Author Archives: Author H. Michael Sweeney
When everyone, including competitors across the entire supply chain (production, distribution, outlets) simultaneously start doing exactly the same thing… I get suspicious. So it is with TV viewing apps, and the suspicion is aimed at 5G Network villains.
copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Just as suddenly, it dawned on me…
Recently, it came to my attention that virtually every TV network and major ISP service (i.e., Comcast, Time Warner, Cox) is aggressively pushing their apps for watching shows and generally promoting binge viewing. Actually, even TV programming sources without their own channel, and some local TV stations are doing the same. If it’s on television, there is likely one or more Apps which someone wants you to use to watch them on your phone.
While general TV media apps have been around for a while, such specific media apps seem to be a relatively new phenomenon, and I wondered why the heavy promotion seemed to be ‘turned on’ in a flood — all at once, and across the board among various competitors, and across all platforms, including game systems. I don’t like the answer(s), and I suspect you won’t, either. Especially if you are an activist, whistleblower, or anyone targeted by someone else for any reason (TIs take note). Like a lot of technology, weaponization is not that hard, and abuse is almost always a certainty.
Understand, as a privacy and security consultant, I am not a fan in general of ANY App, even most of those which come with your phone. There are two reasons. 1) the more technology you use, the less privacy and security you have. That is exemplified or manifest in several ways, perhaps the most important being… 2) virtually all Apps of any sophistication with wifi interactivity are relatively easy to hack to become a gateway to control of your phone… perhaps to access to your personal files, even to the point in some cases of being able to manipulate the camera and microphone in or out of your use… and/or for tracking your phone’s physical location by several means. In fact, there are even certain advanced methods which can be employed which can impact your brain’s EEG to effect mood changes and your level of alertness; Political Control Technology some people call ‘mind control.’
With my own phone, I NEVER download ANY app, and I only use standard apps* when I must, trying to limit myself to the compass and flashlight. I do zero online work with it, and I leave the phone off when I do not need it, turning it on to check for messages, expected calls of importance, and making calls. Sure, I’ll use the camera, but only when I don’t care if anyone is able to track exactly when and where the snap was taken (or I use special editing software to strip out the encoded data). When not turned on, it is in a foil pouch, because some phones still communicate without a battery, much like RFID tracking chips, drawing the energy from RF signals in the air, and/or other methods, such as slow-discharge capacitors. Learn more about the whys and wherefores of such strategy, from this previous post. But one reason why must also be discussed in more detail, in the next section.
* There is only one app I have downloaded and use which I suggest everyone should have: RSOE EDIS, an alert system for local, regional, national, and international disasters of any kind; natural, terrorism, industrial accidents, biological/pathogen outbreaks, etc. It could save your life. I also have it on my computer, and it is the first thing I see when accessing either the computer or the phone.
Every App usually requires a user agreement which is so full of legalese and so massive in text as to deter actually bothering to read it, on the Sheep-like assumption the Wolves didn’t write it, and it is ‘standard’ in nature. The only thing standard about such agreements, is that they abrogate your rights and expectation of privacy, doing so in terms which fail to so inform by misdirection within all that legalese. It obscures the truth through terms for which the legal definition and application in the real World means something quite different than you think.
They don’t really want you to read the document, or course, as evidenced by the fact that it is IMPOSSIBLE to read it before you download. NO ONE publishes their user agreement online, and NO ONE will respond to a request to provide a copy in advance of download. And good luck trying to read all that text usefully on your tiny phone screen, when you are anxious to fire up the app and see its pretty animated graphics do their thing. They count on all of this to take place. Here’s proof that only one half of one percent of us actually read the agreements before clicking yes… along with reasons why that’s foolish.
Note: Here is an example of a typical response to a request for a copy of the User Agreement for a TV App, this one from HGTV Customer Service: “We don’t have staff available to respond to every email, but all feedback will be shared with the appropriate teams for review and consideration. Please visit our online Knowledge Base for programing, website, sweepstakes, and other information.” Knowledge Base is merely another term for FAQ, and no FAQ ever addresses the question. Worse, they might refer you to a User’s Forum… where people who can’t get answers are supposed to provide answers to people who can’t get answers.
They all read roughly the same in almost every user agreement, regardless of type. They tell you they do not associate your name, address, or account information with any information collected. That won’t matter, because you are easily identified by your device Identification in terms of Web connectivity (the IP address, for instance, and information about your modem and router, or similar information for your phone). So, if anyone wants to reach out directly to you, to check up on you, market to you, hack you, or anything else, they can do it without knowing your name, address, or account data… if they know how, or are authorized.
So one question is, just who is authorized, beyond the firm offering the App?
The general term is ‘partners.’ You are a commodity as much as a customer, and your information is essentially traded between interested players like any other commodity. The list of trading partners can be extensive, especially if their partnering includes rights to access the partner’s partners (not uncommon for firms like Facebook, Google, Cloud involved service companies, and ISP providers like Comcast). In any event, you can expect the answer to be hundreds, if not thousands, of ‘partners’, except that they don’t usually tell you who they are, save an example or two. The list for HGTV, for instance, which I was able to eventually discover (no thanks to Customer Service) is a block of text large enough to roll up and the swat the flies off of a Bandito’s dead body.
The worst of it is not the marketing which will come your way, and the fact that everywhere you go on the Web, ads will be tailored to what is learned about you through the App (and all other online activity), or that you can end up seeing ads for the same product/service hundreds of times a day for weeks. No. THAT activity, which IS tracked by the app (asserted as ‘necessary to provide the benefits claimed for the app’), is what renders you a commodity. No, the real threat is this: should any one of the partners suffer a hack of some sort which accesses their data base, that can be trouble, for you… especially if the purpose is to find end users of the app to target with a secondary hack attack through the app, itself.
Second threat: synchronous and heavy promotion
This is somewhat analytical, and though based on facts, perhaps rightly seen as speculative; the reader should decide for themselves just how much weight the presentation merits toward acceptance as valid concerns. The presentation must start with some technical information having to do with phone network designs and bandwidth capabilities.
The current 4G network was introduced primarily to improve bandwidth due to greater network demands both in terms of the number of users acquiring phones, and the introduction of smart phones able to stream high-data volume video content. More and more people were converting to smart phones, and streaming. I recall binge watching Invader Zim on a phone not long after 4G became available. Nowdays, the phones are faster and have larger screens, and therefore, users demand higher resolution video streaming (4K resolution is going to be increasingly common), all of which requires several orders of magnitude more bandwidth. Almost all phones, today, are smart, and almost all users, stream. 4G is rapidly being outpaced by demand, and in some markets, it is already suffering an inability to deliver full bandwidth to all users at all times.
Ergo: there is a 5G Network in our future ( but is it a ! or a ?).
That trend is not going to change, and in fact, will soon grow dramatically in the near future. Apple Computer, I’m expecting, will soon introduce a very expensive product which is slated to replace their entire product line, save perhaps the watch, all replaced by a single phone-like product with full portable computing capability. It will serve as your desktop or laptop computer, wirelessly communicating with your Smart Tv or special Mac-like displays (including older iMacs/laptops and monitors), or by adapters to any other brand equivalents, and with wireless keyboards/mice… and your smart appliances. It will also plug into a commercial jet’s seat-back monitor, or VR headsets.
It will serve as your modem/router, and your hard drive. It will rely on massive internal memory as well as the Cloud, and Cloud-based software applications accessed through apps on the device through subscriptions or licenses. Other manufacturers will follow suit, if not beating Apple to the punch, ending the Desktop and laptop computer as we know them, today. It will be a huge bandwidth hog, as result, more than quadrupling the wifi consumption per user, and doing so at more times during the day; simultaneous functionality demanding it. Then there is the political question, like it, or not.
Under Obama, the whole thing with ‘Net Neutrality’ came about, in which we Sheeple, having such a short memory for sound bites, have forgotten the truth… NN was a bad thing for users, and a good thing for Big Data corporations like Comcast. Obstructed by activists, the FCC under Obama acted unilaterally to establish NN, and in addition, set out to cancel all local TV station broadcast licenses, forcing their signals to go to ISP providers for distribution. More correctly stated… forcing YOU to go to your ISP to watch your local news and programming, again dramatically increasing bandwidth demands. Now that Trump has cancelled it, of course, the Left is telling us the opposite of reality, claiming Big Data benefits with the death of NN, and the user suffers, and we risk the invasion of privacy. The truth about NN, regardless of which argument you believe, is that it was intended to cater to 5G in ways useful to big Data, more than end users.
Which brings us back to the synchronous app promotions…
All of this, along with the expected demand created by all those TV watching apps suddenly being pushed system-wide, will literally force conversion to the new 5G Network, as more and more streaming demand in full HD (and soon, 4K) takes place. 5G is set to replace 4G, starting… well… now. But there is a problem with 5G; a lot of people, groups, experts and even officials are very afraid of it, seeing it as both a threat to privacy and both physical and mental health, and rightly so.
It has even been likened to a mind control device, especially in combined use with Smart Meters and Smart Appliances, all of which are also intended to go 5G, many already capable of it. In fact, 5G is promoting something called ‘Smart Cities,’ which is the Big Brother of Smartdom components. That, and the fact that 5G ‘cells’ will exist every few hundred feet on every street, is only one of the reasons it is feared as a mind control tool. I will tell you as avowed expert in the topic, that very little of the fears being expressed are entirely out of the question, from the standpoint of technical possibility. Proof, of course, won’t likely exist until its quite too late to object.
Now we finally have the answer to the original question this post is based upon; Why synchronous offerings of TV apps? My deduced answer is, therefore, that the sudden synchronous push by all major ISPs and TV networks to offer apps is intended to bog down the 4G network to the point that we will demand 5G proceed even in the face of the many lawsuits and various government and NGO investigations over safety and other concerns. Not just lawsuits and investigations, but also, outright bans. Use the links to learn more about these very valid concerns.
The forced push strategy I describe will undoubtedly work; Americans at large are well dumbed-down to the point of buying whatever the latest widget is, being offered, doing so without careful scrutiny or consideration beyond the hype of benefits amid images of gleaming hardware, usually involving some form of entertaining commercials promoting ‘feelings and emotion’ over logic and fact. I’m again using the current Left v. Right paradigm; feel good imagination trumps practical reality. Since the phone network, the phones, the app makers, the ISPs, and the TV networks, as well as the bulk of all Internet firms of any importance are themselves all part of one giant media complex, THEY will only tell us what they want us to believe (what to believe), and will seek to minimize or even suppress critical viewpoints such as mine.
Google, for instance, since Obama, and up until just a few weeks ago when Congress began looking at Web censorship by liberal-minded firms, would not let you find my blog posts. Used to be that you need only type in my personal name or trade name (proparanoid), and a few words from the title or topical theme of any of my blogs, and it would pop up in the first few listings on the first page. Since Obama, their censorship model is so efficient, that you could not even find it typing the full title of the post. In fact, it would show you posts of people who quoted from it, before it let you find the actual post, even ten pages down. Understand, there are over 12,000,000 pages which quote or cite my work, and yet, they don’t want you to find my original material, any more, despite that popularity? Political censorship.
I should complain? look at what the Left did to Alex Jones!
On the other hand, if you used Duck Duck Go, it always came up on top. They were/are not controlled by the Left, or the Right. Google is a search engine, but google (lower case), is a verb. Inquiring minds will want to google, but won’t use Google, to do it. I’m advising that they also avoid using apps of any sort, when they do so, but especially, to avoid TV apps. Cheat them out of the demand for 5G, and watch TV on your television, where you can see everything more clearly, and enjoy high quality audio.
Because one thing is for sure: 5G is going to make any social control by whomever is in power vastly easier than it is, today… and today, it is so easy that even a single liberal-minded company willing to be underhanded, like Google, can manipulate the thoughts and actions of hundreds of millions, and do it covertly.
Rare is it that a given Targeted Individual won’t have reason to believe Police are involved in their targeting. And yet, they were not… not officially. Here’s the why and how of it…
copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Color of Law; Police abuse of power in personal agenda
In the two decades of working with thousands of organized stalking victims and victims of other forms of targeting, the single-most common complaint is the suspicion or outright experiential evidence that multiple Police Officers are complicit in the affair. If not the Police, then some other law enforcement or intelligence agency… or both. Indeed, this has been my own experience in two of three different episodes of personal targeting over a 15 year period. In fact, multiple agencies can be involved simultaneously; Ive gone up against as many as five LEA, plus FBI and CIA assets, bounty hunters, and military intelligence in a single targeting. This has been documented in my various books showing how I beat them in the end… but it was no cake walk.
This is a problem for more than the obvious reasons. The most obvious is, that the very authority who should be responsible for investigating and protecting against such crimes, cannot be trusted by the TI to help anyone but the perps behind the affair. Calling Police for help is almost always like asking a burglar to help you secure your home. Secondly, when officials of any kind are complicit, the victim is then entered into the official record as being mentally ill, or in a worst-case scenario, guilty of some convenient crime. Even when not complicit, going to Police about targeting is likely to have the same result; they simply do not want to believe in the Boogeyman, and see anyone who does as a mental case. In fact, stalking is designed to get you to go to the Cops for just that reason; they want it on record that you are mentally unstable. DON’T DO IT.
But there is a DO list! Do video and log all interaction with LEA or have a witness from whom you can get a written statement immediately after. It will help keep Police somewhat confined in their actions against you. The more you collect such material, the less likely are they to risk any useful action against you; you can illustrate a pattern of harassment. Do make copies and hide them well, off site. Tips in my first book, The Professional Paranoid on all of this.
The worst example of the problem from my client situations was a Navajo Indian, an ex Green Beret, who was targeted after his daughter was kidnapped by a Satanic Cult with all the earmarks of a CIA mind control operation. Within weeks of going to authorities to seek help, all manner of problems beset him. Traditional surveillance and stalking, and electronic targeting, to include V2S was the least of it. When he began using my advice and his military skills to determine the players and go after them aggressively, it took a turn for the worse: suddenly, his mortgage was six months in arrears and his house was being foreclosed, all his credit cards were maxed out and past due, his bank accounts emptied, and there were outstanding warrants on him for assault with a deadly weapon and skipping out on bail. He was, in fact, declared ‘armed and dangerous’ with an all points out on him. This was all done by back-door computer manipulation of data files by professionals of CIA caliber.
He took additional advice from me and then went underground to organize with other ex military buddies and Navjo friends, and went black in order to wage an unseen war against the enemy. As I never heard from him, again, I must presume he failed in the effort, or was successful to the point of having broken enough laws that he needed to remain underground. I had, in fact, advised him not to contact me for such cause. But, as I have said, these are merely the obvious problems with this particular aspect of targeting.
The other shoe that usually falls…
Perhaps the second-most common awareness about stalkers is that they seem to regularly consist of a lot of Masonic types. This is often determined when getting a good close look at them or their vehicles; the Masonic emblem, or some similar fraternal order emblem, is found in evidence. Usually, it is either a sticker on a car window, a pin on clothing, or a ring on a finger. I myself have seen this in my own targeting, the one incident where true gang stalking was involved (as opposed conventional targeting with general surveillance and dirty tricks).
After guesting for four hours on Coast to Coast with George Noory to talk, in part, about my new book, MC Realities, I ran into the Masons almost overnight. I had mentioned on air the involvement of the fraternal organizations in gang stalking, and how they had evolved from the Knights Templar and their exposure to the satanic Hashemites and Assassins of the Middle East during the Crusades. On air, of course, I gave my name as H. Michael Sweeney, my ‘pen name.’
Two days later, I was at work where I was managing a gas station while investigating the Oil Industry, infiltration style. It would result in two forms of targeting, the first of which was by the Masons, that second day. A man bought gas and elected to come into the office to pay, where I was at the time. He waited until I was the only one present, and then offered to pay, holding out his fist, palm down. It was only a couple of dollars in gas, so I assumed it was a handful of change. Wrong; it was a message to be delivered.
NOTE: the second was targeting of the Station itself by a terror cell, of which one of the participants recognized by me as a helper to two of FBI’s Top Ten Most Wanted and two other Islamics… and FBI agent who had been earlier involved in the my own targeting as earlier described. It was, in point of fact, to be yet another False Flag operation, later described by President Bush as Gas Station Tasking… which I thwarted. Arguably, the two targeting incidents might be seen as related, but even if so, it is unimportant, except for the fact that it illustrates that one almost never quite knows for sure why one is targeted, and who really lays behind it. This is described in my wordpress home page, if you wish to learn more.
Placing my hand beneath his, he opened it, and instead of coins, a money clip fell into my hand with a wad of Hundreds. “Take what you need, Mr. Sweeney,” he said. My name tag simply said “Harry.” He had a very wry, knowing look on his face, which slowly turned into a smirk as I manipulated the money clip to retrieve a single bill. In doing that, I discovered a gold and jeweled Masonic emblem on the other side of the custom-made silver clip. A broad grin overtook his face, to the point of becoming silly.
“Interesting how some thing have more than one meaning,” he said, as I returned the clip and fetched his change. That day, when going home, There were three of them outside of my Condo, and several cars with Masonic emblems in our parking area, none of which had ever been seen before. I ended that stalking by using the methods in MC Realities, methods that many Tis would be unable to employ unless doing so upon first targeting, as had been my situation. Once targeting has been ongoing for some time, the typical TI no longer has access to the needed resources for such a defense. The one remaining defense is found in an earlier post.
In MC Realities, I trace the evolution of Mind Control technology (Political Control Technology) from the time of Adam and Eve (the Serpent’s deception was the earliest form of controlling thought… the same version of it as we see today in media manipulation), forward. The Templars, after being ordered destroyed by the Pope for having discovered their Satanic practices acquired in the Middle East, went into hiding. In time, many of them hid within the Stone Masons Guild, and eventually, took it over to form the Freemasons as we know them, today.
Hedging their bets, should they be found out a second time, they formed splinter fraternal organizations, as well. Any group with any of these words in its title… Fraternal, Ancient, Order, Ordo, Lodge, Temple, Grand, Sacred, Rite, or Knights (and similar)… is very, very likely a fraternal organization with a Masonic organizational construct… and at the higher levels, at least, closely affiliated with the Freemasons if and when it becomes convenient to the parent group. Therefore, it is easy to involve small armies of ‘helpers’ if someone is deemed a target. It is important, however, to understand that the rank and file lodge Member who may be induced to participate, has zero true knowledge of you or the purpose of the targeting; they are simply ‘helping a friend’ to solve ‘a problem.’
I end this section with a simple note: all Masonic systems are quite steeped in ancient mysteries of the Middle East, and beyond, typically focusing on Egypt, Syria, and the Holy Land… with a touch of the Sub Continent (India, Nepal, etc.) and Far East.
The two shoe laces are tied together…
This is where it gets interesting. Most big city Police are encouraged to join the Fraternal Order of Police (FOP), and it is indeed Masonic in structure. FOP, for instance, employs the Masonic all-seeing eye of Egyptian fame in their logo, which is a five-pointed star with a circle bisecting the points to create five triangles shaped like the Compass of the Masonic emblem, also the shape of the ancient steeply-angled Egyptian Burial (pyramidal) obelisk used for commoners’ crypts. There was additional heraldry-like art akin to European styling in the center of the star, shapes quite like those of most Police Badges, and incorporating an Eagle and other symbols. In other words, Police departments not only adopted the Lodge system almost universally, but did so to the point that their badges reflected elements of the FOP emblem. Almost all Police badge shapes generally post dated the FOP affiliations, underscoring the link. The exception would be Sheriff stars, and yet, that shape is also of ancient Masonic importance, in both the upright and upside-down (satanic Baphomet) versions.
If that were not enough to convince you, let us take a look at the Police Department of New Orleans. New Orleans existed as a city at the time of the Louisiana Purchase from France, in 1803. The first Masonic Lodge (a French version), was established there in 1793, all its members speaking French, and some Spanish, but no English of note. All the better to remain secret and mysterious to Americans, when they came into possession. But to fully appreciate New Orleans in the equation, we have to first look to New York.
In 1915, the Fraternal Order of Police established their first Lodge, there. It spread from there to many other cities in very short order. The FOP was not intended just to be a Lodge system, however; it also took on aspects of Unionization, a kind of bargaining force with the City whenever Members felt that Cops were not getting a fair deal from the Mayor. In many cases, in fact, their bargaining strength was augmented by the power of the greater Masonic power structure, a formidable force at the time.
Over time, actual unionization was also achieved in almost every major city, usually through the Mob’s control of the AFL-CIO, making it easier to arrange for hijacking of intrastate trucking or of dock cargo without anyone ever being sent to prison. But that’s another story. Ask any retired Union trucker or stevedore from Jersey. I’ve heard the same from 1975 Oregon members. The importance of that will explain to some Tis, those who believe they were targeted because they reported illicit drug operations or crimes which might be related to Unions, are targeted by Police. Additionally, of course, CIA sanctioned drug operations are protected by Police, as well. Thieves in bed with thieves, the bed made by the thieves.
Though New Orleans under the French had a Police Department as early as 1796, it had no Police Department for rather a long period of time after it raised the American flag. It was instead ‘policed’ by a vigilante system until 1853, when they formed their first ‘American’ Police Department. Almost immediately, they adopted the ancient Cresent and Star (upside down, larger star) as is common to Islam, as their badge. It is still in use, today, and appears on their cars, as well. Well before the FOP had even existed, this Department was already incorporating Masonic symbology directly in its badge. This is better known as the Shriner’s symbol, today… the Shriners being a Masonic fraternal lodge system.
So, clearly, the Masonic influence and ties are present within most Police Departments. Cops form some of the strongest bonds between individuals in service outside of the Military, sufficiently strong, in fact, that if one of them asks a color-of-law favor of another, it is not likely to be turned down, and certainly unlikely to be exposed even if turned down. Therefore, it really only takes one Cop being approached from a fellow Lodge member to recruit several more for any needed aid, even if that request came from a lodge in another city. Ergo, escape to another city tends to never result in escape from targeting.
NOTE: That is why the Free Will Society exists; a solution to virtually all forms of targeting. Please join and support (donate/promote) our effort to create a targeting free intentional community of our own, and our other advanced programs planned for the future. If you are reading this, you should immediately join the Society and give it full support. It is a far more valuable TI resource in terms of programs and goals than any of the so-called ‘TI groups’ out there, today, the bulk of which are nothing more than information and disinformation mills.
Please: you owe it to yourself to visit freewillsociety.wordpress.com to learn more.
Yes, there is a third shoe, one of special interest to those who feel the intelligence community lays behind their targeting. Every major Police Department in America has in place assets loyal to the Central Intelligence Agency, and many Officers have military intelligence backgrounds. Usually, you can count on some of them holding key positions within a given city: the Chief, the Public Relations Officer or Spokesperson, the head of Internal Affairs, the head of the Swat Team, and/or the Head of Personnel. From these posts, especially through IA, they are able to find bad cops who can be blackmailed into playing ball on an on-call basis, for any kind of dirty deed, to include color-of-law abuses such as is common to targeting. Don’t forget CIA drug running operations.
If that were not enough, there are similar, but far looser ties with FBI, Homeland Security, and the US Military Intelligence Agencies (and in some case, others, including the United Nations, and even Mossad). These generally entail the network of Fusion Centers and Centers for Excellence*, and special programs such as Community Policing and the Strong Cities Initiative/Network. When you consider that most all of these agencies use computer software based on CIA’s PROMIS data base management system, which is nothing more than a data base engine with a back door built in… almost any form of hanky-panky is possible. Ergo, the Navajo Beret Syndrome.
* Search for ‘Centers for Excellence + Homeland’ to see why I include it, here. All these items work together to collect, evaluate, and share information on (persons of interest). They operate as one big networked spy tool with usefulness in organized stalking which can easily be misused by anyone within LEA who has access.
So, even if Masons are not involved at all, Police can still be brought to bear on any given TI with the same level of efficiency, and in fact, the FOP can be leveraged into the equation just as easily, in reverse manner. Will the average member of the FOP, the Masons, the Police, or any of that long list of Agencies be aware of any of this? Absolutely not… not unless they are higher on the food chain. Then, of course, they won’t be admitting it, either. Complaining about it gains nothing. Knowing about it, and understanding it, can mean a lot, however.
You may not be able to beat it, but when the mystery is gone, its just another damned nuisance to deal with, and another reason to avoid trying to rely upon Police for help, unless you know one you have great respect and trust in. I was lucky. I had a relative who was a Cop in an uninvolved LEA, and he was able to help off the record in very useful ways. I also had help from ex FBI friends with back channel access, of like value.
We can’t all be so lucky. And if you are a TI, you know luck is not your strong suit.
Fake news, tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations by Trolls and Bots are not the only weapons they use to dumb you down and pump you up with their version of truth. Vanishing is their latest trick.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The (fake) news media dilemma
Fake news and Web tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations are not the only weapons they use to dumb you down and pump you up with their version of truth. It is not just Trolls and Bots we have to worry about, now. Vanishing is the latest trick used to conceal the truth and promote the lies.
I’ve written before about how television mainstream dumbs you down with clever psychologically aimed technical tricks in the actual image… largely relating their use of subliminal messaging, deliberate distraction, and overload. The general purpose being to further reduce the actual news you walk away with to the simplest of boiled-down sound bites… just the ones with their take on the news shaped for you according to whatever bias the network has at management level.
Elsewhere, there have been excellent examples of the use of NLP (Neuro-Linguistic Programming), also employed by broadcast media. It involves careful wording as well as clever body language to project the intended viewer/listener response to the message, within the message delivery, itself. It has been shown to be so powerful, a well trained user (a stage magician and hypnotist, who must rely on such deceits), was able to deliberately speed past a Cop and then use NLP to leave the traffic stop without the Officer even remembering why he had stopped him in the first place.
That kind of mis and disinformation borders on mind control, and in fact relies on mind control technology, psychological methodologies, and MC research by the likes of the Central Intelligence Agency. When the great bulk of media is controlled by fewer and fewer mega corps, and their corporate leaders tend to be like-minded politically, you get the double whammy of biased news and fake news (propaganda). That’s bad enough, but this article is about another dirty little trick… a bag of them, actually, used by all forms of Media when presenting ‘news’ online.
And, of course, we still apparently still have to contend with CIA’s Operation Mockingbird, the installation of CIA operatives within the media industry to help shape news to their preferred version. That, too, is something I’ve written about, at least in terms of its origins and history, and I’ve even been referenced as a resource in a more ‘official’ industry review of that topic by The Reporter’s Committee for Freedom of the Press. But now, we see, actual ‘retired’ ‘once-a company man, always a company man’ CIA officials are becoming investors in and on-camera commentators in mainstream news. This Clyde Lewis Ground Zero episode reveals how serious a threat the placement of intelligence community actors in media actually is.
What News is supposed to look like
All news is supposed to contain the 5 Ws… Who, What, When, Where, and hoW. Ideally, we also need to know the S and M… the news Source and the Meaningfulness, often defined by Motive… the Why. That is supposed to be factual Motive, and not speculation, unless clearly presented as speculative commentary. Lately, that’s the greatest sin Media is guilty of; too much ‘news,’ today, is actually mere commentary… the propaganda version.
Generally, for some strange reason, it is also rare to get all those points, especially online. The most critical things useful for research tend to be left out, making it hard for pundits and anyone trying to chase down answers to hard questions because a given story fails to ‘compute.’ That is critical, if one is to find out more, and judge for one’s self what is true, and what is fake. This is particularly distressing when the potential for a conspiracy or cover up is apparent. While Sheeple don’t even see the glaring holes in the official story, people who think for themselves really want to know why those holes exist.
But we ‘conspiracy theorists’ and politically aware non sheeple are thwarted at almost every turn. Take for instance, the WHEN. It is extremely rare in online news reports to find out exactly when an event took place… esp. useful to insure the same news event you find is the one you wanted, because often, you might have two identical sounding stories in the same city, in different time frames. Most searches are best made by searching on the (event key details) plus the year, and perhaps, month.
But many reports do not cite the year, at all. The Web is smart, though, and it knows when a given URL was created. Unfortunately, many of the larger online news sources use a kind of ‘feeder board’ URL created way back when, which is updated with current news, only, older news dropping off. While the Web remembers what the page looks like when the story you are looking for took place… that story is no longer there when you go to find it. While you can search the archives if they bother to offer one, and PERHAPS find it, that is just one hurdle in the search.
Once you do have what seems to be a correct story’s article, it is amazing how many news reports fail to include the date in the byline at the top of the page. So you have no way to know when the person writing sat down to write the story. But even with a byline date, you still have a problem: is that date the date the news took place, the date they wrote the story, or the date it was posted? It can be any of the three.
Some stories are updates to older stories, so the byline is meaningless unless the story itself indicates the actual When it took place in the text. THEY SELDOM DO. Instead, they just say something like ‘Last Tuesday.’ Great. What day of the week is the date of the byline? Now I have to go search that out, to make certain of the When. Your average Sheeple is not going to bother.
This problem also exists elsewhere in the remaining Ws and the S and M. At least one such detail is usually omitted, and all-too often, several. Sometimes, it is something simply not yet learned by reporters, but too often, it is clearly just not deemed important. All too many bylines even fail to tell you who wrote the story… so you can’t email them and ask for missing information. EVERY print article in a newspaper tells you this information, but for some reason, the online version seldom does.
Message distortion when relayed through many people
Dumbing down online is easy. It relies on the known scientific problem which transpires when a series of people relay a message from one to another to another, etc. It used to be in schools, that one of the first things they taught was this concept… that you you have to take care when relaying information. You have to listen carefully, and then just as carefully repeat it. The problem is, each person decides what is important enough to be carefully repeated, and tends to reword it for ‘simplification.’ So the message first stated has little resemblance to the message last heard. THAT is not being careful, it’s being careless.
Online, information deemed worth sharing is constantly relayed in social media in a quite similar, but an even more careless manner. Each person in the chain tends to introduce it with their own spin or commentary, advising what they think the takeaway is, or should be. They then (hopefully) provide the URL to the original (the careful part). They might also create or add an image or meme which underscores their takeaway thought. That is all in good, but…
Sheeple don’t bother to click on the URL and read the original story, and they simply ‘learn’ the takeaway point of the previous poster. This is why Memes can often be dangerous. Especially when the creator is being deceitful or dishonest to the truth. They know that a false message repeated some 20 times will take root in the average Sheeple’s mind, and become adopted. That is especially important in political messages, because today’s social media is decidedly biased, and decidedly deceitful, even to the point of using paid trolls and automated bots to insure you are inundated with the preferred take aways.
This is why people who think for themselves always click the link or do a little extra search before they hit the SHARE button, and add their own takeaway. Is that you? Are you like me, spending roughly 50% of your time inspecting and then correcting other people’s wrong take aways and falsehoods? Or, are you part of the problem, simply passing it along? Baa… baa…
But there is a bigger problem, one which at least seems conspiratorial, and relies on the above Sheeple foibles and the omission of Ws, etc. For some reason, mainstream news sources seem to be deliberately making it difficult for you to access news, and difficult to relay, on your own; they would prefer to leave that to the professional trolls and bots you think are your online friends.
Something is very wrong with this picture. Lets take print media and look at how they operate outside the Web, and compare that to how they are now starting to operate on the Web.
A newspaper runs advertising to pay for their staff and overhead; it keeps the doors open, and allows them to grow and invest in special investigative projects. They charge for subscriptions and for individual copies at news stands based on the cost of the printing and distribution process, and materials; the ink and paper. That’s why newspapers are relatively inexpensive to buy. It used to be that the online version, therefore, just had advertising… there is essentially no comparative cost to put it out there and for you to access it.
But now, online, many newspapers, even small local ones, are telling you that you will need to subscribe or become a registered user to their online version, or pay a small fee to read the article… or that you may read this one, but it may be the last one you can read for free (relies on your cookies, but if you turn them off, you they will tell you to turn them on to see the material). Of course, once you do any of that, you’ve just sold yourself into another dozen marketing lists, without warning or compensation. But that’s not all.
Suddenly, many media outlets online (radio, networks, print) are using something called Cloudflare. That product is a kind of ‘protection’ against certain abuses… a bit like an anti hacking or virus bot. But it does something else, as well. It also prevents anyone from copying and pasting a URL into a social media post. WHY? In the past, getting your URL spread about was a good thing; it brought them more viewers, which increased the value of the advertising opportunity for their Web pages. When did they decide they didn’t want more readers, and why?
Where the Conspiracy comes in
Sure. You can call this answer a theory; a conspiracy theory. That is what it is, plain enough. The only way the above sins can be excused as desirable is if somewhere, someone important and powerful within media and in political realms, decided that it was advantageous to dumb you down, and limit your ability to rely on URLs to relay facts and correct people when in error. It is an insurance policy to protect the ‘integrity’ of the versions being spread by the trolls and bots.
I mean, when your read some crap someone has posted which is to your understanding just that, a lie or false belief, you should be able to go find a news article or other authoritative source online, copy the URL, and paste it into your reply to prove your case. When you are trying to educate someone on how you feel about something, you should be able to do much the same, to prepare your post or meme… have a supporting factual link to go with it.
Someone does not want you doing that. They want you to hear something said 20 times and accept it as truth, with no way to verify it, or refute it, if false. There is only one person in the media industry who fits the bill. If you are a Sheeple, you will recognize his name but not realize just how powerful in media he is, or in political realms, and how deceitful he is. I am speaking of George Soros.
It is that simple. When most of us rely on TV news, we only get one slant (liberal, usually, conservative if you go out of your way). Because of TV’s own special dumbing down tricks as earlier referenced, you will walk away with a very encapsulated message with is has no actual understanding associated with it. Then, when someone puts their slant on it and you get hit with that 20 times, it becomes your slant, and people like me and others who prefer to think for ourselves, are increasingly finding it difficult to correct any errors.
Worse, if you do think for yourself, you may not be able to learn what you need to make an informed decision, up front. Heaven help you if you are trying to investigate what seems like a conspiracy theory, because of glaring holes in the official story. Obscuring the true story seems to be the way of things, today, so just ‘move along, folks.. nothing to see, here.’
When you add all this to what is taking place in the public school system and in higher education (liberal indoctrination), your children will think this is the way it is supposed to be, and whomever is in power when they are adults will be able to do and get away with whatever they want. They will dictate to them what to believe, and it will be believed. The notion of thinking for themselves, and of distrusting and challenging government will be foreign concepts. They might as well be called the 20x Generation.
The ’Snowflakes’ on the left are already a part of that group, unwilling to listen to facts or reason, and repeating what they are told to believe. I, for one, am not willing to pass the reigns of our nation’s future over to them, in their current state of mind. I’d rather have an armed revolution, if that is what it takes, to end their madness for them. Constant outrage based on lies serves no one’s best interest, except at the top of the food chain.
So my last question for you is this: do you want to be a Sheeple morsel for Wolves like Soros and his elite political friends, people more interested in Globalism than what is right and moral? Or do you want to be a think-for-yourself consumer of actual news you can easily access, rely upon, and use when talking to others about things which matter to you?
If the later, you had better start complaining to media, and to politicians about it. You might even want to consider taking legal action or starting an initiative ballot, if your State has that option, to write laws forcing journalists to adhere to journalistic standards and to make their stories available more appropriately. You certainly ought not simply be sharing what is being fed you currently without verifying for yourself it is the truth.
Else we all become 20xers… or we have that revolution, the least desirable of options.
We depend on Government in emergencies. But what if the emergency system designed to warn us was turned against us as a tool for Control? The unusual flurry of false EAS alerts of late may point to just that…
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
What you will learn reading this (long) post…
- There has been a staccato series of ‘impossible’ false EAS alerts of late;
- In fact, there have been twice as many as national media admits;
- They defy statistical probabilities with no historical precedence;
- This mimics other, similarly odd critical historical infrastructure failures;
- Those infrastructures have associations w military & intelligence communities;
- Their failures appear to serve the interests of the military/intel players;
- The associations and interests are also a commonality to the EAS failures;
- An analysis/projection as to what it all means: what to worry about.
Why can’t we trust the EAS System??
It makes no sense, unless you are a conspiracy theorist who knows something from history that others, do not… things having to do with CIA conspiracies which were NOT theories, but actual proven crimes. No one, I doubt, other than any conspirators involved, is in a better position to explain the true significance and offer the full details of these failures, than this writer. The full story is far bigger and scarier than the almost ‘entertaining’ or matter-of-fact dry news approaches found elsewhere, when dealing with the topic. We start with a simple question…
What is wrong such that there have been as many a EIGHT (more than a dozen, technically, depending on how one chooses to count) false Emergency Alert System issuances in the span of five short months… and that does not include several more potentially related, as separately described. That is in stark contrast to the fact that in the previous twenty years since replacing the old Cold War CONELRAD Emergency Broadcasting System in 1997, there had not been a single false alert of the same sort?*
It’s bad enough that EAS alerts start off with extremely annoying assaults in your ear, but when they turn out to have scared you into action for a false reason of some sort, you really get ticked off. Unfortunately, it appears there is even more to be angry about, than any of that… something greater to fear than these errors… even greater in scope and threat, perhaps, than the messages themselves, portrayed, even if real. Let’s take a look:
- False Tsunami alert, Jan 2, Seaside Oregon. Very specific, advising 4 hours to get to high ground;
- False Nuclear Attack alert, Jan 13, State of Hawaii. Very specific, advising “BALLISTIC MISSILE THREAT INBOUND TO HAWAII. SEEK IMMEDIATE SHELTER. THIS IS NOT A DRILL;”
- False Flood Warning, Jan 17, Morris County, New Jersey. Specific, narrowly distributed, and persistent, in that it was repeatedly issued to customers of only one cable provider, and could not be ended unless turning the the TV off and back on, after which it would reappear after a few moments;
- False Tsunami alert, Feb 6, Portland Maine. Also appeared in West Palm Beach, FL, and other locations on the East Coast, various locations in the Gulf of Mexico, and Puerto Rico. Very Specific, giving only 57 minutes warning;
- False Blizzard alert, Feb 19, Tucson, Arizona. Specific. Snow of any kind is extremely rare, there.
- False Tsunami alert, May 11, State of Alaska (two instances). Very Specific, and though only aired in Alaska, warnings itself cited entire North American Coastline (including British Columbia) and Hawaii;
- False Zombie Alert, May 20, Lake Worth, Florida. Very specific “POWER OUTAGE AND ZOMBIE ALERT FOR LAKE WORTH AND TERMINUS.” Companion message followed some time later “THERE ARE NOW FAR LESS THAN SEVEN THOUSAND-THREE-HUNDRED-EIGHTY CUSTOMER INVOLVED DUE TO EXTREME ZOMBIE ACTIVITY. RESTORATION TIME UNCERTAIN.” Note: for some reason, no news source makes record of BOTH messages, and many news pages on topic are now ‘404 Errors,’ as if someone is vanishing select reporting on this incident;**
- False Civil Emergency alert (2 messages), May 29, four counties about the Salem, Oregon State’s Capitol. Not exactly a false alert, it simply was wrong in content, non specific, “CIVIL EMERGENCY IN THIS AREA UNTIL 11:28 PM PDT PREPARE FOR ACTION.” This was followed by a second message some hours later advising that it was a “WATER EMERGENCY FOR THE SALEM AREA,” but gave no specifics, instead giving a web link for details. That clarification did not go out to adjacent areas, leaving those citizens, in the dark until media could figure it out and advise using their own services.***
- Potentially Related: False Nuclear Power Plant Accident Alert, May 23, 2017, Salem County, New Jersey. A drill being conducted was interpreted as real by the system;
- Potentially Related: False Blizzard Alert, May 16, State of Nebraska. Very Specific, listing all counties. Note: this alert was not found in mainstream news, but in a Youtube. However, the presenter specializes in videos of seismic activity recording instruments during events, and therefore, seems unlikely to be fake;
- Potentially Related: False Zombie Alert, May 16, Great Falls, Montana. Very Specific, and claimed to be a hacking incident.
- Potentially Related: False Nuclear Attack Alert April 22, 2018, Winnipeg, Canada. The Canadian system is not an American design, and works differently. However, there is some interfacing between them, as seen in the Alaskan Tsunami warning. This message was heard only (above link) through the cities various loudspeakers, which were not part of any official alert system, and is thought to be a prank. The message was, however, quite frightening and detailed, very specific, and, delivered in a computer voice with believable content: “This is a National Emergency. Important details will follow. (unintelligible) (emergency tones) The following message is transmitted at the request of the Canadian Government. This is not a Test. A nuclear attack is occurring against the United States and Canada. Six nuclear missiles have been launched from unknown locations, and are expected to strike the United States and Canada within the next 15 to 25 minutes. Due to the uncertain path of these missiles, all Canadian residents should seek out a fallout shelter immediately. If members of the Canadian armed forces direct you to a fallout shelter, please follow them for your safety. If no fallout shelters are available, get as far underground as possible. Stay away from windows, using heavy objects to put as many walls an layers of protection between you and the outside world as possible. You should put together a basic emergency survival kit including a flashlight and battery operated radio to use during your stay in the shelter. Stay tuned to local media for further information. Do not venture outside until notified it is safe to do so. Prime Minister Justin Trudeau will be speaking on all stations shortly“
One final point to consider: there are ‘consistent themes’ present in all of this, not all of which are obtusely visible, and perhaps not all revealed, herein. There is a Zombie theme, a nuclear theme, a Tsunami theme, and a ‘name’ theme, where the names of some counties involved match the names of some cities involved in other alerts, or vice versa, and similarly, a map location theme (East, West, and Gulf Coasts, and dead center U.S., plus Canada; all four ‘sides’ and the ‘center’). There is also a ‘date’ theme, since all but one event transpired in the same three months, six of those in one month, two on the same date. Collectively, these thematic patterns raise additional questions as to the likelihood of mere ‘coincidences’ or ‘accidents’ being involved.
Note: this is a long post which goes into great detail that there be no misjudgment by the reader. It is suggested you not read further until you have enough time to finish (scroll now to evaluate reading time).
*Each of the false alerts prior to 2018 had a completely different nature than those cited above, especially in that the older false alerts were not generated by use of the system, as such. All but one of those above had a cause/blame element or mitigating circumstance pointing to failures in the system, even when human error was also involved, whereas all prior errors on record (about a dozen spread out over the 20 years), were due to hacking (1), mistakes in advertising (several), or film production (several). There were additional failures where tests failed to transmit, at all. It can be said that all of the historical problems boiled down to human error traced to failing to understand how the system worked, or failing to use it at all (failed transmissions). That is not true of the six in question.
The thing to underscore is that there is near zero similarity to the current failures, in analysis. Even when human error played contributory roles (two events), something in the System, itself, was also to blame… which is a mystery, because there has been no change to the system which could account for a change in reliability or performance. Differences aside, keep in mind too, that there is no guarantee that any given official explanation is necessarily the truth; such things gone wrong involving government often involve cover (up) stories… especially if there is a conspiracy, somewhere in the woodwork.
There was one instance of hacking in the older events, but a long list of those older false alerts were triggered because radio or TV stations used tape which had previously held EAS content, where the signal which triggers the system was still detected by the system though otherwise inaudible. The EAS tone has a digital signature which the system detects for actuation… and the annoying tones themselves are that digital signal in audio form… which also triggers the system if in broadcast content. Beyond the hacking, this signal was itself the source of the remaining problems, primarily because human operators were unaware of it’s technical nature:
One national Arco Ad deliberately included the tones with the ad message to get the listener’s attention in ‘gag-like’ motif, and concluded with “This test brought to you by ARCO.” One local advertiser also incorporated the tones in similar marketing intent, but the NBC affiliate running the ad locally did not know it would trigger and automatically transmit the alert nation-wide over the entire NBC network. Movies sometimes include the sound in their digital sound tracks when the plot calls for it, and when aired on TV, that, too, triggers the system (Olympus Has Fallen was an example). The most recent example was a sports radio program using the tones in a review of a sporting event where the alerts triggered during the event, a matter resulting in $2.5M in fines to the program producers and the station involved.
These differences highlight the unusual series of late, which contrast in both frequency statistics and historical relevance; if the given explanations are true (there have been few explanations yet offered, and they have been speculative or non specific in nature, chiefly passing the buck to some other quarter; ‘It wasn’t us;’ the message came from (someone else). ‘Someone else’ had nothing to say. So, we now have one more serious question to ask:
How come we have not encountered these kinds of failures, before?
**The Zombie alert is particularly disturbing for three reasons, none of which sound particularly believable, but they are true. One is tied to where it took place, in that there have been multiple news stories in Florida in this last decade, all about REAL Zombie attacks, including banned Youtube videos of a naked man who had to be shot by Police because he refused to obey orders to stop eating the face of another man he had subdued violently. Another incident had a man who was undeterred by multiple tasers and a Police Dog, and had to be pulled off of the body of his victim by four Officers, after chewing on his victim’s face. These attacks were blamed on Flakka, an exotic Chinese-made designer drug with extreme and unpredictable hallucinogenic properties.
The other is that the Center for Disease Control’s official Web site has a whole page on Zombie attack preparedness. It is a not-so-easily-detected Onion-style tongue-in-cheek attempt (they claim it a marketing gimmick) to force people into thinking about emergency preparedness. It may have worked, but given the news stories and the EAS alert, one has to wonder… how is it that the word Zombie has more something like a dozen times made it into elements of the EAS system? In the recent incident of concern, it seems the word was not typed in by a human, but somehow, it was substituted for the word for ‘weather.’ I point out that procedurally, it takes two people to enter a custom message, the typist, and a supervisor who dictates and/or approves it while watching over the shoulder; a kind of failsafe system to spot/prevent such errors.
