former Soviet Bloc. And from there it is only logical that Middle East and Asiatic, and the rest, join in.

Is the war on terrorism fake?

Epilog…

That possibility moves me to employ something from the Prolog of Fatal Rebirth as Epilog, here. Because all men seeking freedom in such a battle will become John Gault in that day. If not, or if John Gault falters and fails, the Antichrist will come to power; we suffer End Game. But if Gault prevails, as in the fictional character’s role in Atlas Shrugged (Ayn Rand), the World will come to a screeching halt on its current course to Hell, and get a second chance, a reprieve, and an extension to our lease on the Planet, though at great cost. From Fatal Rebirth:

Truth cannot live on a diet of secrets, withering within a web of entangled lies. Freedom cannot live on a diet of lies, in the end surrendering to the veil of their oppression. The human spirit cannot live on a diet of oppression, being subservient against the will to that unchecked evil. God, as truth incarnate, will not long let stand a world devoted to such evils. Therefore, let us have the truth and freedom our spirits require… or let us die seeking these things, for without them, we shall surely and justly perish in an evil world.

And yet, in final note for this post, I am also moved to write… as the Bible text indicates, that to so revolt may play directly into their hands. The answer is found in the nature and outcome of any such revolt, especially if Global. The key, I am convinced, is where the revolt starts, when and why, and how it concludes. That, however, will be another blog post. Here, I will simply say this: God has our back, either way — provided we make no foolish mistakes and act without right-use-ness of Free Will (righteousness). Subscribe to learn more.

Dear Government: I will not Comply w Internet Tax Bill; Go Fish!


Sometimes a citizen has to think Boston Tea Party. My time has come. Neither will I be forced into indentured servitude as involuntary tax collector, nor will I allow government to tax the sweat of my brow creating the goods I sell. There is more I will not, as well.

by H. Michael Sweeney

copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

The Senate passed the Marketplace Fairness Bill (Internet Tax)

from Facebook post by The Anti-Media

Just say no!

This is in point of fact sweetheart legislation to benefit Amazon.com and select other firms, though they claim instead that it will benefit local retailers who ‘suffer’ because people can buy goods for less at times on the Web. So what is this, really, a tax on savings? Where do they get the nerve to steal from us yet one more time? And how do they get the nerve to call Federal Price fixing against select businesses the ‘Marketplace Fairness Act.’

If you really want to level the playing field among sellers, pass a law eliminating sales tax that States might join with Alaska, Delaware, Montana, New Hampshire, and Oregon, who have no sales tax. Take Oregon, for instance, where voters must approve any tax, and pay only income tax; NO SALES TAX. Sales tax, especially when citizens have no say over it’s levy, or no, is legalized highway robbery by the taxing authority.

If the Bill passes the House the way the it is currently written, a Web marketer would henceforth be required to collect sales tax for all federal, regional, and local taxing authorities where the purchaser resides. This creates a nightmare of calculations which can only be met by using complex point-of-sale software, software which Amazon.com has already written according to radio commentator and former newsman, Lars Larson. Amazon is the only Web firm pushing for this law, the only Web company with the nerve to charge a 2.9% service fee on tax collection, payable by the third party seller who sells through Amazon.

That’s just one reason I don’t sell anything through Amazon, who has a bad habit of running rough shod over smaller businesses. That is exactly what the tax being forced upon its lesser Web competitors will be doing.

My findings are somewhat different than Larson’s, however. The service fee is correct, but Amazon uses third-party software solutions from a company called Vertex, which is currently the new name for (by acquisition) the old Arthur Anderson Accounting firm… you know… the CIA’s preferred accounting hijinks firm to conceal money laundering from illegal arms sales, drug sales, and terrorist payoffs. See 2002 on the firm’s timeline.

The government says they will give the software away, but do you suppose Amazon (or Vertex) will give it to them, for free? And what about firms like PayPal, where Web transactions are already complicated, and where Amazon/Vertex software will not likely fit nor be well adapted? Important, because a lot of Web marketers work out of simple Web sites which rely exclusively on PayPal for payment transactions, and have no site processing capabilities, even if handed the software, having no means of implementation short of paying someone to re-engineer their Web site.

The Supreme Court has already ruled that you cannot force a business without a physical presence in a State to collect tax for products or services paid for from persons within that State. But Congress is being asked (by Governors of Sales Tax States, naturally) to write such a law, anyway. That’s highwaymen writing laws to make highway robbery legal without even having to visit themselves upon highway travelers. Automatic holdups.

I refuse, thank you

And that notion brings us to the bottom line. Take me. I sell books. Books I wrote and self publish. This is the sweat of my brow and I will not have anyone charge a tax on one when I sell it. Nor will I do the job of tax collectors without being paid for the trouble, and certainly will not pay someone else for the trouble ‘on my behalf.’

You cannot force someone to do a job for free, that is called slavery.  So instead of the highwaymen at least confronting the travelers and demanding taxes under threat of punishment, themselves, they instead intend to force others to do so on their behalf, and or to pay a third party (i.e., Amazon/Vertex) for the privelege; this is clearly indentured servitude, and forced contractual agreements with no say so in the terms, thereof.

Hmm… sounds a lot like Obamacare, doesn’t it. Funny, that was called a tax bill, too, once the Supreme Court told them forced contractual obligations were unconstitutional. Making it a tax made it legal, somehow.

Bottom line: If you want me to collect and pay such taxes, use someone’s software or services, or see me pay a sales tax on anything I purchase from another State via the Internet, then bring your guns that you can stand over me at every transaction. Bring lots of bullets, too; say all 1.4 billion of them, because I, and perhaps many others, will probably be forcing you to duck for cover in the effort.

Else go to Hell.

O.K.  I’m calmer, now, having got that out of my system. And sure, the law only applies to businesses doing over $1M annually, and that is not (yet), me. But if anyone wishes to place an order for $1M or more in books, I WILL NOT TAX the sale, nor pay such a tax upon demand. That’s my promise… and THERE IS a harbor close enough for me to dump… well… in the absence of any bales of tea… the taxman who cometh. I’d even throw in a Congressman or two for good measure, except I can’t throw them any farther than I trust them.

 

 

 

N. Korea EMP Attack Next False Flag per Wag-The-Dog Evidence


If a military coupe planner needed an excuse for Martial Law in a hurry, what better way than to EMP the country and blame N. Korea? Such an attack from N. K. is impossible, and yet Sheeple wallow in the wag-the-dog Sheep Dip in a daze.

North Korea EMP Attack Next False Flag per Wag-The-Dog Evidence

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How will North Korea attack America?

What you will learn reading this post…

  • A review of signs that a false flag EMP nuclear detonation in our atmosphere will be staged;
  • A review of what such an event enables and sponsors of value to the NWO traitors;
  • What you can do to preempt and deal with consequences if it happens;
  • How you can help prevent it from happening.

Is an EMP attack against America possible?

Why I write and you should read…

Daytime EMP burst; end times headlines blog (click)

On April 3rd someone advised me that Google showed there were almost 200,000 Web sites claiming doom and gloom in the form of a North Korean EMP attack on the U.S. While many of these were the usual conspiracy theory resources (some with good reputations, some questionable, and some known disinfo organs such as federaljack.com.), unlike many conspiracy matters, there were also some mainstream news sorces carrying the story.

That, alone, made me sit up, but two days later, it had jumped to over 309,000, and is now nearly 900,000 (Korea + EMP attack.)

Even many mainstream outlets (e.g., Newsmax, Investors Business Daily, Washington Times) normally quite conservative were forecasting the darkest of all possible outcomes, some claiming up to 9 out of 10 Americans would die as result. I smelled, as did the person sending me the information, a big federal disinformation rat. Ever hear of Wag-The-Dog? Remember WMD in Iraq? That was really WTD.

If not, go rent or otherwise watch the Dustin Hofman, Robert De Niro movie with the same name, Wag The Dog. It will give you a hilarious review of EXACTLY what it is, and how it works, in a tongue-in-cheek presentation of real-World disinformation tactics employed by the Military-Industrial-Intelligence-Media complex. It’s all about manipulating people so they won’t question government crimes.

This EMP attack story is particularly disconcerting because it smacks of portending a false flag attack by our own government for reasons explained herein. Shades of the hit TV series Revolution, in fact, where there is sudden loss of power and political chaos results, almost as if the TV show was to prep us for what is to come that we might be easier to subdue in appreciation to military ‘rescue.’

What is an EMP attack?

What is an EMP attack?

When a nuclear bomb is set off, huge bursts of radiation of all manner are released in an unstoppable flood. Everything from heat and light to atomic radiation. Normally such bombs are used for their physical destruction capability, eviscerating a core area and causing blast and fire damage over a much broader area, and radioactively poisoning and rendering unsafe an even greater area. But there is another, more tactical use.

It is widely known but little spoken of, untill late (wag-the-dog tactic: foster massive dialogs in support of false story point), that if such a device is detonated high in the atmosphere over an enemy territory, the sudden burst of gamma rays creates  a massive electromagnetic pulse (EMP.)  So massive, in fact, that it destroys or interferes with most anything electronic. Motors, generators, and many digital and non digital components are, in fact, destroyed if in operation at the time, and some items will be harmed even if not in use, unless sufficiently shielded. The entire power grid would, in fact, fail and be extremely difficult to repair for a long, long time.

The result in such an attack on a modern society is total and instantaneous transportation into the Stone Age (more correctly, perhaps, the 18th Century, the agricultural age). But given that modern societies have no infrastructures in place which rely upon 18th Century technology, it might as well be the Stone Age. The ONLY defense against EMP attacks is to destroy the warhead in flight to destination, one of the reasons America has stubbornly tried to develop anti-ballistic missile systems since the time of Reagan and, truth be known, before.

But I note that wag-the-dog disinformation tends not to mention this factuality. Better if we think we are defenseless, where the only benefit to such a belief exists if one intends a false flag event.

Note: most of what is written from this point forward is covered, along with other related topics, in great detail in my four volume book set, Fatal Rebirth, including copies of the Constitutions mentioned below, with analysis. Want a free ebook of volume one? The book literally predicted 9-11 and resulting Middle East wars, and much, much more. It also predicted false flag attacks would be used to justify the Martial Law and subsequent events discussed herein, and what can be done about it.

What is a false flag event?

The nature of False Flag attacks

When a country wishes to start a war or enact some terribly repressive changes in political/governmental paradigms, it is historically common to stage a fake attack by some designated group or country as fall-guy. The people become enraged and demand retaliation, enabling a war, and wax super-patriotic and tolerant of any losses of freedoms or dramatic shifts in the structure of government to ‘better assure victory.’ Wag-the-dog rhetoric is required well before the event to paint the would-be source of the attack as a very dangerous opponent, vile and full of unchecked hatred — but the real purpose is to build fear and hatred of the ‘enemy.’

Internationally, the country employing false flag is seen as innocent victim, and may bash away at their new enemy freely, perhaps even recruiting ally nations. In some cases, even the people in the target country think their own country guilty as charged, which can foster an underground or more overt revolt which further helps assure victory. Only their leaders know the truth, but who will believe their claims?

Not very many beyond the most loyal, not many that count. Wag-the-dog efforts must, therefore, include ‘evidences’ after the fact, but one clue is that such evidences may seem just a little too convenient and quick to be located — such as the old reliable and oft used ‘found wallet’ belonging to the terrorits. Sheeple really are stupid to fall for that time and again. It has been used about six times, now.

All that is required is to stage a single, large-scale or politically sensitive event (e.g., assassination), or several smaller events which can be tied together at the desired time, all ‘evidence’ pointing to the same (false) source, also a job for the wag-the-dog folks. Hitler used the Reichstag Fire, burning of the beloved national library and many rare books, which was blamed on the Communists to justify changes in governmental structure which altered Germany from a Republic to a one-man show controlled by the fascist Nazi party. It launched the World down the path to WWII.

How can you spot false flag events?

Detecting false flag operations

Robert Dinero as spooky government disinformationalist Brean in Wag the Dog; “Why do people go to war?”          “The War of the future will be nuclear terrorism…              and there ain’t no war but ours.”

The Truther movement can offer a great deal of evidence that Sept. 11 was such an operation, and in fact, as I will offer in another post (and detail in Fatal Rebirth), most, if not all, terrorism against America and elsewhere, is demonstrably false flag in nature. All that is needed to establish or illustrate a false flag event is to use one’s brain in review of the basic facts, which, of course, Sheeple don’t know how to do because they’ve been dumbed down by psyops TV programming technology, rich with wag-the-dog. False flags look like this:

a) there is an abundance of early, pre-event wag-the-dog negative media coverage painting the bad guys as evil and out of control, building them up as a huge threat — perhaps even a specific threat;

(e.g. pre 9-11, Osama bin Laden was not exactly a household word, not even amongst the many radical Muslim terror groups, but he had an excellent PR firm, called CIA, who was fond of trotting out videos of him making threats, and listing him as prime suspect in prior attacks — while a CIA station chief pays him a visit in a Saudi hospital.)

b) the event takes place and immediate evidence is produced;

(e.g., within mere hours of 9-11, a terrorist’s wallet was found ‘laying in the street amid debris’, and other evidence sufficient to allow President Bush to provide the full names of all 19 alleged participants.)

c) the official story and available facts conflict, often in spades;

(e.g. 9-11 hijack flight passengers used cell phones to call relatives; cell phones did not work in flight in those days)

d) it contains nonsensical or illogical, impossible facts, or ‘magic bullet’ explanations;

(e.g. the nose of the South Tower plane passes completely through the building in tact, but nothing larger than a shard is found of it on the ground — no plane blown up by missile, by bomb, or fuel tank explosion has ever had the nose section destroyed so utterly, large sections of it should have been found.)

e) there are signs of a cover up regarding evidence: vanishing, altering, or manufacturing of evidence;

(e.g. Flight 993 cratered into a field, again with only shards remaining, and yet the crater is shown by earlier satellite images to have existed as a geographic feature well before 9-11. No FAA investigations looking at serial numbers of parts, either.)

f) there is a wag-the-dog disinformation effort evident; a cover up;

(e.g., American media refused to report what international media had already reported: that the date of the Afghan invasion was set, and allies arranged for prior to the 9-11 event, and that the Defense Policy Board had presented a PowerPoint presentation at DOD which, in fact, laid out a series of domino wars and revolutions in the Middle East to put radical Muslims into power as puppet governments — the Hashemites. It also failed to tell you that the top two men in the new Afghani government are ex CIA/DOD employees who also worked with Chevron Oil with Condaleeza Rice trying to get the Taliban to agree to an oil/gas pipeline deal pre 9-11. This is meticulously detailed in Fatal Rebirth, which has over 1,500 footnotes.)

g) there is an attempt to discredit anyone who questions the official story, and offer lame excuses for conflicting facts;

(e.g., Truthers are constantly ridiculed and labeled in casual remarks by media and governmentals as mere ‘conspiracy theorists,’ called traitors, insane, and even terrorists — more wag-the-dog disinfo. In ‘debunking’ various Truther claims, almost every one of the 25 Rules of Disinformation have been employed.)

h) an official investigative body (i.e., special ‘independent’ prosecutor, Grand Jury, panel, commission) is established to ‘find the truth, no matter where it leads,’ but they selectively examine evidence, alter, vanish, or falsify evidence, and are generally made up of people who benefit;

(e.g., the 9-11 “Independent Commission” was entirely, save one, made up of Bush cronies, each of which had previously bailed him out or were in his debt. Some had ties to the very institutions and technologies used in the attacks. And as Truthers easily point out, their efforts were white wash in nature with respect to manipulating, hiding evidence. All but two of the 12 had intelligence community ties. See table of cronyism toward bottom of this Noilwar! page.)

i) there is evidence of prior knowledge and/or media complicity.

(e.g., the Pentagon was making plans for emergency response in event of aircraft crashing into the Pentagon — photo of models planes and firetrucks and Pentagon with military brass in Fatal Rebirth… – or – BBC news in a live report announced that Building 7 of the WTC collapsed while it was still standing in the background… and then it collapsed on air, later, causing the Reporter to ad, “Oh, there it goes, now.” Google removes the vid, and BBC claims they lost the footage.)

Collectively, even individually, such wag-the-dog tactics are nothing more than a cover up. Whenever a cover up is in play, it is proof of a conspiracy, because if for no other reason, than to effect a cover up REQUIRES a conspiracy of players. Further, as there is no reason for a cover up unless there is an original criminal act, that, too, is part of the conspiracy.

Why would happen in an EMP attack?

What is the value in an EMP attack to Globalists here, and abroad?

As I have written of in many prior posts, there is an existing intent, in response to a perceived cause, to declare Martial Law and suspend the Constitution, and establish a new military government. This is out of the mouth of one of the nation’s top military leaders. You can bet that door-to-door searches and seizure of guns will follow, as was done in Katrina.

We next start to see mainstream media actually cover the fact that the military is practicing raids on American cities, in some cases with helicopter gattling guns blazing, and troops repelling, doors being blown off of buildings. They have never covered such events this way, before, indirectly indicating it is wag-the-dog psyops, again prepping citizens for future events. But of late, the quantity and intensity of such violations of Posse Comitatus has skyrocketed to include many major cities, indicating something big is on the horizon.

There is further the general intent by Globalists to establish a new Constitution for the NewStates of America, and the World Constitution, both documents already written (and both reproduced and analyzed in Fatal Rebirth), which makes rights more like a privileges, and provides an endless array of reasons, methods, and governmental authorities who can rescind them at any time, even retroactively, for individuals, groups, or all citizens.

Moreover, it enables the formation of the North American Union, and makes easier the acceptance of U.N. Treaties without ‘violation’ of ‘national sovereignty’ or the (new) Constitution. End Game ensues; the one-World government is formed (the World Constitution is ratified (already ratified in some countries), and the Antichrist can be seated.

Can you predict a false flag attack?

What are the signs EMP false flag may be afoot?

To answer this, we go back to our signs from above. I suspect that CIA types have infiltrated the N. Korean government to act as agent provocateurs assigned to stir up the young leader to his current state of rhetoric and provocative acts. The true likelihood of them launching an attack is nill, as indicated, below. But for a false flag event to enjoy any plausibility, there must be a seed basis for blaming another party.

a) there is an abundance of early wag-the-dog negative media coverage painting the bad guys as evil and out of control, building them up as a huge threat — perhaps even a specific threat;

(N. K. stories started weeks ago, and then suddenly the web was awash with EMP stories, both mainstream and Web.)

b) the event takes place;

c) the official story and available facts conflict, often in spades;

(Such conflicts are already known: an EMP attack requires an intercontinental ballistic missile and a large hydrogen bomb, both technologies at much lower states of development in N. Korea than required for the job — according to an insider analysts who should know  — but who cannot say so publicly because it would blow his security clearance.)

d) it contains nonsensical or illogical, impossible facts, or ‘magic bullet’ explanations;

(This would only become apparent after the event, explanations forced to address any major holes in the official story — they might claim it was a high-altitude weather ballon-delivered device that escaped detection.)

e) there are signs of a cover up regarding evidence: vanishing, altering, or manufacturing of evidence;

(also post event)

f) there is a wag-the-dog disinformation effort evident;

(We have a taste: there are currently nearly 900 thousand Web articles forecasting EMP attack on the U.S. by N. Korea, some of which are mainstream, but most of which stem from a select few sources associated with government disinfo sources such as Sorcha Faal, who is often used by DHS and State Department. These, in turn, are replicated and virally spread as if trustworthy, typically enlisting the aid of those conspiracy theorists prone to not well checking sources or examining the basic facts; fear mongering.)

g) there is an attempt to discredit anyone who questions the official story;

(Currently, there is hardly anyone in this category to discredit. I knew of only know seven of us when writing this, who consider EMP a false flag scenario. But we are ahead of the curve: this is normally a post event phenomenon, and until and unless naysayers abound or have a major following and are widely believed, there is no reason to bother labeling us insane, etc. Worse, an EMP event negates the need as there will be no media/Web platform for dissenting views and swaying anyone in the first place.)

h) An official investigation;

(Also a post event item, and again in this case, no need, as there is no way to get the ‘report’ out to anyone.)

i) prior knowledge.

(also post event.)

I will add one more thing, also from my reluctant resource. Any such actual detonation of a device will leave a fingerprint. Nuclear devices put out radiation signatures which can identify the maker of the device. In like manner, it is impossible to launch a missile from that part of the World without it being detected, and tracked. Indeed, a false flag missile would be detected. Many countries around the globe have the technical ability to monitor these fingerprints.

However, ONLY those in power (and their agents who run the equipment employed) in those countries are the ones who would know the truth. You would think it represents a de facto attack on their country to one degree or another, given the release of radiation. Regardless, given that most such countries are Globalist controlled (e.g., the European Community) or otherwise U.S. allies, even to include Russia — you cannot depend on their honesty.

They will likely say ‘Yup, N. Korea did it!’  Others, like China, may say ‘Not possible! It was a U.S. device.’ The number and nature of opposing nations will determine the degree of plausible deniability at home and abroad. A few dissenting nations known to be less than friendly toward America will be dismissed easily. But if any neutral (watch South America) countries concur, then you will see a magic bullet explantion offered to counter; scientific mumbo jumbo to discredit or counter such claims. But here, no one will hear any of those arguments, so who cares what others are saying?

How to prepare for EMP attack?

What can you do to preempt, or prepare?

Preempting such a false flag event is easy: just spread the word. Share this post, replicate it, make it viral, and so forth. Kick Sheeple in the butt and wake them up, teach them to use their brain, and make disciple activist of them if you can. If we can get 200,000 posts revealing it a false flag out there, they are less likely to feel safe in fostering it.

Preparation is easy enough, but tactically difficult in many cases, and costly. There are several areas of concern, most of which can be usefully addressed with some effort and or money, but some defy good solution for many of us:

There will be total loss of electrical power, and it will be long-term.  A good portable gasoline-driven generator will become worth its weight in Gold. But because gas stations will not be able to pump gas until they can establish their own generators, you will also need a goodly supply. Because it is not particularly safe to store a lot of gasoline in the garage, an Oil furnace tank becomes the better solution. The generator should be stored in a well shielded location, or covered with a metallic ‘blanket,’ or grounded mesh. You should have spare fuses and circuit breakers for every such item in your home.

There will be serious interruptions in the flow of food, water, and all goods. Even when goods can be found, most key items will be seized by FEMA. The price will be sky high an anything you can find as it will all revert to black markets, though FEMA and authorities will eventually use deadly force to attempt remedy. The first interruption could last for many months. So a good Emergency Kit of critical items and supplies is very valuable. The ability to quickly become self reliant (e.g., like a farmer) may make a significant difference in the ability to long survive. Rainwater collection may be appropriate, and despite alarmist concerns about radiation levels, it will remain safe. Regardless, plan on distilling all water prior to consumption, because water can only be stored for so long before things tend to start growing in the containers.

Transportation will be almost non existent. Any vehicle in operation at the time of the attack, and many newer (computerized) vehicles not in operation may no longer run, requiring replacement of many components before they will run (generators, alternators, various computer components, sensors, controls, switches, etc.) So now you know what spare parts to stockpile in a heavily shielded storage. Those few that do run will quickly become highly sought targets for theft. Vehicle security will take on a whole new definition and importance.

No single existing security scheme will seem adequate, and one may need to be willing to run over or shoot people trying to hijack you when traveling. Having at least one vehicle at all times not in operation, and of older technology with lots of spare parts in hand. Don’t forget windshield wiper and heater fan motors, and multiple sets of spare tires, as well, because tires will become targets for disabling a working vehicle. Have bicycles, scooters, and other alternatives available, too — but travel only in the case of dire need, or be prepared to defend yourself in the effort.

Computers, radio gear, and other digital systems not shielded from EMP are at significant risk. Those in operation will surely die, those not in operation and not well shielded may die. Walkie talkies, short wave radios, and computers, digital cameras, infrared goggles, and other critical devices should be placed in an Emergency Kit and the kit should be well shielded. A Farady cage (e.g., chicken coup wire mesh, or better), with a grounding wire, is best, but even just wrapping in aluminum foil may be sufficient, especially if stored beneath layers of buildig structure, such as in a basement. Of course, a TON of rechargeable batteries are in order with rechargers for use with the gas generator.

There will be rampant criminality: those caught without preparation will not see relief from FEMA or the Military early enough to prevent a ‘survival of the fittest’ mentality from taking over. If you have food, water, a generator, or a working vehicle, YOU BECOME A TARGET. You will need to be well armed and have security provisions in place against assaults on your home or your person when you travel. It will be in the best interests of the military to let things go crazy… to let people use up their ammunition and grow desperate for survival goods so that when they do come to help, we will be willing to cooperate in any way they demand, including forfeiture of our guns and other properties, accepting a new Constitution, and so forth.

No immediate help, not even from the military. Even if they wanted to help, they will be quite preoccupied in a war with N. Korea, and likely, Red China. We will hear only rumors, of course, because radio, TV, and the WWW will be none existent. That’s why helping to establish Web Walker, now NNN OSP (the Nodular Netizen Network Open Source Project — a 100% citizen-owned and operated wireless network which is operable even in disaster) may be of great value. NNN will also be useful against Web 2.0. When Internet services are reestablished (outside of Web Walker), they will be VERY government friendly; no politically correct sites will be found, only government approved information and globalist firms, and all Web data will be transparent and readable by the intelligence agencies at will. Support NNN OSP!

This is a bleak picture. Ask yourself, if FEMA was really there to prevent disaster and help in times of disaster, would there not be some such advice as this coming from them? No. The Globalists need a catalyst to propel them into power. It is not in their best interests to protect you from such chaos, or warn you of the risks and protections you can effect yourself.

They need to destroy the country if they are to advance to the next stage… and to insure you are without guns when they do — or at least out of ammunition. I hope you noticed there is a shortage of ammunition right now, in part because DHS has ordered 1.4 billion rounds in Satanic quantities for (?).

N. Korea Can’t Help It: War is NOT Senseless After All


A simple look at history, and I can’t believe no one else has discovered this primal cause of war. While Horace Greely’s sense of direction advised to go West, warriors head elsewhere.

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What you will learn reading this post…

  • The nature of official reasons given for war, and the forces behind them;
  • That those reasons have nothing to do with the real cause of war;
  • That a sense of direction is the true culprit, as shown by countless examples;
  • That the mechanism is metaphysical (Satanic), or perhaps geophysical — Mother Earth.

Updated 7/17: invalid link removed, typos and clarifications addressed, additional examples added.

The usually cited reasons for war

“The 38th Parallel is South of us; smell the food?”             Image: Guardian, UK (click)

Historians tell us that wars were originally fought to acquire territory for their resources, including people, commonly used as slaves or to fuel economies with tribute or pillage. As societies developed more sophisticated cultures, religious and political doctrinal differences were often sufficient enough to spark wars. As Ferris Bueller once said while talking to the mirror, “Ism’s, in my opinion, are not good. A person should not believe in an ‘ism,’ he should believe in himself.”

But we live now in modern times, and it seems that recently we have wholly different problems which have caused us to start to go back to war for resources, once more. Wars to control oil, control illicit drug trade, even to control money supplies. Imagine that; corporate war, banking war. As many people are pointing out, most of the last few wars and especially the ones forecast against North Korea and Iran… are against the last few countries on Earth without a Central Bank controlled by the Rothchildes and their Globalist, Power Elite friends, the 1% of the 1%.

Banking manipulation was, after all, a key part of the original Illuminati plan, its roots in Scottish Free Masonry, to establish what they themselves secretly called the New World Order, the very model of Fascism. Their end goal was a one-World government (ergo, Globalism), that they might, as I maintain, seat the Antichrist. Another key part, as pointed out in the Masonic Bible by its Satanist author, Albert Pike, was to get all three splinter faiths of the one true God, the God of Abraham, to war with each other that all those other ism’s Ferris takes objection to, might flourish; the old Divide and Conquer.

This was amplified by the inventing of whole new isms which at their core were Satanic in intent; whole new religions and other belief structures upon which to ‘guide’ men’s hearts and minds, including things just for the Power Elite, like eugenics (racial population control), sustainability via Agenda 21 (control of everything, everybody, every place), and Carbon-based monetary systems (control of controls). And more such. The rest of us suffer the consequences while fighting in deliberate distractions over any partisan topic a Politician can think of to infuriate a good chunk of us, and about esoteric and philosophical pablum in minutia designed to keep us examining our navels.

In support of all this, the U.S. military, like all militaries we might suppose, is lead by men who are quite often Satanists, and/or members of the moderen-day Illuminati groups which generally fly the banner of Globalism. They have two oaths, the one to their country which they undertake as a lie and which becomes a pretext for select acts of office, those acts taken to fulfill their other oath or affirmations of loyalty to the Bilderbergers, Council on Foreign Relations, Rhodes Scholar Fellows, or other groups evolved with Masonic constructs/principles (e.g., Skull and Bones, Knights of Malta), and so forth. Traitors.

Specifically, and perhaps to cover for any machinations which might be deemed objectionable if observed in full context of the above, the illumined at the Department of Defense have more recently redefined themselves with something called RMA, The Revolution in Military Affairs. Intended to ‘modernize’ the thinking of military planners, they have totally redefined war making to be more in line with the Illuminati plan. That’s not how they would choose to describe it, but how it works out. Part of that was to create whole new sets of and names for types of wars, including wars fought invisibly and without declaration. The most troubling of all, to me, was the People’s War, a war with “Constitutionalists, patriots, the disenfranchised, and poor.” Excuse me?

That can’t be very good for you or me, and underscores what I said about oaths, and then of course, there is the military’s Shoot Americans Questionnaire, and more. The People’s War is, perhaps, unique in another way. They also defined something called the Military-Politico Force Matrix, an array of options involving all manner of forces which can be applied by politicians (Police and the courts, law) and military commanders (lethal and non lethal) against the enemy (you and me) to maintain political control. Non lethal includes psyops, disinformation via media manipulation, and other forms of Political Control Technology, aka mind control, much of which originates from outside of military quarters (e.g., Media and other government agencies… intending to mean Media IS a de facto government agency, what some call the Fourth Estate or Branch).

The upshot is, that the People’s War is not just a possible shooting war through revolution or coupe sponsored conflict born of Martial Law, but also, a silent invisible war, a psychological war, a cyberwar. But here’s the thing: in all of this described above, we have what constitutes the obvious and perhaps some lesser known causes for war, and the thinking which drives them. But I’ve learned something new: none of that looks at the true cause of war and what drives the thinking used in a presumed logical and unknowing pretext. The real answer will at first seem nonsensical, but History proves it out, if you will please bear with me…

Will korea declare war on America?

Here is the real reason for going to war

The real reasons for war oft escape detection

The above reasons are mere logical but flawed deductions made by men incapable of seeing the simple truth; reasons we give ourselves so we sound reasoned. Their point of view was constrained within a falsely justified box of their own making. The real truth, it seems, is very planet itself fosters wars. Once I explain it, one might be tempted to see it as some geomagnetics-based self-defense mechanism to get rid of the parasite that are destroying its ecology: Mankind. War, we might be tempted to presuppose, is the result of a virus injected into our minds by the Earths magnetic core. But don’t forget… Satan was condemned to be in the Earth and to have charge, there, his domain being Hell. Have not we heard that “War is Hell?” I suspect that geomagnetics are, at best, mere tools he employs.

Regardless of which it is, or both, the simple fact no one has yet discovered is that Wars are not fostered by isms or any of the other reasons we give ourselves, but by they Earth’s rotation and the rotation of the Earth’s inner core, which establishes the magnetic fields which causes a Compass needle to point Northward. Think of it this way. A Compass is used to tell you which way to go. It points North. Want good things? Go north. Peace? Go north. Ergo, bad things lie to the south… including war. Silly sounding, yes — but true, also yes.

Why? Man’s sinful self does not that which it should, and Satan guides us the opposite direction: south. Wars are fought to go south! Below, I make the case that almost always, a nation in the North is the aggressor against a nation to their south. Perhaps this weird mojo is why some military units, CIA, Globalist corporations and the Masons are so fond of using the Compass Rose as logo or emblem, or why so many employ a global map or stylized globe or its shape (circle) as part of their Logo. I’m convinced the Earth itself is quite central to Satanic Illuminati plans in a very real, physical and metaphysical way.

Still think it silly? Are you so sure? Look at which nation initiates combat, or applies untenable pressures which spark war, and their geographic relationships. I’m saying to keep in mind that wars are sometimes declared because the other side engineered the need (a southern power might fire the first shot because a northern Power forced them by other forms of aggression, deceits, or perceived wrongdoing). Of more importance, is that you may need to travel East or West in order to find the enemy which also lies… to the SOUTH:

What do all wars have in common?

The Direction of War is Southward

North Korea tried to take over South Korea, and still wishes to do so;

North Vietnam took over South Vietnam after the U.S., France and other European forces from the north attempted and failed to subdue North Vietnam (to their south) in that revolution;

Our own Civil War was the north seeking to control the south, though the south fired the first shot;

The Vikings attacked points south to include England, coastal Europe;

The Scotts and Irish revolted against oppressive rule from London to their south;

Basqu Spaniards (and others) in the north of Spain revolted against oppressive rule from the south;

A civil war (the Fronde) in France involved the Conde province in the north against the Tourin in the south;

The Congo Crisis (civil war) saw Rebels in the North rise up against the south;

       The Zulu in the North rebelled against the Germans in what is now South Africa;

Britain colonized India and Hong Kong, and other points to its south, both ejected by forces originating from their north (Ghandi, China);

Pakistan declared war on India, to its south;

China usurped Nepal, to its south;

Note: According to Wikipedia, there have been many, many civil wars, for the bulk of which maps and ‘sides’ are not geographically stated (because of general revolt nation-wide, or it is simply not described in available information/maps). However, in every case I was able to find depiction, it was North against south. To continue…

The actions of Britain to our North sparked the American Revolution;

America was forced into a series of additional wars with Great Britain;

Britain declared war on Argentina, a whole hemisphere to its south;

Iraq declared war on Iran to its south;

Iraq then declared war on Kuwait to its south;

Russia declared war on Afghanistan, to its south;

Afghanistan was also southerly to our seat of power when we invaded;

The Halls of Montezuma and the Shores of Tripoli (Libya) were to our south, once you get to the Mediterranean;

The Spanish American War was principally fought against Caribbean holdings to our South;

We went to war with Mexico;

Texas went war with Mexico;

We’ve more recently attacked Haiti, Grenada, The Dominican Republic, and Panama;

CIA has involved us in countless Central American revolutions;

England had numerous wars with France, to its south, generally called the 100 Years War;

England had two wars with Spain, to its south;

France went to war with Spain, to its south;

France warred with American Colonists from Canada while we were under British rule;

Napolean declared war on Spain and Portugal to his south;

England, Prussia, Russia, Austria, and Sweden declared war on Napolean, to their south;

All of Alexander The Great’s campaigns were essentially to his South, though the worst forces he faced (Persian Empire) required him to battle Eastward, as well, once he had gone south to engage;

The Great Wall was built against the barbarians of Siberia to China’s north;

The Dynasties of China were warlords seeking control of vast regions, the earliest originating in the North and commonly consolidating southward in a series of repetitious efforts;

The Communist revolution in China originated in the North and spread south;

Red China vows to acquire Taiwan to its south, the last vestage of the old Republic of China;

Russia’s growth has always had a focus to the south (some three dozen provinces, the ‘stans’ near Afghanistan);

Even Russia’s expansion toward Europe was as much southerly as Westward;

South American nations were formed by militant colonization which moved southward along its coastlines from European sources;

African nations were similarly formed southerly along their Western Coast by such colonization, as well as southward from the Mediterranean shores;

What is the history of Indian wars?

What about American Indian Wars?

1899 art by unknown artist: Calvary pursuit

The territorial growth of America was first southward along the Atlantic Seaboard. And as it moved Westward, it was more so at the northernmost regions, and from there southward again. Call it a southwest movement, if you wish. Indian wars were sparked here and there for various reasons and at various times, and yet, there are some patterns which emerged after initial colonization, which generally followed in sets of Southerly evolving wars, then westerly for the next Southerly set:

The Tuscarora war in North Carolina was followed by the Yamasee War in South Carolina;

The Pontiac War in Northern Ohio River Territory was followed by Lord Dunmore’s War in southern Ohio River Territory;

The Tippecanoe battle in Indiana was followed by the Creek War in Georgia and Alabama, and the first Seminole War in Florida;

The Black Hawk War in Illinois and Wisconsin followed by the second War with the Seminole in Florida, and the Navajo in Arizona and New Mexico;

The Sioux Wars traveled westward as their Nation was pushed off their lands, but originated in the Dakotas and Michigan and ended in Wyoming to the south;

The Apache War was in upper Arizona and New Mexico, and moved southerly into Texas and across the border to Mexico;

The Rogue River War in Oregon was followed by yet another Seminole War in Florida;

There were only a few sporadic uprisings after that. We all should be ashamed who are not Red Men, for our country is based on broken treaties and lies, and stolen lands. Their noble pride and heritage holds many lessons for us, not the least of which is that being South of a major power is not a very good sign for prolonged peace.

The Roman Empire is a wonderful example

The Roman Empire was waged using the Appian Way, which led south against other nation states of the Italian Pennensula, and allowed consolidation of all of Italy;

Rome expanded through Slovenia and marched south through the many States bordering the Adriatic Sea, to Greece;

It then battled southward to Turkey and beyond, to the Middle East and Persia, itself;

It used Roman sea power to control the entire northern rim of the African Continent to its south;

The Huns (Germanic peoples) continually attacked the Roman Empire to their south;

The Gauls (France) attacked Rome, to its south;

Hannibal’s Elephants attacked Rome from the Alps, going south;

After defeat of Gaul, the Empire moved south to what became Spain and Portugaul;

The only time it truly moved North was into Britain and in eventual defeat of the Huns. Subsequently, the Celts in the North attacked southward.

 What are the similarities between WWI and WWII?

World Wars I and II are more complex, but still follow the pattern

When nations have mutual defense agreements, what happens after the first attack may not seem to fit the pattern, but more often than not, it still does — as if by unseen design; what I’m claiming is in play. WW II was almost an exact replay of WW I in many ways:

In WW I, Austria and Hungary declared war on Serbia, to their south, while in WW II Germany annexed Austria, to its south, and declared war on Poland, to its south;

In WW I, Russia sided with Serbia and attacked Austria and Hungary to their south, while in WW II, Germany declared war on Communist Russia, being forced into it, from their viewpoint. The first attacks drove south to capture Russian oil fields, and then east to the Capitol;

In WW I, Russian involvement also forced Germany to war with Russia with the same strategy, and they then also declared war on France to their south;

In both WW I and II, Germany has to march south through Belgium to get at France with tactical usefulness, and in response, England declared war both times on Germany, to its south;

The whole Serbian thing in WW I was tied to the old Turkish empire (Ottoman), so Russia, Britain, and France declared war on Turkey to their south;

Note: The two exceptions would seem to be Japan v. America, but Japan allied with Germany to our north, and America responded out of alliances to Britain and France in both wars.  Germany declared war on all of Scandinavia, to its north, but did so as tactical advantage to prosecute war with both Russia and England, to the south. In the end, of course, Russia, to our north, became our Cold War enemy, as did Cuba and other Central American communist regimes to our south.

In WW II, Hitler soon allied with fellow Fascist, Mussolini, and war was launched by the Axis partners against all points South in the manner of the old Roman Empire, described earlier;

Later, Hitler essentially annexed Italy, to his South;

Japan in WW II deserves its own study:

Japan had its own war going while Hitler was coming to power. It invaded Korea, which lay at the Southern tip of Japan, which sparked a campaign which required conquest of Manchuria, also south;

From there they went further south into other parts of China;

From there, further South into the bulk of Southeast Asia — Burma, Thailand, Laos, Cambodia, Vietnam, etc.

From there, Southward again to all of Malaysia and the rest of Indochina, the countless islands including the Philippines;

They then attacked Hawaii, which is South of Japan, and America was brought into the war, along with the rest of our allies, including Australia to Japan’s south.

Is there a way to predict wars?

Are there ANY exceptions to Wars aligned to Southward interests?

I’m sure my review is not exhaustive, as there are many more wars of lesser note, or I may have missed a major one in my attempt at casual review (a full-day’s Web search). But there were three interesting exceptions I did find.

One was Genghis Khan. His Empire can be described as expansion in purely East and West directions, save the annexation of Siberia to his north without a battle. Most of the territory in early expansion was, however, a mere unification of the various clans of Mongols under a single leader. Then a whole series of Buddhist ruled States to his West overthrew their existing rulers and ‘joined’ him without need for Battle, save some tactical helps. He was done, he thought, having achieved more than he had set out to do.

He arranged for peaceful trade with points further west, but fate was not to allow long lived peace. He was dealt with deceitfully and his caravans of merchants were murdered and their goods stolen by Persian Sultanates. In response, he conquered them and entered the steps of Europe and the decayed throws of the Roman Empire, where he was able to finally rest. While feared as an evil conqueror in the far West, in all of Mongolia and in peacefully acquired territories, he was revered as a wise and beloved leader, even to this day. His campaigns were exclusively westward and northward.

The second was the Ottoman Empire, which was essentially nothing more than a reversal of fortunes of the Roman Empire. As Rome crumbled, the Ottomans pushed at their weak points and seized almost all of the same territories they had held, warring mostly westward along the Northern shores of Africa, and northward and westward into Europe. Turn about, it seems, was only fair play. One might argue, perhaps, that it was simply the end of the same war.

A third ’empire’ followed the same exact pattern as the Ottomans, and even beat them to the punch, after a fashion: Christianity. Early Christianity mirrored and even forshadowed the Ottoman’s gains, and once establishing itself in Rome, would eventually become the Catholic Church we know today, which spread throughout the World from Rome and New World colonization.

But in consolidating power, the pattern of attacking North to South would resume — and not just by following in free-ride fashion the Southerly patterns of colonization already earlier spoken of for North and South America, and Africa. It has to do with the fact that the Roman Catholic Church was self corrupting…

As result it sponsored the so-called Holy Crusades against ‘heathens’ in Holy Lands to its south, sending in the Knights, including the Pope’s own Knights Templar, forerunners of the Masons and Illuminati, and in my research, the financiers of Rothschild;

The Knights Templar, at war end, established strongholds in Spain, and other points to the North, from where they revolted against Rome, to their South — at least in a manner of speaking; corrupted to Satanic practices acquired on the Crusades (along with their tremendous wealth). They were destroyed, but many escaped with their wealth into hiding;

Martin Luther sparked the first protest of Church corruption from Germany, in the north, forming the Lutheran Church, from which all Protestant churches evolved, and spread southward;

The King of England (also from the north) revolted to form the Anglican Church of England controlled by the Pope (to his south), a trigger of the Spanish Armada invasion already mentioned, in the name of the Pope (and a desire for wealth and power);

These affairs led to the Thirty Years War between Protestant countries and those remaining loyal to the Church; a vastly North (27 flags) against South (6 flags) relationship except one additional flag on each side reversed in placement);

The Templars ‘hid out’ until infecting the Mason’s Guild, later taking it over as Free Masons, from whence the Scottish branches in the north spawned the Illuminati, bringing us full circle by starting their campaign against European nations to their south.

How many wars has America fought?

Summary:

North Korea can’t help it. And if you accept the premise I’ve offered, it makes perfect sense, but not for any reasons their leadership may believe to be true, or the political rhetoric we hear on the news. It is, therefore, quite inevitable. If you want to know where the next wars will be, judge not just political context and rhetoric, or mere intelligence data… but also, where in the World the potential combatants are.

Let’s see where both sets of such clues overlap: Iran is rather to our south, and certainly south of our European allies, and Saudi Arabia is even more so. Iran will require a war, but Arabia can be taken over by revolt, per the Libyan and Syrian models, taking the Emirates with them as bonus. Then we control the whole of the Middle East Oil Supply, and our friends in Israel can stop worrying about the Islamic Bomb (or so they think, for there surely will eventually be an “abomination which maketh desolate” set up against them).

Cuba is to our south, still, though they’ve politically moved northward of late by cooperating with the U.S. in the return of fugitives and kidnapped children.  Castro retired, long live the new Castro, unless the Power Elite wish otherwise, of course. And if we did war with Cuba, while we are down there, we might as well fix the problems in Haiti and the Dominican Republic. That will insure all the Banana Republics (and their dictators we helped install) give us full cooperation when we look their way — not to mention South American countries, given the Big Stick mentality, and all.

