Category Archives: Abuse of Power
Rare is it that a given Targeted Individual won’t have reason to believe Police are involved in their targeting. And yet, they were not… not officially. Here’s the why and how of it…
copyright © 2018, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
Color of Law; Police abuse of power in personal agenda
In the two decades of working with thousands of organized stalking victims and victims of other forms of targeting, the single-most common complaint is the suspicion or outright experiential evidence that multiple Police Officers are complicit in the affair. If not the Police, then some other law enforcement or intelligence agency… or both. Indeed, this has been my own experience in two of three different episodes of personal targeting over a 15 year period. In fact, multiple agencies can be involved simultaneously; Ive gone up against as many as five LEA, plus FBI and CIA assets, bounty hunters, and military intelligence in a single targeting. This has been documented in my various books showing how I beat them in the end… but it was no cake walk.
This is a problem for more than the obvious reasons. The most obvious is, that the very authority who should be responsible for investigating and protecting against such crimes, cannot be trusted by the TI to help anyone but the perps behind the affair. Calling Police for help is almost always like asking a burglar to help you secure your home. Secondly, when officials of any kind are complicit, the victim is then entered into the official record as being mentally ill, or in a worst-case scenario, guilty of some convenient crime. Even when not complicit, going to Police about targeting is likely to have the same result; they simply do not want to believe in the Boogeyman, and see anyone who does as a mental case. In fact, stalking is designed to get you to go to the Cops for just that reason; they want it on record that you are mentally unstable. DON’T DO IT.
But there is a DO list! Do video and log all interaction with LEA or have a witness from whom you can get a written statement immediately after. It will help keep Police somewhat confined in their actions against you. The more you collect such material, the less likely are they to risk any useful action against you; you can illustrate a pattern of harassment. Do make copies and hide them well, off site. Tips in my first book, The Professional Paranoid on all of this.
The worst example of the problem from my client situations was a Navajo Indian, an ex Green Beret, who was targeted after his daughter was kidnapped by a Satanic Cult with all the earmarks of a CIA mind control operation. Within weeks of going to authorities to seek help, all manner of problems beset him. Traditional surveillance and stalking, and electronic targeting, to include V2S was the least of it. When he began using my advice and his military skills to determine the players and go after them aggressively, it took a turn for the worse: suddenly, his mortgage was six months in arrears and his house was being foreclosed, all his credit cards were maxed out and past due, his bank accounts emptied, and there were outstanding warrants on him for assault with a deadly weapon and skipping out on bail. He was, in fact, declared ‘armed and dangerous’ with an all points out on him. This was all done by back-door computer manipulation of data files by professionals of CIA caliber.
He took additional advice from me and then went underground to organize with other ex military buddies and Navjo friends, and went black in order to wage an unseen war against the enemy. As I never heard from him, again, I must presume he failed in the effort, or was successful to the point of having broken enough laws that he needed to remain underground. I had, in fact, advised him not to contact me for such cause. But, as I have said, these are merely the obvious problems with this particular aspect of targeting.
The other shoe that usually falls…
Perhaps the second-most common awareness about stalkers is that they seem to regularly consist of a lot of Masonic types. This is often determined when getting a good close look at them or their vehicles; the Masonic emblem, or some similar fraternal order emblem, is found in evidence. Usually, it is either a sticker on a car window, a pin on clothing, or a ring on a finger. I myself have seen this in my own targeting, the one incident where true gang stalking was involved (as opposed conventional targeting with general surveillance and dirty tricks).
After guesting for four hours on Coast to Coast with George Noory to talk, in part, about my new book, MC Realities, I ran into the Masons almost overnight. I had mentioned on air the involvement of the fraternal organizations in gang stalking, and how they had evolved from the Knights Templar and their exposure to the satanic Hashemites and Assassins of the Middle East during the Crusades. On air, of course, I gave my name as H. Michael Sweeney, my ‘pen name.’
Two days later, I was at work where I was managing a gas station while investigating the Oil Industry, infiltration style. It would result in two forms of targeting, the first of which was by the Masons, that second day. A man bought gas and elected to come into the office to pay, where I was at the time. He waited until I was the only one present, and then offered to pay, holding out his fist, palm down. It was only a couple of dollars in gas, so I assumed it was a handful of change. Wrong; it was a message to be delivered.
NOTE: the second was targeting of the Station itself by a terror cell, of which one of the participants recognized by me as a helper to two of FBI’s Top Ten Most Wanted and two other Islamics… and FBI agent who had been earlier involved in the my own targeting as earlier described. It was, in point of fact, to be yet another False Flag operation, later described by President Bush as Gas Station Tasking… which I thwarted. Arguably, the two targeting incidents might be seen as related, but even if so, it is unimportant, except for the fact that it illustrates that one almost never quite knows for sure why one is targeted, and who really lays behind it. This is described in my wordpress home page, if you wish to learn more.
Placing my hand beneath his, he opened it, and instead of coins, a money clip fell into my hand with a wad of Hundreds. “Take what you need, Mr. Sweeney,” he said. My name tag simply said “Harry.” He had a very wry, knowing look on his face, which slowly turned into a smirk as I manipulated the money clip to retrieve a single bill. In doing that, I discovered a gold and jeweled Masonic emblem on the other side of the custom-made silver clip. A broad grin overtook his face, to the point of becoming silly.
“Interesting how some thing have more than one meaning,” he said, as I returned the clip and fetched his change. That day, when going home, There were three of them outside of my Condo, and several cars with Masonic emblems in our parking area, none of which had ever been seen before. I ended that stalking by using the methods in MC Realities, methods that many Tis would be unable to employ unless doing so upon first targeting, as had been my situation. Once targeting has been ongoing for some time, the typical TI no longer has access to the needed resources for such a defense. The one remaining defense is found in an earlier post.
In MC Realities, I trace the evolution of Mind Control technology (Political Control Technology) from the time of Adam and Eve (the Serpent’s deception was the earliest form of controlling thought… the same version of it as we see today in media manipulation), forward. The Templars, after being ordered destroyed by the Pope for having discovered their Satanic practices acquired in the Middle East, went into hiding. In time, many of them hid within the Stone Masons Guild, and eventually, took it over to form the Freemasons as we know them, today.
Hedging their bets, should they be found out a second time, they formed splinter fraternal organizations, as well. Any group with any of these words in its title… Fraternal, Ancient, Order, Ordo, Lodge, Temple, Grand, Sacred, Rite, or Knights (and similar)… is very, very likely a fraternal organization with a Masonic organizational construct… and at the higher levels, at least, closely affiliated with the Freemasons if and when it becomes convenient to the parent group. Therefore, it is easy to involve small armies of ‘helpers’ if someone is deemed a target. It is important, however, to understand that the rank and file lodge Member who may be induced to participate, has zero true knowledge of you or the purpose of the targeting; they are simply ‘helping a friend’ to solve ‘a problem.’
I end this section with a simple note: all Masonic systems are quite steeped in ancient mysteries of the Middle East, and beyond, typically focusing on Egypt, Syria, and the Holy Land… with a touch of the Sub Continent (India, Nepal, etc.) and Far East.
The two shoe laces are tied together…
This is where it gets interesting. Most big city Police are encouraged to join the Fraternal Order of Police (FOP), and it is indeed Masonic in structure. FOP, for instance, employs the Masonic all-seeing eye of Egyptian fame in their logo, which is a five-pointed star with a circle bisecting the points to create five triangles shaped like the Compass of the Masonic emblem, also the shape of the ancient steeply-angled Egyptian Burial (pyramidal) obelisk used for commoners’ crypts. There was additional heraldry-like art akin to European styling in the center of the star, shapes quite like those of most Police Badges, and incorporating an Eagle and other symbols. In other words, Police departments not only adopted the Lodge system almost universally, but did so to the point that their badges reflected elements of the FOP emblem. Almost all Police badge shapes generally post dated the FOP affiliations, underscoring the link. The exception would be Sheriff stars, and yet, that shape is also of ancient Masonic importance, in both the upright and upside-down (satanic Baphomet) versions.
If that were not enough to convince you, let us take a look at the Police Department of New Orleans. New Orleans existed as a city at the time of the Louisiana Purchase from France, in 1803. The first Masonic Lodge (a French version), was established there in 1793, all its members speaking French, and some Spanish, but no English of note. All the better to remain secret and mysterious to Americans, when they came into possession. But to fully appreciate New Orleans in the equation, we have to first look to New York.
In 1915, the Fraternal Order of Police established their first Lodge, there. It spread from there to many other cities in very short order. The FOP was not intended just to be a Lodge system, however; it also took on aspects of Unionization, a kind of bargaining force with the City whenever Members felt that Cops were not getting a fair deal from the Mayor. In many cases, in fact, their bargaining strength was augmented by the power of the greater Masonic power structure, a formidable force at the time.
Over time, actual unionization was also achieved in almost every major city, usually through the Mob’s control of the AFL-CIO, making it easier to arrange for hijacking of intrastate trucking or of dock cargo without anyone ever being sent to prison. But that’s another story. Ask any retired Union trucker or stevedore from Jersey. I’ve heard the same from 1975 Oregon members. The importance of that will explain to some Tis, those who believe they were targeted because they reported illicit drug operations or crimes which might be related to Unions, are targeted by Police. Additionally, of course, CIA sanctioned drug operations are protected by Police, as well. Thieves in bed with thieves, the bed made by the thieves.