The other general false Zombie messages took place in 2009 and 2012. Highway traffic alert signs (i.e., the ‘Amber System’, School Zone signs, freeway traffic signs, etc.) started warning of Zombie attacks. Amber and many highway systems, and any local emergency cell-phone subscription services, are all interfaced with EAS to one extent or another. The Zombie messages transpired in scattered cities around the nation with some variety in specific content. One school zone speed warning sign read “ZOMBIE INFECTED SCHOOL AHEAD”, whereas most of other traffic signs read “WARNING! ZOMBIES AHEAD.” Fortunately, those events were not based in reality… yet.
One more ‘bonus’ reason exists, but is its own matter of importance with respect to the conspiracy theory alluded to in the introduction.****
***The Oregon Capitol (Salem) suffered a biological water contamination (algae bloom toxins) which was dangerous to very young or old persons, and anyone with a hampered immune system. But though city planners were aware of the problem, they waited four days before issuing the Alert, thinking they would simply ‘fix’ the problem with water treatment, and retest the water.
That’s what they did, but the brainy (I should point out that Oregon is run by extreme leftist progressives, not known for thinking problems through to proper conclusion before acting) Oregon officials failed sent the sample to an out-of-state lab by mail despite having ample local testing resources, forcing a considerable delay. Additionally, the problem initially transpired over a holiday weekend, and they just couldn’t be bothered to be proactive in the face of a potential life-threatening situation. Oregon is often described as a ‘Let-it-burn State,’ because they habitually fail to respond to emergencies until an extreme crises, a pattern especially visible in how they respond to forest fires… which is to say not at all, unless and until it starts threatening communities or major commercial ventures, or starts to make national news (they don’t like negative PR).
In like manner, the State failed in its ability to notify citizens when the water was finally again safe to drink. Some blame the Governor, Kate Brown, who is thought to have ‘not let a good crisis go to waste,’ and who thereby let the problem get large enough for grandstanding, by calling in the National Guard to provide potable water in a near ‘Martial Law disaster response’ manner. That thus illustrated ‘leadership in a crises,’ when it was actually a non crises which had apparently already resolved itself, before she gave the orders, had anyone bothered to correctly clarify the matter.
Even the second EAS ‘explanation’ message was sufficiently non specific such that it caused extreme social and financial hardships on businesses and citizens, esp. those working for the countless eateries and other firms which shut down because they feared using water, at all, and because people panicked and hit the stores to gobble up as much bottled water as they could muster. As result, some stores raised prices on bottles to as high as $50 a case, and they got it. The Governor has ordered those firms to be prosecuted for their profiteering in a crises, which is akin to hording in terms of emergencies, under the law. This was also part of her grandstanding, as it seems the threat was never carried out, probably because the law only applies under FEMA control in disaster response, and/or in the case of actual Martial Law. I’ll defer to legal teams on that, as this is certain to lead to lawsuits against the City and the State, as well as stores involved (that’s another way Oregon burns).
In addition, Kate attempted to blame Donald Trump policies in purely political diatribe, which had nothing to do with anything. And, subsequently, the State moved to order residents of four rural counties to ‘stop using well water’ because ‘it is lowering river levels’ and threatening the water supply of the cities. The State has no legal right to usurp the property (water rights) of citizens without due process, and in point of fact, the wells in question do not impact the river levels, as is scientifically proven by several means.
But it made good PR for the liberals in the cities, who hold the greater number of votes. So, in a way, this particular EAS was part and parcel of its own little political conspiracy, though it did not originate as such, nor was it causal to the false and functionless alerts… assuming you don’t count public panic a function.
****Conspiracy? This conspiracy theorist has many times proven theories true, and in fact, correctly predicted 9-11, and afterwards, personally thwarting another predicted terror attack in Portland (link: mid page). Over the years, conspiracy theorist thinking also enable me to help put a good number of bad people into jail who were engaged in organized or individual crimes, some of which made national news. These predictions and the crime busting was largely made possible by first formulating a conspiracy theory, then postulating a means to prove it, and researching to find the predicted evidence it was so. There is no difference in methods employed by a good theorist and law enforcement, except that the later has virtually unlimited resources and tools available.
By such means, after ten years of research, I developed Unified Conspiracy Theory in and for my book set, Fatal Rebirth. It was the UTC which predicted the terrorism, and much more as cited above, including the Derivatives financial disaster, select gun violence, an assassination attempt tied to a Presidential campaign, and much more. In reverse manner, it showed how the long list of ‘random’ bumps-in-the-night of American History (i.e., S&L crises, assassinations, Iran Contra, OKC and WTC bombing, etc.) were not random, but stepwise logical acts in a PLAN to towards meeting a SPECIFIC GOAL… which also accounts for the extreme leftist nature and actions of the Democrats since Obama took and then lost office. That, I did not foresee, though at the time, it appeared that the far Right would do much the same if unchecked. Let’s just say that the UTC saw little difference between a Clinton and a Bush… ‘New Boss same as the Old Boss.’
The history which enabled the UTC itself brings us to some things which were part of those bumps in the night… which directly speak to this rash of EAS false alerts… as well as the highway sign warning system false alerts. The UTC in fact predicted abuse of EAS in false flag manner. That history tells us that these emergency alert systems were not the first to suffer highly questionably and unbelievably coincidental rashes of system ‘failures’ tied to conspiracies. To explain, we go back to CIA’s Operation Mockingbird… which through knowing, will help explain EAS matters. If already familiar with Mockingbird, you may skip to the last paragraph in the section, below.
Operation Mockingbird was a CIA project which was started in the 1950’s (Wikipedia uses the word ‘allegedly,’ but it is well documented, even indirectly referenced in the Congressional Record in both the Watergate affair, and in the Church and Rockefeller Committee reports on CIA mind control operations. Mockingbird disinformation was a subtle but effective form of mind control through, at the very least, the mid 70’s… and that date IS ‘alleged,’ because there have been many proofs it is still in play well into this Century, as one example, below, will attest.
Mockingbird was a large-scale infiltration of mainstream U.S. and foreign Media. In the U.S., alone, there were thousands of operatives involved. This included small student and cultural organizations all the way up to big TV network news and newspapers, and Internationally, it included whole Wire Services, such as A.P., U.P.I., and Copely… which of course, also impacted American news sources who regularly passed on their stories unchecked. Most were recruited as in place employees or managers ‘hired’ or ‘bribed,’ or otherwise coerced into cooperation, but actual CIA agents were also put on the payrolls of cooperative media. In some cases, CIA actually bought the firms, and staffed them with whomever they pleased.
Big names were involved, too. William S. Paley (head of CBS), Walter Cronkite (CBS), Henry Luce (Time/Life), James Copely (Copely News Services), Phil and Katherine Graham (Phil @ Washington Post and as head of Mockingbird within his industry, Kate following in his footsteps, and later, Time/Life/Warner’s infection, along with their existing Mockingbirds). The list goes on, to include many key people in at least 25 newspapers and every TV network — and Hollywood was by no means exempt. That number of newspapers is interesting, because it is not the first time.
Prior to WWI, the ‘Powder Interests’ (the predecessor to the Military Industrial Complex) organized conspiratorially to get America into the war by bribing the Managing Editors of 25 newspapers to sway America away from its isolationist and neutral thinking regarding the war in Europe. That IS succinctly and precisely found in the Congressional Record. They did this in a manner similar to the way a CIA Public Relations Firm and CIA proper arranged to get America into ‘America’s New War’ (the ‘slogan’ adopted by mainstream media in Wag-the-Dog media manipulation manner), Desert Storm, the liberation of Kuwait. This was a modern post 2000 example of Mockingbird’s model in play.
CIA and it’s CIA controlled PR firm, fostered a lie (disinformation) in news stories and in false testimony before Congress (and rolling news cameras) that Iraqi invaders were killing Kuwaiti babies, Doctors, and Nurses in order to steal incubators from hospitals. In WWI, they did the same, the lie being that Germans were raping and cutting the breasts off of Belgium women thought to be corroborating with the resistance movement. Both lies were bought, hook, line, and sinker, and helped bring America to war. The first casualty of war, is said to be ’Truth,’ and it falls well before the war actually starts.
What does that have to do with EAS, you ask? What is EAS (and the highway signs), but a way to spread key information to people… or DISINFORMATION? It is just a slightly different but much more urgent and powerful cannot-be-ignored way, than mere media. Now, for the rest of the story: this is indeed not the first time there have been conspiracies which parallel these ‘errors’ in other kinds of critical national systems… and their very nature implies Mockingbird-like ties to the intelligence community, was involved. Everything you are about to read next about these events is fully reviewed and documented in Fatal Rebirth, and were, in fact, key components of the UTC’s evolution and ultimate predictive capabilities.
Telephone and Power Grid systems
Both of these critical national infrastructures are well regulated, if not designed, in a collaboration between their key industry players and government overseers, including one or more intelligence agencies. NSA and Ma Bell worked very closely together to design the ‘modern’ digital telephone system (‘modern,’ because it was as early as 1960… an important date in our discussion). FBI and CIA were also ‘in-the-loop,’ along with the Pentagon and at least Army Intelligence (perhaps other branches, as well).
The nation’s Power Grid, on the other hand, has been an evolving design overseen for security and technical purposes by the US. Department of Energy. DOE has historically had strong ties to CIA, to include, for instance, cooperative efforts in the area of Mind Control research (again, in the Congressional Record, and in this case, official DOE files online). Again, FBI, et. al, have always been in the oversight loop. Curious then, that both these systems have suffered mysterious rashes of failures almost identical in pattern to the EAS and highway sign failures. I summarize, here, from documentation in Fatal Rebirth:
The Power Grid has suffered two ‘batches’ of failures. The first was over two years (1996-98), during which three of the four major multi-state grid sectors suffered a complete catastrophic power outage. The second string of outages took place over three years (2001-03) with similar results. Both series involved other countries, as well, all relying on US grid design formats or the failed grid’s power, itself.
This was all blamed on trees and lightening strikes, neither of which hold water for technical reasons which render them it quite implausible, especially given the repetitive nature in tight time constraints… it would be like claiming every assassination effort in the last 50 years involved a JFK magic bullet, including the one against Reagan by Sqeaky Fromme, where no shot was fired. Simply put, trees are not allowed anywhere near the high tension lines involved, and all lines are isolated from ground, where their towers are in their place grounded lightening rods intended to prevent lightening strikes from impacting the lines. These are cover up stories. If they were valid explanation, the history of outages would consistently have the same failures ongoing, and not be isolated to neat little clusters.
And it is JFK which brings us full circle to that 1960 date… and to the phone systems. The digital phone system was launched in 1960, just in time for the assassination of JFK in 1963. The entire phone system in Washington, D.C., was shut down the very hour of the assassination, and not restored until Vice President Johnson was sworn in. Evidence generally accepted in books on topic (i.e., Mark Lane’s Plausible Denial) indict G. Gordon Liddy, ex FBI player trained in manipulation of the digital system, and closely aligned with the CIA team assassinating Kennedy according to courtroom testimony (same book), also the same team to the man involved in Watergate, along with Liddy. The D.C. outage would eventually be duplicated in a bigger scale, nationwide…
These also were in two batches. In 1991 a series of major land-line outages in America caused large area networks to go dark, all within the same two month period, each impacting key cities and whole States, D.C. style. In fact, D.C. was one of the cities, and part of the mystery is that major cities on vastly different regional networks were simultaneously failed in most of these outages, often thousands of miles apart. Like the Power Grid, post Fatal Rebirth, another series of such outages has taken place, this time impacting select Cellular carriers, the most recent recent of note impacting multiple carriers and the entire Southeast U.S. More to follow, on that. Like the EAS alert errors, no actual definitive explanations were ever fielded.
What it all means
There are two important meanings. The only one obvious and stated elsewhere in media accounts on the topic is the concern about public safety. If you cannot trust the accuracy of the EAS system, people could end up being harmed physically or financially by false alerts, or worse, end up in like state because they had lost faith in the accuracy of the system and failed to properly and promptly respond to an actual emergency. It matters now WHY the errors exist, for this concern to be valid. Be it because of hacking, human error, design flaws, or political motives, lives are still at risk of serious negative impact. But that is nothing, compared to the greater, unseen threat implied as covertly present:
The UTC says these were all test ‘failures’ caused by elements of the intelligence community, principally as ‘tests’ of their ability to manipulate the systems involved, as a matter of Civil Control. This would logically be a logical step in preparation for potential serious civil disobedience, Martial Law, or some kind of political Coup. The more recent events were, in fact, predicted by the UTC in Fatal Rebirth. Such would be a powerful disinformation tool, one having the unique potential to be both a conspiratorial false flag style pre event deception, and a support for post event cover up… ‘official proof’ as to what the ‘official truth’ was intended to be.
Certainly, any given event we have reviewed could in truth be simple natural failures with no attendant conspiracy attached. But given the batch nature and other similarities to the power/phone system failures, and the other highly coincidental clues discussed herein, the whole cannot in any way be innocent. Consider this: if we suspect conspiracy based test ‘failures,’ we must presume they would need to predate some future major event of potential concern such as to warrant such a desperate total blackout of (power, phones, or both… along with EAS, and highway signs.) Restated; if expected to be needed, you would damn well test something that complex and important, first, and early enough to perfect the effort should it test poorly. Any such predating would need allow a couple several months to years to ‘fix’ any flaws causing the tests to fail, in order to retest to insure it worked flawlessly when it really mattered. Hence, tests might require two batches.
So… what about that dating?
We need look at the outage dating and see if there were any events which might require outages of power and phone systems, as a means of validating conspiracy concerns. We must think of such outages as contingent emergency responses to control populations in an otherwise out-of-control situation threatening government security… or the security of those working in the shadows on conspiracies of their own against the nation. If we find such in place, then we have a potential UTC-like scenario we can then apply to divine what may lie ahead, based on the current flurry of false alerts.
Power, 1996-98: two years before 9-11. If that was a false flag attack, as much evidence reveals it to be (another part of the Operation Northwoods plan thought to have part of why Kennedy was assassinated), then any serious failure in keeping the truth a secret might require shutdown of the country’s ability to rally against a more dramatic coup required to prevent or deal with armed revolution, or similar civil upheaval. A FEMA takeover would be the perfect cover for such a coup, and give time to manufacture and establish an effective cover up, such as showing some dead bodies thrown under the Bus as conspirator ‘ring leaders.’ In fact, Homeland Security was established exactly two years prior to 9-11, to the day… and was planed by PNAC and the Anser Institute (an intelligence community think tank), all planned in the same general time frame as the test outages.
Power, 2001-03: one year prior to a UTC predicted terror attack on Portland, Or, which I personally thwarted, involving two of FBI’s Top 10 most wanted terrorists (identified by video and eye witnesses – details here)… not to mention at least one FBI agent, false flag style. Five years before Barrack Obama would run for President with some reason to fear possible assassination, which could in theory spark a race war or similar unrest. Either one of these events might require outages in order to retain or restore control and mitigate damages from resulting civil turmoil.
Power, regional Southwest outage, 2011 (also post Fatal Rebirth): this is the most recent and singular outage event, only suspicious because no cause for it has ever been discovered, though hacking and terrorism have both been ruled out. It is several years before the growing racial violence potential during the Obama Administration, and for the matter, the current turmoil among the radical left caused by Trump’s Presidency. Additionally, there has been an endless series of news events, mostly centering around gun violence involving black victims or civil rights issues had a potential for sparking the race war feared by the Rodney King beatings. The assassination fear would also remain.
Phones, 1991 series: three years before the Rodney King beating, the WTC bombing, and the Branch Davidian nightmare at Waco. The CIA, military intelligence, and the greater Military Industrial Complex were involved in all three events. Two years before the assassination attempt predicted by the UTC on Presidential Candidate H. Ross Perot.
Phones; regional outage 4 carriers in four Southeast States, 2011 (post Fatal Rebirth): this was allegedly due to a single cut land-line cable, but who and how the cable was severed has NEVER BEEN DETERMINED. There is a possibility that the cut took place AFTER the outage was achieved by other, unknown means. The Occupy movement was generally organized/proposed/planned beginning in May of 2011. Intelligence Agencies would have been aware then, or shortly thereafter, and would need to take some time to consider contingencies, once knowing the event’s schedule. The outage transpired in August, and the actual Occupy Event in America took place in mid September, exactly 45 days later. It had the potential to be evolve into a national or even global revolution.
A little complex to relate in a blog already long in tooth, but suffice it to say that any one of these outage events could easily be shown to be a preparatory test in support of a plot or other expected event with the potential to result in wide-spread civil disobedience. CIA operated spy planes remapping US cities and coordinated with the Pentagon in planning for military takeover if riots spread beyond LA, where military intelligence operatives initiated much of the violence disguised as angry Blacks from Watts. WTC was orchestrated and facilitated by both CIA and military intelligence, principally to empower Osama bin Laden’s Al Queda as the premier terrorist group, and place two top aids into the organization as double agents. The bloody end planned for Waco risked exposing CIA mind control programs and premeditated mass murder, and took place under Bill Clinton, he and his wife also ‘former’ CIA operatives, if not agents. Perot’s assassination attempt was by mailed Anthrax, same as used against one of Clinton’s body guards who was to testify against him in the Whitewater affair, and as used against media and Congress post 9-11. Any one of these events going wrong and leading to exposure of the truth (esp. who was behind them) could result in serious civil upheaval or dangerous collapse of government infrastructures, including the military and intelligence community.
Note: Phone and/or Power outages also generally kill Internet services in the same areas effected. Power outages kill everything, including gasoline supplies, sales of critical emergency supplies at most retailers, and access to cash from the banking system. These things critically impact the ability of Citizens to exercise much of any effort beyond mere survival, easily putting a crimp in any major organized events. Outages effectively ‘freeze’ political, social, and physical states of the region(s) affected until authorities can gain control. Emphasize, CONTROL.
What might the current EAS failures portend?
What if the theory is true? Again, in UTC manner, one can attempt to ‘look ahead’ and divine what might be needed to fulfill the last remaining ’puzzle piece’ in the theory; the otherwise inobvious ’need’ for such a test. Two such possibilities come easily to mind. Without being more in tune with current events at the book-research level, I can think of no others, but they certainly may exist. Or, of course, I could be all wet… which is for you to decide… comments welcome, even if critical.
Given the current level of unrest and hatred found on the far left, and the violence and aggressiveness they have lately resorted to, I can only conclude that many of the EAS failures were potentially tests preparatory for a national crisis based on an attempt to depose President Trump and assume control of the White House. It might be an assassination, some form of a coup attempt, an outright civil war between the left and right… or as simple as a highly questionable impeachment effort. I rate that as number one in likelihood.
Number two relates well to the Zombie element. Many conspiracy theorists… and the UTC does foresee the possibility… believe that some form of biological pathogenic pandemic based on zoonotics (man-made virus, generally race specific) is in our future. Fatal Rebirth and my latest book, Who’s Killing the Bilderbergers, both spend a lot of time examining this notion. The theory is that the New World Order will move to both reduce the population of the World and to weaken America’s ability to defend itself against foreign interests (including NWO desires to see a North American Union consisting of Canada, the U.S., Mexico, and the other Central American countries), and will foment a biological attack disguised as some random but previously unknown virus.
It is also possible that large quantities of Flakka could be manufactured and introduced into the water system, slowly. That would make some sense of the Zombie alerts, and the EAS problems related to the water system in Oregon. Slow introduction of Flakka would result in evolving mental instability of the population, at large, such as we are seeing demonstrated more and more in bizarre news stories. At some point, ‘Zombie attacks’ would start to transpire, especially with a sudden increase in Flakka distribution through secondary food sources or aerosol disbursement. If this scenario were a valid concern, the ability to interfere with the EAS system in the event of water testing producing evidence of Flakka introduction would be necessary, which therefore makes Oregon’s EAS failure a little more suspicious than simple stupidity or political malfeasance.
Regardless of if you accept my evaluation and speculations, or not, it is clear we cannot trust the EAS system, and whatever the reason behind the failures really is, it isn’t going to be an answer likely to make us warm and fuzzy about the system, or our future. Especially since it looks like we will never get that answer, at all. That, btw, is how conspiracies work best; treat the public like mushrooms in the basement. You won’t be fed useful information likely to get you out of the dark.
It helps nothing that you can find at least a dozen Youtube’s and other Web resources telling you how to fake an EAS alert. Doing so in any way which reaches the public or accidentally triggers the EAS system, is a federal crime. That so many seem to be freely promoting fakes alert methods… itself seems somewhat conspiratorial.
Yet, somewhat unfortunately, one MUST play safe and act as if any EAS alert is valid. Ultimately, that is the only advice I can offer… but as the baseball player said in Field of Dreams… “Watch out for in your ear.” If you prefer a brainier quote: “Men still have to be governed by deception,” Georg C. Lichtenberg, 18th Century Scientist and Political Satirist.
Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.
1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.
2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.
3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.
4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.
I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.
It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.
Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.
12 Step Origins
Templars Masons Theosophy Rothchilds
The 1 step solution is also useful in targeting issues
- The sermon uses the topic of powers and principalities of ancient times to frame the lesson… and both addiction/abuse and targeting are born of powers and principalities, as is all sin…
- An addict/abuser ‘worships’ their particular sin of consequence…
- A TI ‘worships’ (by constant worried attention) their targeting issues of consequence (equating to sin)…
- Bending the knee to Assyria in the sermon equates to giving in to sin…
- So (the Pharaoh of Egypt) equates to you (your flesh, the Old Man) and your inadequate will power to resist sin…
- Which in turn equates to buying into the enemy’s (sin) Press Releases (that they cannot be resisted) wholeheartedly, accepting the belief the enemy cannot be overcome, by or of ourselves…
- If you listen carefully, you will hear echoes of 12-step program dialogs! They simply borrow the truth and apply it in their own way… and with respect to targeting, twist it to meet their own ends.
- TI Defense: 30 Tips to Help Fight Back
- Why am I Being Targeted? A Valuable Question for TIs
- FREE WILL: A TIs Greatest Asset, Oft Hardest to Employ
- How a TI’s Belief Structure Can Fail Them Dangerously
- Smart Meters, Stray Voltage, and Targeted Individuals
- Smart Phone EMF App No Value to TIs
- A TI with RF Measuring Device can = Dangerous Conclusions
- 7 Tips: How to outreach, preach, or beseech if a Targeted Individual
- Free Will Haven; Targeting Free Intentional Community for Stalking Victims
- Why Targeted Individuals should not hook up with other TIs
- Testimony to Mass. State Legislature on Bill Restricting Electronic Weapons
- A Glimpse of MC Realities (from the Preface)
The Antichrist is coming, and there needs to be a throne ready for him to occupy. Thus the New World Order is stepping up its one-world government effort and increasing their visibility in the process… and translucence… which equates to luciferian Illuminati-like illumination… often in the form of giant glass pyramids.
What you will learn from this post:
- the Illuminati, Freemasons, Knights Templar, & Round Table Groups are the NWO;
- with the same fascination with ancient mysticism, occult, and numerology;
- and the same desire to associate their works with symbolism such as the pyramid;
- that they have been building pyramids seeking to employ mystical aspects similar to Cheops, the grandest of Egyptian pyramids;
- said pyramids sharing commonalities in occult alignments and numerological peculiarities;
- where one complex of pyramids is tied to a rather interesting conspiracy Egyptian in nature;
- and another complex of pyramids appears to involve hi-tech mind control;
- and is itself apparently aligned with all pyramids in Europe, and likely, elsewhere!
The Source of Illumination is darkness…
In several of my books touching upon aspects of the New World Order, I carefully point out the important role played by Freemasons and their involvement with the dark occult and, primarily, ancient Egyptian mysticism and numerology (specifically, where numbers can translate into meanings with magical powers of manifestation). I am not talking about the rank and file lodge members duped into thinking it merely a benevolent fraternal organization, but of the satanic High Masons and select Masonic operational organs which operate secretly, within. The satanic Illuminati, for instance, sprang out of and followed Masonic constructs and principles… and it was they who officially launched the New World Order movement in 1776, their goal to destroy all governments and religions, to replace with their own, providing a seat for the Antichrist. We can also thank them, and head Mason and avowed satanist, Albert Pike, for the KKK, and more.
It seems quite apparent to those who study the nature of Globalists who seek the N.W.O., that they are usually High Masons, satanists or otherwise steeped in the occult. They are often members of or work through the so-called Round Table Groups, such as the Council on Foreign Relations, the Trilateral Commission, the Bilderbergers, the Club of Rome… groups made up of power moguls who control corporations and whole industries, government agencies and military power, and media and education. These, collectively, can be called Globalists, because they seek a one-world government, which is needed in order to seat the Antichrist.
In their works, they frequently employ the same symbolism and engage in occult events right along side of others of their ilk (i.e., Bohemian Grove). While what they believe (occult) should seem silly to a rational person, I remind the reader that it does not matter what you believe to be true, or false… it only matters what they believe. If you fail to acknowledge their beliefs as part and parcel of their modus operandi, you will fail to recognize them and their works, and be unprepared for their plans as they unfold. And much has unfolded, in plain sight.
Here, I will focus on one small aspect of their existence which is quite central to their beliefs; one of their most sacred of visual icons, the Egyptian Pyramids. Pyramids, especially the largest, Cheops, are as important to the Masonic underpinnings of the NWO as is the Cross to Christians. More so, in fact, as it is far more than mere symbol, to them; it is a powerful tool, and their fascination with ancient Egyptian mythology is quite anchored in Cheops. One need only look at the pyramid found on the obverse of the Dollar Bill and its all-seeing eye, to find a stark example. Of late, for a variety of disparate but coincidental reasons, I have made more recent observations which relate to this notion… things which you can easily verify yourself by use of Google Earth.
Square one, the base lines of Cheops
Cheops is the largest of the Egyptian pyramids, having many astrological alignments and dimensional (numerological) mysteries, among them being it was said to have been located at the the center of all land mass; it’s axis therefore dividing the known Earth at the time into quarters; Cheops baselines were aligned due North/South/East/West. As the N.W.O. players gain in power and ability to establish a one-world government (needed if there is to be a single leader in the person of the Antichrist), they also become more blatantly visible as such a force, which means it more frequently relies upon ancient symbolism in its workings.
So, then, I wondered… might there be more than a few NWO pyramids being ‘hidden in plain sight’?
There are, of course, many pyramids around the World, especially the ancient stone variety. These come in two flavors; the Egyptian, the biggies with their seemingly smooth triangular shapes (as seen at a bit of distance), and the Mayan/Aztec stepped structures, a style not unknown in Egypt, and elsewhere for the matter. The Masons have only an interest in the former, it seems, but my curiosity was about much newer structures, those built with modern methods and materials. Would the many newer pyramids around the World exhibit traits similar to Cheops, such as alignments or dimensions of occult significance?
Absolutely. And why not? A glass pyramid is the perfect embodiment of both the ancient pyramid mythos and of Satan; sunlight reflecting from within and without by day, and electric light glowing from within by night — all work to render them both translucent and illuminated, with bright glaring highlights akin to the all-seeing eye, depending on one’s viewpoint and the angle of lighting/reflection. As a work of man, they are both awe inspiring and mysterious, working on the subconscious in unfathomable primal ways not sensed by the conscious mind without pause and consideration. Even so, one is apt to embrace and bask in their presence despite any darker connotations, for they are undeniably beautiful works of architectural ‘art.’
So let us pause and consider with conscious effort…
Square 2: a review of new pyramids around the World
There have been more than 50 new/modern pyramids quietly built around the World in the last several decades, most of them made of glass and metal, and strangely, more than half of them in North America. A couple are faux pyramids with incomplete architecture in and of their own, but one included a second pyramid on site, and the other had a completed pyramid at top, and so, were included in the study. The idea was to see if their base lines or diagonals aligned with other pyramids (ancient or modern), or if any three or more centers or corners might align. Examinations for numerological meanings were also to be considered, early on, but the growing number of pyramids made that effort too monumental. Still, some interesting discoveries along that line were made.
I found so many alignments (almost 150) and associated numerical translations in place that I felt it was appropriate to establish some sort of test group to illustrate the difference between conspiratorial intention and random coincidence. For example, at one point well into the project, EVERY new pyramid except one revealed between two and nine alignments with one-another, and/or with Cheops, itself. One had 18 alignments. So a simple control group was added: some 30 Mayan/Aztec variety, plus nearly 6 inverted modern pyramid structures were added to the study. If these, too, yielded such results, the study could easily be argued as being inconclusive.
But they did not.
Only one formed a single alignment with any other pyramid, new or ancient, and it featured no resulting numerological significance. Clearly, the massive alignments in the new pyramids were intended by the powers that be, those persons behind purchase of the location and setting design criteria as to angular placement, size, and location on the property… especially true when multiple pyramids at the same location (as is the case in ancient Egypt) were undertaken. Therefore, the test groups were excluded in findings, which proved validity of both the methodology and hypothesis. Since only the new pyramids (not inverted) formed alignments, it had to be by intention.
While about a third of the new sites are single pyramid locations, there are several with two or three (like the main pyramids at Cheops), 3 with five pyramids, and one with 8, across nearly 50 locations. I then wondered if perhaps other old, but not ancient pyramids or locations deemed ‘holy’ by the Illumnati might not also offer alignments. Adding a handful of small pyramid burial sites by Masonic persons of wealth and power, as well as the death site of Adam Weishaupt, founder of the Illuminati, and the ‘headquarters’ from which he operated his secret cabal proved that notion, as well. I was unable to discern his precise birth place beyond the name of the city (Gotha, which is ironic in its own right, because Weishaupt and the Illuminati were very goth).
At the point where I felt the matter was amply proven, I had by then added eight older sites, typically 100-200 years old, though one dates to 12 BC, in Rome. It is the Pyramid of Cestius, circa 12 BC, at a time when Rome was, like the Templars, enthralled with the mysticism of Egypt. It is a site well known to Templars and Masons. The others are all in Europe, save one in America, and two of them relate directly to the Illuminati; Adam Weishaupt’s grave, the ‘headquarters’ where he planned and executed Illuminati plans, and perhaps the definitive Knights Templar location — Templehof (Templar Temple House), all in Germany. As these last three are not known to have involved pyramids on site, they are only used in scoring other pyramids which align with them, and not evaluated on their own, even though they would score fairly high.
So the alignments created in total involved alignments between ancient, historically old, and modern pyramids. The symbolism and mysticism of such structures by their special alignments, regardless of if rendered in aged stone or in modern metal and glass — are clearly as important to their builders as the function and beauty of their designs. All were starkly beautiful, and quite functional, to be sure; a perfect way to subtly reinforce the notion of luciferian and Masonic imagery upon the subconscious minds of citizens otherwise mesmerized at what they were seeing… especially when illuminated to great advantage by sunlight or voltage.
The problem of useful presentation
But describing all these alignments textually makes for boring reading. I will give just two instances as example, next, as they are quite tied together. It will be the only review of numerological ties, though more like it, exist, and with notable frequency. Trying to present the topic graphically is also challenging for other reasons, but I will attempt that, as well, in a third review. I will then provide a very simplified summary of selected findings to illustrate the scale and nature of alignments found, with a scoring system to relate symbolic spookiness.
But first, a disclaimer is required, because I always challenge any Doubting Thomas’s to duplicate my research before they make any false presumptions as to validity of my findings, and because the research tool involved (Google Earth) has its own technical limitations with which carelessness can impact upon accuracy.
Disclaimer: regarding some figures and claims herein about alignments and measures, accuracy is sometimes more difficult to affirm via Google Earth. Google Earth allows an accuracy to within a meter or so at ground-level, but things can get more complex when one starts trying to plot and measure lines with accuracy to the far side of the globe, and/or where the locations may be nearer to the Poles than Equator, or on/near altitude changes. Satellite images used in Google Earth are sometimes taken at oblique angles on either or both the horizontal and vertical, such that visual distortions of a pyramid can make true angular alignment (in compass degrees) or even measuring its base length, difficult to accurately determine. When dealing with such angular imagery, the center of the pyramid will be other than visually depicted, requiring one to make cross lines corner-to-corner to find the true center. The quality of image can also vary, but generally, line placement accuracy can be determined within 1-3 feet (roughly the line’s width). The images for two sites were so bad that it was impossible to determine if base line/diagonal alignments existed, but at least their location was known with GPS accuracy for the purpose of central alignments.
Additionally, one must take care insure the Pyramid(s) in question are centered in the view, and to reset the ’tilt’ (View > Reset > Tilt) after zooming in, or additional angular errors can be introduced, as the lines one lays for determinations themselves ‘float’ above the ground. In fact, where the pyramid is quite large, one may find the line ‘crawls up the face,’ providing additional distortion which must be defeated. The degree of inaccuracy in any given instance should not unnecessarily render the information herein as invalid; the thrust and intent behind the location and positioning of glass pyramids is clearly not casually undertaken. Also FYI, distances between pyramids herein are rounded figures, if there is no mystical number involved.
Verbal presentation example
Paris features two glass pyramids at the Louvre Museum, one large, one small and inverted, which form alignments to four other sites (the only inverted structure to do so, likely because it additionally features a normal pyramid, as well). There are three much smaller ones, as well, serving as skylights, which I chose to ignore, early on, and then forgot about, later; they would likely have established other alignments, as similar skylights on streets elsewhere, had done.
Two of the alignments at the Louvre are baselines from the larger pyramid to the same pyramid site in Texas, where they also align with the baseline of one, and the diagonal of another of three found there, essentially parallel. Three more alignments exist to three other sites involving three corner/center combinations, one of which is Cheops some 3232 km distant. Masonry’s highest publicly acknowledged ranks are the 32nd and 33rd degrees. The number 3232 is a ‘magic number’ in Satanic numerology, because it is a doublet, which doubles its ‘power’ (amplifies its importance), and because it sums to 55 (another doublet), one divisible by 11 (a doublet which makes 33 three times as powerful), and further sums to make 10. Again, it matters not what you believe about numerology, but what they believe…
And, this is what they believe about these numbers:
In the occult, 5 is the number of the planet. According to one-time head of early freemasonry, and avowed satanist, Alistair Crowley, 11 is “the number of Magick, itself,” and of sin, or evil corruption. 10, on the other hand, is the number of ‘heaven and earth in interaction’ (‘good vs. evil‘), and the symbol of it in the Greek (‘deca’) is the triangle, of which a pyramid employs 4, which means ‘strength and integrity,’ which is certainly a trait of the Pyramid. For the matter, the number 32 relates to ‘inspiring of truth and living by it,’ which is to say… the very promise and implied hope of illumination. Unfortunately, illumination means something rather different to those with a darker agenda, something closer to that which the serpent spoke of in the Garden of Eden. These are not the only meanings found in general numerology, but the ones preferred by dark occultists.
Extending the base lines of each of the Louvre pyramids westward 3500 m will take you, again in parallel manner, to the center unit of one, and a corner of the other of two glass pyramids built in Westborough, MA, by globalist pharma firm, Astra Zeneca (astra in the occult relates to supernatural weapons). Another line can be drawn from the lower corner of the larger pyramid at Louvre, through the center of the smaller one, there, to pass through the diagonal of the center pyramid of three atop a very Masonic looking Federal Government office building in Ottawa, Canada.
The smaller pyramid in Paris is 2 m shy of being 1/10th the base line dimension of Cheops, while the larger one is two meters more than 1/6th of Cheops. The larger Astra is 1/6th greater than the larger of Paris, and the smaller 1/2 the size of the smaller in Paris. The Ottawa pyramids are 1/4th the size of the largest at the Louvre, and 1/25th of Cheops, and 2 m shy of being 1/2 the smaller Astra. I would love to analyze the actual dimensions of all these, if they were readily available.
In Chile, the resort complex at San Alfonso Del Mar features a giant glass pyramid on the beach with four alignments. It is aligned such that its base line will bisect with the center of one of the lesser stepped Egyptian pyramids. Two more alignments are to diagonals of a pyramid in London, and one in China, 20 km from Hong Kong. A third aligns with the corners of two pyramids in Islamic Astana, Kazakhstan which, though richly expressing Islam in the property’s design, is also rich with Egyptian symbology.
The Chilean Pyramid base is also one/sixth the size of Cheop’s (38.3333 m, a number which is found many times in the fuller study in either location, size, or compass readings of various pyramids). It is located on the 38th Southern Parallel and the 32.32 Meridian. 38 sums to 11 (Magick) but itself can mean ‘Lucifer, the will of the Devil.’ 1/6th = 18%, where 18 = 9+9 (99 doublet) and 3 x 6 (666 triplet — even more powerful than a doublet, and Satan’s name). 18 itself means ‘Oppression, bondage, slavery,’ and = 3 (a ‘perfect number’ meaning fullness) x 6 (the soul of man) = 666 (legend/man/illumination).
A graphical review
Enough textual description; it is too boring and difficult to make sense of. Let’s try graphical, looking at hotel resort complex at Galveston, Texas, which also consisted of three Pyramids. This is one of several with 8 or more alignments, and perhaps the most interesting in terms of just what they align with, and how.
It may help to review what qualifies as ‘aligning,’ so you know what you understand why the lines look the way they do. The alignment must involve at least three points of contact between two distant pyramids, based on corners and centers. A baseline is two points, a diagonal or perpendicular from a baseline through the center being three points, but the distant pyramid must still have at least one such point of alignment, as well. If only one, it must be its center, but aligning with two corners on two different pyramids, there, is another way to align.
There are examples in my study were a baseline, perpendicular, or diagonal aligns with yet another baseline, perpendicular, or diagonal (four to six critical points total); a much harder thing to achieve. In like manner, some can be extended to align with yet other points of other pyramids at a third location; an even more dramatic alignment. I have found as many as five pyramids in three locations involved in a single alignment across the globe… with 14 points of alignment in all. These harder kinds of alignments should be next to impossible by random occurrence. Yet every single pyramid exhibits them.
And we have two such virtual impossibilities illustrated in our visual review at Moody Gardens, in Galveston, TX. Two of them actually involve Cheops, as earlier reference in the textual description, the ultimate of all possible alignments from the Masonic viewpoint. In fact, I find it the second-most interesting of all modern sites, in terms of alignments (the first, at Sauerland, Germany, is impossible to show in this manner as it enjoys 23 alignments. UPDATE: 43 in a row, and I finally stopped bothering!
Clockwise from Noon in the image, we see an align to the Nekoma Air Force Station, an experimental anti-missile defense system long abandoned. What is interesting is that one of it’s seven alignments goes to the only pyramid in South Korea — quite dependent upon U.S. anti-missile technology. That’s interesting, because there is another pyramid in N. Korea, and one of its several aligns goes to the Las Vegas Casino pyramid, which in turn aligns back to the Nekoma site. It is as if both N. and S. Korea are ‘borrowing’ from American military power, after a fashion, to create or reflect a ‘stalemate.’
Next we have two aligns effectively ‘parallel’ to the ‘holiest’ of Masonic pyramids in Egypt, involving a total of nine critical points with three pyramids. There is then an align to the Rock and Roll Hall of fame in Cleveland, OH, where it passes through the center of both pyramids, there (one small, complete pyramid, and one very large incomplete, or faux pyramid. There, the base of the larger less the base of the smaller, is equal to 1/3rd the base of Cheops.
We find an align to a now defunct pyramid on Miamii’s beach. Fairly ordinary as alignments go, it was built as a promotional venue for the international beer company, Heineken. Despite being temporary, it was placed to form at least three alignments on its own. Then, in like manner to the two aligns to Cheops, we have two more going to the two pictured Biosphere pyramids, which, like the two Rock and Roll pyramids bisected with the same line from Moody Gardens, have both of their pyramids bisected with an align from Nekoma (coming full circle, if you will, to form a triangle). In fact, Nekoma is itself involved in a total of 6 such three-way triangles. One of those involves the Miramar retail store, our final align from Moody Gardens, for two such triangles sharing Moody and Nekoma locations. Miramar is the other incomplete faux pyramid, in that only two opposing sides are triangular walls. Miramar, in turn, with two pyramids, forms 6 aligns, including one to the very Masonic Capital grounds of Australia, at Canberra.
So far, we’ve only closely looked at two out of about 50 locations. You can see how hard it is to use either text and/or graphics to reveal it usefully. So let’s now try a different way, and employ a chart with a scoring system designed to rate the comparative ‘spookiness’ factor of a given ancient or historically old site’s alignments with new pyramids or other holy illuminati locations, including each other. To further reduce the clutter, it will then only look at sites which directly connect to them, in even briefer review, sans scoring. The scoring system replaces trying to compute and display the actual odds of the alignment, which would be as high as 10 figures:1, in many cases.
For example, the odds of just a single alignment of the simplest kind, center to baseline, diagonal, or perpendicular or to two corners of two pyramids at destination (earning the lowest possible score of 1 in my scoring scheme) would have actual odds of 202,500:1 against. That is based on the notion of worst case accuracy of 1/10th of a degree of arc… meaning that each pyramid would have 10 x 360 degrees of potentially useful compass positioning, divided by 8, as there are 4 lines the pyramid which establish a total of 8 possible compass vectors. You need to multiply each pyramid by each of the others involved if aligning to another baseline, diagonal, or perpendicular. A baseline to baseline alignment odds would be 164,025,000,000:1 by such reasoning. Such odds are multiplied further by additional alignments at the site. Argh!
Technically, that’s too simple, because angular placement is not the only factor. Size and relative positioning plays a role, too, when two corners/centers of two different pyramids at the same site are involved, but I’m not going there without a super computer!
Now, if you want to argue that the actual accuracy we should using is tighter than that, implying room for error in ‘finding aligns,’ consider for a moment that only one alignment with the Mayan/Aztec pyramids was possible using the same accuracy as I employed. That makes a pretty good case that the alignments were intended regardless of whatever actual accuracy was employed. Even if you allowed for my own human error, there are so many alignments that they could not all have been for my error, given the Mayan/Aztec set enjoyed no similar quantity of errors. But by all means, feel free to correct my math/assumptions if you are of bookmaker caliber in computing odds, but I’m pretty sure I’ve got it right, based on some experience in statistical data analysis; I once ran my own marketing research firm which ran probability studies. No matter: we will use scoring, instead…
Scoring is as follows:
- center point to corners of two pyramids or a base/diagonal/perpendicular of 1 pyramid (simple alignment) = 1 point for the alignment;
- base/diagonal/perpendicular to same (complex alignment) = 5 points for the alignment;
- Bonus 5 points for any parallel alignments or alignments to multiple pyramids of one site to multiple pyramids of another site (parallel/pair alignment);
- any extended link to an additional pyramid (extended alignment) = alignment score x 5;
- link to Cheops (Cheops alignment) = x 5;
- link to other Egyptian pyramids or Illuminati sites (Illuminati alignment) = x 3;
- link to other historically old sites (Masonic alignment) = x 2;
- 1 point for each alignment and for each pyramid at site;
- magic numbers, angles, dimensions, etc., not part of scoring;
- Cheops gets a bonus of 33 points, Illuminati sites 11 points, Masonic 7 points
- maximum score limited to 99
Egyptian Pyramids 13 aligns w 6 pyramids on site (Δ) = 99 points: 29°58’44.54″ 31°8’3.65″
Complex Parallel to Sauerland (5+5 points), 3 Simple Parallel to Dubai (6×3), 3 to Sauerland (6×3), 2 Simple Parallels to Galveston (6×2), Complex to Niagara Falls (5), Simple to Louvre (1), to Eatonton GA (1), to San Alfonso del Mar Chile (1) 85 total +33 > 99.
Cestius pyramid in Rome 5 aligns w 1 Δ = 99 points: 41°52’34.97″ 12°28’51.16″
Complex Extended (three times — 4 Δ at 3 sites, in all!) to Manitoba Capitol and on to Miramar Retail (5x5x5x5), Simple Masonic to Karlsruhe Mausoleum (1×2), Simple to Pheonix Jeju S. Korea (1×2 – Phoenix is Masonic/Egyptian), to Sauerland (1), to Portsmouth UK (1) > 99 points
Star pyramid mausoleum Scotland 3 aligns w 1 Δ = 34 points: 56° 7’19.42″ 3°56’43.72″
Simple Illuminati Extended to Weishaupt’s grave, to Gold House IL in opposite direction (1x5x5), Simple to Cooperative Bank UK (1) 27 points + 7 Masonic site = 34
Karlsruhe pyramid mausoleum 7 aligns w 1 Δ = 27 points: 49° 0’33.22″ 8°24’14.05″
Simple Illuminati to Illuminati HQ (1×5), Simple Masonic to Cestius (1×2), to Kazakh RU (1×2 — rich with masonic/egyptian architecture), Simple to Dubai (1), to Edmonton Capitol (1), to Cal State U. (1) 20 points + 7 Masonic site = 27
Bickling mausoleum UK 2 alignments w 1 Δ = 13 points: 52°49’9.01″ 1°12’48.36″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
Schoenhofen Mausoleum Graceland Chicago 2 alignments w 1 Δ = 13 points: 41°57’33.56″ 87°39’34.09″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
What follows is a simpler summary of the first few of the destination sites mentioned sites as evaluated from their position…
Sauerland 23 aligns, 8 Δ, Dubai 13 aligns, 5 Δ; Moody at Galveston, 8 aligns, 3 Δ; Niagra Falls 2 aligns, 1 Δ; Louvre 7 aligns, 2 Δ; Etonton GA 2 aligns, 1 Δ; San Alfonzo del Mar 4 aligns, 1 Δ; Manitoba Capitol 9 aligns, 9 Δ treated as a single Δ as they all directly touched one another 3×3, and were each relatively small; Miramar Retail 7 aligns, 2 Δ; Pheonix Jeju S. Korea 6 aligns, 1 Δ (note: N. Korea has a Δ, too).