More to the point, it would eliminate the last vestages of Communism and Cold War enemies, save Red China. However, China is due West at almost all points with America. So, despite the belief expressed by their top General that war with America is inevitable (because they think we are a war-like hegemonic State — which we are)… I don’t think so. At least nothing like any war we have been talking about. And why should there be such a war, when Mr. Sorento keeps giving away our country away to China as collateral, or we sell it to them one corporation at a time?

Besides. That country is headed towards its own revolution… just like we are. Who knows, perhaps it will be a Global revolution and the Globalists and North vs. South causes will all just go away and leave us alone for awhile… in the best of all possible outcomes. Now, that would leave the Illuminati 1% to go fish. And I know of just the boat for them; the Titanic II.

Bon voyage, and don’t come back.

I’ve Defrauded and Deluded Myself, I Am Not Me, But I AM


We go through life thinking we know who we are and why we do what we do, but like Actors who start believing they are the sum of their Press Clippings and the heroic characters they play, we are frauds. It took a simple but powerful video to teach me the truth, something I once knew, but lost sight of.

I once was lost, but now am found.

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

What you will learn reading this post…

  • I’m a fool, and have been offering knowledge as if expert and wise, when in fact, I fall short;
  • While my advice and opinions are based on truth and logic, I should have offered a better, more useful message;
  • That message does not betray my beliefs and life experiences, but instead, explains them, and gives them meaning;
  • That it should be the same for you as it was for me, if you will but open your heart and consider it;

Whre can I get help when no one believes my story?

A note of apology: a technical glitch with wordpress refuses to let me format the document correctly, making it a little difficult to separate paragraphs. No matter what I do, it displays as intended in preview mode, but not in actual URL access. I regret any inconvenience.

Introspection: the most valuable tool an investigative author could possibly have (examine yourself, first). From heartofaleaer blog (click)

I’m talking about me, H. Michael Sweeney, aka the Professional Paranoid, activist author, and consultant on privacy/security, and abuse of power topics. People come to me for help all the time, and I’ve started to believe in the value of my advice as much as they hope it to be of value in their desperation. Well, my advice may be good some of the time (more often than not, I have always thought, based on feedback), but even so, I’ve not quite been offering the best advice, in the best possible way.

This self examination also translates to my abuse of power issues of which I so frequently write, as everything I tend to blog about is so much in parallel to the basic aspects of things now clearly revealed to me because of simple but powerful video, that I’m hoping those who read my blog posts as activists, will see that parallel as well. It’s not just about me, its about everything in the World and how we deal with it. Let me explain by first going back in time. Some of you who have read my material before may know some of this, but as Paul Harvey used to say, its time “For the rest of the story…”

I doubt you’ve ever had to go up against dirty cops, bounty hunters, and CIA/FBI types, some of whom wanted to kill you (e.g., gun in folded newspaper, sniper’s nest carved out of branches high in a hillside tree outside your bedroom window through which came a targeting laser at night, being chased by up to eight cars in a high speed chases). This is the kind of high adventure we all enjoy seeing in action movies and television, but its an entirely different perspective when you are the hopeful hero, and your opponents are not acting under legal authority, and there is no acting, but actual intent to harm.
I’m rather certain that you, as lone individual, could not well square off against an enemy that has dozens of players to help them, such that their war against you as their target unfolds 24/7, but you are only able to devote but a few hours of tactics each day. More so the problem when they have an unlimited budget and the best technical toys money can buy — and you have only what you own around the home, and a modest income and savings, which they also target and erode.
I doubt you have ever had to come home to find men with walkie-talkies fleeing your house, or find it had been broken into and every computer and every disk in the house upon which could be stored data, even those secreted away in storage areas, had been stolen — or discover that the neighbor across the street, a Forward Marine Observer retired for wounds acquired in service in Iraq, upon returning home across the street with his Mother… was, as casually and (unwisely) revealed in bragging by his Mother, approached by CIA Agents who asked him to work for them… and later, learning from a professional investigator retired from the State Police in another state that Infrared Night Goggle vision surveillance of your home was being conducted from that neighbor’s home, and further confirmed that all phones in your home and select other devices were ‘bugged’.
I doubt you’ve had your mail regularly pilfered, learning time and again that people trying to reach your home-based business had sent you mail you never received, some of it being orders for product, and like interference of inbound telephone calls where your phone is never answered, when at your end, it never rang at all, or that harassment telephone calls to family at all hours, and other calls known to be from your opponents — magically did not appear on telephone company call records. I doubt you’ve ever had the Consulate in another country literally beg you to provide them with copies of your business Newsletter to distribute to potential clients, only to then have the U.S. State Department suddenly, out of the blue, declare your Newsletter ‘Illegal’ under the laws in that country, but refusing to cite the law, or answer further questions.
I doubt you’ve had to suffer nightly assaults on your home, attempted break ins within moments of retiring for the night… night after night. Or, upon calling the Police, have them ignore evidence offered of the break in, ignore the fact that your spouse agreed with your descriptions of events, and instead elected in their Police Report to say only things which made the whole affair seem imagined, implying you a Paranoidal Schizophrenic, even suggesting County Mental Health should be contacted.
Imagine how you would feel, realizing it odd that this Officer responded within mere seconds of dialing 9-11, and later, would try to kill you. Such events, for me, were one reason I based the title theme of my first book upon the topic of Paranoia; for I quickly learned that someone who reports such things is quickly labeled paranoid, because no one wants to believe in the Boogyman, least of all people who are part of the System from within which he seems to come.
Ergo, there was no one to turn to for help. No authorities would listen. Even friends and relatives find such stories hard to believe, and tend turn away with denial of any truly useful help. And yet help came.
And even when it was clearly the help of other Men, it was also clear their help originated from God, typically quite unexpected and coincidental, or a highly unlikely source, such as a total stranger offering $250 and saying, “Something tells me you need this more than I do,” at a time when I was trying to find a way to afford a high quality audio tape recording system as defensive tool. And when things seemed bleakest, an old competitor in a prior business called me up  after ten years of no contact, and offered me a significant position in a new business enterprise, one which would lead to more such helps in time, and become a safe haven of sorts.
I lived such a life for nearly five years, and in almost EVERY battle, enjoyed victory, or was at least protected from more serious losses than intended. The James Bondian nightmare was at long last ended by literally discovering the truth about why I was targeted. I had, it seems, accidentally learned of illegal crimes which they feared I might expose. They wanted to know what I really knew, who else knew, and who was ‘helping me’ to best them, that they might destroy us all and be safe. But there were none others, not any they could find or believe existent.
They could not believe me acting alone, because time and again I detected those who covertly worked against me and exposed them such that they were embarrassed to their superiors, and set aside for someone I could not recognize on sight, next time. I eventually identified every player, where they lived and worked, and discovered the truth of their varied criminal enterprises, and those dark things they were hoping to protect by targeting me. In short, they themsleves led me to understand the very thing they feared: knowledge of their sins.
Phone numbers, license plates, public and, in some cases, private records, etc., were gained on key persons and firms not just locally, but nationally, all the way to Washington, D.C. and beyond. I even had covert White House, NSA, World Bank, and like phone numbers before it was said and done, and access to logbooks within Federal offices and even entire roll-a-dex and index card systems from the desk of one of my main opponent’s managers. And I never had to violate a law to do it. God was my key to their secretive locks.
I even managed frequent access to their innermost places without detection. I laugh, recalling walking into one of their covert offices, and the man seated there, a recognized opponent, falling out of his chair to the floor in surprise! In another example, a truly high-security area was discovered in a way that caused three people encountered there to scurry from my eyesight like cockroaches, placing folders to their faces, doing about faces, closing doors, and so forth. Evil cannot hide its face quickly enough, it seems.
I think their disbelief was largely because they also did not believe in God. Why I so believe is the where we are headed in the telling.
In the end, I won the war, thought the net cost to me was personally quite high. Forced into bankruptcy, forced to sell our wonderful hillside dream home, loss of the very computers used in my work and an insurance claim thwarted by enemy tactics so they could not be replaced, a foster daughter who asked to be taken out of our home because she did not feel safe, and in time, severe blows to the bonds between other family members. I rank my financial loss at about a quarter million, but it appears they spent that much to destroy me in a single month. Their money bought them little, diluted by God, as were their endless man-hours of effort against me.
It’s absolutely true. In the end, I indeed did win, but not of my own cleverness or determination. I had reluctantly entered into that battle with no special skills or training of their caliber, and throughout the battle had no weapons as they might count weapons. Yet from the very first day of their presence in my life, almost every skirmish of true importance would be mine. It was, at times, turning out to be such a comedy of errors to my favor, that it literally became fun to do battle.
All this I did, and yet, not I. There was indeed another.
You see, my chief weapons were mere words, and a belief in Good over Evil. The words were the Word of God, and were the heart and meat of Good, as well as other core beliefs, and an abiding Faith. I was only a few years earlier caught up in a cult, and knew not what I believed, and understood not the truth of God and Man, and Satan’s role in my life. And yet I was saved, and I grew daily in the Word such that the Truth was at last mine, and I was set FREE! So free, in fact, that NO MAN, no matter their abilities and resources, could truly harm me without God’s permission. That belief was my armor against all-powerful opponents and impossible odds of survival.
It was proven almost daily each and every year of battle. Also provided for during the darkest of financial threats fostered by my enemy, was our daily bread. A source of income sufficient, sometimes even exactly equal to the cost of minimal foodstuffs required for the day — would become available that day, or the day before — or at other times, it might be on a weekly or other basis. Other magical moments also addressed such needs in ways not involving money, at all. We lived by Matthew 6:25-27, alone for long periods of time.
That’s all behind me now by more than a decade, and though I have written seven books which generally assault the face of my old enemy and his newer counterparts, those responsible for dark bumps in the night of recent American history, my opponents largely leave me alone, now. The worst I’ve gotten is hate mail from a sitting President for exposing ties to CIA for both him and his wife. I’m still protected by what I learned, and they fear me, or more correctly, what I know and might reveal if harmed.
What a shame that any citizen of any land should need to blackmail their way to safety. But I traded one dark set of secrets which I keep safe, to keep me and family safe, and to allow me to now speak openly of other things without reprisal. It became the basis of a new livelihood as activist author, lecturer, and consultant on privacy and security, and abuse of power. It redefined me and gave me new purpose, to help others who have been called ‘paranoid,’ but who are not, people who can get help no where else.
What can we learn by humbling ourselves?

The Revelation

And so, in sensing a kind of invulnerability, I find myself becoming, like many Hollywood actors, a little bit too self assured. Like them, I now realize, I’ve started to believe my own public image; a false perception. I am not the hero of my life people presume by the outcome of exploits, and certainly not the Knight who comes to save them from Men in Black or other dark threats.
I am nothing without God, can do nothing without Him. Oh, sure, I give little credits to Faith and quotes of scripture when I hand out advice and recount my victories, but in my innermost view of self, I’ve wandered from full reliance upon the true power of the Word, and become conceited as if I really were a mighty warrior, wisened and ever alert, that person my enemies imagined me to be.
I had fallen back asleep, succumbed by the misty aura of public attention and pleas for help, a kind of sad fan mail. I have become pretender, forgetful of things learned of great value.
Today, however, one of the ‘sheep’ who comes to me seeking help reminded me of one of my own slogans, something I used to employ when I was an instructor. I used to say, that one reason I liked to teach was, that no matter how much one knew as a teacher, and how little a student might know, if the teacher did their job right, both would learn something from one another. This young woman, now experiencing targeting somewhat like my own, in seeking me out from afar to ask advice, helped knock me off my pedestal of self promotion, and bring me back to Earth in a grounded way. She reawakened me, and taught me that which I had forgotten.
She sent me a simple but very powerful video, thinking I would like it because, as I tell all my clients, you must “Put on the Armor of God,” to be victorious against evil; Ephesians 6:10-18.
Well, I must tell you I was completely unprepared, and the video was indeed irresistible, and it was VERY powerful. Though I was pressed for time, I took the time, and watched it not once, but three times. Every time I got to the part which actually involved Putting on the Armor of God, I broke into tears. Even so now just writing of it, this very moment, my eyes water in remembrance.
You see, in the video, the truth was graphically shown. It was not ME… IT NEVER WAS. It could not possibly be me, nor even YOU, no matter your true strength or resources… IT CAN NEVER BE.
WE do not put on the Armor of God, or do any of the things we think we do in Christ’s name. Nor, for the matter, can we do anything to be saved in the first place. It is HE who does the work. He calls us to salvation. He works in our hearts to draw us unto him, and redemption. He then arms us with what we need to do battle. The only thing he asks us to do, is to be willing to do battle, a willingness born of belief in Him and his Word, and out of love for Him and his Word.
He asks only that we allow him to enter into us to be our inner strength of body and mind, and to cloth us with his white raiments that we are Justifed and pure, enfolded in his Grace, the impenetrable and almighty Armor of God. His Holy Spirit fills us, and thus filled, our sinful nature yields, and is fled.
But as I have learned from my young friend and her thoughtfully provided video. We slip. We forget. We build up the sinful Man yet again, and again, bits at a time, and even in leaps and bounds. But the beauty of God’s Armor is that it is not tarnished, but renewed and polished. All it takes for this renewal is to once more acknowledge the Word, and truly contemplate it, embrace it, believe it, and most of all, LIVE IT, once more.
Forgive the length of this missive. A writer cannot stop typing so easily as to simply say, ‘Please watch this video.’ I’m going to watch it every morning for a week, and I’m betting I will have one of the best weeks of my life doing so. Join me, please, and remember from whence life and Free Will comes. Why would we ever choose to live a life without acknowledging and honoring the source of it?
Know also, if you click the Youtube user’s link you will find more videos of such quality and Meat as this, from someone previously unknown to me, the Ellerslie Mission Society  who has a Website where the same videos, and more such bounty is found.
Pleas consider to share, reblog, etc. It is more important and valuable than any other helps or advice I’ve ever given elsewhere in my books, Web offerings, radio interviews, and consultancy, etc.
For I am not that I think I am; I become what truly I AM when the Holy Spirit works through me.
I AM, for those who don’t quite get my drift, is the actual name of God given to Moses. You can do nothing except by IAM, because every small thing you do is, in your mind, preceded with the thought… “I am going to change the channel… get a drink of water… go to bed, etc.”  Acts born of evil temptation, on the other hand, start with conclusive edicts “Grab it while no one is looking… kill him… make up a lie, etc.”
But these are mere suggestions introduced by Satan, and have no power at all except by the individual’s own Free Will, which is also God’s gift to use. That’s what it means when you forecast an act; “I will call you tomorrow,” is you stating you Will it should be so, doing so FREELY. Why would we ever choose to use it for anything but right-use-ness?
I will be better in serving you in future blogs, more mindful of who I AM, really. Our battles with the New World Order as a group, We the People, and micro battles between targeted individuals with Men in Black… these are no different than Christ vs. Satan on the Day of Armedgeddon, or lesser battles, such as a small boy tempted to steal a piece of candy. In all such cases, if those on the side of Good fight wearing the Armor of God, they will prevail. We do ourselves and our cause disservice when we forget that point and fight purely with our own strength in bitterness.
Forgive my bitterness. It was born of forgetfulness.

Has NDAA Made Shooting Federal Agents, Soldiers, and Cops Legal?


No court should ever find one guilty of murder or manslaughter if defending their own lives from murder or kidnapping. For many people, NDAA, and violations of Posse Comitatus by military represents such a threat, and more recently, the Monsanto Protection Act. Therefore, we all might ought to so consider their reasoning; if one man should so fear the tyrannical act of their government, so then should we all.

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

Reading this post you will learn…

  • That self defense is a right, perhaps even when facing authorities acting legally;
  • That NDAA threatens EVERYONE’s life and liberty if it threatens even ONE;
  • That NDAA may just have let loose the Dogs of War, one confrontation at a time.

 Can you shoot a lawman or soldier lawfully exercising his duty and still claim self defense?

Are Molotov Cocktails ever self defense? (click) From interesting art collection feedtacoma.com

In a casual conversation with some friends, an interesting dialog evolved which led to some serious debate and troubling afterthought at the implications of what had been said. It started simply. The topic of NDAA, having come up, someone replied, “Given that the government can simply haul someone away without any form of due process, and vanish them to some hell hole in Cuba or elsewhere for torture, endless imprisonment, I’m wondering…”

He was invited to continue. “Suppose some activist feels targeted by government in heavy-handed ways… someone who has been forced to a paranoiac defensive posture as result… and some Federal agents decide to show up for some reason.  What happens if he figures they are there to vanish him like some South American dictatorship?  What if he acts in self defense and pops the agents before they can do much more than flash their badges. Would that be reasonable self defense? Even if they were only there for some more innocent reason?”

“Or…” added another, “suppose someone started shooting at soldiers or Cops when they engage in these so-called ‘mock drills’ with Police in urban settings… thinking that the soldiers were coming after them or their guns. I’m surprised that pop shots haven’t already been fired.”

And I would have added, if the conversation were taking place today, the day Barry Sorento signed the Monsanto Protection Act… “Suppose someone burns down a Monsanto factory and ends up killing company employees in the process, trying to prevent the company from poisoning everyone with GMO crops, knowing that now, it is illegal to seek redress in the courts for cause? Would that be self defense?”

I know. You are probably thinking what I was thinking. Absurd questions. No one could convince a jury the FBI or the Army was there to kill them, or that the mere appearance of Agents or soldiers was logically a threat, right? Or arson and resulting deaths? And that is what caused the conversation to get interesting, because that very doubt sparked a lot of verbal wrestling in anecdotal exchanges.  We eventually pinned the issue to the mat with a chain of logic which indeed deserves further consideration, here.

“There was this case I saw in the news,” another started, and he proceeded to describe something I myself recalled seeing, once he got out the details — which actually hit a little close to home, as will be explained shortly. “This Black guy, a known felon, used an illegal machine pistol to gun down a bunch of cops who had just busted down his door to serve a warrant. He went to jail, but not for their murder. It was ruled self defense. Imagine. A Black kills White cops in New York, and gets away with it?”

“How is that possible?” asked another.

“I saw a reenactment on TV,” I offered. “He was seated with his back to the door, watching TV in the dark with the volume up. Seven Cops entered the front door after a knock with guns drawn, and shouted for him. He had a fully automatic Ingram there on his armrest with 30 rounds, because some bad cops had already threatened his life. So he instinctively grabbed the gun and emptied it on full-auto and dove for cover, and then made good an escape. All but one of the cops died, despite wearing vests. He feared for his life, and once apprehended, the Defense was able to prove in court a reasonable basis for that fear. They got him on weapons charges, but not murder.”

Then I told them how easily I could identify with that. I recounted true events about a time when my first brush with ‘spooks,’ where some of those arrayed against me were in-place assets within five different local law enforcement agencies. When my investigations got close to unraveling their criminal enterprises, several of them apparently felt their offices gave them cart blanch to ‘get away with murder’ to protect their part in matters. They unilaterally sought to eliminate me, it seems:

a)  a County Sheriff from a distant County threatened me with a gun in a folded newspaper, but was turned away due to a security camera’s presence after I pointed it out to him;
b) a local cop, with a possible helper as getaway driver, carved out a sniper’s nest in a tree on a hill outside my bedroom, from which a laser beam shown through my window as I retired in the dark one night — but I saw the beam drawing down the wall and rolled out of bed to avoid it;
c)  that same cop later used a patrol car as a weapon. He zoomed onto the empty freeway from an entrance as I passed it, no lights or siren (not even headlights, until after he fled the scene). He crossed six lanes at about a 45 degree angle to force me to run me off the road on the far side at a bridge abutment, himself swerving into the parking meridian to avoid crashing himself, because I had managed to successfully evaded a side-swipe and retained control without ending up in the river;
d) two patrol cars pulled me over at an underpass at two AM in the morning, joined by several more pairs of cars both ahead of and behind me; County, local Police, and unmarked units. It was an ambush. But my wife turned out to be present, so they ‘explained’ their stop: “You have a burned out tail light.”  Uh huh.

There were other incidents not quite as scary, too, involving high-speed chases with up to six vehicles, and a series of break ins by men with walkie talkies. So I had every reason to be paranoid about cops in those times. If you want to know how I ended these problems, read my book set, Fatal Rebirth, which also explains why I had become targeted in the first place. But here is the part which directly relates, also in the book: you can imagine my surprise when, after all those threats, two local Sheriffs walked in my front door without so much as knocking.

Had I had a gun sitting on my sofa arm, I would likely have at the least leveled it on them and demand their hands up. Fortunately, there were extenuating circumstances and their purpose was no true threat, and I had no such gun to risk any undue complications. But I would certainly have considered my actions to have been in self defense had it been so. I surely could relate to the story being cited.

With that realization, the dialog between us started to examine the questions asked more carefully. What follows are some additional observations and conclusions which illuminate the matter more thoughtfully, some of which include references to appropriate quotes. Some were offered at the time, others are added here, by me.

1) The Bill of Rights has as its sole purpose the intent, beyond cementing the integrity of government’s covenant with We, The People, that all citizens should be able to pursue happiness, and enjoy life and liberty, and carefully spells out a series of interlocking safeguarding Amendments to insure it so. One has no liberty if kidnappable on demand, and no assurance to life when torture and murder are part of the kidnapper’s tools. While it does not specifically addresses self defense as topic, it was concluded that “the Fourth, Fifth, and Sixth Amendments specifically assure us that the Man who would be King’s portion of NDAA has no force of Constitutional law behind it”, as it tramples on these rights in the worst possible ways. Me.

2)  Seven people felt so terrorized by NDAA’s threat upon their lives as activists and journalists reporting on sins of government that they went to Court. These included Pulitzer Prize-winning journalist Chris Hedges, MIT Professor Noam Chomsky, and Daniel Ellsberg who was a focal point in the Pentagon Papers and Watergate debacles in the 60s, both exposing the Federal government’s abuses of the day. Supporters of Wikileaks were also party to the suit. A lawyer for the group said “There’s a lot of activists who understand how serious this is, but it’s less well known to the general public.”

3) We concurred in commentary on the case that, “Because the ‘war on terror’ is a war on a tactic, not on a state, it has no parameters or timetable. Consequently, this law can be used by authorities to detain (forever) anyone the government considers a threat to national security and stability – potentially even demonstrators and protesters exercising their First Amendment rights.” Journalist, Brian J. Trautman.

4) A Federal Judge in the case ruled those provisions in NDAA of concern are indeed unconstitutional and issued an injunction against their use. However, there has been no acknowledgement or sign from any quarters in government that they will abide by the findings, and there is every indication that the Obama Administration intends to ignore the ruling in further lawless ‘off the books’ application of NDAA. In appealing the case, it was revealed in arguments by government Lawyer’s that government had been utilizing such methods all along. Indeed, the government refuses to discuss if it is being used or will be used on Citizens in the United States, and it is known for a fact it has already killed three American Citizens abroad, including a 16 year old, with a Drone Strike.

5) Worse, at request of Justice (per the above link), another Federal Judge has granted a ‘Emergency Stay’ against the former rendering it moot and the Justice Department has argued that NDAA is not even necessary, because the Authorization for Use of Military Force Act of 2001, as interpreted already for use in permanent detention in Guantanamo, already gives government like powers. Eric Holder, U.S. Attorney General, told Congress it would be legal to kill an American in America with a drone. Oh, what slippery slope…

6) An almost endless series of Acts from the Patriot Act forward have spelled out an almost unlimited list of ‘reasons’ which can be used to ‘define’ a given act as ‘terrorism,’ all such reasons generally described in nebulous and sweeping terms deliberately vague so as to allow the broadest possible interpretation to suit the needs of government at any given moment in time with any given individual. You can even be deemed a terrorist for illegally downloading or copying a song or movie — an ‘act of financial terrorism’ which de facto enjoins the teenager ripping a song in an imagined conspiracy to topple the music industry and harm American free enterprise. A Mother was recently jailed under the Patriot Act as a terrorist for spanking her children on an airline, and detained for three months before she could even enter a plea.

7) The rhetoric out of Washington and media spin doctors is all-too often such that almost anyone who disagrees with the official point of view is demonized and described as a mix of ‘dangerous,’ ‘mentally ill,’ and/or even (especially) as ‘terrorist,’ all in the name of political expedience. FBI has recently circulated to Police Departments and Community groups (a Hitler-like attempt at recruiting citizens to spy on citizens) a series of official lists of ‘indicators’ that a person is a potential terrorist to specifically include persons ‘overly concerned with the Constitution,’ or who ‘buy coffee with cash,’ or ‘use a hot spot.’ Ron Paul supporters are potential terrorists, according to FBI, which shows just how easily the label can be applied for political convenience. These lists actually ask you to call and report such persons to DHS/FBI. Indeed, not one person present in the conversation leading to this post remained free of such wholesale classifications. Such labeling establishes in the minds of the outspoken, real or imagined, an air of viable threat of loss of life and liberty and, thereby, sways the minds and mood of the public against them closer to becoming potential reality. It is, in my opinion, a form of calculated psyops mind control. “In a government bottomed on the will of all, the liberty of every individual citizen becomes interesting to all.” Thomas Jefferson.

8) All the talk of banning guns, and the U.N. Treaty which would, if signed by the man claiming to be President, and ratified, would force the end of the Second Amendment and the disarming of America, came into play simultaneous to a series of violations of Posse Comitatus so brazen as to make news in mainstream media. It has seemed in the minds of some as if these mock invasions of U.S. cities by military was in preparation for coming after the guns. Add to that the military’s ‘Shoot Americans’ questionnaire to troops, General Tommy Frank’s admission that we are headed for a military government, revelations of military manuals which dictate that protestors should be shot, the ordering of 1.4 billion rounds of ammunition by Homeland Security, the refusal of Obama’s candidate to head and actual atrocities already committed (Ruby Ridge, Waco, The Liebe Street Raid, Katrina, ICE ‘border stops’ checkpoints nowhere near the border, and similar TSA abuses, etc.), there is little reason for an informed thinker to see such fears as wholly baseless.

9) Every State in the Union recognizes exercise of deadly force in self-defense as a right, provided the acts were undertaken with a demonstrable reason to fear for their life or liberty (e.g., kidnapping, vanishing, torture, or murder, and in many cases, simply serious harm or significant casualty loss).

So, if someone ‘deemed’ a terrorist by loose rhetoric of manipulative minds or secret edicts of government machines because of unpopular political views… should such a person be approached by Men in Black, or Blue, or Army Green, the question remains valid: has Obama created a situation where even one such person might reasonably fear for their lives sufficient to arm themselves and proactively defend against the possibility?

We pray not, and yet, it is likely unavoidable that such will eventually come to pass one way or another, in time. It may indeed already have come to pass but simply not have made the news beyond statements that (the party) was ‘killed resisting arrest.’ What reason would authorities have to broadcast details suggesting otherwise?

When government embarks on a tyrannical course against its own citizens, some such confrontation is ABSOLUTELY ASSURED. How it turns out is a matter of happenstance no one can predict for certain, though it must result in a bad end for someone, or multiple someone’s. In truth, it is bad for us all, as it ratchets up the tension and increases the likelihood of a repeat scenario. In time, if we study history, we learn it must lead to armed rebellion. Thus we should be mindful to the tenth point we had concluded in our conversation:

10)  If just one person’s rights can be trampled upon by government at will, than the rights of no one is respected and do not remain valid; they become mere political rhetoric, a lip service. If one of us lives in fear for cause, then we all ought be mindful; the fear is truly a threat to us all. If one of us must act in self defense, then ultimately, we might all be better off acting in mutual defense sooner than later. “Freedom and justice cannot be parceled out in pieces to suit political convenience. I don’t believe you can stand for freedom for one group of people and deny it to others.” — Coretta Scott King. “The rights of every man are diminished when the rights of one man are threatened.” ― John F. Kennedy

 When is it a greater crime: to kill in self defense of others, or to allow others to die for lack of preempting their murder?

So, each of us must ask ourselves the following question: “Do I fear my government enough to consider the possibility that a confrontation may represent a kidnapping and life or death situation for me, if not at that moment, then as result of events which follow the moment? How can I, in good conscience, not consider to defend myself?

Indeed, for me, merely writing this makes me even more likely the target of NDAA. And I freely admit to qualifying to no fewer than a dozen ‘traits’ of a terrorist according to FBI’s little snitch lists. And, you know, with 85 terror tactics like ‘paying with cash’ on that list, SO ARE YOU. That’s exactly what I’m saying. If one of us… all of us.

And just as important, who has the most ultimate power: the individual with rights under just Law of the Land, or an unjust and illegal law in the hands of the corporate state? The answers SHOULD be, the former, especially when there is no individual, but a united collective of individuals with the same intent.

The United States of Sorento Corporation

My ultimatum to the Sorento Corporation:

So I’m putting government on notice: Dear U.S. Sorento Corporation, fictitious holding company DBA United States, as listed in Dun and Bradstreet, and now a wholly owned subsidiary of Monsanto Corporation: I have a reasonable fear for my safety by YOUR own assigned definitions under your illegal corporate bylaws, which relegate me to the class of client termed therein as a terrorist. This terrorist therefore reserves the right of self defense, by any available means, up to and including your discorporation, and that of your parent and holding company. This I do under the authority granted my by the Constitution of the United States, the Bill of Rights, and the license of being a Free Sovereign Man, and not your personal property or chattel.

Moreover, the weapons I have and will use in my defense are beyond your ability to overcome by drone, by stealthy assassins, or by overpowering forces. They are ideas, and you cannot kill an idea. It is truth, and you cannot imprisson a truth once it is revealed. It is a willingness to die for my country, and you cannot kidnap that fact. You may, in fact, only martyr me, at best — a thing more to my advantage than to yours.

Take your best shot, if you dare, for I am everyman, and what you do to one of us you do to all of us. And frankly, I don’t think you can afford very many more martyrs before you spark a revolution. Which leads me to the notion, with apologies to friends Anonymous…

 Does Anonymous act in self defense given they fight tyranny?

We are all everyman. We are Legion. We do not forgive. We do not forget. Expect us!

Monsanto Protection Act Lights Fuse of Armed Insurrection


Self Defense is the right of all Men regardless of any Law. When an illegal law deems to both make redress and self defense illegal, many will see it as time for a revolution. The Monsanto are coming. To Arms! To Arms!
 
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Will Monsanto GMO spark a revolution?

Reading this post and its links, you will learn…

 
• Things so terrible that I will not bullet list them, lest you flee this page in fear of dark things;
• Things which may mean life or death to you, your family, and America as you know it;
• Things which, in the best of outcomes will undoubtedly mean thousands of lives taken by violence and/or a biowar intending depopulation.
Why does Monsanto have its own Police Force?

They keep perfecting mass murder. (click) From an interesting beforeitsnews.com piece

Many of us ‘prepers’ and ‘conspiracy buffs’  have warned for some time that government wants a showdown with YOU in their gunsights. Now we start to see proof there is a price to be paid for failing to heed, for those not prepared to face what apathy and inaction leads us all toward at speed. Got Bushmaster? No? Gave it up to Feinstan, Bloomberg, Sorento, et. al? Better put your affairs in order, then.

This latest tyrannical atrocity, The Farmer Assurance Provision Act of 2013, also dubbed the Monsanto Protection Act to reflect fascist provisions burried deep within it, is one line in the sand many will not likely let be crossed without a gunfight, or similar violence. Understand this: a fuse has been lit, and while the length of its burn is not known, the bang at the end could very well turn into a repeat of 1776.

Frankly, I don’t know whether to pray it does, or does not; it’s THAT SERIOUS a line in the sand, to me.

But it is not my opinion which matters as much as does YOURS. But do you even have one? If you do not, or don’t even know of and understand the nature of the threat from GMO corn, soy, and other bioengineered seed programs, and matters closely related, you will be happy to know Mother nature has a special place for you. It is called survival of the fittest, and destruction of the weakest, you being the latter in the equation; those who die from eating genocidal foods, a very real possibility in almost any proper review of facts.

We are talking about crops genetically modified to have built-in pesticide powers based on Monsanto’s Roundup, a known poisonous substance, and other ‘properties’ which make it even more dangerous. The Act gives Monsanto the power of life and death decisions with zero responsibility (impunity), and takes away the ONE THING which is designed by our Forefathers to PREVENT armed revolution; the means of the People to seek redress of grievances with government through the courts.

OK, then, if that’s how they want it… get ready to ‘pass the ammunition,’ instead.

Because why? Because there is so much resistance to labeling such foods at every turn, and because they are used to feed animals you eat in other foods, there is no way currently to avoid eating them, or know if you are or are not, save perhaps eating only organic produce. Even then, contamination is not impossible. The only solution left would be to stop Monsanto and friends DEAD in their tracks, and unfortunately, it appears they wish for force matters such that the only option available for us to do so may be to seek it in literal terms.

We would rather it be figurative. But if YOU otherwise make no collective effort to stop them peacefully, you will deserve your fate for being a dumbed-downed mind-controlled Sheeple. Your apathy and non participation will be causal to any escalation toward violence forced on those unable to make headway peacefully. Their failure will be because of your lack of support.

If you don’t get that, stop reading this until you’ve visited Oz to find some brain matter to replace the straw in your head. It’s all over the Internet, and from many, many viable sources (even the disinformation deliberately put out as a straw man tactic is based on ‘kernels’ of fearsome truth — and efforts to debunk this particular ‘conspiracy theory’ themselves lack credibility and tend to follow the 25 Rules of Disinformation, such as employing straw men, vanishing evidence, and so forth).

Is self defense justified if GMO threatens the lives of you and your family?

Things to know for your survival:

GMO is tied to the Doomsday Vault, Agenda 21, Codex Alimentarius, depopulation

Doomsday Vault, Agenda 21, Codex Alimentarius, = depopulation

If the above still does not convince you, ask yourself why GMO crop makers, Bill Gates, and Rockefeller have funded, along with Bilderberger leaders, a ‘Doomsday Seed Vault’ protected by the highest of security on a private Island in frozen wastelands owned by a Bilderberger. There, non GMO seeds are being stored for some future use, accessible ONLY by the Globalist Elite — while at the same time we see from the above that these same people are taking steps to insure non GMO seed cannot even be purchased, much less used, without violating law. We are talking about billionaires who have private chefs, often having them travel with them on trips, and NEVER eat anything we eat, except on a rare lark.

Part of that story requires us to add to this complex mix of topics some equally scary things outside of, but tangent to GMO: Agenda 21 and Codex Alimentarius, for instance, and the concept of depopulation, long a known goal of Globalists to reduce us to a half million souls. Consider all these things collectively, and you realize that violence may be the only recourse, sooner or later, unless we can unify and find a quick way to avoid it. But the fuse, having been lit, makes sooner more urgent, and later less tenable.

Now, Sorento and Congress show their true colors as traitors to all Americans and the American way of life… even life itself, in fact, the hallmark of Satanic thinking in the Illuminati Plan to create a one-World government that they might seat the Antichrist. It’s O.K. if you don’t want to subscribe to that ‘theory,’ but I’ve written books with over 1,500 footnotes to make that very case.

But it is just a Congressional Bill we are talking about, and, after all, Congressmen will simply excuse themselves, saying they ‘didn’t read the Bill’ before they voted it. Sorry, but if things erupt with violence (and to a lesser degree if it does not), they will still be held accountable if they voted for it, as will the Great Pretender who signed it. Consider the full measure of risk they undertake by their crime against humanity, which is also treasonous. There can be no greater penalty than those common in such crimes, especially if during a war (revolution).

And for the matter, therein (Sorento’s signature) lies the problem for Monsanto. Even if Monsanto is not razed to the ground by angry citizens… even if their poisonous ‘product,’  which is nothing more than a tool designed to give them a global monopoly on farming and to depopulate the World with a soft kill is not destroyed in grain stores and warehouses before it is planted… even if they survive attacks against them and their evil seed… the Act does not afford the protection they presume by its signing into ‘law’. It is a fictional belief… not Law at all, but a fictional ‘law’ which is at best temporarily useful while government pretends it legitimate.

Any Bill signed by Mr. Sorento under a false identity will eventually be ruled null and void as will be all ‘law’ of the last four plus years of his charade; his pretense cannot long last, even if it requires a number of years after his final term in office expires to force the Courts to admit it. He has no power, and neither does anything he signs. There has been zero Law enacted since he took Office. He, and all who helped in the charade will be jailed or worse, and of no power whatsoever to help Monsanto (Oh, happy day!)

There will be no protections if the ‘law’ thought affording them was found illegal. Nor if collusion between Monsanto and politicians writing the Bill, and the White House are established as criminal in nature (as is already seeming to be the case in the links above). Even if the Courts were so foolish as to overlook such reasons for nullification, perhaps due to bribes or threats, or the influence of Clarence Thomas, the court of Public Opinion and a little thing called self defense will still afford a final ruling which will be enforced.

Can self defense ever be peaceful?

PEOPLE HAVE THE RIGHT TO DEFEND THEMSELVES FROM HARM

This ACT, I fear, is the final spark which has at last lit a fuse which cannot easily be put out; a fuse leading to armed insurrection. I’ve tried to warn government and citizens in my earlier posts that every time politicians elect a criminal or unconstitutional choice, they put a gun to their own heads in a game of Russian Roulette, a game which decides if armed revolt breaks out.

Given the levels of frustration that I feel in this matter, I can only imagine how famers feel, and picture them raiding grain stores and destroying Monsanto product wholesale, if not marching on Monsanto properties with guns and torches to level them and drag corporate bosses into the streets. I fear hanging in effigy may not be seen sufficient. Hopefully I am wrong, and mere alarmist. But if I thought it would actually end the matter usefully, I’d be tempted myself. But would it be useful, really?

I wonder. I wonder because I also fear this is exactly the situation intended by Globalist leaders who seem to control our government. I fear it why DHS has placed bid requests for 1.4 billion rounds of munitions, including 9 million sniper rounds, none of it for normal military operations. In fact, I fear it related to a long list of other curious purchases and moves by government over the last few years, especially those since Sorento took office.

They collectively point to an intent to light such a fuse, I fear. Such pointers include, for instance, a steady stream of military mock raids on American cities with armed helicopters discharging gattling guns, soldiers repelling from or landed from the choppers to blow the doors off of buildings and engage in combat with ‘resistance,’ of some imagined sort.

Who will stop GMO crops from killing you or your family?

WE ARE THAT RESISTANCE

Confrontation is exactly what I and many others have feared all along was intended at some point in the future, and now, with the Act — it seems absolutely unavoidable and on the near horizon. Now that they see they cannot arrange to ban guns which approximate military grade, thereby effecting a de facto gun seizure, indications are now that they are going to instead foment a wave of violence in the heartlands and cities to justify labeling gun owners as a threat to national security, and come after them by force.

I even worry they may even foment that violence themselves and blame it on us (false flag operations) to justify their heavy hand to passive onlookers, the Sheeple at large. For this Act will undoubtedly result in such outrage and frustration as to move those most concerned to violence, even if it takes some entrapment or priming of the pump of anger and concern. If not shooting, then arson or bombing, from which must eventually evolve shooting by on side or the other. The fuse has been lit.

While there are only a few million rural persons who’s livelihoods still depend on farming success, almost all are quite well armed. There are tens of millions more who truly understand GMA enough to side with Farmers, a large number of them also armed, and some number of them are surely angry enough to say, “Pass the ammunition!”

But even if only 1% of farmers dared take a militant stand and resist with forceful action to protect their way of life, and the lives of all us… to save us from domination and ruination by Monsanto and a truly insane and clearly fascist government (defined, in part, as a government which makes oppressive laws to the benefit of corporate profits and the power elite to the detriment of the citizens)… even 1/tenth that number is  more than enough people to start a full-scale armed revolution (statistically proven through history).

The mechanics of revolution, as I have pointed out in above linked post, clearly require only two things: a handful of angry people willing to do something which cannot be ignored by government, something which is seen to strike a blow for freedom; and a government willing to use a heavy hand to quash them for their trouble. In every instance, instead of quashing them, they make martyrs and fuel the anger in those previously asleep in their inaction. As result, those who survived the start of matters are joined by many millions more, and a full-scale revolution is born. “Pass the ammunition!”

This time, I fear government has indeed gone to far, and I urge everyone who is angered and moved to action to please stop, think, and act responsibly. Do not react carelessly out of emotion. Violence on your part is likely expected, and desired. Do not give in. Instead, organize and resist in every legal way you can muster (there are ways to do that). As part of the protest, I beg you make clear, as this post attempts to warn, that escalation will be the consequence of inaction by government and the criminal corporations.

They must be shown we will not let them continue to consider humans as mere objects they may move about on a financial and political chessboards, and knock off the board as pawns to suffer death or a life of misery or servitude. We will not idly stand by and let them win the game in which only they, Globalists all, deem to be onlyplayers with any chance at winning. We pawns must become our own self-guided army, and change the rule of the game so that we… we mere avatars of their avarice, are the ones who win.

How can GMO crops be stopped?

WE DARE NOT LET THE GAME CONTINUE AS IS

The fuse is lit. Who will help extinguish it by right action? Who will fan it to burn faster? Only YOU can decide. YOU are what you’ve been waiting for. Either way, I’m looking forward to ruining their game. But I can do nothing without YOU, be it words or bullets that eventually do the talking.

Enough talking. It’s all made me hungry. Let’s get something to eat…

On second thought, I’m not so sure there’s anything good to eat any more. Perhaps I’ll just share this post with some friends, instead, and start a dialog about what we might be able to do change that little problem.

What can we do to stop Monsanto madness?\\\\\\\\\\\

Related articles

Don’t Ban Guns, Ban Magic Bullets


Whenever you get a magic bullet explanation, you know there is a cover up. A cover up is proof of a conspiracy; a hidden agenda or dark plot. Why is that so hard for most of us to grasp that we accept without question the claim that it is, instead, mere conspiracy theory?

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What is a magic bullet explanation?
 
What you will learn reading this post:
 
•  Magic Bullet explanations are commonly used as a cover up tool;
•  Such explanations do not always involve bullets, but use the same methodology;
•  To make explanations stick, it is necessary for media or government to label any who question as ‘conspiracy theorists;’
•  Magic bullets, when unquestioned and excused by labeling, are themselves proof a conspiracy exists;
•  There are many dark bumps-in-the-night in our recent history which so illustrate (several included).
 
 

Promo artwork for Play, The Magic Bullet Theory,                         which perfectly addresses the problem (click)

Despite the fact that there is a dramatic and continual reduction in gun violence in America over many decades… part of the national experience involves an increase in traumatic mass shootings which are seemingly random and without cause… and we have media to point out every shooting event as though it somehow relates directly to the mass shooting madness, presumably in hopes we will say, ‘Please, won’t someone take our guns away?’

If everything were as it is presented on the surface, I might not be so upset with those who so conclude. The idiocy of a Piers Morgan and others suffering from Feinsteinian mental incapacitation would seem tolerable and understandable. But is everything as it is presented on the surface? Cleary it is not, if you pay the least bit of attention and are not dumbed down by TV Psyops News technology.  I speak of magic bullets being used in the guns they want to ban, and similar use of failed logic in ‘factual presentations’.

I’m talking about JFK assassination quality explanations and related tactics employed in cover ups, even beyond shooting events.

Where do we get the expression, “magic bullet”?

What is a Magic Bullet?

The first Magic Bullet, the definitive illustration, arose out of the conspiracy to conceal the truth behind the murder of President, John Kennedy. In review, the Warren Commission investigating the matter had a big problem in two parts. The first was, the number of shots fired in a narrow interval of time from an obsolete bolt-action rifle in poor repair could not possibly account for the number of wounds of the two men the shots struck — unless there were two or more shooters… or unless there was some magic involved. FBI’s best sharpshooters could not duplicate the number of shots and hits fired in the space of time allotted and came nowhere close to the magical performance alleged of the designated patsy, Lee Harvy Oswald.

The second problem was that they dare not rule a conspiracy of multiple shooters.

In fact, Supreme Court Justice, Earl Warren had privately been both warned and threatened by President Lyndon Johnson that it MUST be ruled a ‘lone gunman,’ because there was a significant fear that the truth would require the U.S. go to war with either Cuba and/or Russia, as there was anecdotal (staged) evidence pointing in those directions. Too, there were early conspiracy theories evolving putting the blame on, variously, the Department of Defense, the CIA, and the Mob. But the later (Mob) included ties yet again to the former (CIA and elements of Defense), and so there could certainly be no conspiracy allowed if one were to skillfully avoid detection of skeletons in the national closet.