Though New Orleans under the French had a Police Department as early as 1796, it had no Police Department for rather a long period of time after it raised the American flag. It was instead ‘policed’ by a vigilante system until 1853, when they formed their first ‘American’ Police Department. Almost immediately, they adopted the ancient Cresent and Star (upside down, larger star) as is common to Islam, as their badge. It is still in use, today, and appears on their cars, as well. Well before the FOP had even existed, this Department was already incorporating Masonic symbology directly in its badge. This is better known as the Shriner’s symbol, today… the Shriners being a Masonic fraternal lodge system.
So, clearly, the Masonic influence and ties are present within most Police Departments. Cops form some of the strongest bonds between individuals in service outside of the Military, sufficiently strong, in fact, that if one of them asks a color-of-law favor of another, it is not likely to be turned down, and certainly unlikely to be exposed even if turned down. Therefore, it really only takes one Cop being approached from a fellow Lodge member to recruit several more for any needed aid, even if that request came from a lodge in another city. Ergo, escape to another city tends to never result in escape from targeting.
NOTE: That is why the Free Will Society exists; a solution to virtually all forms of targeting. Please join and support (donate/promote) our effort to create a targeting free intentional community of our own, and our other advanced programs planned for the future. If you are reading this, you should immediately join the Society and give it full support. It is a far more valuable TI resource in terms of programs and goals than any of the so-called ‘TI groups’ out there, today, the bulk of which are nothing more than information and disinformation mills.
Please: you owe it to yourself to visit freewillsociety.wordpress.com to learn more.
Yes, there is a third shoe, one of special interest to those who feel the intelligence community lays behind their targeting. Every major Police Department in America has in place assets loyal to the Central Intelligence Agency, and many Officers have military intelligence backgrounds. Usually, you can count on some of them holding key positions within a given city: the Chief, the Public Relations Officer or Spokesperson, the head of Internal Affairs, the head of the Swat Team, and/or the Head of Personnel. From these posts, especially through IA, they are able to find bad cops who can be blackmailed into playing ball on an on-call basis, for any kind of dirty deed, to include color-of-law abuses such as is common to targeting. Don’t forget CIA drug running operations.
If that were not enough, there are similar, but far looser ties with FBI, Homeland Security, and the US Military Intelligence Agencies (and in some case, others, including the United Nations, and even Mossad). These generally entail the network of Fusion Centers and Centers for Excellence*, and special programs such as Community Policing and the Strong Cities Initiative/Network. When you consider that most all of these agencies use computer software based on CIA’s PROMIS data base management system, which is nothing more than a data base engine with a back door built in… almost any form of hanky-panky is possible. Ergo, the Navajo Beret Syndrome.
* Search for ‘Centers for Excellence + Homeland’ to see why I include it, here. All these items work together to collect, evaluate, and share information on (persons of interest). They operate as one big networked spy tool with usefulness in organized stalking which can easily be misused by anyone within LEA who has access.
So, even if Masons are not involved at all, Police can still be brought to bear on any given TI with the same level of efficiency, and in fact, the FOP can be leveraged into the equation just as easily, in reverse manner. Will the average member of the FOP, the Masons, the Police, or any of that long list of Agencies be aware of any of this? Absolutely not… not unless they are higher on the food chain. Then, of course, they won’t be admitting it, either. Complaining about it gains nothing. Knowing about it, and understanding it, can mean a lot, however.
You may not be able to beat it, but when the mystery is gone, its just another damned nuisance to deal with, and another reason to avoid trying to rely upon Police for help, unless you know one you have great respect and trust in. I was lucky. I had a relative who was a Cop in an uninvolved LEA, and he was able to help off the record in very useful ways. I also had help from ex FBI friends with back channel access, of like value.
We can’t all be so lucky. And if you are a TI, you know luck is not your strong suit.
Fake news, tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations by Trolls and Bots are not the only weapons they use to dumb you down and pump you up with their version of truth. Vanishing is their latest trick.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The (fake) news media dilemma
Fake news and Web tracking and targeting, subliminal messaging, repetition, distraction, and psychological manipulations are not the only weapons they use to dumb you down and pump you up with their version of truth. It is not just Trolls and Bots we have to worry about, now. Vanishing is the latest trick used to conceal the truth and promote the lies.
I’ve written before about how television mainstream dumbs you down with clever psychologically aimed technical tricks in the actual image… largely relating their use of subliminal messaging, deliberate distraction, and overload. The general purpose being to further reduce the actual news you walk away with to the simplest of boiled-down sound bites… just the ones with their take on the news shaped for you according to whatever bias the network has at management level.
Elsewhere, there have been excellent examples of the use of NLP (Neuro-Linguistic Programming), also employed by broadcast media. It involves careful wording as well as clever body language to project the intended viewer/listener response to the message, within the message delivery, itself. It has been shown to be so powerful, a well trained user (a stage magician and hypnotist, who must rely on such deceits), was able to deliberately speed past a Cop and then use NLP to leave the traffic stop without the Officer even remembering why he had stopped him in the first place.
That kind of mis and disinformation borders on mind control, and in fact relies on mind control technology, psychological methodologies, and MC research by the likes of the Central Intelligence Agency. When the great bulk of media is controlled by fewer and fewer mega corps, and their corporate leaders tend to be like-minded politically, you get the double whammy of biased news and fake news (propaganda). That’s bad enough, but this article is about another dirty little trick… a bag of them, actually, used by all forms of Media when presenting ‘news’ online.
And, of course, we still apparently still have to contend with CIA’s Operation Mockingbird, the installation of CIA operatives within the media industry to help shape news to their preferred version. That, too, is something I’ve written about, at least in terms of its origins and history, and I’ve even been referenced as a resource in a more ‘official’ industry review of that topic by The Reporter’s Committee for Freedom of the Press. But now, we see, actual ‘retired’ ‘once-a company man, always a company man’ CIA officials are becoming investors in and on-camera commentators in mainstream news. This Clyde Lewis Ground Zero episode reveals how serious a threat the placement of intelligence community actors in media actually is.
What News is supposed to look like
All news is supposed to contain the 5 Ws… Who, What, When, Where, and hoW. Ideally, we also need to know the S and M… the news Source and the Meaningfulness, often defined by Motive… the Why. That is supposed to be factual Motive, and not speculation, unless clearly presented as speculative commentary. Lately, that’s the greatest sin Media is guilty of; too much ‘news,’ today, is actually mere commentary… the propaganda version.
Generally, for some strange reason, it is also rare to get all those points, especially online. The most critical things useful for research tend to be left out, making it hard for pundits and anyone trying to chase down answers to hard questions because a given story fails to ‘compute.’ That is critical, if one is to find out more, and judge for one’s self what is true, and what is fake. This is particularly distressing when the potential for a conspiracy or cover up is apparent. While Sheeple don’t even see the glaring holes in the official story, people who think for themselves really want to know why those holes exist.
But we ‘conspiracy theorists’ and politically aware non sheeple are thwarted at almost every turn. Take for instance, the WHEN. It is extremely rare in online news reports to find out exactly when an event took place… esp. useful to insure the same news event you find is the one you wanted, because often, you might have two identical sounding stories in the same city, in different time frames. Most searches are best made by searching on the (event key details) plus the year, and perhaps, month.
But many reports do not cite the year, at all. The Web is smart, though, and it knows when a given URL was created. Unfortunately, many of the larger online news sources use a kind of ‘feeder board’ URL created way back when, which is updated with current news, only, older news dropping off. While the Web remembers what the page looks like when the story you are looking for took place… that story is no longer there when you go to find it. While you can search the archives if they bother to offer one, and PERHAPS find it, that is just one hurdle in the search.
Once you do have what seems to be a correct story’s article, it is amazing how many news reports fail to include the date in the byline at the top of the page. So you have no way to know when the person writing sat down to write the story. But even with a byline date, you still have a problem: is that date the date the news took place, the date they wrote the story, or the date it was posted? It can be any of the three.
Some stories are updates to older stories, so the byline is meaningless unless the story itself indicates the actual When it took place in the text. THEY SELDOM DO. Instead, they just say something like ‘Last Tuesday.’ Great. What day of the week is the date of the byline? Now I have to go search that out, to make certain of the When. Your average Sheeple is not going to bother.
This problem also exists elsewhere in the remaining Ws and the S and M. At least one such detail is usually omitted, and all-too often, several. Sometimes, it is something simply not yet learned by reporters, but too often, it is clearly just not deemed important. All too many bylines even fail to tell you who wrote the story… so you can’t email them and ask for missing information. EVERY print article in a newspaper tells you this information, but for some reason, the online version seldom does.
Message distortion when relayed through many people
Dumbing down online is easy. It relies on the known scientific problem which transpires when a series of people relay a message from one to another to another, etc. It used to be in schools, that one of the first things they taught was this concept… that you you have to take care when relaying information. You have to listen carefully, and then just as carefully repeat it. The problem is, each person decides what is important enough to be carefully repeated, and tends to reword it for ‘simplification.’ So the message first stated has little resemblance to the message last heard. THAT is not being careful, it’s being careless.