These are all quite typical of all sites evaluated, globally. The only site which scored 1 (1 align) was a site which has had its 2 pyramids removed/destroyed, disallowing angular alignment determinations, though the center of one of the pyramids was known, allowing an align by that method.
CONSPIRACY ALERT: That site, by the way, is tied to a little known conspiracy surrounding the Nuwabian Nation, an all-egyptian-like community of almost exclusively black people which was seized and razed to the ground by the U.S. and Georgia State and County governments. They were allegedly targeted for being a cult, subversive group, criminal organization, nest of child abusers, or a swindle… depending on who you ask. Seems like everyone had a pet excuse, including YouTube who seems to regularly censor vids on topic for their usual list of fabrications. Note the resemblance in some of the ceremonial dress to masonic lodges such as the Shriners (Nuwabians, like the lodge system, also use the terms, Orders, and Lodges). All Egyptian is wrong, too; they also were adoptively and by blood associated with Native Americans of the Yamassee Federation of Tribes, among them the Seminole.
Note on mausoleums: What we see in our review is that the three mausoleums share unique ‘coincidences’ in that each aligns with an Illuminati historic site honoring Weishaupt, and each in turn is honored for having done so by Sauerland aligning with them. There are many such pyramid mausoleums in Europe, America, and a few scattered elsewhere, far too many, in fact, to encourage me to dig further. Regardless, as the very first and only three reviewed all shared these two features, I’ve no doubt that others do, as well. A single Mason could easily undertake a single such alignment to a point of their own choosing, and more modern pyramid builders could easily accommodate at least one or more such mausoleums in their own alignment considerations. This brings us too…
Sauerland, enigma equal to Cheops
Sauerland is one of the newest of all sites, a complex of 8 pyramids which appears it may even involve mind control research. It certainly defies normal property development, architectural design, and building contractor norms in several ways. First, its location is on a hill overlooking an industrial park, and despite looking like a luxury retreat, is in fact the corporate campus of biomed tech company, Rayonex Schwingungstechnik (Rayonex Vibration Technology). It started with three pyramids, and has since grown to eight.
Second, the site has an adjacent and extremely unique high observation tower (about 110′ high) which overlooks the pyramids and the valley, just high enough that morning sun could shine through the large holes in the upper level and onto the pyramids, creating unique shadows. This was a trick employed in ancient Egypt using Washington Monument style oblelisks, such that at a certain time, a shadow might point to a secret place within the greater site (as seen in Indiana Jones and the Lost Ark. The tower’s corner shadow does fall over the pyramid property. But, let’s just call that a pipe dream.
You do have a pipe of some sort, don’t you… and a whip and hat?
Third, each building is offset irregularly and apart from each the other with no obvious pattern or reason, and likewise, quite contrary to normal designs, angled one from the other up to 3 degrees or so in compass alignment. It is my belief that this is what enables it to accommodate so many alignments, a thing which would require planing with a fairly complex computer program, to determine. Finally, again unlike most complexes, even where ‘luxury’ is intended, no two buildings are built or designed the same; each has an entirely different layout and appearance, though some features at least look similar. Usually, a cookie cutter approach to keep costs down would be employed. Yes, even in corporate campus design.
Then there is the very small pyramid surrounded by a water feature. I found construction photos that show a drill being used on a hole there, approximately 1 meter wide, with smooth walls. It was associated with an article on geothermal drilling which led to a very interesting YouTube promotional video that is really worth the watch; it will intrigue and educate you. After watching, though, ask yourself if the expense this likely represents would normally be deemed appropriate for a small fish pond? The video seems to address that with a blanket statement, but does it, really?
I learned also, that the small pyramid over that hole is the only one on the property using metal walls. The other, larger pyramids use some kind of unusual looking material which requires special application, according to other construction images I found. The panels used on them might logically be radiographic in nature, designed to limit or enhance radio waves of select frequencies, given the nature of the company’s work, as you shall see. In like manner, I can imagine the holes drilled by that machine could be used to install an array of underground EMF sensors or emitters. The video implies the array of radially and laterally drilled holes provides a series of ‘pipes’ which may in fact be perpendicular to one or more of the pyramids. Just why these possibilities are raised, is covered below.
Also unusual, is that one of the original three pyramids (perhaps more, now) is strictly for therapy use, with ten therapy stations. In each pyramid, a security computer controls all lights, window blinds, and door locks, and though there is no manual switch anywhere within for any of these, each workstation is said to have its own localized control over these features. But the security system computer can override, which makes it a rather creepy place with respect to potential for political control and overbearing security solutions against occupants, Big Brother style… especially if you don’t have authorized access to a workstation. Undoubtedly, there are plenty of security cameras, and I find it disconcerting that some pyramids have no windows, whatsoever — normally a code violation, unless a warehouse or factory. One must ask why so much expense and devotion to therapy and externalized security control over environment would be required? Let’s take a peek, and see.
The answer raises more questions. This is a unique kind of high tech firm. Their product/services would seem to involve mind enhancement, mind bending, or even mind control, but certainly relate to biophysics and therapy of some kind. One or more of those possibilities is very likely; the firm does research in electronic frequencies upon the human body (bioresonance), among other things. According to Wikipedia, bioresonance is all based on pseudoscience, which is a polite term for ‘made up BS by con artists’. Dunno about that, because…
This is also the sort of stuff useful in DEW Weapons for behavioral control (Political Control Technology). Of course, such tech is always researched and funded based on some good it might accomplish, including the combating of electrohypersensitivity, which many TIs suffer from because of their constant DEW targeting, or some preexisting natural sensitivity. I have it, myself. But once a patent is filed and governments or dark-minded NGOs get wind…
Now, about that tower… What if it was for security guards overseeing grounds security should an alarm goes off of some sort. The tower does have its own large building which might be suitable to house a security force. Hold that thought in mind while reading the next paragraphs. Turns out it is not just an observation tower, and not just any building. And, while guards might be rather far fetched a notion, there is more to consider.
The pyramid shape is also known as a Frustum by Masons; a shape used by the military in times of old in a manner not unlike a Tank Trap. Like a tank trap, as a shape, it cannot be easily overcome when several are placed together, there being no level foothold between them (a steep V shape), and its sharp corners, especially at the top, inhibiting climbing. More importantly, because its sides are sloped, one cannot hide behind a frustum, if the enemy holds high ground… such as a castle wall… or a high observation tower. Just exploring possibilities, here… but far-fetched or no, it fits the spookiness factor of the place.
But as stated, that’s not all. The platform is merely the top level of what is actually a mine shaft elevator lift. The building is currently a mining museum with access to a huge abandoned mine; they actually take you down into it with hard hat and light, etc. So, like Cheops, there are underground passages beneath the Sauerland pyramids. It is, of course, possible that some of those passages might be remodeled into something else entirely different, like many old mines are, today. It is even possible there are ways to access them from within one or more of the pyramids. Now wouldn’t that be a mystery to discover and explore, whip at the ready? However, all this causes me to hope no one would go drilling a bunch of radial holes over an abandoned mine… if they didn’t know exactly where the mine’s cavities were…
Now, last mystery. Look carefully at the top of the platform at the left corner nearest. No. That’s not a machine gun, though it can potentially be used to ‘shoot.’ It’s appears to be Yagi antenna, normally used to transmit or receive microwave signals in an amplified manner, along a narrowly aimed path. But wait! Where does it aim? At the top of that tower, as high as it is, the thing is aimed squarely at a hillside nearly four times as high as the platform. Useless, as seen. But wait! Just beneath the top rail is a what looks like a motor; the shaft can rotate. At the top is what appears to be a motor at an appropriate angle to change vertical angle. The white object appears to be a housing of a control system operated remotely. I used to sell such systems for video security setups based on microwave relay. Pretty sure of what I’m seeing. And, there is a second pole identical to the first which could be similarly fitted, and which may have been since the photo was taken.
Why would you want that? Well, you might want to tune in distant TV stations, except they don’t broadcast in microwave. You could use it to grab someone’s cell phone signal, if you knew exactly where their phone was, to aim it. There are yagi antennas that can be used for those things, but they would look different. But what if you owned a bioresonance laboratory with some human guinea pigs? What if you could place them in rooms within a pyramid, where the slope of the pyramid was roughly perpendicular to a high mounted, aimable microwave transmitter, such that every subject got exactly the same dose of signal at the same time, or such that you could specifically target a given subject with a unique signal? It would probably look a lot like Sauerland. You think?
I only mention this, because older pictures, before the pyramids were built on site, don’t show such a ‘gun.’
Is it a conspiracy?
If one concludes that it is impossible that by mere chance alone, every modern and non Mayan/Astec-style pyramid should align with other pyramids, including Egyptian… then it has to be by intelligent design by agreed-to planning by a group of many persons with like agenda. That it is done covertly and involves mystical occult reliance… removes it from the realm of benevolent methodology or intent. That these pyramids can be found in countries of opposing political, religious, and ideological beliefs… precisely fits the Illuminati model and game plan established by its founder, and reflected in Morals and Dogma, the ‘Masonic Bible’ written by Albert Pike. That the only persons financially and powerfully placed are able to arrange for such things tend to also be members of Round Table Groups and are often also Freemasons… would seem to cement all these considerations into a single image: that of a conspiracy. That there is the possibility that it even involves mind control is, to say the least, the ultimate and most heinous form of conspiracy.
“Every man is entitled therefore, to give any explanation of the symbols and a system of the doctrine that he can render palatable… Of all the means I know to lead men, the most effectual is a concealed mystery.”
TI’s have many commonalities in the nature of their experience… but what if it was the TI’s nature prior to targeting which led to them being selected for targeting? This anonymous poll seeks to identify any patterns which might prove revealing.
The common state and nature of TIs prior to targeting?
This post seeks to help identify how TIs are selected for targeting, and why. I write as one who has had personal contact with over 12,000 TIs over roughly 25 years, which has come to some understanding of the answer. But I also write in hopes it can help better my own general understanding, and more importantly, to help individual TIs better understand the true nature of their own targeting. Such information may even prove useful in TI defense, both tactically, and legally. For example, almost all authorities who should be available as helpers to a given TI end up instead presuming them schizophrenic and attempting to persecute them with forced treatment or other forms of harassment — to say nothing of possible in place assets being used in direct targeting.
Such knee-jerk presumptions may prove easier to defeat if we can show the presumed ‘schizophrenia’ is far greater statistically than should be medically possible, it being true that the illness strikes people randomly across the entire spectrum of human existence. If a given class of people with a common personal social circumstance (state and nature) are deemed dramatically more susceptible to the traits of schizophrenia, a logical person should be moved to begin to understand… there are technologies and methods which can cause simulation of those symptoms; mental illness is not the cause, after all.
We must start this dialog by addressing two points: things already known to be common to all TIs prior to targeting, and the tactical reason or purpose behind the targeting, things which collectively tend to relate concretely to categories of TI abuse. As to the precise methods of targeting and types of technology employed, those vary according to the individual TI, their psychological profile, and many, many circumstantial factors which dictate the most likely path to targeting success. That does not impact this dialog, but all these things are tied together into a cruelly efficient tangled web of mental torture and, all too often, physical pain.
We must attempt to separate ourselves from any personal angst and calmly review the matter objectively, if to gain useful insight. First, I’ll talk about two basic traits which are common to all TIs irrespective of their individual situation or targeting purpose:
Known commonalities and reasons
Prior to targeting, all rank and file TI’s, are either already financially insecure or in a situation where dirty tricks can render them so fairly quickly; it is important that the target be unable to launch a useful and costly technological defense or employ professionals who can do so for them. There can be exceptions in ‘blood line’ families or offspring which employ MK/Monarch type programming to create a dynasty of (actors, political leaders, financial giants, etc.).
The wealthy ones are unable to effectively defend because of their programming, which results in various forms of self-sabotage of the effort, which may in fact include financial destruction. Their programming and resulting sabotage effects the same handicap as not being wealthy. It is this author’s belief that Dennis Quaid, the end of the Hunts, DuPonts, and Hurst family/fortunes evidence this fact. I go into some detail on this (and all aspects of targeting, including defense) in my how-to book, MC Realities.
On the other hand, programmables who are were not wealthy, but simply part of the effort to create Jason Bourneish operatives for the intelligence community or in furtherance of MC research, can also end up being targeted if deemed ‘failures’… which are victims who could not be usefully programmed and deployed. They cost too much in time, effort, and money to simply dispose of them, and because research might find a way to ‘fix them’ at a future point, it is necessary to target them to make them seem insane. That way, should the nature of their being ‘broken’ lead to revealing their true history (programming), they will be ignored as being nuts. They can be corralled at any time for further MK efforts, if needed.
Another commonality to the bulk of TIs is some form of social isolation. That may mean they have a small circle of friends and family, or perhaps there is some existing strife underlying key relationships (i.e., significant others, relatives), especially if living with or in close proximity to them. Targeting almost always includes some destruction or sabotage of personal relationships for the same reasons as financial harms. It wouldn’t do for everyone who they know to both believe and to aid the TI against the perps.
No. One by one, all such allies tend to be alienated by one means or another. The inverse is true of the MK/Monarch. There, not one of their friends or family are not part of the perp circle; everyone in their life has been carefully placed there to guide them (misguide) to a desired state. Even their employment and choices of schooling, living space, etc., is predetermined such that they at least think it was their own decision, but their entire life is little more than traversing a spider’s web and being wrapped in its unescapable cocoon.
The purpose of targeting
Now to purpose. It is fairly straightforward. I usually only cite three basic types, but here, I’ll attempt to outline a broader spectrum and to show the subtle differences in targeting aspects and the nature of the TI prior to targeting, things over and above the aforementioned commonalities to all. I should mention that the general purpose of targeting remains constant regardless of type; to render the victim a social, political, and financial zero. The reasons for those needs and resulting emphasis can vary according to the type, however, as is seen:
- Guinea Pigs — selected for experimenting with new targeting technology/methods. An ideal candidate would be rather socially disadvantaged, an isolated loner, and it would be advantageous for them to have already had some documented mental health issues resulting in some form of professional care, with or without prescriptions. This more readily allows them to be presumed insane should something go wrong in the experimentation; they will be disbelieved when describing the matter, regardless of any carelessly revealed evidence;
- Training fodder — selected to insure the growing army of MC practitioners can be effective with minimal supervision. While it should be said that many perps are themselves MK/Monarch programmables, that is certainly not the only profile. Psychopath and sociopathic personalities are a favorite recruit, and it is important to insure such mental defectives do not run amok, and can exercise restraint. Because mistakes or over-zealous application is a significant risk in the training process, the same victim traits as Guinea Pigs are found common.
- Social engineering — efforts against select targets who are either deemed politically incorrect activists, whistleblowers, ‘troublemakers,’ or who are Christians. MC is deeply rooted in satanic principles and can be traced back to the Garden of Eden (in my book). One goal (thankfully seldom realized) against Christians is to get them to destroy their own faith. Rare is it that we find members of any other faith, lest it be Jewish or Muslim, all three being worshipers of the same God of Abraham. Even less common, do we find atheists, unless they be targeted for reasons other than social engineering. As for the troublemakers, the goal is again simply to make them seem insane, and quickly rendered a political zero.
- Social engineering — undertaken against society itself, by selecting failed programmables or mentally troubled persons who can be manipulated into acting out in some useful form, such as committing mass shooting gun violence, or other crimes designed to shake confidence in the very nature of our society’s political underpinnings, such as the 2nd Amendment in the cited example. There, are no other requirements for the victim. It is why, there are so many commonalities in these tragic news stories, such as having been in psychiatric care with psychotropics prescribed, but suddenly halted… almost a guaranteed trigger to violence, when combined with MC control.
- Joy riding — elected against targets selected only because the perp has decided he didn’t like the victim for some reason, or because of convenience (i.e., next door neighbor). This is undertaken by the errant and out of control perp on their own time, using what they have learned and equipment they have built on their own or stolen. More could be said about them, but does not serve this dialog. As to the victims, they can be anyone, though the joy riding perp will be careful not to violate any of the principles of selection herein described unless truly doing it for spite. If the perp is caught by superiors, the value of continuing the victim in targeting is likely analyzed as well as the value of the perp to the program. This will determine the future of both. The perp may suffer any form of punishment, retraining, or redeployment, and the victim may be released from targeting, or put into the hands of other teams, usually resulting in a marked change in targeting tactics.
- National Security — is here mentioned as a type, but except for extremely important whistleblower situations or programmables who fully escape control, it is unheard of among TIs. The traditional target in this category would be a true threat to national security as deemed by the intelligence community or those able to give them orders. We see an example of that in the news, today, where 16 U.S. Embassy members in Cuba have been hit with various DEW and psychological methodology by the Cuban government, likely using very old Soviet tech, or perhaps, their own internally developed systems. WE CAN NOW CITE THIS NEWS AS PROOF THAT MC TARGETING IS REAL; how can media and authorities cite it has happened to our diplomates, but deny it is happening to our citizens ‘because there is no such thing?’
Finding unknown commonalities, and verifying old
Our method here, is simple. A private and anonymous poll. It cannot track your identity, and uses SSL interaction common to things like bank transactions. I must ask that only TIs participate. Politically uninformed sycophants should please refrain from acting like a child; you might learn something by looking at the truth once in a while. We must also bear in mind we are talking about legitimate TI’s, only. Those who are simply mentally ill, the perp pretenders, and the social misfit pretenders seeking sympathy, may or may not, share some of these traits, and are excluded from the dialog, though we must presume many of them may non-the-less participate in the survey and skew the data to some degree.
With that in mind, I offer a series of questions. Consider them and the choices provided carefully before answering, please, and come back later to see results and, in time, an analytical update to this post to attempt making good sense of results. This will follow each poll in the set. I remind you, all answers are based on what things were like in the year prior to targeting first being noticed. There are sixteen different poll issues, so it will take a bit more than a half hour to complete, but should prove very interesting and worth the effort. If pressed for time, come back later.
When TIs find their defensive or offensive tactics failing, it is likely because one or more key aspects believed true of their targeting is a falsehood deliberately created for them: the enemy knows you cannot win a war defending against tactics not in play, if it blinds you to those which are.
What you will learn reading this post:
- part of targeting includes misleading the TI into false beliefs about their targeting;
- what constitutes authoritative proofs capable of revealing the truth vs. beliefs;
- examples of common falsehoods held as true, including scams.
In some 25 years, now, I’ve had contact with more than 12,000 targeted individuals according to my email list. Out of that number, I can count on one hand the number of them who had a correct understanding as to who their enemy was and what tactics were being used against them, and how to combat them successfully. So convinced are most TIs about such misbeliefs, that they often refuse to take advice that would work to better their stance, and instead continue to try things already proven ineffective. Worse, they might simply give up trying, at all.
Targeting is a psychological war, and one largely invented by and often waged by the intelligence community, who live and breath in a World where nothing is what it seems. If there is one thing they know how to do well, it is how to convince their victims that something untrue is true, and something true, is false. Their chief weapon is disinformation, and its ally among the foolish, misinformation. Disinformation offered and accepted as true, is spread rumor like as misinformation by those accepting it. This was, by the way, the heart and method portrayed in the popular TV series, Mission Impossible; a spy agency who typically got what they wanted by getting the enemy to believe in an unreal set of ‘facts.’
Their other primary weapon against TIs is the psychological profile, which tells the enemy exactly how their target will respond to a given circumstance, enabling them to create situations designed to cause a certain conclusive response which builds the false narrative. When things like street theater, surveillance technology, and other targeting methods are combined with the goal to mislead in kind, the victim has almost no chance to come away with anything resembling reality. The other victory this hands the perps, is that it makes it much easier to insure that the victim will be seen as mentally imbalanced by anyone observing or brought into the affair when seeking help. Knowing the enemy’s psyche was also part of Mission Impossible, the show always starting with a summarized dossier on the mission’s target and their weaknesses.
Among the most common falsehoods most TIs presume to be true, but which cannot be true, we find a laundry list of topics sold on the basis of technobable, false credentials of ‘authoritative sources,’ circular references, and a deluge of mantra-like disinfo/misinfo. Some effort will be made, here, to summarize, but first, we need understand what a true authoritative source is, and is not. Should any doubt my summarizations are valid, they must first find an authoritative source to prove me wrong, or they simply continue in the lie with no basis.
Authoritative information sources
One cannot well prove a case for targeting technology beliefs based on material provided by a targeted individual or mind control Web site, and certainly, not based on a YouTube or someone’s blog or post. At best, such is hearsay, opinion, or personal belief or suspicion. At worst, it is a complete fabrication, or based upon one. Don’t forget that some TIs are pretenders, some even perps, such that no personal claims can ever be deemed as proofs in and of themselves. The sad truth is, I’ve yet to see more than a handful of ‘proofs’ offered by TIs as to their particulars which would serve them in a court of law. Mind control sites seldom provide actual reference proofs, commonly citing other mind control sites or proofs shown herein as illegitimate. Circular references abound.
No. A credible proof must come from some outside resource which has no reason to be biased and itself be unaffected by targeting or disinformation/misinformation, and which can be backed up with citations as to the source of their information. I’m talking about things like patents, scientific papers, government records, news accounts, and good books by solid researchers of accredited note with usefully referenced footnotes, that their statements can be verified as factual. ONLY those things can be seen as authoritative and, therefore, holding a viable resemblance of truth and reality.
A warning about patents, however: patents can be filed based on imaginary or unworkable technology without proof of concept testing, and get by the patent office. I have some background in patent writing and patent requirements, and have seen such patents on file. Unless a patent relating to Political Control Technology applications is tendered by a major corporation, it would be wise to consider it carefully before making assumptions. The unworkable patents I’ve seen were by individual citizens, only.
Even so, one must be careful. Anyone can write a book or put up a Web site, make a video. In fact, a good deal of disinfo/misinfo comes from books. The best example would be books claiming to expose secrets of mind control by ex intelligence officers. No! No! No! No intelligence officer could safely write such a book without violating a Secrecy Oath or law such as the Official Secrets Act (U.K.) in a way that would get them and their books vanished. So I would never quote or trust a Barry Trower or Robert Duncan.
I do trust and have quoted from works of ex CIA agents, but only because their work was approved by Central Intelligence Agency as NOT violating any oath… because nothing they had written of had not already been reported in media or in the Congressional Record, or other public domain literature. The books were not exposing anything new, but merely confirming it in useful manner. In other words, they were not the true originating source, the opposite of a Trower or Duncan. I also know of one CIA agent who wrote and published an unapproved book, and he was hunted down to the point of exiling himself in Cuba. So how is it that Trower and Duncan are exempt?
So when you read a book, including mine, be skeptical and judgemental: demand good citations as to source. My books are heavily footnoted to aid in that judgement call, and typically include an appendix full of additional proofs. In fact, the third book in my proparanoid series, The Defensive Field Guide, is in part a collection of such proofs and citations in a form useful in dialogs with non believers. In such a use, everything within it is verifiable by the doubter.
And, when you base conclusions on a technical source, such as a patent or scientific paper, you must make sure you understand what you are reading, or do additional research until you do. Certainly do not rely on the conclusions of other persons with no credentials in the field, for they likely do not know any more about it, than you. This is a great source of misinformation, because technical papers to the non technical lay person can be read into any number of wrong conclusions. It’s like asking an atheist to interpret scripture, in a way; the translation will be quite flawed.
And here is a simple test: Google a given topic, such as Remote Neural Monitoring. If the returns features ONLY mind control related sites and the like, you are likely looking at disinfo/misinfo. For one thing, Google has a built in bias against ‘fake news’ which they define as anything contravening the ‘official line.’ The official line is that there is no such thing as mind control, so when all you get is mind control, its fake news they want you to have. No. If it was a real thing, you would have up front the ‘scholarly articles,’ news stories, and the mainstream view on topic… and THEN you might see some mind control sites and the like, as if some kind of discredited ranting from the fringe.
Another simple test: when you see a claim for a technology, IS THERE A LINK to THEIR SOURCE so you can verify the claim? Again using RNM, there are consistent claims it is an NSA technology, but NO ONE is providing links as to how they know this to be the case. With enough research, you find the claim originated from some guy no one ever heard of who claims to be a technologist, and HE (William Starrett) gives no link as to how he happens to know. He does provide a video of Snowden talking about SOMETHING UNRELATED and tries to fit it to his narrative; disinformation. There is another source, Russel Tice, who is another claiming to be an ex intelligencia (NSA) whistleblower akin to Edward Snowden. He, too, cites unrelated technology and relies on Robert Duncan, rather than first-hand knowledge. No thank you; disinformation.
And one final test: does someone offer some magical new age technobable gadget, glass bauble or jewelry, salve, oil, or audio they claim will cure/combat the alleged technology? This crap commonly pops up just as fast as the alleged tech, a remarkable feat given that we are typically five to ten years behind the technological curve, which means we don’t understand the technology even exists, much less how it works, and far less about how to defeat it. Do you really believe a $300 pendant with a picture of you as a child engraved on it will stop imaginary scalar waves?
What distresses me about disinfo/misinfo is how easily it becomes everyday ‘fact’ amid the various TI groups and Web resources. Take, for instance, this image which is being used by several organizations and web sites, including PACTS (People Against Covert Torture and Surveillance) offered as proofs of microwave attacks, and microwave murder. Make no mistake, microwave can kill, and cause horrific burns if misused. But the image is not of a microwave victim, at all. It is a bomb blast victim from the Middle East. If you can’t trust the validity of one image or claim at a Web site, can you trust the validity of any found there?
Did you know you can search for images by dropping an image into the Google search bar? Try it sometime. Its a good way to reveal fake news and disinfo/misinfo.
Falsehoods thought true
The following is a summary of commonly accepted false beliefs. Not one of them has any factual basis not originating from the enemy. The right hand dangles a Scorpion about your face after the left hand conceals the poisoned spike used to make you think you’ve been bitten; anti-venom won’t cure the actual poison used.
SEEING THROUGH YOUR EYES
No. Shared Vision is easy to simulate through excellent surveillance, computer hacks, and so forth. The belief is based on scientific papers and news reports, but they reveal the ability requires hundreds of implanted probes in direct contact with the brain by drilling holes or removing the skull cap, all directly connected to a room full of supercomputer. The alternative method also written of in hypothetical papers is to replace or surgically modify the eye to be bionic, complete with video transmitter. This would be a two-three week hospital surgical procedure and recovery. I think a TI would notice any of the above clues, but not one, has; no one is seeing through our eyes. These scientific articles have become the basis for false conclusions by people who fail to understand what they were reading. This is in my books, btw.
READING YOUR MIND
No. Same answer as above, almost identically. However, there is another way to simulate it which approximates the result. There is a documented V2S bio implant called RAATS which can intercept and decode your brain’s EEG signals which represent the 26 phonemes making up the little voice in your head which is you talking to yourself about (whatever), including what you are about to do. It is not mind reading, but it can capture the verbalized thoughts for like result. You can learn to suppress the voice, and foil it. However, it is also a two way system capable of V2S, and remains a threat. This is in my books, as well, as is how to thwart it. See also RNM, next.
REMOTE NEURAL MONITORING
No. This is a good example of misinfo, and disinfo (per previous dialog — there are zero authoritative sources). In addition, some TI’s have tried to misapply technical proofs without understanding what they were reading. Some cite brain to brain technology which requires a supercomputer and for both parties to wear a special helmet in a system which neither reads the mind nor is capable of controlling thoughts; it merely causes muscular reaction. Others cite a similar article talking about controlling a mouse’s motor functions wirelessly, based on light, but it requires brain surgery and again has nothing to do with mind reading, and only controls muscular response.
RNM has been further mismarried and confused with Neural Linguistic Programming. NLP is not mind control, as such, but the mere clever use of words/phrases to confuse someone. It is not technology, but a method employed by magicians to misdirect, and by quick change artists to get more change back than due them. However, it is a skill often taught to CIA agents or acquired by others as a tool towards getting people to cooperate. Elements of it are often used in interrogative procedures. It has no actual relationship to RNM other than a similarity in name… and any such relationship which has been assumed is, in fact, an example of written NLP at work to confuse.
BEING IMPLANTED, FINDING IMPLANTS
No (and yes). Make not mistake, implants are real and often employed. I’ve had one, and it eventually came out on its own, rather a rare outcome. There are tracking implants, pain causing implants, and V2S implants (there are three technological ways to cause V2S, one of which relies on implants). I don’t mean to say implants don’t exist in TIs, but I do maintain many TIs falsely conclude they are implanted as a means to explain why their defenses against other (wrong) technology does not work. We must hope this is the case, because implants are very difficult to detect or combat (remove, kill, shield).
The problem is amplified by wrong beliefs about detection. Countless TIs become victims of scam artists claiming to find implants with cheap RF/EMF detectors which allow the moving of a finger to cause the instrument to ‘indicate’ the presence of an implant, when it is actually only sensing the movement of the finger. “That will be $50, please… do you want me to keep searching for another?”
Detection is not impossible, but RF/EMF is not emitted by most implants, and therefore, they cannot be found by cheap gadgets. Getting a professional with proper gear to scan and to tell you about it is typically next to impossible. X-ray and MRI scanner techs and doctors will seldom share the information, it being thought that they are taught in medical school that implants are a government tool to track terrorists, or similar. A good TSCM (Technical Security CounterMeasures) expert tends to balk at requests to scan, they are almost always ex intelligence agents and prone to not crossing their former employers. They also don’t like to do it because if they find none, they will be disbelieved and accused of lying, and payment will be refused, resulting in litigation. And, btw, they charge an arm and a leg, when the bill is presented.
THEY ARE TRYING TO KILL ME
No. Time was, when someone knew something they should not, became too annoying a squeaky wheel to the ‘system,’ or in some way threatened the plans of the powerful, they would simply kill them. But with the perfection of early mind control experiments post WWII, it was quickly discovered that the best way to keep those secrets (and any others) from being revealed, was to make the pesky risks seem insane. Mind control methods have replaced the ‘wet job’ as the way to deal with potential ‘trouble makers.’ There is now no need to kill someone, and in fact, a mind control victim has great potential as a resource for some future project use as a patsy, as guinea pig in new tech or methodology, or training exercises. It costs a lot of money to MC someone, and so, why destroy the person and the investment? This is one reason why membership in the TI community seems to be ‘for life.’
More than that, MC is all about psychology, and the greatest tool in the arsenal of psychological manipulations is fear. It is easy to make someone think their life is in danger, the ultimate driver of fear. Listen. If they wanted you dead, you would already be long dead. It is just that simple.
There is no profit in a ‘slow kill,’ because it would leave forensic clues that would endanger ongoing operations. Out of my 12,000 TI contactees, easily a third or more thought they were marked for death. Out of those thousands, only one actually died from targeting, and that was seen clearly as accidental and unintended consequence by the perps. Another died of organ failure deemed due to old age (nearly 80), but which was likely augmented by constant DEW. Perhaps a dozen others have died in ways which are reported as accidents (i.e., auto), but which the TI community embraces as murder. Another dozen suicides are blamed on targeting.
Suicide is the ultimate expression of giving up, the ultimate price of failing to defend against the real facts of targeting, and the final proof that the victim has decided to voluntarily give up God’s gift of Free Will and submit to the will of their generally satanic tormentors. When Cancer patients and quadriplegics can fight on and endure with dignity, why would anyone give perps that victory? Because they grew tired of defending against the wrong things with the wrong defenses.
No. This is a perfect example of technobabble at work. There are zero authoritative articles, certainly none which scientifically address scalar waves, which are alleged to disobey the laws of physics and attributed by some people as being employed in mind control. The primary proponents and parties attempting via Youtube and Web presentations to ‘prove’ scalar waves (leaving more questions than answers) and tie them into mind control are often the same people selling $300 pendants to ward them off. It is a sham.
No, underscored. Some claim satellite DEW torture. Some claim RNM by satellite, already debunked, above. I’ll devote some time to DEW debunking, but I will admit to the possibility that satellites can potentially be used for area wide mood control or subliminal messaging, ONLY. You can in theory broadcast EEG signals and embed subliminal messages within communications signals. This is known technology such as used in Command Solo aircraft being flown every day over the U.S. and elsewhere.
This use of satellites is mere speculation, however, but I’d not be surprised. Command Solo flies training missions every day over US cities, and not even the operators know what is in the ‘training’ tapes being broadcast. The military has admitted the technology was used to sway Bosnian elections, and to cause Iraqi soldiers to surrender in droves, sometimes to small camera mounted drones. Given the number of butthurt Democrats who have waxed violent over the elections, it appears SOMETHING has driven a good number of people beyond the edge of acceptable and normal behavior.
Why DEW attacks are not possible by satellite: Any beamed energy, other than lasers, falls off at the square of the distance. A cell tower transmitter is good to about 2~5 miles with a relatively small emitter. At the height of satellites, the amount of power required to broadcast a microwave beam to earth and have it strong enough to penetrate buildings to hit an individual would likely require a power source far too large to fit in a satellite. Powerful land communications microwaves, broadcast at seriously high energy levels with a huge emitter, have a typical maximum range of about 40 miles. Satellites are typically some 22,000 miles high, or higher.
The harder challenge is associated with transmitter size to handle that power. Microwave communications towers require transmitters typically in the range of 8 to 18 feet in size to punch towards 40 miles. To do fire a signal 22,000 miles would take units far too large to launch. But the bigger hurdle is accuracy, given that in order to maintain the illusion of insanity, you would not want anyone nearby to be hit with a beam (collateral damage). The best military grade GPS is accurate only to about 12 feet, which means a plus or minus error of about 10 feet for the center of beam, and the beam width would be much wider than was the transmitter. Bystanders many yards away, or further, would notice the same targeting effects.
But suppose it could be done? The next problem is cost and client (TI) servicing. A typical military or intelligence satellite can only target ONE client at a time. Given the size required for DEW targeting, certainly only one. Yet how many TIs think they are targeted by satellite? There would need be thousands of such birds, but there are not even one thousand satellites in total from all nations on Earth for all purposes, inclusive. Each satellite costs roughly a half billion dollars to launch, and about $15M a year to maintain, hardly cost effective when a perp with a modified microwave oven-style weapon can do the same job from a nearby building for a few thousand dollars a month.
What about availability? There are zero satellites in geostationary orbit over the United States which are not communications or weather satellites; the military and intelligence community only use orbiting satellites. That is another inefficiency for targeting individuals, because it would only be overhead for targeting for a few moments several times a day. How many TIs can claim targeting on a regular schedule that fits that?
Satellite targeting makes no sense either technically, or financially. It is a fantasy of convenience to the greater targeting movement fostered by Robert Duncan and Barry Trower. If people believe in satellite targeting, they will stop trying to learn the truth, and stop trying to defend themselves, as there is ‘no way to fight satellites.’
True: because they are not at war with you.
This is an old topic that’s lost traction in the public eye, but in the background, the enemy continues to work ever closer to fulfilling prophecy about Mark of the Beast. Now, employees are being asked to implant themselves in order to get snacks, get through doors, and access workstations and photocopier.
What you will learn reading this post:
- what RFID is, who is behind it, and why you should fear it;
- about Digital Angel, and the bio implant tracking version of RFID;
- why you should fear it, put away petty ideological differences, and unite against it
- what you can do to defend against it;
- the greater strategy RFID is in support of (the ultimate threat).
Invasion of privacy tiny in size, massive in scope
Recent news stories, including a particularly scary one referenced in red text, herein, have forced me to draw upon years of research and dig out my old PowerPoint presentation, 666 Reasons for Smart Dust and RFID Technology, as presented as the keynote presentation at Conspiracycon 2010, in Santa Clara. Any definitive presentation must go back to the beginning, or the dots won’t quite usefully connect. This is going to impact YOU in YOUR LIFETIME. Actually, it already has, and you just don’t know it; the water temperature is slowly being raised on we Frogs, and it’s quite hot, already. Hopefully… we can somehow jump out before its too late.
Smart Dust and RFID tracking technology are quite related, but Smart Dust is not going to be a part of this presentation, except to say that it is nanotech capable of much more than RFID, but it is not an implant. While it is represents its own significant threat to social, financial, and physical security and well being, it is less useful than a tracking implant for the population at large, and cannot play the role of Mark of the Beast. Fortunately, it will not likely ever be used against anyone not deemed a high-priority national security risk. You know, like Will Smith, in Enemy of the State.
RFID, however, is the very heart of the tracking bio implant, the most obscene version and infamous of which is Digital Angel. That’s the name of a CIA front central in pushing for implants, but also often used to describe their chip, itself as a product trade name. They also offer a wide variety of tracking systems which are non implant, such as wearable items like watches and ankle bracelets.
But we need start with a broader view on RFID to fully understand the greater threat this topic represents. Non implant (and seemingly harmless) versions of RFID are already used to track an endless array of products, and you are quite likely to bring them home every time you go shopping. In retail, it is mostly benign, but it becomes the bedrock of a useful personal tracking system.
Mostly benign? Check this out, an edited and updated excerpt from my book, The Professional Paranoid: How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual (third ed.) Excerpt begins…
Smart Dust, RFID, and the Mark of the Beast
i want you to consider the first letter of this sentence; the lack of capitalization is not a typo. I wanted to draw attention to the dot above the letter ‘i.’ There is a reason… there is an RFID invasion taking place, and some of the invaders can be just that small.
The Bible tells us that in the End Times, there can be no transaction between persons for goods or services unless both parties have the mark. Revelation 13:16-17 “And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: 17 and that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”
Though the Mark of the Beast is thought of as being the number 666, that is not quite the case. That is the number of the Beast himself (the Antichrist) in numerology evaluation of his name. The original words used in the original Greek texts of the New Testament can be translated to mean ‘insert’ as well as ‘mark.’ Thus there are growing numbers of people who think that some form of Digital Angel bio implant will be the actual marking device. This section will illustrate that likelihood and educate you on just how close to that day we may be.
This will make sense later: implants are the mark for the hands of peons, and marks on the forehead are the mark for meons.
What is Digital Angel? It is a firm which is known for a series of tracking products, including bio implants, all based on RFID technology. Simply put, it is a passive device which, when scanned with a low-energy RF signal, responds with a signal of its own, broadcasting a unique identification number or other data. Early versions of this are still commonly found in clunky removable/disposable merchandise security tags installed by retailers which can trigger alarms when shoplifted goods exit the store. In the modern version, the product manufacturer includes the chip which enables the same feature without the retailer needing to do anything but take delivery of the goods.
There is a whole emerging industry based on RFID, and it, in turn, impacts on almost all other industry sectors. The industry is driven at its heart by the military and intelligence community with the help of corporations who are part and parcel of the NWO elite, as defined by the makeup of their directors and other corporate leadership or ownership. What they want to do with RFID is mind boggling, as is what RFID is capable of in terms of invasion of privacy. To start, they want every single product manufactured and sold to have its own unique RFID tag, and are pitching it to manufacturers and retailers as the next evolution of bar code.
Similar chips in credit cards technically allow purchase without the need to remove the credit card from the wallet, though they currently require us to scan the card. But all that is really be needed is to specify which of several credit cards we might be carrying was desired to be used. That could be verbal, by touch screen, or smart phone application, which avoids producing the card. RFID is also being built into phones for comparison with credit cards nearby, to allow verbal telephone purchases to be made without the need to verbally confirm credit card details. The bio implant is ‘sold’ to us as a convenience to replace all of that (examples to follow).
That is the ‘convenience’ under which it will be sold to us in the retail world, and if a cash register can scan these chips, so can the device at the door looking for merchandise which had not yet been purchased. Why stop there? Anyone can put small and hidden scanners (with or without cameras) anywhere, and for any reason… such as at every doorway where some form of security or tracking feature is desired. By scanning RFID credit cards, the identity of everyone passing through is logged and time stamped without their knowledge or participation. Actually, any RFID tag on your person can do the same thing (it is being built into clothing), because your identity can be associated with its purchase. And that is just the beginning. Ergo, the national ID ‘Real ID‘ program is based on RFID, and eventually, the human body itself will be its on RFID ‘ID.’
In the very near future, it will serve law enforcement. At the scene of the crime detectives will often find discarded items potentially belonging to a suspect. They analyze these for clues, such as fingerprints, to build a list of suspects. In a world of RFID-only purchases, every object also identifies who purchased it, when, and where (often also useful clues in prosecution). What about cash purchases to thwart RFID records keeping? Not a problem. You didn’t think for a moment that those little slivers concealed in the left-hand portion of your new money was truly just a counterfeiting deterrent, did you? Put anything but a $1 bill in your microwave oven and it will explode when operated… a trait of RFID. Moral of the story; don’t casually discard product wrappers, especially if you think someone might use them to implicate you in a crime; burn them.
But it gets worse. For any of this to work smoothly, somewhere, someone needs to catalog and keep all those transaction records and make them available for government’s needs. Enter the Total Information Awareness Office (TIAO), AKA the Terrorist Information Awareness Office. This was modeled after an expanded version of FINCEN (Financial Crimes Enforcement Network) capabilities (check this out); and was MILITARY led and very Intelligence community friendly Defense Advanced Research Projects Agency (DARPA) project. I’ve seen the original DOD call for papers and the final description of capabilities and intended uses for the TIAO, and it has little to do with targeting terrorists. Instead, it has to do with capturing records of EVERY transaction between EVERY citizen and business, as well as the passing of ANY citizen through ANY doorway in selected locations. Further, it will track vehicles past checkpoints and can log other kinds of interactions or transactions between people and each other or real world objects (i.e., machinery, vending machines.)
Update: TIAO ‘went away’ due to public protest and ‘too many questions,’ including “Why was the head to be a convicted criminal participant in Iran Contra, an ex Naval officer of significant credentials tied to CIA and the Pentagon, John Poindexter?” And yet, it did not actually go away. It has instead been quietly replaced with the OIA; the Office of Intelligence Analysis, another new super-secret spy agency operated out of Homeland Security. They, in turn, gently established ‘Fusion Centers.’
Fusion Centers are ‘sold to us‘ as a happy pill having nothing to with dark deeds, and as being established by cities and state governments in order to share information between partnering civic and federal agencies, local businesses and NGOs for improved security against terrorism and ‘other threats.’ In truth, they are hotbeds of social spies who operate external of the centers within those groups of partners on behalf of DHS and the intelligence agencies. It is often a source of organized gang stalking, and a collection point of ‘data’ about ‘other threats.’ We are the threats, and the data is obtained through backdoor access to the ‘data’ about us found in participant computers, including RFID transactions, security and traffic cams — and via gang stalking and the associated psychological profiling. It is a kind of fascist Brown Shirt group without the uniform, replaced with a smile and handshake… and big eyes and ears.
And worse still. If government decides it wants to know even more about you, a black van can drive by your home and scan it to collect the sum total of all information from all RFID tags (or Smart Dust) found within the home. They will quickly know EXACTLY what is in your home, where you got it, how you got it, and when. This gives field agents the ability to gain access to that kind of information in a very focused way instead of having to run tedious database searches which would necessarily include bureaucratic handling and, perhaps, the dreaded and feared need for a pesky warrant.
And, worst of all, the ultimate expression of RFID privacy abuse is to put one in the human body, with or without the target’s knowledge. The question is, how close are we to this nightmare, and what can we do about it? The answer is, we are frighteningly close, and in fact, it has already been happening for decades.
- RFID is already being put on thousands of products you buy today. Even common mundane consumer goods like Gillette razors and Max Factor makeup have been ‘chipped’ with RFID. Walmart pioneered its use, and used cameras (which opens up a whole new personal security threat for the chip) to track customers through the store, and record RFID transactions. There are also shopping carts with built-in ‘product information displays’ which can track every item you handle while in the store, and profile your shopping experiences over time. You can bet there were cameras connected to scanners scattered throughout town by CIA or the military (Walmart Board included ex military and intelligence agency types at the time), as well, to see where else you went and what else you did, to test it as a spy tool. Many manufacturers have placed orders for hundreds of millions of RFID tags and millions of scanners. They have to be in use somewhere.
- Many tens of millions of RFID equipped credit cards have already been issued. You can spot these visually if they are transparent, or if the credit card number has a lot of zeros in the middle, or a gold foil rectangular emblem about ½ inch square. Though sold to us as a ‘security feature,’ they are the opposite: content can be stolen by proximity scanning without your knowledge, and then the RFID and card can be cloned by thieves for use at your expense. I’ve caught such a thief scanning at the doorway to Walmart. He was pretending to be making a phone call… pacing back in forth in ways that maneuvered him in behind victims. But there are also home-made scanners which can scan from hundreds of feet away.
- Most cell phones use SIM card technology incorporating RFID (the SIM card, more than the phone, identifies the authorized user). This is often used in phone apps to facilitate cardless credit transactions (i.e., iPay)
- Virtually every maker of cash registers and point of sale systems is developing low-cost attachments to existing cash register and credit card scanners to sense RFID, as well as whole new systems to replace the old with simplified operation and reduced cost — this allows self service checkout and the elimination of the sales clerk, so it will be promoted as a ‘cost reduction’ tool. But don’t expect to see savings passed on to consumers. Money already has the needed strip in place and it likely has been RFID capable all along without our knowledge.
- All employee scan cards use RFID. Hotel room key cards use RFID. Federal Express, UPS, etc., all use RFID shipping labels. Monthly bus passes, season tickets, and the like, also employ RFID.
- Pets and livestock have been being implanted with RFID for decades. Within the last ten years, thousands of people have, as well, largely through efforts to chip children ‘to protect them against kidnapping.’ There are nudist resorts where you can volunteer to have one injected to represent your credit card information for purchases at nudist-camp points of purchase for services and goods. Otherwise you must carry your wallet or purse and keep an eye on them. What fun is that if trying to commune with Mother Nature and your bank account? In July of 2017, a company announced break room vending systems and software to allow implanted employees to access snacks without money. Learn more here. Soon, you will see implants being promoted for use with parking meters, fast lane highway access, and on, and on, and on.