In the end, the conspiracy theorists would be proven right, of course — but even today, no one in media or government will so admit. It HAS been proven by sworn courtroom testimony of CIA agents involved (Marita Lorenz, E. Howard Hunt; Hunt vs. Liberty Lobby), and more recently, a Mob shooter involved , and additional evidences over time, all of which has been addressed in earlier blog posts and most of which was covered in detail in my book set, Fatal Rebirth. The Warren Commission had Marita’s testimony, but chose to ignore it.

The solution to prevent any such discovery was, like the problem, in two main parts, plus a third supplemental component. The first was a lie, and the second was to seal the records to conceal the lie. The lie was in the form of a bullet which defied multiple laws of physics and over 100 years of ballistics forensic science. It was first dubbed the ‘Magic Bullet,’ by New Orleans District Attorney, Jim Garrison in the trial for murder of JFK of CIA operative, Clay Bertrand Shaw… who indeed also had significant ties to the military and the Mob, not to mention an international assassination ring using both military and CIA resources (what Lyndon Johnson later calledMurder Inc.’), to include persons involved in the Dallas shooting.

From Jim Garrison’s trial of Clay Shaw

The Magic Bullet did the impossible: it inflicted two non-fatal wounds in Kennedy (entrance/exit), and four wounds in Texas Governor, John Connally, hardly any two of which lay in a straight path with a former point of origin. It traversed through 15 layers of clothing as well as the knot in the President’s tie (say, another 8 dense layers), 7 layers of skin, 15 inches of body tissue, destroyed 4 inches of a rib bone, shattered a radius bone, and came to rest in the Governor’s thigh, whereupon it elected to fall out onto his stretcher so it could be discovered at Parkland Hospital.

There it was found in near pristine condition with no signs whatsoever of having struck anything other than, say, a swimming pool filled with Jello. Such a bullet, copper jacketed, should have not only been significantly deformed by impact with the bodies, but also, shattered or splintered by the bones. But this was indeed a bullet with magical properties…

To have done as claimed, the bullet would have had to changed directions in mid air multiple times, and, according to Garrison, paused briefly in flight if to match the wound reactions in Conally seen in the Zapruder film. You can see why Garrison called it a magic bullet. So problematic was the conclusion, that the Warren Commission arranged for (bought) the testimony of a physics professor that all of the above was possible through a series of incredulous existential explanations using scientific theory (techno-babble). The cover up was begun, and much of America knew it, but could do nothing about it.

And if that were not bad enough… to make the Magic Bullet theory stick, Walter Cronkite, ex military intelligence turned CBS news anchor, thought to be acting under CIA’s Operation Mockingbird (media infiltration and manipulation), effected the supplemental component and coined the term: ‘Conspiracy Theorist.’ This he used skillfully to make anyone who dared question the Warren Commission’s findings seem ‘crazy,’ and ‘unpatriotic.’ That tactic (labeling) is one of the 25 Rules of disinformation, and dovetails nicely with the Official Formula for Conspiracy Coverups. It was so successful that it is still used, today, and in Spades.

Who uses magic bullet explanations, and why?

More Magic Bullets…

Not all magic bullet explanations are directly tied to shooting bullets, though some, as used in Sandy Hook and Aurora, do — as we see, below. They can instead be any key evidencial matter which simply does not make sense, but which is fully embraced and remains unquestioned by government and media, as if nothing were amiss. So let us go down the Rabbit Hole of our more immediate history and find some more magic bullets.

Oklahoma City domestic state sponsored (false flag) home-grown terrorist bombing: there are many magic bullet explanations we might discuss regarding the devastating blast at the Murrah Building that took 168 lives, including 19 young children at a day care facility on site. The most glaring is the nature of the bomb, itself. The official explanation is the use of a traditional home-made ANSFO (oil and fertilizer) explosive. The problem with that explanation is that the blast damage was such that ANSFO was impossible, a matter which forced FBI to continually upgrade the estimated size of (number of containers) the explosives used until they were forced to stop because they would exceed the capacity of the truck used.

The real problem was that the forensic evidence did not quite properly match ANSFO with respect to explosive residue, and, in point of fact, included pointers to a new type of explosive developed at a CIA proprietary which had earlier reported the equipment used to make the devices as having been ‘stolen.’ Additionally, the specific damage to the structure and nearby objects were unique and in opposition to the nature of the relatively low pressure blast waves associated with ANSFO, but sympathetic to the high pressure blast waves created by the CIA device, called METC, which produced forces of nuclear blast caliber on a small scale using an incredibly small bomb construct.

This is fully documented at my Web site, which, unfortunately, the IRS has effectively shut down as I can no longer afford to operate Web sites pending payment of an unexpected tax claim arising out of loosing our home in the Mortgage crunch (contributions via paypal using proparanoid at century link net would help get me back online). But I was not alone in this realization.

Brigadere General, Ben Partin, Ret, was the military’s foremost authority on explosives, and he essentially said much the same thing, and so, while I can’t link to my own Web site, you can hear him explain it in his own words, here. I’d rather you go to my Web site because it additionally contains condemning evidence that the bomb factory, complete with the appropriate Ryder truck used to deliver and detonate the bomb, had been photographed from the air by a hang glider pilot. He appears to have been shot down for the effort… at a secret facility constructed by the National Guard and protected on the roads by Marines with machine gun-mounted jeeps and in the surrounding woods by Men in Black — identically dressed in suits, sunglasses, and sporting shoulder-holstered weapons. You know… your typical National Guard facility built in a STATE PARK, complete with a cover story they were ‘testing Humvees’.

True to the above magic bullet explanation in multiple parts, even Partin was labeled a mere ‘conspiracy theorist,’ despite his credentials — or media failed to tell you he even existed. However, both he and I, among others, were invited by Willis Carto, former Editor of The Spotlight, a defunct Washington, D.C. newspaper — to participate in a round table review of OKC and Flight 800. That event, which I was unable to attend, also failed to make the news despite Carto’s best efforts to insure it.

Robert Kennedy’s murder by CIA’s Thane Ceasar and patsy Sirhan Sirhan: OK, just because a CIA mind control shrink was murdered after bragging to a prostitute that he programmed Sirhan… and because the woman in the Polka Dot dress that shouted ‘We killed Kennedy!’ in glee was seen with Sirhan, earlier… and because the cop in command on the radio that day told the cop that overheard the woman not to investigate because ‘We don’t want any conspiracy theories,’ was himself ex CIA… or because the man that ordered all RFK murder evidence relating to bullets fired destroyed was ex CIA, too…

That does not mean CIA had anything to do with RFK’s death, unless you are a wild conspiracy theorist. But there were some actual magic bullets to deal with, like the ones found in the woodwork destroyed as evidence, which exceeded the number of bullets in Sirhan’s gun… and the fact that the only shots which hit RFK were from immediately behind and fired upward (Sirhan was an appreciable distance in front of Kennedy). These bullets sound pretty magical, to me.

Thane Ceasar, an armed security guard on loan from a CIA proprietary was the person standing immediately behind Robert, that day, but of course, Police never thought to check his gun, lest THEY become conspiracy theorists. Amen.

The Vince Foster murder suicide: A key staff member of the Bill Clinton Whitehouse, Vince Foster, was found dead in a park at a precise location known in some circles for frequent use by spys in clandestine meets (e.g., a KGB meet with CIA). There was a conspiracy coverup at the time suspected (first revealed in The Spotlight) in the Clinton Administration, a matter in which Foster was a key player, and there were expectations he might spill the beans. No chance of that.

Instead, the official story is that he used an antique gun to shoot himself in the mouth at the park. Only problem was, it was indeed a magic bullet; in addition to the gun being inoperable, there was magically an absence of a pool of blood and splatterings at the scene, where his body was neatly laid out completely prone as if falling backward while remaining perfectly rigid. There were also no powder burns, another magical property. Charges of conspiracy theorists would abound at the slightest questioning of these inconsistencies.

Flight 800 friendly fire shoot down fuel tank explosion: Again, the best evidence I would normally point you to exists at my own Web site, where I reveal use the actual information from the official NTSB Crash Report to prove the NTSB altered, concealed, and manufactured evidence in support of the their conclusion that frayed wiring caused the center wing fuel tank to explode, killing 230 persons. Again, there are many magic bullets, but the primary fuel tank explanation is the most glaring — never mind many confirming eye witness reports (including military observers), radar tracks, and other proofs that a missile fired from a warship participating in war games brought down the plane.

There were many magic bullet issues with the fuel tank, the most glaring of which was the absence of soot on the appropriate surfaces of the fuel tank components, sooting which instead existed on surfaces inconsistent with the explanation (sooting on the outside, but not the inside where the explosion was claimed to have initiated). In like manner, the sequence of destruction described did not account for select (ignored) damages, specifically including two holes in the fuselage which were claimed not to exist, but which are visible in photographs if knowing where to look — which if taken as an entrance and exit point for a non exploding (war game) missile, would perfectly account for the sequence of destruction, both cited and ignored. Thirdly, the flight recorder data itself clearly reflected the effects of the missile strike and was sympathetic to the fuller destruction sequence, but was ignored and simply dismissed as ‘faulty data’ by NTSB.

But we who opposed the official story were mere conspiracy theorists, right? Never mind I have some experience in crash investigations while in the USAF, even reporting to Congress as part of a Weapon Systems Acceptance and Evaluation Team where crashes were reviewed and analyzed. Having credentials just means you are extra crazy to disbelieve the official line, it seems.

The Aurora theater false flag shooting team lone gunman event: once more, there are many magic bullets. Here, I’ve already outlined 25 key questions, thankfully NOT at my Web site, but in blog form. Most of these, or at least in combinations, represent magic bullet issues. So many questions, in fact, it took three blog posts to review them all, the last perhaps being key-most. Just a few to pique your interest in summary:

‘Who opened the OUTER door for James Holmes?’
 
‘Who were the two people who entered the adjacent theaters on either side to warn patrons not to use the exits to the parking lots, and why did they do so, since there was no possible way anyone inside the theater could have known it unwise, and the only logical thing making it unwise would be preventing witnesses from seeing something in the parking lot they could not be allowed to report.’
 
‘How was it that patrons in the adjacent theater saw flashes of light and heard associated bangs from their theater entrances (the hallway/lobby area) unless someone ALSO threw flash-bang devices there while James threw ONE inside the theater while all doors were closed?’

I’m a damn conspiracy theorist, that’s how!

Sandy Hook false flag lone shooter event: I would hope by now it would not be required to point out that you can’t claim there were only four pistols found inside the school plus a rifle locked in the trunk and then claim the rifle was used to shoot everyone. But it is equally important to question how it would be possible for nearly every bullet to find its mark and to stay inside the bodies of a child as claimed if it was indeed the rifle that was used. Never mind that the Police audio transcripts would seem to describe someone taking an AR-15 out of inventory (“shorting” is the word they use), perhaps that it could be claimed to have been ‘found.’

Surely don’t disbelieve or question the ever changing stories about kids and a bus driver who escaped the shooting by walking past a Fire Station where they could have both taken true safe shelter and reported the shooting to first responders immediately, and instead walked another two blocks to sit on the grass and await discovery by a strange little man with a Masonic emblem cut into the lawn in his back yard. There is more you might ought ignore, but to pay attention and object would make you, too, a conspiracy therorist.

Collection of politically incorrect comic artwork (click)

The election of foreign-born CIA operative Barry Sorento President Obama: I really have to laugh if you don’t already know this one, and won’t even waste my time explaining another crazy conspiracy theory to you. Just go watch that new TV series, The Bible, instead, and you will feel better almost immediately… at least by the time you get to the scene where Christ is tempted by the Devil. LOL.

Sept. 11 false flag precision-crafted terror attack by a man living in a cave: Ditto.

Why are magic bullet explanations used?

Guns or magic bullets?

So, in conclusion, I’d prefer we don’t ban guns, but instead pray we ban magic bullet explanations, and banish news sources that never quite seem to notice their existence or address them, but are quick to label anyone who does. Use your brain, pay attention, and avoid accepting on faith the content of dumbing down TV news shows and, especially, spin-control talking-head commentaries; those sources with mottos like ‘fair and balanced,’ and ‘spin-free zone’ are clear warning signs.

Think for yourself. Question government, question media, question inconsistencies, and be vocal about it, loud and frequently. And simply don’t give a damn if someone calls you a conspiracy theorist for your trouble; you can’t confuse them with the facts, their mind has already been made up for them.

Me, I take the label as a badge of honor. I rather imagine Diogenese would be proud of all who quest for truth over lies. Got lamp?

Does mainstream media tell the truth?

Psyops TV: How They Dumb You Down to Set You Up


You are being indoctrinated and conditioned to accept the Orwellian nightmare. Cancel that. You have been, and here is how.

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.

How can you spot psyops on television? Easy. Just turn it on!

Update: April 20, 2013 Made correction to heading numbering, and to add this commentary based on media coverage of the Boston Marathon bombing:

Hillary Clinton’s worries about loosing the information war to the Internet were most clearly mandated in the Sandy Hook matter when manipulated media was never more obvious. They made so many mistakes in presenting ‘facts’ that it is no wonder that conspiracy theories were popping up faster than for JFK’s murder.

Then came the Boston attack by two Brothers, and it is suddenly a 180 degree shift, almost as if CBS, the only network I was able to observe (but perhaps others) had actually read this blog page and fixed everything I’ve cited, as well as repaired the flawed methods employed in Sandy Hook for getting out the official falsehoods. No more conflicting facts, replaced instead on continual source checking and self correction, and plenty of differentiation between solid sources and conjecture.

They also dumped the psyops special viewing effects described herein, making it very possible for the most dumbed down of us to follow along and not get confused. It was 1950’s quality newscasts, all over again, but in living color. If all of media would follow this model, and do their job to question questionable government reports, there would be no reason for we conspiracy theorists (their term for questioning contradictions in what we are told) to worry the likes of Clinton.

This does not, of course, prove there was no false flag event involved, or a broader conspiracy yet to be uncovered, but the point is, there is no set of conflicting statements to fuel speculation of any such conspiracy. I don’t see conspiracy being the case, though there are some things which bother me about the affair which I’ll save for another blog well after the dust has settled.

I’d like to offer three cheers to all of law enforcement at all levels for a hard-won effort, and to media for doing their job the way they are supposed to, per the best tenants of Journalism. Keep it up, and you can put people like me out of business, and me happier for it! End of update.

Was the Boston Marathon bombing false flag?

What you will learn reading this blog:

• Documented CIA and similar covert media psyops programs have been run on us as far back as 1914, and likely, before;
• Media disinfo and conditioning is a form of Political Control Technology, a polite term for mind control;
• TV programming is designed to make us fearful enough to accept military rule and violation of Constitutional rights;
• TV news employs psyops science in visual presentation as a key tool for dumbing down;
• TV ‘entertainment’ is often a dumbing down tool and/or conditions us for dark things to come;
• One small group controls and insures that school textbooks jump-start young people toward the dumbed-down state.

Can TV be used in mind control? Yes!

In 1968 you got a simple, direct presentation of news. Still images in the background, moving images filled the screen replacing the reporter. Simple, informative.

In 1968 you got a simple, direct presentation of news. Still images in the background, moving images filled the screen replacing the reporter. Simple, informative.

In defense of Television executives, media moguls, and producers everywhere, they have largely been duped into cooperating in TV psyops unknowingly… well, yes there are quite a few very eager to go along, too. After all, Fascists exist in every industry sector, especially when the New World Order crowd deems media control a priority; one of the key steps in the Illuminait’s original 1776 plan to establish a New World Order (they coined the phrase); a long-term plan to establish a one-World government that they might seat the Antichrist.

But here and now in contemporary times, the tools of psyops are all powerful, and the Illuminati would seem well and alive in the Globalist ’round table’ enclaves such as the Council on Foreign Relations, the Bilderbergers, the Skull and Bones, Rhodes Scholarships, and on and on. But we are talking here about their operatives, not their leadership; the ones who effect psyops in support of such agenda.

That means we are talking about CIA, military, and military-industrial-complex infiltration and manipulation of media, which is why in my books on abuse of power by and crimes of the New World Order, I call it the Military Industrial Intelligence Media Complex (MIIM). We start this examination by going back a little bit in time, as what has come before has been in building block fashion…

Does the military industrial complex use psyops to make us want a war? Yes!

Stage 1: Operation Mockingbird

Actually, stage 1 predated Mockingbird, and yet was its archetype. It took place pre WWI, when the Powder Interests (arms industry, predecessors to the military industrial complex) bought control of 26 newspapers to change public opinion about entering into the war.

Note of whimpering: I would normally send you to a link at my own Web site with the full Congressional Record proof of the matter, but the IRS has effectively shut down my income producing sites leaving me to live on about $530 a month after paying them $150 against some $6,000 of the National Debt seemingly engineered for the purpose. So the link illustrating the matter will take you elsewhere. Any contributions via PayPal using proparanoid at century link net would help put me back online. End of whimpering, for now.

America was, at the time, quite Pacifist in view, until the bought media began reporting in unison the lie that German soldiers were regularly raping and then cutting off the breasts of Belgium women, especially Nuns. That, and like reported crimes never happened, at least not as claimed, though you still find citations that it did based on the original reports even today. Post war research verifies NO SUCH CLAIMS.

There was one oft cited incident as ‘proof’ of such. The victim was not a Nun, as reported by a Belgian soldier’s commentaries  published in a book by the American Defense Society in 1918. That group was formed in 1915 with ex military, arms merchants, and others and was quite militant, led by non other than Theodore Roosevelt, who had lost the 1912 election against Pacifist Wilson. This was AFTER media reports about the atrocities and seems an attempt to ‘prove’ the matter after the fact. They hardly needed bother, as anyone who questioned such reports was decried as un-American, unpatriotic, and a Socialist traitor. ADS believed in enforcing Sedition policies (criticizing or questioning government was treated as a crime).

Such tactics changed our mood as a nation. So when they also illegally secreted munitions aboard the cargo holds of the Luxury Liner RMS Lucitania, and then let the Germans know about it… the Germans did the predictable thing and sank the ship, sparking enough outrage that we finally went to war. Now, while we are wanting to talk TV, here, and a bit perhaps about the film industry, closely related — what they learned in 1917 would apply once TV had gotten its foothold in the American landscape.

The National Security Act of 1947 saw the birth of CIA, Department of Defence, the National Security Council, and all resulting sins, including mind control projects. The lesser known story, as revealed in my book set, Fatal Rebirth, is that the Act was sponsored by the evolving Powder Industry, as well. In fact, they threatened to establish a civilian operated equivalent of CIA if Truman did not move Congress to do so.

As it happens, a relative on my Wife’s side was right in the middle of that, serving both directly in the Truman White House as State Department liaison, and later, a like role for the Secretary of Defense. I had access to a trunk load of his papers going back to WWI, where he was Army Intelligence. ‘Uncle’ George Bernard Nobel was also a Rhodes Scholar who later helped establish Pacific Rim Globalist round table groups while professor at Reed College, to whom we donated his papers — save the WWII code books disguised as Masonic lodge codebooks (a different one every 90 days), which I retained.

One of the earliest projects undertaken by CIA, of course, was to attack United States citizenry with the same exact covert war tools it would later apply against other countries they wanted to topple: disinformation through media infiltration and control. Called Operation Mockingbird, CIA put thousands of agents to work in all forms of news media, and bribed or intimidated, blackmailed, or misled legitimate reporters, producers, and moguls to cooperate. Don’t take my word for it, it, too, is in the Congressional Record.

It continues today in many ways, though Mockingbird was ‘discontinued,’ after it was revealed in the 1970s through Congressional investigation… after nearly 30 years of disinformation damage. One early example of particular note close to my heart was the coining of the phrase ‘conspiracy theorist’ by ex Army intelligence officer, Walter Cronkite. This was used to discredit and quell the many questions arising in the public’s mind over ties between JFK’s murder and CIA and the military, and the Mob partnership behind the plot, as eventually proven in courtroom testimony by ex CIA Agents involved  (Hunt vs. Liberty Lobby).

Another close to my heart was the deliberate and methodical placement of jokes in comedy shows regarding tin foil hats (continues today there, and on the Web), implying anyone/anything relating to the possibility of mind control was ‘loony.’ In truth, the joke were sparked because a particular man in NYC entered a Police Precinct wearing a tin foil hat claiming he was being mind controlled by CIA experiments.

Totally ignored and shoved out the door with suggestions he see a shrink, his body was later found… minus tin foil hat, where there were dozens of electrodes implanted in his brain. This made the newspapers, and within weeks TV sitcoms began having jokes about tin foil hats here, there, and everywhere. There is no Web link regarding that unfortunate victim’s news accounts now that my sites are shut down, but I have also documented it in my book, MC Realities.

Here is another look at Mockingbird by one of America’s last true investigative journalists, Carl Bernstien, of Watergate fame. But the important part is that television played an important role in early Mockingbird, a role which would eventually prove key to getting Bush and Nixon into the White House, the start of the Bush Dynasty. That, and CIA ‘adapted’ software used to ‘count’ votes in America (the book Votescam, by James and Kenneth Collier, is a good place to review, the very first chapter).

How does TV dumb us down?

Stage 2: Indoctrination to set you up

50s & 60s TV: Broderick Crawford's Highway Patrol, and The Man From U.N.C.L.E. featuring Robert Vaughn and David McCallum of NCIS fame as Soviet Illya Kuryakin

50s & 60s TV: Broderick Crawford’s Highway Patrol, and The Man From U.N.C.L.E. featuring Robert Vaughn and David McCallum of NCIS fame as Soviet born Illya Kuryakin

Coincidental with Mockingbird was infiltration of Hollywood and TV programming with propaganda which continues at a heightened pace, today. I’m talking about the early use of documentary-style portrayals of real-world, and later, fictional events involving ‘white hat’ Agencies. The first of note was I Led Three Lives, a dramatization of the true-life story of an advertising executive who was actually a covert undercover FBI double agent within the Communist Party, where he was involved in aiding and yet subverting plots to overthrow the United States. It taught us to fear the Reds all over again after McCarthyism. Then came FBI, staring Efram Zimbalist, Jr., which overtly went after the Communists as well as bank robbers, kidnappers, and other nasties — in an America where the only car maker was apparently Ford, as the streets were filled with the sponsor’s product; an early product placement strategy where even the bad guys drove them.

The purpose of these shows was: a) to make you glad we had such agencies by; b) portraying evil everywhere, and c) always getting the best of the bad guys by being good guys, upright, moral, and always operating legally. It worked. I loved those shows as a kid, as did my parents. As consequence, a whole generation of young grew up wanting to join the FBI, CIA, Police, and so forth. CIA had shows like Robert Culp/Bill Cosby (in a serious role!) in I Spy and Patrick McGoohan as Secret Agent, not to mention The Man From U.N.C.L.E. (a secret United Nations version of CIA that taught us to trust the U.N. to watch out for us) and interest in law enforcement was fueled by endless Cop shows, of which there were so many over the years as to be pointless in naming, except perhaps for Jack Webb’s Dragnet, and Broderick Crawford’s Highway Patrol, two of the earliest successes.

Fast forward to recent times, and they’ve refined the tactic to condition us to military dominion. But also with a mental switch being thrown… as they now want us to think that its OK for the good guys to not be so legally upright. You know… ‘the ends justifies the means’ thinking (a Fascist’s motto). It started with shows like JAG (Judge Advocate General), where the military justice and investigation system was quite well presented that we should think it as good as civilian justice, coincidentally more or less synchronous with A Few Good Men, a major motion picture equivalent with Jack Nicholson and Tom Cruise. Well, they at least obeyed military law and procedure, but the next wave was a bit more ‘loose’ about it, spin offs from JAG, mostly.

That would be  NCIS and a flood of sister/spinoff/parent shows where you are guaranteed in each and every episode to see someone’s privacy illegally invaded at the touch of a computer or other act (but it is OK, it is the military/government, after all, and they would certainly watch out for us innocent folks who have nothing to hide, right? Besides, the bad guys don’t deserve the same treatment as we would want for ourselves, do they?) Rights should be contingent upon government’s judgment, we are to believe, and they seem pretty free to make instant judgements in these shows… “Already done, Boss,” as McGee (Sean Murry) says so frequently in NCIS.

Note: Indeed this is exactly what the Constitution of the NewStates of America spells out. The document is intended to replace the current Constitution after Martial Law and military rule, according to former Naval Intelligence Officer, William Cooper, who discovered the document had been prepared at a cost of $25 million by a NWO think tank. In Fatal Rebirth, the entire document is analyzed verse by verse to reveal that there are no guaranteed rights. All are conditional, and all are subject to retroactive cancellation, and more than one authority may so decree. Anyone may be ruled an enemy of the State at any time for any reason.

Such shows also tend to have advanced alien-caliber technological capabilities which work instantaneously to provide, in the nick of time for both the plot and the next commercial break, the critical evidence. This aspect is also present in many of the crime fighting counterparts such as Numbers (where they in each show attempt to present, but I have yet to see, a scientifically correct presentation of their questionable methodology), Profiler (gets us used to the idea that profiling, normally a negative term, is a bit like pre-crime thought police, and a good thing — we need more cops on our streets, and a few more in our heads), CSI, and so forth, proving to us Citizens that we ought be good and fully obedient, because like Santa, the cops and the Federales can always find out who’s’ naughty and nice, no matter what. Obey, or they will get you.

The truth is, though you may yet still doubt it, you are being set up for military control. More on that notion in the summary. And yet, it is a double whammy, because everything the TV moguls have learned about how TV can be used to manipulate you for the purposes outlined, can also be applied in marketing to boost advertiser sales. So while you are being dumbed down and set up, you are also being convinced you need (everything). So don’t just obey, but also, order yours today, and be sure to borrow heavily to do it! Remember, debt is the ultimate form of non violent control, and the last thing you want is to force them to resort to violence (which is inevitable, anyway, because they have to get the guns, you know – another reason for needing to stage an event worthy of Martial Law).

Does news deliberately dumb us down? Absolutely!

Stage 3: News Manipulation to dumb you down

We will talk about a number of things here, and a bit later, we will look at some specific technical methods employed. This section sets the stage. I’d send you to my Web site for the 25 Rules of Disinformation, all of which are easy to see illustrated in news in general. But I can’t (still whimpering and hoping for your kind contribution), so here is one of the many dozens of sites which have reproduced it, my most popular piece ever, with many tens of millions of downloads.  You will find that each ploy is used on you every day, either directly by media, or by those they are interviewing without doing their job of asking hard questions when things don’t make sense as result of the ploy(s) elected.

So when they tell us there were four pistols ONLY found in Sandy Hook, and the Rifle was locked in the car, but all the kids were shot with a Bushmaster, and moreover, virtually every round fired by the 3,000 foot per second high powered bullets not only hit a target (almost no misses), but also stayed in the bodies… we tend to accept it as ‘factual.’ No wonder there are so many conspiracy theories afoot about that, and other news stories of our time. And this is proof of dumbing down, because more than half the people are NOT questioning the ‘facts,’ all effectively turned into Ozzian Scarecrows in search of a brain; straw-stuffed Sheeple.

Used to be, Newsmen listened to what sources were telling them, reported that, and when finding inconsistencies, pursued them until they had an answer, and told us that, too, wether it was a good or bad answer. They also used ‘redactions’ or other correction notices to update us when things became clearer. Now you get the official line, and on to the next story before you think something was amiss. Heaven forbid we should dare ask about the man behind the curtain.

Got a war? Imbed the journalists with psyops media warriors to insure news cameras see only what they are supposed to see, and report what is allowed to be reported (patriotic pro war). Those not willing to be embedded, get shot up by helicopter gunships and tanks just to make sure they might ought prefer to be embedded. And yet, there is even disinfo and psyops taking place in such friendly fire incidents…

Who is most often central to those reports? Reuters, an original CIA Operation Mockingbird front which was (at one time, at) owned outright by CIA, though you won’t find that in a Google Search (you used to be able to do so). It is listed in my books, and of course, at my sites (whimper). My favorite photograph (also at my Web site) is a news crew in Africa interviewing some Nigerians about terrorist activities in the region, and the guy holding the sound boom has a T-shirt which reads, “NOT CIA.”  Really?

Which brings us to some more dumbing down/setting up. Remember that series of ‘bin Laden’ videos we kept seeing after 9-11 ‘obtained’ with messages for the World? If you are not afraid of terrorists, you won’t put up with oppressive Constitutionally neutering laws and atrocities by TSA, unconstitutional border checks 60 miles inland on highways not even going to the Border, and military gunships letting go  with their Gattlings near your kid’s school.  Internationally (but not in America), experts on bin Laden, on the Arabic language, and in governments far and wide were stating publicly on THEIR news that the videos were fake (eventually admitted to by CIA), not bin Laden, but a look-alike, and not saying what was claimed, at all.

Keep in mind every news outlet in America of any clout ALWAYS keeps tabs on what other nation’s media are talking about. That’s one way they learn about newsworthy events around the World, and about how other nation’s see events in America, which is often an element of the ongoing story, here. So it isn’t just experts in America they were deliberately ignoring, they were also pretending no one else in the World was talking about it. Deliberate psyops by concealment. That’s willful malfeasance, and as such disinformation has effectively cost American lives, makes them complicit in murder,should anyone wish to file a lawsuit.

But, thanks to the Internet, we eventually as a collective consciousness began to realize the tapes were phony, and we also began picking up on stories which revealed that the Iraqi troops bayonetting of babies in Kuwaiti hospitals in order to steal their incubators was, like the Belgium women’s breast story… an official CIA hoax. Now here is where we see yet another manipulation of media, this time the Internet. As recent as two years ago (last time I did it, anyway), you could find mainstream coverage on the Web of the revelation that this was a lie fostered by a Public Relations firm that is listed as a CIA front. Not now. Now you can only find blogger, Youtube, my closed Web site, and foreign media reports. One of the Rules of Disinformation is, after all, ‘If you don’t print it (or hide it, later), it didn’t happen.’

It was roughly in this time frame, in my opinion, that America began to realize that we hardly EVER got the truth from Washington, or for the matter, the Washington Post, New York Times, Time Magazine, CNN, MSNBC, ABC, et. al. The led to…

What is the information war? Disinformation at its finest.

Stage 4: The Information War

The information war was officially on between the Internet via outspoken activists, investigative writers, and indeed, conspiracy theorists who sought only the truth, and the MIIM complex and their minions of control, mainstream media. This was recently officially acknowledged in a recent remark to Congress by Hillary Clinton as Head of the U.S. State Department, obliquely referencing the Internet in and among a larger collective of ‘alternative media’:

“We are in an information war and we are loosing that war.”

Of course, you only got the sanitized version from the Washington Post and other mainstream outlets. They would have you believe she was only worried about foreign news networks such as Al Jazeera, and RT (Russian Television) News. Both of these outlets offer English speaking versions and are enjoying American viewing attention at up to 100 times greater than failing american media giants. And where are they getting all the attention? Not via TV sets, but the Internet, a little detail omitted in the telling of her story by those media giants.

But who can blame us for wanting to hear what other countries say when we find out our own country is lying to us? And I mean BIG TIME. Did you know the Pentagon knew the date of the Afghan invasion and was sending Colin Powel and top US Generals around to our allies to arrange for multinational support well before Sept. 11 attacks? What? You thought we only went to war when there was a just cause? Would it help you to know that Australian, Indian, UK, and Russian news sources were talking about this before Sept. 11 and wondering how we were going to justify war with a backward non technological country rich with oil, gas, and illegal drug growing operations?

Clearly, someone in the military knew in advance there was going to be a ‘Big Wedding’ (al Qaeda’s alleged codename for 9-11) event, and was sending out guest invitations. But American media dare not report that fact before the event, or you would realize 9-11 was an inside job. Truthers exist everywhere, as result of the endless conflicting facts, but are belittled by media in self defense; if they admitted the truth, they would be confessing complicity to a conspiracy to mass murder.

And yet they continue to loose ground, making it an urgent matter for the Globalsist to more quickly move toward Martial Law, because THAT will also enable…

Stage 5: Internet 3.0, the Kill Switch, and political censorship

Congress has repeatedly attempted to redefine the Internet towards political censorship, a matter which deserves its own blog, and indeed, many good articles already abound. Take a look at SOPA, PIPA, and CISPA, for instance (Congressional Bill nicknames). But if there is a Martial Law, the Web will be shut down, as will be phones, mail service, and radio/TV as we know it. The only communications allowed will be government to you, and mostly unpleasant in nature. Moreover, it will be illegal to criticize government publicly.

Eventually, services will be restored, but at that point, you will not be able to rely upon the Web for ANYTHING short of government and corporate approved content. A total Police State will have been achieved, and we will be dealing with the NewStates of America, which will move to form (as enabled by the new Constitution) the North American Union in support of the march to a one-World government, and the Antichrist’s End Game.

Fortunately, we are not there, yet. But they are preparing us for that day, conditioning us daily in our TV news feeds. And to help us get the right message, they use clever visual tricks to go with the information they want us to come away with (and minus that they are unwilling to reveal). That brings us to the most interesting section, in my view…

How does TV dumb us down?

The psyops science behind TV News

CNN has so much going on visually you cannot possibly avoid dumbing down to the story presented

CNN has so much visual clutter you cannot possibly avoid dumbing down to the story

A seldom noticed tool for dumbing down is right in front of your eyes when watching modern network (and to a degree, local) news programs. It is the methodology (psyops science) of visual presentation. Compare today’s methods as we examine them to the image at page top from a 1968 newscast. Which one is likely to better insure your attention is focused on the words you hear and the key photos or moving images representing the actual news topic under discussion? The answer MUST be, the old way. A mind’s attention divided against itself by distractions cannot be whole in thought. It’s how accidents happen in the real World. It’s how dumbing down happens in the news world.

First Example: CNN; the sample images are divided into zones for discussion purposes. I have additionally outlined areas in red which represent special effects being applied in unique ways with respect to transparency. When things are transparent, and especially when the background is indiscernible, it allow the subconscious mind to be confused; something solid seems real and factual, that which is nebulous is less real or concrete, and more implied than factual.

Zone 1, a and b parts — is showing a moving graphical pattern promoting the news program, which in this case really is not a news program at all, but a news spin mechanism to take a select news story and make sure you get the official slant in a way that interfaces well with the greater Globalist agenda (i.e., gun control is good, OWS and Internet activists are bad, etc.). You literally see it in her eyes; ‘You have to believe me!’ There is no synchronicity in the movement of the background pattern between the zones, giving your mind a kind of subconscious mental puzzle to resolve… is it the same pattern, or isn’t it?

Zone 2 is also in two parts. The official CNN Logo (b) is animated over a separately animated background (a), to create a mental 3-D puzzle of sorts. An element of the puzzle is that the background is nebulous and hard to grasp, with just enough detail to imply there should be something there recognizable, and yet, just as you think you understand what it is, it is not. There is actually a 3rd unmarked zone I failed to note at first… the blackened rectangle at the lower-right corner. It also contains the same CNN image machinations, but the color has been removed, creating yet another puzzle for the subconscious to resolve.

Zone 3 in two parts — is yet another play on the name of the show, with things in motion. The name scrolls to the left in (a), competing with and drawing your eye away from any other text which appears, and then vanishing with transparency into part (b), which is where they want your attention to go (nothingness). So when the text changes and your eye darts to it (distracts you from the spoken word or other video present), you are additionally distracted subconsciously by the scrolling text adjacent; two tiers of distraction, one distracting you from the other.

Zone 4 in four parts — four different text sections, each able to change for various reasons, which may be synchronous as with a complete change of presentation topic, or asynchronous within a presentation to provide additional timed distractions. The worse offenders would be those texts which scroll endlessly. Your eyes dart back and forth endlessly, unless one thing seems more important momentarily. Regardless, you mind has been divided repeatedly.

What you are left with in most such shows, is no fewer than a half dozen moving images and as many textual elements, all competing for attention to subtly make it less likely that you will remember much more than the most basic of details — such that most Americans STILL TODAY, (of those who favor TV as their news source) are not even aware of the conflicting facts about guns at Sandy Hook, much less any of the other controversies. They simply were unable to absorb the needed level of detail to say “Wait a minute. Yesterday you said one thing, and now you are saying another?” Naturally, they also don’t realize they’ve been fed yet another magic bullet story (several, actually).

It is a Globalist's tactic, so we find it in news Globally

It is a Globalist’s tactic, so we find it in news Globally

Second Example: Univision; every network, indeed, every show, has to have a different ‘skin’ to make it visually identifiable. So a second example gives us a look at other ways to do the same thing within such skin changes. Here we see Zone 1 — a giant moving graphic element in four parts of the screen, all of which employs color cycling to further divide the parts. Color cycling is a psychotic technique which relaxes and subdues the conscious mind. Within it words are alive with motion, another layer of distraction. It is pervasive but cleverly segmented by other elements such that it is as if four separate, but synchronous sections, each competing for attention subconsciously.

Zone 2 in two parts — the primary (a) is the Reporter or first talking head. Multiple talking heads with their own window is a popular skin construct, one which especially becomes a great distractionary tool when you allow each person to speak over the other in heated manner which never seems to let but one side make their point fully… but the viewer, conditioned over time to side with the presenter’s viewpoint, simply sees ‘them winning the argument,’ and not them manipulating the flow of dialog. Else how do you explain ANY popularity for the likes of Torry turned ‘American Pontificator’ Piers Morgan, and the countless talking heads of like ilk?

Part (b) — is supplemental text information for labeling window content, and can change to other information for distractionary purposes. The question is, why is it important to tell us it is the Studio when we know that? Or to name the party just introduced or the newsperson we are used to seeing? We already know these things; they are simply there as a decisive distractionary tool. Every time they change, our eyes and attention are tempted to be diverted.

Zone 3 — in two parts is the second window for alternate video or added talking heads. This reduced viewing area will LIMIT the detail we are allowed in the news presentation. They might allow us the luxury of full screen video for things where they want us to absorb something (i.e., the full scope of violence by protestors), or elect the minimal viewing window when they’d rather we not so easily see something (i.e., police violence). Sure, sometimes it does not matter, and sometimes there may be no deliberate intent inherent in such changes. But the tool is there if they need it.

Zone 4 — is a replay of CNN’s, with an additional 5th part. There is no intrinsic difference in strategy or use. Again we find special effects using transparency along with motion (red outlined area near lower right corner). In this case, text is scrolling which is not quite readable without great effort, the same text (I think) as used in the main background (Zone 1), but scrolling the opposite direction. How distracting is that? It has to be intentional.

Worse, if there is any actual verbal content in all that scrolling background text, it is being absorbed by the subconscious. There is therefore the potential for subliminal programming, an early CIA developed mind control trick — but I do not know it is present, nor can I make such a determination as I do not read Spanish, and the original image is not clear enough to support translation efforts. I would defer to anyone with more direct specific analysis.

So, tell me again, Hillary, Piers, et.al, about Sandy Hook, 9-11, and why you don’t believe there is a conspiracy afoot somewhere in those engineered tragedies, and other controversies which flood the evil Internet? Oh… because people believe what you tell them to believe. I should have known better, since the public all went to school using text books approved by a handful of people in Texas appointed by George Bush to globalist standards… and most other States will not approve books unless the Texas group has first approved them.

Yes, I’m talking about the same people that insured text books sent to Afghani schools a decade before September 11 used pictures of bombs and guns and grenades for counting exercises… just in time to create a generation of terrorists… and then replaced them with pictures of wholesome things once we invaded. How could anyone believe anything else than the official message, given the running start on dumbing down such programming gives them? But you know, that’s yet another news story that’s vanished from the Web, of late, so why do I waste my time arguing with you?

Its the people who think for themselves I’m really concerned with reaching.

Who is winning the information war? YOU — if you pay attention!

Open Letter to United Nations by Red Chinese National


Open Letter of Complaint to the United Nations, by Xin Zhong Qing

Received by H. Michael Sweeney direct via email March 18, 2013

PLEASE REPOST. NO COPYRIGHT NOTICE. 

 

English: Emblem of the United Nations. Color i...

Notes indicated red by H. Michael Sweeney. As you read, unless you are already familiar with political control technology, you will be moved to dismiss the complaint as the rantings of a mentally disturbed individual. While it is certainly possible that is the case, it is also not only possible, but highly probable that the descriptions are true accounts as the victim is best able to relate in conversational English. Please consider such translation issues as well as the following facts before you make any such decision: 

 
1) As testimony to the State of Massachusetts Legislature on a Bill to limit use of electronic weapons reveals, there is NO symptom of schizophrenia (imaginary persecution or other unreal events, realities) which cannot be induced electronically;
2) Therefore, most victims of political control technology seldom have a correct understanding of the exact nature and cause of their targeting, and indeed, specific effort is typically undertaken to insure their beliefs are incorrect (you cannot fight a problem if you fight the wrong cause);
3) As one who has worked with hundreds of such victims around the World, I see select clues within the dialog which align with many similar charges from others within Red China, as well as other countries, including America. I am specifically comparing to cases where, after working with the individuals for a considerable time, tests and defensive strategies verified that targeting was real — though generally different than the victim’s original perceptions and understanding.
4) You will note that many of his prior letters were enjoined by other signers, up to 77 persons. 
5) Yesterday, I got four hits to my wordpress pages from Red China (rare). One of the pages hit regarded how easy it is to start a revolution, which featured the 1989 failed Tiananmen Sqaure incident. Another features how to outreach as a targeted individual, my also my main page on political control technology, and another was my contact page. I now believe these were Xin’s visitations. Xin Zhong Qing is a fairly common name in China. There is even a Container Vessel operated by the Red Chinese Army of that name. 
 

Letter begins:

United Nations Commission on Human Rights:

 

Xin Zhong Qing from his social media page, Red China

My name is xin zhong Qing, Is the Chinese Jiangsu province Nanjing city an ordinary law-abiding civilians. Here, I on you accuse China Security Department “secret agencies ” in a group of spies criminals, they abuse “monitoring” privilege, make high-tech “brain control” technique, remote control my body and spirit, the implementation of more than 40 years, The days and nights of continuous uninterrupted secret torture persecution.

      In the Chinese Cultural Revolution ” of 1971 , in the 20th century , I was framed for “5.16 counter- revolutionaries “, were subjected to cruel political persecution. This group of ” secretagencies ” in the secret criminals, in order to force me to, admit that they are “5.16 counter-revolutionaries”. At the same time, in order to stop me openly accused Justice voice, they use high-tech ” brain control ” technology means frenzied , day and night, 24 -hour continuous remote control of my body , the implementation of an extremely cruel persecution and assassination plot secretly tormented.

They are a group of secret agents Alcatraz. To me implemented secretly tormented persecution means extremely brutal, shameless, comparable to the German Hitler fascist concentration camp Gestapo and Japan 731 units of bacteria devil evil, their Monstrous evil, just pale into insignificance by comparison! 

     They control my body, every minute non-stop manufacturing my body, appear all sorts of pain; itching; extreme cold; heat; numb; vertigo; tremble; Extremely uncomfortable; incontinent, frequent cough vomit nasal bleeding paste the nose, as well as the infamous “sexual torture” and other pain. For over 40 years time, wherever I go where, this secret pain never stopped, and I can’t sleep, normal study, work and life, day and night in very suffering pain, like a living dead! 

     Their Monstrous evil, not only a violation of China’s constitution and laws to “respect and ensure human rights” provisions, also completely violated the Charter of the United Nations and the “Declaration of human rights” and other relevant safeguard basic human life, survival rights provisions.