Online, information deemed worth sharing is constantly relayed in social media in a quite similar, but an even more careless manner. Each person in the chain tends to introduce it with their own spin or commentary, advising what they think the takeaway is, or should be. They then (hopefully) provide the URL to the original (the careful part). They might also create or add an image or meme which underscores their takeaway thought. That is all in good, but…
Sheeple don’t bother to click on the URL and read the original story, and they simply ‘learn’ the takeaway point of the previous poster. This is why Memes can often be dangerous. Especially when the creator is being deceitful or dishonest to the truth. They know that a false message repeated some 20 times will take root in the average Sheeple’s mind, and become adopted. That is especially important in political messages, because today’s social media is decidedly biased, and decidedly deceitful, even to the point of using paid trolls and automated bots to insure you are inundated with the preferred take aways.
This is why people who think for themselves always click the link or do a little extra search before they hit the SHARE button, and add their own takeaway. Is that you? Are you like me, spending roughly 50% of your time inspecting and then correcting other people’s wrong take aways and falsehoods? Or, are you part of the problem, simply passing it along? Baa… baa…
But there is a bigger problem, one which at least seems conspiratorial, and relies on the above Sheeple foibles and the omission of Ws, etc. For some reason, mainstream news sources seem to be deliberately making it difficult for you to access news, and difficult to relay, on your own; they would prefer to leave that to the professional trolls and bots you think are your online friends.
Something is very wrong with this picture. Lets take print media and look at how they operate outside the Web, and compare that to how they are now starting to operate on the Web.
A newspaper runs advertising to pay for their staff and overhead; it keeps the doors open, and allows them to grow and invest in special investigative projects. They charge for subscriptions and for individual copies at news stands based on the cost of the printing and distribution process, and materials; the ink and paper. That’s why newspapers are relatively inexpensive to buy. It used to be that the online version, therefore, just had advertising… there is essentially no comparative cost to put it out there and for you to access it.
But now, online, many newspapers, even small local ones, are telling you that you will need to subscribe or become a registered user to their online version, or pay a small fee to read the article… or that you may read this one, but it may be the last one you can read for free (relies on your cookies, but if you turn them off, you they will tell you to turn them on to see the material). Of course, once you do any of that, you’ve just sold yourself into another dozen marketing lists, without warning or compensation. But that’s not all.
Suddenly, many media outlets online (radio, networks, print) are using something called Cloudflare. That product is a kind of ‘protection’ against certain abuses… a bit like an anti hacking or virus bot. But it does something else, as well. It also prevents anyone from copying and pasting a URL into a social media post. WHY? In the past, getting your URL spread about was a good thing; it brought them more viewers, which increased the value of the advertising opportunity for their Web pages. When did they decide they didn’t want more readers, and why?
Where the Conspiracy comes in
Sure. You can call this answer a theory; a conspiracy theory. That is what it is, plain enough. The only way the above sins can be excused as desirable is if somewhere, someone important and powerful within media and in political realms, decided that it was advantageous to dumb you down, and limit your ability to rely on URLs to relay facts and correct people when in error. It is an insurance policy to protect the ‘integrity’ of the versions being spread by the trolls and bots.
I mean, when your read some crap someone has posted which is to your understanding just that, a lie or false belief, you should be able to go find a news article or other authoritative source online, copy the URL, and paste it into your reply to prove your case. When you are trying to educate someone on how you feel about something, you should be able to do much the same, to prepare your post or meme… have a supporting factual link to go with it.
Someone does not want you doing that. They want you to hear something said 20 times and accept it as truth, with no way to verify it, or refute it, if false. There is only one person in the media industry who fits the bill. If you are a Sheeple, you will recognize his name but not realize just how powerful in media he is, or in political realms, and how deceitful he is. I am speaking of George Soros.
It is that simple. When most of us rely on TV news, we only get one slant (liberal, usually, conservative if you go out of your way). Because of TV’s own special dumbing down tricks as earlier referenced, you will walk away with a very encapsulated message with is has no actual understanding associated with it. Then, when someone puts their slant on it and you get hit with that 20 times, it becomes your slant, and people like me and others who prefer to think for ourselves, are increasingly finding it difficult to correct any errors.
Worse, if you do think for yourself, you may not be able to learn what you need to make an informed decision, up front. Heaven help you if you are trying to investigate what seems like a conspiracy theory, because of glaring holes in the official story. Obscuring the true story seems to be the way of things, today, so just ‘move along, folks.. nothing to see, here.’
When you add all this to what is taking place in the public school system and in higher education (liberal indoctrination), your children will think this is the way it is supposed to be, and whomever is in power when they are adults will be able to do and get away with whatever they want. They will dictate to them what to believe, and it will be believed. The notion of thinking for themselves, and of distrusting and challenging government will be foreign concepts. They might as well be called the 20x Generation.
The ’Snowflakes’ on the left are already a part of that group, unwilling to listen to facts or reason, and repeating what they are told to believe. I, for one, am not willing to pass the reigns of our nation’s future over to them, in their current state of mind. I’d rather have an armed revolution, if that is what it takes, to end their madness for them. Constant outrage based on lies serves no one’s best interest, except at the top of the food chain.
So my last question for you is this: do you want to be a Sheeple morsel for Wolves like Soros and his elite political friends, people more interested in Globalism than what is right and moral? Or do you want to be a think-for-yourself consumer of actual news you can easily access, rely upon, and use when talking to others about things which matter to you?
If the later, you had better start complaining to media, and to politicians about it. You might even want to consider taking legal action or starting an initiative ballot, if your State has that option, to write laws forcing journalists to adhere to journalistic standards and to make their stories available more appropriately. You certainly ought not simply be sharing what is being fed you currently without verifying for yourself it is the truth.
Else we all become 20xers… or we have that revolution, the least desirable of options.
Thanks to the Post Office, now anyone can know what’s in your mailbox, automatically… including of course, anyone in an alphabet agency. It is just another way to track you and criminalize you if deemed convenient, in time.
copyright © 2017, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Quote freely, links requested. Please comment any such repost or quote link to original posting.
The idea is you register online with USPS for the FREE notification subscription service, and they then photograph the mail to be delivered to you each day, and email the images to you before delivery; that way, you know if something is stolen or lost and NOT in the delivery, and can plan on getting expected items. It is tied to other services, as well, such as package notifications, tracking services, stamp purchases, etc.
1) This is the federal government we are talking about. The FBI, CIA, and a host of other alphabeticals would have no trouble whatsoever accessing this information. There is no indication that such information is not retained indefinitely, and no privacy statement which alleviates concerns over it being used against you down the road should you become a person of interest, or a trouble maker such as a whistleblower, activist, or other targeted individual.
2) The system is achieved with online registry, and is handled by email, currently with no truly secure process for verification of the applicant or notification of the addressee that a subscription has taken place. Stalkers, private investigators, suspicious spouses or ex spouses or lovers with an axe to grind, or anyone else with minimalist information about you and where you live could sign up pretending to be you… again to include someone working for a government agency who could not be bothered with a warrant — knowing that they could later get a warrant and legally go back in time to ‘duplicate’ the effort in a manner which leaves no proof they violated your rights, earlier.
3) this means that mail must be separately sorted one more time by someone into individual stacks to ‘pose’ for the photograph, and then to take the image and email it… or the entire automated system must significantly modified at both the hardware and software level. Both are at great expense and will cost USPS more red ink… and eventually that cost will increase the price of postage for everyone, not just those using the service.
4) If the system is automated (and even a manual system will be, eventually), then it means EVERYONE’S MAIL is being imaged, all the time: The USPS becomes yet one more information tracking and tracing point available to the government, and under the program, anyone spoofing it.
I’m not the only one pointing these things out… though I’m the only one so far who has pointed out 3 & 4. Other privacy experts have echoed 1 & 2, variously, mostly item 2. Too many people PRESUME that government would NEVER use such a service to spy on them this way. That’s what they said about NSA and FBI when they first started.
It appears the only way to prevent anyone to spoof the system to spy on your mail is to beat them to the punch and register, yourself. However, there is no assurance in place that someone could not still additionally register an alternate email identity. We can only hope and presume there is an online software check which would reject any such attempt.
Short of not taking mail, at all, there is no defense against government use of the images, if you are a person of interest targeted in someway by an agency.
12 Step Origins
Templars Masons Theosophy Rothchilds
The 1 step solution is also useful in targeting issues
- The sermon uses the topic of powers and principalities of ancient times to frame the lesson… and both addiction/abuse and targeting are born of powers and principalities, as is all sin…
- An addict/abuser ‘worships’ their particular sin of consequence…
- A TI ‘worships’ (by constant worried attention) their targeting issues of consequence (equating to sin)…
- Bending the knee to Assyria in the sermon equates to giving in to sin…
- So (the Pharaoh of Egypt) equates to you (your flesh, the Old Man) and your inadequate will power to resist sin…
- Which in turn equates to buying into the enemy’s (sin) Press Releases (that they cannot be resisted) wholeheartedly, accepting the belief the enemy cannot be overcome, by or of ourselves…
- If you listen carefully, you will hear echoes of 12-step program dialogs! They simply borrow the truth and apply it in their own way… and with respect to targeting, twist it to meet their own ends.