- Bioimplants can easily be implanted in a human without requiring their knowledge or consent. All they will know is they woke up with what seems to be an insect bite. This can be done while they sleep via covert entry of their home, or at distance with a special pneumatic sniper rifle.
- According to several news accounts, countless livestock has been slaughtered with the implants still in place, their meat ground and sold, and consumed by unaware purchasers. Despite massive recall efforts, not one package of meat was recovered. RFID implants are made of glass, plastic, and poisonous metals.
- Some school systems are requiring children to use their fingerprints with scanners in order to get their school lunches. This is bad enough, but the firm that makes the equipment used also offers an RFID attachment in lieu of the fingerprint scanner, and mentions implants in their literature as an option.
- One maker of RFID, in marketing it for aircraft part identification in an assembled aircraft (the goal being to track parts which might be subject to safety recall, and a feature useful in crash investigations) chose a trade name for their RFID of ‘The Mark.’ The part number when Boeing Aircraft orders it from the maker is alleged by employees to be 666.
What can you do to defend against it?
Aside from sharing this post, not much. Be very vocal and protesting at every opportunity any discovered use of the technology. You might demand RFID tagged merchandise be detagged or the tag neutralized before you leave the store, but that would make you look crazy. However, organizing endless group protests can have an effect. Any firm that covertly uses it should be razed to the ground (sued into oblivion for violation of privacy). Any government office holder should be kicked out of office if they support the technology in any way, shape or form, or simply fail to oppose it. In my opinion, preparation for revolution should be made if these efforts fail, because that would be the only remaining recourse prior to full enslavement.
Back to the bible. In The Book of Revelations where the reference originates, there is also one more clue RFID will be the basis of the Mark of the Beast. One at a time, the Seven Angels open the Seven Seals to unleash seven deadly punishments upon the unfaithful on the earth. One of these states that those with the Mark of the Beast will suffer severe pain and many will perish from it. A subtle clue.
As it happens, there is one feature about RFID which must be told to make sense of this, and it suggests how to thwart the tech: if exposed to high energy radiation, RFID heats up incredibly and explodes. A burst of high energy radiation levels will literally destroy it… such as an intense solar CME blast (Coronal Mass Ejection – a high RF/EMF energy field). At this time, I cannot tell you how to generate such an energy and safely use and aim it, but it has been suggested by other experts than a ten second microwave oven exposure should be sufficient. Now if I just had a portable unit I could waltz through the retail Aisles with… set to ‘Burst’ mode… but you can bet there will be or already are laws written to make that illegal.
But there is something simpler which also defeats the technology. Metal shields the signals. Thus wrapping a National ID or an RFID equipped credit card or object (i.e., chipped hand) in aluminum foil defeats the device’s ability to communicate. When the revolution comes, if that is our future, there will be portable devices which anyone could build from easily obtained parts to detect or destroy RFID at will. I fear the day this is needed. I also say woe to those involved in the use of RFID should it come to that. End excerpted material.
There is one other thing you can do. The response time for reading a scanned RFID is very brief. There is a ‘failure’ in reading called ‘tag collision.’ When too many RFID tags of the same frequency (usually dictated by type of tag/use of tag) are present in a confined space, the scanner can fail to capture the data, or capture the wrong data. Therefore, if one were to collect dozens of RFID tags of various types and put them into a bag to carry along with them, it would effectively become a scanner blocker. Keep all your old canceled credit cards in the same wallet as your valid ones, sandwiching the new between the old, and pull them ALL out to select the one to use, holding them all in the same hand to swipe.
I also advise against Smart Appliances, and smart meters. RFID is at the heart of interaction with Smart Meters, which in turn is its own invasive privacy and stalking threat (widely experienced as a directed energy weapon). Worse, it is tied to mapping of the interior of your home; the floor layout, location of furnishings and other appliances and electronics, smart or otherwise. Programs are being developed to allow such mapping information to be available to manufacturers of smart devices and used to market to you based on use of not just their product, but all products. Naturally, all that can be accessed by government, as well… and hackers partnered with burglars.
I also suggest taking advantage of these resources as contingency against the worst:
The history of RFD tells all
It starts with Howard Hughes, though he was a victim, not an instigator. Most of us are familiar with his rise to being the richest man on Earth in his day, and his fall due to a mental condition which impacted his ability to interact with people, and life in general. The untold story is that once debilitated, CIA agents and Mormons (CIA likes to recruit from Mormans, and Masons, because such cults have secrets and know how to keep them through compartmentalization and other methods) became his ‘caregivers and managers.’ He trusted them, and they took advantage.
Once in control, his vast resources were diverted to CIA control and application. Hughes Shipbuilding built several spy vessels including the Glomar Explorer and companion vessel, both designed to retrieve sunken Soviet Subs. Hughes TWA aircraft and assets were diverted to form (over time) three different CIA ‘airlines,’ including the most recent, Evergreen Aviation, which wound up acquiring Hughes’ Spruce Goose for its museum. Hughes Tools, the financial cash cow of Howard’s meteoric rise, a maker of drilling systems for the oil industry, would eventually become Enron, and we know how that wound up vanishing billions of dollars into thin air. The remnants of Enron’s data processing center would be applied to CIA fronts engaged in porn (to profile user sexual preferences for possible blackmail application), web site hijacking (I was a victim of that, documented here), offshore gambling, and 4-1-9 scams (Nigerian money investment scams).
Then there were Hughes operations which would evolve to serve CIA’s efforts in Political Control Technology development and application. It starts with Hughes Aircraft’s electronics division, eventually become Hughes Electronics, which invented the RFID concept. These were originally used to identify and track cattle, marketed through Hughes Identification Devices, but also found their way into humans involved in early (late 1940s) non consensual CIA mind control projects and Atomic Energy Commission radiation experiments on civilians. I wound up with one in my leg, when as a child, when I was injected with a radioactive substance in Yakima, near the Hanford Energy Reservation.
From Hughes, the chip was migrated to Destron Fearing, and from there to our friend, Digital Angel. We will come back to them. More CIA fronts or partners duped into participation would be created in America and globally to market implants for humans. They do big business in ‘police state’ countries, often for the purpose of chipping persons in the criminal system. Of course, it is privately understood they are good for tracking anyone you wish to track, such as embarrassing political activists and whistleblowers.
LocatePLUS is a Homeland Security created and CIA infected front which pushes the implant in America and advertizes that it maintains 12 billion records covering 98% of the American Population. The DHS/CIA knows all about you and is making money selling you to anyone with the money. In America, the front markets to FBI, ATF, DEA, and 2000 law enforcement agencies, primarily non implant products such as ankle bracelets.
In Europe, the front Worldwide Information is a LocatePLUS spinoff doing much the same. Global reach far outstrips American consumption (there are a lot of fascists out there, in almost every government system): Universal Microchip in Italy, IDECHIP S.A. markets in Ecuador and Brazil, Solusat Medica in Mexico, Scientific Innovation and Integration (SII) in Korea, Taiwan, China, and Japan, Inforlexus Inc., for Malaysia and Indochina, Biometronix for Germany, Glezer Technology in Israel, and Cybertek in Puerto Rico. This list continues to grow; the Swedish firm Biohax International is behind the implant for snacks story.
The primary American front (a sister to LocatePLUS), Metro Risk Management Group, sold $13M worth of chips over 5 years to the Bonneville Power Administration (to track fish, officially). BPA is a Department of Energy firm which had in the same time frame been in the news because of high-tech spying operations having been detected taking place in their facilities… while BPA and Enron were significant others in the same bed. The U.S. Military contracted for $24M, while they sold $1M to private citizens wishing to chip their children or themselves. They sold $7M to the greater Intelligence community, and $73M for ‘internal use,’ which is to say, CIA, itself. Such orders are a combination of implants and scanner systems, both portable handhelds and installable units for security gates and doorways. A typical order might consist of hundreds of thousands of devices and a thousand scanners.
All this data represents 2005-2009. Sales are increasing over time, but increasingly hard to track for a variety of reasons, including corporate name changes, mergers, spinoffs, and other tactics often seen in CIA fronts trying to be a moving target. And the implant business is a target by activists and activist organizations worried about invasion of privacy and civil rights, to say nothing of some kind of New World Order nightmare ending with the Antichrist at Armegeddon. And, they are constantly being sued in court for a wide variety of reasons.
And this brings us back to Digital Angel, the key point in the bioimplant tracking food chain. As stated, a lot of business names and hanky-panky tactics are often employed by CIA fronts, as outlined in The Professional Paranoid, a privacy/security how to which, in covering that topic, helps readers to identify who is really causing the bumps in their night, should they be so unlucky (as was I). So let’s take a look at Digital Angel, again based on older ten-year research (I’m not going through that, again).
Let’s talk corporate names as clues: though most commonly known as Digital Angel (Florida), also DBA Verachip, they were formerly Applied Digital Solutions… which was formerly Applied Cellular Technology (because RFID tracking often relies on cell phone services)… which also used the DBA ACT Financial… formely Axiom Information Technology… formerly Axiom Computer Consultants… DBA Great Bay Acquisition Company (those all based in Wisconsin/Minnesota). Digital Angel divorced itself from Verachip (being sued out of business), but then Verachip merged with Steel Vault… which became PositiveID, which then in turn tried to acquire Digital Angel… which also operates Signature Communications in the U.K., where it might (conjecture based on company data and ties to CIA fronts) enjoy backdoor access to encrypted government radio communications, the assumption being that receiving units employ an RFID chip which, like the cell phone paradigm, authorizes descrambling of transmitted data, as well as authenticated identification of the sender and recipient. Finally, Digital Angel, also being sued and hounded, ran off to the U.K. where they now promote themselves as “a developer and publisher of consumer applications and mobile games designed for tablets, smartphones and other mobile devices, as well as a distributor of two-way communications equipment.” But they still push implants, and through Signature, the two-way communications gear.
Let’s talk facts as clues: Digital Angel does not make RFID. No. They merged with Destron Fearing, the actual imputus of modern RFID systems claiming to have invented RFID technology. No, that was Hughes Aircraft’s Electronic Division. Digital Angel at one point claimed to be founded in 1948. No, but Destron Fearing was founded in 1945, did the RFID for cattle thing in 1948. No one cited so far, actually makes RFID tags, the heart of the implant. No, that’s Raytheon, a military/CIA contractor… formerly known as Hughes Aircraft. That makes sense, since it is the U.S. Army which tracks all RFID tag assignments (unique tag number assigned to (whatever) user data). Meanwhile…
Let’s talk connected dots as clues: CIA’s HHMI (Howard Hughes Medical Institute) is steadily pushing for the use of RFID in both implant and non implant versions to hospitals (49 major facilities as of 2005, more every year) and the medical industry at large, and Hughes Satellite and Hughes Communications services RFID tracking systems via cellular/wifi. How do I know this? By temporarily working for both Hughes Satellite and a major cell phone carrier where I was able to verify specific cell phone traffic and routing of tracking data. The phone account was tied to an individual which shared an address with one of the above firms (how I found it). And that led to finding dozens of such phones for more firms. And even more looking at other fronts known to me outside of the RFID playing field. In fact, such details are part of my evolving insurance policy against ‘accidents.’
Let’s talk key people as clues: Another CIA front trait has to do with who is involved in the corporate structure. At ADS (old data) Dr. Richard Seelio was Director of Medical Applications. Really? He is a Bariatric Surgeon, so he knows how to suck fat out of your thighs, not exactly as advertised by his title (a typical front man). The Senior Vice President was, prior to installation, a small time lawyer (a cutout man). A look at the Board of Directors of almost many of the above firms variously will find persons of wealth and influence, persons with backgrounds or ties to military/intelligence (or both), and persons with membership in the nefarious NWO Round Table Groups, such as the Council on Foreign Relations, Trilateralists, and the Bilderbergers. This is a kind of corporate structure is a fingerprint that lets anyone track just who are the trackers.
The other shoe drops
As I wrote this, I was listening to radio, where Clyde Lewis more thoughtfully reviewed a greater enveloping matter on his Ground Zero show, things equally important to understand, and far more sinister. Listen to it, here. The short of it is that chipping people is not just about spying on them, it is about control. It will enable a complete rewrite of social, political, religious, and economic existence, and the script is already being followed step by step, RFID again at the core. You didn’t think ‘Global Warming’ was about weather, or that Transgender Issues were about rights, or that Terrorism was about political or religious ideologies, did you?
It is, all of it, in support of ‘a brave new world’ which the New World Order seeks to establish, a world where there are only three classes of people. While my friend Clyde did not use my labels for these classes, he did so describe: there will be Meons (a Club of Rome/Bilderberger label based on an ancient word for someone worthless, less than a peon – a ‘useless eater’ who will not likely survive the NWO on their own, and who will be made to ‘go away’ in time); Peons who will be usefully employed to run the system (government, business) for the elites; and the Elites, the 1% of the 1% who will rule.
Clyde explains how the Middle Class will be eliminated, divided between those willing to implant and deemed useful (peons), and those unwilling or deemed useless (meons), and the a host of new topics and proofs you have likely never heard of, and more. Naturally, the upper class will be peons, and the lower class, meons. Bio implants (part of Transhumanism) are key to all these plans. You had better understand all of this or you won’t be able to cope, and likely, will end up in the red list for population reduction.
Targeted Individuals are desperate to find verifiable proof they are electronically targeted. Unfortunately, many turn to cell phone EMF meter apps… which are useless for the purpose. Here is the right way to do it.
What you will learn reading this post…
Smart phone EMF Apps can’t ‘see’ targeting signals
You have to know what you are looking for
In spring of 1998, according to the Times Union, the university’s Psychology Department first became aware of Kelley’s interest in mind control technology when she posted a note on her office door announcing a lecture called ‘The Psychology of Invading the Self.’ The note reportedly described implant research funded by the National Security Agency and the Department of Defense with an annual budget of $2 billion. The note stated the devices were typically implanted in ‘uninformed, nonconsensual subjects” who were usually ‘federal prisoners and political dissidents.’ The newspaper has since had the article disappear from their files, but other newspaper articles reference the event, which is where I obtained the image.
How you use a meter is important
Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.Updated Dec 2017 – Corrected technical boo boo and added a couple of closing paragraphs somehow deleted and not caught. Changes indicated with red intro. What you will learn reading this post: • all TIs could benefit from professional TSCM electronic sweeps; • that isn’t likely to happen; • the poor-man’s TSCM pro isn’t a pro, and might be a fraud; • there are low-cost meters but improper use can be dangerous in many ways; • there is a solution, and help implementing it — and here it is…
The way it is
A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.
Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).
Sigh. Add to Christmas wish list, and hope Santa is generous.
The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.
So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.
The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.
Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.
Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly. And there is another common risk…
All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.
Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. In fact, it has nothing to do with electronic solution; it only measures the Earths natural EMF. It has no value for personal protection, as I’ve written of, here.
Don’t give up too fast… all is not lost
Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:
a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;
b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;
c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;
d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.
e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;
f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);
g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.
Now as to the other key requirement, proper use…
Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.
As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).
These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.
I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.
I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.
Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage). That, alone is a $12 value. By all means, donate more, if so moved.
Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂
The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).
The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).
Finally, we need to talk about what constitutes a dangerous signal reading on a meter. These devices display information in a wide variety of formats and scales which leave a non technical person with no understanding of what a high reading actually means. It only matters and is useful defensively if and when the reading exceeds safe levels. Different kinds of signals might be deemed dangerous at a lower level than the kinds of signal. For example, pulsed microwave is the most dangerous of all, and can be so at quite low strength. This is normally the main threat a TI faces, but most low cost meters cannot distinguish between them, or measure them correctly. This is not something commonly mentioned in their specifications, and you need talk to their engineers to inquire, to be sure the meter can deal with it correctly.
As far as safe levels, there are many levels established by many agencies of many countries for many purposes. What is deemed safe in one view or situation, may not be save in another view or situation. The nice thing about the expensive meter I use, is that it knows all these limits and indicates when one or more are exceeded. With a low end meter, you need to compare your reading to the various standards. Learn more about such standards, here.
Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.
The way it is
The Three Answers
I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
Knowing the difference can alter TI tactics
About Death Threats
What is Fake News?
How to fight fake news
Case Study in fake news of the most dangerous and treasonous kind.
Fake News real goal and threat: Democracy, the Constitution, Freedom
Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com.
What led to this book? The definitive International conspiracy.
After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.
The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.
The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.
The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.
Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page. But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.
This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.
Why UTC matters to this new book
Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.
Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.
Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.
The plot thickens
I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.
By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).
As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.
An important detail
And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true. There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.
There is a little known and underreported TI targeting method and symptom based on Stray Voltage, which is usually marked by a dramatic prevalence of ‘static discharges’ when touching things. But there are other symptoms, and happily, tests and cures.
Stray voltage is the technical term given by the power and electronic industries to a situation where an electrical charge is present in the ground, itself. It can also be present in a structure, such as your home or workplace. It tends to be far more likely to be present at the ground-floor level than upper floors, and is commonly found present at insignificant levels almost anywhere electricity is used. It can even be found in places where there is no AC power nearby present, at all, if there is Quartz bearing rock in the substrate. Concentrations of Ferrous rocks and ground water near the surface can impact, as well.
In structures, the type of structure materials and design can impact prevalence, as can furnishings and the layout of property. And though considered rather rare as an actual problem, for some reason, it is normally thought of or understood as being significantly more problematic in rural farms (especially noted in dairy farms) more than in bedroom communities, though it can be found even in downtown high rise areas. It seems to impact Cows in many observable ways, to include reduced milk production, troubled births, general health and premature deaths.
The power industry takes great care to prevent stray voltage levels from being detectible or able to impact living things, including you and me, but things can go wrong. When that happens, and depending on how strong it ends up being, it can be quite detectible, and generally, unpleasant, if not harmful or even dangerous. Some forms are capable of outright electrocution, such as created by downed high-tension power lines. While this post uses the term Smart Meters in the title, it is less about that, except that a possible conspiracy may exist between Smart Meters and stray voltage, as outlined below.
There are many reasons stray voltage might be present at problematic levels. I see these as divisible into three threat levels and causes. The first may be relatively minor in threat level, caused by natural eventualities unrelated to targeting, and unlikely to escalate in nature. An example might be living near to high-tension lines running parallel to metal fencing on your property, where a kind of induction takes place causing the fence to produce an electrical current.
The second is also unrelated to targeting in causality, but may be far more serious, even dangerous, and quite likely to escalate — such as may due to electrical shorts or combinations of other unhappy electrical happenstances. The important thing to take away is that the bulk of stray voltage may have nothing to do with being targeted, but any presence which is detectible should be of great concern to anyone, and pinned down immediately.
The third? I have recently discovered a new possibility, thanks to a coincidentally… even accidentally discovered set of facts learned from one of my very first TI clients. I say coincidentally, because in considering the new information, it dovetailed very nicely with other client information which had otherwise led nowhere. As result, I am now quite confident that there can be deliberate targeting by artificially creating and controlling stray voltage for the purpose.
It can be used to establish a variety of selectable threat levels and targeting effects (symptoms), to include other forms of electronic targeting. This level is not officially recognized to exist by the power industry, though the potential for conspiratorial knowledge and participation in its use surely exists. One would be unwise to broach the possibility with power companies or other parties, unless part of a legal response effort, as mentioned herein. The good new is, that regardless of the three types, any serious threat levels can be dealt with, almost always.
To weaponize AC power in this way (there are other, previously known and frequently spoken of ways, such as found in my book, MC Realities), simply requires shunting of power to the earth at one or, as is more likely, multiple locations around the property. This would likely be done through a control mechanism to throttle the voltage diverted, even to an ‘off’ position, something akin to a remotely controlled dimmer light switch. Naturally, it will consume significant electricity, and that will turn out to be a blessing, as we shall see.
After reading this short introductory post, a TI would be well served to learn more about the topic, even if not thinking themselves impacted by stray voltage, currently. As the link to that information only addresses the first two reasons, the reader should indeed finish this post, first. After reading BOTH sources, then, and only then should they attempt to fit their circumstances into the dialog and consider the best course of action. Feel free to contact me if unsure, at proparanoidgroup gmail com.
Symptoms, regardless of cause
At natural ambient and other low levels of stray voltage there should like be no outward signs discernible. We only need worry about the phenomena if we do start to sense effects. We have all experienced the random static discharge of touching a door knob after walking across a carpet. While discounting such experiences as carpeting woes, they can also be due to stray voltage, which can certainly augment or simulate carpeting-caused static build up, as not all carpets generate the problem to the same degree, or even at all. When you get such discharges in the absence of carpeting, that is a typically a clear sign of stray voltage — though cold dry air can contribute, as well.
Note: normal static discharge is usually relatively high in voltage but low in amperage, quite akin to that associated with spark plugs in an engine; unpleasant to experience, but relatively harmless, more likely to cause injury from jerking away with violent contact with another object, than from the actual shock. They may generate a small visible flash of light, an actual spark jumping a few millimeters, at most. But stray voltage can produce far more varied and dramatic, even dangerous results. There have been instances of seeing discharges which travel inches or even feet, making zapping or popping noises, producing heat. The risk of fire and explosion cannot be ignored, where flammable fumes or pure Oxygen sources might be present. Obviously, the voltage levels in such cases are even higher, as may be the amperage and risk of electrocution.
Serious levels of stray voltage can cause effects similar to other forms of electronic targeting, and may indeed be augmenting such targeting from other sources. In point of fact, especially for persons who also suffer electro-sensitivity, there is a small chance that some persons who see themselves as being a TI may in fact not be. Accidental, or even natural stray voltage might be causing enough symptoms of targeting, by itself, to erroneously presume targeting. This would be good news if the individual is not also experiencing non electronic targeting symptoms, such as organized stalking, or other forms of harassment.
Electronic targeting symptoms are radiographic in nature (radio and electromagnetic), and therefore, stray voltage symptoms, would typically be some combination of any number of things which match those same symptoms. The range of symptoms is broad, from headaches, nausea, dizziness, mood swings, sleep problems, sensations of burning, tingling, vibrating, tinnitus or humming sounds, as well as more unpleasant physiological symptoms such as heart palpitations, chest pains, muscle and joint pains, fibromyalgia-like conditions, twitching or trembling, and so forth. Arguably, there are other symptoms, as well, but these are the more commonly reported ones, and the easiest to identify as being abnormal. That said, the caveat is valid: don’t presume a system does not have a medical explanation; always see a Doctor (without talking about targeting) to make sure you do not have a ‘simple’ health issue in need of treatment.
In fact, stray voltage can simulate or stimulate a variety of general health problems in humans and animals, alike. When doctor’s tests find no other explanation, stray voltage (or other electronic targeting) may be to blame. Some animals are more able to sense stray voltage and will naturally avoid areas where it exists in undesirable levels; they can be ‘Bird Dogs’ to the problem by strange behaviors or health issues. High levels of stray voltage can also cause plants to die, or may result in random discharges between objects otherwise insulated. By way of example, a visible mini-lightening flash between an automobile and the ground or nearby fence or garage door frame.
The interesting thing about stray voltage is that its effects may be amplified by humidity and moisture, or even temperature. Therefore, such effects might tend to be more noticeable if walking in the rain or while wet, as when exiting the shower. Serious stray voltage could make swimming pools and standing water dangerous. But even relatively harmless but noticeable levels of stray voltage can be dangerous, because whatever is causing them could be capable of sudden and unexpected increases to dangerous levels. Take no chances, and deal with it right away, if symptoms are present. See below.
Smart Meters and stray voltage; a possible new conspiracy
A lot of people, including many TIs, feel that the entire power industry’s move to Smart Meters is a Big Brother and/or industry conspiracy. Like most good conspiracies, there are multiple theories involved, ranging from price gouging to spying to mind control, and more. But the big concern and commonality in many of these theories tends to include the very same health issues as found in stray voltage.
Yet when the industry itself, as well as third-party independent testing firms investigate, most such studies indicate smart meters are no more dangerous than your computer’s wifi connectivity. I’m quite unconvinced about their conclusions, but I also understand how conspiracies work, and how the intelligence community thinks — and specifically, how they think about and employ mind control tactics.
It dawns on me as result of the dichotomy between the reality of Smart Meter user experience and test results, that there may be a conspiratorial answer which explains the conflict. Once a Smart Meter is installed, perhaps Big Brother comes along and uses the Meter to establish stray voltage. That would account for the health effects and higher bills, and certainly still enable spying and mind control capabilities.
The simple fact is, the studies giving a clean bill of health to Smart Meters are only testing the meters and the air waves. They are not testing for stray voltage. So, if you have a Smart Meter and are experiencing Smart Meter woes, perhaps you ought to test for stray voltage. If you find it exists, you will undoubtedly be advised by a lawyer that you have an excellent actionable case against the power company.
Note: It has been discovered that the power industry, in order to address public distrust of smart meters, is instead apparently installing meters which look identical at a glance to the old mechanical meters, but which conceal a ‘trojan horse‘ Smart Meter under the skin. They are, however, supposed to be easy to spot. TAKE NO CHANCES, and check YOUR METER, today, even if an ‘opt out’ user. And, if told you were not getting a Smart Meter and discover a trojan horse, you once more have a reason to contact a lawyer, and the media.
Stray voltage as targeting weapon
Deliberately causing stray voltage as a harassment tool is not the only ‘advantage’ to perps. Because electricity can carry embedded RF signatures, it can cause an entire area, such as a home and its yard, to become a kind of transmitter of other forms of targeting signals, just as can house wiring. It can therefore become a kind of amplifier of such methods. But to employ it requires something which should ideally be relatively easy to detect, and defeat.
Simply shunting your existing AC power to ground, a deliberate ‘short,’ if you will, is NOT normally going to be done because the power bill would go up dramatically, and tip the victim off that something was amiss. Therefore, the perp would need a second electrical service on site, which means a separate meter head, which they then ‘weaponize’ for the purpose. In apartments, it might simply mean using a neighboring unit’s meter. In a home, it may mean a separate power line to a concealed meter somewhere on the property or just outside the property line. It may be an underground service, even if the property is otherwise serviced by an overhead feed.
In an apartment situation, all the meter heads for a group of units are mounted at the same location, and labeled as to address/unit. If suspicious, you can wait until a high consumption power period (i.e., using your stove to cook), and then go look at the meters. If you do this when you see signs no one is present at the suspect neighboring unit (not using their stove), but their power meter is drawing more power — you may have found proof of the method and the perp.
In the case of a single domicile, simply call the power company and ask if there is more than one meter assigned to the address, or if there is a meter or extra meter assigned to neighboring lots. If the answer is yes, ask if any extra meter is in use and being billed, or if you might be able to acquire the meter for your own use (to justify why you ask). Any extra meter may be proof of the method and, with some legal steps, lead to identifying a perp.
Proving stray voltage
To confirm any such targeting, you will need to prove stray voltage is present, the same thing which should be done if symptoms are present and targeting is not involved. There are three ways to do this. One is to call the power company, which has a legal liability to insure stray voltage does not exist, in the same manner that natural gas providers must worry about gas leaks. Another is to call an electrician. Either of these methods can also result in identifying and curing the source cause of stray voltage. It will likely be up to you to document their findings, such as with video or witnesses — though they may be willing to provide written documentation where they bear no liability risk. Again, you probably should not mention targeting concerns to these people.
The third method is less useful in terms of evidence unless you are an electrical engineer or have similar credentials validating the quality of your findings; you can obtain test equipment and test the matter yourself, again documenting every step as you go. It is not quite as simple as the illustrated image, and should involve more than one kind of instrument. The procedures will vary depending on where you need to test, and what the location is like or contains in the way of objects and surfaces. The entire property should be assessed, and if done usefully, will ‘map out’ zones of impact from high to low. More information on the ‘how’ is available online, including that link you should read after finishing this post.
Regardless of which method used, where targeting is suspected, know that the power can be turned off remotely as soon as any perps involved discover testing is about to take place. This means you will want to covertly order any such tests, and ideally, try to find a way to avoid having whomever shows up to conduct the test show up in a marked truck, and having them quickly first test somewhere out of sight from any possible perp surveillance position. THAT is the hard part. Doing that yourself is much easier, of course.
If you are a TI or suspect same, I urge all readers of this post to comment as to their findings or conclusions upon further investigation. In two and a half decades of contact with 12,000 TIs, I have only known of perhaps three or four cases where stray voltage was in any way evidenced. As result, it appears to be an entirely ‘unknown’ targeting method (assuming such was the case). I have only recently been made aware of the possibility that a power company can have two different meter heads assigned to a property under two different account names WITHOUT the property’s owner/renter’s awareness, even though BOTH are in use — by SOMEONE.
It can only serve the greater TI community to learn if this is more wide spread than thus far observed, especially given that it can be easily detected and defeated if and when in use. Ditto because of the advent of Smart Meters, in which case this new information may be a very useful weapon for use by activists against the power industry, and legal pressure (lawsuits) by user-victims. It is equally important because where targeting is not involved, education on topic may lead to resolving a potentially deadly stray voltage of less sinister origin, and address final cure to otherwise unresolvable health issues.
And, in closing, let me state it once more. Any instance of serious stray voltage, even if not related to targeting, likely represents an actionable legal issue; you should consult with a lawyer about suing the Power Company and/or whomever pays the bill on any secondary meter head causing the effect, or any otherwise weaponized meter head.
If there is one thing I’ve learned after having contact with 12,000 Targeted Individuals over some 25 years, it is that without help, they have no good chance at properly dealing with their targeting. There are many reasons self help fails, and yet the solutions are not that complex.
The TI dilemma
I have never met a long-term Targeted Individual (TI) who did not have the same generalized and massive array of problems. The easiest victims to help were those who had only recently become aware of targeting, as their problem list was much shorter, making defensive solutions easier to derive and implement. But for everyone else, the list of issues was, well, mind boggling. I would see it in the very first communication (typically email or letter). It would be as if a letter about life from Lil Abner’s (by Al Capp) character, Joe Btfsplk, who never had a good thing happen to him or anyone around him.
Note: I am no longer in a position to offer such personal helps. I do still offer a free Helps Kit by email which is useful to the TI in multiple ways, and I’ve written many how-to books on topic which are quite detailed and useful, to date still the only ones of their kind, as far as I am aware. I am still open to email contact at proparanoidgroup at gmail com, and can field simple generic questions, but I no longer engage in situational analysis and tactical advice, investigations, or direct intervention. This post is intended to help take up that slack.
That first contact would be pages long, typically, in story telling mode, and full of unhappy emotion, a hard thing to read; both in terms of eyestrain and emotional drain. Paragraph after paragraph of one problem or targeting issue after another. There would be a long list of events and suspect perps (perpetrators). It would commonly entail problems with their job, their family, their church or other membership, their neighbors, the cops, the legal system, the medical system, their financial situation, their computer security, and more, to include actual targeting symptoms impacting their health, and at times, the health of their pets and their plants.
The effects would be physiological, emotional, mental, and in some cases, impact physical objects. It must have been even harder for them to compose it, than for me to read it. Each such effect might entail a variety of individual symptoms and clues as to cause. Oddly enough, typically NON OF IT IS USEFUL in providing helps. Their valiant and painful plea for help ends up being little more than an exhaustive rant in terms of value in a practical investigative analysis. The ONLY way to tackle targeting usefully, either as a helper or as a victim, is to start completely over, which is why the Helps Kit was evolved; it started over in a way which simplifies, organizes, and quantifies useful information.
A Detective investigating a crime does not want to hear the long drawn out account of the victim up front. They start with a GENERIC description of the nature of the crime from the Cop on the scene (who did get that account from the victim), and then they INTERVIEW the victim with SPECIFIC simple questions aimed at nibbling away at facts in order to find the ones which represent CLUES. “What did you see? What was said?” and so forth, each question hopefully suggesting another. They then use the answers to solve the crime. A good model for helpers and TIs, alike. A flood of data drowns the truth, but point-by-point realizations build toward it.
There is another problem. While their described symptom or effect may perfectly match a known Political Control Technology (PCT) or method, it is also absolutely true that each and every example could also be due to a natural medical situation, or have a simple but yet as unknown social, or financial cause. Since authorities and professionals who are the natural ‘go to’ for help prefer not to believe in the Boogey Man, the assumption is always that a natural cause is to blame. A wise TI would do the same, seeking to eliminate any such possibility.
Failing the wisdom creates more problems for the TI, even when the go-to helper cannot find the natural cause or address it, because it is next easiest to blame the TI for the problem, even to the point of accusing them of being a paranoiac schizophrenic; the easy out. For the record, when working long term with a TI, I will in time discover the truth, and the truth is, purely imagined targeting among those reaching out to me has proven quite the exception. But some might be delusional, of course, but I’ve also learned that persons with mental issues are often selected for targeting in training projects, so that any serious mistake by trainees will be far less likely to draw interest of authorities, who will make the assumption the whole thing was imagined.
The bigger problem
As result of all these things, a TI is faced with so many problems, and so many clues, that they can literally find themselves immobilized by confusion, unable to reason it out, or even unable to cope. And yet, there is always one more problem, far more serious than the rest: they do not understand the truth of their targeting situation. I’ve never known a long term TI who did not have a false belief as to the nature, cause, purpose, source, and method of their targeting. This is by design, a primary goal of targeting; to create a false belief structure which makes it impossible to defend against, because defenses will be aimed at the wrong problem.
This further makes easier another primary goal, to make the victim seem crazy, either by their reactions being seen as paranoiac, or by telling others things deemed insanely impossible. But to underscore, the biggest problem is that their defenses will not meet the need, resulting in failure and frustration, a tool for their tormentors. So, finally, they come to me in a desperate state, not just in terms of needing help, but in terms of simply needing someone to listen to them and actually believe their story.
No one should presume a TI’s story to be imagined or fake, though it is true there are some who pretend for ulterior motives. In time, the truth will out. But because of their failure to truly understand the nature of their targeting, they might have been led to believe almost any untrue thing which cannot be seen as rational. For instance, one victim (who was schizophrenic, as well) believed they were beset by Alien vampires. In truth, the targeting was evolved against the person because they had discovered a firm involved in illegal dumping of biohazard materials, and to insure that her story was not believed by authorities, they led her to so believe. They relied on her schizophrenia to protect them from discovery both as perps inflicting mind control, but as criminals violating Federal law. The schizophrenia, itself, made that easier to accomplish.
How to eat an Elephant
The old saying is, one bite at a time. Here are the bites, a series of axiomatic advice points presented in a somewhat stepwise manner, the same things I would normally work through with every client. Remember, only you can decide any risks involved, and take the wisest course of actions based upon those perceived risks. This is merely a guideline of what has worked well in the past, and is generic in nature…
- Acknowledge your belief structure has been manipulated and you do not likely truly know the who, what, why, and how of things; you have been deliberately mislead. Following this guideline should help address that flaw, but only if you remain open to the possibility. Educate yourself about PCT and know your enemy, and always seek and eliminate any possible alternative explanations — but also keep in mind the pitfall cited at this post’s end;
- Be wary of professionals which we should otherwise rely upon, such as doctors, lawyers, dentists, and private investigators. Most will either walk away or take advantage of you on the assumption you are crazy, or worse, seek to have you evaluated by mental health professionals. The best strategy regarding that, is to seek an evaluation on your own: a written clean bill of mental health can be a wonderful defense if eventually accused of being delusional, even if by authorities. If you must find a professional, including a therapist, your best bet is to go to a city at least 50 miles away, and find a relatively recent graduate (i.e., a lawyer new to the Bar), of some minority race. They are likely to be hungrier for work, and more anxious to do a good job, and less likely to have had their morals corrupted over time by the industry. Avoid saying you are targeted, just tell them your concern and enough facts to get their interest. Answer their questions, but where a question requires an answer which gets into targeting details, give the details, and offer no presumption of cause, even if asked. Let THEM make that conclusion on their own, or not — it should not change how they perform for you;
- Cops, on the other hand, will either instantly so peg hole you, or worse, turn out to be in place assets working with the enemy against you. If you MUST do so (as in reporting a crime), or if you choose to become a TI activist or otherwise ‘go public’ (includes any Web presence), follow the advice found here;
- Start and maintain an event log. Use a voice activated (VOX) recorder kept on your person to make verbal notes describing questionable events, suspect persons, vehicles, etc. Leave it on to capture events directly, automatically. Transfer this at days end using headphones, to a computer spreadsheet or database file. It should include Time, Date, Location, Description, Details, and your emotional or intuitive thoughts at the time as to what it might mean. Compare new events of the day with older events, looking for patterns, frequent appearances of the same person, vehicle, etc. With respect to persons, give them a ‘code name’ based on their appearance or behavior until able to acquire their actual name. For vehicles, do get plate numbers, but since plates can be replaced or stolen, also note vehicle damage, stickers or decals, and the like. This will help you get closer to the truth of your targeting, and may be useful as evidence at some point;
- Remember that if you have a pattern in your life (such as going to work the same general time of day along a given route), so do others. Do not be concerned in such routines to see others around you repeatedly, because other people also have routines which may overlap with yours. DO be concerned if seeing the same person/vehicle at disparate locations and times when out of routine, and especially if also noted while in routine;
- Establish site security at home, and to the extent possible, work. My book, The Professional Paranoid will help, but in general, you need to insure no door, window, or opening can be accessed from the outside, even with a key, without breaking and entering. Perps don’t like to do that, because it leaves proof you are not imagining things. The only entrance that should be key accessible, should be via a pick proof deadbolt lock. Put one on your garage door, as well. If you can, install security lighting and a video monitoring system. Protect rooms and entrances or items with simple alarms, and employ and document any trip traps you set per the instructions in my book;
- Establish computer security AFTER site security. Backup all files, wipe the hard drive, reformat, reinstall OS, set new password, reinstall apps, restore files. Discard wireless keyboard. Disconnect from Internet. Buy cheap used iMac and set it up to be a local server, connect it to the Internet with Web sharing turned on, connect your main computer to it. Download a Web security monitoring utility to run continuously on the Mac, check it daily. Reset your router/modem to factory specs, install new password. Repeat this process and reset and all passwords regularly, do not use same PW for all. Consider to join the Free Will Society, a closed Facebook Group I maintain (application is via the Helps Kit mentioned in the Note near page top), or any of the many public TI Groups on FB (I am member of many);
- Improve personal security, starting with phone. NO CELL PHONE IS YOUR FRIEND. Keep it in a foil pouch, turned off when not in use. Where that is not practical, remove battery and install only to check for calls to make calls, or other use. If a smart phone, there are a number of apps I suggest you install. Mobile Justice from ACLU; an aircraft tracker that sees transponders; Spectrum Analyzer and/or EMF Detector; RSOE EDIS notifier; iTriage health advisor. You MUST disengage certain features. Cary a camera ready to go (not cell phone) and voice activated recorder to document events. More advice in my book, including land lines and general bug detection;
- While observing (3,4), avoid trying to deal with the sum total of the problem. It becomes a matter of ‘too many clues,’ per the introduction of this post. Instead, choose any ONE. Then review all others for any which seem related, aligned, supportive, or opposing, and set them aside for study as a subset. Analyze these, alone, formulate a means to prove or disprove each clue, and based on those results, validate, reject, or find the subset unresolvable, and move on to the next subset;
- You MUST presume any physiological symptoms are potentially actual health issues and seek a Doctor’s advice. When doing so, do NOT mention targeting, but it is OK to mention external symptoms (pets, plants, etc.) as might possibly be related. Pursue any suggested treatments until no treatment proves useful. ONLY THEN will you know the truth, and be closer to true understanding of your targeting, andy you may actually improve or cure actual health problems as well. Along these lines, anything you can do to impact your physical, mental, and psychological well being is to your good — become a health nut and try everything that claims a benefit, as everyone’s situation and physiology is different, but products seldom attempt claims of addressing targeting effects; you won’t know until you try it — but try only one new thing at a time, or you won’t know which is responsible for good outcome;
- Deal with Gangstalking. Very simple. Ignore it. It is only there to jerk your chain, and that only happens if you allow it to happen. You can choose not to be upset, worried, etc. Document it, yes, but laugh at it and them for wasting their time and money. This is simple in concept, and yet hard to do because of human nature. Stop, Think Act, practice, practice, practice;
- My book MC Realities offers a very good review of how to detect, identify, and deal with PCT. Once a better understanding is obtained from he previous steps, you can start to defend yourself more usefully with these trial and error methods, which should give you some good specific truths about your targeting. In general, we worry about implants, which can include voice to skull (V2S), Directed Energy Weapons (DEW) which cause physical harms, mood/sleep control; and other electronic tech which can also account for V2S. The precise defensive/offensive tactics will vary to type and specifics. Shielding is almost always the best defense, but there are so many factors that the easiest thing to do is to shield an entire room for a few hundred dollars, but other methods should be tried first, as that is where the targeting truths can be learned. Where there are problems still encountered, feel free to contact me;
- If your targeting involves pain inducement DEW, or you have actual medical conditions which cause pain, ask me for my Jedi Mind Trick, the best way to describe a method I have developed which allows one to mask pain with nothing more than the power of their mind. It is difficult to master and requires practice, but once mastered, it is easy to apply, and for some users, it can also turn your body into an EMF meter for advanced warnings of attacks, and has application to general problem solving, including the issue of true understanding of the targeting’s nature. I use it to eliminate pain from toothaches (a Molar who’s roots were growing through my gums, into my mouth, and into my cheek), burns, fibromyalgia, and even tinnitus, and I can use my hands to find power lines in walls, as well as microwave and EMF sources. Demonstrated it many times;
- Once defensive efforts are well in hand, there may be some significant offensive opportunities. These are outlined in my books. Should you think any are appropriate, feel free to run your ideas about implementation by me for fine tuning or other commentary;
- As a rule, a TI has no concrete knowledge of the reason why they are targeted. Exceptions tend to be incorrect, as earlier mentioned. Knowing the who and why us the key-most truth, as it can sometimes lead to establishing a blackmail insurance policy. This key can sometimes be discovered in memories. Go back in time in your mind to a point roughly six months to a year prior to first noticing your targeting. You would be looking for some odd or unusual event or thing overheard or seen. It might be an argument or a document or a conversation which, at the time, did not make much sense to you, but stood out as unusual in some way. Almost always, it is a work related memory, especially if your work had some relationship to government, intellectual property, high finance, or high profile legal matters; the sort of place where conspiracies and dark crimes might hatch, take place, or be evidenced. Should you find such a memory, contact me for general advice on how to verify its usefulness and take advantage of it;
- Where defense cannot be well achieved or maintained, relocation can typically buy several weeks to months of temporary relief. Often, simply going mobile can offer at least partial, if not full relief for a time, especially when not in your own vehicle, and leaving behind all personal possessions (new clothes, luggage, etc.) and taking no phone, NOT CALLING ANYONE, visiting online accounts, or purchasing anything on a card. For a more permanent solution, consider residency at Free Will Haven, a targeting-free self-sufficient and low-cost intentional community project of the Free Will Society, which is based on tiny homes living. I myself have been living quite comfortably in about 120 square feet (excessively tiny) for the last three years, and am quite content to do so, sacrificing little in the way of lifestyle, otherwise. Again, an application is contained within the Helps Kit mentioned in the Note near page top.
- Be prepared for local, regional, national, or even global social turmoil, be it disaster, civil unrest, martial law, real or false flag terrorism, revolution, race war, or political or financial upheaval. PCT has been being ramped up in terms of victim numbers (some estimates place the national number as high as 12,000,000) and individual intensity. It is my belief that the reason so many people are being targeted and the targeting is increasing, is we are heading to a crescendo designed to amplify any crisis turmoil in order to enable a shift in government form, all in the name of restoring national security and social order. Arrange to have a 90 day supply of food and emergency supplies and basic tools. Leverage your preparedness with a visit my special Facebook pages and review each post found there: the Post Apocalyptic Library of portable survival how-to knowledge; the Post Apocalyptic Local Area Defense Network, especially useful to TIs even without a crises event; and the FEMA, Martial Law, Revolution Database;
- Consider dropping off of the Grid; escape the Matrix (there is an actual matrix involved), perhaps even with a new identity. This is seldom possible while still being targeted, but the attempt, if done properly, can buy you significantly more targeting-free time before you are reacquired. This two-part post can help.
There are also some common mistakes that TIs make which can be avoided. Oddly enough, almost every TI has already made them, and yet, tends to continue making them, failing to see the risk they pose until till late. Here is a summary list, but remember, there are no hard and fast rules. There can always be an exception. If you think you have encountered one, contact me for review to see if I might not agree, or why not.