      Therefore, I had to the Communist Party of China and Chinese government post a lot of complaint letters:

• In the December 3, 2007 issued a “President Hu Jintao to collective letter”(the 77 victim joint);

• In May 5, 2008 issued a “Chinese” secret organization “open letter”.(the 43 victim joint);

• In September 7, 2008 issued a “ An Announcement to the Whole World by Chinese Victims”.(the 65 victim joint);

• In March 6, 2009 issued a “Accountability Mr. Geng Huichang, one of the leaders of the national security sector”. (the 76 victim joint);

• In March 15, 2010 issued a “China’s civilian population, in fact, no protection of human rights! ”

• In August 16, 2010 issued a ” Ten Questions “Politics and Law Committee of the CPC Central Committee , Zhou Yongkang, secretary ;

• In January 1, 2011 issued a “To the CPC Politburo Standing Committee member of the open letter to all”;

• In April 5, 2011 issue “urged China’s security sector, Geng huichang and others pleaded guilty to the letter!”;

• In July 15, 2011 issued a “Geng Huichang, is China’s brain control criminal gang black Protectionumbrella!”;

• In February 24, 2012 issue”Notice to all Chinese compatriots Book”;

• In August 4, 2012 issued a ” Accountability Zhou Yongkang, Politics and Law Committee of the CPC Central Committee! ‘”And so on 

However , I have sent the Many letter of complaint, not only did not get any reply. On the contrary, the arrogance of this gang of secret agent criminals more arrogant , more intensified secret remote control of my physical and mental torture persecution . I am still in the” shouting days days should not ; shouting ground ground should not” suffered torment pain life..

Now, I tell you — the UN Human Rights Commission issued this complaint letter, urging you under the Charter of the United Nations and the “Declaration of human rights” and other relevant human rights documents, To as a member of the United Nations of China National Security Department “secret organization” this group of Spy against human criminals are a Monstrous evil, Must be a serious investigation , and the findings made ​​public . At the same time , Will referred the case to the United Nations Criminal Court, Will  this group of secret Spy criminal prosecution, for crimes against humanity!

The following annex, is my day and night, in more than 40 years of uninterrupted suffered this group of secret Spy criminal on my body remote suffering persecution, daily live record fact evidence excerpts (January 1, 2012 — November 30, 2012) :

Yours lofty salute!

China’s Jiangsu Province , Nanjing “mindcontrol”victims :

ZhongQing Xin 

February 28, 2013

Sender: Nanjing victims ZhongQing Xin(screen name Red Master)

Address: Nanjing Xiaguan District # 94-14 Tung Cheng, a village

Tel:  13776686557

Email: njxzq_88@163.comxdj805187@sina.com;

623962269 @ qq. Com

blog: 

Note by H. Michael Sweeney: the first link appears to be being blocked in Red China. Attempts to reply by email also fail.

http://www.mmmca.com/blog_u16348/index.html?skin=painteddesert

http://user.s6.qzone.qq.com/623962269/main

http://zh.netlog.com/njxzq88

致联合国的公开控诉信

联合国人权委员会:

Emblem of Communist Party of China defined in ...

Emblem of Communist Party of China defined in the Party’s Constitution (2002), Article 51. (Photo credit: Wikipedia)

我叫忻中庆,是中国江苏省南京市一个普通守法平民。我在这里向你们控诉中国安全部门“秘密机构”中的一伙特工罪犯,他们滥用手中的“监控”特权,使有高科技“脑控”技术手段,遥控我的身体和精神,实施长达四十多年之久,昼夜不停的秘密折磨迫害。

在上个世纪1971年的中国“文化大革命”中,我被莫须有地诬陷为“5。16分子”,遭到了残酷的政治迫害。这伙“秘密机构”中的特工罪犯,为了迫使我就范,承认自己是“5。16分子”。同时,为了捂住我进行公开揭露控诉抗争的正义声音,丧心病狂地使用高科技“ 脑控” 技术手段,昼夜24小时不停地遥控我身体,对我实施令人发指的秘密折磨迫害和阴谋暗害。

他们是一伙秘密特务恶魔。对我实施秘密折磨迫害的手段极其残忍、无耻,堪比德国希特勒法西斯集中营的盖世太保和日本731细菌部队魔鬼的罪恶,是有过之而无不及!

他们遥控我的身体,分秒不停的制造我体内各个部位,出现各种剧痛;奇痒;极冷;极热;麻木;眩晕;颤抖;极度难受;大小便失禁,鼻腔内频频咳吐出血糊状鼻涕,以及无耻的“性折磨”等痛苦。在长达四十多年之久的时间中,不管我去住何处何地,这种秘密折磨痛苦从没有停止过,致使我根本无法正常学习、睡眠、工作和生活,日夜在无比煎熬痛苦中,犹如一个活着的死人!

他们的罪恶,不仅完全违反了中国宪法和法律“尊重和保障人权”的规定,也完全违反了联合国宪章和“人权宣言”等有关维护人类基本生活、生存权利的规定。

为此,我曾向中共及中国政府书写并投寄了大量的控诉信。如:在2007年12月3日发出了《致胡锦涛主席的集体控诉信》(77位受害者联名);在2008年5月5日,发出了《致中国“秘密机构”头头的公开信》(43位受害者联名);在2008年9月7日发出了《中国受害者告全世界人民书》(65位受害者联名);在2009年3月6日发出了《问责国家安全部门领导之一耿惠昌!》的控告书(76位受害者联名);在2010年3月15日发出了《中国平民百姓,实际上根本没人权保障!》——中国“脑控”受害者的“公民人权黄(网)皮书”;在2010年8月16日发出了《“十问”中共中央“政法委”书记周永康》;在2011年1月1日发出了《致中共中央政治局全体常委的公开信》;在2011年4月5日发了了《敦促中国安全部门耿惠昌等认罪书》;在2011年7月15日,发出了《耿惠昌,是中国“脑控”犯罪团伙的黑保护伞!》;在2012年2月24日发出了《告全体中国同胞书》;在2012年8月4日发出了《责问周永康!》等。

然而,我发出的这些控诉信不仅没有得到任何回音。相反,这伙秘密特工罪犯的气焰更加嚣张,对我的身体和精神的秘密遥控折磨迫害更加变本加厉。我依然在“呼天天不应,呼地地不灵”的煎熬中痛苦生活。

现在,我向你们——联合国人权委员会发出这封控诉信,强烈要求你们根据联合国宪章和《人权宣言》等有关维护人权的文件规定,对作为联合国成员国的中国国家安全部门内“秘密机构“中的这伙特工罪犯的反人类滔天罪行,进行认真调查,并将调查结果公布于众。同时,将此案移交联合国刑事法院,对这伙秘密特工罪犯,进行反人类罪公诉!

下面的附件,是我在四十多年中,日夜不间断遭受这伙秘密特工罪犯对我身体遥控折磨迫害,每天进行实况纪录的事实罪证部分摘录:(2012年1月1日——2012年11月30日)

顺致崇高敬礼!

中国江苏省南京市受害者:忻中庆

 

 

 

Fiction of Future Fact? 23 Families Jailed, Loose Their Homes in Weekend Raid


Is it mere fiction (from book, Fatal Rebirth), or your future reality? Don’t be so sure you know the answer, because smaller scale events like it have already happened.

What will happen if martial law is declared?

by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
 

Actual MJTF suburban raid. The crime? Selling unpasturized milk through a Farm Coop, an Agenda 21 crime established as result of United Nations and Globalist mandates through Bush/Clinton/Obama admins.

From Fatal Rebirth, by this author; proparanoidpress: a fictional account of crimes of the New World Order from 1947 into the future, with over 1,500 footnotes so you may decide how much of it really is fiction, vs. reality in play. Based on the Unified Conspiracy Theory developed in a ten-year research for the book, it has correctly predicted political assassination efforts to effect control of the US election process, the downing of the WTC by passenger jets and resulting Middle East oil wars, and more. It also led to the author’s direct intervention in and prevention of one, and possibly two terror attacks on Portland, Oregon.

 
A FREE copy of the ebook (Vol. I of four volumes) is available for the asking. For more information, special pricing, go here
Why are Bloods and Crips Gang members being given Police badges?

23 Families Jailed, Loose Their Homes in Weekend Raids

A local news clipping (a sub chapter in Fatal Rebirth, Vol. III)

Police struck another blow against continued political and social unrest this weekend when they arrested 31 adults and took another 58 men, women, and children into protective custody in a series of surprise predawn raids ordered by Homeland Security. The actions were part of a continuing series of such raids across the nation undertaken in increasing numbers under authority of blanket bench warrants issued by the new FEMA Court System, a concept adapted from and empowered by provisions of the Patriot Acts and subsequent legislations.

The Multi Jurisdictional Task Force (MJTF) raids regularly involve elements of the National Guard, State, County, and local Police, and special Community Active in Policing Services (CAPS) deputized citizens as well as the usual Federal advisors, undercover operatives, and observers from DHS, FEMA, FINCEN, FBI, DEA, DIA, BATF, IRS, CIA, and numerous unidentified agencies.

Each Agency representative determines if arrestees were in violation of pertinent Federal laws or if there is any reason to suspect militia or terrorists activity or support. This time, the blanket bench warrants were served on the Corbin neighborhood where some 600 homes were searched Saturday and Sunday after roadblocks cordoned the area. There was little formal resistance from most law-abiding citizens, many of whom were given temporary shelter from the cold in the several motor homes set up for preliminary resident interviews. Coffee and hot chocolate was served by representatives of the Red Cross, who also provided blankets to those insisting on watching their homes being searched from the sidewalks.

However, gunfire punctuated several intense confrontations between agents and a few persons believed to be criminals or underground members of or sympathizers with the Constitutional Army of Repatriotization (CAR). However, these resulted in only minor casualties on both sides, and the Cobra gunship helicopters and heavy-machine-gun-mounted vehicles were not called into play as have been reported the case several times earlier this week in Detroit.

The statistics locally to date since declaration of Martial Law three weeks ago now stands at least 115 dead and 321 hospitalized, 7 of those injuries and two deaths being CAPS members and one DEA officer injured. At least 1,890 persons have been detained for questioning or actually arrested. The majority of deaths and detentions of non Islamics are attributed to armed resistors, presumably militia or criminal elements or supporters, or discoveries of significant contraband. Readers are reminded that possession of antigovernment literature is grounds for detention and questioning about loyalties and activities. The bulk of detainees are, however, apparently of Middle East origin, though no precise numbers are available.

Agencies conducting the raid were looking for weapons not already turned in during the amnesty period earlier this year, as well as illicit drugs, hoarding of food and fuels, proper travel documents and proof of citizenship, extremist and cultist materials, pornography and other contraband. Most of those taken into custody were taken immediately by helicopter to unspecified out-of-state Federal facilities for interrogation and possible ongoing detention.

Under recent revisions in the law in support of Martial Law, any charges resulting from the raids will be submitted to the temporary FEMA/FINCEN Court system operated under the US Army’s Judge Advocate system (military tribunal) for summary convictions instead of wasting time and money with the traditional drawn-out trial processes. If ruled guilty, their homes, vehicles, and personal properties will become the property of the State under forfeiture laws, with some of the goods to be distributed to the CAPS program managers for community enhancement. Most trials are in absentia with the defendants participating only by affidavit.

Elsewhere, Stevie Wilson, former member of the Bloods gang and acting spokesperson for the CAPS program described the raid as “rewarding in many ways,” and thanked the Police for giving them greater latitude in conducting searches… “It’s a lot easier for us to find contraband now that we don’t have all the procedural red tape that forced the Cops to oversee our every action directly.” Police discounted the usual charges made by those arrested that the former gang members had planted evidence and were only interested in confiscating goods they themselves would get to keep… “These charges are easy to make, but hard to prove. They can’t get out of it that easily.” offered an unnamed law enforcement official who, like many of the special agents, needed to protect his identity by wearing a black Ninja-style hood.

In a related matter, Mrs. Ira Johnson, wife of well-known newscaster Dave Johnson, has formed a new organization of housewives whose purpose is to help the progress of the searches proceed as smoothly as possible. The organization, called WELCOME, will urge all housewives to make their homes as easy to search as possible by using as much table space and floor space beneath tables and adjacent to furniture as may be possible to array items from within drawers and boxes, especially breakables, important papers, and valuables, to prevent damage and reduce cleanup afterwards. These steps, as well as placing the empty drawers on edge against the wall will dramatically speed search process. The organization also advises wives to urge their husbands to destroy objectionable and illegal materials in advance of searches for the sake and safety of the whole family, and to avoid embarrassing questions. See related story on page 6, Objectionable Materials List Broadened to Include Many Men’s Magazines. Raids will continue unannounced for several months until all areas have been searched at least once according to a FINCEN press release. At that time a special panel will convene to determine if further searches or other measures may be necessary.

Author’s closing comment: Is the above a future headline story? If you think not, reason out the visible signs. A small-scale version of this event has already taken place and is frighteningly close to that described, here. Such events are proofs which contravene arguments that ‘gun toters’ clinging to the ‘old fashioned’ ideas of the 2nd Amendment are ‘paranoid.’ Those so claiming are either blind to the truth of our times, or are working deceitfully for the very conspiratorial NWO agenda they pretend non existent. Even unfettered paranoia has a root cause in the real World, but they would deny that fact and have you think such fears imagined. 
 
The right to bear arms alone is the guarantee of all other rights, for as surely as absolute power corrupts absolutely, power without opposition grows oppressive. As intended by our wise forefathers, the 2nd Amendment serves as a check that our Government does not become too powerful and intrusive into our lives. Only when citizens are armed with weapons of like ability as the military and Police, does government fully understand that theirs is not the ultimate authority — that the people are their true commanders. Yet our politicians seek so-called gun control in the name of reducing crime and violence. Is that their true motivation? Do they achieve that which they claim as an end?
 
At the best, they merely address the emotion behind a desire for less violence — a desire fostered by a media-fueled notion that violence is on the increase while, in fact, a steady stream of statistics from FBI demonstrates it is on the decline. They seek in illusion to prohibit assault weapons which in fact account for a minuscule fraction of a percentile of all gun violence, while in reality depriving the citizen of the very arms required to make viable the 2nd Amendment. They seek in illusion to force criminal background checks at places where in fact, citizens buy guns, but criminals do not, while in reality providing a lists of citizens who own guns — the ultimate tool in seizing of power. These are not logical or viable actions, but rather, cover stories for covert actions against gun owners. Something beyond concern over violence is at work here. 
 
And a note on CAPS. As crazy as it sounds, such programs have already been experimented with in Houston and Los Angeles. Actual Crips and Bloods get Policd training, and a badge, and in some cases, were authorized to carry a gun and participate in Police activities, or become part of the Reserves. You used to be able to find information on the Web about it, but not for some time, now. It is documented in Fatal Rebirth.
 
And a final note on Internet censorship. If you do not believe Google, Bing, and the big corporate Web players are part of a conspiracy favorable to tyranny’s Agenda, try this: use your favorite search engine to TRY to find pictures of ANY MJTF raid. MJTF is a very well known acronym for Multi-Jurisdictional Task Force, and MJTF raids of all manner happen all the time 

1776 2.0 Cometh: What Price Treason, and Who Pays?


Gun Control Laws and other Constitutional/Bill of Rights erosions by government are TREASON. Ultimately, YOU decide who is going to pay, and how.

1776 2.0 Cometh
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Compare 1776 to 2012 and tell me where you live

What is the price of treason, and who pays?

Historically, the price of Treason can be unbearably high. If caught and convicted, the price can be as high as death, typically by hanging or by firing squad. In time of war, especially, and if that war be a revolution to throw off a tyranny born of such treason, the death penalty is more oft employed. Therefore, only a fool undertakes treason lightly; those who accept such risk must have great personal gains as their motive, else why the gamble?

But the cost is also high if such tyranny is not overthrown. If one is subservient to it without protest, or resistance is beaten down by it, the cost is loss of all Freedom, and often, again… the loss of life itself. For when government gives unto itself absolute power, it is corrupted absolutely, and free to deem any person at will as unworthy of life simply because they are seen as an inconvenience to whatever drives their tyrannical agenda. Yes. An example is called for:

Today, the person acting as President, through the NDAA Act, has, in conspiracy with those who voted for the Bill, usurped the power to take life and liberty with just a word; the tyrannical power of a 12th century King. When any one man establishes by manipulative means the power of life and death over fellow men in deference to all existing law, it is a crime. Treason.

Alex Jones was right, gun control means 1776 all over again

A line in the sand: when is 1776, 2.0?

http://www.earlyamerica.com/SOON, thanks to the push for gun control, when each of us must decide if we are subservient and wiling to be the ones to pay the price by  giving up our rights as well as the means to insure them… or if we will instead assert our rights and throw off the yoke of fascist rule of the New World Order by defending our guns in resolute defiance BY RULE OF LAW; the Constitution’s Second Amendment. That’s what it is there, for — it is not there for Duck hunting rights. It is that we might always have available Minutemen, and all who are able ought serve.

Heed my words, for I have been warning of this moment in time for more than ten years, starting with my bookset, Fatal Rebirth.

Note: Fatal Rebirth predicted Sept. 11 events in sponsorship of Middle East wars for oil. It predicted assassination plots against Ross Perot to kill the third party movement (indeed, mailed anthrax attack on his family would cause him to withdraw from the election the very night he would have won a place on the ballot and legitimized a third Populist political party). It predicted many things, including a series of mass shootings to enable gun control legislation.
 
It also predicted the next wave of terror attacks, including likely locations and methods, as false flag ruse to declare Martial Law, suspend the Constitution, and go door-to-door to collect ‘contraband’ and discover ‘terrorists’ (after our guns, mostly). But it also predicted how to resist and overcome such tactics, with specific advice to the Militia and others wishing to resist. You can get a free copy of volume I ebook by email to pppress at century link net.

I’ve written many posts about the coming moment, too, best described as that critical moment when each of us must decide if a line in the sand has been crossed which cannot be tolerated. Some of these posts are listed below, others are linked within this text. In one, I put it this way: government plays Russian Roulette and puts a gun to their head every time they undertake an oppressive or unconstitutional act, and pulls the trigger at its signing into law.

Eventually, they will go too far, and it will be yet another shot heard around the World; 1776, once more. It is, after all, how revolutions are started. An attempt to seize and restrict gun ownership is that line in the sand which must not be crossed, even at risk of escalation to armed rebellion. It guarantees not just one shot, but many, many, many more immediately thereafter. Only a fool would fail to realize that if any such revolution comes, those who are deemed as traitors will find it was as if there was a de facto bounty upon their head.

And from the very beginning, at the time the Constitution was penned, and the Amendments thereof brought into being, Thomas Jefferson and his patriot fellows warned this would be so: “The beauty of the second amendment is that it will not be needed until they try to take it.”

That Jeffersonian comment underscores the reason for its existence, which has NOTHING to do with the right to hunt or protect us from criminals, but everything to do with being able to protect us from government run amok. Our government runs AMOK, NOW, and has for some time. Shame on YOU for allowing it to go this far! Shame on me and you if we do not at last toe that line in the sand, standing firmly, side by side.

Are mass shootings simply false flag operations to take guns?

Let us be clear: what defines treason?

Treason defined on the fly by Mobs: Fascist Government Leaders (including Police officials) hung by the mobs when Mussolini was overthrown

Those in power define the answer, the wording of law not withstanding. I am likely now, or soon to be, like all dissenters, activists, and Constitutionalists, gun owners, and the like, as a single class targeted by a fascist coupe marching toward their New World Order, to be declared guilty of treason for daring to write these words. That’s the way Fascism works, and why no one is safe when it rules. But should 1776 revisit, and the People and Constitution win, WE will be the ones who define Treason. Here is my view of what that definition should be:

a) It is treason to swear an oath to uphold the Constitution while at the same time being a member of a New World Order institution which has their own oath to give up sovereignty in favor of a unified World government (which, ultimately, enables seating of the Antichrist). Therefore, a long list of governmentals are de facto traitors by virtue of lying when they gave their oath of office — while being members of the Tri-Lateral Commission, the Bilderbergers, the Council on Foreign Relations, Skull and Bones, or being a Rhodes Scholar, or similar.

These groups all require agreement to such contrary oaths or with stated globalist agenda, all of which is nothing less than rewording which conforms with the Illuminati formula for World domination, for which it was they who coined the term, New World Order. It is, today, very hard to find a Congressmen or other governmental who is not such a traitor, and the remainder look upon such groups as if wiser than their own ability to think for themselves, even to the point of accepting and acting upon their Globalist ‘reports’ as if Congressional findings. Treason.

b) It is treason to knowingly propose and vote for, and sign a Bill into law which is unconstitutional, or any Bill you have NOT READ and debated properly. Any act to subvert the Constitution, be it willful or by negligence, justifies the charge of treason, and let the defendant prove otherwise. Given that all such persons are educated in the law as a rule, one may safely presume there are no fools unaware of the significance, and the due seriousness with which their duties under their oaths of Office require of them to be diligent.

They undertook such acts at their own peril, and in full awareness of the responsibility to take care. So be it, when it comes time to answer for it. The list of such Bills is long, and many shall be held accountable. In fact, I can only think of two or three Congressionals who may be completely innocent, but there may, hopefully, be others. If not, perhaps the time for revolution is now.

c) To the point, here and now, today: ALL governmentals who support gun control laws which take away the right of the citizen to own military grade weapons are guilty of Treason. The Dick Act of 1902 made clear that the UNREGULATED MILITIA (that’s ANY citizen with a gun who stands to serve) shall NOT be denied the right to have military grade weapons. And yet, Congress has subverted this law time and again, by clever rewording of definitions, and the trickery of ‘dual oaths’ of service.

Therefore, all prior gun control laws which so inhibit access, or which create registration lists, are de facto null and void, and treasonous. Any attempt to collect weapons against the wishes of owners constitutes theft of private property on the one hand, and an attempted coupe on the other (treason), as does any attempt to prohibit or limit access, or to ‘register,’ anything with a Federal agency.

Personally, I want my own SAM and Apache gunship, thank you. I want all gun control laws repealed. The only law which I would approve is that to purchase a weapon, you would need be an adult of sound mind, and with no criminal record, to be determined by a blanket background check where the purpose of application was unstated, but authorized by the person being checked, as all background checks should be.
 
I only registration process should be to register guns, not owners: a registration process managed by the States which collects sample slugs from fired guns from sellers (the Registrars) for forensic comparisons in criminal matters. The State would not know who owned the gun, but if used in a crime, could obtain a warrant to get that information from the seller of the weapon. I further want colleges to offer firearms safety training courses as an alternative to ROTC, and as part of ROTC.
 
I want every State to have at least one citizen militia not subject to State control, and I want the State to provide them with access to military training facilities and expertise. I want every citizen who is qualified to own to be able to open carry or conceal carry. In short, I want to reduce the likelihood of criminal use of guns by means of practical and immediate (real and clearly visible) deterrence.
 
There are clearly other topics to be decided by law, such as matters of keeping guns away from unsupervised access by children, but I’m not taking up more space, here and now to totally define my views. If you want full details of how such a law could work, please request it directly and it will be made available by email.

d) All governmentals who supported NDAA are guilty of treason as well, for that law not only strips away whole sections of the Constitution, it even defeats the Magna Carta and gives the President the power of a 12th Century King to put citizens to death by mere say so (or torture or imprison them indefinitely without trial or evidence). Is that why DHS ordered 9,000,000 sniper rounds not for military use? That’s about how many dissidents there are in this country with a loud voice, such as myself, if I may be so bold.

e) All governmentals who support the DOD sending National Guard troops to war overseas without an Act of War and Congressional declaration of War are guilty of Treason. The Dick Act, again clearly denies the President or anyone else the power to order National Guard to active duty in any other fashion. They are NOT part of the regular Army subject to DOD. We have been fools to not be aware and hold both our STATE and Federal representatives accountable under the law their wiser forefathers set for them to follow.

f) All governmentals who support the endless spying and abuse of privacy of citizens at large in the name of fighting terrorism are guilty of treason, as are those involved in seeking the development and deployment of Political Control Technology (PCT) in like guise. Not only do they, and the 30,000 drones they want to put into our skies erode Constitutional rights and safeguards long cherished under the law, they make such protections meaningless. The very nature of PCT reveals their lust for totalitarian control.

Worse, they these things are a sham: they are not there because government fears a few thousand terrorists, but because government fears 360 million citizens, which is its RIGHTFUL state; the government is there to serve us at our pleasure, and be vanquished at our displeasure, not there to rule us at theirs, and subject to suffering their displeasure. Treason.

g) Any governmental who writes a law is also subject to the law, and thus any who violate the law and evade punishment by virtue of their power of office are guilty of treason. A government which violates its own law, as ours is so often guilty of doing, has no right to demand we obey their laws, doubly so when oppressive and unconstitutional. And doubly again when the person signing them into law cannot even prove citizenship to the simplest of standards. Such people make of The Law, something less, ‘the law,’ a mockery of no value whatsoever. I refuse to obey the law, but accept and follow only the Law of the Land (The Constitution)!

And let us not forget their oft cited caveat: we have recourse through the courts if we think a law unconstitutional. What recourse is that, really? When it can take a decade to work a suit through to the Supreme Court and cost millions of dollars, there is no recourse of practical meaning. When they can write new unconstitutional laws of like purpose ten times faster than we can negate an old one, there is is no recourse which excuses their writing them, and act of pure lust for power. Treason.

h) Media should never be allowed to be under control of the military-industrial-intelligence complex. It is so much under control, today, that I term it the Military-Industrial-Intelligence-Media (MIIM) Complex. When CIA puts thousands of operatives into media… when the top three TV networks are owned by military contractors (during the Flight 800 time frame, they were)… when a newspaper publishes the names of all gun owners and deliberately places their family, homes and the guns in danger… when ‘unafraid’ and ‘fair and balanced’ means ‘the truth is whatever government and globalists say happened, facts be damned,’ then those involved are guilty of Treason.

This list could be (should be) longer, but this is a blog and people don’t like them to be too long. So if they come for the guns and shooting breaks out, heaven help virtually any governmental captured, should the Constitutionalists and Patriots win out over ‘the law.’  So. Congress, and Mr. Obama, usurper King… spin the cylinder, put the gun to your head, and pull the trigger by signing that Bill. Let’s  see who pays, and what the price shall be.

You know where I live, and many more like me. You have lists of gun owners through previously written gun laws which should never have been allowed. But every citizen knows where all of you are, too. You don’t have enough Men in Black to get the 9 million activists before the rest of us come after you in numbers you can’t stop. You certainly don’t have enough to go after all 300,000,000 guns we possess… or is that why DHS also ordered 4.2 billion rounds or regular bullets?

What will you do when they come to your door to search for guns?

Who controls gun rights?

It is not lawmakers in Washington, D.C., who write illegal (unconstitutional laws) on purpose. They control only their own fascist rhetoric. The framers of the Constitution, and that document, are the ONLY authority we need obey. Even if you do not own a gun, the weapon Washington fears is in your hands; they fear a united WE, the PEOPLE.

Ergo; to lawmakers and other power usurpers and their minions of enforcers who disobey their oaths of office: I dare you  to try to take that weapon from our hands. Bring on 1776 2.0, if you must. Clint said it best. “Do you feel lucky, Punk?

Well, do you, Punk?

Note: the current proposed (Fascist Feinstein) gun law (clear analysis, here), will essentially force gun owners to give up the bulk of all pistols, rifles, and shotguns in a manner not unlike already undertaken in Australia. Those efforts resulted in a huge spike in gun violence as criminals were given a blank check knowing no citizen was protected by the likes of Mr. Smith and Wesson. We lost what? Well under 100 lives this last year to gun violence of the type the legislation claims to be defeating? Australia lost 93,000 lives to gun violence after confiscation, and their population is a mere fraction of our own. Yeah. Gun control works. It works for fascists and criminals (same thing, different levels of prowess and evil goals).
Do not obey illegal laws. Challenge authority. Stand on your rights.

 

Collateral Damage: A Web Experiment in Which You Judge and Impact Social Policy


Should a line be drawn? When the claimed benefit is thought to outweigh concern for deaths of innocents, what is the difference between a nuclear strike against a city and using a drone or a car bomb to kill everyone in a car where only one person was the target?

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice. 

When is collateral damage acceptable?

Is collateral damage ever acceptable?

Revealing article on Drone Attacks (more than we hear about) from Der Spiegel (CLICK).

Revealing article on Drone Attacks (more than we hear about) from Der Spiegel (CLICK).

With Obama ordering 30,000 Drones into American skies, and the military regularly conducting raids against American cities, and Police shooting at anyone on two feet to get one Cop Killer in California… we should perhaps come to a clear and concise understanding of what constitutes acceptable collateral damage, if anything at all. Perhaps “Thou shalt not kill,” is all we need to know. But…

If you could save 100 lives by killing one innocent person, would you elect their execution? If the only way you could prevent a Sept. 11 style attack threatening thousands was by shooting down a hijacked jetliner, would you so elect? Would you order someone sniped because of a significant chance they were about to kill the President, with no way to prevent it otherwise, but also no way to know for certain if they were the right person because all you had was circumstantial evidence? Where do you, personally, draw the line?

We hear those two words more and more in our news, even when there is no actual war going on. Drone diplomacy and policing has turned the taking of life into a video game, where decisions about who lives and dies is frequently being decided by a stranger in a darkened room half-way around the World. Murder is still murder, is it not? Or is it? What madness is this, that anyone ever has the authority for reasons of political expediency to decide life-or-death fate of innocent persons? Or is it silliness to even dare ask?

If a murderer deliberately sets out to kill you, or any person sets into motion events which accidentally kill you, that’s God’s domain to decide. His Will be done. But if your government or another wants to kill you simply to insure that someone else dies, or to insure some important political outcome for which you are not involved with or perhaps even aware of, who decides if the reason is good enough? I doubt they ask God before they sign off on the act. But what if YOU were the one to decide?

The answer is not simple, of course. For instance, for each unintended casualty, the blowback can be quite damaging and unexpected. Each becomes a martyred victim of US Imperialism (or something similar, depending on the target, of course) and literally strengthens the enemy. Governments and media in all nations involved, including our own, tend to roast (the President, or whomever) over a slow fire; it weakens relations with allies and foes alike internationally, and erodes political integrity at home. Collateral Damage can end up being to a tactical mission and the politics and politicians behind the mission the same as a total crash and burn, the burn often worse than the evil being attacked in the first place.

Is it OK to kill an innocent person if it will save the lives of many other people?

Where would you draw the line?

The answer may indeed be yours to decide — by means of the simple poll herein, which you are invited to use, which may very well give us a public concensus which can be used to help shape public policy by agencies, and the military, and those who empower them and wield them as political tools. Results of the poll may spark more officious study or even be cited directly in activist and legislative quarters. But only if you participate will it have such value. Answers are anonymous, and not traceable to individuals.

Lets look at a few examples in history which will give you practice for the Poll.

Deliberately sinking a passenger liner: During WWI the passenger steamship RMS Lusitania was headed for England from New York with nearly 2,000 souls on board.  Two people decided its fate, but ultimately, one was responsible, correctly predicting the other’s response to their provocation.

A torpedo was fired by a U-Boat, sinking the luxury liner, a horrific event which turned the tide of public and Congressional opinion in the United States and brought America into the war; nearly 10% of the 1,198 persons who died were Americans, many of them prominent. Who was really to blame?

It was not the U-Boat Captain, because the German High Command had already given the order that the Lusitania, if sighted, was to be considered a combatant because intelligence had revealed it was carrying munitions for England acquired from America, a violation of international law. This decision weighed 2,000 against the loss of life such munitions would inflict upon the German Army to the detriment of their war effort. But their decision it is not the one you are asked to judge.

Some other, unknown person, an American, also made a decision. Not just to illegally put munitions on a passenger ship without informing the steamship company, who would have objected and refused. No, that was by far a more innocent decision. The real decision that we are asking you to judge is this: that person also decided to deliberately allow the Germans to learn of the munition shipment specifically in hopes that they would dare sink the Liner, because that person, and their counsel, wanted the United States to go to war for political expedience.

Would you deem the Lusitania’s passengers as acceptible collateral damage for such a ‘noble political aim’ as rescuing Europe from domination by Germany, the argument they relied upon in their decision? Would it help to know that among those counseling for the move were shareholders and Board Members in the Powder Industry, makers of weapons and munitions?

This later aspect, the Powder Industry, highlights the importance of questioning such decisions. Often the decision makers have ulterior motives which are not part of the official consideration, or justification. The Military-Industrial-Intelligence-Media Complex, and the New World Order crowd (often one and the same people), are more often than not the decision makers. So choose wisely, your answers.

Dropping the Atomic Bomb: In WWII we decided to use the Atom bomb to try to force Japan to surrender. While the US Government was unwilling to cite the true facts and figures used in their decision, the argument to bomb was simple: using the bomb could speed the end of the war and save more lives on both sides than would be lost by dropping the bomb. Just like the Germans and the Lusitania.

President Truman rightly saw no difference in terms of moral choice between Atomics and fire bombing, already authorized in the bombing of Dresden, a like horrific act of war against civilian populations. Of course, we were also regularly firebombing Japan, a nation where homes were literally made of paper, burning to death up to 100,000 civilians in a single city. Indeed, we might should be arguing the bombing of any city by any kind of bomb should undergo the same scrutiny. But we need to focus on a singular incident.

In excusing the use of Atomic weapons, the military claimed they had at the time estimated it would save 500,000 to 1,000,000 lives of US military, and 1.7 to 4 million Japanese by avoiding invasion. We now know that the actual estimates were far less than the propoganda those larger numbers represent, numbers which continue to be used even today.

In like manner, the number of deaths predicted for the Japanese were minimized beyond reality. It was argued that by dropping warning leaflets ahead of the attack, citizens could be evacuated and limit their losses to mere tens of thousands, refusing the advice that such leaflets would be ignored as a scare tactic, which was indeed the case. Very few people fled the cities as result; most who could flee had already done so when non atomic bombing started taking its toll.

In all, more than a quarter million Japanese perished because of the two bombs dropped (it originally being argued a single bomb would do the job). The actual number of American lives estimated to have been saved from invasion was 60-190,000, and perhaps twice that number of Japanese. So let us presume the estimated loss by bombing was only 50,000 Japanese, and that it would save up to 200,000 combatants on each side by conventional invasion (50K vs. 400K). What would your decision be?

When the actual loss of life was later known, how would you feel? I think I would feel like confessing and suicide. Indeed, our first Secretary of Defense, James Forestall, who was one of the decision makers, may have taken that path, or he may have been assassinated for threatening to do so. He, or someone, put a cord around his neck before his body left the second story room via a window… in a government detention facility with barred windows, where he was being kept against his will after walking off the job without explanation.

Lets reduce the scale a bit — are Janitors acceptable collateral damage? Based on a real-World decision to bomb Lybia in retaliation for terrorist attacks backed by the Lybian government… dialog in the screenplay The American President (title role played by Michael Douglas) detailed what is thought to have been part of the actual decision making process by Presidents Reagan and, later, GW Bush… though in fact, the terrorism itself was seen by many as reprisal for attempts to kill Muammar Gaddafi already undertaken by America. I doubt the dialog took place in real life, but let’s use it, anyway…

The President (Shepard) is having a late-night emergency dialog with military and staff about the decision to order a B-1 Bomber attack in a ‘retaliation’ scenario. He is under intense political pressure by the other Party in a hotly contested bid for reelection against a man named Rumson (a ‘Defense Hawk’ rather a lot like Donald Rumsfeld), Shepard’s lack of military experience and seeming timidity in the face of affronts by other nations and terrorism being used against him. Keep in mind, that a large building would not have a single janitor, but a team of many, as well as the likelihood of citizens at large being on the streets nearby:

A.J.

Robin, as soon as our planes have cleared Libyan airspace, you can call the press…

LEWIS

General Rork says around O-Eight Hundred.

ROBIN

Sir, what do you think about a national address?

SHEPHERD

The last thing I want to do is put the Lybians center stage.

KODAK

I think it’s a great idea, sir. You know Rumson’s gonna be talking about your lack of military service.

SHEPHERD

This isn’t about Rumson. What I did tonight was not about political gain.

KODAK

But it can be, sir. What you did tonight was very presidential.

SHEPHERD

Leon, somewhere in Libya right now there’s a janitor working the night shift at the Libyan Intelligence Headquarters. He’s going about his job ’cause he has no idea that in about an hour he’s gonna die in a massive explosion. He’s just going about his job ’cause he has no idea that an hour ago I gave an order to have him killed. You just saw me do the least presidential thing I do.

So what would your verdict be? Would the international strategic political value of such an attack justify the collateral damage of a few janitors? On the assumption you genuinely feared the opposition would take America into an unwise war for the benefit of the military-industrial complex if they won the election, would the political gains at the voting booth change your answer?

Final example: Drone attack. It happens more than we hear about in media. I highly urge you to watch the Matt Damon/George Clooney film, Syriana (sorry for the multiple film references, but such things are part of media’s overall impact on our belief structures, and often the best ways of illustrating visually a gritty reality otherwise limited to mere words). Syriana is an insightful look at the intrigues of Middle East politics and oil-industry machinations rarely gained from the headlines. It also shows you exactly how a Drone attack is carried out in terms of command and control. But you need not see the film, or read the non fiction book it was based upon, See No Evil, by Robert Baer.

The question is, a CIA informant has provided fast-breaking intelligence that a known terrorist has, by unusual circumstances, been spotted hitchhiking and picked up by a car now driving along a deserted roadway in the desert. Presume there is a terror plot in works that will take perhaps hundreds of lives if you do not find a way to stop him. But it is also known that the other occupants, the driver, a woman and a child, do not know who their passenger is. Do you order a Drone to strike, or do you pass for a better opportunity, which are few and far between?

These are hard questions our leaders face all-too often. They do what they think is right for you, perhaps at times for political gain or for corporate profits, but always doing so in your name regardless of reason. So let’s take the poll, and see what you think should or should not be done in your name.

Poll on collateral damage

The Polls

Poll assumptions: Assume you are Commander in Chief or some other person for whom the decision is yours and yours alone. You’ve already asked advice, but it was 50-50 in weight results, and of no help, or there is no one to ask. The answers are incremental in nature, and as it is multiple choice, you only get one answer — each prior answer is considered inclusive in subsequent answers.

You should take the poll before finishing this article, because the remainder of the article might change your answers in the first section. Part of the experiment is to gauge just that: did additional considerations change your answer, as covered later.

But remember: how you answer about the value of the lives of others may impact how government thinks about the value of your life, or a loved one. A casual answer could be costly, considering the 30,000 Drones, military raids on American Cities, and trigger happy Cops in many American cities.

A poll on acceptable collateraldamage

Now that you’ve taken the first section. Lets ask the question in two more case studies. Bear in mind this time, however, how you’ve already answered on the Poll. That means you will need to weigh your answer to the following questions based on decisions you’ve already made. Its about body count, and justification. The context will be different, but it should not change your answers if your logic remains true to form.

The first regarding the Death Penalty for capital crime. We know for a fact that some percentage of persons sent to Death Row turn out to be innocent, in the end. Shockingly, there are at least 39 instances where there was overwhelming evidence of innocence but the stay of execution was refused out of fear it would cause turmoil or harm to the general function of the courts and penal system. For example, a single incident might force the verdict in hundreds of cases to be thrown out and require new trials. Is that acceptable collateral damage, or should the death penalty simply be abolished and the system be forced to clean up its own mistakes?

Take that same reasoning, now, and apply it to NDAA, the National Defense Authorization Act, which gives the President and Military the power and authority to assassinate any American merely suspected of being involved in terrorism (or simply kidnap and vanish and/or torture them). No due process. No trial. Is there any difference in the likelihood of collateral damage being present in such an act as there is in the Death Penalty scenario? That, too, is being done in your name.

Is it acceptable collateral damage to execute a death row prisoner who is really innocent?

 

The second is more complex. It will require you to suspend your current belief structure and to take on the mindset of someone quite different than you (hopefully). If you were of a political mindset that truly believed that the only good future course for the World was a one-World government… and understood that the only way such a government could exist was if, among other things, the United States, Mexico, and Canada formed the North American Union… and that the only way to establish that was to stage a military coup and suspend the Constitution that it could be replaced with a new Constitution which enables the NAU. Consider further that you believe (correctly), that the 2nd Amendment makes the outcome of such a coup highly unpredictable.

Note: the Constitution of the NewStates of America has already been written, as reproduced with analysis as such a document in my bookset, Fatal Rebirth. Please see special offer on free copy of Volume I by email.

If you believed the above to be true, and you believed that if there a one-World government was not established, dire consequences such as World-wide famine and wars over shortages of oil and food would result costing billions of lives (the kinds of arguments sometimes used to recruit for Globalists agenda)… and given HOW YOU RESPONDED TO THE POLL, could you justify in your mind a given number of innocent lives to help insure repeal of the 2nd Amendment?

Would you be willing, for instance, to authorize staging mass shootings to heat up the gun control debate, knowing that eventually, it would force a confrontation with gun owners and result in Martial Law, etc.? Would it be better to kill a few hundred people to save billions, or not? Would it matter if whole bunches of them were school kids, or wouldn’t it make it better for the purpose? Regardless of your own personal answer, look at the Poll results to see how others voted.

If just ONE person voted in the first section in a manner which implies they might also decide in favor of collateral damage in this matter, then does that change how you view of conspiracy theories regarding Comumbine, Aurora, Sandy Hook, and the many other mass shootings where such charges have been levied by critics? Does it change your previous opinion as to the likelihood or possibility that such a conspiracy might exist?

Is a false flag event ever excused as acceptable collateral damage?

How can collateral damage be anything but murder?

Summary commentary

Just asking? Just saying? No. It’s more important than curiosity, or what I believe is true. As a nation, we make public policy and law, in part, by virtue of battles between varied agenda and beliefs present in our collective body of decision makers, and prior policy and law.

Leaders make collateral damage decisions based on the limitations of law and public policy, and their willingness to violate either. But also, any willingness to violate the law or policy is, in part, determined by public outcry and expression of citizen beliefs. God save us were the no such thing as an activist, conspiracy theorist, honest and diligent reporters, or letters to the Editor and to Congressmen.

Unfortunately, where a conspiracy exists by those with an agenda, it is easy to manipulate emotions to impact that public expression. The purpose in asking these questions, was to help you reevaluate the mechanisms and basis for your viewpoints, and to stir you to express any changes in opinion or beliefs which result, or to at least be more open to considering the arguments of others that such change is warranted.

If you do not understand the reality of decisions made in your name, your opinion about them is incorrect, and the decisions are not being made correctly to your true wishes. You are de facto victim even if you are completely unaware, and by your ignorance, others suffer more seriously, including paying the ultimate price.

Those who have full understanding also know that conspiracy theories only exist when reported facts do not make sense. Conspiracies are hard to prove without proper investigation, which is all ‘conspiracy theorists’ seek to sponsor when they propose their alternative explanations or explore the evidence publicly. If enough people say “Yeah… what about that, Mr. Congressman? I want an honest investigation with no white wash,” truth stands a chance. Conspiracies cannot otherwise prove themselves except by two means, one rare, and the other all-too common, but completely ignored.

They rarely are proven by confession or smoking gun evidence, because theorists do not have the authority or means to acquire them, as a rule. But whenever there is any evidence of a cover up, or disinformation tactics used against the theories, that alone proves there is a conspiracy afoot. So when media and government responds to theories by name calling or lies instead of explaining away the charges with useful facts… you know there is fire beneath the smoke.

Please question government, always, lest you be fooled again. All governments lie, and all-too often, for reasons just as questionable as collateral damage, which is almost always part and parcel of any conspiracy. They do so in your name, and only you can prevent that deception, that collateral damage. Your mind is yours to control, not theirs to manipulate with lies, just as your life is yours to live, and not theirs to dispose of as collateral damage for political gain.

Neither is there any difference between your life or that of a loved one, and the life of some nameless person in another nation on the other side of the planet. If they deem any individual acceptable collateral damage, then every individual can be so deemed just as easily, regardless of nationality or political beliefs. If you have rights, all have rights, or non have rights. There is no insurance for you, alone, but that which you make true for all by voicing your mind.

There is no difference, so use your mind, think for yourself, and voice your opinions loudly, lest you loose your life, or someone else does in your stead… and in your name.

 

12 Frightening New Questions Illuminate the Dorner Urban Legend


Just when you think you’ve heard everything about a major news event which suffers questions pointing to a conspiracy, someone figures out or finds something others have missed, or failed to see in the same light. I like being that person.
 
By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice. 
 
12 new questions/veiwpoints addressed in this blog:
•  About the validity of physical evidence deliberately left at a murder scene;
•  About the validity of the ‘mental torture’ call to Randal Quan;
•  About the death of innocent bystanders;
•  About using a hotel on a Navy base;
•  About the million dollar reward?
•  About footprints in the snow, and the death of the one man with the answer;
•  About the ‘chance find’ by a citizen and a news crew of a James Bond-style assassin’s weapon;
•  Several questions about the Death of Chris Dorner.