- TI Defense: 30 Tips to Help Fight Back
- Why am I Being Targeted? A Valuable Question for TIs
- FREE WILL: A TIs Greatest Asset, Oft Hardest to Employ
- How a TI’s Belief Structure Can Fail Them Dangerously
- Smart Meters, Stray Voltage, and Targeted Individuals
- Smart Phone EMF App No Value to TIs
- A TI with RF Measuring Device can = Dangerous Conclusions
- 7 Tips: How to outreach, preach, or beseech if a Targeted Individual
- Free Will Haven; Targeting Free Intentional Community for Stalking Victims
- Why Targeted Individuals should not hook up with other TIs
- Testimony to Mass. State Legislature on Bill Restricting Electronic Weapons
- A Glimpse of MC Realities (from the Preface)
The Antichrist is coming, and there needs to be a throne ready for him to occupy. Thus the New World Order is stepping up its one-world government effort and increasing their visibility in the process… and translucence… which equates to luciferian Illuminati-like illumination… often in the form of giant glass pyramids.
What you will learn from this post:
- the Illuminati, Freemasons, Knights Templar, & Round Table Groups are the NWO;
- with the same fascination with ancient mysticism, occult, and numerology;
- and the same desire to associate their works with symbolism such as the pyramid;
- that they have been building pyramids seeking to employ mystical aspects similar to Cheops, the grandest of Egyptian pyramids;
- said pyramids sharing commonalities in occult alignments and numerological peculiarities;
- where one complex of pyramids is tied to a rather interesting conspiracy Egyptian in nature;
- and another complex of pyramids appears to involve hi-tech mind control;
- and is itself apparently aligned with all pyramids in Europe, and likely, elsewhere!
The Source of Illumination is darkness…
In several of my books touching upon aspects of the New World Order, I carefully point out the important role played by Freemasons and their involvement with the dark occult and, primarily, ancient Egyptian mysticism and numerology (specifically, where numbers can translate into meanings with magical powers of manifestation). I am not talking about the rank and file lodge members duped into thinking it merely a benevolent fraternal organization, but of the satanic High Masons and select Masonic operational organs which operate secretly, within. The satanic Illuminati, for instance, sprang out of and followed Masonic constructs and principles… and it was they who officially launched the New World Order movement in 1776, their goal to destroy all governments and religions, to replace with their own, providing a seat for the Antichrist. We can also thank them, and head Mason and avowed satanist, Albert Pike, for the KKK, and more.
It seems quite apparent to those who study the nature of Globalists who seek the N.W.O., that they are usually High Masons, satanists or otherwise steeped in the occult. They are often members of or work through the so-called Round Table Groups, such as the Council on Foreign Relations, the Trilateral Commission, the Bilderbergers, the Club of Rome… groups made up of power moguls who control corporations and whole industries, government agencies and military power, and media and education. These, collectively, can be called Globalists, because they seek a one-world government, which is needed in order to seat the Antichrist.
In their works, they frequently employ the same symbolism and engage in occult events right along side of others of their ilk (i.e., Bohemian Grove). While what they believe (occult) should seem silly to a rational person, I remind the reader that it does not matter what you believe to be true, or false… it only matters what they believe. If you fail to acknowledge their beliefs as part and parcel of their modus operandi, you will fail to recognize them and their works, and be unprepared for their plans as they unfold. And much has unfolded, in plain sight.
Here, I will focus on one small aspect of their existence which is quite central to their beliefs; one of their most sacred of visual icons, the Egyptian Pyramids. Pyramids, especially the largest, Cheops, are as important to the Masonic underpinnings of the NWO as is the Cross to Christians. More so, in fact, as it is far more than mere symbol, to them; it is a powerful tool, and their fascination with ancient Egyptian mythology is quite anchored in Cheops. One need only look at the pyramid found on the obverse of the Dollar Bill and its all-seeing eye, to find a stark example. Of late, for a variety of disparate but coincidental reasons, I have made more recent observations which relate to this notion… things which you can easily verify yourself by use of Google Earth.
Square one, the base lines of Cheops
Cheops is the largest of the Egyptian pyramids, having many astrological alignments and dimensional (numerological) mysteries, among them being it was said to have been located at the the center of all land mass; it’s axis therefore dividing the known Earth at the time into quarters; Cheops baselines were aligned due North/South/East/West. As the N.W.O. players gain in power and ability to establish a one-world government (needed if there is to be a single leader in the person of the Antichrist), they also become more blatantly visible as such a force, which means it more frequently relies upon ancient symbolism in its workings.
So, then, I wondered… might there be more than a few NWO pyramids being ‘hidden in plain sight’?
There are, of course, many pyramids around the World, especially the ancient stone variety. These come in two flavors; the Egyptian, the biggies with their seemingly smooth triangular shapes (as seen at a bit of distance), and the Mayan/Aztec stepped structures, a style not unknown in Egypt, and elsewhere for the matter. The Masons have only an interest in the former, it seems, but my curiosity was about much newer structures, those built with modern methods and materials. Would the many newer pyramids around the World exhibit traits similar to Cheops, such as alignments or dimensions of occult significance?
Absolutely. And why not? A glass pyramid is the perfect embodiment of both the ancient pyramid mythos and of Satan; sunlight reflecting from within and without by day, and electric light glowing from within by night — all work to render them both translucent and illuminated, with bright glaring highlights akin to the all-seeing eye, depending on one’s viewpoint and the angle of lighting/reflection. As a work of man, they are both awe inspiring and mysterious, working on the subconscious in unfathomable primal ways not sensed by the conscious mind without pause and consideration. Even so, one is apt to embrace and bask in their presence despite any darker connotations, for they are undeniably beautiful works of architectural ‘art.’
So let us pause and consider with conscious effort…
Square 2: a review of new pyramids around the World
There have been more than 50 new/modern pyramids quietly built around the World in the last several decades, most of them made of glass and metal, and strangely, more than half of them in North America. A couple are faux pyramids with incomplete architecture in and of their own, but one included a second pyramid on site, and the other had a completed pyramid at top, and so, were included in the study. The idea was to see if their base lines or diagonals aligned with other pyramids (ancient or modern), or if any three or more centers or corners might align. Examinations for numerological meanings were also to be considered, early on, but the growing number of pyramids made that effort too monumental. Still, some interesting discoveries along that line were made.
I found so many alignments (almost 150) and associated numerical translations in place that I felt it was appropriate to establish some sort of test group to illustrate the difference between conspiratorial intention and random coincidence. For example, at one point well into the project, EVERY new pyramid except one revealed between two and nine alignments with one-another, and/or with Cheops, itself. One had 18 alignments. So a simple control group was added: some 30 Mayan/Aztec variety, plus nearly 6 inverted modern pyramid structures were added to the study. If these, too, yielded such results, the study could easily be argued as being inconclusive.
But they did not.
Only one formed a single alignment with any other pyramid, new or ancient, and it featured no resulting numerological significance. Clearly, the massive alignments in the new pyramids were intended by the powers that be, those persons behind purchase of the location and setting design criteria as to angular placement, size, and location on the property… especially true when multiple pyramids at the same location (as is the case in ancient Egypt) were undertaken. Therefore, the test groups were excluded in findings, which proved validity of both the methodology and hypothesis. Since only the new pyramids (not inverted) formed alignments, it had to be by intention.
While about a third of the new sites are single pyramid locations, there are several with two or three (like the main pyramids at Cheops), 3 with five pyramids, and one with 8, across nearly 50 locations. I then wondered if perhaps other old, but not ancient pyramids or locations deemed ‘holy’ by the Illumnati might not also offer alignments. Adding a handful of small pyramid burial sites by Masonic persons of wealth and power, as well as the death site of Adam Weishaupt, founder of the Illuminati, and the ‘headquarters’ from which he operated his secret cabal proved that notion, as well. I was unable to discern his precise birth place beyond the name of the city (Gotha, which is ironic in its own right, because Weishaupt and the Illuminati were very goth).
At the point where I felt the matter was amply proven, I had by then added eight older sites, typically 100-200 years old, though one dates to 12 BC, in Rome. It is the Pyramid of Cestius, circa 12 BC, at a time when Rome was, like the Templars, enthralled with the mysticism of Egypt. It is a site well known to Templars and Masons. The others are all in Europe, save one in America, and two of them relate directly to the Illuminati; Adam Weishaupt’s grave, the ‘headquarters’ where he planned and executed Illuminati plans, and perhaps the definitive Knights Templar location — Templehof (Templar Temple House), all in Germany. As these last three are not known to have involved pyramids on site, they are only used in scoring other pyramids which align with them, and not evaluated on their own, even though they would score fairly high.
So the alignments created in total involved alignments between ancient, historically old, and modern pyramids. The symbolism and mysticism of such structures by their special alignments, regardless of if rendered in aged stone or in modern metal and glass — are clearly as important to their builders as the function and beauty of their designs. All were starkly beautiful, and quite functional, to be sure; a perfect way to subtly reinforce the notion of luciferian and Masonic imagery upon the subconscious minds of citizens otherwise mesmerized at what they were seeing… especially when illuminated to great advantage by sunlight or voltage.