- NEVER seek help from authorities or ERTs due to targeting, itself. If an actual injury or crime is involved, such as vandalism, death threat, theft, etc., by all means report it, as having it on record can be useful evidence of targeting for possible use at some future point — but do not mention targeting concerns, and once more, follow the guidelines found here. If questions are asked as to why someone might undertake an action against you, you CAN mention that there have been strange things happening and you might choose one or two examples, if asked to cite them, but state you have no understanding as to why anyone would do so, and that you have no suspects (even if you do). The last thing you want is an investigation which concludes you are mental, which is where it almost always will end up going the moment you deviate. It may be wise to apply this rule to friends and family, and certainly to co workers, as you can end up destroying relationships with disclosure. The only exception should likely be limited to those living with you, and even then, you will pay a price. I lost a wife and a foster daughter to it, and possibly another daughter;
- NEVER react to targeting stimuli if you can avoid it. Train yourself to Stop, Think, and ACT, do not REACT. You, STOP yourself from reacting, THINK about what they are trying to cause you to do (i.e., get angry), and the ACT contrary to that in some random manner. This both negates the purpose of the targeting, and causes perps all manner of concern, either about the validity of the psychological profile they had prepared on you in order to determine the best targeting methodology, or the operational reliability or skill of any equipment or perps involved. This can at times lead to dramatic increases in targeting efforts, but if you continue the ploy, it will lead to them trying to ‘repair’ whatever problem they think is the cause. That typically results in a small rest period of no attacks. Eventually, it can destroy the effort entirely, especially if this method is applied by someone in early targeting, as it prevents them from advancing to other kinds of targeting, or they advance and abandon the failing method(s). This, and use of the Jedi Mind Trick, and numerous blackmail insurance policies (each time I created one for a client, it protected me, as well) is how I have managed to negate nearly three decades of attempted targeting and its consequences; I do not consider myself a TI, because I keep winning;
- NEVER be overly concerned about death threats, being followed, or about gang stalking events, it will simply make you wax paranoid, and be seen as such. The people who engage in PCT would simply kill you, not threaten you, if they wanted you dead. Unless a threat was quite specific and included a warning that you should do or not do something, ‘or else’ vividly described, it has no basis in any real threat. If you get a threat with such a basis, that basis must represent a clear and present danger to THEM, in order to be valid. Telling you to stop being an activist, or stop investigating why you are being targeted, does not count, unless perhaps, you have gotten to the point where you can CLEARLY identify and prove with legally useful smoking-gun caliber evidence the who, why, when, what and who of it. In such a case, you have the makings of a blackmail insurance policy which can not only counter the threat, but force capitulation and even remuneration for your troubles at their hands. That was how I ended my first targeting, and was offered $40,000 per my demand. It has become the model for all client help efforts ever since. Being followed or gang stalked is merely a jerk-your-chain tool that goes back to Stop, Think, Act. The only real danger is in giving into it. The only targeting which is a real threat is PCT based on electronics of one kind or another, chemical or biological assaults, physical abuses (i.e., rape, beating, accessing you while you sleep), and dirty tricks which impact finances, relationships, reputation, and the like;
- NEVER presume another TI, TI activist group or organization, or general Web resource to know what they are talking about regarding PCT or solutions, for the likelihood they have it right is very low. Take it with a grain of salt, and tuck it away for comparison to other resources. Books are a far better bet at getting at the straight dope. Older books will by now have a reputation establishing usefulness. Avoid newer books or other sources by anyone claiming to be an insider, ex intelligence operative, or other ‘expert,’ as they are likely providing disinformation to insure you continue to fight the wrong problems;
- NEVER hook up with another person, especially another TI. There are many reasons this is important advice, and I assure you that the risks you undertake with even a casual date or one night stand is significant. I see it play out again and again. Rare is the TI that can better their circumstance by not living alone, and a sexual adventure is far too easily a set up opportunity of one kind or another;
- NEVER pay money to anyone offering implant scans, ‘scientific’ testing, or new age solutions without EXTREME CARE; it is likely a scam, even if there are YouTubes or personal testimonies, the likelihood remains high. Research, research, research. Even if you actually did locate an implant by some method, the number of people able to have an implant removed can be counted on one hand; the medical industry will not cooperate. I have yet to see any positive results from testing services or new age approaches, but if you want to submit a chemical sample to an actual laboratory for chemical or spectrum analysis to find out what it is, that is worth the time and money;
- Avoid participating in poorly conceived TI activist efforts to outreach, or outreaching directly yourself. By poorly conceived, I mean an effort which does not heed the advice employed here. At best, such efforts defame and set back the TI movement and each person associated with it, labeling them as mental. Many of these efforts are designed and promoted by perps, and used as a kind of ‘evaluation survey,’ especially those asking you provide personal histories or statements. If legitimate, such statements will tend to seem crazy to anyone not already believing that targeting is real — adding another ‘crazy story’ to a stack of them will not change their minds.
Other facts to consider
The following may temper your views in seeking full understanding and formulating defenses. Simply keep them in mind when reasoning things through.
- Many perps are themselves victims of mind control, typically the worst kind, the Monarch/MK Ultra kind. They know not what they do, literally; they are programmable people based on multiple personalities which can be triggered at will. While some perps are psychopaths, these, are not, though they my be controlled to exhibit the same behavioral traits;
- You may be such a programmable person, yourself, and like them, not be aware. If such a person, and also targeted, you represent some form of ‘failure’ in the programming, and the targeting is designed to neutralize any damage you might cause to the program if you become fully aware of your true situation, which is a real possibility as you work through understanding and defensive efforts. The important and terrible truth is, that such a person will sabotage their own daily efforts in this regard, and make no progress whatsoever. Such a person will likely exhibit many additional symptoms as found in my book, MC Realities. Most notable among these is a question or belief they were targeted or abused as a child, or themselves have abuser thoughts or have so abused. Should you come to suspect you are a programmable, you should contact me for special advice too complex for this forum;
- All PCT is Satanic in nature, origin, and intent. Your enemy is as forecast: Powers and Principalities, and there is scientific proof available. Therefore, your best ally is religious faith, and the best faith for the purpose is Christianity, and the best Christian Church (because it is acknowledged to hold closest to God’s Word in the original Greek and Hebrew translations) is the Wisconsin Synod of the Lutheran Church. There is a whole chapter in my book, MC Realities, which explains exactly why this is true in both practical and Biblical terms;
- You will hear it said all the time, that TIs fear they are being murdered, or that they have been murdered. THERE HAS NEVER been such a case. Being a TI can certainly mean to be suffering in great pain, and it may certainly to some, at times feel like it has the potential to kill. But thus far, the only known deaths of TIs have been from suicides or accidents, or natural causes such as old age or disease, according to official records. While it is true that there are ways to fake such deaths and such ways are known by our enemies… and it is true that some potentially deadly illnesses such as cancer may be caused by targeting… death is NEVER the goal. They invest perhaps a quarter-million dollars a month on a full-time TI. There is no point in killing off such an investment. So the only deaths which bother me are the suicides, because that kills not just the person, but effectively the soul, as that is the only unforgivable sin; a sin against the Holy Ghost. If you give in to it, you are surrendering to your enemy, Satan, not just the perps. I am in communication with literally dozens of persons who have professed to have been being murdered as far back as 1992 or so, and they are STILL HERE, some of them still making the claim from time to time. Only two out of 12,000 are known to have died, one of old age and disease, and the other in a traffic incident;
- There is no place one can go where targeting is not likely to follow within weeks to months, save one or two foreign countries. The only one of these that has been verified by multiple TIs, is Ecuador, which to me does not make sense, but it seems to be true, with three such instances reported to me personally from TIs I had vetted as legitimate TIs.
What will happen if a natural disaster or social upheaval comes and government cannot, or will not be able to defend you, your home, or your community? When armed marauders or looters come, will you stand alone, or will you have your own local network of helpers: Paladins?
What is a Paladin?
“Paladin” is another word for Knight, a kind of soldier of good moral character who in times of Olde served his fellow knights, community, country, and God. P.A.L.A.D.I.N. members are similar, and yet different. They are somewhat modeled after the Paladins in the popular Fallout computer game series, but THIS IS NO GAME. Fallout takes place in a future post apocalyptic World where there is no government, and everyone is struggling to survive, which literally means at times, kill or be killed, perhaps even eaten by others. Several groups compete for control with lust for power as their agenda, but the Paladins were formed in an attempt to maintain order and protect against such threats — a bit like self-organized Police the people come to rely upon.
Almost no one is truly prepared for disaster or civil upheaval. When it strikes, the impact of the disaster is therefore nearly total. All one has to do is look back on Katrina, or any other major disaster or upheaval around the World where local governments were unable or unwilling to respond — to see the value in not having to stand alone in a crises. FEMA and other government ‘help’ in Katrina was less than ‘useless’ for an extended period of time, actually causing more harm than good in many cases. Local law enforcement was either unavailable or, at times, a serious threat to many a resident’s well being. Likewise for the National Guard.
In such events, local governments at any level collapse and become non existent in domino fashion, while regional and national governments play political waiting games. The following is a quote from From Disaster to Lessons Learned: What Went Wrong in the Response to Hurricane Katrina?The Dissolution of Government
As noted earlier, disaster response in the U.S. is predicated on a system of “cascading failure,” in which successively higher levels of government are called in as lower levels are overwhelmed. However, the system requires some government to be in place. When the storm hit, local government in New Orleans, for all intents and purposes, ceased to exist. Both politicians and administrators had evacuated prior to landfall, and what little structure was in place was immediately rendered ineffective. The severity of the disaster also paralyzed state government and stunned federal government officials. A period of many hours passed before coherent calls for help began to travel up and down the system; even then, they were generally unfocused and nonspecific. Mayor Nagin’s media appeals for the federal government to “send everything” were heartfelt, but were so general they were difficult to act upon.
Meanwhile, at higher levels of government, a political showdown was brewing between the White House and Gov. Kathleen Blanco of Louisiana. Louisiana’s National Guard was heavily deployed to Iraq at the time of the storm, and the governor had activated pre-existing agreements with other states to “borrow” National Guard troops prior to landfall. These troops were quickly moved to the area, but the White House wanted to federalize the troops, while Gov. Blanco wanted to keep them under state control. The White House also disputed the timing of the governor’s request to release active-duty military troops into the area, although later evidence showed that the request had come much earlier than initial White House claims.
Even once on site, FEMA and National Guard, et. al., cannot be everywhere at once, and they cannot solve all the problems and threats people face. In some cases, policy or needs dictates result in harm to individual residents, mostly unintentional, but at times, intentional. In the end, almost everyone needs to fend for themselves for a protracted period of time, and that often means defending themselves from each other, or facing general extreme hardships or death, alone.
In Katrina, nearly 2,000 died, and many died at the hands of others (including authorities who opened fire on crowds trying to escape across a bridge). There were, in addition to looters and aggressive authorities, at least one known roving gang of vigilante Whites who had set about to kill Blacks they deemed looters, ‘loosely defined.’ The true number of murders is unknown; few records were kept given the mass casualties, but ‘bullet riddled corpses’ were not hard to find. Where there is no law, lawlessness ensues.
Bad things happen
Disasters are all too common, some worse than others. But imagine an outright siege caused by insurgents, racial violence of the sort this country has recently seen, or even military invasion such as foreseen in Operation Lion Dance; where Chinese flood into America via the Canamex rail system, hiding in container cars which can be parked on any rail siding in America from a laptop. Or perhaps it is simple revolution or civil war born of irreconcilable political differences. There are many such threats, none of which are especially likely, but all of which are specifically possible.
P.A.L.A.D.I.N. stands for Post Apocalyptic Local Area Defense Information Network; the core organization. Do not let the gloomy sounding name deter or fool you. While it certainly could be a possibility that doom and gloom awaits us on a regional, national, or global scale (it is after all forecast by virtually every religion and many experts in military, financial, and political circles), any simple disaster or localized upheaval can result in a crisis government is unable or unwilling to address quickly. It is even possible, some believe, that government might become the cause or actual threat themselves, such as in a military coup. But if having Paladins available to help you fend off a crises in a post apocalyptic tragedy, how much better then that they could be available in a lesser threat, such as a killer quake or storm?
Here are just a few such threats — do you have everything in place to survive? Will you, alone, be able to defend them from those who do not? Or will you be waiting for government to get around to attempting to rescue you, not as a soul in need of help, but a mere politically acceptable (expendable) statistic should they fail?• Sudden Poll Shift — a sudden shift could melt the ice caps and cause serious globally felt quakes • Sudden Ice Age or Ice Cap Melt — choose your favorite scientist and worry with them • Super Volcano — doomsday shroud encircles the planet killing all crops, causing ice age • Super Earthquake — hundreds of thousands or even millions could be homeless and helpless • Asteroid Strike — we’ve already had nearly a half-dozen near misses in the last twenty years • EMP Attack — total loss of all things electric, throwing us into pre industrial age • Solar CME Flare — same as EMP attack, but potentially global in impact • Planet X — we know it’s coming soon, its effects upon Earth could be catastrophic • Nuclear or Bio Terrorism — could render an entire region helpless • Pandemic — we keep coming close to having one, it’s only a matter of time • Financial Collapse — what happens when money has no value or is unavailable? • Civil Insurrection — race war, revolution, response to Martial Law, gun seizure • Military Coup — a top U.S. General has forecast it possible • War or Nuclear War — no nation is immune from invasion or sneak attack • Alien Threat — leaders of several nations and scientists have said it possible • Prophetic End Times Tribulation — seven years a mix of the above, or worse
The P.A.L.A.D.I.N. concept is simple, and addresses an important question: is it better to stand alone trying to protect your home and family against armed marauders or other dangers seeking to take what you need to survive from you, even your very lives… or to be prepared? Prepare a go bag and survival supplies, by all means, but to become a Paladin is to pre establish a local mutual defense network which can protect you and yours, your fellow Paladins, your community, and by extension, your country and way of life. P.A.L.A.D.I.N. is a non militia solution that can effectively become functional equivalent of a small and focused militia — on demand. It does not suffer the overhead and commitment of a militia, nor the political tainting.
Paladins may also elect to engage in general humanitarian missions at any time, for any reason or cause; actively active activists. This includes the possibility of providing aid to stalking victims, the homeless, or anyone being unfairly treated by another group in some way which cannot be well addressed by local authorities. It can even mean choosing to side with civilians against authorities in a non violent protest; whatever the Unit deems appropriate. Were I a Paladin near to the tribal protests in the Dakotas over the oil pipelines, I would have urged my Unit to give on-site support, for instance.
Everyone should join!
Anyone who has much to loose if accosted by armed strangers in a crises should join. Stalking victims and other persons who have experienced unusual targeting should definitely become a Paladin. This will enable you to call upon other Paladins when threats return, and help to document, prosecute, or thwart such targeting. Activists should join Paladin, as it becomes a tool useful in a cause, where you can make good argument to fellow Paladins to engage with you — and enables protection should those opposed to your cause elect illegal harassment campaigns against you (target you). Minorities and others who are consistent victims of gang harassments should also join, as it provides yet one more ally and strengthens your ability to stand against aggression, especially in rioting. Ex military should definitely join as an alternative to a Militia, which often has a bad PR image due to a political or religious bent they may have assumed. All are welcome.
To be a Paladin does not require ownership of a gun, but it is ideal. To own a gun does not require good training or a military background, but it is ideal. Weaponry and combat skills are only important WTSHTF big time, and most gun owners do know how to handle themselves, and they also tend to own more than one weapon, which means that in a pinch, they can share, teach, and lead. The primary requirement is to be of good moral character and to care about your family, your community, and your country. The rest will take care of itself; unity is the key factor.
P.A.L.A.D.I.N. Units of 6 or more Paladins are formed in any given Zip Code once at least half of the members do have arms, and at least one of them has some military or leadership background suitable for acting as Commander. Such leaders are provided with tactical advice on formation and operation of their Unit, and given contact information for any adjacent Units. Paladins can then call upon each other to request aid, or to propose missions to aid others. There are provisions in the formation of Units which allows local Units to join up for improved functionality, and for like hookup with Units in other communities, should regional operations be necessary.
Membership is by default anonymous except between Unit members and adjacent Unit Commanders, but that does not mean members must remain secret. Indeed, public evangelism and recruitment is encouraged (promotional materials will be made available). There is no membership fee to join. However, once a Unit is formed, a small annual membership fee determined by the Unit can be assessed to help fund missions or enhance emergency response capabilities. There can be some small personal expense in order to facilitate Unit functionality, such as the purchase of a Walkie Talkie by each member.
Each Unit is autonomous and stands alone in responsibility; it is not a political body or under the command of a national head, such as myself, even as founder. Therefore, there is no legal liability or risk except for those actions the Unit itself elects to undertake. I am not bound by your actions, nor are yours dictated or bound by mine. You serve only your own Unit member’s best interests and mission goals for public good, and remain subject to all laws in the doing, each member insuring the next does nothing which threatens Unit integrity or viability.
There is no political leaning or bent, nothing which should alarm authorities. In fact, Units should consider making themselves available as volunteers to authorities as emergency helpers or, where law enforcement has such programs, reserve deputies. In such a case, each member is free to participate or abstain, which is generally true in all missions. Units should be prepared to submit to lawful military or law enforcement once order is restored in a crisis, and should maintain records of all actions for use by any needed law enforcement investigations after the fact. That serves both as protection for the Unit and members, as well as a means to prosecute evil doers who may have been confronted by the Unit. Everything is above board and transparent within the Unit, and as private or as public as the Unit itself elects.
TO JOIN: simply email your interest to join to proparanoidgroup at gmail com and provide your City, State, and Zip. This does not obligate you to anything. This will be used to update a database of members maintained anonymously at my Facebook page for the purpose. That page is organized in a way which allows determining if a Unit can yet be formed in a given Zip — your evangelism in recruiting other members is key to that eventuality.
Once a Unit can be formed, members are so advised and connected to one another for the purpose of determining if they should form, and if forming, deciding who will be their Commander. They are also provided with additional support advice on how best to proceed as a functioning unit. Once forming, individual members are then obligated only to commit to the goals established by the Unit for mutual self defense and whatever additional good they may do for community and beyond, in or out of crisis (missions.) Risk and investment are minimal. Rewards can include the possibility of continued life, liberty, and pursuit of happiness — in the face of dire circumstances bent on preventing same.
Other material to consider
The Post Apocalyptic Library is an important collection of life-saving information commonly beyond the average person’s current knowledge base, and which will NOT BE AVAILABLE once disaster strikes. It is a series of links to critical information which can be learned online or downloaded and printed for placement in a go bag or emergency supplies for later use. It is advised that extra copies should be made in advance for handout to others.
The FEMA, Martial Law, and Revolution Database is a collection of materials which seek to educate the public about individual risks and likelihood of events beyond their control, and/or give advice on how best to survive or react. It is an eye opening review of little known facts which may prove quite sobering. Don’t be yet another Sheeple caught totally unaware.
Dropping off the Grid: abandon the Control Matrix. This author has done so for the last three years, and though living a rather spartan life by comparison to what came before, the freedom is enhanced, and the quality of life (happiness) with it. Living simply has proven to be more satisfying — and should be much safer in the event of major troubles. Here is a snapshot of possibilities. I will soon be offering a Seminar or other promotional venue (i.e., video) on the topic.
An Intentional Community is one way to live off the Grid. Here is one example, a low-cost, self-sufficient community based on tiny homes, a project of the Free Will Society I founded to helped stalking victims: it is called Free Will Haven. It has a gofundme. Such a community is by default more or less the functional equivalent of Paladins.
After working with over 12,000 persons coming forward for help with targeting over the last two plus decades, I’ve learned a good deal more than just found in my earlier books. There has never been a Targeted Individual who has not been accused of schizophrenia. While that can be true, it is often not true, and even when true, targeting may also exist. The issue must be dealt with head on, and with care, lest it become a stumbling block beyond cure.
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
• there are good and bad ways of addressing the problem.
First impressions DON’T count
When I’m first contacted by stalking victims for help as online consultant, the stories told me tend to border on what people unfamiliar with the subject would think impossible. The ‘natural’ conclusion, especially for professionals in health care, law enforcement, or governmental authorities such a person might turn to for help with their enemy and/or suffering… is that the person is suffering something in the realm of paranoia or schizophrenia. That is not always wise, but unfortunately, it is quite unavoidable, and for two reasons.
The first is that the symptoms of targeting are by and large identical to those of schizophrenic episodes. Hearing voices or seeing things no one else does are perhaps the most well known examples, all things that can be simulated with advanced electronics; voice to skull can be achieved by multiple methods; Sound Canons and other tricks can create otherwise unbelievable visual aberrations. But also, the general belief of claim that people are following, spying, or threatening, especially in numbers, is seen as a symptom. Enter gang stalking methodologies.
The second reason is less coincidental. People simply don’t want to believe in the Boogeyman, especially officials and other professionals, because trying to deal with something they can’t see evidence of being true is beyond them. That is their failing, often a thing wrongly taught them in their training. Often, that training was crafted by people who helped develop targeting methodology, former CIA mind control scientists. This has been well documented in many books, some of which were written by retired CIA types, and as referenced in my own book on topic, MC Realities.
This is especially true of the DSM series of mental health manuals, because at one time and even currently in some cases, the history of heads of collegiate psychiatric departments and EVERY professional association to which a psychiatric professional could be member… as well as Industry watch dog or promotional organizations… can be traced back to the original CIA mind Control Experiments as CIA employed researchers. As they die off, new ones are recruited, and the false narrative… a ‘lunacy’ about lunacy, goes on.
When Congress investigated CIA (and other agencies) in the Church and Rockefeller Committee hearings in the 1970s, CIA officially (claimed*) they had already shut down such programs because (they claimed*) they did not work. They then quickly scattered the CIA scientists involved to form three kinds of groups:
a) institutional and professional groups which insisted MC did not exist, did not work, and that anyone thinking otherwise was mentally ill or, in the case of professionals, guilty of malfeasance or malpractice;
b) like groups which pretended to seek and ‘help’ victims of MC; and
c) into key positions of power and authority within the psychiatric professional associations (all of them), and collegiate Psych departments, where they not only taught the preferred view about mind control, but also helped to write the DSM series of ‘bibles’ used by shrinks in diagnosis/treatment.
Ironically, the most notorious of group (b), above, was the Cult Awareness Network; CAN, which was consistently called upon by government to help ‘resolve’ crisis arising involving the so-called ‘suicide cults.’ CAN has since taken over and operated by the Church of Scientology, seen by many as a mind control cult in its own right. This was a favorite area of CIA mind control experimentation, trying to find ways to get large numbers of people to kill themselves as a collective. Read Psychic Dictatorship in the U.S.A., by Alex Constantine, for a long list of such experiments. Alex, by the way, was targeted for his writings, and went into hiding for a time. The other purpose of group (b) is to recapture persons who may have escaped mind control projects or who, due to mental issues, may become good subjects as training fodder, and brought into such projects.
What makes it ironic is that CAN advice and helps (pre Scientology) consistently resulted in the mass deaths of those being helped, examples being WACO and JONESTOWN. In both cases, the CIA plants within the groups ‘miraculously,’ managed to survive unharmed, and quite by ‘coincidence,’ the leaders and core members of those groups had previously been in spheres of influence of MC scientists in group (c), above. More could be said about such things, and have been, in MC Realities, Alex’s book, and others. But starker proofs such claims are false exist.
In my first book, The Professional Paranoid, I cited in the Appendix some 400 CIA fronts and influenced organizations which predominantly predated the Church/Rockefeller hearings. Almost exactly half of those had to do with Mind Control. CIA book vanished that book by buying all available copies from suppliers, having one of their own publishing fronts invest in my publisher with the proviso my book not be reprinted, and then ‘selling’ used copies for nearly ten times their face value so that people who had copies would sell theirs for a bit less… and then buying all those up, as well. It is a common CIA trick.
But my publisher was a good guy and he returned the book rights to me, something CIA had failed to think of specifying he not do. So I now effectively ‘self publish’ using print on demand for hard copy (through paranoiapublishing.com), and ebook versions directly through me (proparanoidgroup at gmail com. This makes it impossible to book vanish. Subsequently, in my third book in the Professional Paranoid Series, The Defensive Field Guide, I included 1,000 CIA fronts, almost all of the additions coming into existence post Church/Rockefeller hearings. Guess what? STILL — over half of them were/are involved in mind control related operations. CIA lied to Congress.
The unexpected result of my books was that they sponsored a flood of requests for help from victims of targeting. The overwhelming majority of such requests were from people suffering some form of mind control technology or methodology, most notably, organized ‘gang’ stalking, and/or Directed Energy Weapons (DEW). As result, I felt obliged to attempt to offer professional online consulting services to attempt to help such persons.
This is a very difficult thing to undertake for more reasons than just the communications issues forced by being limited to dialogs at distance without more personal on site direct involvement. While I also offered direct intervention services, they were always beyond the financial ability of the victims; mind control is never worked upon the wealthy unless they first attack and destroy the victim’s financial underpinnings.
Early on in offering such helps, and even in trying to sell my books in the first place, the issue of mental health questions loomed large due the Boogyman Disbelief Syndrome. BDS is a form of mental illness (not found in the DSM, of course) which causes professionals to ignore facts in the Congressional Record, scientific papers, patents, and books by endless authorities on topic, and insist therefore that persons claiming to be targeted are ALWAYS mentally ill, per the DSM bible they worship; they live and work as if in a cult, themselves victims of a form of mind control, the very thing they deny exists.
I have personal proofs I can speak to, as well. I ask professionals who think only schizophrenia possible to explain how it is that, with my defensive and offensive tactical advice, it is possible that some TIs have obtained the ultimate relief? By that, I mean total ending of their problem in ways which prove it was not a mental issue. The proof being in the form of paying huge sums of money by those guilty of targeting as retribution, and/or providing ‘dream jobs,’ record contracts or book deals, and so forth.
The Elephant in the room
That unhappy irony aside, Virtually ever TI, if telling their story in full, will make claims they assume to be fact which seem impossible to the listener, especially if unfamiliar with the topic. After thousands of such stories, even I can still be surprised. As stated, the natural conclusion is some form of mental defect in need of professional care. Especially if the listener is a psychiatric professional; the DSM tells them what to believe true — that schizophrenia is the only possible cause for targeting claims.
It was therefor proper that I early on advised that some form of schizophrenia or paranoiac affliction must always be considered a possibility. However, I also told clients that EVEN IF TRUE, it did NOT mean the person was not ALSO targeted, something no psychiatrist seems able to ever consider possible. In fact, that TI circumstance is actually quite common in my decades of experience of working with TIs. I therefore chose by policy to ignore any and all clues of potential mental health in any decision to proceed to offer helps. The only SAFE presumption by ANYONE professionally offering help is that targeting must be considered and investigated. To do less could leave one legally liable.
One additional reason to so proceed exists, and it is unique to true targeted persons. One of the primary goals of targeting is to reduce them to a political, social, and financial zero, and the main method employed is to make them LOOK insane, as quickly as possible. One way to do that is to mislead the victim into believing things true, which are untrue. Therefore, any general belief expressed by a TI which seems unbelievable may be explained by this fact, and is yet one more reason not to dismiss the claims as baseless; they are in fact, mere symptoms of targeting as much as of potential schizophrenia.
There are countless ways this can be done, and two key benefits are derived by the tactic. The first is that the implication of insanity is achieved, which leads to denial of helps even from loved ones. Destruction of personal relationships and other help resources is also a primary goal. The second is that the TI will end up fighting a non existent problem, and in making no headway, more quickly succumb to giving into feelings of defeat, breaking their will to resist. IT IS A TRAP, one I never allow a victim to fall into.
I have, therefore, never turned someone away regardless of how much it appeared their problem was mental. For one thing, it was quite often found true in time that persons with various mental issues were (and are) deliberately selected for targeting because of that fact, especially if the purpose of targeting is training exercises; any mistakes that might end up involving Police will be immediately dismissed on that same ‘presumptive’ basis. So it is absolutely possible that targeting and mental health issues are present in a given TI’s case.
So I always tried to early on include dialog on how to best address the possibility of schizophrenia and PROVE the answer, whatever it really was, one way or the other. If TRUE, it would be best to get treatment and resolve that issue, first. RARELY is anyone willing to take that advice; they find the prospect too scary, because of the history of psychiatry being rather prone to forced institutionalization with horrific results (as exemplified in One Flew Over the Cuckoo’s Nest). Such hesitance has not seemed to matter that much, because after working with someone for a while, I am eventually able to discern the truth for myself, and advise such help is their only chance at relief.
I will state for the record, quite contrary to DSM assertions, that about only about 1 in every 5 or 6 do suffer schizophrenia and are not truly targeted. I would then so advise, offering as many factual reasons as I hoped would be logically seen as true and valid to the client. Once in a while, they would see the truth, and act on it, but not often enough. A lesser number have been judged both schizophrenic and were also found to be targeted. The remainder were simply targeted, and merely seemed schizophrenic outwardly by third parties. They might additionally be seen as slowly being driven into a naturally resulting state of paranoiac behaviors. That is not the same as being mentally ill, certainly not the same as being schizophrenic; it is simply survival instincts gone overboard in an appropriate effort at self defense. That, I can work with on my own, and it takes no psychiatric skills, only logic.
The nature of the Elephant in the room
It is important to understand: Schizophrenia is not some shameful state of insanity such as people tend to think it. It is simply (rather overstated) a chemical imbalance in the brain which can often be addressed with drugs and good council. Yes, there are significant pitfalls in the treatment process; there is a level of quackery to the ‘science’ behind it, and that results in a hard path typically full of side effects from trying to find the right med and dose level. The patient becomes a Guinea Pig. When the ‘science’ can consider the varied physiology of individual patients and come up with the right med and dose the first time, THEN, and only then will it actually be science, IMO.
But there is a significant difference between privately seeking help and being forced into it by ‘the system.’ The latter can sometimes result in forced treatment to the point of creating a ‘cured’ human vegetable who cannot function on their own, essentially institutionalized for life. The former is considerably safer and far less likely to have an unhappy ending, the worst possible result being an unflattering written record and a period of unpleasant side effects which soon enough wear off. A good result, however, would be a written clean bill of mental health; a well deserved middle finger upraised to all who doubted.
Too, some care must be taken to insure that the meds do not lead to suicidal thoughts without care to prevent actualization; many psychotropic treatments do have such side effects upon withdrawal from use, some upon use. I know of this and other unpleasant side effects first hand, as I and several members of my family have been put on such medications, which are often used for more than mental issues.
Fortunately, there are ways to seek voluntary helps with reduced risks — but which are situation dependent and cannot therefore be well described, here. But schizophrenia can also be addressed with WILL POWER, though a rare eventuality. This is seen in the movie, A Beautiful Mind, a true story. In fact, watching it led me to develop an all new technique useful in reducing the actual effects of various targeting methods, including DEW. I’m talking about reduction of targeting effects, such as pain and manipulations of mood, alertness, and mental acuity.
They can even work with non targeting issues, such as pain reduction for toothaches, burns, Diabetes, and other cause, or even to help neutralize tinnitus (encouraging, but as yet no results against voice to skull). While simple in method, they are difficult to master; akin to trying to become a Jedi Knight in descriptive processes. But some can make them work usefully to one degree or another. This, too, is beyond the ability of this Post to well address. Anyone wanting to know more may email me at proparanoidgroup at gmail com and ask for the Jedi papers.
The good fight
I write of all this, today, because I just received an email from a Man in a distant country I had been working with for a while. He was quite adamant about his stalking, and elements of it certainly were beyond anything possible in reality. But he did have the will to brave the process of professional care and did brave the treatment trial and error, and was actually cured. He wrote to thank me and put my mind at ease, a kind consideration on his part. The transformation in his life was so significant that it was clearly evidenced in his writing style and commentary. His very personality and mental prowess was restored.
It was extremely gratifying to hear of his victory, and see him restored to a normalcy, even though I could take no credit. I wish I could get away with saying all TIs were schizophrenic, and that such treatment was the only solution (the official shrink view); it would have saved me decades of unhappy dialogs and less than perfect results. If it were true, and if victims would be willing to undergo treatment because there were no dangers in doing so, it would be a far more perfect World. But sadly, such a World view would be delusional: exactly as embraced by most professional psychiatrists, today.
I complimented him on his bravery for undertaking that hard road, and for enduring the clumsy treatment process which eventually leads to a cure, or eventually illustrates by lack of cure, that schizophrenia is not present. Getting a piece of paper from a Doctor that treatment had no effect is useful evidence to a TI. EITHER RESULT is a win win, even where actual targeting is present along with mental disorder. Where the victim can eliminate those things imagined, they can better focus on defense and attempts to prove those things which remain and are real. Perps will flee in the face of exposure. The trick is actually being in a position to confront them with that possibility, a matter which dealing only with reality can afford.
It cannot be done by struggling against imagined enemy tactics and methods, regardless of if imagined through chemical imbalance, or imagined due to deliberately fostered false clues. “A mind is a terrible thing to waste,” but that is exactly what mind control seeks to achieve. A TI must above all else, therefore, take any and ALL steps necessary to safe guard the health of their own mind. Free Will, the gift of God, is as precious as the gift of His Grace and of life, itself. These things are a TI’s best weapons of defense and offense. I have a whole chapter in my book on exactly how that is true; Religion and MC. This, too, is available as a free .pdf on request.
The right use of Free Will (righteousness = right use ness) might just include ‘willing’ one’s self to brave confrontation with that Elephant in the room. Clearly, it will involve other battles, as well. Never is it an easy path, and even where victories are gained, it is more often true than not, that total escape is not possible. Some break free, but all who properly resist can at least better their circumstances well enough that they can claim victory, and as a survivor, survive what targeting remains as more a nuisance than a life-long debilitating experience.
Is this not what someone with a physical handicap or long-term debilitating health issue must do, if to survive? Targeting is no different a thing, except that it is forced upon the TI by outside forces for evil cause, quite Satanic at its core. It is, therefore, a spiritual handicap, more than physical or mental, if rightly viewed; it is a war for the spirit and free will of the victim, that very gift from God. Therefore, God is indeed the best ally.
I hope this one example gives hope to those in dire need. That, too, would be a credit to the man who wrote me, a kind of legacy or testimony which hopefully leads others to dare to do the same. Just take care, if that includes you. The path is not easy to see, and there are brambles to each side which must be avoided. While I can no longer offer actual paid consulting services, I do remain available for guidance and providing answers to simple questions which do not involve significant situational analysis (proparanoidgroup at gmail com). I answer all inquiries in person.
If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people repeat what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What you will get by reading this post…
• Silly quotable one liners, gags, and full-on original jokes;
• witty quotable witticisms, wise sayings, criticisms, and other malarky;
• non PC quotable political snipes, barbs, and ruthless rhetoric;
• thoughtful quotable philosophical wisdoms, advice, and beatitudes.
My most popular writing today has been copied by permission on hundreds of Web sites, and reproduced in at least a half dozen books. So I know I’m quoted out there. It is even used in college courses on Political Science, Journalism, and Psychology. It’s called the 25 Rules of Disinformation, and includes not just how to spot disinfo, but how to out it and defeat the user in public or private venue.
This post is (mostly) a collection of my most popular Facebook posts. People generally like them, unless on the wrong end of the barb. Even then, the resulting dialogs have been interesting, and we tend to remain friends. But most people on Facebook do not ‘go looking’ for something to read, they let Facebook automatically send them random samplings in their ‘feed.’ It is really best to FOLLOW someone you like (also true of my blog posts); the only way to insure you see everything a given person posts (or blogs), is to follow them (subscribe — click that option now, while you are thinking about it.)
So, even if already a Facebook friend, it is highly unlikely you will have seen very many of what follows: a random grab bag of quotable material. Now, if you do actually choose to quote me, please do cite me as the source, and link either to this blog Page or the whole Site, or my Facebook page. New friends are welcome there, of course. You can quote me on that!
You May Wish to Quote Me (I do it all the time)~
If I had a dollar, or even a dime for every web page that mentioned or quoted me or my works, I’d be a millionaire: 12 million pages can’t all be wrong; people like what I say. Where else but America can you become ‘famous’ for putting your foot in your mouth on a regular basis?~
You may have noticed that I’m imminently quotable by the way I continually quote myself, because after all, “I’m imminently quotable.”~
The only good thing about putting my foot in my mouth so often is that I always know if my shoelaces are tied, or knot.~
T’was an LL Cool Day
(apologies to LL Cool J)
I saw an Armadillo while visiting Amarillo;
he sat near a willow, upon a satin pillow.
In the sun, bright yellow, this reclining fellow
seemed to be quite mellow, eating a bowl of Jello
while listening to a fellow who played a loud Cello.
Were I to say hello, I feared I must such bellow;
that seemed such a peccadillo, I ne’er met that Armadillo
If Google spies on your searches, shouldn’t their name be Goggle?
If Yahoo does, Youwho?
If Facebook tracks your info, Factlook?
If YouTube censors excessively and politically, LubeRube?
If television is propaganda, Tellyourmission?
If a newspaper is the same, Newsfaker?
If the Oval Office is a source of lies and skullduggery, the Shovel Orrafice?~
The meaning of Life? To take all gifts entrusted to you by God; Free Will, life, and the Soul which defines the inner you, and the gifts you earn through life; knowledge, talent, skills, wealth and possessions, experiences and positions… to edify yourself, edify others (family, those above you, your peers, and strangers), and above all, edify God in the doing. This is true Glory, and the source of Blessings.
To the extent you do this, you yourself fabricate that meaning. To the extent you fail to do so, you dilute or even destroy it. Any faults or failures you have along the way are challenges in learning, and otherwise non sequitur to the equation. This is true Faith, and the source of Happiness.
Don’t focus on them, learn from them, and go on. You are what you’ve been waiting for, all along. Stop looking so hard for simple answers, and stop struggling so hard against battles predestined to be won by the righteous. If God be for you, who can be against you? This is the true foundation of Peace, and the source of Strength.
The meaning of life, is YOU, and I’m glad you have friended me. As I wish for me, so I wish for you. Thank you for sharing this Sunday with me.~
Wisdom is sometimes knowing how to seem wise without anyone’s means to challenge. After struggling to the top of the mountain to ask my one-allowed question of the Guru, he preempted with an answer: “Yes, my Son,” he said, “you have at last made it to the top. Now leave me in peace.”~
I wonder if Pavlov’s Dog’s got that way eating Pavlum? Probably not, it wouldn’t make me salivate.~
You know your’e an alcoholic and an unpleasant drunk if people invite you to their parties the day after, and you are so sloshed you think you just got back from it.~
I’m sorry, but I think I misunderstood what you wanted me to consider about what you probably meant by saying what you thought I would be able to relate to as allegory to the intended thought you had in mind, but couldn’t articulate because you were afraid I would misconstrue it as something else. What were we talking about, again?~
A dirty joke is to humor in a way exactly like the Presidential election is to politics.~
Rain falls in drops because it’s happy water. When it’s mad, watch out for hail.~
Oh, old Crow, so cautious and suspicious,
not like the Goose, who’s calm with aplomb,
your caw is such an appalling loud calling,
unlike parakeets most cheerful earful,
or eagle’s shrill cry from high in the sky.
Your old black cloak does fail to evoke
the visual delight of a Parrot, so bright.
You walk with a hobble and a wobble,
where a Robin bounces and pounces,
and the Stork is stilted and often is tilted.
And though your flight is quite alright,
it’s not as stunning as a Bird, Humming.
Lacking the Hawk’s glide so full of pride,
sans any formation of Geese’ inclination,
nor is it as swift as can be a quick Swift.
Your Murder is a suspect some fear to detect,
and yet, I suspicion, it’s all mere superstition.
Yet do not away rush, my criticisms to hush:
let not any objection be seen as a rejection;
I do like you old Crow, so brag on, and crow.
To escape vile fate I must get past that damned wall;
because if staying here, I’ll not likely survive it at all.
I tried to climb upon it, up high, no good, then higher,
only to find it topped with wickedly sharp razor wire.
I tried to go around it, hoping an opening I would find,
but it surrounds me completely, and I’m trapped inside.
I tried to dig under, tunneling deep, deep underground
but impassable boulders and water did me confound.
To escape my foe I must get past that heartless wall;
I’ve no choice; to give up certainly means my downfall.
I’ve asked for help from all near who might could hear,
they refuse to give aid, yielding to their own dark fear.
I’ve prayed to God to help, to redeem and set me free,
but I’m afraid in here, even He can’t hear me or see.
Then came a gentle voice advising firmly to be still,
“I’m with you always, as is my gift of strong Free Will.
To escape your foe, you must get past that mere wall,
and there is yet one thing you’ve not tied, not at all.”
My thoughts reeled, and the answer came in a flash,
I’d not yet tried attacking head on, the wall to crash.
I gathered my courage and backed up for a good run,
and ran headlong screaming at the top of my lung.
I hit that wall with all my brute force, and hit it hard:
knocking myself unconscious right there in that yard.
To escape my foe, I’ve tried it all, to get past the evil wall;
but nothing has for me worked, no not one, nothing at all.
I awoke quite dazed, my fist clinched in pain and my rage,
the voice had not well helped me, its advice was not sage.
But regaining my feet, a white robed figure there stood tall,
amid the rubble of that same accursed, impassable wall.
“You’ve escaped your foe,” said he, “right through the wall;
not by your strength, nor luck, but that on me you did call.
The miracle you sought was within you right from the start,
your faith in me was all it took; and abiding love in your heart.
If God be for you, no man or thing against you can stand,
when you hit that wall, I was there with you, hand in hand.”
Sorry if I insult you. Being poor, I have to go for the cheap shots.~
Any man can toast his friends at the tavern. But a brave man toasts his enemies. That’s why I always carry a can of lighter fluid when I go drinking.~
I never quite chimed in with the 60’s by wearing bell bottom pants – until I got kicked in the groin.~
I’m never inclined to eat carrots. I just can’t see my way to do so.~
Linear or Columnar?
A rhythmic rhyme in a single line is often quite fine.
but most like a rhyme
to be of many a line,
or to metrically align; be symmetrically sublime,
or perhaps its just fine
to enjoy any old rhyme.
I’ll not vote for she who does cackle
when refusing a tough query to tackle.
While not happy with alternative Trump,
he’s still better than a kick in the rump.
While Dems are OK with criminal lies,
and Establishment Reps swarm like flies,
a candidate ripe for an email blackmail
risks a serious national security fail.
A lot of drinks call for two fingers of this or that liquor, so I always look for bartenders with really big hands.~
The path to illumination in the darkness is called a sidewalk.~
I do not like this Uncle Sam, I do not like the health care scam.
I do not like these dirty crooks, or how they lie and cook the books!
I do not like when Congress steals, I do not like their secret deals.
I do not like this speaker Nan, I do not like this ‘YES WE CAN’.
I do not like this spending spree, I’m smart, I know that Nothing’s Free!
I do not like their smug replies, when I complain about their lies.
I do not like this kind of hope. I do not like it. nope, nope, nope!
There are rarely times when ‘actual’ sex is as good as ‘fantasy’ sex is imagined. However, they both involve a little ‘t’ & ‘a.’~
The only ‘gun control’ I support is that question in the mind of the criminal intent on causing trouble, “Will he remain in control of his fear or temper, or will he pull the trigger.”~
If Trump is such a chump we’d rather dump,
and Uncle Bernie is ample wormy and too squirmy,
and Hillary far too shrillery under FBI drillery,
with liberally bias in the press giving truth no redress…
Does that mean Biden is bid’n his tim’n in decid’n if rid’n
White Knight like last minute to the Demo’s pandemic…
Is that how we’ll be decid’n who’s presidential presid’n?
Is that Obama’s last prick on his way out, his hat trick?
That I won’t at all be abid’n, down too far we’ve been slid’n.
Yes, wine is quite fine when you have the time, or dine,
but weed has more speed if you have the need; do proceed.
The joke for this bloke is that I cannot smoke, nor toke,
and shrink from such drink – an alchoholic’s dread; brink of stink.
Dope lacks hope that I’ll survive or cope its scope,
so here’s my fears (why I’m lacking cheers amid tears):
this guy will die having never daring a high to try.
That hex did vex untill realizing that the Rx is sex!~
Never hiss at a snake; the conversation could be deadly.~
Do you know anything of the Entymology of Entomology,
or is it to you as confusing as the synopsis of synapsis?
(What difference does it make?)
As I have previously stated,
I am quite totally devastated
not to have been reinstated.
I have frequently formulated
and as often have postulated
just why I’m not yet reinstated.
The cause, you see, is equated
with rumors and lies oft related
to prevent my being reinstated.
They shout with glee, as if elated
with prideful egos thus elevated,
for blocking my being reinstated.
They say my claims are overrated,
to a job where I ne’er participated,
and that’s why I can’t be reinstated.
If people died while I simply waited,
shown in lies and emails evaluated,
what difference to being reinstated?
My right, you see, as Royal rated
is for all to worship me unabated,
and vote to have me reinstated.
Never apologize to me for being you. Just stop it!~
Why do some of us eat the icing out of the middle of an Oreo? Where else would it be?~
I saw last night the thinnest sliver of a silver Moon,
a most pleasant crescent, present this month of June.
So thin that it did quiver and thus scant light deliver,
did I realize before my eyes it would dematerialize.
Now its gone, but before too long, watching for its rise,
to my boon: it shall return soon, as a mirror sliver Moon.
A simple rhyme takes little time,
a light banter with good cantor –
best if exquisite, expressed explicit;
easy to recall in its all and all.
In A Rush
Here”s a quick li’l poem:
done now, I’ll be goin’.
What’s wrong with the Mayor of New York, does he not know his soda ban and tax is suppressing Pop Culture?~
Unfortunately for Custer, at least 10 Little Indians never heard that song.~
Time Tells No Tales
Once upon a time? No, I’m highly suspicious.
If it only happened once, it must be fictitious,
especially if remarkably good and not malicious:
Real events repeat themselves through history,
written down in pages for study by you and me,
where learning not, we assure repeat eventuality.
Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
Your words will not sway me, no dark threats dissuade me.
Take heed, look around. Here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
No trick or lies, nor treachery will keep me from remaining free.
No unjust laws, cops or military will I respect, still shall I tarry.
Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
Surround me with vile forces, I’ll ignore their foul loud voices.
Dare attack me if you will, I’ll reply ten fold until my body’s still.
Take heed, look around: here stand I, I stand my ground.
Never again will I back away, here I stand, and here I’ll stay.
They say the Earth’s rotation is slowing down. I have a simple cure. We all get in our cars and face them West, and synchronize burning rubber.~
Status Quo: Latin for we want you to think things are equal and as they should be so you
will shut up and do what you are told.