Why Chris Dorner was murdered and framed

Questions?

mythbustThe Web is awash with questions and commentaries doubtful of the Dorner shooting, my own included. In my earlier posts, I’ve already addressed some of the same questions, and yet, have also come up with some new ones, or new insights upon existing questions. They are presented here in hopes they will help further illuminate the matter toward a better grasp of the truth — which sounds more and more like Dorner being set up as a distraction or cover up for something larger, something with Federal fingerprints.

The first postDorners ‘Manifesto’: Manufacturing a D.B. Cooper-ish Urban Legend?, analyzed Dorner’s alleged ‘Manifesto’ and showed a long list of reasons it appears fraudulent, whole sections of it written by someone else, thereby validating concerns that Dorner was a patsy and a conspiracy was in play. 

The second postDorner, the Urban Legend: Implications Behind a Fraudulent Manifesto, took a much closer look at the crime than most online treatments have employed. It provides deep-background information which suggests Dorner might have been a mere playing card in a high-stakes military or CIA project, possibly pre staging for a Martial Law sponsored coup. Ergo, the Ace of Spades graphic.

If you have not read these earlier posts, and are not comfortable with accepting the above descriptives of their content as viable concepts or factually accurate, please read them before reading this piece, or it will waste your time, as your basis of understanding will be in the absence of key information. Also be sure to review the excellent and revealing ‘related articles’ at the bottom of this page — especially the video interview relating Chris Dorner’s contacting alternative media and essentially confirming many of the points I’ve been making in my posts.

Was Chris Dorner a pawn in a Federal Plot?

Questions which point the way to understanding, even without answers

DornerMyth1) Dorner’s gear found at the first murder scene: Why would Dorner choose to leave Police equipment traceable to him at the scene, when said equipment would be valuable to ongoing operations if intending a killing spree? Curiously, there is video evidence that he did this. Someone who looked like Dorner, at least at distance in the poor quality view, in a vehicle which was apparently his (no definitive statement on that in reports, for some reason), is caught on a security camera dumping the items, including his badge and police uniform. Why would Dorner do this in front of a visible security camera in broad daylight? The murder took place at night time (see the news video report, toward end). There would have been cops already swarming the area, making it a high-risk adventure.

Why would Dorner even leave the gear at all? It would be valuable in any further covert applications if he was intent on continuing the alleged killing spree. It can’t be to deliberately ‘prove’ to Police it was him responsible: the call to Quan, a mere fingerprint, or a call to Police would have served as well and would be far safer. But it does make sense if someone was trying to frame him, sending someone who looks like him enough to pass for him, especially if borrowing his car to do it.

2) The alleged call to Quan by Dorner: If Randall Quan represented Dorner at the review hearings which resulted in Dorner’s dismissal, why is it only described in media references as a call from someone ‘claiming to be Dorner?’ Other qualifiers like ‘may have,’ ‘allegedly,’ etc., were almost always used. Would he not know Dorner’s voice?

Bear in mind that where a caller deliberately makes rude and insulting, emotional jabs at one’s psyche, the resulting change in mental state (anger, mostly) will deter one’s perceptions and judgement of such things. To me, it sounds like Quan was enough of a professional that he at least recognized the possibility of the voice not being Dorner’s, and must surely have couched his statements accordingly, else why did LAPD statements and media originally do so?

3) The death of innocent bystanders: If killing Monica was because she was family, as claimed by the manifesto, why kill her companion? Dorner should not have known he had proposed to Monica only days earlier, and Dorner has been repeatedly cited as taking care not to harm innocent persons. Likewise for the trainee with Crain. Why harm those men? Might it be because both men could have seen who the real killer was, a risk addressed by a killer who could not afford anyone saying it was not Dorner?

Kieth Lawrence, killed with Monica, can be seen wearing what appears to be a Police uniform in some online photos, but he was not a Cop. He (article) had been a security guard at a Universtity, and had undergone trainings with Ventura County Sheriffs and Oxnard Police, but should have been seen by Dorner as purely a — he was NOT wearing his guard uniform at the time of the shooting, and thus was unarmed. Many accounts say there is evidence (?) Dorner stalked them both for some time, so surely he would have known Lawrence was not with any LEA, certainly not LAPD.

It is also interesting that both were shot multiple times. In fact, so many that reloads would have been required, or for gun grabber’s edification, a high-capacity magazine was used — or — unless there were two shooters.

5) A hotel stay on a military base: Why did Dorner go the Naval Base at Point Loma (San Diego — see timeline)? It was confirmed that he had been in a hotel ON BASE and the base went into lock down when someone reported seeing him. Could it have been an attempt to meet someone who might provide him with evidence he was being framed, or something useful as a blackmail insurance policy to force (someone high up) to call off the dogs?

6) The million dollar reward: Why (and how) was a $1M reward arranged for so quickly, and who really managed that hat trick, when normally, $20K is the most anyone ever sees pinned to their name, and only after much time has transpired since the manhunt began? Only bin Laden and associates have, to my knowledge, enjoyed that level of value on a wanted poster, and so quickly. This article seems to have a convenient but implausible answer (just above second video); a collective of leaders from the area including businessmen ‘came together.’ Really? When does that ever happen, elsewhere?

7) Footprints in the snow, and the death of the only man who knew to track them: How convenient is it that the final standoff comes to pass because two officers ‘track him’ to the cabin… and one of them is fatally shot to death — a super-cop sent on Dorner’s chase like a bounty hunter? The other was wounded. Jerimiah MacKay, killed at the cabin, was a 15 year veteran of the San Bernadino’s Sheriff Dept. His specialty was going after stolen cars. He was on Dorner’s case from the outset, but fared not better than any other Cop. But in less than four hours after a truck was reported stolen by someone matching Dorner’s description, he and his partner were tracking footprints in the snow to the Cabin. Excuse me, but how did they know to track these particular footprints?

They had NOT found the stolen truck, so how and why did the presume these to be his footprints, or even know they existed, and where? NO ONE had ever seen Dorner alive near the cabin, nor any other person who might have been responsible for the footprints they choose to follow, nor, for the matter, whoever really fired the shots that felled them. Next came an swarm of lawmen and choppers, and the Cabin was set afire. Restating the question more pointedly, how did the dead Sheriff know to follow the footprints, unless there was some foreknowledge; a conspiracy afoot requiring Dorner’s body to be found cindarised? Now that he is dead, we may never know how he knew how to find those footprints, and why he knew to follow them.

8) The finding of a murder weapon by a citizen and news crew: A man reportedly found a crashed car (not the truck allegedly stolen by Dorner just prior to his being cornered) near the cabin, and nearby laying in the open in the snow at the roadway’s edge, a Walther P22 pistol with silencer and flashlight (a James-Bond style, professional assassin’s weapon). Coincidentally, a news crew happened along just then, as well? And they thought seeing a man standing at the side of the road was obviously newsworthy enough to investigate and interview?

This is three days after the Police the Cabin was fired and Police had swarmed into the area, and the day after concluding their investigation in the area, opening roadblocks to the public. Anyone see red flags here? If not Dorner’s truck, who’s car was it, and who’s gun? If Dorner had somehow stolen a car after stealing the truck, why has it not been reported? The car renews interest in and underscores the question about how MacKay choose to follow footprints, and where they originated, not just where they led. It is also raises the possibility that whomever killed MacKay was not Dorner, but a professional assigned the task.

9) The death of Chris Dorner: Was Dorner dead already, killed at some point well before the cabin event? It would be easy to have staged the events leading to the fiery conclusion, especially if one man knew to follow the footprints to the Cabin preprepared with Dorner’s body and rigged with squibs to simulate gunfire. It would only take a sniper to eliminate that man, the one possible person who might know the truth or unknowingly expose it if allowed to live, perhaps the only one outside of any inner conspiracy circle within LAPD or CIA/military camps.

10) The tale of four sets of ID, three wallets: How did the wallet survive the fire, and how many wallets and ID sets did Chris Dorner own? There had already been multiple reports of his wallet and ID being found, and yet they also find it, in tact, with readable plastic ID, in the ashes of a building where nothing else survived the flames. Add in the discarding of his badge as yet another form of ID. I DO NOT BUY IT.

That is specifically one of the oldest tricks in the intelligence community’s playbook for framing someone or making it seem that a body is someone it is not. Yes, it can also be used to misdirect authorities as to your true presence or whereabouts, but you only need employ that gambit generally once, and even then, only when making a major tactical move (like an escape, or an assault). Four times? Not synchronous with either escape or subsequent assault? And so close together in some cases, essentially wasting valuable ID resources?

11) The body of Chris Dorner: Is Dorner even dead, at all? If it were not for the phony ID find, I might not be moved to ask. But it implies official deceit. So, is he alive and vanished by virtue of NDAA style actions by our acting President or a unilateral military decision, or has he managed to pull off his own escape plan? I doubt the later, but even the Coroner’s report of dental matches, or DNA match will not be proof enough to answer the question; given the weight of material pointing to conspiracy, a fraudulent Coroner’s report is simple to arrange if CIA is involved, and easy enough for lesser groups.

12) The fire and ‘suicide’: Why did, per police radio traffic, LEA deploy multiple fire-starting ‘burners,’ incendiary tear gas canisters, if not intending to start a fire? Why did they turn away fire trucks with a decision to wait until all four corner’s had caved in once learning there was a basement? In almost every use of this kind of device, a fire erupts if it lands on or against anything flammable. Using multiple burners insures a fire. Was it to make sure the only way to ID Dorner’s body was dental records, the easiest of all to tamper with when officially faking someone’s death? Was it to insure that Dorner never had a day in court where he could expose crimes by LAPD or others well beyond those already known?

Bonus Question asked by others re Media complicity: Why did media volunteer to black out the Dorner event already underway? Choppers in the air pulled away at Police request issued thru FAA (suspicious and completely unprecedented in its own right), because Police claimed ‘news coverage might tip Dorner off.’ Excuse me, but the gun battle had already ensued, and the cabin was already surrounded. Police positions were not clearly revealed by aerial video because of dense trees about the cabin and the distance and angles involved. So what was the threat, again? If Dorner didn’t already know he was surrounded after engaging in a gun battle, he was not likely to be watching TV to find out.

And how do you get a TV signal way out there to the Cabin, in an isolated valley, when the cabin had no TV aerial visible, and the nearest broadcast station carrying feeds were in LA, 67 miles away on the other side of mountains forming the valley? What was the real reason Police wanted no one to see document they were doing? Why did media comply, knowing their signal was of no value that far away? Why did FAA aid in that cover up?

Why was an assassin’s pistol found by civilians near the cabin after Police finished investigation?

Summary

All these question and nagging discrepencies are the stuff which makes for an Urban Legend. Remember, an urban legend is always based on some kernel of truth, and yet is almost never truly what it seems on the surface. People tend to believe the legend, and fail to ask the right questions even if choosing to look closely. Dark lies need to be exposed and examined carefully in the light.

In looking closely, ALL of the above questions imply their own answer: a conspiracy, lies, and intelligence community tricks being employed. Whether those tricks are by CIA, military, or LEA application is something only the answers to the questions will reveal. But you (in bothering to read this), I, and other ‘conspiracy theorists’ seem to be the only ones asking questions. Given the obvious nature of many of them, that is its own clue something is wrong, something quite related to the bonus question. Anyone not seeing that, is not paying attention.

Turn on the damn flashlight!

How did Police find Chris Dorner?

1.4 Billion Ammo Orders Use Satanic Magic Numbers


When satanic leadership of the NWO undertakes a plot, you can bet there are satanic magic numbers in use, somewhere. Sometimes the obvious is right in front of our eyes, if we but just look askant.

Homeland Security (patch) Police (helmet)? Why does DHS want Mine Resistant Behemoths like this in your city?

Why did DHS order 1.4 billion rounds of ammo? Satan made them do it!

Updated March 6, 2013, and errata:  A previous update of this same date was in error as it implied DHS had ordered 2,717 MRAPs. Claims do abound on the Web that DHS’ has also placed a recent Order for 2717 MRAP (Mine Resistant Armor Protection) Light-Armored, Gun Ported Vehicles also uniquely satanic. However, the order was actually via U.S. Navy conduits and are intended to be manned by the U.S. Marines, presumably in overseas operations — but of course, deployment can actually be ANYWHERE.

Regardless, the smoke comes from fire theory is fueled by the fact that DHS does use the same vehicles (image) and has their own Police Force (ICE ERO — Immigrations Customs Enforcement Emergency Response Operations). If you go to ice.gov Web site you indeed find them crowing about numerous ICE ERO arrests in civilian police matters unrelated to either Customs or Immigrations. Ask yourself then, why does DHS want these vehicles and Police (soldiers by any other name) otherwise illegal under Posse Comitatus in YOUR city? Updated analysis marked via RED text.

Is DHS a Satanic branch of the US government?

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice.
Did Satan make DHS order 1.4 billion rounds of ammunition?
Does DHS have its own Police force?

What you will learn reading this blog:

•  That all numbers have meaning, sometimes spiritual, even satanic… and magical;
•  That the magic numbers are easy to find and translate, by way of example;
•  That the DHS munitions orders are rife with satanic numbers and meaning;
•  That that meaning implies they will be used against citizens and destroy the America we know in favor of the North American Union.

What does the DHS munition order have to do with the North American Union?

One indicator that the DHS 1.4 gigamunition orders are intended for pure evil use may be the actual quantities ordered, themselves. When the Satanic leadership of the NWO makes plans, they use every Satanic leverage they can muster to insure success. Magic numbers are almost always present one way or another. We got a taste of that on Sept. 11, 2001, and other black days in history where the date itself forms magic numbers. Yeah, yeah —mere coincidence, right? Don’t be so sure; read on.

What is a Satanic Magic Number, you may ask?

Transcendental, omnipresent, and as mysterious as it is infinite: the number pi

Transcendental, omnipresent, and as magically mysterious as it is infinite: the number pi

To answer that, we need to go back to ancient times and consider the dead languages, such as the Greek, Hebrew, and Latin. In those times, each letter of the alphabet had a numerical weight or value associated with it. The best known by most of us are termed Roman Numerals, but all these languages used such a system. Thereby, a given word, phrase, passage, or text document could have a numerical value by simply adding them up. That’s one reason the name of the Antichrist can be given as a number.

Also prevalent in those days was the occult practice of Numerology, the belief that each number carried with it a social and religious meaning or importance, a functional word/phrase equivalent. Numerology as pertaining to religious use was largely associated with cults and early Satanic religions, but also, even Biblic texts rely upon numeric valuations. Typically, the ‘meaning’ of a given number remained constant between the dark (Satanic) and light (Biblic) uses, with minor changes to suit emphasis or application.

By such a scheme, it is possible for a number series to be converted to a sentence-like translation or summary of its meaning. We will be doing a little of that, later on. In reverse fashion, one practiced in numerology can devise a number to have such a translated meaning. In addition, there are certain number properties which are thought to hold magical abilities which amplify the power or intensity of any such meanings. Doublets, triplets, and so forth, perfect increment/decrements (e.g. 1234), squares or other root products, and palindromes, those numbers which are the same forwards and backwards, and even prime numbers divisible only by 1 and themselves, are examples.

Note: If you find this interesting, you may also want to learn about the Gematria Calculator, which translates numbers to words and vice versa. The link also provides additional background details to the above presentation.

What is the history of magic or satanic numbers?

Machinations for illumination

The means of manipulation to relate magical translations has some flexibility. The number sequence 123456789 can be looked at for the purpose as a single 9 digit  number, or three three digit numbers, or it can be broken into pairs with the odd man out at either end, or in the middle. When in the middle, groupings both left and right of it may incorporate it for ‘double duty.’ Groupings can then be summed to obtain other numbers to be employed for translation purposes. Thus our example number in groupings of threes would become 6 15 24 as a result.

Sum results can also be summed yet again. The most common form of summing, however, is summing in strict pairs, which is a bit different. Summing our example result 61524 (not in pairs) would produce 45, the actual sum of the three numbers, but in pairs, it produces yet a new three digit number, 666, the most powerful of all Satanic numbers for obvious reasons: 6 is treated as if a pair, 15 sums to 6, 24 sums to 6. The other way to sum is to simply sum them all as individual digits, which yields 18, another code-like way to express 666 (3 x 6 = 18).

A thing to do, especially with larger numbers, is to review their table of divisors; all possible combinations of division the number supports. The quantity of divisors can be examined, as well. The only useful divisors would be those found magical themselves, and especially so for the more important Satanic numbers, 13, 18, and 666, or multiples thereof, or numbers which yield them by the above machinations. Indeed, there are many means which can be applied, but regardless of the method, the interesting fact is that the odds of being able to discover a magical meaning to any given number of some size (e.g. 5 or more digits) is relatively small, despite it being easy to find magical numbers by the described means. Restated, it is easy to find magic numbers, but not easy to find magical meaning; more is needed to impart meaning and actual power.

Only a few specific numbers in a given range (e.g. 10100 – 10200) would have much going on in terms of useful magical impact. 10100 can be argued a magic number, for instance, because it has the doublet 00 and the palindrome 101, and is based on the the number 1 which has a significant meaning in its own right (primal force). But that is not enough — and yet is tantalizing enough that we ought look more closely.

Indeed, if employing the divisors method, we find it divisible by the doublets 1010, 2525, and 5050, and the additional palindromes 101, 202, 404, and 505. If we cared to do so, we would learn these numbers have meaning of their own. Thus it turns out to be a magical number, but yet, it is not Satanic (the meanings are good, not evil), and therefore of no value to our search — unless we encountered an ammunition order in that quantity, in which case we might deduce it for a good cause. We do not, and should not find it, in that those seeking good are admonished in the Bible against using numerology, and thus it should be only by coincidence or divine providence that they would have elected a good number.

Who uses magic or satanic numbers?

Not just any old number will do

The important thing is, finding a Satanic number is not common enough that one can argue ‘any number can be shown Satanic.’ In our sequence above, one does not encounter a number with the potential for even a mild Satanic interpretation until 101124, which is able to produce the number 18 in machinations several different ways. Even so, it is not sufficiently dark to be used for justification, because it does not enjoy any of the other requirements:

It must afford an actual translation which imparts a meaning, and/or, alternately, enjoy a symmetry or consistency as if a ‘theme,’ and/or, alternately, offers a myriad of such finds employing a wide variety of magical numbers; it should tend to be somewhat obvious and clear cut in nature. If it does not hit you over the head, it’s probably not intended to have magical meaning… unless, perhaps, it is part of a set of other magical numbers where one might deem to look for a theme within the entire set. That complexity, fortunately, is not required with the ammo order, as each number appears to express itself, alone, and as a whole, the entire order’s theme is also consistent with any individual number’s meaning.

Indicators are indeed everything. In numerology, select numbers were deemed to represent good, and others, evil or occult, meanings which could be used to reference conceptual constructs, events, outcomes, traits, or even objects or persons, etc. You can learn about any (usually limited to two digits) number by typing into your search engine, ‘what is the meaning of x,’ substituting your target number for ‘x.’ Some references will focus on positive spiritual uses, some on general Numerology meaning, and a few will focus on occult uses. However, even the spiritual and less blatantly dark Numerology definitions will paint a useful picture in most cases. Try several resources.

One must not discount the opposition, either. If truly seeking translation, one must expect to find a mix of good and bad magic numbers. For example, if the message were intended to be something along the lines of ‘Satan destroys god’s plan for man,’ it might look something like 18 (Satan) 11 (destroys) 27 (salvation) 181127. That number contains a palindrome 181, which sums to 99 in pairs (using the middle number in an odd digit count with each number to its left and right), which again sums to 18, and the last four sum to 11 yet again collectively. The first four sum to 13 (sin), the mechanism by which Satan destroys salvation. The theme is present and expressed several ways. So if I was an evil Mason designing a Temple or other building of mystical import, I might make sure to employ that number and others like it in the dimensions (e.g., expressed in millimeters, it equals 594 feet, where 594 sums to 18, 94 sums to 13).

How are magic numbers used in the real World?

Real World example

Indeed, we find precedence. There is in India one the tallest buildings on the sub continent which is of that height, called Planet Godrej. Godrej is an Indian personal name which translates/relates to the occult Zoroaster metaphysical faith, also known as Zarathrustra, an ancient Persian occult faith (oldest on Earth) of mythological importance to the ancient Egyptians, and therefore, to Masons. The name is historically associated with wealthy business families worshiping Zoroaster. Remember Ghostbusters, the movie? The evil from the other side in the film was based on Zoroasterism.

Thus Planet Godrej might be intended, by its designers, both by its name and its dimensions, to represent diversion of Man from Salvation by means of sinful business efforts, planet wide. What is the building actually used for? It is a luxury apartment complex catering to wealthy business leaders in the heart of Mumbai (Bombay), each replete with servants quarters. It is located in an entertainment district which includes gambling. There are only two other buildings of the same height in the World cited on the Web: a similar residential building for business leaders in London, the Vauxhall Tower, and one of the five Suntec towers in Singapore. Vauxhall is a name derived from the Russian pleasure gardens of the Tsars, a place of diversions from mere amusements to outright sinful sexual excesses for business and political leaders in Russia. The Suntec towers are part of Suntec City, a complex of business office and convention spaces, residential, and entertainment facilities. See any themes, here? I don’t make this stuff up, you know.

What numbers are satanic?

Meet our magic numbers

Here are the numbers we will focus upon for our purposes, today; those numbers most used to represent Satanic dialog/themes, or to clarify them — in the simplest and briefest of summaries. Note there is some translation taking place in the larger numbers employing the smaller number’s meanings, so you see how translation can take place with consistency. Those few in bold are the true Satanic numbers of power.

  3  Fullness
  5  Balance, the power and limit of man to control 
  6  Illumination, enlightenment, legend, man
  7  Mystery, esoteric or scholarly magic, associated with Saturn, a name for Satan, might be a curse
  9  Visitation, spirit
10  Law, obedience 
11  Imperfection, disorder/chaos, that which precedes destruction
13  Rebellion, depravity, sin
16  Material power, incarnation
15  Three dimensions (reality), new direction, blinding temptation (Satan)
17  Victory, Son of Man (Christ), liberation
18  Oppression, bondage, slavery  = 3 (fullness) x 6 (legend/man/illumination)= 6+6+6 = 666
21  Distress = 3 (fullness) x 7 (mystery, magic – a curse)
29  Departure, cast out = 3 (fullness) x 13 (sin)
30  Rulership, dominion = 3 (fullness) x 10 (law, obedience)
31  Offspring, branch
33  A sign, warning, predictor = 3 (fullness) x 11 (that which precedes destruction)
36  Adversary, enemy = 2 (division, double) x 18 (oppression, 666)
39  Infirmity, death = 3 (fullness) x 13 (sin) — the wages thereof
360  Encircle, trap, capture = 10 (obedience) x 36 (enemy)
666  Satan’s name

Now to the analysis of DHS ammo orders with the above in mind. To follow along and be comfortable with my findings, you may wish to open another window or tab to a divisors calculator, and to activate your desktop calculator. The divisors calculator additionally gives you the sum of divisors, often of value in the analysis. Because there are so many numbers which might be analyzed, I will simplify the presentation by focusing on the first number (which happened to seem to be the least magical on first look), the largest single order item, and the final total. You will then be well versed in how to check any of the other numbers on your own. Since it can be confusing to describe mathematical things verbally, I have also attempted to employ color coding to help you more easily see what is being referenced.

How do you find magic or satanic numbers?

The first item: .223 Assault Rifle ammuntion, yr 1 35635000 rounds

Sum of divisors: 83504520
1 2 4 5 8 10 20 25 40 50 100 125 200 250 500 625 1000 1250 2500 5000 7127 14254 28508 35635 57016 71270 142540 178175 285080 356350 712700 890875 1425400 1781750 3563500 4454375 7127000 8908750 17800 35635000

Bold = palindrome  Red = 13 sum  Green = 16 sum   Blue = 17 sum

At first I did not see too much going on with this number other than it was an unusual palindrome, 35635, and that the divisors contained three of those as well as three 17817 series (e.g., 178175). But the sum of divisors (83504520) proved interesting, too, when run through the divisor calculator: its 13th divisor is 18. It’s 57th divisor is 360 (entrap), 57 summing to 13, as well. Then, looking at the last three digits of the 178175 series, we find they summed to 13, also.

If this was all there was, I still would not have bothered going any further in my hunt, concluding there was insufficient magic present. A weak theme of 13 with a hint of 18 in play was not exactly ‘saying’ much. The hypothesis would have been found inadequately proven, and this article would not be warranted.

However, when one checks in groups of three or four digits, one quickly discovers that a large number of divisors, including half of those with 13 present by summations, almost always summed to either 16 or 17 either as a whole, or as a balance of digits in the case of those with 13 present. In total, there are six each 16 and 17 summations, three of the 16 conjoined with a 13. Thus the ‘theme’ would seem to be 16 (incarnation) of 13 (sin) is greater than or opposes 17 (salvation). In this case, it can be made greater because the conjoined instances are all palindromes, although, the odd number remaining 5 (balance), implies a balance of power is being contested.

Now, going back and looking at the original number 35635 again, we can see that 35 is 5 (balance, limit and power of man) x 7 (having to do with magic and Satan). This is another way of saying the same thing (balance of power in conflict). Further, that converts it to 57675, which can be summed in triplets to form the doublet 1818. Again, very powerful and weighted to Satan’s advantage against Man and Man’s salvation. With the same general theme being found expressed three different ways, I elected to write the article; the numbers said something after all.

DHS orders ammunition in quantities based on Satanic numbers.

The largest order: .223 Assault ammo, yr 3 728582000 rounds

728582000  728582000  728582000  728582000  728582000

Sum of divisors:  1761716112  1761716112  1761716112  1761716112  1761716112  1761716112 
1 2 4 5 8 10 16 20 25 40 50 80 100 125 200 250 400 500 1000 2000 364291 728582 1457164 1821455 2914328 3642910 5828656 7285820 9107275 14571640 18214550 29143280 36429100 45536375 72858200 91072750 145716400 182145500 364291000 728582000

Bold = palindrome  Red = 13 sum  Blue = 17 sum   Purple = 18 sum  Pink = 15 sum  Teal = 10 sum

Again we see palindromes richly present. The order quantity itself contains 858, which by sums translates to doublet 13, very powerful. The larger palindrome, 28582 likewise summed provides doublet 15 (temptation in spades). The sum of divisors is even more palindromic, containing 17617 as well as 171 and 161. That provides for one 13 in the former, and if summing the later together, provides 17, plus the outright 17 in one of them (171), and 17 by summing of the other (16+1). Then we also find a single number with two palindromes: 5828656, its first two  numbers summing to 13, second and third to 10, the last three to 17, the first three to 155828656  5828656  5828656

We find 13 is also present by summing in four divisors, each an ‘island’ without conjoining. However, 17 seems to be everywhere, in each instance conjoined with 18, 15, or 10, and in like manner, 18 is abundantly conjoined with not only 17 as just mentioned, but also 10. Indeed, the order quantity palindrome also contains two each of not just 13, but two each also of both 15 and 10. That’s a pretty potent palindrome.

In checking the divisors of the sum of divisors, as in our first year order, we find the number 13 pops up, this time rather than in the form of being the 13th divisor, it is divisible by 13 directly, which goes 135516624 times. That not only starts with 13, but contains two adjacent 13s by summing: 1355 16624, as well as containing 15 and 18 (135516624) by sums, or outright 666 if summing just the last pair, and 17 two ways by dropping either 1 in the first sequence. You also get 666 summing the 51 ahead of the 66, and of course, 55 gives you 10. All the key numbers are present in the one number, which is multiplied 13 times to amplify its dark power. 

In almost identical manner, the palindrome 45536375 from the original divisors does the same, in overlapping combinations: 45536375 (17 15), 45536375 (17), and 45536375 (10), and 13 in the 553. Only 18 is missing in this one. Now go back to the actual order number, and you see it happen similarly, yet again: 13, 15, 17 and 10 are all there. From all these we deduce a consistent (three-way depiction) of a theme dialogs: 18 (slavery, Satan) vs. 17 (Son of Man) = ‘conflict’ or ‘battle;’ and 17 (Son of Man) vs. 15 (change of direction, blinding temptation); and 10 (obedience) through 18 (slavery, Satan).  These same themes have been repeated four times in this one order item!

Combining these, and we get the picture of a battle of some sort on an epic scale. Considering that we find 13, 18, 17 are the only ones which also stand alone (rebellion, liberation, slavery), it appears that is the nature of the conflict is to be a rebellion to decide between liberty or slavery.

DHS orders ammunition in quantities based on Satanic numbers.

Grand total of all munitions: 1405175654 rounds

1405175654  1405175654  1405175654  1405175654  1405175654

Sum of divisors: 2108519640
1 2 2819 5638 249233 498466 702587827 1405175654

Bold = palindrome  Red = 13 sum  Blue = 17 sum  Purple = 18 sum

Because the number becomes considerably more finite when it does not have a lot of zeros, we get very few divisors, and thus it becomes ‘harder’ to find magical numbers since there are fewer to consider. However, they are present. The quantity itself contains both 18 and 13 two different ways, and we do have one palindrome, and 17 exists outright, only mentioned because it will be omnipresent elsewhere.

The first two four digit divisors if summed in pairs, produce palindromes: 1010, and 1111, respectively. The next two divisors both contain a summed 13 (49), and the later of these can also produce 18. The next divisor produces a 13 in addition to a palindrome. We also find that most of the divisors contain 17 by summing: 5638, 249233, 498466, and 7025877827.

But we are not done. If we also compute divisors for the sum of divisors, we find some more interesting things not common to similar efforts with the other numbers. We find a wealth of palindromes. In fact, more than 20% of them have palindromes, including a 5 digit 67976, which makes for a doublet 13 by summation. There are numerous doublets, many numbers containing multiple doublets, including 4040 (40 is the number of death and rebirth, or destruction and renewal).

That number, 14954040 also contains both 13 and 18 in sums sharing the 495.  There are even very rare triplets, including 666 itself — twice! The other triplets, 333, and 999, additionally contain 13 in their construct. Like the original number, 13s and 18s also abound in many different ways. The overall theme for the entire order, then, is 13 (sin) amplifying the power of 18 (Satan) against 17 (Son of Man).

Who in DHS wants to overthrow the US by force in favor of the North American Union?

Update: 2717 MRAP vehicle order

Sum of divisors: 3360. 8 divisors:
1 11 13 19 143 209 247 2717

Bold = palindrome  Red = 13 sum  Blue = 11 sum  Purple = 18 (666)

A palindrom (717) starts this off, which sums in pairs using a shared middle number to the doublet 88, and we have a doublet 33 in sum of divisors. Both Doublets are divisible by 11 a number of times (3, 8) which sum again to 11. Still, not that much to crow about until we look at the divisors, of which there are very few, and yet which provide a wealth of results in EVERY divisor of note. The order is divisible by 13 209 times which sums to 11, and divisible by 11 247 times which sums to 13. It is divisible by 19 143 times which combine in sums to 18 (666). So, just look up 11 and 13 to get the ‘theme,’ and amplify that by 18.

Why did DHS order 2717 MRAP vehicles?

Summary

Therefore we see the simple outer theme, inwardly, concealed if you wish, expresses an overall theme akin to Armegeddon, or the Great Flood, to be visited upon America. But also, you see… if the NWO has is to its way and be able to establish a one-World government, the true purpose thereof is to seat the Antichrist, and lead us to the final End Times, actual Armegeddon.

But to get there will require something called the North American Union, abandoning the independence of Mexico, Canada, and the US altogether. But the greatest roadblock to that is the United States and our massive gun ownership which binds us like an insurance policy to our sovereignty and Constitutional integrity. Unless they can find a way to cancel out that insurance policy, they cannot have their way. The North American Union cannot come to pass without something drastic happening.

The numbers suggest they may at least think they have found a way to solve that. A bloody way. In fact, the sum of divisors of the grand total is equal to (270 x 13) + (3165945 x 666). Various sources cite the number of guns in private hands in America is 270 million. 3,165,945?  That’s just about the size of the US Military and Police forces, combined, depending on who’s numbers you use.  But that’s just me and some numbers talking.

How can the North American Union come to pass?

What do you think?

Support the second amendment if you hate the North American union!

Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto


What would it really mean if Dorner did not write the Manifesto claimed for him? Like many bumps-in-the-night mysteries in our national consciousness… the answer may lead to CIA and the Military.

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice. The image is specifically excluded from permissions to duplicate: see text with image.
Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto
 

What you will learn reading this blog:

• That there are more, darker possibilities than the obvious bad Cop framing a good Cop;
• that possibilities include direct ties to Rodney King and Operation Verdict in support of Martial Law for a military coup;
• that CIA has infiltrated LAPD (and most major LEA) for their own criminal needs and may be at the heart of Dorner’s fate;
• that there are many clues most of us have missed which foster TEN new questions which help understanding;
Did CIA or Military frame and murder Dorner?
What is the truth about Chris Dorner?

This original artwork is trademarked and copyrighted and may not be used in full or in part, altered or unaltered, without permission, if dissociated from this blog: I do not want some bad cops turning the left-half into some kind of macabre T-shirt. If someone wants to make the WHOLE thing into a T-shirt, we can talk.

This original artwork is trademarked and copyrighted and may not be reproduced in any form dissociated from this blog in full or in part without express permission: I especially do not want some bad cops turning the left-half into some kind of racist T-shirt. If someone wants to make the WHOLE thing into a T-shirt, we can talk.

In my prior blog post in this series, I showed more than a dozen reasons to question if Dorner’s Manifesto were his manifesto, at all. While portions were surely written by him, it also seems clear that because of different writing styles and the very construction employed, as well as external evidences relating to the security of Dorner’s Computer activity — the sections which paint Dorner as a mad killer were by someone else. I’m not the first to suggest it, but perhaps the first to fully dissect and expose. Without those additions, all you have is a laundry list of LAPD wrongdoing and an open letter to LAPD pleading for resolution by a perfectly good Cop.

If we agree that there is reason to question the authorship of the condemning portions of the document… then we have to wonder what else about the greater Dorner matter is real?

There had to be a motive, and a pretty powerful one, at that, to warrant setting Dorner up for murder and feeding us lies. So much of Dorner’s laundry list of LPD sins ultimately translate into or directly relate to racial prejudice. Dorner cites everything from racial slurs to violence, specifically mentioning the Rodney King beating/video to show how systemic it has been. But this cannot be the motive, in my opinion.

Racist Cop complaints are, within LAPD, a small-potatoes issue representing little ‘threat’ sufficient to motivate the fraud and murders involved. LAPD, even as Dorner points out, has a long history of such prejudice and covering ups. When leadership habitually protects those who step out of line in this regard, there is no threat worthy of the death penalty in yet one more accusation, even if by a fellow Officer. We are moved to think it has to be something else. Or does it?

Was Dorner a CIA or DOD patsy?

In the game of Hearts, playing the Spades can steal the whole deck

In the game of political power and control, it is our Hearts and minds which are at stake via psychological manipulation of the masses. The closer you look past the thin and faulty veneer of the Dorner story, the more the clues we find which lead us not just to bad Cops in LAPD, but also, unfortunately, to the CIA and Department of Defense and very dark things that threaten to impact us all. So hang on… this is a far bumpier ride than the manhunt we see on the surface.

As I document in my bookset, Fatal Rebirth (new special low price offer in place, by the way), the 1992 Rodney King beating Dorner was careful to cite — had led to CIA reconnaissance overflights of major US Cities to perform low-level, high-resolution aerial photomapping of black neighborhoods for something called Project Verdict. Verdict was preparation for the declaration of Martial Law if rioting broke out nation-wide when the trial of the 4 LAPD Officers involved was concluded with an expected white-wash verdict of ‘innocent’. So concluded, it was.

And based on a lot of indicators, it was planned that way from the start; a plot to overthrow the Constitution.

But it failed, though LA indeed became a battle ground like never seen in any American City, requiring the National Guard AND US Marines to restore order. 53 died, more than 2,000 were injured, and nearly 4,000 fires leveled whole neighborhoods and cinderized over 1,000 businesses. Had other cities followed suit, the whole deck of cards would likely now be under military control, exactly as forecast by our highest ranking military in the event of nation-wide martial.

Now know this: in the time frame of the beating, trial, and aftermath, King was reportedly described by various officials predisposed to rude thoughts as the ‘King of Spades.’ Also active World-wide at the time was Operation Gladio (still in play, today, it seems), a US/NATO clandestine effort to topple Communist Bloc nations which further evolved to include a series of false flag terror events targeting Americans and NATO citizens to justify repressive draconian responses. Was Verdict part of Gladio? No way to know, but it sure fits the mold.

Fortunately, Verdict was thwarted. But I have to ask: was it intended from the start to foster a military coup? POTUS in ’92 was an old CIA man, George Herbert Walker Bush, a man tied to many of the darkest of bumps in the night America has ever known, from JFK to Watergate, and beyond. An excellent review exists in book by Pete Brewton, The Mafia, The CIA, and Goerge Bush, intro here. Gladio was under his watch as CIA Director, and while in the Oval Office.

1992 was a hotly contested election year, and conspiracy rumor mills of the day were warning that a military coupe was in the making to insure Bush held office; under Martial Law, the election could be cancelled. Rodney King may have been the key to such a plan. Absurd? Perhaps, but let’s consider it for a moment, anyway:

Bush was running for second term against Clinton and billionaire H. Ross Perot. Clinton had his own CIA ties, as did Hillary, but I won’t bore you with the details, here — but when I was saying the same publicly, I got hate email laced with expletives directly from the Oval Office. I was at the time researching my four-volume bookset, Fatal Rebirth, documenting crimes of the New World Order from 1947 forward.

As result of my investigation, it became clear to me that H. Ross Perot was a dangerous threat to the two-party system of power control via Dog and Pony Shows of pretended and superfluous political differences. Given Perot’s growing popularity, I feared they would take him out. He was last Century’s ‘Ron Paul,’ without the benefit of a congressional title.

I warned the Secret Service, who did nothing but put ME under surveillance for five years. Meanwhile, Anthrax was mailed to Perot’s family (the same thing used to silence one of Bill Clinton’s State Police-assigned body guards when he was Governor of Arkansas, to silence him from testifying about Clinton’s ties to CIA drug running in Iran-Contra, a George Bush sanctioned operation.) The Perot attack was confirmed to me by my own back-channel Secret Service Agent contact. It forced him to quit the race the night of the Colorado Primary, which he won even after quitting. Had he not quit, it would have given him enough electoral votes to have a place on the main Nov. election ballot.

But the NWO does not want you to have true freedom of choice. So you only get to vote for the two candidates they offer you, both of whom they own outright. If you knew the full story of how Ron Paul was prevented from being on the ballot, you would understand. Even with two candidates, the election is rigged so that it does not matter much how you vote, though wild-card antics like Chad counting can upset the equation without angering Eurobosses. Here’s how, and why it relates:

In those days, I had already interviewed a man claiming a flight crewman of CIA’s Evergreen Airline had confessed details of a secret flight: Bill Clinton, George Bush, and others (not Perot) were flown to Europe to meet with Bilderbergers to decide who would be our next President, Clinton being the answer. The plane landed and taxied to the end of the runway, where other Bilderberger planes already sat waiting.

Everyone got onto the same plane for their meet after deciding who would be the new President, and then departed in reverse manner, never officially entering the country. While we cannot confirm if this is a true event, it would give Bush a motive for circumventing by directly usurping power through martial law to end the election process. But to declare it would require some kind of internal upheaval on a national scale. Could such be engineered, and yet not seem manufactured to anyone, especially the Bilderbergers?

Are the Rodney King and Dorner matters linked to a Martial Law plot?

Playing the rest of the black cards

The race card trick: beating King and getting video taped was the first step. King was the perfect choice: he not only had the same last name as Martin Luther, but when clean shaven, he looked much like the much missed, martyred man. Beat King with video documentation, and you get instant renewed martyrdom, and kindle angst anew nation-wide in the black and white populace alike. But good quality video at night in those days was not as easy as it is, today.

The high-tech (for the day) Sony camera used had just been purchased and was taken right out of the box for the first time that night in response to the beating, it was claimed. I say claimed, because right out of the box, the battery would have been useless. The person filming was a Canadian-born contractor who had been raised in Argentina. You know, that country where the Nazi’s went after WWII, and where George Bush has bought huge tracts of land, and a fun place known to be a CIA playground in South America.

The second was to make sure the verdict in the trial was ‘not guilty.’  That was arranged by: a) having the first judge removed from the case as ‘biased,’ and b) the new judge assigned changing the venue to an all-White, well-to-do community resulting in a jury of 10 Whites and one Hispanic. But how do you make sure the violence level upon such verdict is sufficient enough to warrant calling in the National Guard? Simple — step c) have the National Guard foment violence to prime the pump. False flag stuff. Military stuff. CIA stuff. Any sign of that in LA at the time?

Well, as Dorner himself also mentions, we had for Chief of Police in LA at the time one Daryl F. Gates, clearly a New World Order Police State mentality kind of guy. He virtually invented SWAT teams and Police intelligence operations involved in wholesale spying on civilians. He also pioneered ‘sweeps’ of up to 1,000 officers at a time to arrest and detain everyone of a given class (e.g., 25,000 black and Hispanic youths, known or suspected gang members) simply for the harassment value, and to keep them off the streets for the convenience of city public relations, such as employed during the 1984 Olympic games.

The spying operation did favors directly for CIA fronts, while other police operations, including drug enforcement programs ‘invented’ by Gates (CRASH) made themselves useful to sanctioned CIA drug running in LA County. Ask ex LAPD Officer Michael Ruppert, who has been trying to blow the whistle on CIA drug operations in America ever since he was approached by CIA for the purpose of recruitment while on the Force. Ruppert thinks Gates was a CIA Case Officer, a CIA in place asset.

We should mention Gate’s role in the CIA mind-control assassination plot against RFK, where Gates ordered key evidence destroyed because ‘it was taking up too much room, and an ex-CIA Cop in the Command Center under Gates, ordered Cops not to go after the Man and his associate, the Woman in the polka dot dress seen earlier with Sirhan, and later seen running away gleefully saying “We did it! We shot Kennedy!” At the time, he said, “We don’t want them to get anything started on a big conspiracy.”

So then, was there any false flag ‘stuff’ of the sort going on in the LA Riots? In Fatal Rebirth, I detail some little known facts which national media censored, but which was revealed in local news reports. Things like someone parking an unlocked railroad box car full of guns on a siding near the LA Watts black community, and even helicopters dropping guns like they were beaded necklaces at Mardi Gras; like staging a violent attack on whites by blacks and videotaping it for news use… the participants other than victims later identified as National Guard in civies; like four black men caught by Police driving around town with a car full of guns and Molotov Cocktails, later released to a National Guard Major who claimed they were his Men. Here is a bit of a taste; guns appearing out of nowhere, a first-hand account.

Is Dorner intended to spark race riots to allow Martial Law?

To triumph, play the trump Ace

So one question which arises is, was Dorner to become the ‘Ace of Spades’ (the basis of my artwork) in some delayed completion of the Martial Law scenario by the military? Is some future revelation planned which will show him to have been framed and then murdered by LAPD, a tactic seeking to rekindle the 1992 hatreds all over again?

Keep in mind that in preceding months, there have been, and continue to be, a rash of massive live-fire (blanks) military Special Ops raid training exercises conducted in downtown Houston, LA, Minneapolis, Boston, Miami, and elsewhere (YouTube is rife with videos). Not once did city officials get advance warning, causing panicked civilians, some of whom took up arms just in case they would need defend themselves from (someone).

And, also in the weeks prior, the US Army leveled the 43 Acre Sepluveda Basin Wild Life Preserve (home to 250 species of birds) belonging to Los Angeles City WITHOUT NOTIFYING ANYONE. And as I write this, reports continue to come in of whole trains, as well as convoys of trucks carrying military vehicles along I-40 to Los Angeles. Someone is getting ready for something centered around LA.

But in truth, I rank its being tied to Dorner as being lower in likelihood than Chinese invasion or other, more useful martial law scenarios such as pandemics, nuclear or bioterrorism, etc. It might even be easier to stage an alien invasion, given that DARPA has developed huge stealth (radar absorbing, visually hard to see, soundless) UFO-like craft which have been test flown and sparked UFO flaps, already. So why go to the trouble of trying again something which didn’t work well in 1992?