The problem of useful presentation
But describing all these alignments textually makes for boring reading. I will give just two instances as example, next, as they are quite tied together. It will be the only review of numerological ties, though more like it, exist, and with notable frequency. Trying to present the topic graphically is also challenging for other reasons, but I will attempt that, as well, in a third review. I will then provide a very simplified summary of selected findings to illustrate the scale and nature of alignments found, with a scoring system to relate symbolic spookiness.
But first, a disclaimer is required, because I always challenge any Doubting Thomas’s to duplicate my research before they make any false presumptions as to validity of my findings, and because the research tool involved (Google Earth) has its own technical limitations with which carelessness can impact upon accuracy.
Disclaimer: regarding some figures and claims herein about alignments and measures, accuracy is sometimes more difficult to affirm via Google Earth. Google Earth allows an accuracy to within a meter or so at ground-level, but things can get more complex when one starts trying to plot and measure lines with accuracy to the far side of the globe, and/or where the locations may be nearer to the Poles than Equator, or on/near altitude changes. Satellite images used in Google Earth are sometimes taken at oblique angles on either or both the horizontal and vertical, such that visual distortions of a pyramid can make true angular alignment (in compass degrees) or even measuring its base length, difficult to accurately determine. When dealing with such angular imagery, the center of the pyramid will be other than visually depicted, requiring one to make cross lines corner-to-corner to find the true center. The quality of image can also vary, but generally, line placement accuracy can be determined within 1-3 feet (roughly the line’s width). The images for two sites were so bad that it was impossible to determine if base line/diagonal alignments existed, but at least their location was known with GPS accuracy for the purpose of central alignments.
Additionally, one must take care insure the Pyramid(s) in question are centered in the view, and to reset the ’tilt’ (View > Reset > Tilt) after zooming in, or additional angular errors can be introduced, as the lines one lays for determinations themselves ‘float’ above the ground. In fact, where the pyramid is quite large, one may find the line ‘crawls up the face,’ providing additional distortion which must be defeated. The degree of inaccuracy in any given instance should not unnecessarily render the information herein as invalid; the thrust and intent behind the location and positioning of glass pyramids is clearly not casually undertaken. Also FYI, distances between pyramids herein are rounded figures, if there is no mystical number involved.
Verbal presentation example
Paris features two glass pyramids at the Louvre Museum, one large, one small and inverted, which form alignments to four other sites (the only inverted structure to do so, likely because it additionally features a normal pyramid, as well). There are three much smaller ones, as well, serving as skylights, which I chose to ignore, early on, and then forgot about, later; they would likely have established other alignments, as similar skylights on streets elsewhere, had done.
Two of the alignments at the Louvre are baselines from the larger pyramid to the same pyramid site in Texas, where they also align with the baseline of one, and the diagonal of another of three found there, essentially parallel. Three more alignments exist to three other sites involving three corner/center combinations, one of which is Cheops some 3232 km distant. Masonry’s highest publicly acknowledged ranks are the 32nd and 33rd degrees. The number 3232 is a ‘magic number’ in Satanic numerology, because it is a doublet, which doubles its ‘power’ (amplifies its importance), and because it sums to 55 (another doublet), one divisible by 11 (a doublet which makes 33 three times as powerful), and further sums to make 10. Again, it matters not what you believe about numerology, but what they believe…
And, this is what they believe about these numbers:
In the occult, 5 is the number of the planet. According to one-time head of early freemasonry, and avowed satanist, Alistair Crowley, 11 is “the number of Magick, itself,” and of sin, or evil corruption. 10, on the other hand, is the number of ‘heaven and earth in interaction’ (‘good vs. evil‘), and the symbol of it in the Greek (‘deca’) is the triangle, of which a pyramid employs 4, which means ‘strength and integrity,’ which is certainly a trait of the Pyramid. For the matter, the number 32 relates to ‘inspiring of truth and living by it,’ which is to say… the very promise and implied hope of illumination. Unfortunately, illumination means something rather different to those with a darker agenda, something closer to that which the serpent spoke of in the Garden of Eden. These are not the only meanings found in general numerology, but the ones preferred by dark occultists.
Extending the base lines of each of the Louvre pyramids westward 3500 m will take you, again in parallel manner, to the center unit of one, and a corner of the other of two glass pyramids built in Westborough, MA, by globalist pharma firm, Astra Zeneca (astra in the occult relates to supernatural weapons). Another line can be drawn from the lower corner of the larger pyramid at Louvre, through the center of the smaller one, there, to pass through the diagonal of the center pyramid of three atop a very Masonic looking Federal Government office building in Ottawa, Canada.
The smaller pyramid in Paris is 2 m shy of being 1/10th the base line dimension of Cheops, while the larger one is two meters more than 1/6th of Cheops. The larger Astra is 1/6th greater than the larger of Paris, and the smaller 1/2 the size of the smaller in Paris. The Ottawa pyramids are 1/4th the size of the largest at the Louvre, and 1/25th of Cheops, and 2 m shy of being 1/2 the smaller Astra. I would love to analyze the actual dimensions of all these, if they were readily available.
In Chile, the resort complex at San Alfonso Del Mar features a giant glass pyramid on the beach with four alignments. It is aligned such that its base line will bisect with the center of one of the lesser stepped Egyptian pyramids. Two more alignments are to diagonals of a pyramid in London, and one in China, 20 km from Hong Kong. A third aligns with the corners of two pyramids in Islamic Astana, Kazakhstan which, though richly expressing Islam in the property’s design, is also rich with Egyptian symbology.
The Chilean Pyramid base is also one/sixth the size of Cheop’s (38.3333 m, a number which is found many times in the fuller study in either location, size, or compass readings of various pyramids). It is located on the 38th Southern Parallel and the 32.32 Meridian. 38 sums to 11 (Magick) but itself can mean ‘Lucifer, the will of the Devil.’ 1/6th = 18%, where 18 = 9+9 (99 doublet) and 3 x 6 (666 triplet — even more powerful than a doublet, and Satan’s name). 18 itself means ‘Oppression, bondage, slavery,’ and = 3 (a ‘perfect number’ meaning fullness) x 6 (the soul of man) = 666 (legend/man/illumination).
A graphical review
Enough textual description; it is too boring and difficult to make sense of. Let’s try graphical, looking at hotel resort complex at Galveston, Texas, which also consisted of three Pyramids. This is one of several with 8 or more alignments, and perhaps the most interesting in terms of just what they align with, and how.
It may help to review what qualifies as ‘aligning,’ so you know what you understand why the lines look the way they do. The alignment must involve at least three points of contact between two distant pyramids, based on corners and centers. A baseline is two points, a diagonal or perpendicular from a baseline through the center being three points, but the distant pyramid must still have at least one such point of alignment, as well. If only one, it must be its center, but aligning with two corners on two different pyramids, there, is another way to align.
There are examples in my study were a baseline, perpendicular, or diagonal aligns with yet another baseline, perpendicular, or diagonal (four to six critical points total); a much harder thing to achieve. In like manner, some can be extended to align with yet other points of other pyramids at a third location; an even more dramatic alignment. I have found as many as five pyramids in three locations involved in a single alignment across the globe… with 14 points of alignment in all. These harder kinds of alignments should be next to impossible by random occurrence. Yet every single pyramid exhibits them.
And we have two such virtual impossibilities illustrated in our visual review at Moody Gardens, in Galveston, TX. Two of them actually involve Cheops, as earlier reference in the textual description, the ultimate of all possible alignments from the Masonic viewpoint. In fact, I find it the second-most interesting of all modern sites, in terms of alignments (the first, at Sauerland, Germany, is impossible to show in this manner as it enjoys 23 alignments. UPDATE: 43 in a row, and I finally stopped bothering!
Clockwise from Noon in the image, we see an align to the Nekoma Air Force Station, an experimental anti-missile defense system long abandoned. What is interesting is that one of it’s seven alignments goes to the only pyramid in South Korea — quite dependent upon U.S. anti-missile technology. That’s interesting, because there is another pyramid in N. Korea, and one of its several aligns goes to the Las Vegas Casino pyramid, which in turn aligns back to the Nekoma site. It is as if both N. and S. Korea are ‘borrowing’ from American military power, after a fashion, to create or reflect a ‘stalemate.’
Next we have two aligns effectively ‘parallel’ to the ‘holiest’ of Masonic pyramids in Egypt, involving a total of nine critical points with three pyramids. There is then an align to the Rock and Roll Hall of fame in Cleveland, OH, where it passes through the center of both pyramids, there (one small, complete pyramid, and one very large incomplete, or faux pyramid. There, the base of the larger less the base of the smaller, is equal to 1/3rd the base of Cheops.
We find an align to a now defunct pyramid on Miamii’s beach. Fairly ordinary as alignments go, it was built as a promotional venue for the international beer company, Heineken. Despite being temporary, it was placed to form at least three alignments on its own. Then, in like manner to the two aligns to Cheops, we have two more going to the two pictured Biosphere pyramids, which, like the two Rock and Roll pyramids bisected with the same line from Moody Gardens, have both of their pyramids bisected with an align from Nekoma (coming full circle, if you will, to form a triangle). In fact, Nekoma is itself involved in a total of 6 such three-way triangles. One of those involves the Miramar retail store, our final align from Moody Gardens, for two such triangles sharing Moody and Nekoma locations. Miramar is the other incomplete faux pyramid, in that only two opposing sides are triangular walls. Miramar, in turn, with two pyramids, forms 6 aligns, including one to the very Masonic Capital grounds of Australia, at Canberra.