Parity: French for we want you to think things are the same and as they should be so you
will shut up and do what you are told.
Equality: Ye olde English for we want you to think things are the same and as they should
be so you will shut up and do what you are told.
Same: what we mean when we are talking about one political party compared to another,
those people who want us to shut up and do what we are told.
I thought of a Hillaryous joke, but I don’t want to keep insulting Democrats.~
Do my witticisms impress you or simply depress you?
Do my jokes make you laugh or think me some Jackass?
Do my poems seem lyrical or are they just predictable?
Do my posts give enlightenment, or seem closer to excrement?
Do you share, like, and follow, or is our friendship just hollow?
Smart by Default
Any wisdom I have lies in taking some care
in choosing the friends with whom I will share.
If smarter than me I will make them aware:
I agree with them, and with flattering flair.
If not as smart, then will I then declare,
their inspiring thoughts lead me to dare.
A tack pins things down, while pins prick things deeply, but a prick is always tacky, hard to pin down, offending deeply.~
Time for me to post-a-joke. Invented by a stand-up comic, it’s like a Post-it Pad, without any glue to hold it together — so it’s insanely presented in unexpected ways, and it is colorless, unless fucking off color or borrows the color of a racial inference. Wait… that’s a political speech.~
I think I understand the term ‘feedback loop,’ now: GMO crops.~
Shoot first and ask questions later. It saves dialog and you don’t get ambiguous answers… if there are any answers.~
I’m the first to admit I know so much about everything,
an expert assumed, presumed, or claimed unrelenting.
In truth it seems, I know not enough on any one thing,
to avoid putting my foot in my mouth without realizing.
Your Bad, So Sad. My Bad, And Glad
If you insult me, let me be quite perfectly clear,
you’d better be right in your basis, my dear,
because logic, facts, and reason, you’ll hear,
the weapons my response will burn in your ear.
Excuse me if I’m less than politically correct,
but especially if trying to point out your defect,
you have no legal right to avoid being upset
by my Free Speech, you fucking dumb idiot.
I’m not going to post anything useful, today. I hope this heads up proves useful. Doh!~
I get rejected a lot by the ladies. I asked one gal if she would like to go out on a double date, and she said “Sure. How about Judgement Day, and the Day after.”~
Hurry, hurry, hurry! Step right up folks, and get your fresh posts, right here, right now. Only $1, five for $3, and a surprise in every one, guaranteed, or your money back. Don’t be misled by the competitor’s claims; they only post kitties and slogans, and complaints that no one comments. Hurry, hurry, hurry!~
My Prayer today, is for you. There is nothing better than other people praying for you, especially if praying WITH you. We’re not getting older, just getting closer to home! Be Still, and at peace. Now, it is true that the Lord’s Prayer is quite sufficient and complete to God, but sometimes, we feel we want to say more. That is good with God.
May I suggest the prayer below? If ye pray it as you read, it is the same as if we have done so together; Matthew 18:19 “And I tell you more: whenever two of you on earth agree about anything you pray for, it will be done for you by my Father in heaven.” All that is required is that the prayer be righteous and fitting to God’s Will, which is defined to the extent we are able to determine in his Word. If we do not vary from that, we are apt to receive that which we NEED, if not that which we THINK we need and seek by prayer (be careful what and how you ask for [it].) Begin:
Heavenly Father, thank You for each and every day; today is a Day the Lord hath made, we rejoice and are glad in it, for You have blessed us here on earth yet again. Thank You for Your tender mercies of your Grace, and the gift of life and of Free Will, which lead us through the day; may we not abuse these gifts and offend You. Thank You for giving us family and friends to share the joys and burdens of the day. I ask You to bless my family, relatives and friends and those I care deeply for, and those who are reading this right now, especially those who are suffering and in need of your intervention.
Where there is joy, give them continued joy. Where there is pain, give them peace and mercy. Where there is self-doubt or confusion, release a renewed confidence and understanding. Where there is need, fulfill their needs. Move them to study your Word, to strengthen their faith and embrace the Gospel, and to be moved thereby to spread the Word. Bless their families, homes, finances, their goings and their comings, and turn aside their enemies in forgiveness, which is to our good as well as our enemy’s good.
Above all else, may Your Will be done, in Jesus’ name,~
If Istanbul used to be Contstantinople, does that mean they got tired of constantly being in Ople, wherever that is?~
Just because I disagree with you does not mean I don’t like you. I hate everyone equally.~
A conspiracy unfolding is like a barrage of arrows in the dark. You hear evidence that something is not right, but don’t don’t get the point until it is too late. Worse, you also get the shaft.~
My mind, not very clear right now, so
writing some clever rhyming ditty? No.
But I know some of you like that stuff…
So there’s only one question:
Is this good enough?
Good example of a self-fulfilling prophesy: “I’m going to enter the hot dog eating contest.”~
It must be true that you are what you eat. I live on $3 a day in food, and one look at me and you will know, I’m a cheapskate.~
Why do they call it an aptitude test? Because if you have to take one, you are apt to detest it.~
You will note I don’t call people who don’t agree with me bad names. That’s because the bastards have thick skins.~
My computer is dying now of old age,
and while buying a new one is truly sage,
and newer models are quite all the rage,
there’s nothing but zeros on the last page
of my checkbook; no income at my age.
My mouse is destined for the round cage,
unless comes a miracle or magical Mage.
A chant can be a kind of moving song,
easily remembered for singing along.
A chant can be a loud and angry jeer,
prompting attention, worry, and fear.
A chant might be for someone; a call,
for entertainers or leaders loved by all.
A chant gives power to thought and word,
assuring its message is clearly heard.
But a chant by Monks is the best to hear,
binding us to God and drawing Him near.
If I have a Colon for which I might need a Colonoscopy, and use :s and ;s in a similar manner all the time when I write, why can’t I get a Semicolonoscopy, and save some money?~
Lately, I’ve been thinking of taking a plane somewhere to improve my sex life. It won’t matter where, I just going through TSA will do the trick.~
OK, time for me to say something funny. But that would be deja vu.~
The next time you hear some wimpy Liberal whining about some perceived micro aggression, say to them, “To quote an oft used line in The Princess Bride, my little precious Princess… ‘I do not think you know what these words mean.” Then slug them in the mouth and say, “You cannot ‘micro’ that; there would be no point.”~
Since I’m left handed, I never need a Compass; I just use my southpaw.~
Since there is no longer rule of law in this country in high places, such that no one in government is held accountable, and the very laws they write are themselves violations of law (unconstitutional), and government itself is the biggest criminal… I reserve the right to violate ANY law at ANY time for ANY reason.
My authority is the Constitution, my basis the Pursuit of Happiness declared therein, my means is Civil Disobedience, my support is the Second Amendment, my argument the First Amendment, and my goal is the Redress guaranteed therein. I rest my case, and those who choose to oppose me may rest in peace, if that be their choice. No appointment needed.~
An election process is like a stale fast-food hamburger. On the outside it looks big and besprinkled with seeds of wisdom. On the inside are secret conspiratorial sauces and lies about quality and quantity of substance, and wilted vegetable-like promises. Do you want fries with that? Cold, greasy, and slimy press coverage.~
Never wander around in the dark. That would be you watching TV ‘news.’~
When people talk about shooting at dummy targets, are they hinting at politicians?
Is that why you never see politicians at a gun shop or shooting range?~
I encourage free speech. And, I own the concession on ear plugs in the District of Columbia.~
Cat got your tongue? I don’t know how you can stand there so silently, I know I’d be screaming; that’s got to hurt like hell.~
Politically Correct is not for me, my friend,
the 1st Amendment says I’m free to offend.
My words, ideas and actions do not pretend,
that you’ve no right against them to defend;
just do so to my face with honor and it will end
with agreement or no, but still friend to friend.
Never Opt for signing a waiver,
never waiver in copping a sign;
raising up high a middle finger,
rather than your rights to resign.
Prose is prone to rhyme in a rhythm so quaint,
but to intone it sublime; a sure given it aint’
Alien observer’s notebook: Man is a lousy Plumber. He must think the Ocean is impure because he keeps trying to filter out the fish with giant mesh filters. Silly creature. When that doesn’t work, he drills holes in the Ocean floor to drain the water out.~
Someone said I might should listen to Meatloaf on CD. I don’t get it. As soon as I put a slice on the CD, it stopped sizzling and I couldn’t hear a thing.~
Does the FCC really know what they are doing? I find myself waking up to AM Radio, so I know what they mean when they say ‘Morning Radio.’ But while I can find an FM station, I can never seem to find a PM station. They need someone from the NyQuil folks to run the outfit, I think.~
The answer to the age old riddle: what came first, the Chicken, or the Egg? Answer: neither; it was the Rooster. (surely, someone else said this somewhere, sometime earlier)~
I must be a looser. There was this gal I liked who always bought fresh produce. But when I got fresh, she just slapped my face.~
To big to fail cost you and me,
for bailouts, and lost property.
To big to nail, cost prohibitively
the national debt ridiculous, be.
To big to jail cost you and me,
for hall passes for Mz Hillary.
To small to hail, just you and me,
our vote has no voice collectively.
Time to offer up a bit of wit.
Something funny to any Brit?
Are you worried just a we bit
about a future Brexit bad sit?
Afraid there’s no way out of it;
to escape a daily diet of shit,
Mushrooms often get slit and bit.
Chicken Little a warning did brae,
none believed in what he did say.
Many long years since passed away,
we still refuse to believe him today.
Yet Planet X and Wormwood obey
God’s Will and ARE heading our way.
The moral to me seems thus to say:
good Chicken Littles should now pray;
for it is written, “None knows the Day,”
I never did well in Science Class. I still don’t know the conversion factors between celsius, farenheit, and college degrees.~
Hillary avoids Potatos and Corn. She knows they have eyes and ears and might testify.~
Gmail just informed me my folder :”Hate Mail” is full. Half of it is from Democrats, and half from Republicans. The difference is, the Republicans tell me exactly why they don’t like me, and the Democrats only tell me how they feel.~
Taxes are a fiction, just as are the wages taxed; when the dollar is nothing but an I.O.U., you never really get paid, and so, you can never really be taxed or pay taxes, either. Credit and Bank Loans are a also a fiction, just as are the checks (also I.O.U.s) used in obtaining the loan or repaying it – and the bank didn’t even have the money to loan in the first place (allowed to loan up to 20 times their bank deposits). We just keep spoofing each other to solidify the illusion.~
If you still hate someone after putting yourself into their shoes… then they are obviously too tight because you are too big in your own mind for your own good, fat head.~
Be thankful I’m retired. If I was doing this full-time, I’d bore you to tears.~
Now days, the only way to achieve inner peace, is to scream at the top of your lungs for the politicians and newsmen to fucking go to hell, until they actually do.~
Dear government, and megacorps: Winning is not taking rights away with legislation or getting the contract for weapons to be used at Armageddon. These things are mutually assured destruction.~
When people say not to worry about things, “They will get better,” I think they must mean that the things that worry you will get better at doing that.~
Never take the last train from Clarksville. Its full of Monkeys.~
Open the door to news of tragedy obscene. The lunacy involved, what can it mean?
Turn on the light and survey the crime scene – see Rats scurry trying not to be seen.
Catch one, make it come squeaky clean: Federal ties found amid many lies between.
Note all such oddities you might glean, contrary to the official story quite glassine.
Compare to what others have seen, conclude just what it really all does mean.
Forget now all you once had been, you’re now a conspiracy theorist, a sin.
In case you are wondering, yes, I used to do stage comedy in talent contests. Often got a first place. That was great; being the first person put on the bus out of town, I got to choose the best seat.~
Let me apologize in advance for insulting you. I’m not going to stick around in case you start swinging.~
The Federal Gov has gotten to be such a big asshole that it doesn’t even have to fart to stink up the whole country, but it does so continuously, anyway. If Hillary is elected, she plans on feeding it beens and drinking water from Mexico, giving new meaning to when the SHTF. I’m thinking Trump is the BEANO.~
A Noun is a word that has a ROCK solid object identity.
A Proper Noun tells the actual name or title, my dear SIR, or may I call you JOHN.
A Pronoun is an Avatar stand in for IT.
An Adjective tells you a IDENTIFIABLE personality.
A Verb is a word in MOTION.
An Adverb tells you its VERY measure.
A Preposition pre positions the Noun TO Verb relation.
A Conjunction forms a junction function between word thoughts, SO don’t get confused.
A Contraction is a contracted attraction giving traction to two words as one, a marriage licensed by apostrophication, or a foreshortening of a word as a slang thang for those who were THINK’N they HADN’T the time or space for two words.~
I had a Checklist but can’t use it as I haven’t written a check since Debit Cards came out.
I had a folding Map but I can’t follow it because there is no place in my car’s dash to plug it in.
I had a Plan but I can’t follow it because the steps don’t appear on the Dance Dance Revolution pad.
I had a contract but I don’t abide by it because I already held both the first and second Parties. Sorry I didn’t invite you.
I had a Letter but Sesame Street is now on a channel I don’t get.
I had an envelope but didn’t give a lick.
I had a Folder but since I no longer need the checklist, plan, contract, letter, or envelope, I threw it away, too.~
A Conservative Politician in Office is conservative in measuring out his power to avoid angering the voter; he fears the people, where a Liberal believes that governmental power is end all-do all, and they use/abuse their power to manipulate the people by fear of government.
A Conservative Government heeds its own laws by conservative judgment, where a Liberal tends to apply grains of salt, rationalize, and bend slightly, each time taking more liberal advantage until it is in time fully lawless.
A Conservative Government writes Laws which are conservative in principles within the limitations of its Charter (The Constitution, Bill of Rights), where a Liberal (by the above means) takes liberties in lawmaking which take liberty out of the Law; they become increasingly unconstitutional and negate the Bill of Rights.
A Conservative Policy must always fit the national interest in obedience to Sovereignty and which honors the Charter, where a Liberal is interested in reformation to a new model, almost always globalist in nature (i.e., favoring United Nations, One-World Government) and is willing to sacrifice the Charter and Sovereignty for that agenda.
A Conservative Politician thinks in terms of limitations per the above, which allows personal and corporate governance to be at ‘”Liberty” to flourish and pursue happiness and wellbeing, trusting the people to seek what they will for their own good, where a Liberal thinks in terms of socialistic Agenda which stifle or suppress these things ‘for the good of the people, of whom they think cannot be trusted.’
A conservative understands that to become elected or to move legislation, there must be an accommodating compromise between the ideal and the attainable, where a Liberal will promise anything to get what they really want, or take any drastic measure to get what they want, even if it means legislation which cannot possibly achieve the stated purpose, and especially if it serves some unstated agenda per the above.~
Panic is in abundance, as is a loose tongue, when the SHTF. Calm reason and restraint is called for. Take a deep breath, grab a cold beer and reflect before commenting. But if the bullets are flying around you, SHOOT BACK AND SAVE THE DIALOG FOR LATER. That’s when you will really need that beer.~
Why do they call them a POEM when no other word quite right rhymes with poem?
Why do they call them a JOKE when the point is a hard straight poke?
Why do they call them a SONG when it’s really a sing?
Why do they call them a RIDDLE when the answer is a clue in the middle?
Why do they call them a SPEECH when it gives you the claps or makes you boo who?
Why do they call them a REport, REmark or REply when it’s actually the first time?
Why do they call them a QUESTion when instead of taking the path to the answer on your own,
you leave it to another to do?
Why do they call them a PARagraph when there’s really only one?
Why do they call them a SENTENCE
when they rarely involve a judge?
Why do they call them a STORY when they don’t have walls, cielings, or floors?
Why do they call this a POST… oh, wait, I know: because that’s what it’s as dumb as.~
Why is it that you can talk to ten strangers and 7 or more of them will believe or agree like minded if you tell them…
About a UFO you’ve seen…
About 911 as an inside job…
About Global Warming as a sham…
About CIA and the mob killing JFK…
About chemtrails vs. contrails…
About a Bilderberger NWO/Illuminati conspirators…
About mind control, gang stalking, Voice-2-Skull…
But when you talk to ten lawmakers, law keepers, medicals, or reporters about any of that… You are suddenly crazy to the point of risking forced evaluation?
Because the System and its professional armies are taught not to believe in the boogyman (who arranged for their lessons).~
The addage “Follow your dreams…” with respect to career can end terribly, UNLESS you take the RIGHT path:
1 toe in the water as a hobby… Insures you really do like it and have basic skills required.
2 build a boat taking courses in the trade, even if mail order or online. This will confirm
if you have actual talent. If not, start over w next best passion.
3 float the boat as intern. This will educate you as to the harsh realities and negatives of the
trade. Lets you confirm you like it, and regardless, gives a leg up on others for getting the job.
4 if you get this far, set sail as employee, setting aside savings. You WILL do well if you are ‘all in,’
what some call the ‘work ethic,’ which is simply doing your best.
5 with savings, buy a yacht by starting your own firm. That will plot a course to your dreams.
More: at all levels, start a small home-based business for both the experience, income, and tax benefits. This allows you to build resources (eg, instruments for a musician) less expensively and helps build your resume, client base, networking resources. I have NEVER not operated my own business since entering high school, and most related in their start to my first entry into a given field of work, at the hobby stage. I have therefore mastered and become successful in many fields and industry sectors, and despite having only a high school education, I’ve been granted four experiential degrees for the purpose of teaching at college level.~
My Mom always told me not to play in the street. She was right. The freeways are much more fun – if you are agile and don’t mind the blaring horns and screeching tires…~
What did the politician say to the activist? Nothing. He doesn’t pay attention to those voters, either.~
You are free to disagree with me as long as you understand I am never wrong and never make a mitsak ni anteing I sae.~
What I believe is true. If you disagree, screw you.
I know I’ m right, I do. I’m clearly smarter than you.
Don’t you dare try to argue – untill your face turns blue:
What I believe is due – to claims I find undeniably true.
Your facts will not do, they confuse what I know is true.
Such reality I pooh pooh, my mind made up for me, you
see; I won’t listen to you. What’s that you ask askew?
No, I no not just who said, but some kind of Web guru.
Its not important just who. But I know it surly wasn’t you.
What I believe is true. If you don’t agree, boo hoo to you.
Truth’s what I want it to be, no matter what you say or do.
A Democrat Congressman and a Republican Senator walked into a bar… Wait! That’s already as big a joke as can be…~
Notice: please note… In case you haven’t noticed before. Have you ever noticed there is hardly ever been and important notice delivered or posted such that you actually noticed? Nah, I bet you didn’t even notice any such post. I hereby give notice that, if you noticed this post, or not, this notice is not such a notice, but merely a post giving note to such.~
Dos You Got Down Wid Wad I Be Say’n Bout Dis and Dat, Bro?
Dis, Dat, and Dos, as ‘hip’ as they could be, went into a bar to get a drink. Dos bought the 1st round of beers. Once served, Dat said “Dis be good ‘n stuff.”
Dis replied “I try to be good like dat, you know? Mama sez to.”
Dat saw Dis was confused, “Thank yo for the compliment, Dis, but dat not wad I meant. We all be drink’n da same brew and dat be good’n stuff.”
Dis and Dat seemed confused. “Look, Man, dis is on tap’n we don’t be know’n wad it be,” he clarified.
Dis choked on a swig. “What yo say, bro? No one be tap’n on me, so natch, I dont know wad it be.”
“No, Man,” Dat tried to explain further, “Dis beer be tap beer. It be good, but ah dont know wad it be.”
Dis, at least, finally understood. “I got yo drift, now, Man. But I heard dos tap beers were cheap’n stuff. You know, po shit wid no taste. So wad dis be?”
Now Dos complained. “Wad yo mean… yo be sayin I bought cheep beers?”
And now, Dis was confused, once more, too. “I be just fine, bro. Why yo ask wad I be?”
At this point, the bartender happened by. “Hey, Man,” accosted Dat. “We be wond’rn… Wad be dis here beer?”
“Dat be Dos,” he replied simply. “Dat be good, n stuff.”
Dat seemed upset, now. “Look, man, we been all through Dis be’n good, n stuff. But if yo be say,n I sho nuff should be like Dos… dat Dos be gooder,n me, I take ‘ception to dat. Yo don’t know Dat, and yo sho as Hell dont know me.”
Now Dos was miffed. “Hang on a sec, man,” he said to Dat, “yo sayin yo better’n me?”
Well, things went down hill from there and it looked like a fight was about to break out, when the bartender tried to calm them with clarification. “Dis be rediculous!” he started.
But Dis did’t give him a chance to finish, and knocked him on his ass! “Ha!” he exclaimed. “Yo dumb ass be’n on da flo wid yo dumb fat mouth bleed’n wad be rediculous.”
This unexpected event had disrupted the conflict between Dos and Dat long enough that they had calmed down. Dis suggested they leave, and all agreeing, they stormed out in a huff.
As they exited, Dis noted “We stiil dont know wad dat beer be. I sho nuff wish I knew.” The others agreed, none of them noticing the neon sign in the window reading “Dos XX on tap.”~
If Trump is such a chump we’ rather dump, and Uncle Bernie is ample wormy and too squirmy, and Hillary far too shrillery under FBI drillery, then does that mean Biden is bid’n his tim’n in decid’n if rid’n White Knight style last minute to the Demo’s how we’ll be decid’n who’s presidential presid’n?~
What happens when a Socialist politician, an establishment Democrat, a non establishment Republican and an establishment Republican go into a Bar and call for a round on them, each? The price of drinks goes up, the waitresses worry about deportation, the bartender adds water to the drinks, the bouncer calls a reporter, and the Janitor worries about having to clean up all the bullshit that’s about to be spread. And, the patrons realize the hangover isn’t going to be worth it, and they leave.~
Ferris Beuller (Matthew Broderick) had it right. “A person should not believe in an “ism“, he should believe in himself.” In other words, don’t be a follower of someones ideas. If you want to make a change for the better, YOU are what you’ve been waiting for.
Here are some (twisted) examples of perhaps why isms can be problematic…
Capitalism: You have two cows. Sell one and buy a bull to start a cow factory. Worship in any church you want as long as you tithe a portion of your stock options. John Lennon is a famous millionaire singer invited to sit on your Board of Directors. Apple Computer stock looks attractive, so you merge to form Cowpile Computer.
Socialism: You have two cows. Give one cow to the government to slaughter and share with the poor. You worship in any church which is left or right of center. John Lennon is a folk singer of meaningful Marxist ballads. Apple Computer is bailed out by Congress whenever its stock falls below that of Microsoft.
Communism: You had two cows, but now the State has them, and may or may not give you some milk – if you are willing to stand in a long line. You do not go to church except to attend Party meetings. John Lennon is a decadent influence on youth. Apple Computer never was, because they refused to allow government to take more than one bite of it as it would ruin the logo.
Fascism: You had two cows but the government forced you to sell them to corporations for beans (magic or otherwise) who in turn sells the dairy and beef products back to you for huge profits. You go to the same church as the fearless leader, or you don’t go at all. John Lennon sounds like he was related to a Marxist and so he was shot. Apple Computer was burned to the ground in order to blame Compaqism and sweep Bill Gates into power.
Nazism: You had two cows but the government arrested you for hording and took them. You and your religious fanatic family are burned alive in your church for refusing to Sig Heil. John Lennon was in there with you, singing Give Peace a Chance. Apple Computer users are arrested and sent to camps for daring to ‘Think Different.’
Anarchism: You have two cows running down the freeway causing car wrecks. Shoot the tax collector, steal his money, and rape his dog (unless a hunting dog – but since it is a government dog, we know that dog don’t hunt.) You blow up the church. John Lennon sings Revolution. Macintosh Computers have a high repair rate from all the bullet holes.
Constitutionalism: You have two cows and the government cannot unreasonably search or seize them without a warrant, or prevent them from mooing, or prevent you from owning them and forming a militia of fellow cow owners who meet weekends and practice milking with dummy targets. You can’t figure out which of the thousands of churches to attend. Neither can John Lennon, so he writes Imagine. Steve Jobs was a Founding Father who wrote the ‘Consitution for the rest of us.’
Patriotism: You have two cows painted red, white, and blue. Your church supports the current war. John Lennon is boycotted, and so he has a sleep in. Apple is not sold to anyone unwilling to pledge allegiance to Microsoft products.
Militarism: You have two cows which you have convinced each that the other is seeking to invade their own private pasture. You sell arms to both sides. Your church owns stock in your company. John Lennon had his visa revoked because he was a pacifist who smoked pot. Apple Computer is what makes smart bombs smart.
Pacifism: You have two contented cows which give canned milk. Your body is your temple (and you are what you eat.) The government is headed by John Lennon. Apple Computer listens to its customer complaints.
Fatalism: Your cows died after you stopped feeding them because you figured they would just die, anyway. It was the same reasoning by which you determined God is dead. You never heard of John Lennon. Apple System error messages all start with ‘You should have known better than to think this wasn’t going to happen…’
Surrealism: You have a pasture full of Dell Computers searching the Web for the best price on a Macintosh. The government worships you. There is no John Lennon, because he would have made sense, so he instead turns out to actually be Ringo Star, who never quite did.
Bushisms: Is your cows in my Big Mac? I’m a God fearing man on Sundays. Which one is Lennon, and which one is Lennin? I will not have one of those damned Macs on my desk. Jobs didn’t contribute one cent to my election fund!
Clintonisms: Wow, look at those udders! I’m a God fearing man on Sundays. I liked John Lennon. We had a lot in common. In fact, I inhaled once, myself. I don’t know about granting Apple a GSA contract… they didn’t contribute to my election fund.
Obamaisms: Your cows are being detained indefinitely to combat terrorism. I’m a God fearing man on Sundays, unless I’m playing Golf. I liked John Lennon. I had FBI sue Apple Computer, who wouldn’t let me spy on iPhones, and didn’t contribute to my election fund.
Note: If you like the isms, they were lifted from a page full of additional jokes of greater complexity than the bulk of material in this post. Find them here: To Laugh in the Face of the NWO is the Best Form of Contempt.
The more we move toward a cashless society, the more we are at risk should some financial, political, or natural disaster transpire which weakens or destroys societal and governmental dynamics. What people will accept in payment or trade for scarce and critical supplies could threaten your life if you don’t have any, or the cost may be more than you can afford, if you do. Here are some ideas to help you be prepared.
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
In this post you will learn…
• what makes money valuable is also what can make it worthless;
• plastic and precious metals are useless in the aftermath of crisis;
• why government frowns and suppresses barter, and why to embrace it anyway;
• cash is usually aftermath King… but not always;
• whole new currencies evolve in serious or long term aftermath.
What money is, and why it has value
Money is nothing more than a convenient way to conduct ‘commerce’ (trade goods and services) with a standard and portable stand-in for something else of value. For this to work, all people within the trading area must agree to use it as such, and ‘it’ must have a definable and concretely known value. Any system of money is best handled by the local government, be it a tribal village in ancient times, or a modern industrialized nation. Or, it can be done by a network of banking and financial institutions, or even a combination with government. As we will see, banking options are good for them, bad for everyone else.
The later is what we have, today, and it suffers two problems most of us are aware of, both stemming from the banking side. To fully appreciate that, we should step back in time just a bit. Please take the time to read what you may otherwise presume already to know, because the points made in this section will play to remaining sections in critical ways. This is because only governments used to issue money, and to establish its value, they could not and dare not create money unless they held something of value in reserves somewhere, something of concrete and great value to back it up. Most nations, as did America, used Gold; the ‘Gold Standard.’
Whatever the value standard was, a citizen could go to a bank or government Purser, and demand to trade in the currency for its value in that item (i.e., Gold), or vice versa. This system guaranteed the value of the currency to a known unit of measure, and tended to help establish and maintain a stable economy, and made international trade viable; each currency had a concretely known valuation, and established trust between nations that the standard item, itself, could be obtained, if desired, to settle any balance of trade debt which might exist.
Then came the banks with their own idea, called Central Banks, which enables the printing of Fiat Currency, which is money which has nothing of value backing it. Enter the Federal Reserve Banking System. It has cost you and me a significant sum of our personal lifetime earrings. Some say we have literally been sold into slavery to the banks. Learn more about exactly how much it has cost you personally, here. Many, as do I, call it Treason, including the prophetic warnings of our Founding Fathers:
• “If the American people ever allow private banks to control the issue of their currency, first by inflation, then by deflation, the banks…will deprive the people of all property until their children wake-up homeless on the continent their fathers conquered…. The issuing power should be taken from the banks and restored to the people, to whom it properly belongs.” – Thomas Jefferson in the debate over the Re-charter of the Bank Bill of 1809 (millions of us, including myself, did wake up homeless with the Mortgage Derivative Collapse and associated ‘too big to fail’ bailouts, and we have had nothing but inflation and deflation cycles, not to mention devaluation of the dollar since establishing the Fed)
• “I believe that banking institutions are more dangerous to our liberties than standing armies.” –Thomas Jefferson
• “… The modern theory of the perpetuation of debt has drenched the earth with blood, and crushed its inhabitants under burdens ever accumulating.” -Thomas Jefferson (a reference to the National Debt)
• “History records that the money changers have used every form of abuse, intrigue, deceit, and violent means possible to maintain their control over governments by controlling money and its issuance.” -James Madison
• “If congress has the right under the Constitution to issue paper money, it was given them to use themselves, not to be delegated to individuals or corporations.” -Andrew Jackson (Banks are corporations)
• “The Government should create, issue, and circulate all the currency and credits needed to satisfy the spending power of the Government and the buying power of consumers. By the adoption of these principles, the taxpayers will be saved immense sums of interest. Money will cease to be master and become the servant of humanity.” -Abraham Lincoln (the Fed is all about interest paid to the banks for every dollar printed.)
• “Issue of currency should be lodged with the government and be protected from domination by Wall Street. We are opposed to…provisions [which] would place our currency and credit system in private hands.” – Theodore Roosevelt (in the long-running debate about establishing a central bak.)
But the Fed would become reality just in time to pay for WWI with fiat money. But that was not the first time. In the early days of forming new States within the United States, Banks could also print their own money with no attachment to or obligation of government, hopefully backing it up with some kind of standard; a certain degree of trust was involved, and many people found that their banker was a crook. This practice, both legitimate and criminal, was especially common in Gold and Silver mining towns, where shipping precious metals was risky due to bandits. Other negotiable instruments also came to exist, which can similarly be thought of as forms of money. Stocks, Bonds, Notes, Futures, and more. But these featured valuations tied to more complex and less tangible things, and were not simple enough for usage as currency except with brokers and special institutional trading firms.
But several new ways for banks to print their own money also arose which were useful enough by all. One is the ‘Check,’ your checking account. It is merely a highly organized and easily validated (to a point) method of trading in I.O.U.s. Anyone can write an I.O.U. on a any piece of paper, and if the other person accepts it as a debt, and the writer honors it, it has value. And, it can be passed from one person to another until paid, like a Marker used in the underworld.
But people do not trust strangers, and the bank’s checking systems addressed that by using the bank as a kind of validation and tracking of the debt, and the debtor. The underworld uses fear and organized crime to do the same with markers. And, do we not fear the wrath of our banks and the law should we write a bad check? This is called debt bondage, a very real and powerful political and social control system that keeps the locals, that’s you and me, in line for fear of loosing all they own. Unless, of course, you simply choose to opt out, as have I.
As far as checking is concerned, eventually, the check must be traded for real currency, so no new money was actually created, but while in circulation, the total amount of ‘money in use’ is greater than had been printed, a pseudo inflation factor. Today, some 20 billion checks are written each year, with a value of 26 trillion. To put that into perspective, it would pay off the entire National Debt with money to spare. It is also roughly 20 times the value of all U.S. money in circulation. So is the National Debt, and though no causal connection seems to exist, it is an interesting coincidence, is it not?
Banks also ‘print’ money by loaning money that does not exist. They are allowed by law to loan up to 20 times the money they hold in their vaults from depositors. They write a check, and you then use that ‘money’ to write more checks for whatever purpose the loan was intended. They get deposited somewhere, and eventually returned to the issuing bank. You make monthly payments to the bank, money against which more loans can be made. As long as less than 1 in 20 of loaned dollars is converted to cash withdrawal, the bank has gotten away with printing at least 19 defacto dollars; another pseudo inflation factor. A loan is for fictitious money, and how to you repay a fiction? A question well asked, and some have an answer which will astonish you, and though giving you hope, you will fear it, as well.
The worst offender is the Central Banking System, which allows governments to print money with absolutely nothing behind it; no standard. The government itself is printing nothing more than an I.O.U. The Bank, in our case being the Federal Reserve Bank (the Fed), which is NOT a Federal Agency, but a banker-controlled corporation. The Treasury prints money in the form of Federal Reserve Notes backed only by interest bearing Treasury Bonds given to the Federal Reserve (functionally, an I.O.U.), and the Federal Reserve Note is itself therefore also an I.O.U. Some of these are sold to anyone wishing to buy them, quite often hundreds of millions of dollars held by wealthy men of note, but also, ordinary citizens. Those unsold are held by the banking cadre.
This is an automatic inflation driving machine for several reasons, not the least of which is it allows government to fund any massive and costly adventure without worrying about actually paying for it, as long as they are willing to drive up the National Debt, which no one is ever going to pay off. The downside is, of course, that our purchasing power continues to dwindle, and at some point, the dollar will need to be officially devalued, and only YOU and I will loose in that deal. Meanwhile, every increase of the national debt is de facto devaluation; you and I loose purchasing power as if officially devalued. Simultaneously, more and more of tax dollars go to the FED to pay off INTEREST (only) on T Bills, and that money goes directly to the bankers. The debt is NEVER reduced.
If it were, the Fed would actually collapse. Here is an explanation from David Graeber, and English Anthropologist, regarding the first central bank in existence: “In fact this [debt] is precisely the logic on which the Bank of England—the first successful modern central bank—was originally founded. In 1694, a consortium of English bankers made a loan of £1,200,000 to the king. In return they received a royal monopoly on the issuance of banknotes [their ‘Fed’]. What this meant in practice was they had the right to advance IOUs for a portion of the money the king now owed them to any inhabitant of the kingdom willing to borrow from them, or willing to deposit their own money in the bank—in effect, to circulate or “monetize” [create fiat currency] the newly created royal debt. This was a great deal for the bankers: they got to charge the king 8 percent annual interest for the original loan and simultaneously charge interest on the same money to the clients who borrowed it, but it only worked as long as the original loan remained outstanding. To this day, this loan has never been paid back. It cannot be. If it ever were, the entire monetary system of Great Britain would cease to exist.”
There is much more which can be and should be said, but this is not about the evils of the Federal Reserve or financial institutions. The intent was simply to give a glimpse at what money is, and what makes it valuable (or not), in NORMAL circumstances. And, in normal circumstances, the ONLY thing which makes Federal Reserve Notes valuable is a law passed in support of creation of the Fed, which says and which is echoed right on the money, itself, that it is good for all debts, public and private; should you refuse to accept it as such, the debt is forgiven under that law; we are forced to accept it.
But what happens when TSHTF?
In any serious financial, societal, or natural disaster, all bets may be off, and cash may either become a monstrous burden, or have no value at all. To the extent that social systems and governmental control fails, or their function is diluted, the value of money can suddenly become undefined, except by the seller. It is not just a matter of free-market price setting, but weather or not the seller will see value in money, at all, the government no longer being in a position to enforce the law which says it must be accepted.
Some say to hoard precious metals for such crisis, but that is foolishness, because you can’t spend gold. For one thing, it is too valuable, and another, it is too difficult to validate without special chemicals, scales, and knowledge. How does the seller know it is real Gold, or what its actual value currently is? Not only will there be an issue as to weight, which is multiplied by a given value per ounce, but there will be no way to know (where a crises involves loss of communications), what the actual current value per ounce actually is. The wise seller must therefore significantly undervalue any metal offered in payment.
And how do you buy something low in value with something high in value, when there is no way to ‘make change?’ Hoarding Gold is fine for long-term protection of large cash holdings, but it is next to useless and extremely costly to attempt to use it as currency in a crisis.
THEREFORE, if actual money starts to fail in usefulness, whole new currencies will arise.
What will be the new currency in a crisis?
Yes, new currencies, and nothing like money as we know it. But like money, where it is still accepted in a crisis, the value thereof will be determined mostly by the seller, and this will give new meaning to the expression, ‘shop around.’ The most common alternate currencies will become food, water, fuels, and ammunition. Too a lesser degree, anything in high demand and low supply, such as weapons and tools, or anything key to survival. Being aware of that in advance is a great advantage, because there are two things in common with all these items which allows for good preparation.
The first is, that they have a relatively low value now, before there is a crisis. You can afford to stockpile, and would be wise to do so, taking into consideration storage space requirements and shelf life. It would be good to have at least a small hoard of each item in quantities greater than for reserves for personal consumption during the emergency and, where storage space, shelf life, and finances permit, to perhaps have a large hoard of one or more items on the list to become your personally favored currency.
The second is, that anyone can produce them, themselves, to one degree or another, both before and after a crisis. Anyone can sink a well or fetch water from nature, and transport it to where it is less available for ‘profit.’ Anyone can grow and store food if they have the land for it. Anyone can chop wood or make alcohol (fuels) if they but arrange to do so. Anyone can reload spent munitions if they have a loader and can obtain gunpowder, and for the matter, anyone can make gunpowder if they know how to find the raw materials and they are locally available.
Lead for ammunition is another matter, but it is cheap to buy ahead of crisis. So the purchase of a supply of lead and tools to form bullets and reload might be a great idea. Yet most people will not do any of these things, or cannot due to finances or lack of knowledge, and it is exactly that which gives them an excellent future value – extra value, in fact, because in aftermath situations, the normal supply chain of these things has been interrupted or entirely cut off, and access to the knowledge or finances to acquire them with it.
Once TSHTF, you are locked into your current state of affairs; you are either prepared to offer the right currency at an affordable rate, or you are slave and at the mercy to/of those who can. Only one of these two groups has a good chance at survival. That is the worst kind of debt slavery.
Barter, the alternative currency
The government hates barter and suppresses it in a mountain of laws restricting its use. Barter is, in fact, the basis of the new evolving currencies just discussed. But for those in that second, hapless group just mentioned, they may be able to survive for a while by bartering with their earthly possessions, albeit at a costly rate of exchange. A $3,000 professional video camera might be good for a tank of gas, or a few days worth of food; what value is there in a video camera without electricity? But it might be accepted if there is some hope that, eventually, power will be restored, or if the parts might be useful to a tinkerer seeking to build something mechanically useful.
But barter can work well, even before a crisis, despite the laws. The laws are there because the barter concept tends to ‘cheat’ government out of taxes. If you buy something with dollars, you got taxed on the income from whence you got the dollars, and the seller is taxed on the income he earned, and there is likely a sales tax, as well. In barter, as originally conceived and employed before the laws existed, you simply gave labor in exchange for items, or traded items. As long as both parties agreed the exchange was acceptable value given for acceptable value received, it was a done deal. Yes, sometimes one side might feel the value was short, and ask for augmentation with a little cash thrown in. Or not.
Barter best works in a network situation involving more than two parties. You have Oranges and want Apples, I have Grapes and want Oranges, and someone else has Apples and wants Grapes. No problem, a three-way swap. But to do that takes an organized network with the means to track what is needed and match it to what is offered and available elsewhere. Barter associations or organizations are set up, and of course, that takes effort and manpower, and a building that has monthly rent, and other things which take actual money.
The other thing a barter group could do, was to accept goods or labor obligations (I.O.U. for work to be done) as if a deposit in a bank, against which the member offering such could make some combination of present or future withdrawal of other goods or services as they became available and needed. This allows conversion of unwanted or surplus items into future barter trade power, rendering the barter group as a kind of retail store and universal service provider. Again, government does not like anything resembling a bank in procedure, and would normally tax a retailer on inventory.
As all these functions take money to facilitate, barter groups would charge a small fee for a transaction based on the dollar value of the transaction. DOLLARS were still used as the MEDIUM for determining TRADE VALUATIONS. That meant creating a corporate entity to facilitate and organize barter transactions, and typically, charging a membership fee to allow access to the system. That was what led government to take interest in and to legislate against barter; such systems could quickly grow in membership and began processing huge numbers of transactions, some of which were themselves huge in valuation.
I, for example, belonged to such a group, and in a single transaction, moved $35,000 in goods, against which I would acquire needed goods and services which enabled me to live more inexpensively for a full decade — until the government passed laws which forced the barter group out of business, and started taxing everyone involved to the point where the advantage seemed lost. But it need not be that way, especially once TSHTF.
You can join an existing barter program, but if you do, you should also form your own local barter group, because the big programs will not be available in a crisis. Anyone do so without formal corporate existence, and without charging fees, and without a retail or banking format. I highly encourage it, though you should check with a lawyer as laws vary State to State (click the above image for the Oregon situation). Yes, there will be some concern about tax reporting, but that is a minor issue unless you start dealing in large volumes of goods and services. Frankly, most people who barter this way report nothing, because unless it is in volume, it isn’t even worth the trouble to track and report it, not to them, or the government. But the VALUE is in HAVING A NETWORK IN PLACE IN A CRISIS… priceless.
When TSHTF, especially if communications are down, it is both difficult and even potentially dangerous to attempt to form a network. Danger stems from the fact that, unless care is taken to avoid strangers, you may offer to form a network, in which case you state what you have of interest, and if they think they have more guns than you, and want what you have, they know where to get it without cost. Moreover, mutual defense is a thing which can itself become a barter commodity, assuming you have the guns and manpower of good use to others; it is, after all, another kind of service.
So to prepare for a crisis, don’t just hoard key supplies, but establish a barter network, even if you do not choose to use it. Doing so amplifies the value of your preferred currency, because you already have people willing to accept it fairly. Consider these words of wisdom:
• “The propensity to truck, barter and exchange one thing for another is common to all men, and to be found in no other race of animals.” Adam Smith, Scottish Philosopher.
My take is that barter is natural to man, and as such, is an unstated free right to undertake at will – to hell with government, or in reverse, if government has gone to hell, what else do we have to trade with, but barter;
• “Capitalism invariably boils down to barter between two willing parties, neither of whom uses force to work with the other.” Ben Shapiro, Political Commentator.
When TSHTF, force becomes the only commodity the weak minded and hapless will have to trade with. To strengthen your defenses, you need something better, as well as a means of countering force with force of your own. A Barter network gives you both, where mutual defense agreements become a thing which may be bartered: If I have superior weapons and more gun bearers than you, an imbalance exists which might be offset in goods or other services.
• “In primitive society, Man produced directly for the satisfaction of his own wants, but with the development of society came differentiation of functions; exchange and barter arose, various trades sprang up, and with the necessity of commercial intercourse, cam the invention of money.” Charles A. Beard, renowned Historian.
This sums up this entire post in the most direct of statements: barter came first, money after. When money fails to function usefully, we must be ready to barter, either with a new currency of convenience, or outright barter networking. Our very lives could depend upon it.
Not fully convinced? Want more information?
May I humbly suggest some further reading about WHY you should worry about flying excrement from an unexpected fan, and also offer some additional valuable resources? Here is a compendium of useful material on the dangers of crisis and the topic of being prepared, not just in terms of currency, but other considerations which are well beyond the scope of this post. These are Facebook ‘pages,’ so you can FOLLOW them for updates. Please consider to Follow my blog, as well.
• The Fema, Martial Law, Revolution Database. Don’t let the title scare you away; its a compendium of articles and posts about the likelihood and risks of various forms of civil unrest and social, economic, or natural disasters, as well as general advice such as found in the above post. It’s sub-name is When All Hell Breaks Loose.
• The Post Apocalyptic Library. A compendium of resources where you can find critical how-to information needed for survival in a crisis. Everything from how to make a torch to how to make a portable generator from a lawn mower. The idea is to visit those sites and print the instructions, and place them in a safe place and in your ‘go bag’ so that you will have them when needed; they won’t be available once TSHTF.
Even our own government, normally blind to problems until too late, has been warning us for years to be prepared for ‘something scary,’ and the list of concerns is very scary. The stakes couldn’t be higher: if even just one thing on the list takes place, being ill prepared can perish whole families and, in short order, whole communities. Here is something that can make a difference, and its free. Its called knowledge.
In this post you will learn…
• What Preppers are and why they exist;
• Why YOU should become a Prepper, and HOW to proceed;
• There are 2 NEW and FREE resources to simplify the effort usefully
Note: I usually well footnote my posts so you can verify what I say for yourself. In this case, the two Facebook pages mentioned at article end, themselves, offer ample proofs for those items not otherwise footnoted.
The wise live for Today, but plan for Tomorrow: uncertainty is the only certainty
The Bible is the oldest source of Wisdom modern Man relies upon, and it clearly echoes that thought; there are no less than 25 places in the Bible which so admonish. A good number of these directly talk about the kind of preparedness this post addresses, while the remainder speak to being prepared for entry into the Kingdom of Heaven. But, if one is not prepared for things which can take one’s life, is not the later concern all the more important to prepare for, as well?
Perhaps the strongest and simplest of these are found in Proverbs (natch):
22:3 “The prudent sees danger and hides himself, but the simple go on and suffer for it;”
27:1 “Do not be confident about tomorrow, for you do not know what a day may bring.”