A little more likely: something redacted from Dorner’s list of LAPD sins

If we presume that the Dorner’s material was altered, it is reasonable to presume something was removed. Something so dangerous if made public, that it was worth killing for, and framing Dorner to silence him. Imagine for a moment, that the people ‘killed by Dorner’ were people who also knew too much or who were considered weak links in a conspiracy. Or, some of them, perhaps even all, may have simply been targets of convenience because they were mentioned in Dorner’s complaints against LAPD.

Monica Quan was the daughter of LAPD Capt. Randal Quan, ret., who represented Dorner unsuccessfully (and poorly, according to the Manifesto) in hearings which resulted in Dorner’s termination from LAPD. Both Monica and her fiancé, were found shot dead in their car parked at their shared condo address. What if someone feared that Randal Quan might have shared some secret with her? Might that have resulted in targeting her, and the boyfriend in case she had in turn shared it with him?

Within minutes of the shooting by some accounts, the ‘manifesto’ was posted on Facebook, though not discovered for many hours. Open and shut case, right? But think about it. If you were going to launch a killing spree against cops… how much advance notice and tactical warning would you give them? Dorner’s alleged post included excruciating details of the threat and methods he would employ. And then, there was silence for four days, giving Police ample time to put investigative resources in motion, and putting Dorner at risk of capture. How logical was that, tactically, if how it really went down? It makes no sense.

On the fourth day, a gun battle ensued when two LAPD claim they spotted Dorner near the home of someone named in the post as likely target. One of the two Cops was grazed, but their suspect escaped. But how likely is it that it really was Dorner, given that a total of seven people known not to be Dorner were shot at by spooked Cops thinking them to be? We are talking about Cops opening fire without warning and shooting people clearly not Dorner — in the back in some cases. Dorner is a huge black man. So why shoot two Hispanic women, a slightly built white male, and a young surfer dude? Clearly, they had no real clue what Dorner looked like, then. So I must ask, did they really know it was him in that first gun battle?

Then, that same day, a SWAT Team Officer, Michael Crain, also a bad Cop according to Dorner, was shot dead, and a trainee with him critically wounded while they waited at a stoplight — attacked by someone who ran up to the car on foot. A bit curious to me that everyone killed by ‘Dorner’ died in the front seat of their car… which means someone was waiting for them at exactly the right place and time for a quick hit and run operation.

That requires exceedingly good intelligence and access to very detailed and current internal Police information in the case of Crain. I don’t believe Dorner, an ex Cop, would have that level of needed information available. Do you? It may be helpful to know that one of the favorite assassination points for CIA hits is while the target is in transit by car. Funny thing is, though, it takes CIA-style tricks to insure that a target will stop at the one stop light you deem most useful for the hit. That means more than one person is involved. Are we to believe Dorner pulled the feat off single-handedly, or would an internal conspiracy be more probable?

And who is Crain? An ex-Marine. Dorner is ex Navy, thanks to his problems with LAPD. But while he was still a Cop and in the Naval Reserves, both would likely have been ‘in the loop’ with respect to any illegal or paralegal joint military-police drills of the type mentioned above. And, therefore, we may presume both might have known something about an illegal future operation, or some dark matter associated with one already conducted. So how far fetched would it be for one to be killed to silence them and the other to be blamed for it, and to modify Dorner’s texts for the purpose?

It’s almost guaranteed to work, especially if the first killing is scheduled at a time when Dorner would have no alibi he could prove, such as being home, alone. Imagine being Dorner: you hear on the radio of the Quan shooting, and realize… ‘My FB page mentions the elder Quan in a bad light. That may make me a suspect. I’d better review my wording.’ So you try to do just that and discover you are locked out of your own account, and you recall your Credit Union account was hacked by an LAPD Officer once, already. So you just go to the page and find your list of complaints has suddenly become a confession (manifesto). You have no choice but to run, knowing Cops kill Cop killers almost always, no questions asked.

Especially run when you hear news reports that: a) some of your personal Police equipment was been found in a trash bin near the murder scene; and b) someone claiming to be you called Randall Quan to mentally torture him over Monica’s murder. And, thereby, unfolds the story we have been fed in media. But as we’ve seen, there has to be more at work here than that.

If the Dorner manifesto is a fraud, what can be believe about the official story?

Next up: 12 Frightening New Questions Illuminate the Dorner Urban Legend

Will America survive Chris Dorner?

 

Dorners ‘Manifesto’: Manufacturing a D.B. Cooper-ish Urban Legend?


What would it mean if the Dorner ‘Manifesto’ was not written by him? What if he were deliberately being made into an urban legend to cover up crimes by the real authors, including Dorner’s murder before the Cabin assault even took place?

By H. Michael Sweeney, copyright © 2013, all rights reserved, proparanoid.wordpress.com
Permission to duplicate online hereby granted provided it is reproduced in full with all links and text colors in tact and unaltered, including this notice.

What you will learn reading this post:

• There are many clues which make it doubtful that Dorner is the sole author, such as…
• there are three distinctly different writing styles, typically standing out as if additions after the fact inconsistent with and reversing the intent of material clearly Dorner’s;
• there are past tense and third-person references to Dorner as if already dead, and implied future tense when relating to the murders Dorner allegedly committed;
• there are clever tricks designed to paint Dorner ‘mad’ which not even a crazy person would be fool enough to write.

Was Dorner framed? Who wrote Dorner’s manifesto? Was dormer killed and his body put in the cabin?

wallet found

They claim they found Dorner’s wallet and readable ID here? Sure. But that’s OK, because they also found it at the Mexican border. Sure. At least that’s what they told media to tell us when it was expedient. Image: redicecreations.com (click) – about two wallets.

I must say that when I first heard reports about the Dorner incident, each update simply seemed more and more… unbelievable. Increasingly, the possibility grew in my mind that it was a set up. I mean, you have a good, moral cop fighting a just cause against corrupt, brutal, and racist cops harming citizens, and then he’s suddenly a crazed killer destroying the very foundation of his case by brutally murdering a minority citizen… not to mention cops? And everyone signs off. Please.

That’s just as believable as conveniently finding known terrorist’s wallets with their real identities, not alias’ commonly used as a cover, among the ashes in attacks where the largest thing otherwise remaining was a mote of ash. They’ve pulled that one on us three times that I know of, including Sept. 11 attacks. No false flag here… move along, move along.

But wait! They’ve found Dormer’s wallet repleat with readable plastic ID, where? The ashes of the burned-to-the-foundation cabin? AND, they found them at the Mexican border just hours earlier? No conspiracy here… move along, move along.

The only way I could justify the actions claimed of Dorner in my mind was if it were yet another ‘mass shooting’ event sparked by psychotropic SSRI drugs of the likes of Prozac, Paxil, Zoloft, and others. These killer-makers all have murder and other violence as unpredictable side effects, and have been found to be in use by virtually all mass shooters. Ban guns? No thank you, but please, ban SSRIs and zany brain Witch Doctors who keep inventing new reasons to prescribe them like candy. Check out the facts and how SSRIs have bearing on the matter.

Sure. If Dorner was suffering depression, stress, and daily anxiety that he might be shot dead by dirty cops for ‘crossing the Blue Line,’ he might have been prescribed SSRIs for cause. But I doubt it. Because consistently co-present with the violent side effects is a lack of reason, logic, motive, or even an understanding of why they undertook violent acts, or even clear recall of them. Dorner, in his ‘manifesto,’ not only remembers, but screams a reason, motive, and understanding — flawed thinking though it be. But then, there are problems with the validity of that document…  I don’t think he is the sole author.

Was Dorner framed? Who wrote Dorner’s manifesto? Was dormer killed and his body put in the cabin?

A manifesto which is not a Manifesto

Trotted out was the alleged Manifesto, which is in this case is really nothing more than a dumb-you-down term used much the same way the Davidian ranch at Waco and Randy Weaver’s log cabin were variously called an ‘enclave,’ a ‘fortress,’ or a ‘compound,’ all implying military defensive planning in their design. Propaganda BS. Reading Dorner’s work (uncensored version), you find there is no Manifesto present, at all.

No. Instead, it seems like five distinctly different texts in three differing styles as if by three different persons, and for four different purposes, not counting some political sandbagging and blindsiding thrown in for good measure. If you take away the things which seem added, all you have remaining is a plea for LAPD to do the right thing about a laundry list of wrongdoing.

1)   The main body, which accounts for the bulk of the 18 page document is a detailed review of crimes and abuse of power of LAPD Officers, leadership, and events relating to Dorner’s whistleblowing and the resulting harassment and cover up — an event log. There is reason, calm, logic, and moral dignity present, and cohesive writing style. Clearly, it is the Dorner who fits the profile of a good cop and who is in control of himself. No Manifesto, it is merely a point-by-point, blow-by-blow accounting of his experiences trying to be that good Cop.

2)   The introduction paragraph, on the other hand, is something else: a ‘confession’ of the murders and what sounds like an attempt to ‘excuse’ them by virtue of righteous indignation forcing acts of extreme violence as a “Last Resort,” which is indeed the title line. But were these things added later by someone else?

Particularly problematic is the writing style of this large paragraph. It is like the 9-11 cell phone calls from hijacked planes where callers spoke in ways no one ever does, revealing the calls were staged: “Hi, this is Mark Phillips, your son.”  Would not a Mom know her own son, and their family’s last name? Interesting, especially since cell phones in those days did not work at altitude.

In the ‘manifesto,’ we read what seems like someone else trying to make you think them Dorner. Why would you write about yourself the way others describe you when you are not around, and generally only at your funeral service or on a death bed — in past tense?

Example a): “…completely out of character for the man you KNEW who always wore a smile wherever he WAS seen.”

Even if one actually believed that’s how people saw them, would they not more likely in such a case say; “… out of character for someone who always tries to wear a smile…” or “known for always wearing a smile…”?

Example b):I know most of you who personally know me are in disbelief to hear from media reports that I am SUSPECTED of committing such horrendous murders…”

Why not simply say “…disbelief that I murdered anyone…”? And why even bring up media at all, especially via the expression, ‘media reports’? If I were going to say it at all, I’d simply say ‘on the news,’ but it is entirely superfluous given its assumed they had to know by one means or another… unless one is writing in knowledge that there WILL BE breaking news, and that writer is used to describing news as ‘media reports.’ That is exactly the way Cops and others who must at times cite news sources, including myself, would be used to saying it. Its use implies a different writer, one with foreknowledge of future events. Sure, Dorner is also a Cop, so he might write it that way, too, except that…

In like manner, the choice of the word ‘suspected.’ If you know you did it and are taking credit there on the spot, why use that word at all.

If written instead by another Cop framing Dorner, that Cop would be so used to referring to third-parties as suspects, and expressing ‘facts’ in certain ways, that it could have easily crept into typed text without notice. Someone writing about their own actions is not so moved. These are not the only instances, and more to the point, they only exist in select parts of the text, nowhere in what appears to be the main body (next three items) clearly written by Dorner.

3)   In the middle of the main body, the accusations against LAPD, we find a curious out-of-place section, a very large paragraph, of zero relevance asking journalists to review his school years (he lists towns he lived in) to show he was never a bully or got into fights.  And yet, the same paragraph describes an incident with him throwing the first and only punch and getting punished, and about continually earning more such punishments thereafter. Excuse me? It is as if someone wanted journalists to deduce the opposite of what the paragraph claims to want, and deem him not only violent minded, but mentally incompetent and unable to distinguish between the two states of being. It had to have been ADDED to get there in the middle, given a lack of context to prior or following material.

4)   The passage is one of only two sections, which use profanity. It is also the one place where he derides Christianity and claims not to be a Christian, though elsewhere he presents his morals in very Christian terms. Now, I’ve read many documents similar in nature where the author was non Christian, and they made negative comments at every opportunity, not at just one point.. So I must ask:

Could this section have been inserted, and ‘addressed’ to journalists because, a few paragraphs later, Dorner also asks in the main body that journalists review a particular set of events and specific records which validate his LAPD accusations? By sounding completely bonkers and self contradictory in the first request, the second request would likely be ignored as well. This is essentially the whole de facto effect (and purpose?) of the entire ‘manifesto.’ It screams ‘ignore anything I say or complain about, because I do the opposite of what I say and am worse than those I complain about.’

Funny thing is… the nature of sociopathic and psychopathic behavior specifically includes the ability to well hide it, rather than to reveal it unknowingly — which requires them to be immune from doxastic self deception (i.e., saying you do not get into fights, then citing fights, and not sensing the paradox). Someone deliberately created that paradoxical paragraph.

5)   From that point forward, it seems as if almost every paragraph of the remaining main body text has at least one sentence, or even a whole paragraph (added?) which tends to convert it from a rational, non threatening letter into a reprehensible, irrational threat. You literally feel the tone change between what came before, and the additions. I get the distinct impression someone started by adding the final section (described next) at the bottom of the document, and then worked their way up paragraph by paragraph, editing for an I-am-a-mad-man-so-kill-me-quick effect, and stopped with the middle insert we just reviewed. Save original passages, most are tacked onto the end, because that’s the easiest thing to do, and they are often very simple, short one liners — but an original writer would tend to include such key elements throughout the dialog and thoughtfully so.

Example a) I have exhausted all available means at obtaining my name back. I have attempted all legal court efforts within appeals at the Superior Courts and California Appellate courts. This is my last resort. The LAPD has suppressed the truth and it has now lead to deadly consequences. The LAPD’s actions have cost me my law enforcement career that began on 2/7/05 and ended on 1/2/09. They cost me my Naval career which started on 4/02 and ends on 2/13. I had a TS/SCI clearance(Top Secret Sensitive Compartmentalized Information clearance) up until shortly after my termination with LAPD. This is the highest clearance a service member can attain other than a Yankee White TS/SCI which is only granted for those working with and around the President/Vice President of the United States. I lost my position as a Commanding Officer of a Naval Security Forces reserve unit at NAS Fallon because of the LAPD. I’ve lost a relationship with my mother and sister because of the LAPD. I’ve lost a relationship with close friends because of the LAPD. In essence, I’ve lost everything because the LAPD took my name and new I was INNOCENT!!! Capt Phil Tingirides, Justin Eisenberg, Martella, Randy Quan, and Sgt. Anderson all new I was innocent but decided to terminate me so they could continue Ofcr. Teresa Evans career. I know about the meeting between all of you where Evans attorney, Rico, confessed that she kicked Christopher Gettler (excessive force). Your day has come.

Example b) Chief Beck, this is when you need to have that come to Jesus talk with Sgt. Teresa Evans and everyone else who was involved in the conspiracy to have me terminated for doing the right thing. you also need to speak with her attorney, Rico, and his conversation with the BOR members and her confession of guilt in kicking Mr. Gettler. I’ll be waiting for a PUBLIC response at a press conference. When the truth comes out, the killing stops.

Example c): Those Hispanic officers who victimize their own ethnicity because they are new immigrants to this country and are unaware of their civil rights. You call them wetbacks to their face and demean them in front of fellow officers of different ethnicities so that you will receive some sort of acceptance from your colleagues. I’m not impressed. Most likely, your parents or grandparents were immigrants at one time, but you have forgotten that. You are a high value target.

6)   The next, closing section is a long list of ranting which, along with a concentration of profanity, is a bit of a grab bag. It is unusual in that it has countless little paragraphs aimed at a wide variety of public figures in a bouncy mixture of complaints and praise which render the writer a loon. Also in the section is a kind of long train wreck of a letter to LAPD, with dire warnings of impending violence towards other cops and their families. Much of the letter portion, if one again discounted sentences and portions which might have been added to flip meaning, may indeed have been written by a sane Dorner, a genuine plea to do the right thing, with additions again subverting them into threats. That is not how threatening people write. The nastiness is pervasive, not tacked on neatly. Sans such additions, it is no longer a train wreck, nor rambling.

7)   These added things tend to be in the same style otherwise questioned in the opening examples, but with more Angst and vileness.

Example (not a typo by me) regarding killing cops; It was against everything I’ve ever was.

Wait a minute. There is a difference between me writing about me; “It was against everything I’ve ever been,” or about someone else; “It was against everything he ever was.” Those are the only two possible original sentences. Either there was a super-nova brain fart, or a partial correction was made to the later sentence. Let me explain.

Imagine someone other the Dorner subliminally mixing thought states from first to third person as well as from relating life experience of the living to past experiences before one’s death. So ingrained as natural to repetitive writing about third parties (in Police reports?), perhaps, that only a partial editing correction (‘he’ to ‘I’ve) was made, the writer still not catching the tell-tale ‘was.’ Either or both reasons for the error make it someone other than Dorner doing the writing, and further implies Dorner already dead, or sure knowledge he was to be, soon.

8)   Nothing in the document would convince you Dorner was crazy as much as does the letter component. When I say rambling, I mean a completely different visible style of sentence structure (or lack thereof), with gross errors not common to the main body. Among them, are incomplete or nonsense sentences, such as the very last one, “We need to hold ou” What? The Cops were at the door and he had to stop mid-sentence and fetch some beers? And yet, again, these sentences/passages are mixed in as if additions to existent, logical, well written material. Take them away, and it suddenly seems normal.

9)   And what about depression? He ‘admits’ suffering from it in the letter part. Funny thing about that is, it always seems officials in questionable deaths of the politically incorrect find a way to say ‘We had indications he was depressed…’ when they ‘suicide.’ Perhaps, but that still only accounts for the murders if he was on psychotropics, for which nothing else matches the symptoms, and still leaves the document flawed in its present construct.

10)  But also in the section is a very long rambling bit which seems to be there only to serve gun grabber needs, and given that Dorner is (allegedly) now one of the ‘mass shooters’ of late, we can expect it to be one more log on the fire in that debate. How convenient.

But, uh… what should we expect, given that the section also praises the likes of both Clintons and Sr. Bush, as well as CIA’s (or Mossad’s) journalists of choice (links reveal), Walter Cronkite (Who wrote this? WC retired when Dorner was three years old!), Peter + Jennings, Anderson Cooper, and Wolf Blitzer, et. al? A Globalist’s Cop who likes a controlled media — who owns all manner of firearms, which he lists, and yet wishes were banned, and which are on Feinstein’s list, too? Please. No propaganda here, move along…

Was Dorner framed? Who wrote Dorner’s manifesto? Was dormer killed and his body put in the cabin?

Conclusion

Given the dichotomy and logic and style flipping content overall, one might choose to toss off the concerns I’ve stated and to instead presume it at simple face value as the work of a lunatic. Heaven knows media is accepting it, so why shouldn’t we? We will actually answer that question, in another blog in this series.

For me, because there is no hint of a specific or consistent lunacy… because nothing in the document as it sits should make any sense even to a deluded writer… because of the clues of alternate author additions cited… we might do well to question authenticity. If NOT authentic, then there is a conspiracy, and nothing we’ve heard about any event related to the matter can be trusted to be true. So, presuming there is a motive to decieve, is there anything suggesting means and opportunity, for someone to make such changes to Dorner’s words? Lets ask a couple of key questions which address that:

1)   Where did the ‘manifesto’ come from?  Answer, from a Facebook page the LA Times describes as “believed to be Dorner’s.” Huh? Three problems with that:

a) wishy-washy ‘believed to be,’ makes me wonder all the more about authenticity. I have doubts, because…

b) anyone can get a Facebook account in any name they want not already taken, and…

c) anyone who has ever had a FB account should know how easy they are to be hijacked, hacked, or accessed and manipulated by unauthorized users via password cracking. Ergo, next question…

2)   How secure were Dorner’s computers and access to his Web accounts? Answer, from his own documentation of LAPD targeting for being a whistleblower; Thaniya Sungruenyos, an LAPD Officer had hacked his Los Angeles Police Federal Credit Union account from her home address, per the IP address provided by the Financial institution. LAPD ignored the evidence and covered up the event, according to Dorner.

Interesting what you can learn, when you question the official line and look more closely. Seen anyone in media following suit? No? Well, that leaves just you and me conspiracy theorists, I guess. But then, there are other people who wonder, too. Check out the last two related articles about Dorner, one of them a Police Chief.

What is the truth about Chris Dorner?

Next up: Dorner, the Urban Legend: Implications Behind a Fraudulent Manifesto

Is Dorner really dead?

Confirmed: Interview on Mass Shootings: Absolute Patterns Prove NWO Conspiracy


Join me on an interview on Urban Warzone in a new timeslot: Thursday, the 31st of January at 1:PM EST to be startled with answers to troubling questions about the images herein.

Note: Cyrus has confirmed the new time slot IS indeed 1PM EST. He has simply not been able to yet update his 
 
Update Jan 29: Reconfirmed and posted actual time/date. Announcing that a special image will be added to this page while on air, and removed afterwards. That image will be used to explain how the remaining graphics herein were arrived at, as well as highlight the differences between relationships between parties in the ‘official’ media/government version of a mass shooting (Aurora) and the result of private investigations in multiple states by myself and assisting field investigators. You can’t imagine how revealing it is until you see it for yourself. But its complexity goes beyond the ability to well explain in the blog and thus it will be subsequently removed. Your ONLY chance to see it is to join us LIVE, though you will be able to listen to the verbal dialog later once Cyrus posts it – sans image.

That’s the day after this post: we will explain how the following graphics came to be and how they prove that mass shootings are part of a long-term plan to establish the NWO. Tune in and participate live, and have this blog post open.

Reading this post you will learn…

• That virtually all mass shootings are not random events, but part of an elaborate plan with multiple patterns only possible by intelligent design;
• That these patterns manifest in many ways, including the ability to generate complex graphical images of mystical and satanic symbols on maps;
• That individual key shootings (i.e., Aurora, Sandy Hook), have additional patterns of their own, all playing to a larger North American pattern of like construct;
• That patterns can be so accurate as to predict likely future shooting events.
 

This matter is too complex for a mere blog. Therefore, I will be going on air to explain more usefully, referring to the images in this blog for purposes of illustration of key points. Please review the images below and read the questions posed for each, questions which I will attempt to answer on air. Then join in the discovery, live, at Urban Warzone.

I will also be preparing a PowerPoint which I want to make into a video. Listen to the show to learn how you can not only get a free copy when it is finished, but also, a free copy of my book, Fatal Rebirth, which predicted this eventuality in the first place more than ten years ago. It also happened to predict Sept. 11 attacks, and much more.

As you review, keep in mind that random events do NOT form geometric patterns. Official Pattern Dispersal Studies by the militaries of many governments around the World investigating UFO sightings have proven that. Not one single instance reported of finding even three points in a perfectly straight line, much less forming right angles or shapes. Yet in analysis of mass shootings hundreds of miles apart, it is possible to find many in a line (and many lines form very complex 3-D shapes), and in some cases (where information details allow), accuracy to within 25 feet, and with doorway-t0-doorway accuracy.

The first question is (but among the last, perhaps, to be answered), why is it that all such plots ONLY work with such accuracy when doorways or driveway entrances are used in the plots? That alone implies intelligent design, does it not? Read on…

Quadrants

IMAGE ONE: The NWO movement is sponsored from Europe via Masonic Mysticism and Satanism

How is it possible that these ‘quadrant’ lines were discovered by patterns associated with just five shooting events, and yet, confirmed by many dozens more such events? How do they relate to the Illuminati NWO movement, and what additional discoveries can they reveal?

Compass Rose

Image Two: The Compass Rose (also CIA’s Logo) is an important Masonic emblem. There are seven, here

How is it possible that investigation of facts surrounding the Aurora Shooting led to an ability to locate and plot this graphic? How does it relate to Masonic Mysticism and why is it not pointing North? How is it that six more real-world roses in the Denver Area have intricate relationships to the shooting, as well (blue, purple, red, yellow lines)?

Masonic Emblems, Maltese Cross

Image Three: Some more traditional Masonic symbols created from data points associated with the Aurora shooting

How are these (and other) Masonic symbols revealed by information drawn from the Aurora shooting? How can random events possibly generate such patterns unless by intelligent design? What process was used to discover them? Who is behind it?

All Seeing Eyes in Denver

Image Four: Perhaps the most meaningful of Masonic Emblems, these point toward a future terror event well beyond 911 scale

How does it happen that two large real-world structures would be discovered to relate to these famous Masonic emblems and point to a future terror attack? How are they interlocked, and how might their intentional existence and relationships verified in other ways? How does it relate to and predict terrorism? How is the terror event tied to mass shootings?

Baphomet in Denver

Image Five: Baphomet (one name of the symbol, and one name for Satan); an upside-down 5-pointed star

What is the significance of being able to plot this symbol from shooting data points? Why is it not perfectly upside down (normally to be aligned to North in ceremonies)? What are the significances of its structural elements in black magic?

Masonic Emblem and Baphomet in Sandy Hook

Image Six: Sandy Hook is no different than Aurora with respect to finding symbols, and yet, it is quite different

WHow is it possible to get symbolism out of Sandy Hook when there were far fewer data points (actually, answer is found in the next set of images, and by the text labels in this image)? Why is the Pentagram tipped the other way?

Sandy Hook in Gotham City Map

Scan of actual Gotham City Map used as PR piece for the movie; Sandy Hook at bottom

Gotham City and real Sandy Hook Compared

Image Eight: The Dark Knight Rises Gotham City Map compared to real map of Sandy Hook has many shape alignments

Gotham City and real Sandy Hook compared

Image Nine: Even more details have relationships to things found in the real world at Sandy Hook

Gotham City real world Sandy Hook compared

Image Ten: And even more details upon close inspection

Why are there so many curious matches between the movie showing a fictitious Sandy Hook when James Holmes opened fire and the real-world Sandy Hook? Why bother to have such elaborate symbolism in a conspiracy in the first place — why not just worry about event planning, alone?

Note: the name matches in blue and red texts do NOT represent any reason to presume any conspiratorial relationship between persons or businesses, but merely represent someone using them as landmarks for their ‘secret’ machinations. Also, the three features at the school are not ‘front’ and ‘rear,’ but at the sides. The Shed happens to belong to the Masonic Lodge. The small dot at the school is not actually ‘in the real world’ as such: it is a cement pad in the shadow of a tree which, in Google Earth, provided the visual of a round black shape presumed to exist (we must assume) by the planners. Or, it relates to something intended in the shooting plan for which we yet have any details, or which failed to take place as planned (e.g., where Lanza was supposed to die).
 

Masonic Emblem at Sandy Hook

Image Eleven: Masonic Emblem ‘mowed’ into the field abutting Gene Rosen’s Property

Why does Gene Rosen have a Masonic Emblem hidden amongst ‘random’ mowing patterns in what is effectively his back yard (though ownership has not been established)? Why does his story change so many times? Why would a bunch of kids and (one version) a bus driver go PAST the Fire House to get to his house when CLEARLY, there would have been BETTER SAFE HAVEN and some hope of getting help found at the Fire House?

Mass Shootings reveal North American Baphomet

Plotting all national mass shootings allowed finding this emblem covering North America.

How did plotting the location of all ‘random’ mass shootings enable discovery and plotting of this Baphomet? Why is it slightly imperfect?

Note: The distances involved do impact accuracy because of idiosyncrasies in Google Earth plotting tools. The smaller the distances, the more accurate you can be (to a point); Sandy Hook was accurate to within 20 feet or so, Aurora (much larger scale) to within 50 feet or so. Despite the vastly larger scale, here, accuracy is less than Google Earth would allow, with several tens of miles in error where perhaps hundreds of feet should be the maximum error. There is a very interesting probable reason. 
 

Statistics Prove Gun Control No Solution; a Political Ruse


Statistics prove gun control is no solution; gun violence is a political ruse.

Taking away guns does not stop psychiatric care-sponsored killings: pseudo science and drug industry profits are the real killer

by H. Michael Sweeney, copyright © 2012, all rights reserved. Permissions to duplicate in full with all links and credits in tact hereby granted, provided they point to proparanoid.wordpress.com and include this notice.
Was Sandy Hook Shooting a multiple shooter conspiracy?
Updated 4/10/13: Proof media and government don’t want you to know the truth and employ disinfo tactics instead, re ‘gun control.’ Changes and pointers to related material indicated with RED TEXT.

Reading this post you will learn

1)   Statistics show the worst shooters are victims of mind altering drugs given under ‘psychiatric care’ with poor or no supervision;
2)   They also show that when denied access to guns, people find more gruesome means to kill, even in mass murder;
3)   That such drugs have a history tied to CIA mind control research in a class I call mind control enabling psychotropics;
5)   That the ONLY winner in gun control is tyranny.
Who is lying about the guns used in Sandy Hook, and why?

Official portrait of George H. W. Bush, former...

Official portrait of George H. W. Bush, former President of the United States of America. (Photo credit: Wikipedia)

Portrait of DoD Mr. J. Danforth Quayle, Vice P...

USAF portrait of Vice President J. Danforth Quayle (Wikipedia photo)

Update: The mass murder attempt in Texas yesterday employing a knife and response by media proves a couple of key points regarding the validity and reasons behind gun control efforts. Additionally, Mr. Sorento, Presidential pretender, is blindsiding Congress and the public when he gives speeches on gun control.

1) There are a rash of ‘copy me’ mainstream news articles using the same exact text/images/headline claiming that mass knife attacks are RARE according to experts. Other media have at least reworded the same message, but remain parroting an official line. This is blatantly false as the statistics show, below, marked now in Red. This blog has cited more than 20 examples of mass murders or attempts using weapons other than guns, specifically to point out that taking away guns does not stop murderers.

2) Other articles and news sources (TV/Radio) are trying to spin the knife attacks in support of gun control by offhand remarks such as ‘If he had used a gun, there would have been more deaths.” Perhaps so, but who is to say his intent was to actually kill — else he would have chosen a weapon with a longer blade. More to the point, if students had been allowed to conceal carry, HE would have been dead with reduced bloodshed of innocents.

3) Sorento gives his speeches before a 100% manufactured crowd of supporters with absolutely no opposing viewpoints allowed, This gives the illusion that NO ONE in their right mind could possibly disagree. This is result of his illegal quashing of 1st Amendment Rights by signing the so-called Federal Buildings and Grounds Restrictive Act. This Law allows Police to eject, even arrest anyone who protests on government property or anywhere near events where government officials are appearing publicly. This is nothing less than subtle disinfo blind siding. End update.

Arguing to take away guns ‘that have no use to a hunter’ is to ignore the fact that the 2nd Amendment has nothing to do with hunting, and everything to do with insuring government does not abuse their power over the people. It is intended to be a form of checks and balances to tyranny, and nothing less.

We clearly need it now more than ever, given the rapid loss of freedoms to government’s paranoiac response to ‘terrorism,’ a crime of questionable attribute, at best, and one which kills fewer Americans than results from wrongful deaths at the hands of law enforcement.

My idea of gun legislation, therefore, is to give me the right to pack a government provided SAM missile launcher and Apache helicopter, not merely some bolt-action rifle I pay for at my own expense — in part because pistols and single shot rifles do little to deter soldiers able to pick you off from a distance with their sniper rifles… and DHS is spending billions to stockpile enough ammunition to kill everyone in North America, including some 9 million rounds of sniper bullets. I have to ask why, and fear the answer is the T-word.

Why does the government want to take your guns away? Martial Law is why.

Lets be clear

No one wants to take away from the legitimate concerns of victims of senseless murders of innocents as underscored so horribly in the recent rash of mass shootings. It is right to be angry and to grieve with introspective analysis and to seek a solution to prevent such heinous acts as so painfully evident in the massacre of children and adults in Connecticut. And all Americans and people elsewhere in the World are victims, too… we all are forced to suffer some lesser anguish in our compassion for those who lost family members and friends in these events.

But please, do not become yet another kind of victim by taking the bait and blaming guns, not even a particular kind of gun, especially when inconsistencies and the very nature of official statements of evidence suggest either a conspiracy of shooters is being foisted upon us as yet another ‘crazed lone gunman,’ or lies are offered in a conspiracy within government to force gun control upon us… or both.

How, for instance, in Sandy Hook, is it possible for the Coroner to cite to media with law enforcement at his side that everyone was killed by a rifle, when State and local Police had already stated that only handguns were found in the school with the shooter’s body (first, two, then four pistols), and the only rifle found was in the shooter’s locked trunk?

There are other questions, but not as many as found in Aurora’s theater shooting. These kind of nagging ‘conspiracy theory’ questions for which the public deserves to have answers are always ignored, of course, because, ‘they are merely conspiracy theorists’ doing the asking… even when persons of credentials ask. Thus the truth, including the real cause of ‘gun violence,’ is never explained.

Why are there so many ties between Sandy Hook and Aurora?

Right in front of our eyes all along

And yet, the real cause has been right before your eyes the whole time, but deliberately veiled by corporate and government forces allied for varied agenda. I first wrote about the problem in my book, Fatal Rebirth (a four volume look at crimes of the New World Order which predicted Sept. 11 attacks, an assassination attempt which took place, and mass shootings of the kind we face, now, and so much more). I also wrote about it in my books on Political Control Technology, such as MC Realities.

A ten-year research effort for these books, as well as personal family experiences, made it all-too-clear.  It is subsequently verified by statistics and other information you can easily verify for yourself: the real culprit is a thirst for power and control, both financial and political. Their weapon is disinformation, and chemicals. As such, then, it is imperative that we look both at mass shooting events as well as political assassination events; both being used to effect political change against the natural will of the people and course of governments. It is, after all, yet another form of mind control for the masses: change the mood and the will of the people with lies.

Are mass shootings sponsored by the CIA or military?

Start with the Congressional Record

If you are closed-minded about the possibility of mind control and see it as mere tin-foil hat nonsense, then you are already a victim of CIA’s Operation Mockingbird, and should skip this section because you will not wish to be confused by the facts. It might even be harmful to your psyche to learn you have been manipulated by a form of mind control called disinformation, aka propaganda. Mockingbird put thousands of CIA agents directly into media at all levels from management to reporters and anchor persons… to make sure you got all the news that’s fit to distort.

The Church and Rockefeller Commission findings of the 1970s regarding CIA mind control research further revealed all manner of inhumane MC research and non consensual testing on unwitting human subjects. It is clear that among even worse atrocities, CIA was keen to develop drugs that could control a person’s mind to the point that they would do anything commanded, even to kill themselves or others; the Manchurian Candidate, or ‘programmable person.’

There is much more I could write on this topic, but I do not wish to cause readers not open to the notion to stop reading, for there are more important things yet to discuss. I suggest Alex Constantine’s book, Psychic Dictatorship in the USA, for those wanting the gory details, and my book, MC Realities, to learn about the development of psychotropic mind altering drugs (mind control enabling drugs) by Eli Lilly under ex CIA director George Herbert Walker Bush and Dan Quayle as company executives… the very drugs we are about to see quite tied to the type of gun violence of which this article speaks.

When media controls what you think, you are a victim of mind control

Gun violence: Look at the Statistics

The first mass shooting of note in America was the Texas Tower sniper murder of 13 at the University of Texas, Austin, in 1966. From that time forward there have been countless incidents, so many, in fact, that media hardly thinks to look at the big picture, all-too preoccupied with the gory details of the most recent events. Convenient for them and government, perhaps…

…as it does not serve hidden agenda if you compare today with yesterday and learn that there is a pattern of significant relevance which is clearly being withheld from you. You make your decisions based on the colored view of blood-red tinted glasses fitted with blinders of ‘current news.’ There is a reason I call it the Military-Industrial-Intelligence-Media Complex. What makes you think ‘free press’ has anything to do with American media, a media largely controlled by less than a dozen people, exactly as the Congressional Record cited to be all that was needed to control the press. The statistics will reveal it all…

SSRI medication was developed by CIA as a mind control enabling drug

What mass shootings and assassination events have in common:

It is so rare to find otherwise, that I dare say every such shooting has many, if not all, of the same key ingredients in place: a) prior psychiatric care involving the use of prescribed mind-altering drugs (pscyhotropics, generally of the SSRI variety — Selective Serotonin Reuptake Inhibitors such as Prozac, Zoloft, Paxil, and dozens of others); b) a triggering event based on emotional stress or trauma or the curtailing of or failure in treatment processes, such as failing to take medication or overdosing; and in all-too-many cases, c) the otherwise ‘coincidental’ peripheral presence in their lives of military, CIA, or other persons, firms, or organizations associated in some way with mind control technology.

Note: there is another kind of triggering event for the Machurian Candidate style of programmed shooter, the kind of person used as a disposable patsy, because they tend not to be very effective as actual killers. The best example is, perhaps, Sirhan Sirhan, who emptied his gun at Robert Kennedy but hit him, not, according to modern forensic review: Kennedy was shot from behind, and upward. Such persons are programmed in advance to do a specific thing upon hearing or reading a select unusual triggering phrase.

Such phrases are offered once to cause them to pay attention (throws a mental switch). It is then subsequently repeated twice close together to cause them to carry out the instructions (initiates a command sequence). Interesting, then, that in Sandy Hook, that a particular Web set published the following phrase three times, once as title, and twice in the text: “Sandy Hook Lingerie Party Massacre.”

This was published on the same day as the Aurora shooting, in which the film, The Dark Knight Rises, shows a map of the villain’s attack plans with Sandy Hook (a district of Gotham City renamed to Sandy Hook for the film, for some unknown reason) as the place next to be struck. And yet, it is strange things like this which get us conspiracy theorists labeled as ‘nuts’ by media that you might be more comfortable in ignoring us, instead of thinking for yourself. How comfortable are you, right now?

The rush to gun control serves the NWO agenda for a one World government

SSRI drugs cause violent thoughts and deeds as side effects

SSRI drugs are killers, both by suicide and by murderous acts committed by those taking them. There is a remarkable summary of this phenomenon at ssristories.com, a Web site which just a few years ago listed perhaps only 50 or 60 examples, but today cites about 5,000 cases which illustrate the problem. The link sorts them by the general nature of the case, but you can sort by date or location, or any other heading.

A quick review reveals some startling examples, which I shall first outline in terms of the dangerous aspects of the drug class and its propensity for sponsoring unchecked violence in patients, and then more specifically relate to mass murders and assassinations, gun violence ahead of other forms of murder.

Why do ‘scientists’ and ‘doctors’ of excellent educational qualifications fail to realize, in light of these known side effects: every physical person has a unique physiology, DNA, and dietary makeup, and thus, it is impossible to predict the results of a given infusion of chemicals into a body where, especially in the brain, the EXISTING balance of chemical makeup is not prepared to suffer alterations with kindly result. Why then, do they persist on guessing at initial dosage levels, and then upping the ante when results are not deemed adequate, until side effects make it clear the med will not help, and then switch them to another med, and start all over again? It is witchcraft-level insanity, and it is guaranteed to have negative outcome.

It is NOT science, nor is it MEDICINE.

It is important to realize even this massive list is only a tip of the iceberg. It ONLY represents reports by family members, doctors, organizations, and other select researchers who were examining and reporting purely from the medical viewpoint. Further, as many of the reports are voluntary contributions, it represents only reports from people who happened to learn of the Web site’s existence and who were moved to report, and, moreover, is limited to reports from people who came to realize the relationship of events to the drug. For this reason, you will not find mentions of assassinations of note, such as my research indicates should be included (name ANY assassination attempt in modern American history, and you will likely find it true).

Among the reports (and a couple of details from my own research) we find court rulings and law enforcement investigative findings which frequently place the blame squarely on the drugs, and not the violent person, in some cases causing the courts not to elect punishment — even for capital crimes involving death. Here is your summary of drug induced violence:

Suicides are very convenient in a conspiracy

Let’s talk suicides:

1)   Over 250 reports involve suicides only, and many times that number include suicide as aftermath to other violence, such as arson, murder, and so forth. Suicide is almost the norm after such drug-caused violence;

2)   One attorney reports he has had a total of 73 calls about suicides from just one specific SSRI;

3)   Indiana county study shows 41% of all suicides involved SSRIs

4)   Wisconsin study shows 54% of teen suicides involved SSRIs

5)   Sweden study shows 52% of women suicides involved SSRIs

6)   Report shows US military suffers 18 suicides a day, 40% on SSRIs

7)   Multiple reports of suicide pacts where all participants were on SSRIs

8)   Another 200 questionable deaths listed which may have been suicides.

9)   EVERY SSRI lists suicidal thoughts as a side effect

10) Suicide attempts often involve the most painful and horrific, and least effective means, such as blow torch, grinders, etc., or the most illogical, such as trying to jump out of an airliner, or stripping naked and wandering off into a winter wilderness.  Suicide by Cop is quite popular, as are head-on and other fatal car crashes, for which statistics are likely quite under reported.

Manchurian candidate murderers are always ruled as acting alone

Let’s talk murders:

 1)   Over 1,200 reports of murder attempts, about one fourth of them followed by suicide or attempts;

2)   Within one week of returning home, nearly a dozen soldiers on SSRIs killed their wives;

3)   Methods vary widely: when guns were not available, almost any means might be employed, including additional reports under other categories, such as vehicular homicide, arson, and so forth (roughly another 100 cases). Details follow.

 Conspiracy must exist if there is a cover up in place

Of interest (or no interest, really) to TSA and FAA:

1)   Nearly two dozen incidents involving violence on an airplane or at an airport;

2)   Individual reports of eleven private plane crashes killing 24 people blamed on SSRIs;

3)   Airline Industry study reveals 100 crash pilots using SSRIs;

4)   At least one hijacking was initiated by an SSRI user.

 No one goes ‘crazy’ without some triggering event – contrived or coincidental

How about kidnapping and hostage taking?

 1)   About twenty instances linked to SSRIs;

2)   Seven instances involve schools and students as victims.

 When you hear ‘lone shooter,’ think ‘conspiracy cover up.’

How about arson and bombing?

 1)   80 arson events, three involving schools, two events where school administrators on SSRI set fires at home;

2)   35 bombing instances, two involving schools.

 CIA lies to put their own men in post of Chief, Spokesperson, and head of Internal Affairs

Other Killing Sprees?

 1)   Remember the rash of US Postal Worker rage shootings? Most were SSRI;

2)   About two dozen instances of fast food chains, trains and busses, churches, banks and other offices, and even a country club and a nursing home;

3)   More than 30 incidents at schools, about 1/3rd of which were SSRI, including virtually every event which made national or international news;

 Gun control is a codeword for police state control

And when there is no gun available?

 1)   One 17 year old holds 20 children and teacher hostage at point of a sword. So if you take all the guns, better get all the swords, too;

2)   A Mother attacks her son with a sword. See what I mean?

3)   School day care center looses two children and an adult to a knife attack. After all, knives are just short swords, right? So, if you are going to take away larger gun clips, but not small, then we presume you would take swords, but no knives. What did you gain?

4)   A woman laughs as she uses her car to chase down three kids at an elementary school. Alright, so now no one can own a car, right?

5)   Man attacks 11 kids and 3 teachers with a machete. See what I mean?

6)   Numerous fires started with intent to kill people in apartments, stores, offices, and schools. Starting to get the idea?

7)   The johnstonsarchieve.net Web site lists these additional incidents (scroll to events with ‘criminal’ cited instead or ‘terrorism’) with no known tie to SSRI drugs, but are cited here because the killers had no guns:

    1. Bath Michigan man uses dynamite to kill 40 children, himself, and the School Superintendant over inability to pay school taxes causing foreclosure of his farm. So if you take all the guns, better also take all the materials used to make explosives;
    2. Poe Elementary playground attacked by man with bomb in suitcase killing himself, his son, the Principal, a custodian, two other students, and injuring 17 other children. See what I mean?
    3. 63 students and adults were burned to death by an angry student at a school dance in Goteborg, Sweden (gun control in Sweden is strict). So if you take all the guns, better take all the gasoline and matches;
    4. 67 teen students died from an arson attack on the dorm at Kyanguli Secondary School in Machakos, Kenya, injuring 19 others. See what I mean?
    5. The Elementary School of Ikeda, Japan, lost 8 students and another 13, including two teachers, were injured by a man with a kitchen knife (there is total gun control in Japan);
    6. 72 kindergarten students and teachers at Zhanjiang City, China, became dangerously ill from rat poison put in their salt by a competing school operator (there is total gun control in China). So now there can be no household poisons?
    7. That same year, 2002, two men upset with contract provisions with Number One High School in Changed, China, put rat poison in breakfast food making 195 children and teachers seriously ill. See what I mean?
    8. Two years later, Number Two High School in Ruzhou, China, suffers an attack by a man who kills 8 and injures 4 students with a knife while they sleep in three separate dormitories;
    9. And yet the next year, a man who had lost his job, again in Zhanjiang, attacks several Nansoon Middle School students with a kitchen knife, injuring 8;
    10. In Jikari High School, Yamaguchi, Japan, a student threw a homemade bomb made from nails and emptied firecrackers into a classroom, injuring 58 students and the teacher. Might as well do away with the 4th of July celebration, anyway, since you are getting rid of the Constitution and Bill of Rights;
    11. In 2010, a man killed three students, and a teacher, and injured 20 other children and staff at the kindergarten of Zibo, China, once more with a knife;
    12. Another machete attack took place in the 5th grade class of the Talisayan Elementary School, Xamboanga City, Philippines, killing one student, a teacher, and a grandfather of a student, and injuring 4 more students and two teachers (gun control in the Philippines is near total);
    13. If you wish more examples, there are thirty more at the bottom of this wikipedia link on list of rampage killers, including at least two alleged deliberate crashing of passenger jets. So let’s put TSA and the FAA out of work and ban aircraft. After all, you do want to protect people from violence, right? That really IS your motive for taking away guns, RIGHT? Sorry… I didn’t hear your answer.