So far, we’ve only closely looked at two out of about 50 locations. You can see how hard it is to use either text and/or graphics to reveal it usefully. So let’s now try a different way, and employ a chart with a scoring system designed to rate the comparative ‘spookiness’ factor of a given ancient or historically old site’s alignments with new pyramids or other holy illuminati locations, including each other. To further reduce the clutter, it will then only look at sites which directly connect to them, in even briefer review, sans scoring. The scoring system replaces trying to compute and display the actual odds of the alignment, which would be as high as 10 figures:1, in many cases.
For example, the odds of just a single alignment of the simplest kind, center to baseline, diagonal, or perpendicular or to two corners of two pyramids at destination (earning the lowest possible score of 1 in my scoring scheme) would have actual odds of 202,500:1 against. That is based on the notion of worst case accuracy of 1/10th of a degree of arc… meaning that each pyramid would have 10 x 360 degrees of potentially useful compass positioning, divided by 8, as there are 4 lines the pyramid which establish a total of 8 possible compass vectors. You need to multiply each pyramid by each of the others involved if aligning to another baseline, diagonal, or perpendicular. A baseline to baseline alignment odds would be 164,025,000,000:1 by such reasoning. Such odds are multiplied further by additional alignments at the site. Argh!
Technically, that’s too simple, because angular placement is not the only factor. Size and relative positioning plays a role, too, when two corners/centers of two different pyramids at the same site are involved, but I’m not going there without a super computer!
Now, if you want to argue that the actual accuracy we should using is tighter than that, implying room for error in ‘finding aligns,’ consider for a moment that only one alignment with the Mayan/Aztec pyramids was possible using the same accuracy as I employed. That makes a pretty good case that the alignments were intended regardless of whatever actual accuracy was employed. Even if you allowed for my own human error, there are so many alignments that they could not all have been for my error, given the Mayan/Aztec set enjoyed no similar quantity of errors. But by all means, feel free to correct my math/assumptions if you are of bookmaker caliber in computing odds, but I’m pretty sure I’ve got it right, based on some experience in statistical data analysis; I once ran my own marketing research firm which ran probability studies. No matter: we will use scoring, instead…
Scoring is as follows:
- center point to corners of two pyramids or a base/diagonal/perpendicular of 1 pyramid (simple alignment) = 1 point for the alignment;
- base/diagonal/perpendicular to same (complex alignment) = 5 points for the alignment;
- Bonus 5 points for any parallel alignments or alignments to multiple pyramids of one site to multiple pyramids of another site (parallel/pair alignment);
- any extended link to an additional pyramid (extended alignment) = alignment score x 5;
- link to Cheops (Cheops alignment) = x 5;
- link to other Egyptian pyramids or Illuminati sites (Illuminati alignment) = x 3;
- link to other historically old sites (Masonic alignment) = x 2;
- 1 point for each alignment and for each pyramid at site;
- magic numbers, angles, dimensions, etc., not part of scoring;
- Cheops gets a bonus of 33 points, Illuminati sites 11 points, Masonic 7 points
- maximum score limited to 99
Egyptian Pyramids 13 aligns w 6 pyramids on site (Δ) = 99 points: 29°58’44.54″ 31°8’3.65″
Complex Parallel to Sauerland (5+5 points), 3 Simple Parallel to Dubai (6×3), 3 to Sauerland (6×3), 2 Simple Parallels to Galveston (6×2), Complex to Niagara Falls (5), Simple to Louvre (1), to Eatonton GA (1), to San Alfonso del Mar Chile (1) 85 total +33 > 99.
Cestius pyramid in Rome 5 aligns w 1 Δ = 99 points: 41°52’34.97″ 12°28’51.16″
Complex Extended (three times — 4 Δ at 3 sites, in all!) to Manitoba Capitol and on to Miramar Retail (5x5x5x5), Simple Masonic to Karlsruhe Mausoleum (1×2), Simple to Pheonix Jeju S. Korea (1×2 – Phoenix is Masonic/Egyptian), to Sauerland (1), to Portsmouth UK (1) > 99 points
Star pyramid mausoleum Scotland 3 aligns w 1 Δ = 34 points: 56° 7’19.42″ 3°56’43.72″
Simple Illuminati Extended to Weishaupt’s grave, to Gold House IL in opposite direction (1x5x5), Simple to Cooperative Bank UK (1) 27 points + 7 Masonic site = 34
Karlsruhe pyramid mausoleum 7 aligns w 1 Δ = 27 points: 49° 0’33.22″ 8°24’14.05″
Simple Illuminati to Illuminati HQ (1×5), Simple Masonic to Cestius (1×2), to Kazakh RU (1×2 — rich with masonic/egyptian architecture), Simple to Dubai (1), to Edmonton Capitol (1), to Cal State U. (1) 20 points + 7 Masonic site = 27
Bickling mausoleum UK 2 alignments w 1 Δ = 13 points: 52°49’9.01″ 1°12’48.36″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
Schoenhofen Mausoleum Graceland Chicago 2 alignments w 1 Δ = 13 points: 41°57’33.56″ 87°39’34.09″
Simple Illuminati to Illuminati HQ (1×5), Simple to Sauerland (1) 6 points + 7 Masonic site = 13
What follows is a simpler summary of the first few of the destination sites mentioned sites as evaluated from their position…
Sauerland 23 aligns, 8 Δ, Dubai 13 aligns, 5 Δ; Moody at Galveston, 8 aligns, 3 Δ; Niagra Falls 2 aligns, 1 Δ; Louvre 7 aligns, 2 Δ; Etonton GA 2 aligns, 1 Δ; San Alfonzo del Mar 4 aligns, 1 Δ; Manitoba Capitol 9 aligns, 9 Δ treated as a single Δ as they all directly touched one another 3×3, and were each relatively small; Miramar Retail 7 aligns, 2 Δ; Pheonix Jeju S. Korea 6 aligns, 1 Δ (note: N. Korea has a Δ, too).
These are all quite typical of all sites evaluated, globally. The only site which scored 1 (1 align) was a site which has had its 2 pyramids removed/destroyed, disallowing angular alignment determinations, though the center of one of the pyramids was known, allowing an align by that method.
CONSPIRACY ALERT: That site, by the way, is tied to a little known conspiracy surrounding the Nuwabian Nation, an all-egyptian-like community of almost exclusively black people which was seized and razed to the ground by the U.S. and Georgia State and County governments. They were allegedly targeted for being a cult, subversive group, criminal organization, nest of child abusers, or a swindle… depending on who you ask. Seems like everyone had a pet excuse, including YouTube who seems to regularly censor vids on topic for their usual list of fabrications. Note the resemblance in some of the ceremonial dress to masonic lodges such as the Shriners (Nuwabians, like the lodge system, also use the terms, Orders, and Lodges). All Egyptian is wrong, too; they also were adoptively and by blood associated with Native Americans of the Yamassee Federation of Tribes, among them the Seminole.
Note on mausoleums: What we see in our review is that the three mausoleums share unique ‘coincidences’ in that each aligns with an Illuminati historic site honoring Weishaupt, and each in turn is honored for having done so by Sauerland aligning with them. There are many such pyramid mausoleums in Europe, America, and a few scattered elsewhere, far too many, in fact, to encourage me to dig further. Regardless, as the very first and only three reviewed all shared these two features, I’ve no doubt that others do, as well. A single Mason could easily undertake a single such alignment to a point of their own choosing, and more modern pyramid builders could easily accommodate at least one or more such mausoleums in their own alignment considerations. This brings us too…
Sauerland, enigma equal to Cheops
Sauerland is one of the newest of all sites, a complex of 8 pyramids which appears it may even involve mind control research. It certainly defies normal property development, architectural design, and building contractor norms in several ways. First, its location is on a hill overlooking an industrial park, and despite looking like a luxury retreat, is in fact the corporate campus of biomed tech company, Rayonex Schwingungstechnik (Rayonex Vibration Technology). It started with three pyramids, and has since grown to eight.
Second, the site has an adjacent and extremely unique high observation tower (about 110′ high) which overlooks the pyramids and the valley, just high enough that morning sun could shine through the large holes in the upper level and onto the pyramids, creating unique shadows. This was a trick employed in ancient Egypt using Washington Monument style oblelisks, such that at a certain time, a shadow might point to a secret place within the greater site (as seen in Indiana Jones and the Lost Ark. The tower’s corner shadow does fall over the pyramid property. But, let’s just call that a pipe dream.
You do have a pipe of some sort, don’t you… and a whip and hat?
Third, each building is offset irregularly and apart from each the other with no obvious pattern or reason, and likewise, quite contrary to normal designs, angled one from the other up to 3 degrees or so in compass alignment. It is my belief that this is what enables it to accommodate so many alignments, a thing which would require planing with a fairly complex computer program, to determine. Finally, again unlike most complexes, even where ‘luxury’ is intended, no two buildings are built or designed the same; each has an entirely different layout and appearance, though some features at least look similar. Usually, a cookie cutter approach to keep costs down would be employed. Yes, even in corporate campus design.