If we hold onto any one thing in this country, it is the wisdom of our Founding Fathers, and they were almost to a Man God Fearing and, therefore, they heeded such words. But they themselves also spoke plainly and logically about such things, and framed them in terms of the Nation, as well as the Individual and those we each love, to whom we are responsible for their well being:
John Adams, on the risk of overconfidence and reliance upon government: “I give you this warning that you may prepare your mind for your fate;”
Benjamin Franklin: “By failing to prepare, you prepare to fail;”
Alexander Hamilton: “If fortune should smile upon us, it will do us no harm to have been prepared for adversity; if she frowns upon us, by being prepared, we shall encounter it without the chagrin of disappointment. Your future rank in life is a perfect lottery;”
Thomas Jefferson: “Instead of considering what is past, however, we are to look forward and prepare for the future.”
George Washington, on wise use of funds, such that: “timely disbursements to prepare for danger frequently prevent much greater disbursements to repel it.”
Thomas Pain, on being fugitive from tyranny: “O! receive the fugitive, and prepare in time an asylum for mankind.”
The Modern Prepper and Dr. Strangelove
That last quote brings us to the advent of the modern Prepper, a phenomenon brought about by the Cold War and fear of the Bomb. President Eisenhower spoke frequently about the need for Civil Defense Preparedness, and founded what ultimately became FEMA, the ‘Grandaddy Prepper.’ For the rest of us, we were encouraged to prepare for nuclear war in our thinking, and our behavior.
We were taught to ‘Duck and Cover,’ and to plan to flee the cities, or take to bomb shelters. The whole basis of our modern Interstate Highway System was to that end, and so that the military and other aid could quickly flow to any wound in need of dressing. Cold War tensions culminated in the dire climactic confrontation of the Cuban Missile Crisis, and firmly established the era of the Bomb and Fallout Shelters. There were, in fact, enough shelters built to save 100,000,000 Americans, millions being built by citizens in their own homes or back yards: Dig a hole, drop in a pipe and add a floor, and fill it in and stock it.
Why prep today? Darker times > starker threats > greater fears
For a time, I managed a gas station while investigating the Oil Industry. That led me to a face-to-face confrontation with terrorism which rendered the investigation superfluous. For those who do not appreciate or understand the Prepper, or why they do what they do, or for the matter, who do not understand Conspiracy Theorists, Truthers, or Targeted Individuals claiming mind control, I highly recommend working for at least 30 days in a gas station. Why? Because that is an excellent place to talk with a large number and a variety of people in the course of doing business, and elicit from them things they would never otherwise admit in open conversation.
I could ask almost anything, and if well proposed, obtain a deeply personal and meaningful reply. And I did, regularly, on on a wide range of topics. What I learned is that there are more people afraid of more things than the mere threat of global extinction from The Bomb and the ‘Red Menace.’ Terrorism, yes, and for more of a seriously right reason than the obvious, a reason unexpected even by them.
It is to me even scarier than the fact that terrorism exists. Few are aware, but the top ranking U.S. Military General, Tommy Franks (who brought the flame throwing tank to Waco), has warned in a public statement that if there is another 9-11 level terror attack in the United States, the Military will take over the government in nation-wide Martial Law. I, for one, do not want flame throwing tanks on my streets.
And, we are still threatened by nuclear war: China’s top military leader has stated that war with the U.S. is inevitable, the only thing remaining being to decide when and how to be the first to strike. And, we have recently learned, they have stealth subs we cannot detect; one surfaced unexpectedly in the middle of a U.S. Carrier Fleet in the middle of an exercise looking for subs. North Korea is constantly making threats, and Obama and Hillary Clinton have assured terroism-minded Iran has access to the Bomb. We have several times in the last year, alone, come close to trading blows with Russian forces which could easily have escalate to a nuclear exchange. And we supposedly like each other, now.
Moreover, as recently played out in the Press, we have learned that a single well placed nuke high in the atmosphere could cause an EMP wave sending us back into the stone age by wiping out all electronics, including the entire power grid. Just as bad, spurious energy waves from the Sun could achieve the same ends, globally, or for the matter, doomsday rocks from space could effect similar damage, or worse. Movie theaters are awash these kinds of with (Extenction Level Event) scenarios. But there are other fears, and each one seems, in turn, to begat another, often wilder and seemingly more far fetched… which unfortunately, do not seem all that far fetched if daring to explore the facts which are their basis.
Every few months there seems to be another new exotic biological threat, either a weaponized or natural pathogen or virus on the verge of pandemic capability. Each such threat additionally threatens to be incurable and impossible to stop in time because it takes such a long time to come up with defensive medicines. Then there is the risk of financial collapse, which could trigger a global replay of the Great Depression on an unimaginable scale. Civil unrest levels are at the greatest and most dramatic in all of history; the Occupy/99% movement spontaneously fielded many millions of people around the World in the space of days. Our government’s liberal policies and some unfortunate events have fomented racism issues to the point that Blacks are shooting Cops as if at war, and threatening worse.
We see paranoia rampant in our government, who treats us all as if terrorists in the wings, spying on us and taking away our rights, and leading to fears of Martial Law, and/or efforts to take away our guns. DARPA, on the other hand, has ordered billions of rounds of ammo, enough to kill every living soul in North America several times over. FEMA seems to be building large facilities some fear are closer to concentration and even death camps than to shelters. It is at least concretely true that several special inciner-ators have been built, each strategically located, and capable of efficiently destroying hundreds of millions of tons of contaminated materials — which could include human bodies. The fear of Fascism and the comparison of our government to Nazi Germany is commonplace, which brings me back to the dialogs at the gas pump, where these things were said. The most common phrase heard in response to such things was, “When the revolution comes…”
Then there is the dramatic increase in UFO sightings, and much more than that, a growing body of evidence of actual combat taking place. If chemtrails were not already their own perceived threat, consider the latest theory as to their purpose; to weaponize the atmosphere against alien aggression. There is actually some scientific basis for such wild theories, and some to additionally suggest there is an off-world secret space program with Buck Rogers-like Space marines using captured Alien technology. I don’t know about any of that, but the fact that the government is becoming more secretive about the UFO question than ever, before, does not allow me to discount the notion. Presidents Roosevelt, Regan, Bush, Clinton, and Obama, and even Putin, have all alluded to these possibilities, as well as have high ranking military. The recent discovery of a constructed mega-structure orbiting a distant Sun amplifies the possibility: we are not alone. And those at the gas pump agree. More people have seen UFOs or otherwise have reason to believe in Aliens, than not. Don’t take my word for anything in this paragraph; just tune into Ground Zero and scan the archives of shows with Clyde Lewis’ expert guests.
Dare we mention a credible Planet X, super volcanos, global warming and melting ice caps, mega earthquakes, the shifting of our magnetic poles, and any number of scientifically plausible threats and natural disasters capable of inflicting significant regional, national, or global destruction of cataclysmic proportion… or dare we say… Biblical? After all, the other common comment at the gas pump is, “We are living in the End Times.” Indeed, the Illuminati conspiracies, AKA The New World Order, are not difficult to validate with a barrage of demonstrable facts which defy coincidence. This author has made a case in several of his books that the ultimate goal of the New World Order is to form a One-World Government — in order for the Antichrist to have a seat of power, and usher in the End of Ages, the ultimate End Game. It IS prophesied, after all, and many of us fear that as much as anything else.
That brings us full circle, back to the Bible’s admonishments. Being prepared ought rightly be not only for bad tidings, but for salvation. The government agrees, at least with the first part. The last ten years have seen an unprecedented effort by the government to urge us to be prepared for disaster. They have even reinstated and updated the old Cold War emergency radio alert system, and are stockpiling huge quantities of everything from food and medicine, and other supplies, to coffins. And ammo. All they ask you to do, is to have emergency plans and a ‘go bag,’ or store of emergency foods and critical supplies.
It’s simply good common sense. Preppers have been doing this for decades. What’s your excuse? That they are crazy? Better look in the mirror, if you believe that.
Here are two simple and free tools to help you get started
Both are easy to use Facebook pages. One is a kind of compendium of information regarding the possible breakdown in civil society due to the inability of government to respond, or even perhaps government itself has gone terribly awry. It is called the FEMA, Martial Law, Revolution Database (kind of covers all possibilities). It has no subversive intent, despite the scary title. It is very informative, and can help push anyone teetering on the notion of being prepared into taking action. One way it does this, is by telling you what to expect, and what a good action plan/go bag might look like for a given scenario.
The other also has a scary title, but it implies nothing but what it is; a library. In this case, it is a series of links to critical information one might need to survive for long periods without outside help in a serious catastrophe. It is a collection of how-to survival tricks, and how to quickly and easily make common critical items such as water purification systems, emergency generators, and so forth. It is called the Post Apocalyptic Library. The idea is simple: visit the links, download or copy the information, print it out, and put it into your go bag. Instant expert on a moment’s notice! Many of the links will deserve further exploration of their sites, for other good information. There is always more than one way to solve a problem.
Have you ever wanted a certain soft drink? Well, I’m a Prepper, he’s a Prepper, she’s a Prepper, we’re a Prepper; shouldn’t you be a Prepper, too?
Great. Drink deep for best result.
OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…
What makes you a terrorist when you live in a Police State?
Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.
One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).
OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.
R.A.P. Sheet, H.Michael Sweeney
1976 Wire Tapping, 2 counts, charges dropped for insufficient evidence
1980 Embezzling, charges dropped after resignation from company
1983 Counterfeiting, Drug Smuggling, sentenced
1984 Wire Tapping, charges dropped for insufficient evidence
1985 Shoplifting, 4 counts, sentenced
1987 Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution
1988 Wire Fraud, 3 counts, sentenced
1988 Smuggling, 2 counts (bioweapons, diamonds), sentenced
1990 Espionage, Interception of Electronic Communications, charges dropped by NSA intervention
1991 Bank Robbery, 4 counts, sentenced
1991 Wire Tapping, 4 counts, cold case due to flight to avoid prosecution
1992 Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,
cold case due to flight to avoid prosecution
1993 Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution
1994 Wire Tapping, cold case due to flight to avoid prosecution
1994 Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped
1996 Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution
1998 Wire Tapping, Stalking, cold case due to flight to avoid prosecution
1998 Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced
1999 Possession of Controlled Substance with Intent to Sell, sentenced
2001 Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention
2002 Terrorism, 4 counts, cold case due to flight to avoid prosecution
2004 Bioterrorism, case closed due to lack of evidence
2004 Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered
2016 Armed Robbery, 2 counts, cold case due to flight to avoid prosecution
2016 Bank Robbery, cold case due to flight to avoid prosecution
By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.
Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.
So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.
All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).
We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.
OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.
Wake up and smell the mushroom food you’ve been being fed since you were old enough to vote, and before. Plug your nose and consider what’s next…
The Two Party System is Suiciding — Too Late to Save America?
Have you not noticed the constant repetitive pattern? Every few years we get disgusted with the last batch of politicians we voted into office, especially at Presidential level, and vote in the opposite party. We are upset almost always for the same generic reasons: they promised one thing (we liked), and to fix what the last bunch did (we didn’t like), but all we wound up with was, ‘the new boss same as the old boss.’ Just like the song, we ‘hope we don’t get fooled, again.’
HOW’S THAT BEEN WORKING OUT FOR YOU?
Answer: It aint’ never had and ain’t ever shall, unless you are big Pharma, big Oil, big Telecom/IT, big Bank, Big Brother, or simply a fascist, globalist, or illuminati player.
The fact is, the Constitution and Bill of Rights, the basis for our whole system of government by, of, and for the People, so scared the elite power brokers in our early years of Continental unification and domination (formation of the 48 states), that they invented the two party system as a means of insuring that ONLY the power elite could run for high office; a complex system of delegates and voting rules which are designed to weed out anyone who is unwilling to run on a platform sympathetic to the predetermined ‘issues’ which suit the ‘party.’
Note re image: talk about disgusting campaigns. But which is worse? 1866 or 2016, 150 yrs. hence?
Issues are selected not so much on the basis of what actually pulls the people’s heart strings, as much as what the analysts and advisors think will ADEQUATELY pull their heart strings WITHOUT forcing any actual cure or change to ‘gains’ made by the party just prior to last being voted out of office — those things the voters got mad at them for in the first place; it is important to insure voters never remember those things, and focus instead on what’s wrong with the current batch of looters and despots, only.
The two party system is also designed to negate popular choices. No matter how many people vote in the primary for a given candidate, the back room deals in cigar-smoke filled rooms between powerbrokers will ultimately determine who the nominee actually is, and that person is going to be that new boss who’s going to fool us, again. Guaranteed. It’s worse, now, because now they can legally hand out Havanas.
Finally, it is designed to quash any possible third independent party contender. They do this very easily by telling you that to vote for them is a wasted vote (true only if you actually vote for other than your actual preferred choice), and by telling you that such a vote dilutes any chance of defeating (whomever they think you fear being elected). We hear that time and time again, and heaven forbid that if such a candidate should actually make decent headway, they will find a way to destroy him before the election ever takes place.
That is exactly what happened when Ross Perot ran against Clinton/Bush. As I had warned the Secret Service based on my ten-year investigation into abuse of power issues by the New World Order, it seemed absolutely clear that an assassination or blackmail attempt against him or his family to force him out of the race was inevitable. Indeed, within weeks of that warning, Anthrax powder was mailed to his family, and according to my SS back channel contact, it was the same as employed against Clinton’s Bodyguard, the man who was set to testify against Clinton over illegal activities undertaken while Governor of Arkansas prior to his Presidential bid. As result, on the very night that Perot won the State of Colorado and was assured a position on the ballot, he withdrew from the election without a useful or true explanation.
Is the Two Party System suiciding?
I believe it is. There are several coincidental forces which are destroying it from within, and they each tend to cross pollinate one another.
- The Democrats have only been able to field a closet Communist and a closet criminal (simplest descriptions). I’d be happy to defend those labels if anyone cares to be shut down by facts not commonly found in controlled media.
- The Republicans have only been able to field a closet fascist (my fear, hope I’m wrong), a batch of Bush clones and other elite same-as asses.
- Both parties have underestimated just how fed up the People are, and have largely failed to elect platforms that we really care about, except for Trump, who unfortunately seems to be more verbiage than substance.
- Controlled Media has repeatedly run afoul of that underestimation by electing to attack Trump when he says something ‘controversial’ or ‘politically incorrect’ only to find the People disagree with media and are beginning to wonder why still shots of Trump are always unflattering as if he is shouting a curse, and shots of Hillary are always smiling sweetly. “What? Us have a biased agenda?”
- The threat by almost all candidates that if not nominated (i.e., the ‘wrong’ candidate is nominated), they will consider to run independently, not only threatens to destroy the party, but also, to split the final election vote in favor of the opposing party. But one or even both parties could end up doing this, which would negate the split and make it a true free for all.
- Should Hilary be indicted (she is under FBI investigation which continues to uncover considerable evidence of wrongdoing, and not under a ‘security review’ as she prefers to call it) after nomination, no one has any clue as to what would happen to resolve the Democrat’s quandary, but the net effect would likely be much the same as in (5), above.
- Should Trump fail to be nominated, no one knows what the Repulisvecan party can do to resolve the problem of how to win the election if he indeed runs independently. Ditto for the Demoncrats shoul (6) transpire.
So my answer is YES, and thank goodness! I’ve harped against the two party process ever since Obama, and should have been ever since I started voting… but I thought I was doing fine on mushroom food, like everyone else.
Is it too late?
Probably, at least in one major way. No matter what happens, we are going to get a President and resulting cabinet we will later wish was merely a Dog Catcher or Postman, and perhaps not even that (no slight intended of those public service posts).
Hopefully not in the more important way; the future of America is, after all, at stake. The true issues we should be dealing with have never been raised by any politician save Perot, perhaps, and even he did not take full aim, in my view. To see what I mean, check out my 24 campaign planks were I running for President.
The chaos which would result with the collapse of the Democans and Republicrats would create a power vacuum the likes of which this nation has never seen. We would end up with countless new political parties seeking to rush in and redefine how candidates got on the ballot: a Constitutional or Populist Party (Hooray!), a Liberal Party (ye olde democrats), a Conservative Party (new age republicans), a Neocon Party (ye olde Republican good fellows), a Moral Majority Party (dazed and overwhelmed by LGBTG and the like), a Nationalist Party (military-industrial-intelligence-media complex), a Centrist Party (big everything), a Socialist Party (dare I suggest ye new Democrats), and perhaps even a Communist Party (Putin for President?).
That might be a good thing, provided anyone can really tell who all the new players really are. That’s because most of them would choose names other than I’ve shown which better describe their true colors, to include someone calling themselves Republicans and Democrats. It might take decades to figure them all out, with many new bosses the same as before along the way. I kid you not.
Nothing in politics is ever what it seems up front, and given the chance to remake themselves, politicians will simply take off one sheep’s disguise and don another, and in this case, there will be secondary disguises several layers deep to make sure we have a hard time finding their true nature. About the only ones that would be truly identifiable would be a Constitutionalist and Communist party, presuming someone else didn’t beat them to the use of the name.
I feel like the half-human Fly caught in the Spider’s web in the movie by the same name…
“Help me… help meeee!”
Once more, we see the Federal Government usurping power in ways which both benefit the big corporations at the expense of personal freedoms and financial viability of citizens. This time, it’s the FCC, and not the BLM, and they want to eliminate any chance for you to watch local television without paying through the nose for it… and suffering de facto censorship.
FTC to Kill Local Television as We Know It
Tuesday last, a little heralded announcement by the FCC once more revealed how controlled mainstream media is. They, more than anyone, perhaps, should have been screaming the news from the rooftops, and complaining about it, as it affects EVERY major and secondary television station in every market across the country. The ramifications are so broad and sweeping as to threaten the very social fabric which defines us as a nation. In summary, the threats are as follows:
- Eliminates all local television service as we know it today, virtually ELIMINATING ALL OVER THE AIR BROADCASTS. No more ‘free TV.’
- All licenses by FCC currently in place are cancelled, and ‘up for sale,’ they want to raise 60 billion dollars which will be unaccountable funds off the FCC budget. This means they can be spent on any black project without any accounting.
- Major stations (e.g., your local ABC/NBC/CBS/FOX affiliates) will be paid many millions from the sale, far more than the stations are actually worth; hush money not to protest, we must presume.
- Secondary stations, including repeater stations or small unaffiliated stations in deep rural markets, and even possibly PBS, will be paid NOTHING, a virtual THEFT, and possibly, a loss of all public broadcasting systems!
- All will be sold to Cable and Web content providers, forcing consumers to get any TV by paid subscription or on-demand purchase.
- Significantly eliminates local news coverage, limiting it to official sources only; the government’s preferred message, a form of censorship which effects de facto mind control.
- Stages the FCC for total control of Web content under the new ‘authority’ it declared for itself last year; easier to censor and dictate what you can learn if there is only ONE resource and it is controlled by government.
It follows the Fascist model: The plan is insidious beyond belief once fully understood. It is perhaps no coincidence whatsoever that it follows Obamacare. If one reviews history of the quiet takeover of nations by Fascists and other dictatorships, those ‘bloodless revolutions’ always start with the complete takeover by government of all health care, followed next by takeover of all media. What follows is usually great financial and social upheaval allowing significant draconian responses, to include something along the lines of Hitler’s Brownshirts and the SS, and a permanent war footing with an expanded military and military police state. But people never learn by the mistakes of history, and there is plenty of that…
It happened that way in Germany, Italy, and in South America, it happened again and again. In each and every case, the takeover steps were quietly initiated and never fully understood even by those involved in enacting the changes. In every case, they inflicted greater hardships socially and financially upon citizens than those woes they claimed would be addressed thereby. In each case, a central power figure emerged who responded with ‘law and order’ and bypassed, neutered, or altered the form of government to a Fascist regime.
Unfortunately, any and all of the current Presidential candidates, save one, could fit that bill in this author’s opinion. Trump appears to be a closet fascist, Cruz appears to be one of the same old gang of criminals who brought us to this point in the first place, Bernie is a closet Communist, and that awful woman is simply a criminal rapist of nations and peoples. But my opinions are unimportant. Even if whomever is elected is not set to be a fomenter of fascist revolution, the power elite who manipulate politics will simply assassinate them or blackmail them to assure the desired outcome.
Naturally, like most draconian moves by government, the official propaganda is worded exactly the opposite in tone to the reality. That’s why we get Bills that actually accomplish the reverse of their title, like ‘Affordable’ Health Care Act. Believe as we say we do, and ignore what we actually do.
Take a look at FCC’s official page, here.
Now, lest you think me simply another lunatic conspiracy theorist, I got my first wind of this plot, to include all points cited herein (save my opinion on SOME of the candidates), from a conservative call-in radio show where the station owner of a secondary market called in to shout a warning and explain exactly how it was rape and pillage of the television industry and the public in favor of Cable and Web bigwigs. I don’t make anything up; I don’t have the time nor inclination!
- Big Brother FCC Plans Internet Tax/Controls What Happens in Homes (universal free press)
- FCC No Longer Just Big Brother, Now Big Parent (huff post)
- FCC Sparks Fears of Big Brother in News Room (fox nation)
Yes, Virginia, over the several decades of my personal battles with elements of the intelligence communities of several nations, as well as criminals and terrorists, there have been actual death threats and multiple attempts against my life, attempts to silence me.
I’m still here.
But my voice seems to be dying; I’m being methodically and systemically silenced.
To be sure, that, too, is not the first time it has happened. Some of it has actually been funny, or at least done with a sense of humor by someone with a lot of power, someone a bit more intelligent than the mindless robots normally employed in targeting someone for their political incorrectness.
The NSA was the first to employ technology to silence me. When I was guest on Art Bell’s Coast to Coast with George Noory for three hours. Part of the show was to be on the Flight 800 friendly fire shoot down, where I was going to announce discovery of startling new proofs. About five minutes before I was to be called by C2C staff for hookup, I got a strange call that lasted about 30 seconds. It consisted of nothing but high-speed tones somewhat similar in nature to the sounds of a fax machine…but this was different.
I knew what it was, and had written about it in my books. NSA helped develop the telephone networks we use today working along side of AT&T and also, Bell Laboratories, who were security related clients of mine. SoI recognized these tones as the data packets used to manipulate the phone system’s switching network. There is almost nothing these codes cannot accomplish, and they are part and parcel of how and why NSA’s Echelon gives them complete access to all phone/fax and other telecommunications.
So I went on air as expected, but when we came to the commercial break and it was announced that when we came back, we would offer blockbuster information about flight 800, the stage was set for the dirty trick which would be based on such manipulations. Coast to Coast, like most such syndicated shows in the day, feeds its program by phone to various radio network resources. Now, to make the significance of what happened next, it is important to know this is at a time frame when the official FBI/NTSB investigation was still going on and knee-deep in charges of a cover up, and all three TV networks were owned by military contractors who made various elements of shipboard missile systems or the actual missiles we now know shot down the airliner by accident.
The show continued and the information was revealed. But some weeks later it was learned that a funny (literally) thing had transpired. In the New York/New Jersey Long Island area where the plane went down and the investigation was underway… the same area where the US Navy was hauling select wreckage retrieved from the ocean to junk yards instead of the investigation site where the plan was being reassembled in an attempt to find a cause (so we were told)… I was silenced.
The truth was not to be heard. No. Some clever reworking of the phone system had people who were listening to Art Bell’s show, once the commercial break was over, suddenly found themselves instead listening to rebroadcasts of Art Linkletter’s ‘Kids Say The Darndest Things’ show from decades earlier. To my way of thinking, that’s incredibly creative and funny as dirty tricks go. Once we stopped talking Flight 800, the regular show returned to the airwaves, there. Once the show was over, five minutes later, I got another phone call with the strange tones.
A more physical silencing took place shortly thereafter when I was guest and ‘Field Correspondant’on Michael Corbin’s radio show out of the Denver area. Now he used a real radio station, but also used phones. Got the same tones phone call with that show, too. But more than this, someone took an ax to the cable feeding the show to the radio tower, itself. I was silenced.
Sadly, it was not too long after that that Michael Corbin himself was silenced. After a series of death threats, his home and the radio studio suffered an arson attack, along with one of his vehicles. He called left me a message for advice as he feared for his life, but again, telephone oddities prevented our actually making contact. Three days later, he was found dead in his good car at the side of a highway. It was ruled a heart attack, but he was, as I recall, just over 30 years old, and had no known heart conditions. He was silenced.
Not long after that, my only Web site at the time, proparanoid.com, was hijacked by Men in Black. I was able to investigate it thoroughly and determine two CIA fronts were involved. One of these was Enron, formally known as Hughes Tools, taken over by CIA after the billionaire died. The other was a Web domain proxy service which specialized in registering domain names anonymously so you could not find out who owned them, as well as remarketing domain names… typically hijacked, on behalf of said ‘anonymous’ owners.
Only problem was, it seems they were actually the owners. They also offered hosting services, and ‘just happened’ to own thousands of porn sites thought operated by CIA in order to collect sexual preference information of powerful people, sometimes useful in blackmail efforts. Others in that collection were, in fact, traced to staff members at the firm. The head of the firm had a work history that fit the general profile common to persons running CIA fronts, but the two most condemning clues were closer to smoking guns.
One is, that the servers they used were actually housed in Enron’s headquarters building a few blocks away from… the other site that was a clue; the firm’s business offices were in the same building Lee Harvey Oswald used to work with FBI agent Guy Bannister… the building with two corner entrances, one on each cross street, which opened to the same interior, but each with a different address. This allowed the FBI and, presumably, CIA, to operate multiple fronts from the same offices, but use different addresses so that they would not be linked. It now appears CIA owned that building, and has repurposed it.
The hijacking was not to make a profit, as most such hijacking intends. The typical resale offer for a Web site of my popularity in terms of the number of hits was about $400. But if I was to get my site back, they demanded $157K. No way. I was silenced, at least temporarily, until I could create a new site. Several, actually.
Now we come to my death.
To be completely honest, part of that death is not due to politically motivated intrigues by Men in Black. Certain family affairs, health issues which prevent me from holding a job, as well as my age, perhaps, and general financial issues were clearly involved; they set the stage for and enabled the unexpected assaults. What happened happened covertly, and would take time for me to discover, making it too late to counter.
I lost my home and was forced to live in my car, which means I also lost my ISP service, and my email addys were shut down. Yet somehow, after the email accounts were no longer operational, someone with spoofing skills (cyberwarrior hacker types) sent an email from my closed email account to my Web hosting service and shut down my account, there. This effectively cut off my one source of income beyond my paltry Social Security checks.
Next, they transferred ownership of my domain names to a firm, this time, in Canada. But as I do not now enjoy useful Web access, since I still live on wheels and have no ISP, I can neither investigate the matter or usefully replace the Web sites. Somehow, by the way, they also killed the cached pages in Google and elsewhere about my previous hijacking, which included evidence. I am silenced.
Or not. My wordpress account remains open. Most of my old Web site pages can still be accessed in archived from (e.g., Google proparanoid + a keyword/phrase, and click the little pull-down menu arrow found at the end of the green secondary URL line, and select Cached).
To those who have followed me over the years, bought my books or newsletters, I thank you for your loyalty and kind comments. Death threats aside, I’ve probably had only three people say a consequential bad thing about my work, people who were sincere and intending constructive advice. Those who were simply hateful or who were clearly pushing an agenda, I happily discounted.
I can still be reached by text messages (very short messages, no subject line) at proparanoid at vtext com. I do also attempt infrequent access to my email account at proparanoidgroup at gmail com. You can still order my books using the My Books link at page top. You can still pay for books or send me contributions to proparanoidgroup at gmail com via PayPal. You can also still access my Facebook account under H. Michael Sweeney.
I have been silenced… but you can still hear my muffled words, if you try hard enough.
When I created the Free Will Society to aid stalking victims, one of the lofty goals was to eventually build some form of Safe Haven community for them. That dream now seems on the threshold of coming to pass. The result is Free Will Haven. iWhere can a targeted individual get help? Free Will Haven; Targeting Free Intentional Community for Stalking Victims by H. Michael Sweeney proparanoid.wordpress.com proparanoidpress.com proparanoid.net copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting. What is Free Will Haven?
Free Will Haven?
MAJOR UPDATE/REWRITE: Aug. 2017. It’s been three years now since we formed the Free Will Society with the intention to establish a low-cost, self-sustaining, targeting-free intentional community (Free Will Haven) for stalking victims who can’t get a fair shake at life in populated areas. A lot has transpired, some of it really good, some of it bad, and now, it looks like we are ready to ramp things up a bit. So I thought this page should be rewritten, and perhaps, be simplified. Very little of the original post remains, or remains unchanged, and I have added rather a lot about the Beta site which was established and our plans for an even better location. Over 2,500 victim days targeting free! Compare that to over 12,000 stalking victims I’ve had contact with over some 25 years where almost every victim says they can’t get even a few days respite, if not for the stalking, then the fear of it.
Intentional Community? Beta site has been undertaken
Wikipedia’s definition for Intentional Communities is a full paragraph long. Simplified, it is a community planned from the start to cater to specific persons of like (interests, beliefs, goals, needs, etc.), typically favoring alternative lifestyles which foster those goals. You can learn more about such communities at sites like tedxblackrockcity.com (informative video), ic.org (a kind of ‘superstore’ of centralized info on topic), dba Fellowship for Intentional Communities (Facebook page). The Free Will Society is now a Member organization of the FIC, which gives us access to a mountain of informational resources and other aid not previously enjoyed. Much of this is now available and useful to FWS Members as result.
In Free Will Haven’s case, our goals are ecological and consumptive sustainability (not to be confused with the New World Order’s use of ‘sustanability’ when pushing Codex Alimentarius, Agenda 21, GMO foods, Genetic Engineering, Global Warming, Carbon Tax/Credits/Currency, etc.); survivability (in this case, against all forms of surveillance, stalking or targeting of individuals in any manner), and financial and spiritual wellbeing (the unchecked pursuit of happiness through exercise of God’s gift of Free Will). Defensive survivability lays at the heart of the plan, and is based on the many books and online consultancy I have made available as a privacy/security expert to targeted persons for more than 25 years as The Professional Paranoid, the title of my first book.
Low cost is addressed primarily by focusing on portable tiny homes, or RV vehicles for short-to-long-term housing, and communal style co-op sharing of centralized services and site-produced foods and resources. Cottage industry will be encouraged to augment personal incomes, and/or like projects for the collective. It is the goal to allow one to live a decent and enjoyable life-style for less than $500 a month, total outlay (I’m managing on $400), that figure based on purchasing of food and supplies from outside sources. Once self sufficient, costs would decrease accordingly.
I think of FWH as a bit more flexible than a community. I see it as also acting as a short-term hospice for those seeking temporary shelter and healing from their ordeal, and in some cases, a school of defensive arts, and even self-replicating factory. Residents can stay as long as they like. Once fully rested and obtaining stability in their lives through being targeting free for a sufficient period, they might wish to return to society, perhaps under a new identity (we can help with that), or, perhaps, having learned what it takes to establish and operate such a community… go out and create another one, somewhere else. We would like to see several of them nation-wide, and even internationally.What makes Free Will Haven an intentional community?
Tiny homes and RV life style?
A tiny home generally references any small living space intended to be extremely practical and economical, though minimalist in nature. As a rule, this commonly means either a starter home for a young couple or single individual, or a retirement home for someone without a family, as a tiny home cannot have many rooms dedicated for family functions and individual compartmentalization.
The original tiny home movement included exotic efforts with costs of $1M or more not uncommon; ultra modern, hi-tech, and with prestige designer labels attached. The grass roots version, on the other hand, has gone wild finding ways to do as well with less, with costs ranging from well under $10K to perhaps an average of about $40K for the higher end; about what one might put down on a conventional home mortgage. This has resulted in an almost unlimited array of possible home design types and, as result, flexibility in meeting individual needs and tastes, like these as found at pinterest.
You can have tree houses, container homes (check these out), domed homes, spray cement (free-form shape) and similar homes (check this video out, and this), underground homes, and more, including homes that simply look like a normal home but scaled down… some of which are on wheels. That brings us to the fact that a motor home, RV vehicle, trailer, or even a manufactured home also qualifies. All of these are on the drawing board/table at Free Will Haven.
The ones we favor most are the ones you can order pre built and delivered to the site (look at these, and you can even get an ‘Ikea’ home complete with furnishings), or the ones you simply buy plans or kits for and then build yourself (like these). Or, they can be ad-hoc, and built from whatever you can cheaply get your hands on. Google any of these home types for endless solutions to choose from, and when it comes time to actually consider residency options, we will work with you to fine tune or better the ideas you favor.
I have established a special page chock-full of information about the ins and outs, pros and cons of the almost endless options available in choosing an RV type or style of Tiny Home. It also addresses the lifestyle, itself. RV solutions provide a quick and dirty ‘home’, completely self-contained with everything needed including their own backup generators. Tiny homes tend to be minus some aspects, such as bathrooms, but can include them; its up to the individual. They can end up being more roomy and comfortable than an RV, and seem more ‘homey.’
The Free Will Haven concept encourages use of an RV upon arrival, and the construction/installation of a tiny home (many of which can be portable and towed like a trailer). If electing a tiny home, any RV in hand can then be sold or rented to someone who does not have one, sold for long term, rented for short term. The same can be said for the Tiny Homes should a resident choose to relocate and not take the home with them. There is no reason anyone should feel that becoming a resident has no exit options. Quite the contrary. It increases options.
Beta site effort proves viability
The original Beta effort has resulted in the purchase and operation of a rather off-grid beta site by one of our founding members using their own money. It operated for about two years serving two TIs using most of the basic plan established by the Free Will Society. For whatever reason, the owner/operator of the site elected to abandon reliance upon and participation with FWS, though we had provided money to help pay for installation of electrical power to the site. There are clues it involved personal matters as well as relationship issues.
While there is some mystery as to why a refusal to engage in dialog, it is clear the Beta site was successful in terms of the key-most goals; survivability targeting-free. We are grateful for their effort. The Beta site failed only because of eviction for contract violations of some sort, presumably through miscalculation by the owner/operator in absence of help from the FWS. Due diligence is always upon the purchaser, who was at a disadvantage in many ways in terms of ability to do so. It is a regrettable outcome.
Meanwhile, I myself have been living as a homeless person in a motor home. I have essentially established a semi Beta site of my own where I was the only resident, also in a deeply rural environment. Between my experience and the actual beta site, there has been a total of more than 2500 targeting-free days. It has been a joy for me, and the Beta site operator has come forward publicly to express positive views towards the experience and an intention to attempt yet another effort. In that effort, the operator has affiliated with a new core group with a troubled past with respect to credibility and honesty, and we wish them all better luck.
The concept is proven. 2500 stalking free days!
Now it is time to move forward more earnestly, and do it right, this time.What is a tiny home like in Free Will Haven?
The future: location and logistics?
The original beta site (image) was less roughly 1 acre in size, and rather a long, narrow unimproved property at a high altitude in a colder part of Oregon with a dry clime (annual high of less than 60 degrees). It had no water but was near to a river with drinkable water and fish, and she had a water filtration system. It would support a well at shallow drill depth. It had no power but as it fronted a main highway for the area, it did not cost much to install power. It would support raising crops, and was established with an Airstream trailer (very nice) and several other towable items, and self-assembled Quonset-like structures for storage and greenhouse function. It is not known if a second RV was brought in for the second resident; the Airstream is thought to sleep up to four persons in two different accommodations. Still, it is not a terrible site, actually fairly decent given it was purchased sight unseen and based on a limited budget.
This site was not chosen with the help from or according to the ideal guidelines established by Free Will Haven. Since the purchase was made with the operator’s money and in consideration of their small income, that exercise of control was perhaps expected. The basic-most needs were considered to the extent possible. But While there was some good visual separation between the site and neighbor structures by trees, it was not as private as FWS would prefer. There are two neighbors within about 600 feet of the property (less than a city block). The nearness of a main highway, though also buffered with a lot of trees, is also not a perfect situation. I do like the fact that the rear of area (not shown) is backed with a high bluff which is uninhabitable, and provides security.
We can and should do better. Recently, my Publisher bought some property at auction and invited me to live there rent free. While it turned out not to be possible due to dense forestation requiring expensive work just to get onto the property with a motor home, the method of acquisition was unrealized in previous review of potential sites. Things are looking up.
Compare the the Beta site to this 20 Acre property which represents the ultimate site for meeting goals established for Free Will Haven. The road is a gravel road established for timber harvest and is seldom used by anyone but hunters — residents could hunt on the property if desired! It dead ends at the property, which is a flatland at the top of a hill, and continues into the property as shown for easy access.
It has multiple developable locations and area for growing crops without the need to fell trees. There is NO ONE for miles in any direction. These are the kinds of features preferred in the actual site. Depending on many factors, a really good site could be as small as perhaps 5 acres and still prove satisfactory. Geographic features such a hill can negate concerns about privacy as relate to adjacent properties. There are many such opportunities; cliff faces or steep terrain, rivers, national forests, etc., can all be allies.
This particular location is very inexpensive to purchase despite the larger acreage, simply because there is zero access to commercial power at any cost. That lets it out of consideration, as neither solar nor wind power enjoys economy of scale in the levels required to support a comfortable life style for a given individual, much less a collective. It would take approximately $9,000 per living space for solar, for instance — without a battery system to cover nighttime use (another $4,000). Figures are based on the same power level as the generator output in a typical Motor Home. If one had a few hundred thousand to tie up into an off-grid house, that would be a small bit of the budget. But that’s not your typical stalking victim. I’ll mention here that the weather is much nicer at this location, too, withs highs in the 80s.
The all important factor in any land acquisition, of course, is cost, including what it will take to occupy it successfully. As it happens, there are properties which fit these kinds of requirements which are available at a price I can afford. Sort of. The trick is finding them where the owner will finance with ‘ez credit terms,’ which, fortunately, is not unheard of. I have to be able to handle the monthly payment out of my pitiful social security payments, and have a low enough down payment that I still have money to pay for bringing in power and a water storage system, and a few other items such as a storage shed, and a freezer (a Motor Home typically holds about four days worth of frozen foods).
Alternately… should the Society obtain a large donation or one of our members win the lottery (I buy tickets), I’ve found marvelous properties in Missouri which offer as much as 160 acres fully developed as a farm or ranch capable of producing an income suitable to cover mortgage… for less money than it would cost to buy a house in most big cities. Many of these have rivers, lakes, or ponds and wooded areas full of all manner of wildlife, such as Wild Turkey, Geese, Ducks, Deer, Boar. This allows hunting and fishing right on the property, many of which have hunter’s cabins or blinds in place. But I’m not waiting for $300-500K donations.
I’m scouring land listings for something I can buy NOW. And, I will be starting a new gofundme for anyone willing to help, and/or wishing to participate, perhaps, as resident.
Participation: Membership and Residency
Anyone and everyone is requested to join the Free Will Society, stalking target or no, to support the Free Will Haven project (and other projects planned in the future). Annual membership is $25, currently payable by PayPal to proparanoidgroup at gmail com, adding comment to that effect in the message it requests in the process. Membership gives one access to more detailed information, including the history thus far of the project in detail, and an opportunity to participate in and contribute to the ongoing dialog and direction of the effort. It also gains access to dozens of resource materials from our membership in the Fellowship for Intentional Communities.
One must be a Member to apply for residency. There is a separate $25 fee to cover the application process, which is required to insure that all residents will be able to benefit without social incompatibilities. It is unfortunately true that there exist people who claim to be stalking victims who are not, for instance. While one can join and apply simultaneously, I advise against. Membership will provide access to a flood of information and direct contact with other members, and could conceivably end up changing a person’s mind about residency. One should be fully informed before deciding.
The application process further educates the applicant toward decisions about if, when, and how to undertake the actual move. It analyzes the applicant’s ability to actually undertake the venture with a reasonable expectation of happy success, fully informing them of what to expect in the way of possible downfall, all based on their precise personal situation. A checklist of things to consider and steps to be taken is reviewed in great detail, critical in determining the true cost of ‘move in.’ Once approved, they need not act immediately, and can work through the checklist at their own pace, as may be dictated by anything from costs to family affairs in need of tending.
The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some Satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.
Are there any patterns in mass shootings?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
Is there any proof mass shootings are not random?
What you will learn reading this post of the posting series…• that select shooting lines form a 3-D perspective view of Cheaps and transparent depiction of all inner passages; • that there are specific ties between Cheops and the goal of the New World Order; • that Cheops is a kind of key to understanding European Illuminati/Templar relationships to mass shootings.
Are mass shootings by intelligent design?
Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View
Is there a mass shooting conspiracy?
Mysteries of Cheops
In the prior post we saw ties between shooting event lines which formed Masonic and Satanic symbols, and a series of orange lines which led us to the Great Pyramid, Cheops, in Egypt. While those were quite remarkable and sufficiently consistent to defy any chance of random coincidence, what follows will dramatically make concrete the notion of intelligent design as well as the importance of Cheops to said design. And finally, we will see there is yet another way to look at Cheops’ roll in the Illuminati/Templar and mass shooting tie-ins, but this time, from the European point of view.
First, we need to understand a bit about Cheops and its importance in mysticism. There is so much which could be said that there are literally countless books on topic which could be entered as ‘evidence.’ Here, I will focus on less than five percent of such material topically, only able to skim the surface of them. Consider it merely to whet your appetite to learn more, for which some suggested links will be provided along the way.
One key aspect of Cheops is that it is rich with magic numbers. This seems to be true regardless of if using the original units of measure employed by ancient Egyptians, or modern day equivalents. Indeed, some of our current units of measure stem directly from the ancient Egyptian measuring system, a fact often laid at the feet of Freemasons and their predecessors, the Masons. While I won’t spend time expounding, many of the measurements of Cheops, both in original and modern increments, enjoy magic number properties, doing so in ways which, like those illustrated in the prior post, are mind boggling. Some serious mathematicians have found even more wondrous relationships to both the ancient and modern discoveries of Man well beyond any possible knowledge to Egyptians of old.
Perhaps the keymost aspect of Cheops which potentially makes it ideal for inclusion in mass shooting patterns is that it is only the Giza Pyramid which has a complex of inner passageways and rooms. Early mystics and even some studies of Cheops by persons with scientific credentials and methods, have proposed and illustrated a belief that the construction of Cheops was an enlightened project involving supernatural or mystical knowledge of the future; the internal passages and chambers thought to be a roadmap to End Times and key events along the way. That is represented by the image, below, from this interesting Web site. Others out there (with less useful images) have more detail with the most recent/current annotation being the year 2010, roughly the height of mass shootings. That marking is in the King’s Chamber, which implies ‘control and authority.’
Of specific interest to mass shooting research and the notion of Illuminati Masonic Warlocks being the architects, thereof, is the fact that shooting lines can be found which quite correctly depict a pyramid across thousands of miles of the United States. More than this, they quite usefully do so in 3-D rendition, even to the point of detailing the inner passageways found in Cheops. In fact, the depiction is so uncanny as to have key aspects ‘to scale’ with measurements which work math magic using modern increments of measure against the ancient’s units of measure; not just scale in size, but across the barriers of time in the expression of numbers in different languages and cultures. Take a look:
Do the pyramids really relate the entire history of the World from beginning to end?
Shootings depict Cheops
As you may recall from the prior proof the orange lines are lines which run from shootings directly to the Great Pyramid, Cheops, each exactly 500 miles apart as measured along a given line which is perpendicular to them all, and which itself runs through several shootings. The green line here, however, is at the distance of 10,000 miles from Cheops, which is one/fourth the distance around the World (the vertical diameter being 40,008 miles on average), and it too transverses several shootings and is perpendicular, but the distance at this point between lines is 505 miles. Each orang line originates dead center of Cheops and is separated by almost exactly 7.5 degrees of arc to achieve this feat. That is interesting for another reason; 360 degrees divides by 7.5 exactly 48 times, and 24,000 miles (the rough diameter of the Earth horizontally), divided by 48 indeed equals 500 miles.
Now there are some admitted problems in trying to depict a pyramid with any degree of accuracy in a 3-D perspective view, especially if with cutaway to reveal interior passages. Such a view does not simply allow us to measure a line and compare it to Cheops with good expectation of results. Perspective causes a measured horizontal to be less as it is depicted further away. A line transiting diagonally in one or more axis in 3-D space is even less useful unless one knew the precise angles for each axis both it and the original against which it was to be compared, were employing (and additionally, the depiction version is arbitrarily decided by the person rendering it, and impossible to discern without their sharing).
The depiction in this case seems slanted over America as if about to slide into the Caribbean. That is for a reason: it is faced (viewed) with the same face (view) as the actual Cheops is when following the orange lines, there — presuming in both cases one is looking from the center orange line towards it. That is to say, looking at Cheops in America from the center of the lines, would give you this same perspective view if standing in the center in Egypt. That cannot be coincidence. The problem with that, however, is that in Egypt, in relation to the Orange lines, one corner is clearly (looking down from Google Earth) nearer the observer’s position than another; there is no line which is not at an angle to the observer.
Note: I further feel it is an error to assume that modern-day Illuminati Warlocks have the skills and knowledge base, or event he interest in the crafts and mathematics of Masonry, which they left to the Adepts when Templer remnants infiltrated the Mason’s Guild and eventually took it over to form Freemasons. They are not likely going to go for precise renderings as much as symbolism; accurate to the point which can be managed simply, but no more, I believe.
Why do Masons, the Illuminati, and Satanists focus on Egypt and Cheops?
How much is a Royal Cubit, anyway?
It is, as result, impossible to establish a precise method or true consistency in relationships (i.e., to test for accuracy in scale) of measurements between Cheops and the American pyramid. The required data and accuracy required to plug into complex formula is beyond our ability to deduce. Ideally, a computer program modling in true 3-D space could be used to compute and confirm such comparisons… if we knew the angles employed by the architect of the American depiction.