 If you do not own a gun, you do not own your government

And what about when other citizens nearby ALSO have guns…

…the guns they want to take away from you and me? The news of such events that does not make endless headlines because it does little to support gun control wishes of those who seek total control over an unarmed public? A mention the day it happens is as good as it gets, as a rule. Thanks for much of this compilation by gunwatch.blogspot.com:

 1)   A 1995 mass murder for drug effort was spoiled in Muskegon, MI, when the store owner, despite being shot four times in the back, managed to use his own gun to scare off druggies who had planned to kill everyone in his store;

2)   A 1997 high school shooting in Pearl, Miss., was halted by the school’s vice principal after he retrieved a pistol he kept in his truck;

3)   A 1998 school dance  for Parker Middle School (Edinboro, PA) shooting saw one teacher killed, and anther teacher and two students wounded before a man living next door forced the shooter to surrender by getting the drop on him with his shotgun;

4)   A 1999 gun shop owner with concealed pistol shot a gunman to the ground who had brought 100 rounds of ammo with him to ‘go out in a blaze of glory’ at, of all places, a shooting range in California (a guarantee he would get his wish);

5)   A 2002 shooting at Appalachian School of Law in Grundy, Va., came to an abrupt conclusion after three had been killed and three more wounded —when two students, unbeknownst one to the other, ran to their cars to retrieve firearms and confront the shooter with threat of crossfire;

6)   A 2005 shooting which started at the Smith County Courthouse in Tyler, TX, and involved high-speed pursuit, was ended because of the intervention of Mark Allen Wilson, who had a legal concealed carry weapon. This one did not end as well as the others cited, herein, as Wilson was himself killed by the shooter, who was wearing a bullet-proof vest. However, the exchange of fire allowed Police who had been kept at bay to end the matter with fatal shots of their own. This was after the shooter had already killed his ex-wife and wounded his own son, and wounded three lawmen in the melee;

7)   A 2007 gunman attempting to kill parishioners of the New Life Church in Colorado Springs was only able to kill two before being shot by an armed retired Policeman who had changed his mind about going to church that day because of a previous like attack on a church in Ogden the prior week;

8)   A 2007 mall shooter in Utah, after killing five and wounding four, was shot dead by an armed off-duty police officer;

9)   A 2008 shooting in an Israeli School (the Mercaz HaRav massacre) was ended by shots from a student and off-duty policeman using personal weapons, who entered the school with such intent after hearing shots which killed 7 teens and one teacher, and wounded ten other students;

10) A 2008 Winnemucca tavern shooting was ended after two deaths when the shooter, while reloading, was shot dead by a patron with a concealed carry permit;

11) A 2009 workplace shooting in Houston, Texas, was halted by two coworkers who carried concealed handguns;

12) A 2009 College Park party was interrupted by two gunmen who counted ten guests and then counted bullets to insure they had enough. After separating the Men and Women one of them started to rape one of the women, but was ‘coitus interruptus’ by shots from her boyfriend, who killed one and drove off the other gunman;

13) A 2009 restaurant robbery attempt by two gunmen Anniston, AL, was thwarted when one of them threatened the life of a patron who was hiding, only to be shot dead by the customer, who had also prepared his concealed pistol for possible use. A few shots were then exchanged with the second gunman, who was critically wounded;

14) That same year, a convenience store in Richmond, VA, was  robbed at gunpoint, the clerk being shot and wounded, and other patrons being shot at before the robber was shot dead by a patron with concealed carry permit.

15) A 2010  Mills, N.Y., shooting incident where the gunman, an angry customer, intended to kill six employees (he had a ‘death list’ of their names) of a cell phone store was, after opening fire on his first victim, himself shot dead by an armed off duty policeman with concealed weapon.

16) A 2012 RV park shooting incident in Early, Texas, was ended by a resident with his pistol as the gunman, after killing two people and their dogs, then held Police at bay with his scope equipped rifle;

17) A 2012 church shooting in Aurora, Colo., was stopped by a member of the congregation carrying a gun.

I leave you with two things, the first being: In Australia, where total gun control has been enacted (confiscation to establish an almost completely unarmed public), in 2011 there were STILL 94,000 shootings that took 29,000 lives… with not one civilian able to defend themselves. In America, the one spot where gun violence is rated worst, oddly enough, is the District of Columbia. Let’s compare:

There, the 2011 death rate by firearms was 12 deaths per 100,000 population, and that’s in a country where gun ownership is 89 guns per 100 adults. Compare that to Australia where it is now roughly 6 guns per 100 (est. by using UK provided figures), where deaths are 131 per 100,000.  Does that sound like gun control works as proponents claim?

To get that information in media, of course, I had to go to England, because the American press won’t tell you the truth about such things. They got their information from FBI, which any US paper or news network could just as easily have done… but actual investigative reporting would not help government take away your gun, would it?

The second is this: Out of 10,650 murders by gunmen in Virginia, only 4 were by persons who had legally registered with concealed carry permits.  Criminals don’t need or seek permits, of course. These four deaths by legitimate ‘gun toters’ would seem somewhat balanced by the fact that there are about as many instances, the most recent being the Clackamas Mall shooting… where persons with concealed weapons elected NOT to use their gun to shoot at gunmen engaged in murder because they did not feel they could safely do so without risking hitting innocent persons in the line of fire, or return fire hitting such persons behind them. That is part and parcel of good gun handling safety training, which all firearms owners should be required to have: my idea of a ‘gun control law’ that might actually work some good.

But personally, I’d rather have open carry… I’d even be moved to wear a six gun and cowboy hat if the 1875 Colt .45 hadn’t been stolen from my family some years back (when I did wear it in public on occasion). Open carry is a silent and untold deterrent to gun violence. In Cuba, there is no standing army, because every capable citizen serves in the Defense Force (like the National Guard), and is issued an AK-47, side arms (many people pack), and even grenades. Result: LOW CRIME, and very few murders by these weapons. The same is true in Switzerland (different weapons, of course), so it has nothing to do with Communism, that it works.

Statistically, in the Old Wild West where wearing a gun was the norm, gun violence was also relatively low… (e.g., the murder rate per capita in Abilene was lower than any modern US city, today). There have probably been more shooting victims in TV and movie westerns than in real life in the old West. When almost everyone has a gun, politeness rules; even when confronting someone in an unpleasant situation, it was done with carefully chosen words.

SIR, I believe that Ace up your sleeve proves you are a card cheat — and the pot is therefore mine, unless you wish to object?” Given the choice, most villains would back down unless the odds were significantly in their favor… which gun control laws will surely provide them, one 2nd Amendment-eroding law at a time.

The Clackamas Town Center Shooter… me, my family, and friends


This one came closer than I’d like to those I love… and requires we make comparisons to Aurora.

Permission to repost if in entirety with all links in tact and credit to author H. Michael Sweeney, and the original blog at proparanoid.wordpress.com
Clackamas shooting compared to aurora shooting

Reading this post you will learn:

a) How the Clackamas shooting relates to me and people I love, personally

b) How it relates to the Aurora Century 21 shooting

c) That like Aurora, there are still mysteries and questions to be resolved

When the Mall finally reopened after the Police investigation, our family all went to the Mall and expressed our moral support. They had a nice Candle light vigil, and there was a group singing Christmas Carols. A lot of people had tears in their eyes, including me. We hung a Star on the tree in Memorial for victims and their families. I wrote simply, “Hope, Love, Faith, Life.”

I also recorded a music segment and sent it as a text message to a dozen people I thought would appreciate it. It ‘spoke’ volumes about coming together as a community and going forward under duress. But as it happens, this event was a bit closer to home, and some of my tears were not just for those reasons, but because of more personal details.

As an author and consultant on privacy and security matters, as well as abuse of power issues including crimes of the New World Order, I should be used to such nastiness by now. I’ve been involved with investigations or other direct confrontations resulting in capture and prosecution a whole range of bad guys, including going head-to-head with terrorists and dirty cops, with three and perhaps five attempts on my life for my trouble. Read about it.

But no. I’m not used to it.

My wife has come home to find Men in Black fleeing our home using walkie talkies. People have tried to break into our home while we slept three nights in a row, and they did eventually gain entrance while we were away and ‘did things.’ I could spend an hour telling you about one man (a Parole Officer) who, with his coworkers and Bounty Hunter friends regular followed us… followed us to a birthing class where we observed him covertly meet with a member of the class who tried to get friendly with us… later identified as a Naval Intelligence Officer.

I was investigating the Flight 800 shoot down at the time. I could go on like that for some time, actually, with endless tales of Men in Black, FBI, CiA, Secret Service, and even one confirmed NSA and MI-5/6 spook. Even today there is the odd event, because I often cross swords with client opponents, often some of those same players. Despite all that, I’m still not used to it.

Aurora shooting compared to clackamas shooting

About Clackamas Town Center

Clackamas Town Center, a few feet from where shooter entered complex (from their site – click)

One of our twins currently works at Sears at one end of the Mall, as did her husband until recently. The other twin works at Penny’s, at the opposite end of the Mall. In the center of the Mall on one side we find the Century 21 theater and its adjacent food court where the shooting is said to have taken place. Opposing this, is Macey’s. Both my Wife and I used to work there… and my Sister-in-law subsequently works there, now.

The story goes this way: on Tuesday, Dec. 11, a young man whom I will not honor by naming, hurriedly left his car in the parking lot and rushed to the Macy’s exterior entrance, dropping at least one ammunition clip as he went. He was carrying an AR-15 .223 rifle almost identical to the one used by James Holmes, and wearing a ‘white mask.’ Once inside, he ran through the store attracting much attention and causing some due concern. About four seconds after running past my Sister-in-law at the Cosmetic’s Department, he opened fire. It was 3:27 PM, according to a cash register transaction at the same instant. Police say there were easily 10,000 people in the Mall at that moment. Shudder.

At 3:27 on the day before, I had been at the Mall, myself. I was in the food court where I struck up a conversation with the young woman who ran a cupcake kiosk at the edge of the food court closest to Macy’s interior entrance… where the shooter would be appearing the next day. Had I had that conversation on Tuesday instead of Monday, I would have observed first-hand the shooter as he skid to a halt and prepared his weapon, and opened fire:

He shot a woman in the chest and killed her, likely instantly. She was Cindy Yuille, a Mother of 54 years who looks very much like my Sister-in-law, and is about the same age. I shudder. He also shot in that same instant a 15 year-old teenage girl, Kristina Chevchenko, who suffered serious injury but is thankfully now recovering. She looks like a neighbor girl, and actually lives within a healthy walk’s distance from us. I shudder. He then turned the weapon on the cupcake lady, and fired but missed. As I could have been there, and had spoken to her the day before, I shudder.

Other shots fatally took down Steven Forsythe, age 45, and Father of two. He was one of those dynamic and widely admired and loved individuals who seemed to be involved in everything good, including being a high school football coach.  He also lived a walk away, and was a personal friend and business colleague to one of my own friends and business colleagues. I shudder.

The shooter, it is estimated, fired some 60 rounds before fleeing and, perhaps at seeing Police were closing in, took his own life. Early in the shooting, just as in Colorado, his gun jammed. By the time he could clear it, most everyone had taken shelter, many into stores where employees were herding them into secure back rooms and locking everyone behind steel grates and heavy fire doors. Kudos, Clackamas TC!

Had their quick thinking and selflessness not been so…  had the gun not jammed… had the shooter been better prepared or not been wearing a mask to partially restrict his view…  had some people been confused by the echoes and run toward the shooter instead of away… I shudder.

Now, please allow me to change directions for making a couple of points. It was not that many weeks ago that one of my most popular blogs was on the Aurora shooting. I wrote it to raise 25 questions no one has asked, any one of which point to James Holmes as a patsy in a false flag terror event. I also revealed specific potential motives for outside parties to be responsible, with proofs of viability.

Aurora and Clackamas shootings compared.

Clackamas and Aurora Have Troubling Similarities

a) both alleged shooters were young troubled men with psychiatric problems (which we now hear again in the even more tragic shooting of 27 in Connecticut). This is a very tired refrain heard time and again in mass shootings, and there are reasons for concern associated with CIA’s MK Ultra and related mind control experiments;

b) both wore all black. One wore a gas mask and, sans mask, was ‘made up’ to more or less look like ‘The Joker,’ while in Clackamas, it was merely a ‘white mask.’ But there is a problem there, too: conflicting reports describe it as three distinctly different kinds of masks, and for some troubling reason, Police decline to confirm WHICH ~ a Michael Meyer’s Halloween Mask; a Jason’s style Hockey player’s mask; or a Guy Fawkes (We are Anonymous… expect us!) mask;

c) both used the same weapon, and AR-15 .223 variant. The weapon jammed and prevented more carnage;

d) both fled to no avail, which begs the question, why bother? Holmes just sat in his car and waited to be captured without resistance, while in Clackamas, the shooter took his own life. Police found him dead, sans reports of hearing or seeing him shoot himself, but why? Why wear a mask, and why run if you were going to kill yourself?

e) both incidents suffered conflicting reports as to the number of shooters seen and their whereabouts at any given point in time, implying a possible coordinated assault. In Aurora, there is considerable evidence this is so, but in Clackamas, at least thus far, we might presume it to be normal confusion causing misconception and mistaken accounts.

f) both took place in or at the virtual doorstep of a Century 21 theater. On first reports on Clackamas, I was very concerned about this particular coincidence, but am less certain it matters, now ~ because the actual shooting began in the area central to the mall at the edge of the food court, and the shooter entered from the opposite side of the complex from the theater. Had he intended to target Century 21, there was an entrance right there.

g) both enjoyed remarkably prompt Police response. In Clackamas, the shooter was not very bright. The Mall is located about one block away from the Sheriff’s Office, which also has a secondary presence right on the Mall lot with about a half dozen cars. In Aurora, the nearest facility was several miles distant and quite away from common arterials.

h) in both, Police were not terribly forthcoming with facts early on (SOP). However, mistakes made by Aurora Police in their public statements (see my post) were not present in Clackamas.

Still, with all these coincidences, I shudder. Doubly so because of the horror in Connecticut, a murderous rampage of which I cannot bring myself to write… except to say that I shudder to consider that three such shootings… four if you count the Sheik Temple shooting in Michigan… all within a window of a few weeks of the same Season… and all on the heels of a United Nations Treaty attempt to ban all firearms in civilian ownership.

Clackamas is a community of people with whom I share a happy existence in a beautiful and generally peaceful setting. Good people. So I shudder at the closeness and ‘what if’ nature of the Mall shooting as it indeed came all-too close to impacting my own family in even more personal and tragic ways. We were lucky. Others families and friends were not.

But I shudder also because all the communities where these shootings took place are like that… and in a country where government seems to be preparing itself for war with its own citizens and, in local preparation, would find any such effort a lot easier if there was some way they could ban all weapons and collect them, first. It is for my me and my family that I shudder, yes. But also, for my country and a thing called the Constitution.

Many people died when those shootings took place. But I fear the Second Ammendment may also be a casualty given the explosion of talk about gun bans as result, especially because of Connecticut… and in thinking it possible…

I do indeed shudder!

TOP 5 Reasons for, Signs of, Methods of, and Solutions for the Internet Spying On YOU


TOP 5 Reasons for, Signs of, Methods of, and Solutions for Internet Spying On YOU

The threats are many, sophisticated, and endless. Solutions need not include PANIC (usually), and are largely simple and inexpensive, though nowhere near being fun.

Copyright 2012, Proparanoid Press, H. Michael Sweeney — All rights reserved. Permissions to reproduce granted on request, only.
Top five reasons for Internet spying
 

English: Frame of an animation by the U.S. Fed...

This article is especially useful to the TI — the political control technology Targeted Individual, and any person who has reason to believe someone is actively trying to snoop their Web activity or who deals in Web activity of a highly sensitive nature.

My approach to addressing security and privacy is not merely talking about the threats to educate, but how to detect if one has a problem, and then to provide a functional solution. It’s one thing to educate, another to illustrate, and yet another to resolve. Only by all three, is the end result adequate, provided there is no failure along the way which impedes.

Reading this (lengthy, but in outline form so you can quickly navigate to areas of interest) article, you will learn:

• There are 5 basic kinds of privacy compromise/targeting to worry about;
• There are (often) 5 symptoms or clues targeting is taking place (when not blatantly clear);
• There are (often) 5 basic methods of carrying out such targeting;
• There are (often) 5 things you can do in defense or response;
• There are some very reliable and free Open Source tools which can help reduce risk;
• There are some new and potent tools for those more concerned or more at risk of targeting.

By way of introduction, I write as published author and consultant, lecturer, on privacy and security matters, abuse of power issues, and political control technology. My purpose in writing goes a bit beyond the obviously important educational issues, or even the somewhat obvious self-promotion of my books. That is because I, with the help of others, have subsequently developed some specific tools and services which additionally address the threat to privacy and security inherent in daily use of the Internet.

One of these is a completely secure email alternative called NeVir Spies, and a new concept I’ve temporarily called Web Walker which provides a totally secure Internet alternative with some very unusual features and capabilites which go well beyond the topic at hand. More on these tools at article end — very informative.

That said, there are many people much more savvy than I on WEB security (as opposed to real-world security problems). So, if after reading this, you want to know more, there is likely better advice than mine out there, especially if you prefer it more technical in detail. This post, however, I’m betting, is the most centralized one-stop reading resource you are likely to find, and it therefore covers more bases, more comprehensively, in general.

And, speaking of ‘general,’ some general advice applies to all Web security issues, ‘in general.’ It’s all common sense, of course, and you’ve heard (most of it), before, but I’d be remise if I didn’t include it here in case you have not:

• Frequently change passwords and if anything odd is going on, change ALL passwords.
• Do NOT use simple to remember passwords based on ANYTHING about YOU, and DO NOT use answers to security questions ABOUT YOU. If you must use simple to remember passwords and face security questions, base them and the answers on someone famous who died long ago, someone random. Then all you have to do is remember their name, and go look it up on the Web if you forget the hard part.
• Avoid writing passwords down, because you should…
• Remember that your computer security is only as good as security of access to your computer. If anyone can get to the computer, there are many things they might do to compromise its security, obtain passwords, etc. If it does not stay with you or reside on the other side of a pickproof lock, it is at some risk.
• REGULARLY run your Norton’s or similar.
• Never respond directly to an ‘official’ email from any account requesting verification of information or asking you to log in using a link unless you were expecting that exact email to arrive. Manually use the Browser to go to the site and log in.
• Never undertake financial transactions or fill out informational forms involving personal information at a Web site unless the url starts with https:// instead of http://. That little added ‘s’ tells you it is Secure by means of several means not present in general surfing.
• Avoid downloading files or programs from unfamiliar sites of questionable repute, especially when they are in other countries and the topic is something you wouldn’t want people to know you were interested in (i.e., porn, drugs).
• Never put a long list of email addresses in the To: or Cc: blanks unless those people are already conversant collectively (do not assume just because you got an email with that long list that this is so). Instead use Bcc:, or you violate THEIR privacy. Tell everyone you email to to never include your email on such a list unless Bcc:
• Never give out someone else’s email contact unless you get permission for the introduction — just as if it were a phone number. Offer instead to pas the email addy of the inquiring party along to the person in question.
• Here are ten more technical things which you should be aware of explained more fully at georgedillon.com, (linked for you, here) as they deserve their own explanations (I especially endorse ‘Do not trust Microsoft products,’ including their operating systems. Historically and almost consistently, in addition to select spying instances of actual on customers by Microsoft itself, they are poorly designed with respect to security issues and hackers/attackers take advantage. They are the primary source of the great weakness of PCs compared to Macintosh for security and reliability, and the reason so many security steps and layers are advised: 
 

Top five reasons for spying on you

5 Top Reasons For the Internet Spying on YOU (etc.)

It happens to us all, every time we use the Web. Most of it is undetected, and generally harmless. Too much of it eventually bites us in unexpected ways beyond our control. Some of it is dangerous, even beyond the draining of checking/savings accounts or total identity theft.

Most of it we volunteer unthinkingly, especially with what we do on social networks like Facebook, which is a giant spying mechanism of great social usefulness to us, and a goldmine of information to corporations and government. Every single mouse click, almost, is giving away information.

Some information we have stolen from us despite the care we think we have exercised, and that would seem to most of us to be rather rare, but I happen to know that more of it goes on than we hear about, and we are often victimized in ways which we do not detect, and do not realized have harmed us, or their potential to do so. Some information is used against us in ways that are part and parcel of further assaults on privacy and security. Read on…

1)   Criminal Financial Gain. Everyone is a potential victim, and we all get shot at in hopes it will be us. Before you can be Phished (tricked into revealing confidential information), they have to know you are an Netizen (a WWW user) and where on the Net you are (your email, social network and Group memberships, etc.). So they snoop you out, and then snoop you for vulnerability (i.e., lack of paying full attention or even gullibility), and then phish you or attack with a virus or similar technical assault; Signs, Methods, and Solutions:

a. You get email from someone you know which promotes (something) which urges you to open a file or take an action, but which is not quite like what they would normally send, and the message accompanying it is overly simple so you can’t tell if it ‘sounds like something they would say.’ This likely did NOT come from them, and means yours or their email account has already been hacked or, far less likely, both theirs and your email addresses were obtained from someone else who was hacked. If you open the item or take the actions urged, you risk your email account or computer being hacked, infected with a virus or similar, or becoming a Scam victim via participation; What to do about it:

i.   Do not take the actions suggested, therein. Natch!

ii.  Contact your friend and advise them their system (or a friend’s) has likely been hacked, with explanation. They should change their Web passwords and run their Nortons or similar. You should do the same (do it regularly, at least). Macintosh users may yawn at this notion, but we are not completely impervious from suffering system issues resulting from failed virus attacks and eventually resulting in unwanted operational inconveniences.

iii. Delete the offending message, unless your friend confirms they really did send it, and you care to follow up with it knowing it actually safe.

iv.  Advise your friend that they should notify everyone on their email list of the situation to insure they do NOT respond to the described message, with apologies if they should have been a recipient.

v.   Contact all your other friends via all avenues (email, social networks, groups, in person) with similar warnings that such a message is dangerous and should not be acted upon regardless of who it seems to be from.

 b. You get email from a stranger (as if they know you or perhaps accidentally reached you through a typo) or a ‘company’ similar to the (a, above) in nature. Often, it will be a message indicating some action or obligation has been taken on your behalf which you do not want, such as confirming an order for Pizza, an airline reservation, subscription, etc. Or, it may simply be annoying SPAM. This is likely a snooping expedition and may be a phishing attempt, as well; What to do:

i.    Do not respond, not even to unsubscribe to SPAM (unless you repeatedly get the same offer from the same address). Such risks confirming your Netizen existence and defines you a working target, or worse, directs/redirects you to a phishing experience.

 ii.   If concerned the obligation really did take place, go directly to the Web site of the entity involved and research it there. Often, you will find they have options for reporting fraud, phishing, etc. Document (screenshots, copy/paste/witnesses) what you find/do, so you can get out of any wrongful obligation the turns out later to be existent, after all.

iii.  Create a filter in your email Client or Web mail options to block similar messages based on key word content and sender information.

iv.   Keep the message for a period of 90 days in case of unexpected consequence to be used with your documentation from step (ii), above.

v.    Same as step (v, item a), above.

c. You get a message from a stranger who wants to help make you rich, is sexually or romantically reaching out, or has some kind of deal too good to be true;

i.   Same as steps (i, iii and v), above.

ii.  If the message names a legitimate business or agency, consider step (ii), above. The Secret Service has a Web site for such complaints as well. However, IMO, they simply gather statistics and seldom do much more with the information. I have more information about how to detect and defend against this type of fraud at my Web site than do they — and in glorious color to make it easier to absorb.

iii.  Same as step (v, item a), above — but you need not do so every time, you simply want the general warning out there as an educational exercise.

d.  You get the famous Nigerian Scam (aka 4-1-9 Scam). Someone rich died or some other event has caused millions of dollars to be in limbo and someone who just happens to have access to it also just happens to come by your email address and wants someone to help share that money with him through some simple sounding and fail-safe scheme. They always ask for information about you. There are many other clues and signs, as well as the link (above) to my Web site.

i.     Same as all steps in (c) above.

e.  Variations of the above (a through d) delivered not by email, but via a social network or Group posting;

i.  Same as if from email source, except that the social network or Group may have special reporting options as well; such as a moderator to whom it should be reported.

Figure from actual Google Patent Application; Providing digital content based on expected user behavior.Got it?                                      I knew you would understand. My job here is done.

2)   Commercial Financial Gain, at your expense in a quid-quo-pro sort of way. Everyone IS a victim in that same way, or worse, but it is completely legal. There is zero information about you which is not valuable to someone for this purpose, and it is therefore a commodity almost every major player seeks, uses, trades or sells to make money based on the definition of ‘You’ and your preferences, likes, dislikes, and habits; Signs, Methods, and Solutions:

a.  You get SPAM email or Web pop ups or ad banners which reflect your general interests, either at the moment (e.g., you are searching for something the ad relates with), or overall interests;

i.   Web search engines use predictive marketing analysis (aka predictive analytics) about your search terms and what they know about you already through prior uses or shared information to ‘guess’ which of their advertising clients will most likely earn your business with an ad;  consider using a Web Anonymizer  (see separate dialog at article end) which veils your identity altogether . However, this will mean that your favorite Web sites will not know it is you and will not support auto-log in for account information, custom settings, etc. That does not mean you cannot manually log in and continue normally from there, unless an extremely secure site such as a Bank.

ii.   Many Web sites use analysis of what pages you visit and how long you stay on a page, and what buttons you click or roll the mouse over… also in predictive marketing analysis; not much you can do about that short of not going to the Web site — but it’s a matter of quid pro quo. You get something about them from their Web site, and they get something about you for your having done so.

iii.   Each Web site you visit may exchange ‘cookies’ with you, which are data bits which allow that Web site to recognize and acknowledge you as a prior visitor to when you next return, which in turn can further reveal what you like for predictive marketing purposes; consider turning off your Cookies option in your Browser Preferences. However, doing so will mean your favorite Web sites will no longer recognize you when you return, and auto log in, custom features, etc., again won’t work properly. So you have to remember to turn them back on if you want quid pro quo benefits.

iv.   Some Web pages may contain ‘pixel bugs’ (aka Web bugs, picture tags, pixel tags) which sense your presence on the page and reports that information (to someone). Pixel bugs are sometimes covertly placed without the page owner’s being aware, but more often, they arranged for it as partners with some third party. This works like cookies for marketing purposes, but can be more powerful. They are built into the graphics which make the page visually or informationally attractive. Often, a graphic thought to be popular is ‘bugged,’ and placed on the Web for others to copy and use, greatly amplifying its value; learn more, including some technical defensive options, here.

v.   VERY DANGEROUS in some cases: Many software downloads and some purchased software contains back door reporting routines to monitor what you do on your computer (may be limited to a given type of activity, such as Browsing, or specific matters related to use of the software, or may be more invasive, including obligating you to things against your best interests, sometimes with a financial impact). This has in the past been especially true of certain free games, on-line TV watching utilities, select computer utilities, and even major purchased software packages and operating sytems (yes, even big firms like Microsoft); READ the fine print in the user agreement and know what you are letting yourself in for (the nature of what they consider quid quo pro). Note: some illegal use of this method has been encountered, where the compromise of privacy/security was NOT mentioned in the user agreement, essentially converting the package into a virus in function. Know the reputation of the source, search the Web for complaints (but remember, no one makes a product that does not generate complaints from someone about something, and that often, problems arise which are user/user system specific because of unique configurations of their system or usage — so READ the complaints for relevancy to your use and privacy concerns).

map

From Excellent Network World article (click): ACLU Report: Spying on Free Speech nearly at Cold War Level

3)   Political Gain, often in opposition to your best wishes. Identical in nature to Commercial Financial Gain, but used for political purposes to sway opinions, most often with disinformation calculated to target what defines ‘You.’ Your opinions are shaped for you in subtle ways. It is a form of Political Control Technology. This often leads to item number 4, below, where you fail to bend and your bending is deemed extremely important; Signs, Methods, and Solutions:

a.  Also the same as Commercial Financial Gain, except that you can more easily be aware of and control your interaction with political topics most of the time. The tricky stuff is the disinfo built into what should otherwise be nonpolitical in nature. Everybody has a belief structure, and it easily finds its way into whatever they write with or without their conscious intent, but there are people paid to write things ‘off topic’ in ways which infect on purpose, and with great scientifically calculated psychological impact;

i.  In addition to thoughtful reflection (be wary, think logically and critically), it may help you to read up on the 25 Rules of Disinformation at my Web site (my most popular document with tens of millions of downloads).

b.  In Groups and Social Networks, you can count on ‘packs’ of members or friends participating in calculated diatribes, often staged arguments egging you to join in to get your views and or to alter your opinion. Often, the group is actually one person, a trained specialist (cyber troll) who has multiple fraudulent identities for the purpose, any one of which can troll for people to suck into more focused dialogs sans any need for staging an argument, but they usually join in at some point to ‘confirm’ the ‘validity’ of the preferred message;

i.  Same as (a, above), but actually, its easier to detect, even laughable.

4)   Political Paranoia, outright spying on you out of fear of what you believe or might do in their wildest nightmares of potentials. If you are an activist or outspoken in ways not in synch with the mainstream (politically incorrect) on ANY TOPIC, have participated more than once in a given topical protest movement, visited an activist’s Web site or site of the politically incorrect, YOU ARE A POTENTIAL TARGET. Governments (all of them) so covet their power that (most of them) feel any dissent or opposition must be presumed a threat and dealt with before it can actualize. This all too often leads to item 5, below; Signs, Methods, and Solutions:

a.  You find a sudden burst of requests for new social network friends or members to your group, and the dialogs/posts resulting soon thereafter tend to be inflammatory or inquisitive on political beliefs. Or, you find them somehow magically added without requests, or the requests read ‘secret request’ or some other no-such-thing-exists. You may also find others simply seem to dovetail perfectly with your beliefs with continual favorable commentaries to your own, someone trying to get close enough to you to pump you for information, later. These efforts can be as insidious as agent provocateur in nature, and/or attempting to build a comprehensive psychological profile of you for further targeting (item 5, next); What to do about it:

i.  Same as (a of item 3) above (be wary, reflective, and think critically);

ii. Do not REACT instinctively to inflammatory matters. Stop, Think (what is really going on, what to they really want), ACT (according to your best interests) — ACT, don’t React. This is a good habit to employ in ALL DAILY MATTERS as it will keep you out of needless arguments which harm relationships and impede daily progress. I wish I would follow this advice!

b.  You have a sudden explosion of SPAM and Phishing email, and the like. This may be an attempt by an Agency or Military cyberwarrior to infect your system with a spying virus for their own unique purposes. It can happen for other causes, too, of course, and is not a conclusive symptom in and of itself. But it is often coupled with curious events in your life and environment which imply some form of snooping in the real World; surveillance, following, surreptitious entries, odd telephone behaviors, etc.  This would be an escalation step less frequently employed — a preparation for (item 5, next), and most certainly part of it;

i.  Please consider my book or ebook (ProparanoidPress.com), The Professional Paranoid: How to Fight Back If Stalked, Surveilled, Investigated Or Targeted by Any Agency, Organization, Or Individual.

ii.  Review some of my other blog posts based on the book:

      1. In the Rearview Mirror: When You Think You’re Followed;
      2. Your Cell Phone is a Government Agent Spying on You.
      3. You find more sexually related outreach or SPAM than normal, or PORN related popups at the oddest times and places. Someone is trying to develop a psychological profile on you. See item 5 for a very caustic example of how dangerous that can become;

iii. Consider a one-time adventurous response to determine if it is targeting of this type, or generic SPAM/marketing outreach unrelated to spying as such. You WILL encounter unpleasant material by prurient standards. If it is spying related, there will be subtle signs. Again, see (item 5).

iv.  Do NOT respond at all (and for any such event where you elected option (i), above), delete or block sources where possible, as well as the specific message. Complaints may be in order if there is a means of contact, such as the Social Network or Group moderator.

NOTE: Any of (items 4, above, or 5, below) may additionally mean the FBI, CIA, DOD, or NSA (and variously other agencies of government, both foreign and domestic, as well as corporations, and criminal groups they partner or compete with) are specifically targeting your entire Internet activity (and beyond) by any number of means:
      1. All have admitted to or have been reported as employing signal capturing and analysis methods. A van can park near your home and capture router signals, or even just the RF (radio frequency) signals generated by your computer, in which case whatever is on your computer screen is on theirs. If you have a Cable or Satellite, or Microwave ISP source, those signals can likewise be intercepted and analyzed, either at your home, or at the ISP’s location. There will be varying success levels with the analysis attempt, and not everything will get through. Your phones and fax systems are subject to like attack capabilities, as hinted at in the above linked blog post.
      2. Most of these government bodies are not above employing virus attacks by conventional means. Just because you get a virus or were phished, does not mean it came from a criminal. It might be Men in Black, with or without legal authority, with or without official cause.
      3. FBI (and others with like tools) can obtain a warrant to install Carnivore or similar software at your ISP to gain complete access to your email, directly (and as many fear, everyone elses’ email going through the ISP). These warrants are incredibly easy to obtain. The new unconstitutional blanket warrants are even easier to get, and cover (everybody, more or less).
      4. Often warrants are not even necessary, especially with the larger ISP firms of the telecommunications industry flavor (think cellular), who give away information just for the asking if it comes from ‘the good guys.’ Many of these firms consider themselves extensions of the Federal Government for all practical purposes, and many (including Facebook, Google, et. Al) are invested in heavily by the intelligence community (CIA, most notably) who, in exchange, is granted unusual access to information and system control (ergo, they become weaponized when desired).
      5. The Internet was created by the military and ‘given’ to the public for use. However, the handful of key firms which constitute the bulk of infrastructure tools needed for the Internet to even function are essentially military-intelligence community contractors, which provides yet one more tool in the government’s spy arsenal.
      6. Internet 3.0 (a nickname for the effort to ‘improve’ the Internet by Congress) in the name of cyber security is eventually going to get past Constitutional roadblocks in Congress and will become a major censorship and spy tool for all government levels and agencies. If you have no clue, learn about SOPA and CISPA. See the closing section of this post for a breath of fresh air and relief.
      7. The Internet Kill Switch (another nick name — each government on the Planet wants one, including the United Nations) is likewise such a tool, one likely to be thrown whenever government does not like what we are doing (e.g., Occupy, especially after seeing what the Internet did to help overthrow Middle East tyrants), or want us to know what bad things government is doing (e.g., Martial Law, military takeover, extreme blunders that kill or destroy massively, etc.). The closing section addresses this, as well.

5)   Political Control Targeting, where you are deemed a viable threat to an agenda or cyber-powerful governmental (hey – I got hate mail from the Clinton White House and enjoyed much Web sabotage and other fun things while he was in office… and while Bush before him… and Bush after him… and Obama, now).

This means they fear you and feel they must deal with you more proactively, typically because their spying has revealed that other people listen to what you have to say and believe you, or your opinions are thought simply too dangerous to be heard (like many of mine, nasty truthsayer ‘terrorist’ that I try to be). Truth is oft seen as a thing too dangerous to be allowed free expression which might enable and empower a fully informed public, and must not be allowed to contaminate the lies of an errant government and/or a controlled media;

a.  Your social network starts having a lot of unfounded complaints against you resulting in curtailed services or functions, having to repeatedly provide your password, etc.;

i.  There is usually no recourse whatsoever, though I tend to ask my friends if any others are having the same problem, and complain so they understand the Social Network in question is infiltrated by government spying and engages in political control targeting (Facebook, that means YOU).

ii.  See this blog post for more detail on Social media infiltration and solutions.

b.  You start getting denial of service BOMBS — posting bombs to your social network or group, and/or email bombs to your email, which make it next to impossible to actually make good use of them for their intended purpose. I can get over 100 posts a minute, so by the time I see one from a legitimate friend to which I’d like to respond, and finish my current activity that I might do so, it’s scrolled off pages and pages away from access and very hard to find, and puts me thousands of posts behind in any attempt too keep  up. In email, it will be SPAM bombs (and watch out for that especially when it comes time to renew your Web domain name or other key matter — this is a tool to get you to fail to see the advice notices that you must act soon before the expiration date, and is how Web sites are hijacked by Men in Black;

i.  Same as (a), above.

b.  Porn redirects, where you find yourself unexpectedly at a Porn site, or by intention, end up experiencing the phenomenon referenced in item (4) above, which IS a psychological profile being run on you. A variation may be porn content or links magically appearing in your own Web content, or other signs of criminal hacking. Its not that uncommon, actually — just ask yourself, who benefits to figure it out;

i.  Consider running test to see if it is a psychological profile attempt (WARNING, if so, it should prove to be a disgusting experience). I suggest documenting the effort as described in (b of item 1), above, for your own protection. I’d tell you to use an anonymizer, except that if detected to be in use (easy to do), the test will fail:

      1. A step you may need to repeat six times or so before the answer is revealed: arbitrarily choose a link at the porn site to access specific content offered (a pic or vid). OK if that’s where it takes you, return and try again. But…
      2. If it instead takes you to yet another Porn Site, it may be a profile attempt. Now undertake step one at this NEW site. Again, repeat up to six times.
      3. If by the sixth new site you still remain conscious from the visual assault on your moral sensibility, and you have thus far encountered nothing but ‘normal porn,’ with nothing seemingly illegal, you are NOT being profiled, but simply a (would-be) victim of PORN scammers who make money off of redirects. The kind of site a porn addict would abhor but puts up with when encountered and abandons after experiencing multiple redirects.
      4. To make clear, if you INSTEAD start to see bestiality, torture/rape, pedophilia type images, congratulations: you have reached a CIA operated Web site (by some accounts, they have thousands of such sites). Don’t worry, it won’t land you in jail. That’s not their agenda. But if you continue to click on images, your sexual profile starts to be built. Once it is in hand, it may be used at some point to manipulate you or to target you with blackmail, etc, or sexual outreach intended to compromise you. So naturally, you shouldn’t click on those images. Hey, shame on you for even being there in the first place, right? Um… what was that URL, by the way?
      5. IMPORTANT. You cannot trust these and many other porn sites. Just visiting one can result in attacks on your computer’s security and your privacy, such as makes running Norton’s or similar IMMEDIATELY after the test a wise step. Again, Macintosh users should DEFINITELY take this advice regardless of the reliably resistant nature of their system. DARPA, the Defense Advanced Research Project Agency, undertook a special program evaluating the security of the Macintosh Operating System looking for ways to exploit it. I’m thinking they didn’t find any, given that no one else really has in the last three decades, but what does that tell you about governments potential intentions to spy and capabilities?

c.  You discover that at times, you can’t locate Web content that used to be there, can’t reach people by normal means, or you hear people can’t find your content, or reach you. It could be a Web glitch, or it could be that your Web activities or content is being selectively blocked, a form of sabotage known as black listing. This, too, can spill over into the real World — welcome to the daily life of being a TI.

i.  Its usually done at the Server level, so it can be at your ISP or the host ISP to your intended destination or recipient, or an intervening ISP between the them (most Web activity will relay the data through a daisy chain of a number of ISP servers making up the ‘Internet’). Start by contacting your ISP, and asking the destination/recipient to check with theirs, if you can find a way to make contact. Any decent whois service (enter whois in your search engine) can help with finding a way to reach someone.

ii.  You can employ a tracking utility to see where the series of relays between ISPs comes to a screeching halt, and contact them. I like VisualRoute because it is highly functional without requiring geek knowledge, but supports geek use, too. It can also help spot eavesdropping in the data stream and address other Web technical problems. Learn more here. There are a lot of other good ones out there, and computers have some built-in capabilites, per this video lesson.

d.  You should, with confirmations of any of the above, consider yourself under a full surveillance net, even though it may not yet be true — you need assume it true or soon to be true. Your home has been or will very likely be entered into covertly, bugs and or cameras placed, and you may eventually become targeted with electronic weapons (that is another topic altogether);

i.  Contact me immediately for a free Helps Kit and some free online consultation (its what I do). Do not outreach to authorities of any kind, as it is intended you do so that you might officially earn the label of paranoid, or worse. It is a means of discrediting you and part of an organized effort at making you a political, social, and ultimately, financial zero.

ii.  Increase your levels of awareness and review and improve security at home, work, and your vehicle. Talk to your family.

iii. Get my book, The Professional Paranoid. Natch!

iv.  Install a Primus pick proof lock, a lock designed for government needs and so good that government does not want you to even know it exists, and thus, the manufacturer (Schlage) does not talk about it, and their dealers (well established Locksmiths, only) try to sell you an alternative when you ask for it, even though they make more money on the Primus. Also, not all dealers are authorized to sell it. I have a long dialog on this topic with clients.

v.   Keep up whatever you are doing, because it surely must be Good in the Face of Evil, or you would not be targeted in the first place. Unless you continue to fight it, Evil will only get bigger and stronger — and worse for you, others like you, and our future generations. Do not fear them and their cowardly tactics. Remember it is THEY who FEAR YOU and your BELIEFS, and what you have to say or do about it so much that they are willing to risk revealing themselves as the true sociopathic fascists they are.

Top five solutions for Internet spying

Other Privacy Solutions Available

I mentioned Anonymizers (not to be confused with or thought affiliated with the group, Anonymous). This is a tool which can be free or for fee, can be undertaken by simply visiting an Anonymizer Web site and ‘activating’ anonymization per instructions found there, or by use of software they provide to turn it on or off at will on the fly. What it does is it strips away all elements of your basic user identification information, such as cookies and much more, and replaces it with their own, generic version. Thus when you subsequently visit ANY other Web site, it cannot possibly know anything personal about you other than you may volunteer once you arrive. You can play with one to see what it is like with and without use at anonymouse.org.

They don’t always have desired results, because a given site may refuse access for cause, or fail to function fully, or slow down a notable degree. Not a huge problem. The real problem is not that, but trustworthiness. There are a lot of anonymizers out there to choose from, some with very slick Web sites and marketing programs, which in my book, does not mean anything regarding trust, and if anything, is a mark against more than for trusting them. Perhaps I’m just living up to my name, and being ‘paranoid.’

But within a year or so of their first appearing on the Web by nobodies anyone ever heard of, and their popular use, they started going by the wayside and being replaced by newcomers, or merged or were taken over by other firms, and ‘improved’. To my way of thinking, governmentals and other smart people with agenda of their own, have sought to replace them or compete with bogus anonymizers which allow only THEM to see what you are doing.

Think about it… and how easy it would be to arrange, and in realization that if you don’t want others to know what that is, then that information may reflect something extra valuable, or which dovetails with someone’s agenda or political concerns. So they bait you, seeing you as perceived bad guys or as potential targets for (some agenda-driven purpose) to use their service that they may spy on you effortlessly. I’m especially wary of those based on downloaded software, which could afford additional backdoor access to sensitive information. I know there are good ones that can be trusted, but I have no way of knowing one from the other, for sure. Ack!