Then there is the very small pyramid surrounded by a water feature. I found construction photos that show a drill being used on a hole there, approximately 1 meter wide, with smooth walls. It was associated with an article on geothermal drilling which led to a very interesting YouTube promotional video that is really worth the watch; it will intrigue and educate you. After watching, though, ask yourself if the expense this likely represents would normally be deemed appropriate for a small fish pond? The video seems to address that with a blanket statement, but does it, really?
I learned also, that the small pyramid over that hole is the only one on the property using metal walls. The other, larger pyramids use some kind of unusual looking material which requires special application, according to other construction images I found. The panels used on them might logically be radiographic in nature, designed to limit or enhance radio waves of select frequencies, given the nature of the company’s work, as you shall see. In like manner, I can imagine the holes drilled by that machine could be used to install an array of underground EMF sensors or emitters. The video implies the array of radially and laterally drilled holes provides a series of ‘pipes’ which may in fact be perpendicular to one or more of the pyramids. Just why these possibilities are raised, is covered below.
Also unusual, is that one of the original three pyramids (perhaps more, now) is strictly for therapy use, with ten therapy stations. In each pyramid, a security computer controls all lights, window blinds, and door locks, and though there is no manual switch anywhere within for any of these, each workstation is said to have its own localized control over these features. But the security system computer can override, which makes it a rather creepy place with respect to potential for political control and overbearing security solutions against occupants, Big Brother style… especially if you don’t have authorized access to a workstation. Undoubtedly, there are plenty of security cameras, and I find it disconcerting that some pyramids have no windows, whatsoever — normally a code violation, unless a warehouse or factory. One must ask why so much expense and devotion to therapy and externalized security control over environment would be required? Let’s take a peek, and see.
The answer raises more questions. This is a unique kind of high tech firm. Their product/services would seem to involve mind enhancement, mind bending, or even mind control, but certainly relate to biophysics and therapy of some kind. One or more of those possibilities is very likely; the firm does research in electronic frequencies upon the human body (bioresonance), among other things. According to Wikipedia, bioresonance is all based on pseudoscience, which is a polite term for ‘made up BS by con artists’. Dunno about that, because…
This is also the sort of stuff useful in DEW Weapons for behavioral control (Political Control Technology). Of course, such tech is always researched and funded based on some good it might accomplish, including the combating of electrohypersensitivity, which many TIs suffer from because of their constant DEW targeting, or some preexisting natural sensitivity. I have it, myself. But once a patent is filed and governments or dark-minded NGOs get wind…
Now, about that tower… What if it was for security guards overseeing grounds security should an alarm goes off of some sort. The tower does have its own large building which might be suitable to house a security force. Hold that thought in mind while reading the next paragraphs. Turns out it is not just an observation tower, and not just any building. And, while guards might be rather far fetched a notion, there is more to consider.
The pyramid shape is also known as a Frustum by Masons; a shape used by the military in times of old in a manner not unlike a Tank Trap. Like a tank trap, as a shape, it cannot be easily overcome when several are placed together, there being no level foothold between them (a steep V shape), and its sharp corners, especially at the top, inhibiting climbing. More importantly, because its sides are sloped, one cannot hide behind a frustum, if the enemy holds high ground… such as a castle wall… or a high observation tower. Just exploring possibilities, here… but far-fetched or no, it fits the spookiness factor of the place.
But as stated, that’s not all. The platform is merely the top level of what is actually a mine shaft elevator lift. The building is currently a mining museum with access to a huge abandoned mine; they actually take you down into it with hard hat and light, etc. So, like Cheops, there are underground passages beneath the Sauerland pyramids. It is, of course, possible that some of those passages might be remodeled into something else entirely different, like many old mines are, today. It is even possible there are ways to access them from within one or more of the pyramids. Now wouldn’t that be a mystery to discover and explore, whip at the ready? However, all this causes me to hope no one would go drilling a bunch of radial holes over an abandoned mine… if they didn’t know exactly where the mine’s cavities were…
Now, last mystery. Look carefully at the top of the platform at the left corner nearest. No. That’s not a machine gun, though it can potentially be used to ‘shoot.’ It’s appears to be Yagi antenna, normally used to transmit or receive microwave signals in an amplified manner, along a narrowly aimed path. But wait! Where does it aim? At the top of that tower, as high as it is, the thing is aimed squarely at a hillside nearly four times as high as the platform. Useless, as seen. But wait! Just beneath the top rail is a what looks like a motor; the shaft can rotate. At the top is what appears to be a motor at an appropriate angle to change vertical angle. The white object appears to be a housing of a control system operated remotely. I used to sell such systems for video security setups based on microwave relay. Pretty sure of what I’m seeing. And, there is a second pole identical to the first which could be similarly fitted, and which may have been since the photo was taken.
Why would you want that? Well, you might want to tune in distant TV stations, except they don’t broadcast in microwave. You could use it to grab someone’s cell phone signal, if you knew exactly where their phone was, to aim it. There are yagi antennas that can be used for those things, but they would look different. But what if you owned a bioresonance laboratory with some human guinea pigs? What if you could place them in rooms within a pyramid, where the slope of the pyramid was roughly perpendicular to a high mounted, aimable microwave transmitter, such that every subject got exactly the same dose of signal at the same time, or such that you could specifically target a given subject with a unique signal? It would probably look a lot like Sauerland. You think?
I only mention this, because older pictures, before the pyramids were built on site, don’t show such a ‘gun.’
Is it a conspiracy?
If one concludes that it is impossible that by mere chance alone, every modern and non Mayan/Astec-style pyramid should align with other pyramids, including Egyptian… then it has to be by intelligent design by agreed-to planning by a group of many persons with like agenda. That it is done covertly and involves mystical occult reliance… removes it from the realm of benevolent methodology or intent. That these pyramids can be found in countries of opposing political, religious, and ideological beliefs… precisely fits the Illuminati model and game plan established by its founder, and reflected in Morals and Dogma, the ‘Masonic Bible’ written by Albert Pike. That the only persons financially and powerfully placed are able to arrange for such things tend to also be members of Round Table Groups and are often also Freemasons… would seem to cement all these considerations into a single image: that of a conspiracy. That there is the possibility that it even involves mind control is, to say the least, the ultimate and most heinous form of conspiracy.
“Every man is entitled therefore, to give any explanation of the symbols and a system of the doctrine that he can render palatable… Of all the means I know to lead men, the most effectual is a concealed mystery.”
This is an old topic that’s lost traction in the public eye, but in the background, the enemy continues to work ever closer to fulfilling prophecy about Mark of the Beast. Now, employees are being asked to implant themselves in order to get snacks, get through doors, and access workstations and photocopier.
What you will learn reading this post:
- what RFID is, who is behind it, and why you should fear it;
- about Digital Angel, and the bio implant tracking version of RFID;
- why you should fear it, put away petty ideological differences, and unite against it
- what you can do to defend against it;
- the greater strategy RFID is in support of (the ultimate threat).
Invasion of privacy tiny in size, massive in scope
Recent news stories, including a particularly scary one referenced in red text, herein, have forced me to draw upon years of research and dig out my old PowerPoint presentation, 666 Reasons for Smart Dust and RFID Technology, as presented as the keynote presentation at Conspiracycon 2010, in Santa Clara. Any definitive presentation must go back to the beginning, or the dots won’t quite usefully connect. This is going to impact YOU in YOUR LIFETIME. Actually, it already has, and you just don’t know it; the water temperature is slowly being raised on we Frogs, and it’s quite hot, already. Hopefully… we can somehow jump out before its too late.
Smart Dust and RFID tracking technology are quite related, but Smart Dust is not going to be a part of this presentation, except to say that it is nanotech capable of much more than RFID, but it is not an implant. While it is represents its own significant threat to social, financial, and physical security and well being, it is less useful than a tracking implant for the population at large, and cannot play the role of Mark of the Beast. Fortunately, it will not likely ever be used against anyone not deemed a high-priority national security risk. You know, like Will Smith, in Enemy of the State.
RFID, however, is the very heart of the tracking bio implant, the most obscene version and infamous of which is Digital Angel. That’s the name of a CIA front central in pushing for implants, but also often used to describe their chip, itself as a product trade name. They also offer a wide variety of tracking systems which are non implant, such as wearable items like watches and ankle bracelets.
But we need start with a broader view on RFID to fully understand the greater threat this topic represents. Non implant (and seemingly harmless) versions of RFID are already used to track an endless array of products, and you are quite likely to bring them home every time you go shopping. In retail, it is mostly benign, but it becomes the bedrock of a useful personal tracking system.
Mostly benign? Check this out, an edited and updated excerpt from my book, The Professional Paranoid: How to fight back when Investigated, Stalked, Harassed, or Targeted by any Agency, Organization, or Individual (third ed.) Excerpt begins…
Smart Dust, RFID, and the Mark of the Beast
i want you to consider the first letter of this sentence; the lack of capitalization is not a typo. I wanted to draw attention to the dot above the letter ‘i.’ There is a reason… there is an RFID invasion taking place, and some of the invaders can be just that small.