But that does not mean we give up. We do the best we can with the tools at hand, and must come away at the very least acknowledging that in the 3-D layout, the mere visual similarities alone are sufficiently ‘coincidental’ to imply intelligent design, and in need of further study with better tools. But that does not mean we cannot ‘cheat,’ and then test to see if our cheat had any merit. After all, perhaps the architects employed a similar gambit. We wont’ know unless we try, ourselves. So…
By rotating the view as I have in the image above, we at least have the illusion that the base line is perpendicular to our viewing angle such that we are tempted to measure it anyway, and then see if there is any discerned relationship to Cheops which results in some kind of conversion factor. If we CAN find one, we can then apply that factor against other test lines and, in theory, if or factor was arrived at by other than coincidental happenstance, we should find the measurements work out correctly in the conversion. Guess what? We can, and it does!
Cheops on a side is 440 Royal Cubits, or 36524 Egyptian inches (a precise year’s worth of inches times 100), which works out to 230.4 m, or 756 feet. I will admit that finding a conversion factor took me some time. I made no headway at all until I realized that the orange lines were like rays of a projection lens in a theater, taking a small image and projecting it to be much larger at a distance. I reasoned there had to be something about analogy involved in the conversion factor. I also felt that any such conversion MUST involve the ancient increments in some conversion to the modern, rather than a modern to modern comparison. Turned out true.
As I discovered, if you divide 36524 by 440 you find that there are 83.009 Egyptian inches in a Royal Cubit. Funny. Both sum to 20. If you then multiply this times the total degrees of arc for the American depiction, which is three orange lines, or 22.5 degrees (±.03), you end up with 1867.7, which is exactly the measurement of the depicted base line… in Kilometers; ancient to modern, using the orange lines as calculator. So, now to test the accuracy and intent, vs. the notion of coincidence (pretty big coincidence, if that is all it is.)
Testing our factor: There are only a couple of other places where lines are similarly ‘perpendicular’ to our view (like the base line) by our peculiar method of so assessing for the purpose. Two of these are passageways to the King and Queens chambers, which just happen to have shootings (house icons employed for this use to match the drawings of the actual Cheops chambers) at the approprate locations to at least approximate the inner passages with an appropriate resemblance. But there is a problem with trying to test these with our conversion factor. It has to do with the Mississippi River.
Looking at the drawing of Cheops’ interior, you will note there is an irregular passageway leading down between the upward and the downward sloping passages. This is thought by some to be a water drain, as there are interior air vents which happen to align with prominent Constellation stars on select key celestial event dates, and that admits water. The lower passage in fact has a chamber with a deep pit which resembles a Well. In America, as it happens, the Mississipi River runs a course reasonably similar to that passageway and at the appropriate points in our depiction, given some small fudge factor.
Clearly, the Illuminati has no control over the course of the Mississipi, which changes slowly with time, and therefor, any depiction of the inner passageways must in some way accommodate those changes. My conclusion is, therefore, that such accommodation would necessarily mean a skewing of measurement accuracy in these passageways. Indeed, no line among them which is angled, nor the passages to the King/Queen chambers, quite works out, though some come closer to doing so than others.
But there is an entirely different story in play once we get past that drainage passageway, at the very bottom of the network. That whole portion is, by the way, beneath the ground level of Cheops by a goodly distance. In fact, the pit, which was filled with loose rocks as if a French Drain, once cleared, measures 60 feet deeper. Now, there are three points of interest with respect to testing our measures, and some landmark verifications we can also apply…
These are: the entrance passage to the Subterranean Chamber; an exit passage which is a dead end; and the pit. Applying our conversion faster, all three lines as depicted are of the correct length and are at the correct scale to the previously computed base line. But there was no shooting or key line to establish these lines (well, one line seems to do so), so we must seek some other verification that these are as intended by design. They do exist. Lets take a look:
The entrance passageway: The entrance passage determines the location of the Subterranean Chamber in the depiction, which we will verify separately. But it also has an unusual feature along its walkway, a kind of antichamber or alcove to one side, with no discernible purpose. On the map, at its correct location in the depiction, we find our old friend, Remington Firearms (the white arrow). That was, in fact, one reason I tested line placement at this site. Interesting then, that both this Proof and the prior Proof find their factories involved in shooting lines, baphomet lines, orange lines, and pyramid lines. That cannot be coincidence, and points to intelligent design, and intent — especially since the other Remington facility from the prior Proof is also present directly along another passageway, as seen in the first image of the depiction from above.
The exit passage and pit, on the otherhand, when extended the correct distance within ONE METER accuracy, end at… water wells, pumps, and tanks; which relate well to the purpose of the Subterranean level. That leaves the Chamber, itself. You will note a graphic image overlay veils in transparent fashion the intersect between the two measured passages and the pit. While there to represent the chamber, it is not really as ‘large’ as the chamber would be if to scale. At a particular location within the Chamber area it does cover, we find a nuclear power plant. This is interesting because much lore about Cheops includes references to end times, and equates the Subterranean Chamber to Hell, and the bottomless pit. One of hottest things we have on Earth is the interior of a thermonuclear power plant, and it burns both with heat, and invisible radiation; hell on Earth, should you care to experience it, with or without an accompanying China Syndrome ‘pit’. But there is an even more interesting verification, which is why the overlay:
The inset is the original artwork from which the overlay was obtained, a sketch of the what the actual Chamber looks like at Cheops, where it is described as seeming more like an underground quarry with lack of intent in what remains. The original is of very low resolution, I’m sorry to say. What I noticed about it that caused me to think to do the overlay, was the leftmost vertical protusion. I’m glad I did, because when I overlaid it, seeking to line it up with the cooling tower of the nuclear plant, I noticed something.
Actually, I noticed it while playing with the transparency level so I could see where I was positioning it. I truly wish I had video capture ability to show you the startling discovery, which, with a slight change in aspect ratio, was maximized; the darket portions of the overlay precisely match and seemingly define changes in terrain or map features. The effect is this: it gives the impression that the terrain to the South and near the power plaint has been cultivated to MATCH the overlay usefully. The best that I could hope to do to depict it here was to increase the contrast of the overlay, and alter the levels. There were originally only two discernable shades, black and gray (it is a B/W original image with some dithering in evidence). There are now four, and only the lightest of these is NOT defining a shape or darker area on the Map.
I apologize in realization that this is nowhere near as useful a description as the visible effect I’d rather show with video, but I assure you it is startling and implies, along with the wells and the Remington matter, that these lines are indeed intended to be here and at these dimensions, which in turn verifies the scale conversion factor discovered. Intention by design, in design.
What is the the relationship of Cheops and Mass shootings to Templars and the Illuminati?
The European point of view
At right is an image looking from Cheops towards Europe, to reveal how it ties in with the Illuminati and Templars of old… not to mention any modern day Illuminati Warlocks operating there, today. Especially if their operations include casting magical designs in mass shooting in America to fast forward the formation of the North American Union and establishment of a one-World government under control of the Antichrist. Observe:
At the bottom we have our orange lines radiating outward at increments of 7.5 degrees of arc, where, in order to get to their designated array of shooting destinations in America, they must first pass through Europe. In Europe, we find one of these lines passes directly through the birthplace of Adam Weishaupt, Masonic founder of the ancient Illuminati (ironically, in 1776 — not truly ancient as most count it).
It is interesting to note that one can create in Europe, using only the birthplace of Weishaupt, and the orange lines, a baphomet which is correctly aligned Northward (the stray orange line), IF, and ONLY IF, running the North-line through the VATICAN IN ROME at the adjacent orange Cheops line. Then, IF, and ONLY IF, electing to use the Weishaupt’s birthplace as the center of said baphomet, will it then result as seen.
The significance of that is manifold. For one, it rests upon the remainder of the orange lines in precisely a mirrored orientation and in like relationships, in general, with the orange lines as does one of the baphomets in America. In other words, just as the depiction of Cheops in America was at the same viewing angle relationship as if looking at the real Cheops from an orange line, so it is, here, with the two baphomets.
Thus once more, the orange lines ‘project’ an image in useful scale with the same orientation to create a sister depiction in America. The difference is, THIS ONE, is properly aligned North for ceremonial use, and the one in America is flipped, so to speak… which allows IT, TOO, to be aligned with North IN AMERICA. How can that be by anything, but design?
Weishaupt’s baphomet, by the way, is at a point along the orange Cheops lines where, if used as a measuring point, they are exactly 333 Km apart, which is 207 miles (sums to 9), and 180 nautical (18), and since 18 = 99, that makes 3 threes and 3 9s, which is 999, or a code number for 666. And, of course, if electing to measure in both directions (the diameter of a circle about the birthplace between two adjacent orange lines), we also get 666.
Finally, we also see in the image the yellow icons for Templar castles and other properties, at least the ones we know about, and the red icons (and one balloon icon) which are Illuminati historical sites. We see also one green and one purple line coming from America, one a guideline from a baphomet depicted, there, and the other from a Masonic emblem, there… where both additionaly go directly to Cheops. The circle is complete; Cheops, European Illuminati and Masonic (Templar) histories (and arguably, current Warlock activities), and shootings in America and their resulting patters, all neatly tied together by six lines which impact all else. Coincidence?
What is the link between Masons, the Illuminati, Satanism, the New World Order, and Egyptology?
Go back to Introduction
Go back to Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart
Go to Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages
Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.
Are there any patterns in mass shootings?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
Is there any proof mass shootings are not random?
What you will learn reading this post of the posting series…• that select shooting lines can be extended to a single spot on the other side of the World; • that spot is the Great Pyramid, Cheops; • that the lines are exactly 500 miles apart at a given point and form the same angle of arc.
Are mass shootings by intelligent design?
Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart
Is there a mass shooting conspiracy?
The last proof resulted in some negative commentaries to group posts announcing its availability, all based on disbelief in the postulations advanced. This requires me to repeat myself: It does not matter what you or I believe, it only matters what the architects of mass shootings believe. Now, in this post, we start to examine the symbolism of Cheops and its ties to the shootings, which is also about what THEY believe. But first, I owe readers of Proof Six an explanation about the relevance of the ‘orange lines’ to select purple lines of the satanic baphomets and green lines of the Masonic emblems discussed as tying directly tie to Proof Seven in an unusual manner. So here we go, referencing the image below…
The orange lines are the multiple lines to Cheops this post is all about, of course, but those lines by and large pass through Europe using what is known as the Polar Route on their way to Egypt; the shortest, most direct route, despite the fact that in the movies they always depict planes flying East over the Atlantic to get to either Europe or the Middle East, or the other way ’round if going to the U.S. This is why, for instance, Iran Contra gun running used a stopover in Denmark and other Euro sites on their way to Iran, something which at first didn’t make sense to me when I learned of it.
The purple and green guidelines used in finding and plotting the baphomets and emblems also go to Europe, and end up doing something the bulk of the orange lines ALSO do: they just happen by ‘coincidence’ to pass through at least one, but more often, MULTIPLE ancient Illuminati and Knights Templar castles and other properties employed in their conspiratorial affairs, including some more modern facilities, and even Adam Weishaupt’s birthplace. He, of course, was the founder of the Illuminati, and a high Mason, and the Templars were the folks who evolved eventually to become the Freemasons we have today, as outlined in my book, MC Realities. There is one other line which does this, which is a red line created from a perfect isosceles triangle from Proof Three, which is the best example of ties to the modern Illuminati, as well as ancient, but also Cheops as it also directly intersects with the famous glass pyramid at the Louvre Museum in Paris.
There are other indications these lines and their relationships with Illuminati and Templars is tied to Cheops, in that some of the lines continue past Europe to the Middle East to find Templar sites, there, and two others, one each from a baphomet and an emblem, go directly to Cheops as if an orange line. It is interesting to note further, that these two are extremely close to the second orange line in from either side of the six orange lines; uniformity. Take a look: each white arrow indicates a line of interest which ties to the Templars or Illuminati. The ‘houses’ represent Templar locations (those icons refuse to float accurately over their respective sites at this viewing altitude), and the harder to see red dots are Illuminati, save Weishaupt’s birthplace, which is well marked. There are 18 lines in all, our magic number which equates to 666 in occult terms, only one of which (orange) does not find a Templar or Illuminati site, but we are talking about locations which in many cases have been lost through the centuries and, likely, it really does do so, but we simply have no such knowledge, today. The modern day Illuminati, however, WOULD know. The line certainly passes through territories where such properties are otherwise existent (not all sites are shown, only those which are intersected by lines).
Cheops I had previously been aware of the importance of Cheops to Masonic and Satanic histories, some more tenuous or doubtful than others, but all generally of a mutually supportive nature. If one reads the Masonic Bible, Morals and Dogma, it is clear that the leadership of the organization at the higher levels, is Satanic in its beliefs, practices, and tactical applications, and that all things of Ancient Egyptian lore play into their belief structures and lore. To Masons, especially, there is significance in the Pyramid, and thereby, also to Satanism.
Yet one can find other resources which state the Pyramid is outright tied to Satanism in one way or another, both inclusive and exclusive of Masonic ties, which came later in history. It is a Chicken or Egg question, or sorts, depending on the factoid being considered, but we need not answer those questions; our concerns are valid regardless of the answer. So when I noticed that some shooting lines seemed to angle off toward what I knew to be the ‘polar route’ to Egypt. I sought to verify, and was immediately proven correct. In the image above, find six orange lines which all meet precisely at the peak of Cheops a third-way around the World. They are all drawn at the same degree of angular separation (about 7.5 degrees).
At a given point in the map, in America, they are all exactly 500 miles apart, and as this image shows, they relate to shootings as they go. To date, only one (left most) has no useful shooting along its path to make the claim, but that does not mean there will not be in the future, and so, it is included. It may prove a means of predicting and even preventing a shooting. CHEOPS ALIGNMENTS x 6 There is no significance in the 500 number — at any given point, the lines are equidistant by some measure, I just chose a point where it produced a round number.
However, as research continued, I learned some things which would seem to make that a more important point. In the image below, this is revealed, and in the doing, we see also how the shootings themselves tie to the lines in important ways. More than this, the actual measurements once more reveal magical use of numbers in the occult manner. We should talk about accuracy. Given the great distance these lines must travel (35 million feet or more), the worst accuracy of these key lines is typically less than .05 degrees of arc (dependent upon Google Earth limitations as discussed early in this posting series), or some 15,000 feet at measure point. These work out to a maximum error of .007% and .0004%, respectively. I’m good enough with that to cite it here as proof of intent, given that the architects of mass shootings likely used the same tools, as I. There has, after all, already been revealed in prior Proofs several clues that such is likely the case.
Here we see some 440 plus mass shootings plotted along with the six orange lines from Cheops. The three green and three red lines are for measurement purposes, and require some dialog in order to appreciate the ‘craftmanship’ employed by the architects; a kind of confirmation this is no random outcome. The Meridianal (vertical) circumference of the Earth varies depending on where measured, but the average is 40,008 Km. This means that the point where the orange lines are furthest apart is some 10,000 Km distant from Cheops. This spot is found at the middle green line, and the measure there is essentially 2,525 miles.
This is confirmed in the red line between adjacent orange lines which measures 505 miles. The other two lines are the points where 500 miles between, is found, for 2,500 miles total separation, there. EACH OF THE THREE HAS AT LEAST THREE SHOOTINGS ALONG ITS PATH. These numbers prove interesting, and thus I also elected to measure the diagonal (vertical red) and ‘hight’ (red along the orange line’s path) of a given rectangle formed by these lines. The vertical line, which happens to be North corrected for magnetic declination, a trait seen time and again in the various alignments of Satanic and Masonic symbols in the prior Proof, measures 777, a magical triplet. The height measures 606 miles. More interesting numbers.
Take a look (numbers are rounded unless otherwise stated, and reflect allowances for measurement errors introduced by Google Earth as previously mentioned): Note: you may wish to review the sidebar post on Magic Numbers before continuing. Because… 500 Miles = a palindromic 434 nautical, which sums in pairs to 77; 777 is not only a magical triplet, but forms by summing in twos (1414) the inverse palindromes 141 and 414, which sum together to form the triplet 555, and equals 675 nautical, which sums to 18, and 1250.46 Km, which sums to 18 by threes; 505 and 606 are both palindromes, of course. And about 2525, divide it by 505, and it goes exactly 5 times. 505 + 606 = the double doublet 1111 (a quad) 500 x 505 = 252500, which sums to the doublet 77; 500 x 606 = 303000, a palindrome times 1,000; 505 x 606 = 306030, a palindrome times 10 which sums in threes to 99, which is a code number for 666 just as is 18; 306030 also = 492508 Km, which sums to form the inverse palindromes 151 and 515; and 606 x 777 = 470862 which is divisible by 18 2,159 times, and the grandaddy 666, 707 times.
So we end up with 505, 606, and 707 palindromes, and the triplets 555, 666, and 777. 505 squared = 255025, which sums by twos to the palindrome 757; 606 squared = 367236, which sums to the the triplet 999, a code number for 666 (upside down); it also divides by 18 to provide the palindrome 20402; 777 squared = 603729, which can produce 999 by summing by 3, 2, 1 digits consecutively, a bit unusual; We can’t easily find the area by simply multiplying 606 x the top or bottom, because they are different. We can do that with both and then average the result. This yields 303000, a palindrome times 1000, and 306030, a palindrome x 10. The total of the two sums to 609360, sums to the palindrome 6116, and which divided by two = 304680. So now we know the area, which is 1680 sq. miles more than the smaller of the two, and that much less than the larger, of course. 1680 = 2704 Km, which not only sums to 13, but is divisible by 13 208 times.
The orange lines in detail
In the last Proof, we found the orange lines tied usefully to the layout of the four baphomets and Masonic emblems. Here, lets relate them more directly to the actual shootings which were also part and parcel of those relationships. The first lines at image left does NOT actually line up with anything, YET. It is presumed they will eventually line up with a shooting and may be useful in prediction of same, as there are very few communities in its path with logical targets which fit with other predictive factors. But I will not state these as our paranoid government tends to make anyone predicting such violence based on ANY criteria as the only ‘terrorist’ or ‘suspect’ in question. They tend to lock down such locations and charge the person who gave the warning with criminal intent of one sort or another, or act harshly against them in some way. Apparently, ‘See Something, Say Something,’ is a trap, and considered a crime. I know that at least twice that I reported terrorist activities, they did nothing about the report other than to harass me and try to cost me my job.
The next line is perhaps the most dramatic in terms of accuracy and alignment. It bisects with extreme accuracy two shooting events, even a third within Google Earth dictated error limits. The third also has three shootings within accuracy limits, two of which almost meet doorway-to-doorway accuracy.That line also passes through the Denver International Airport and quite near to a man-made earthen Ziggurat (stepped) Pyramid thought by many conspiracy theorists to be a D.U.M.B. (Deep Underground Military Base). The site claims to be a landfill, albeit the highest and fastest growing of its kind by far, if true.
It is also true that in its current state, it only appears to be a Pyramid in three of the four sides, the fourth being the area where ‘fill’ is taking place at this time. The next line features the sloppiest, worst-case error with two shooting points in its path. The larger error does not dissuade me, because both are quite equally distant from the line on opposite sides of the line (the line cleanly centers between them). There is additionally a business, Pyramid Foods, almost directly on the line near the Bartlesville HS shooting plot of that line. The next line also sports two shootings, one of which is quite near Meridian, MS; Cheops is itself a similar distance from Meridian, Egypt (a neighborhood name also used in several business names, there). The final Cheops line merely intersects within 1,000 feet of a single shooting event. This is near King’s Highway, and Cheops is a King’s tomb. Thus all the lines currently aligned with shooting points, are several are also aligned with something having to do with a Pyramid. This yields yet more consistency, but feel free to presume it coincidence, if you must. What does Cheops have to do with mass shootings?
Beyond the earlier comments about why Cheops is important to Masons and Satan worshipers, there are a few other things which should be mentioned. One has to do with the construction of the Pyramid, which many historians think drove the establishment of at least some of the ancient Egyptian’s measurement system. What is interesting about that, as casually mentioned earlier in this series, is that as history progressed, their system became in various ways the bases for both the English and Metric systems, as well as the system employed in America. It is alleged that Masons (Templars) were the driving force behind this, in part, to insure or play to the mysteries of magic numbers.
So do not be surprised then, if the next post, I tell you that there is not at least one measurement at Cheops which is duplicated in shooting lines here in America which depict the same part of a pyramid in a 3-D view, but using different increments and a different scale (think miles for inches, for example). I’m still working on verification of a list of suspect instances, but it certainly seems the case. This would NOT be possible if there was not some basic underlying ‘magic’ built into both measuring systems with respect to conversions. But the real thing of interest about Cheops, here, is its lore.
Many learned researchers have studied the Pyramids endlessly to formulate many different theories relating to its design, how it was constructed, what its purpose was, and so forth. Many of their findings are controversial, but few are invalidated by the work of others, but might remain rightly in the realm of speculation, or ‘lore.’ Among these are two which would logically be of interest to a Warlock or high Mason (sometimes, the same thing).
The first involves the inner passageways of Cheops. We know these are important to the architects of shootings because, as we will see in the next Proof, they are faithfully duplicated in the 3-D depiction of Cheops by use of shooting lines and shootings. The reason why would seem to be in the lore, which according to some, says that these passages are a kind of history of the World being depicted from creation to its destruction. They actually make a very good case for this, and my own conclusions would tend to agree there is something to the notion, at least symbolically, if not accurately to the year. The claim was, that each Egyptian inch represented one year of history, a thing which seems to be true at least for specific historical events used as benchmarks.
If, therefore, the need to seat the Antichrist in support of end time prophesies requires taking away guns in America to allow the formation of the North American Union, then our architects, being wise in the magic and lore of Cheops and the like, would most likely incorporate as much of that magic into their plans as they could manage. The second involves what is called Pyramid Power in a book by the same name written by Max Toth, which is as good a reference as any of like conent summarizing the lore of Cheops, including the inches for years theory. If even half of the claims within were true (and I have verified at least two of the main claims in my own experiments), that is one more reason a Warlock would wish to incorporate pyramids into any conspiracy aimed at seating the Antichrist. But again let me say, it does not matter what you or I believe about such lore, it only matters what THEY believe.
Go back to Introduction
Go back to Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols
Go to Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View
Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.
Are mass shootings by intelligent design?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
Is there any proof mass shootings are not random?
UPDATE: (this comment, only) This post has generated some negative comments based on the commentors disbelief in the concepts being advanced. I need repeat myself; it matters not what you or I believe, it only matters what the architects of mass shootings believe.
What you will learn reading this post of the posting series…
• that the lines also defy randomness in their placement to form Masonic and Satanic emblems;
• that the emblems are carefully aligned on the Earth in ways which reflect their function;
• that they are rich with clues which hint at who and where are the designers;
• that if you look closely, you can actually see how they ‘function’ as a magical weapon.
Are mass shootings by intelligent design?
Proof Six: Shootings Also Relate or Depict Masonic and Satanic Symbols
Is there a mass shooting conspiracy?
With respect to hidden symbols, we start with the basic understanding that Freemasonry and satanic cults do indeed have recognizable symbols they employ regularly. In some cases, they are more than symbolic, and have actual occult function. But one thing is true of all such symbols; a given symbol has a definite known shape with precise geometric relationships to other parts of the shape. So, if you know a select few points ANYWHERE upon the shape, you might be able to then define the remainder of the shape because you know what it is supposed to look like. This creates a potential problem when looking for such symbols in a ‘target rich environment,’ such as our map of 440 plus shootings.
In fact, some readers might rightly worry that it is too easy and therefore falls back into the realm of chance once more, no longer proof of intelligent design. I agree. Therefore, any such finding must be reviewed carefully for signs it was actually INTENDED, or traits which could not be so easily found true if by chance. In truth, I worried this might turn out to be quite a challenge, but in the end, the methods employed lent themselves to discovery of verifications suitable to address such concerns. Each one found by such means passed muster as being well beyond probabilities of chance, a fact I believe the reader will also find true.
Short of some custom computerized search, such finds still remain challenging, since one does not well know WHERE in a given intended shape a given starting point is located within the design, nor is the orientation or size of the shape known. In other words, you have to endlessly compare the same suspect points against endless possible combinations with other potential points, testing for all orientations and sizes. Tedium!
I’m operating on the assumption, here, that any architect of a grand design would want something more definite in such a ‘clue’ than something which might be seen as random, or require a custom software program; a deliberate placement, one likely with a specific relationship to a key location or course alignment which has additional meaning. The satanic baphomet, for instance, is normally aligned to North when actually employed in a rite, or ‘aimed’ at a target, and each of its five star points has a specific meaning which should likely be related to map location details; fire, water, earth, sky, and spirit.
So lets take a look: presented herein are four satanic baphomet ceremonial stars, and four Masonic emblems. It is my belief there are four intended for each, and no more, as I also believe (as do others) that there are four Globalist groups competing to field the Antichrist. Indeed, the individual Warlock designers are, themselves, likey hoping to be the chosen one. Yes, more symbols may exist, perhaps intending nine or eighteen of each in support of magic 18. But one indication four is the right number is that it took several days of relatively easy effort to find each set of four, but several days more in each case found no more.
What does satanism have to do with mass shootings?
Finding satanic baphomet symbols
In terms of simplicity for the designer, it is super easy to depict a baphomet upside-down, five-pointed ceremonial star with very few points. Because all the lines are the same length and join one another at the same angles to create yet another inner set of intersecting lines of equal lengths and their own duplicated angles, all you really need is to know any two line intersects at star tips or inner crossover points, and the rest could be calculated easily, though you might not know which crossover/intersects you are originally looking at (more than one star could result). But that’s also just too easy, and would mean every two shootings could generate multiple stars. Commonplace, and unacceptable to designers, and to our purposes, here. Both they and I would prefer something more… more dramatic in order to reveal intention… the thing that made it hard to find more than four examples. If I’ve done a good job of insuring that, the more you read, the more you should be convinced of intelligent design. One clue they are not random is the sharing of shooting lines and events.
Though all 440 shootings were employed in the search, in the end, it turned out that ALL four of each symbol type (four baphomets and four Masonic emblems) employed their own limited universe of shootings… with many of the same shootings in both universes. Below we find the baphomet universe. It only took 23 shooting lines to depict four baphomets with some very interesting relationships. While each shooting line involved three shootings (I think one had four), the number of shootings depicted in the images below is only 54, because 22 shootings share common lines, and because I did not plot middle shootings of a line if not actually used to establish the symbol. Also, some are not visible at this viewing altitude because they are so close together. In such cases, I made one plot larger; when you see a larger dot, there are at least two shootings near to each other, there.
If you sum those all up by twos (line and shooting counts), we get our magic number, 18, a kind of cross-checking proof this is not random, but intended to be found design. The same exact thing will happen with our Masonic emblems, which will follow. How would it be possible to get that kind of consistent results by chance? All I know, is it is impossible for me to calculate the odds, they are so high. So, lets take a look, starting with four sample baphomets.
The lone shooting at center-top will serve as a kind of test gimmick, if you will, for determining an intended design vs. randomness in the findings. It does have its own line, one of the 23, which is not visible due an error on my part, which runs under the orange line shown below, to Aurora. The next image also shows our first baphomet along with several additional orange lines which are not themselves shooting lines as such, though they will be seen as originating from shootings, or may even be atop of actual shooting lines. These lines are all exactly 500 miles apart as measured at the green line, which has no other purpose but to show the point at which it is so. All of these orange lines are actually part of an entirely different proof of intelligent design which will be described in another post in this crime series. But they also function as aids in proving intelligent design, here.
This is the smallest of the four discovered. It has only one shooting at an intersect, but enjoys a large number of additional shootings, many more than needed, along all but one of its five lines. Two of these are also upon the same orange line, and two others on a another orange line. Note the thin purple center guideline line I generated. Though drawn based only on the baphomet’s construct, the line does something which relates directly to the orange lines, which while I cannot describe it here without giving away a future surprise revelation, additionally associates the shape with the orange lines. Therefore, this baphomet associates itself with the orange lines quite usefully, the importance of which will become more obvious as we go.
The center guideline also sports two white arrows. This is unique to this baphomet; both of these locations are Remington Firearms factories. I am amazed at such a ‘coincidence.’ I will not speculate on the meaning of it, as I think there are several equally intriguing possibilities, some favorable to Remington, some not so much. This may perhaps be best left for another day, another post. But in the summary section, I will analyze this emblem more closely so show you some of the ways it works its magic, and additionally illustrate intelligent design.
Here is an example of a ‘minimal definition’ baphomet: two interests enjoy shootings and at best, only one is found along a line. However, it is uniquely defined in another way. One point and one middle intersect rest on two different orange lines. Moreover, the Northwest and East most star tips have a useful relationship, as well; one is over the orange line, and the other is short… by a like minimal distance. Indeed, the baphomets are very hard to draw with accuracy (I depend on trying to get all lines the same length — almost impossible, typically achieving to within a few miles at best), and so they may therefore actually rest on the lines perfectly in their designer’s version. Finally, note that the star line running Northeast reveals a guideline continuing on into Chesapeake Bay in Canada; this line also has something in common with the orange lines, further helping this baphomet pass the orange line test.
At a glance, you might think this is the same image/symbol as the last. But no: it’s an amazing symbol very nearly the same size and location as the last, but with THREE intersect shootings, all augmented with five additional line shootings. But that was not enough. Two of the intersects are on the same orange line, and the same Northeastern running star line is actually parallel to another orange line. That same star line also has a guideline entering Chesapeak Bay which once more does what the orange lines do.
Talk about minimal definition, this one has zero intersects. However, it does have two and a questionable third shootings on a single line, and four on an intersecting line. Because it is so large, curvature becomes a factor in verification, as only a given symbol size and orientation (a small fudge factor is present) will allow all those shootings on the two lines to work, thereby eliminating a need for a shooting on an actual intersect of two lines. But we don’t have to rely on the fudge factor:
This time, it is the lower right star leg guideline which does what the orange lines do, but additionally, the rightmost orange line is actually parallel with that same line. This is only possible when the second line at any given distance has a precise difference in degree of ark from the first at a given starting point on a common perpendicular. If curious, we have that common perpendicular in the green line, and at that point, 500 miles distant, the inner-most line is running 54.04 degrees and the outer is at 51.49. Measured at the top of the line at the opposit star point, the distance error between the two lines is well within the margin of error in degrees of arc course measurement. Again, this is only possible with only ONE baphomet location, size, and orientation.
Four baphomets: all different, and yet all the same, in that;
a) they all share the same set of original shootings/lines (universe);
b) they are all therefore interconnected just as we found true of our isosceles triangles in the last proof;
c) they all have at least one line (side or center axis) which is symbiotic with the mysterious orange lines;
d) they are all verified by said orange lines, each in their own way;
e) the first four have a star point which can easily be associated appropriately with something nearby to represent fire, earth, water, air, and spirit. This is not terribly difficult if the star point is at a shooting because that means a population center with concentrated supplies of such relatable sites, but few work out that way, and therefore, your choices and chances of a match dwindle as you go to the next star point. The fourth is so large all of its points encompass water, making it the most difficult to determine: one is ‘the major air corridor’ for air traffic from North America to Europe, and one encompasses a portion of the Pacific Ring of Fire, but determining which one is spirit and which is earth, escapes me. That all of the baphomets (save that one question mark) otherwise meet this goal surprised me, as I though there would be more undefined, presuming their relationship veiled by designers to things known only to conspirators.
f) all of them seem usefully inverted in ways which imply four possible different Warlock designers from various locations: the first is inverted for anyone in Central Mexico or Central America, and there are candidates in both locations; the second is inverted for anyone in Scandinavia or Mexico/America (candidates abound), and the third is not only inverted but also aligned usefully North for anyone in America, while the fourth is aligned either for anyone in Spain/Portugal, or America/Mexico, uniquely so only because of its size.
And while there are yet more indicators of intelligent design in the summary, does it thus far seem like randomness in play, to you?
Is there a Masonic connection to mass shootings?
Finding a Masonic Square and Compass emblem
The Masonic Square and Compass are most recognized of all Masonic emblems. Since it depicts a Mason’s (or, if you prefer, a Carpenter’s) Square rule, the first thing to try was to find right angles in the mish-mash of lines. Actually, this is how Proof Four came to be, and so we already have several good places we can look. Once having selecting a right angle for consideration, the next step would be to plot a center axis line bisecting it to form two 45 degree angles. This will become the vertical center axis of any resulting compass.
Next, one should seek to see if there were logical locations along that line from which two more lines could be drawn in mirrored angles away from the centerline to each side to create compass legs. To be valid, both lines would need some logical means to find an acceptable ending location to produce two legs of equal length. This might be determined by landmarks, or by completing a 3-D leg using a second inner leg line set devised in the same manner as the prior legs, and a like process for the square. We need to end up with something which looks very much like a logo emblem instead of a stick figure scratched into sand.
As you can imagine, this is a tedious process; it took a little over two days to find what I felt were all intended present; again 4 such emblems, likely one for each competing architect or group of designers. These are shown below, this time with the orange lines in place, along with the single stranded (lineless) shooting mentioned in the baphomet section, herein.
Once more, a limited universe is involved. In fact, it only took some 26 lines (image) created by roughly 64 shootings. All lines had three shootings, but 14 lines shared shootings in common, reducing the total involved to less than three times the line count. Sum those two numbers and you get… our old magic number 18. Another indicator these are intended and not random emblems.
This is the smallest and one of the easiest of the four emblems to find, taking just a few hours. In the image below we see it formed by the yellow line of the left portion of the square. The right portion should also be showing a yellow line as it is indeed a perpendicular. Must have failed to turn it on again after turning it off to see if there was more than one line present, as some red shooting lines are sometimes hidden by the wider yellow. Let me apologize in advance: the verbal narrative tends to be complex in nature, but is quite required if someone with an understanding of basic geometry is to see how the shapes were arrived at without having to make assumptions or guesses based on visual clues within the images. On the other hand, some people will find the images cluttered and confusing, and the text easier to grasp. Used together, issues in one should be clarified by the other.
From this was drawn a center axis at 45 degrees. Nowhere along this axis did anything jump out at me to suggest a logical compass tip, so I instead tried to find any two shootings which could establish mirrored angles at some point along that axis to ‘find’ the tip that way. Only two shootings (both blue) allowed this to happen, and a third shooting (yellow) on the right compass leg verified it legal. That same shooting, and yet another yellow shooting near the center axis, together suggested a logical upper line for establishing the square in 3D. Though not intersecting with the anything else used as a reference point, the line was indeed parallel with the lower right square line. Establishing a green guideline at the intersect with the axis by the line created by the two yellow shootings did indeed lead to another shooting beyond the image.
Another shooting line from the left compass leg had its middle shooting (blue) within the emblem area, and made establishing the complete inner line of a 3D compass easy. The other (blue) shooting on the first compass line, allowed reflective guidelines for the end lines of the square at equal distances, two more shootings helping in that effort (one off image to lower-right). This is fairly typical of how I attempted to find the other emblems.
What is atypical about this emblem is a theme suggestive of a different designer than the others; schools. Each line seems to start, end at, directly cross over, or is within about 200 feet or so of dozens and dozens of schools from K-8 through colleges, including several major university campuses. The square so encounters 33, the compass 46, and the center line, 11 more to total 90 in all. This sums to 18; 33 = 6, 46 = 10, 11 = 2; 6 + 10 + 2 = 18.
Before we go: not shown because we are viewing so close in on the map, is that the left compass leg guideline, extended for the purpose, does the same mysterious thing as the orange lines, yet to be revealed.
This works much like the last, so much so that I’ll not start with a detailed close up, nor describe blow by blow. But there are some unusual additional confirmations which imply a different architect than any of the others, and that’s where I’d like to start. The two images below reveal the alignments with existing perpendiculars, and the unusual confirmations. The first thing to note, perhaps, is that it is upside down (not to someone in Europe), and its pependiculars literally frame the Eastern Seaboard and Northernmost part of the U.S., leaving the compass to point at the middle of the country as if piercing it.
Marching to a different drum, this designer elected a unique theme; almost all corners and endpoints lay at a point having something to do with transportation or movement (of water). The two compass legs and several of the corners (not all shown) end precisely on roadways. Two of the corners end on railways. One of the bottom square corner (perpendicular) and the inner 3D line of the compass end at water. Confirmation of intent, and perhaps a clue as to the identity; someone big in the transportation industry, perhaps? Again, in final note, and not shown, the right leg guideline of the compass does the mysterious orange line thing when extended toward Europe.
This one was problematic, and its solution again implies a whole new architect. The issue was this: the actual perpendicular being tested (off screen to the lower-right) failed to be useful; it supported no emblem. But I noticed a shooting line that seemed perpendicular which was NOT yellow. At first I thought I had made a mistake and missed one, or had accidentally deleted its yellow companion line. But no — it was simply beyond the acceptable error of .1 degree of arc, it being hard to visually judge such small differences.
And yet, the line was begging to be considered, because in addition to looking temptingly perpendicular, it also ran usefully parallel with and atop of the edge of a large dam (see smaller image in the right margin). So I wondered? What if the designer had intended to use it, anyway? After all, I had no way of knowing what degree of error they deemed acceptable.
I thought I should at least give it a try, and went ahead and plotted a center axis test line (not shown) and looked along its length for an appropriate compass tip. What I found, changed everything. The image montage below summarizes the remarkable ‘theme’ findings, and more.
There was indeed a very logical starting point for the compass, but it was NOT on the test axis line, it was about 1.5 miles West of it. So I moved the axis line to match, and then finished trying to flesh out an emblem to see if there was good result. I reasoned that if it was so intended, the validity of the effort would reveal itself true somehow. Indeed.
The montage of insets below reveal just that, and are key to understanding why I find the results acceptable. So much so, in fact, that I now additionally reason that there may yet be an intended future shooting planned to create the very line I manufactured, but which like the one over the dam, does not actually bisect with the perpendicular to create a right angle, and thus does not spoil the count of 18 such relationships from our prior Proofs.
Indeed, this may be a very valuable find, as it MIGHT allow prediction of a shooting event, and perhaps even its prevention.
Quick montage review: The yellow line at top-right was the first attempted test center axis line, and the green line is the new relocated but parallel test line, which goes to a mountain actually named Initial Point. When you hold a compass, it is the initial point of control and placement of the compass; the handle of the compass. Now the left leg which was discovered to meet requirements would seem to represent the one with the point you stick into the paper. We deduce this because the shooting is at a hole in the ground (quarry) and that place is called Permanente (when you stick the compass down, it is permanently affixed to the spot until you lift it). More: the actual shooting took place at the Engineer’s Trailer where they very likely USE A COMPASS with their quarry maps. Confirmation of intent.
The other leg lands in the center of a square field (implying paper?). Note the terribly faint green line (of several) attempting to show the high-tension power corridor running nearby… at exactly the same angle to the inner leg as the two inner legs themselves form… and notice therefore, that the road way is perfectly placed to form an isosceles triangle just as would be a line drawn between the two legs, were the power line the other leg; a mini duplicate of the larger compass. More on that, shortly.
This in turn allowed trying to find the inner line for a 3D compass. It worked out, after finding the only place where shooting lines would form mirrored relationships, to be dead center of a circular irrigation pattern. When you spin a compass, you create a circle; a confirmation of intent. Next, I finished the square by extending a guideline from the yellow perpendicular at the point where it bisected the center axis line, and discovered it indeed intersected with a shooting (well beyond the image) to qualify. More intent.
But what about rendering the square in 3D? Simple: the complementary line had to be somewhere below where the yellow perpendicular met the new axis line. Again, scanning the axis line finds the logical place; an upside down pyramid (montage). A significant confirmation. And the ends of the square were easy, as there was a shooting (also beyond the image) which gave a nice proportional appearance. Implied intent.
And yes, the orange line thing happens here, too, it being once more the left compass leg which does it. A couple of additional confirmations are also present. This emblem, like most, is not aligned to North. However, it has an unusual 20 degree angle on the compass — all the others have fractional elements. At that angle, if one chose to lay the compass flat on the map as drawn, and then flip it to the right such that the Initial Point and right leg remained in place,it would then point North… exactly, even considering magnetic declination (which varies depending on where on Earth you take the reading) present at the new location. More: 20 degrees divides into 360 18 times, our magic number.
This is, I believe, incidental to the intended reason for the curiosities in the centermost portion of the montage; the central ‘mini compass’ duplicates this very feat (a flip). The leftmost faint green line from the left leg is the line between the original full size compass legs — the radius of any arc the compass might be used to create. That line measures 176 miles. The faint yellow line in the inset is 176 Meters along the radius of the mini compass, and then turning Northwards, perfectly bisects not only a portion of the farmer’s field (forming three virtually identical rectangles), but the mini compass, itself, becoming its central axis line. At the top of the roadway, we see a second green line which is 176 yards long, which ends exactly at the edge of the northbound road which bisects the powerline precisely between two towers, one on each side of the road. I believe these oddities are our clue to flip the compass in order to get it to point North, the same direction the road is going.
Mind you, all of this was discovered well after ploting and measuring the emblem. I am not making this stuff up or reverse engineering results somehow.
Again, the last one is both large and arrived at uniquely. Thus far, not one of the emblems was properly aligned to North as viewed in America. There were only two perpendiculars that even came close to enabling such an alignment, but neither of them allowed emblem discovery. Then I noticed the little hiccup in the Northern Border with Canada just about dead center of the U.S. of A. It sticks up just enough to suggest the tip of a compass, or a pinching action of two fingers. And, it was right above our friendly, lone, lineless shooting. What if that was the tip of a compass? The simple answer is, it was… but it involves no obvious or pre existent right angle from our earlier proofs, and is quite minimally defined. Fortunately, we will find it verifies itself despite these ‘missing’ construction elements.
As it happens, an axis from that shooting to the Lone Star College Shooting creates an emblem alignment which is pointing due North and considers allowances for magnetic declination. So this emblem is correct for use by an American, probably someone right there in Texas, methinks. With no initial perpendiculars, I had to rely on shootings and shooting lines to come up with all remaining emblem constructs. The compass outer line was easy; the right leg has four shootings, the fourth (white square) hidden just beneath what seems to be the last one at the bottom. The left inner leg is defined by three, and of course, once you have one leg you know where the other is because it must perfectly mirror the opposite side.
The square was harder, suffering most due the lack of perpendiculars. The lower right side is established with two shootings along its guideline, and confirmed by a single shooting on the opposite side near the tip of Texas. The upper right if also formed by two formation shootings, but the left side has no confirming shooting. Again, if you know what one side is, the other side must match, so that should not be a problem. But I’ve been continually amazed at the consistency of the baphomets and emblems, and how when it seems something is not right, it turns out I’ve missed something there all along — so I’m tempted to think some future shooting will take place on this line, too. The end lines are found using two shootings on the right and a single confirmation shooting on the left.
Two more unusual things about this emblem in addition to aligning North: Our friends at Remington are back once more with highly suggestive positioning, including a third location in the New England States. I am tempted, therefore to believe that the lone baphomet which also had the Remington sites was designed by the same Warlock, and yet, that baphomet was not the one aligned North. This adds to the mystery of the meaning of this remarkable and consistent ‘coincidence.’ The second unusual thing affords even more confirmation… because this time, there are four guidelines which extend to Europe to do the orange line thing.Intention, intention, intention.
Four emblems, all different, and yet the same, in that;
a) like the baphomets, they all shared the same original shootings and lines, defying random chance;
b) like the baphomets, they are therefore all interconnected;
c) like the baphomets, they all establish guidelines which do the orange line thing;
d) they each have their own unique method of cross verification; transportation, shapes and places, schools, and perhaps, Remington.
I again ask; does this seem like random chance, to you, or is intelligent design involved?
What does the occult have to do with mass shootings?
Summary, and additional bonus proofs: the magic works
So not only do we have dozens of random shootings which happen to line up in sets of three or more to make straight lines with doorway-to-doorway-to-doorway GPS-level accuracy, but we have two different shooting universes of such lines which share many of the same shootings/lines to form four readily identifiable Masonic emblems in one, and and four satanic baphomet symbols in the other. Each symbol tends to have its own theme or characteristics to imply four different designers, and all symbols have a symbiotic relationship with the orange lines with an identical but yet-to-be explained proof of their own. This should be enough to convince anyone that mass shootings are not random events, but carefully planned, even though some of the shootings may indeed be naturally transpiring and truly random in nature. We’ve discussed in earlier Proofs how a design can incorporate a pre existing natural shooting into a line with added planned shootings.
But there are still additional proofs or mysteries to reveal within these symbols which drive the intelligent design point home; things which reveal some of the ‘magic’ in play by virtue of extreme care and attention to detail in their design and layout. Some of this is already seen in the themes, earlier mentioned. But there is much more than just that going on. Examples:
Examples of Magic in emblem TWO:
Emblem two has some additional special properties which defy coincidental happenstance, and they relate to one of the purposes of a compass and square, which is to measure things out with accuracy. Emblem two does this with uncanny consistency to an observable rule set. The image below shows a closeup of the emblem and the national view of it. Remember, the yellow lines are 90 degree right angle lines, and that because they are on a sphere, they tend to curve visually, and even though two lines my be parallel, they will eventually converge when upon the surface of a sphere. I’ve added additional colored lines to show some interesting ‘magic’ taking place which absolutely defies chance.
The inset image affords three new colors for key lines to be evaluated, each offset from the line it is measuring so you can see the original as well. The blue line at bottom is the radius of the arc formed by the compass, and the adjacent red line is the diameter (not the same thing as the radius/diameter of a circle created by rotating the compass). The light blue line is the measure of the thickness, or side of the Square, and the purple line represents the gap in the outer perpendicular yellow line which stops at a shooting in Washington D.C., even though the line serves as a chief guideline to forming the Square.
The labeled lines reflect the actual original line being measured to prov