There is only ONE clear-cut exception I’m aware of, though any of the original firms going back to the 90’s in dating are likely OK, today, unless taken over or merged by some other firm, in which case I get nervous, again. The exception is called TOR (The Onion Router), which is Open Source. Open Source means public code that anyone can read (with some technical skill), and that being the case, it can’t be tampered with or contain threats to security without being detected and reported (that’s one advantage, the other being that it is FREE).

Yet TOR has its own inherent problem which should ALSO be addressed if used to send secure information such as an email message: you should additionally provide some form of adequate encryption of that content. This is a bit of a non issue with respect to simply visiting and using Web sites, however, though using a regular anonymizer AND Tor should likely make such visits even more secure. Learn more about anonymizers,  here, and more about TOR and the encryption issue, here.  Then there is also the greater issue of anonymous email, which you can learn about, here.

With regards to Encryption, that topic also deserves some comment. Your email service provider, likely your email client (e.g., Outlook) and Web mail (e.g., gmail), almost always provides for some level of encryption for security, much of it essentially functionless to sophisticated spying groups like government. I suggest that if you truly fear compromise of very sensitive data transmission over the Web, that you employ some heavier guns. There are numerous commercial products out there, but like anonymizers, I worry about built-in back doors with some of them. Once more, Open Source to the rescue: PGP (Pretty Good Privacy) continues to be a very popular and thus far quite reliable and easy-to-use solution. Learn more here.

Top five internet spying symptoms

New Solutions from Proparanoid

My approach to addressing security and privacy (de javu), to educate on the problem, provide a means to detect the threat, and find a means to resolve it. And also, again, I’m not particularly a Web technologist. So what follows are the results of a lot of thinking not just by myself with my approach in mind, but also with the help of people who know more than I do about Web security. We hope to advance the state-of-the-art in privacy and security.

NeVir Spies is nothing terribly new in the World, except with respect to how it is implemented and made available. It is in the category of a Virtual Private Email Network (VPEN), such as normally employed by large companies for internal email communications in an Intranet (a closed Web like construct for private corporate network connected computers). A VPEN is combined (for Web hopping between distant sites) with HTTPS, the secure form of Web servers (as opposed to HTTP, which are far less secure), to provide a truly secure email service with superlative features.

NeVir Spies is a variant on this theme with some added compenents which allow levels or layers of security and flexibility as the client may deem important. Like all commercially available VPENs, it is more costly than the free email accounts available with Web mail and through your ISP, who includes email with their monthly billing charges. It typically costs about as much as a good ISP, so using it effectively doubles your monthly outlay, but it gives you something the ISP cannot: assured email confidentiality, and some extra features in most cases. There is a lot more to know. Learn about it, here.

Now, this may sound strange… but don’t rush out to sign up for NeVir Spies right away, unless you have an urgent need. That’s because its about to get a whole lot better, thanks to my newest notion, now becoming a project in works… Web Walker:

Web Walker is a completely new and ultra low cost, fully wireless alternative to the Internet, itself, one which is ultra secure and private because it completely bypasses the ISP and telecommunications companies, and thereby, government. YOU become the ISP as well as the communications medium, in a very real way — and of course, you have no need of government involvement in that which you can legally undertake on your own. Even so, it remains compatible with, and is not intended (yet) as a complete replacement of the current Internet. Yet it affords a reliable replacement should the WWW be shut down or be compromised due to sabotage or natural disaster.

As an Open Source Project (OSP), it means free access — no ISP bill, though some nominal expenses can be involved in some cases for select users, and it can represent an income source for others, or the same select users. It does have some up front investment costs for some, but not all, because they might need to upgrade their equipment’s capability or perhaps have more of it if wishing to have more direct involvement.

That cost can be spread out among other users so as to seem negligible, which is where the nominal expenses and income are derived. As intended to be implemented, it will include NeVir Spies as an option, and do so in a considerably more economical fashion, and with a portion of the income going to offset select operational expenses to help keep Web Walker free to most users. In fact, some users will qualify for free NeVir Spies, and that’s why I’m not urging you to jump into NeVir Spies directly. However, it will be many months before Web Walker is available for general use by the public, so if your security need can’t wait… contact me now, anyway — especially since there will be ways to access Web Walker ahead of public availability in its testing and debugging phase. Guinea Pigs needed.

Web Walker, which will also need a new name, addresses EVERYTHING in this post one way or another, though it may not seem like it with superficial review. Its unique design will mean that even those users who might be deemed as system operators will not have access to the actual information transmitted (unlike an ISP or telecommunications system), and therefore, there will be no place for government to go with a warrant to access said information. It addresses all forms of spying and privacy concerns on the Web, especially political spying and targeting, and specifically addresses Internet 3.0 and the Kill Switch. Take a look at it.

If Hilary Clinton fears she and her governmental friends are loosing the (dis)information war (with citizens) because of the Internet, today, wait until they see what we can do when there is no way to use eavesdropping, tampering, or censorship to counteract it. Truth (the Pen) is mightier than Lies (the Sword). That’s Web Walker.

SPQR, PAX Amerikana: the Failing Roman Empire of the NWO


And why they must keep you afraid of (something) and distract you from the simple truth.

by H. Michael Sweeney
permission to reproduce granted if in full and with all links and credits in tact, and linking back to proparanoid.wordpress.com

SPQR, PAX Amerikana: the Failing Roman Empire of the NWO

SPQR. Design: Philippe Remacle.

SPQR. Design: Philippe Remacle. (Photo: Wikipedia)

At a root level, the United States governmental model is not that much different than that of the Roman Empire — especially today. Yes, I will be found to be generalizing in ways which take some liberties to make the point, but would hope the reader is intelligent enough to understand the reasoning for cause. Compare and consider:

• Both were/are based upon a Senate form of government (in Rome, they said ‘SPQR,’ which stands for Senätus Populusque Römänus — the Senate and People of Rome) headed by a supreme, all-powerful dictator with the ability to make his own laws regardless of basis in legality. We call them Executive Orders, they called them edicts from the Emperor who, in the declining years of the Empire, thought himself God. Hmm… you don’t suppose Obama…    ?

• Both were/are expansionist in nature based on superior military prowess applied in an endless series of wars to ‘insure peace.’ In Rome, they said ‘Pax Romana,’ which translates as ‘Roman Peace.’ For the Romans, conquest was early on territorial in nature and garnered slaves to build and maintain the Empire and establish a comfortable standard of living for citizens. For the U.S., early conquest was territorial in nature and garnered resources to do the same — over 140 military campaigns between 1776 and 1900, and more to come. Sure. Some were and would be righteous and just, but many were and would be contrived and questionable.

• In Rome, they declared neighboring peoples as ‘warlike’ and ‘barbarians’ to justify conflicts to subdue them. In America we declared the Indians and others in the same way, and even took land Canada had claimed by threat of war (54-40 or Fight!).

But it is the declining years where the similarities are more useful to the purpose of this missive, because America is clearly in decline, too. Let’s therefore go more slowly…

• Rome’s military was a fearsome beast which cost a lot to maintain, and which could easily overthrow the government if given a reason. For that cause, it was important to insure they were kept busy and constantly rewarded.  In America, the same is true. In point of fact, there was an early New World Order sponsored (the same powerful Fascist business elite as drive the NWO movement, today) attempt at a military Coup in 1934 which was thwarted largely by one man, Major General Smedley Buttler, USMC. More recently, four-star General Tommy Franks has stated that the next major terror event would result in a military form of government.

• Rome sponsored wars (‘Let loose the dogs of war!’) and allowed soldiers the reward of ‘Cry havoc!,’ a policy which let soldiers rape and pillage the conquered and keep a share in the spoils of war. In the U.S., the Military-Industrial-Intelligence-Media complex is rewarded by huge profits in the manufacture and sale of armaments and arms technology. The high ranking soldiers, themselves, reap their fortunes by taking seats on the Boards of Directors once they retire ‘with honors.’ Unlike the Roman military where one served until no longer able, most soldiers of today are short-term liabilities replaced every four years or so. Therefore, they reap no reward but that of medals for their valor, and perhaps a skill useful in seeking employment.

• In both cases, the taxes upon the people had/has become a great burden and the standard of living began to slip (brother, ain’t that the truth), and because money was harder to come by, less was spent in maintaining other important governmental responsibilities, the quality and operation of societal infrastructure began to decay, including the physical aspects made of stone, wood, and metal. That’s one reason why aspects of America’s transportation (bridges, mostly), water and sewer, and rail systems are in many cases on the verge of total collapse.

• In both cases, the people began to express dissatisfactions with high taxes and poor upkeep of civilization itself, and related woes, including the wars and the price of the military. Distraction was needed to keep the people happy. In Rome, they built coliseums and offered up gory gladiatorial massacres and theatrical entertainments. In America, they employed film and television technology to offer up unlimited access to pornography and artistic entertainments, and Grid Iron and other sports to replace bloodlust contests.

• And, in both cases, these distractions were not considered enough. The government saw that they needed to find a way to make the people see some outside threat as a greater threat than concerns over a failing governmental system. The only way power could be maintained was to instill a great fear, one so great as to justify a tighter Police State grip on the people. In Rome, it was the Huns of Germanic culture, and the Cicilian and Turkish Pirates of the Mediterranean. In truth, it was largely a non threat; the Huns couldn’t cross the the rivers and mountains which protected Rome, but the people weren’t told that.

Truth or Scare TV Show ‘poster’ (click)

In America, it has been a long list of like things… longer than you know (refer to this list of military actions which is from whence the counts are derived, herein):

a) In the 40’s and 50’s it was the Red Scare of McCarthyism and the Bomb which drove Nazi-style inquisitions and empowered Hoover and the FBI to become perhaps ten times as powerful as it had been before, and fostered the creation of CIA, the Department of Defense, the National Security Council, and the birth of mind control projects. We had WWII and Korea, and 24 other military actions. Television took root to keep us distracted with the likes of Lucile Ball, Bob Hope, Howdy Doody, the Mickey Mouse Club, and other mindless offerings (which I dearly miss).

b) In the 60’s and 70’s it was the Domino Theory and the Bomb (especially the Cuban Missile Crises), and ‘campus radicals’ which allowed the Military Industrial Complex to mushroom via Vietnam and 18 other military actions, plus a phony Drug War to allow CIA to profiteer, while at home the FBI and CIA ran COINTEL and COINTELPRO operations and gave us Watergate. We also learned about CIA’s infiltration and control of media via Operation Mockingbird, and how perversely they had sought after and employed mind control research. The Free Sex and drug culture kept many distracted, while the film industry began pumping out pornography to keep the less liberated distracted, and Television sold us consumerism for like cause on a scale no one would have thought possible. “Buy today, be happy (hold up box of soap next to smiling face)!”

c) In the 80’s and 90’s it was the ‘Evil Empire’ and off-shore and distant Dictators we had to fear, countered with an endless series of some 60 spats and more exotic entanglements like Iran Contra, Marcos, and Panama. The NSA made ECHELON a household word and we learned about FISA (actually a 1978 Act) secret courts that rubber stamped warrants to make political spying effectively legal — and trading of illegal political spy files by Police departments, CIA, and the Anti Defamation League/B’nai B’rith/Mossad (note: I was a victim of this!). It also brought us HAARP, the project born by a proposal ‘to control a billion minds’ by a Presidential Science advisor. Pornography escalated to video markets and strip bars are so commonplace that only live sex shows seem the unusual. But they’ve also learned they can distract us with news stories about celebrity sins such as skater knee whacking, football player knife slashing, and Royal weddings and the death of a Princess.

d) And that brings us to current history, where the idea of an endless war which can never be won was fostered; the terrorism ploy. Now this they are milking for all its worth. Police and Federal Agents are indoctrinated to the point of paranoia seeing ordinary acts as signs of terrorist behavior: you cannot take a photograph, pay for something with cash, write a school report or possess a bumper sticker which mentions Ron Paul, or cite the Constitution without being suspect of terrorism. You cannot go to the Airport (and soon, to a sporting event, theater, or public building) without being sexually molested by TSA. No remnant of the Constitution remains in tact, save perhaps the 2nd Amendment, which hangs on just enough to prevent total take over — the whole REASON it exists in the first place. And now pornography comes in over cable television, and live sex shows are becoming commonplace, and for the less prurient, reality television and the spread of lotteries and gaming casinos.

None of this makes real sense. Why should you fear a terrorist when excessive Police violence injures and kills more citizens in any given year than do terrorists in their best year (9-11 attack)? It is a bill of goods used to control you and keep you docile in order that the Military-Industrial-Intelligence-Media Complex can continue on its New World Order agenda, reaping in huge profits as they usurp more and more political control over you. They want us to fear terrorists. I say, let’s show them a form of terrorism they SHOULD fear; a free people who control their own government, as the Founding Fathers intended.

Unless you believe in and support PAX Amerikana, SPQR-style (are a Fascist), just say NO! Boycott the system at every level (be a financial terrorist): avoid banks, don’t use credit, buy used instead of new, repair instead of replace, refuse and resist GMO foods and grow your own, rely upon barter and cottage industry. Actually, there is an endless list of concerns similar to GMO. It would behoove you to learn about and resist conspiratorial NWO agenda projects like Codex AlimentariusAgenda 21Carbon Tax/Carbon Credits/Carbon Currency, United Nations Biospheres (and an endless array of other UN mandates), and the Canamex Highway and the North American Union via the Security and Prosperity Partnership.

Disobey government (be a political terrorist): insist on your Constitutional rights (for many of you, you must first LEARN what your rights actually are, especially with respect to dealings with Police and investigative agencies, and the court system) and go out of your way (be an activist) to do so; video Police (even if… especially if they pass a law against); employ civil disobedience and support Occupy and similar movements; write everybody in power and speak your mind; vote for no one who is not a Constitutionalist, a Libertarian, or an Independent (kill the Democratic and Republican Party Dog and Pony Show); write every media outlet to express your views and flood them with complaints over bias reporting, and write their advertisers threatening or actually seeking to boycott.

Please deem to review the 24 Planks post which attempts to highlight the changes needed in America to restore it to the strong and free country it once was. If you agree (or disagree) with any one of them, SO COMMENT on the page, tweet, share, reblog, and rate. THAT POWER is a right you should AT ALL TIMES exercise when you see something you like or dislike anywhere along these lines. How else will those who spy on us and those who (pretend to) serve us have good meter of our pulse and realize they had better back off a notch or two? If you do not express yourself, you have not learned the one simply truth: YOU are the one you’ve been waiting for to change what is wrong. Get busy, because they have an endless supply of Obamas and Romneys to take us further down that SPQR path to destruction.

Compare 1776 to 2012, and see where you really live, and decide if you are willing to accept that, or not.

Related articles

Proof Repeal of Posse Comitatus Will Establish Police State


A victim’s first-hand accounting of an actual illegal military assault on an American neighborhood with terror and abuse of rights

THIS IS INDEED A WARNING YOU SHOULD HEED!

Updated Feb. 21, 2013  Recent events cited below reveal the incident depicted here is currently being experienced wholesale fashion around the nation. There is little difference in neighborhood impact between the events described here and those which have been routinely put into action in major cities across America. And media tells us not. Local media, yes, but national media, almost always no. Ask yourself why that is, and then see if you think your news ‘fair and balanced,’ or if it more closely resembles the propaganda we always accused Russia of using in the Cold War era?
 
The only difference is that the current events are ‘military raids,’ not ‘police raids with military help,’ (some exceptions may exist) and the raids are not targeting individuals, but whole neighborhoods, and instead of having a warrant and a crime for which the warrant was approved, they have no warrant, and simply attack because they can. Fear and panic spread from the neighborhoods all the way to City and County officials, who in almost every instance were in no way warned or notified the attacks were to take place:
 
Helicopters swept in low between hi-rise office and apartment buildings, often discharging gattling guns, troops repelled to rooftops, streets, and parking lots, and went door-to-door through target buildings engaging in gun battles and tossing grenades as needed. Mock drills using blanks and flash-bang grenades, they claimed, but tell that to the citizens who, in some cases, grabbed their guns thinking they might need them any minute… to parents and teachers who feared for the lives of their kids as they put their schools into lockdown… to the city officials who’s 911 switchboards lit up and resulted in countless cars being dispatched, only to be repelled by armed soldiers.
 
The entire city thought war had broken out, or that Obama had decided to try to take the guns by force. And though neither was the case, that did not improve the safety of citizens at large. Any of those helicopters could have crashed, it being true that there are many such crashes in training exercises, as well as when on real missions. Anyone might have fired live rounds at the soldiers misunderstanding their purpose, including any illegal drug dealers unfortunate enough to be nearby. Anyone could have crashed their car in distraction, or had a heart attack in their panic. And for what? A practice at what? Raiding a U.S. city?
 

How dare the United States Military deem us a target, even in mock!

 
How is it they have the right to bear arms against us this way? The whole purpose of the second amendment is that we bear arms to protect ourselves against them, or a government gone mad and employing them against us. The military and White House has forgotten who they are, who we are, forgotten the Law of the Land, and thereby so dare. They have forgotten their oaths of Office each and every member has sworn, and  have moved forward the date and time when the second amendment will become our duty to defend by force of arms, thereby validating our Forefather’s concerns which drove its penning.  Shame on them for allowing it to happen.
 
This scenario played out in various forms in Chicago, Houston, Miami, Boston, Minneapolis, Los Angeles, and elsewhere. So as you read this review of a real raid where people were shot, consider carefully, for your city may be next. And, regardless of any foreknowledge that such raids exist and take place, you, too, will be forced to wonder: is this merely a drill, or is the government coming for the guns. Just another reason to fear your government, another reason to cower and let them get away with oppressive laws. Shame on you if you allow it to continue.
 
End update
 
There is no copyright or author to be concerned about citing as source associated with this article. I would appreciate any reproduction include all links in tact and point back to proparanoid.wordpress.com as it was I who obtained the material as part of my investigations and interviews with victims. The original author and his neighbors rightly feared for their safety (death threats had been delivered) and thus asked that I redact things which identify any who were not already named in news stories of the event. The material, which I have also included in my book set, Fatal Rebirth,  was prepared for use as a public notice and warning posted on doors of homes and public places in a Portland, Oregon, neighborhood in August, 1993:

military police state repeal of posse comitatus

Background and relevance to today’s militarization of Police methods:

This is almost exactly what businessman Johnny Senteno saw on a Portland Oregon neighborhood street seconds before being shot point-blank twice for the unpardonable offense of lighting a cigarette in front of his company truck. No one knows if it was Police or Oregon National Guard who shot him, as they dressed identically with no front-facing identification. Portland paid him $100,000 in a settlement.

(This introduction, and inserted notes are provided by me, author H. Michael Sweeney) In August of 1993 there had already been nearly two-dozen violations of the Posse Comitatus Act of 1878 taking place in various forms around America as the Bush Administration, through Secretary of Defense Dick Cheney, were testing to see what could be gotten away with with respect to Posse Comitatus. Most such events were singular violations of a given aspect of military use in Police actions, such as outlined briefly in another of my blog posts. This post will also reveal other forms of criminality used to fund black operations such as CIA drug running in America, and political graft.

In Portland, Oregon, the Chief of Police at the time was one Charles Moose, who had a background in Military Intelligence in the National Guard, and who was being groomed to be Police Chief in Washington, D.C., where crime was so rampant that the current Mayor was pushing for legalizing military use in Police actions in the city… and he would indeed get that post in time to be boosted to international attention as the Cop in charge of hunting down the D.C. Sniper, which this author feels was part and parcel of the DOD plan called Operation Northwoods, the blueprint for fomenting our false-flag war on terrorism. This is all documented in my book set, Fatal Rebirth.

Therefore, this ‘raid’ was a building-block tool for Chief Moose and quite tied in several ways to the ‘terrorist’ events to unfold on Sept. 11, 2001. More than this, it was a training exercise in general for the intended Police State future envisioned by the Bush/Clinton/Bush/Obama regime. I state it as a single regime because Bush programs aimed at achieving a Police State were continued and augmented under Clinton, and his under Bush, and his under Obama. It matters not who you vote for if in mainstream elections, they are all the same conspiratorial NWO players pretending to have varied political agenda worthy of providing distraction from their unified hidden agenda.

Posse Comitatus is not currently repealed. This is NOT a Police state under siege by revolutionaries… not quite yet. If and when that happens, government will have ONLY ITSELF to blame. Yet the government has taken steps to establish a de facto repeal to bypass the law (this Senate link details section 1031 of the National Defense Authorization Act signed by Mr. Obama, and there are other Acts and Executive orders which play to the matter). I fear it will eventually lead to armed rebellion if things get out of hand such as exemplified herein; if you allow our outlaw government to continue to ignore the Constitution and Bill of rights to undo Posse Comitatus, this is what you can look forward to on a regular basis… if not worse:

military police state repeal of posse comitatus

Public Notice and Warning (posted on neighborhood doors)

My name is [REDACTED], and I’ve been living here since 1967. A few months ago, the Police served a warrant on our house in what they said was a drug raid. Since we don’t use drugs we thought they had the wrong house — the people across the street were known Police informants and drug users, but they were not raided.

Even worse was how the warrant was served, and the aftermath. Part of it has to do with the fact that they used the National Guard in the raid — which I am told was done illegally, and in direct violation of a judge’s ruling. The cops dressed like soldiers but had permanently sewn Police patches, and the soldiers wore temporary strap-on license plates for Police markings — making it impossible to know who you were dealing with in the confusion — especially since they didn’t announce the raid or say they were cops. Everyone in the neighborhood at first thought war had broken out, since these Police markings were only visible on their backs.

Note: Chief Moose had already used the National Guard and military APC units in several Police matters in violation of Posse Comitatus. This had prompted a judge to issue a ruling in favor of The Posse comitatus Act of 1878 (which stipulates that the US military can-not be used in law enforcement duties except by declaration of Martial Law) — unless under direct order by the Governor under Martial Law.

Chief Moose continued in violation of the Court Order to cease and desist, citing ‘public safety concerns.’ But as you read this material, the reverse is shown to be true — the military put the public safety in greater danger. I wrote Governor Barbara Roberts about this and was given a copy of a ‘blanket authorization’ issued to Charles Moose (no Martial Law involved) to use National Guard… dated AFTER they had been used, and AFTER the judges order had been violated, but claimed to authorize the prior events, as well. Moose, by the way, several times on live TV agreed to meet with me for interview but in over a half dozen attempts to do so, I was informed he was ‘on vacation’ that day. So was the City Attorney, the Mayor, the Police Public Relations Officer, and anyone else I attempted to interview in his stead.

The first thing we knew, soldiers burst into our bedroom and pulled us naked from our bed. Instead of identifying themselves or why they were there, they only cursed and called us foul names, telling us to shut up. They forced us to cower nude for a good part of an hour, not letting us ask even for our clothes or covers. Eventually, they told us they had a warrant, but they also made lewd comments about my wife’s nudity as if trying to provoke me to fight. I worried it was to justify shooting me, and held firm.

They repeatedly ran a drug dog onto the waterbed, records and electronics, and delicate items on shelving, running him back and forth to maximize damage. They trashed the house so bad you couldn’t even walk through some rooms from the overturned furniture. Even though they had access to the whole house and keys to all doors, they continued to smash windows and locks. They threw birth certificates and personal papers into the wet sink and trash, and spilled solvents and paints on expensive automotive manuals for my work. They took live ammunition out of its box, took it outside the building, and threw it into deep grass. I hate to think what could have happened if I had mowed the lawn without noticing.

They found no drugs, but they opened and took mail. They took cash from a recently cashed pay check, and an uncashed check from a relative. They took all sorts of contractual documents about our finances, as well as property titles and all of our personal ID. They didn’t even offer us a receipt. When I later tried to get our things back, they said I had to obtain a notarized statement which, because they had our ID, was impossible. When I pointed this out, they just laughed at me and said, ‘Tough luck.’

But that’s still not the worst. In serving the warrant, the soldiers surrounded the entire neighborhood and went into yards everywhere, also arriving in an armored personnel carrier and with an Army helicopter overhead. They shot my dog in the eye and fired shots over the head of a woman opening her back door to see why a neighbor child had burst into her house screaming in fear. They also fired shots at a neighbor who was simply walking in the street, and forced him to the ground and cuffed him. Another neighbor, his wife, and an infant where held at gunpoint on their own porch while their property was illegally searched — they were not listed on the warrant.

A Hispanic businessman standing by his truck with both hands already raised to light his smoke was shot twice without a word of warning. When he asked for help, they shouted racial slurs, and told him to shut up as they cuffed him. Everything described so far took place before the Police drove up to announce “Police” and “warrant.” No one mentioned thus far, except for our home, was listed on the warrant or even near property on the warrant.

Few heard the announcement of “Police” or “warrant” because of the noise from the Army helicopter and Armored tank-like vehicle. Despite many witnesses, Police denied shootings took place. It was later discovered they had used a new kind of “non-lethal” gun outlawed in Europe by every major law enforcement agency as being too dangerous for general use.

Note: The businessman, Johnny Senteno, eventually won a $100K cash settlement against Portland Police for the shooting, which was proven in court to have taken place. In my investigation, the head of the SWAT Team involved first agreed to speak with me but terminated the interview when I raised the point about the weapon involved, which fired a dense compressed pepper-spray-based compound intended to ‘disintegrate’ on impact to engulf one with pepper spray at distance. However, fired at near point-blank range, they fractured bones and left bruises which took weeks to heal.

Many people, including several bystanders having nothing to do with the raid, and a pregnant woman, were cuffed and held at gunpoint for hours but never arrested or told why they were being held. Only after the TV crews had left, were these people released. They were instead warned to “keep quiet about this” if they didn’t want any “future problems.”

Cops told media our neighborhood was a drug haven where you could get anything you want, but several independent investigators say only a Police informant ignored by the raid was ever seen dealing. One private investigator made several connections between the raid and the murder of Anthony Duane Shaw by Police — thought to be blackmailing dirty cops, as was the other person named on the raid warrant. One connection led to my house, and two to the other house raided.

Note: Myself and at least four independent filmmakers and radio or cable TV show producers spent an estimated 400 hours between us investigating the matter, resulting in more than 12 hours of radio and TV presentations. This was on the heels of a like investigation of Shaw being shot 13 times by Police (his family won a $100K wrongful death award). My part was the least of the effort, but my methods allowed me to get closer to the identity of background players and their motives, uncovering profitable leads resulting in the more interesting discoveries.

Their experience was much like ours, but there, Cops took even stranger stuff — a guitar, a video tape of an episode of a real-life Cops TV show, and absolutely everything in the yard and a garage which they promptly declared as junk and a nuisance — even though the items in the garage were neatly boxed. This was true because the occupants had just moved in — those named on the warrant no longer lived there. This was done outside of due process, and investigators believe it was not taken to the dump, but rather to a convenient place for detailed search conducted out of the eyes of all authority.

But the Police did make an arrest — despite admitting to the press that no drugs were found. In fact, they left some rooms unsearched, almost as if they had found what they were really looking for. They later said one marijuana joint was found. This was then changed to drug distribution on court documents, but by the time they went to court, it had become drug manufacturing. The person charged was the fellow with connections to Shaw, and who, like Shaw, had himself claimed to be blackmailing dirty cops to leave them out of their drug dealing. He was railroaded. He was such a dangerous felon, by the way, that he turned himself in when he learned of the raid on the news, driving back to Portland from out of town to do it.

Note: All charges were eventually dropped since there really had been no discoveries made in the raid. The entire matter seems to have been orchestrated to obtain blackmail evidence against bad cops and sanctioned CIA drug smuggling operations, a matter in which I would later witness first hand a known CIA front’s involvement.

They later did much the same to my wife, eventually arresting and prosecuting her on minor charges equally false: after the raid they followed us everywhere we went, even into restaurants; they repeatedly made awful, insulting comments in public about us; they stopped us for phony traffic violations all the time, illegally searching our car without probable cause; they eventually planted and “found” a small quantity of drugs in the car.

Should you not believe that, consider how likely you would be to carry drugs in your car knowing the Police continually followed and stopped you, and searched your car. Unbelievably, at least one person on the jury turned out to be connected to participants in the raid by virtue of real estate deals mentioned below. The State-provided lawyer did not protest an obviously rigged jury once notified, nor did he provide good defense in court, hardly opening his mouth unless the Judge spoke to him.

Note: These matters were heating up on Public TV cable shows and though the woman was found ‘guilty,’ before sentencing could take place, the matter started to unravel;  Maj. General Gene Katke, head of the Oregon National Guard resigned his post amid an investigation described as regarding financial mismanagement. I was subsequently told the Judge declined to sentence her to jail time and instead elected community service/probation.

Another thing uncovered in private investigation is that the raid, continual Police harassment after the raid, and perhaps even the reason behind the murder — had to do with some sort of land grab by a mysterious series of dummy corporations operated by law enforcement and government officials involved in the raid. Someone representing [REDACTED] Mortgage offered us half of market value for our house “so we could walk away from all the trouble.” He told me that “powerful law enforcement and government people were in the company,” so I “should sell to them if I didn’t want any more trouble.”

I also know there are direct ties between this man, the Police, and between the company and the houses where the raid and harassment took place — where the families recently moved out after things got too scary. Men shattered the windows and beat one of the tenants with baseball bats, and threatened them with shotguns — the one who did the beating was a cop named [REDACTED] who, despite being from another county, was also involved in the raid.

Note: that cop eventually tracked me down because of my investigation of this aspect of the matter, and took action; he approached me with a gun in a folded newspaper while I napped during my lunch hour in my car at work one day. But my Guardian Angel woke me and I saw him in the rearview, and quickly exited to face him. Seeing the gun and the look on his face, I motioned with my head to inform him I had been (deliberately) parked under our companies security camera. He did an about face and I had no more trouble with him.

He wound up being the new landlord, suddenly owning a large number of houses in the area. He only accepts cash for his rent, refuses to give receipts, and will not sign a lease or rental agreement. He continually evicts people suddenly in the middle of the night by ‘Police orders’ and then keeps all their possessions they were unable to take with them. If anyone complains or takes legal actions, they get the same treatment we got.

The neighborhood continues to be harassed. Cops follow and stop most of us who have not yet sold our homes, drive by at all hours shining lights in windows, or they just sit and endlessly watch. They make us afraid to go outside. Some neighbors have been beaten by Police, had threats of arrest “to teach you a lesson,” and even threats of death. After beating one man in his front yard for mouthing back at the cops, they dragged his wife by her hair on the gravel roadway while she was wearing only a bathing suit — all in front of their kids. Despite the beating and the rough treatment, they made no arrests — underscoring that it was not “in the line of duty” or because they “resisted arrest,” though they were threatened with jail time.

Our house has been bugged, confirmed by the fact that arguments between me and my wife were being picked up on neighborhood short-wave radios, and covert entry was made to leave things, probably planted evidence for the next time. I’ve only told you a small part of the problem — I could go on for pages. Something is very wrong, and we worry that they will do something even worse. We have been tipped by friends close to Police sources to expect another raid, soon.

We are very afraid. Someone needs to expose what’s going on. Even though my wife and I have never had a history of problems with Police, they are now there every time we turn around. Our Police files were nonexistent before the raid, but now, they are inches thick with all the Police reports executed through the many harassment efforts. Not one entry has been legitimately made, but they make sure there are never witnesses, so we can’t prove it or file charges.

Rush Limbaugh mentioned the illegal use of the Guard on his show, but he didn’t know about the rest. You do, so be careful. If they want my house, they might want yours, too, since you are my neighbor. The cop has gotten at least seven houses in the neighborhood so far. You might be next…

End of original material

military police state repeal of posse comitatus

Summary Notes

I eventually managed to speak to the man representing the Mortgage company and learned that he himself was coerced and beaten (lost two front teeth) if refusing to help, and NOT an employee of the firm. He was, in fact, the ‘Police drug informant’ beaten with bats. When he did what he was told, he said, he was provided with drugs as reward.

He indicated that Governors of at least two states (he mentioned Arizona, California), city officials, and various law enforcement people had set up a company to purchase properties as silent partners (illegally concealing their identities). He told me houses were painted in a particular combinations of various two-tone colors to indicate who ‘owned’ and got the income from a given acquired property. Indeed, I found more than two dozen homes in the greater neighborhood with these identical paint combinations, in under thirty minutes time.

He also provided me with a copy of an ad used to secure renters for the homes. It had a phone number which went directly to Clackamas County Corrections, the very place where I had already identified a CIA asset working as a corrections officer, along with several bounty hunters trained at a CIA school in California. The phone number was an answering machine which simply asked you to leave your own phone number. I left mine, and it was shortly after that that I was visited by the Sheriff with the gun in a newspaper.

I later followed up with the Mortgage company and clues there led me to a CIA front involved in each transaction. That investigation led to discovery of a murder in the State Capital which seemed to be tied to acquisition of businesses in like manner as the homes. The more public the affair became on Public Access TV, the more things began to unravel, and the hotter it got.

There were more attempts on my life, including a ‘traffic stop for a burned out tail light’ by no fewer than nine local, county, state, and federal cars. Fortunately, my Wife was driving in her car with me, and stopped, thwarting what was presumed to be an intended replay of the referenced broad daylight murder of Shaw by a similar stop. Unarmed, he was shot to death by nine officers as he sat in his car with both hands on his steering wheel as commanded. He had allegedly tried to run down a Police officer between his car and one of the two cop cars which were literally bumper to bumper with his (their story), which conflicted with eye witness statements.

Before it was over, not only had the General resigned, but also, but the elected Clackamas County Sheriff Ris Bradshaw. The CIA fronts went under ground, and $12M worth of ‘confiscated homes’ were sold by the city to fund Police operations. I sent a letter of inquiry to Governor Evan Mecham of Arizona, and he also resigned that same month after being convicted on unrelated felony charges before that lead could be pursued. Naturally, there was no response to my inquiry.

I was just a citizen acting as a investigative writer for my book (Fatal Rebirth) on abuse of power issues. Don’t let anyone tell you a single individual cannot stand against the machine and make a difference by speaking out — and especially by joining with others of like mind. One General, one Sheriff, one Governor resigned, CIA fronts shut down, stolen houses converted from graft to public revenue, and more… thanks to our efforts to get at and tell the truth. Yes, it was risky, but why live a life in fear of living it to the fullest of potential? If they can cower you that way, you are not as free as they wish you to believe.

What of Early, of Late?


How vastly different life turns out for one friend compared the next… and yet how much so alike as to be frightening


Copyright (c) 1996 by H. Michael Sweeney — All Rights Reserved
Permission to reproduce for non profit use granted provided it is reproduced in full and links back to proparanoid.wordpress.com. This article was written for the Oregonian, but the Editor notified me that they no longer wanted my Op-Ed submissions because they generated too many responses critical of government. So I added the Oregonian stings and published it instead in my book set, Fatal Rebirth.

posse comitatus act posse comitatus group gun control

From the local news: A Portland man was arrested today for shooting two State Troopers in the back after being stopped for a traffic infraction. Neither officer was seriously wounded, thanks to bullet proof vests. Arrested at the scene on charges of attempted murder was Phil Early, of Portland, Oregon…

As it happens with many news stories, there is more to the story than meets the eye. Sometimes, there is a story behind the story.

I knew Phil Early in a more innocent time. I knew him as well as anyone, both teenagers attending Jefferson High School. He was a very different person then, certainly exhibiting no characteristic that might lead to his shooting a female State Trooper and young man wearing a State Trooper uniform* in the back. His worst offenses in those school days were being suspended for playing hooky.

Having lost track of Phil after I went into the military, and having often thought about him over the years and the many good experiences we had shared together, I must wonder what could have brought him to this unlikely end. Having heard that he had joined the Army and was killed in Vietnam, it is a shame that it took this tragic news event to reveal the error in that information and open the possibility of our meeting again. Perhaps, under the right circumstances, I might even have made a difference in his fate. This haunts me.

posse comitatus act posse comitatus group gun control

But that is not all that haunts

Despite the outwardly heinous act and the many negative stories of Phil in the local media, there still seems much good about Phil in tact from when I knew him. He still is a caring and giving person, according to those who knew and worked with him in his last days as a free man. It is said that he helped anyone who asked and gave of himself freely, without judgment. I even understand that he had fallen victim to con artists who took advantage of his giving nature, but he had not let their greed dim his caring for or trusting of other strangers in need.

This was the Phil I knew, who would volunteer to loan his best blazer to a casual acquaintance (I had known him all of fifteen minutes when he offered it to me), or a Phil who would give his last two bucks for gas to a stranger stuck in front of the local grocery store. And that memory does not tally with the news reports of a man who supposedly, by association with Posse comitatus, has a hatred for other races. The stranger he had helped to buy gas in the early 60’s was a black man. In those times, equality was a mere dream in Martin Luther’s sermons, but already reality in Phil’s heart.

And speaking of Posse comitatus, I try not to automatically think harshly at the sounding of the name. It was the Posse comitatus Act of 1864 which protects citizens from abusive application of military against civilians in police actions, unless under martial law. This, perhaps, is why the current group by that same name does not recognize the State Police as a duly authorized Police agency.

Rather, they feel that any armed force under direct authority of State rule, regardless of the name it uses, regardless of the document of law or charter which empowers it, and regardless of its stated mission or rules of procedure, is nothing more than a state militia — a military body. As such, just like the National Guard, it is seen as a military unit subject to the Posse comitatus Act.

It was originally reported that Phil, like many Posse members, had an arsenal of weapons and ammunition. The Posse apparently believes, like many groups, that it is up to the citizens to protect themselves from the possibility of a military overthrow of the government — a thinking which, in exercise, requires a well armed and well trained civilian population. I now understand that Phil’s arsenal has turned out to be closer to the number of guns owned by the average farming family in Kansas. The description of many of these weapons apparently better matches that of “collector items” than of “arsenal.” This is closer to the Phil I remember, who liked to collect a variety of many like things, as would please his eye. In blazer’s for instance, he had nearly a dozen. He had many fewer guns.

There is one disturbing thought, however. As different as our lives must have been, and as different as our current situations seem, there is much about Phil’s late history that matches my own life. I, too, have grown suspicious of many in law enforcement, and have had my share of confrontations with them, including multiple attempts on my life by assassination.

Phil’s negative experiences might be deemed politically shaped by Posse comitatus. Mine have been as a result of investigating illegal activities of those within law enforcement — coincidentally involving illegal application of National Guard and other Federal agencies by or within police — the very thing feared by Posse comitatus.

posse comitatus act posse comitatus group gun control

The nature of fate?

In realizing this commonality, I ask what might bring us so tenuously close in our thinking and experiences, despite the many years and miles between us? I go back to the innocent times, and a possible answer seems apparent. It was the time of Camelot. We, the youth of the nation, had a man in the White House we could love and look up to, regardless of any political realities perceived by our elders. And then, he was gone, taken away in violence under questionable circumstances.

I remember well the weighty discussions with my peers at the time, including Phil, of course. Even then, the theories were abundant. As more was learned, the doubts grew about the lone gunman theory. Perhaps this dashed our innocence and planted a seed of mistrust of an armed government and its secret minions of intelligencia – a mistrust which ultimately led us each along separate but similar paths, once we parted ways at the end of high school.

Now of course, there are more facts pointing to CIA assassination than to Oswald. Despite CIA Operative testimony under oath in court that CIA was directly involved in the murder and a cover up, which necessarily and demonstrably began before the murder, media still chooses to label anyone who questions such things as “conspiracy buffs” — despite the fact that major media was present in the court at the time to hear that critical testimony.

That the CIA-Operative witness had, within weeks of the assassination, come forward to FBI with the same material, and later, also testified to the Warren Commission — and all ignored the truth, does not make us “conspiracy buffs” feel any better about media or government. Apparently media prefers to continue to publish fiction as fact rather than admitting they were blinded to the truth from day one. Perhaps government simply finds cover up the only acceptable way of life.

Come to think of it, local media and government did the same with local murders undertaken by Portland Police. Despite abundant witnesses to the contrary, media blithely published verbatim as fact, Police accounts of the shooting of a young man named Shaw — an event which I have researched to conclusions contrary to their version of the story, as documented elsewhere. There was a similar conspiracy of silence with respect to the 104th and Liebe Street Raid.

There, National Guard, including a helicopter and an Armored Personnel Carrier (APC), was illegally used in an alleged drug raid, but this author has discovered was more likely connected to the murder of Shaw. Local TV station KATU was the only station covering the raid, a matter itself perhaps telling since their former anchorman was also a former Police Commissioner and current City Councilman. Civic-minded KATU edited in new questions to field interviews of the neighbors of Liebe Street, in effect reversing their answers to make them sound supportive of Police actions, instead of condemning… everyone on Liebe Street was outraged at Police, the Guard, and KATU, but media would not air their grievances, nor would any government agency.

Surely, this angered the Posse. It angered many people, especially because of the abuse of power exhibited by Police. That summer saw Portland host the Guns and Hoses Olympics, where police and firemen from around the nation came to visit. With competitions in sniper shooting and police dog attacks, there was also likely an effort to show off Portland as a modern and well-equipped Police Department. Perhaps, but some would point to statistics to show it one of the more deadly departments, with the best way to die of gunfire by Police was to call 911 and threaten to kill yourself. They usually finished the job that those less dedicated to the deed could not. Perhaps it was such things, both old and new, that drove Phil’s anger.

Perhaps there are many from my generation who cannot let go of our misgivings and outrage from such things as the murder and cover up of our President by our own government agents. Perhaps there are many who, at least secretly within, believe in their heart that that terrible act in Dallas was the first of many dark chapters — chapters sufficiently dark to suggest a fearsome future at the hands of their authors.

That we see and deal with seemingly endless supply of similar Federal abuses and lesser version on a more local scale, does not help. Some of our generation are moved to action, while others prefer the safety of quiet contemplation. For those of us moved to act, some choose the pen, as have I, and some of us choose the gun, as apparently did Phil. Phil himself deeply regrets his actions, which he says were driven by the dominating and abusive attitude of the officer. Something, he says, just snapped within him.

posse comitatus act posse comitatus group gun control

How do we judge such matters?

I cannot condone what Phil as apparently done. I can, perhaps, understand its root cause. Society must condemn his actions. In friendship, however, I am moved to point out that this is not a simple case of gun violence, as many in media have promoted with gusto. Indeed, there is no such thing. Gun violence is not a living thing which happens of its own volition. Gun violence is the result of a given set of life experiences and circumstances. In fact, those things would conspire to vent violent action even in the absence of a gun — such as stabbings or other assaults.

Those that believe the guns are the evil root should therefore also seek to take away all the knives, baseball bats, pillows with which to smother, stockings and ties with which to strangle, etc. Each case of gun violence deserves some degree of calm analysis towards possible prevention of future shootings — not a knee jerk call for seizure of arms. In analysis of Phil’s case, I suggest his actions were driven by something which those very actions themselves could not possibly well serve.

Could Phil have thought through the emotions that drove the instant, and looked beyond in some considered philosophical light, he might have come to the same conclusion. I would suggest to Phil that his enemy was not present when he opened fire. It was not present in the persons he shot, except perhaps by some misapplication of mere symbolism. They were most likely doing a tough job in a just cause. Nor was his enemy their leaders or those that worked to create agencies so troublesome to the Posse.

No, not these things, but far less tangible things. An unhappy history with no suitable answers of blame. A docile public apathy with unconscionable surrender of power to an increasingly errant and abusive government. A growing frustration with no means of proper release. A gradual loss of freedoms to a New World Order. A reasonable fear allowed unreasonable control.

Looking back, and talking to others, I wonder: how many of my generation have traveled so perilously close to Phil’s path? How many more of us are near the line he has crossed? Too many, I fear. A legacy, perhaps, of Dallas? A signpost, perhaps, of our future path?

~~~

posse comitatus act posse comitatus group gun control

* The second person shot was, of all things, an Explorer Scout.

Under some extremely inappropriate reasoning, the State of Oregon and the Boy Scouts of America have decided that it is appropriate to dress Explorer Scouts in full State Police uniforms, sans weapons, and put them on the streets and in patrol cars — on the front line against crime, unarmed, untrained, and often, unsupervised.

This deserves another article of its own, as yet another example of the growing Police State in Portland, Oregon. Here, in Portland, highway workers, Explorer Scouts, firemen, private security firms, the National Guard, and even gang members, have all been inducted into the general law enforcement umbrella in one way or the other. One has to ask, why?

I only wish that Phil had thought to ask such questions first, and not have shot, at all.