The Bible tells us that in the End Times, there can be no transaction between persons for goods or services unless both parties have the mark. Revelation 13:16-17 “And he causeth all, both small and great, rich and poor, free and bond, to receive a mark in their right hand, or in their foreheads: 17 and that no man might buy or sell, save he that had the mark, or the name of the beast, or the number of his name.”
Though the Mark of the Beast is thought of as being the number 666, that is not quite the case. That is the number of the Beast himself (the Antichrist) in numerology evaluation of his name. The original words used in the original Greek texts of the New Testament can be translated to mean ‘insert’ as well as ‘mark.’ Thus there are growing numbers of people who think that some form of Digital Angel bio implant will be the actual marking device. This section will illustrate that likelihood and educate you on just how close to that day we may be.
This will make sense later: implants are the mark for the hands of peons, and marks on the forehead are the mark for meons.
What is Digital Angel? It is a firm which is known for a series of tracking products, including bio implants, all based on RFID technology. Simply put, it is a passive device which, when scanned with a low-energy RF signal, responds with a signal of its own, broadcasting a unique identification number or other data. Early versions of this are still commonly found in clunky removable/disposable merchandise security tags installed by retailers which can trigger alarms when shoplifted goods exit the store. In the modern version, the product manufacturer includes the chip which enables the same feature without the retailer needing to do anything but take delivery of the goods.
There is a whole emerging industry based on RFID, and it, in turn, impacts on almost all other industry sectors. The industry is driven at its heart by the military and intelligence community with the help of corporations who are part and parcel of the NWO elite, as defined by the makeup of their directors and other corporate leadership or ownership. What they want to do with RFID is mind boggling, as is what RFID is capable of in terms of invasion of privacy. To start, they want every single product manufactured and sold to have its own unique RFID tag, and are pitching it to manufacturers and retailers as the next evolution of bar code.
Similar chips in credit cards technically allow purchase without the need to remove the credit card from the wallet, though they currently require us to scan the card. But all that is really be needed is to specify which of several credit cards we might be carrying was desired to be used. That could be verbal, by touch screen, or smart phone application, which avoids producing the card. RFID is also being built into phones for comparison with credit cards nearby, to allow verbal telephone purchases to be made without the need to verbally confirm credit card details. The bio implant is ‘sold’ to us as a convenience to replace all of that (examples to follow).
That is the ‘convenience’ under which it will be sold to us in the retail world, and if a cash register can scan these chips, so can the device at the door looking for merchandise which had not yet been purchased. Why stop there? Anyone can put small and hidden scanners (with or without cameras) anywhere, and for any reason… such as at every doorway where some form of security or tracking feature is desired. By scanning RFID credit cards, the identity of everyone passing through is logged and time stamped without their knowledge or participation. Actually, any RFID tag on your person can do the same thing (it is being built into clothing), because your identity can be associated with its purchase. And that is just the beginning. Ergo, the national ID ‘Real ID‘ program is based on RFID, and eventually, the human body itself will be its on RFID ‘ID.’
In the very near future, it will serve law enforcement. At the scene of the crime detectives will often find discarded items potentially belonging to a suspect. They analyze these for clues, such as fingerprints, to build a list of suspects. In a world of RFID-only purchases, every object also identifies who purchased it, when, and where (often also useful clues in prosecution). What about cash purchases to thwart RFID records keeping? Not a problem. You didn’t think for a moment that those little slivers concealed in the left-hand portion of your new money was truly just a counterfeiting deterrent, did you? Put anything but a $1 bill in your microwave oven and it will explode when operated… a trait of RFID. Moral of the story; don’t casually discard product wrappers, especially if you think someone might use them to implicate you in a crime; burn them.
But it gets worse. For any of this to work smoothly, somewhere, someone needs to catalog and keep all those transaction records and make them available for government’s needs. Enter the Total Information Awareness Office (TIAO), AKA the Terrorist Information Awareness Office. This was modeled after an expanded version of FINCEN (Financial Crimes Enforcement Network) capabilities (check this out); and was MILITARY led and very Intelligence community friendly Defense Advanced Research Projects Agency (DARPA) project. I’ve seen the original DOD call for papers and the final description of capabilities and intended uses for the TIAO, and it has little to do with targeting terrorists. Instead, it has to do with capturing records of EVERY transaction between EVERY citizen and business, as well as the passing of ANY citizen through ANY doorway in selected locations. Further, it will track vehicles past checkpoints and can log other kinds of interactions or transactions between people and each other or real world objects (i.e., machinery, vending machines.)
Update: TIAO ‘went away’ due to public protest and ‘too many questions,’ including “Why was the head to be a convicted criminal participant in Iran Contra, an ex Naval officer of significant credentials tied to CIA and the Pentagon, John Poindexter?” And yet, it did not actually go away. It has instead been quietly replaced with the OIA; the Office of Intelligence Analysis, another new super-secret spy agency operated out of Homeland Security. They, in turn, gently established ‘Fusion Centers.’
Fusion Centers are ‘sold to us‘ as a happy pill having nothing to with dark deeds, and as being established by cities and state governments in order to share information between partnering civic and federal agencies, local businesses and NGOs for improved security against terrorism and ‘other threats.’ In truth, they are hotbeds of social spies who operate external of the centers within those groups of partners on behalf of DHS and the intelligence agencies. It is often a source of organized gang stalking, and a collection point of ‘data’ about ‘other threats.’ We are the threats, and the data is obtained through backdoor access to the ‘data’ about us found in participant computers, including RFID transactions, security and traffic cams — and via gang stalking and the associated psychological profiling. It is a kind of fascist Brown Shirt group without the uniform, replaced with a smile and handshake… and big eyes and ears.
And worse still. If government decides it wants to know even more about you, a black van can drive by your home and scan it to collect the sum total of all information from all RFID tags (or Smart Dust) found within the home. They will quickly know EXACTLY what is in your home, where you got it, how you got it, and when. This gives field agents the ability to gain access to that kind of information in a very focused way instead of having to run tedious database searches which would necessarily include bureaucratic handling and, perhaps, the dreaded and feared need for a pesky warrant.
And, worst of all, the ultimate expression of RFID privacy abuse is to put one in the human body, with or without the target’s knowledge. The question is, how close are we to this nightmare, and what can we do about it? The answer is, we are frighteningly close, and in fact, it has already been happening for decades.
- RFID is already being put on thousands of products you buy today. Even common mundane consumer goods like Gillette razors and Max Factor makeup have been ‘chipped’ with RFID. Walmart pioneered its use, and used cameras (which opens up a whole new personal security threat for the chip) to track customers through the store, and record RFID transactions. There are also shopping carts with built-in ‘product information displays’ which can track every item you handle while in the store, and profile your shopping experiences over time. You can bet there were cameras connected to scanners scattered throughout town by CIA or the military (Walmart Board included ex military and intelligence agency types at the time), as well, to see where else you went and what else you did, to test it as a spy tool. Many manufacturers have placed orders for hundreds of millions of RFID tags and millions of scanners. They have to be in use somewhere.
- Many tens of millions of RFID equipped credit cards have already been issued. You can spot these visually if they are transparent, or if the credit card number has a lot of zeros in the middle, or a gold foil rectangular emblem about ½ inch square. Though sold to us as a ‘security feature,’ they are the opposite: content can be stolen by proximity scanning without your knowledge, and then the RFID and card can be cloned by thieves for use at your expense. I’ve caught such a thief scanning at the doorway to Walmart. He was pretending to be making a phone call… pacing back in forth in ways that maneuvered him in behind victims. But there are also home-made scanners which can scan from hundreds of feet away.
- Most cell phones use SIM card technology incorporating RFID (the SIM card, more than the phone, identifies the authorized user). This is often used in phone apps to facilitate cardless credit transactions (i.e., iPay)
- Virtually every maker of cash registers and point of sale systems is developing low-cost attachments to existing cash register and credit card scanners to sense RFID, as well as whole new systems to replace the old with simplified operation and reduced cost — this allows self service checkout and the elimination of the sales clerk, so it will be promoted as a ‘cost reduction’ tool. But don’t expect to see savings passed on to consumers. Money already has the needed strip in place and it likely has been RFID capable all along without our knowledge.
- All employee scan cards use RFID. Hotel room key cards use RFID. Federal Express, UPS, etc., all use RFID shipping labels. Monthly bus passes, season tickets, and the like, also employ RFID.
- Pets and livestock have been being implanted with RFID for decades. Within the last ten years, thousands of people have, as well, largely through efforts to chip children ‘to protect them against kidnapping.’ There are nudist resorts where you can volunteer to have one injected to represent your credit card information for purchases at nudist-camp points of purchase for services and goods. Otherwise you must carry your wallet or purse and keep an eye on them. What fun is that if trying to commune with Mother Nature and your bank account? In July of 2017, a company announced break room vending systems and software to allow implanted employees to access snacks without money. Learn more here. Soon, you will see implants being promoted for use with parking meters, fast lane highway access, and on, and on, and on.
- Bioimplants can easily be implanted in a human without requiring their knowledge or consent. All they will know is they woke up with what seems to be an insect bite. This can be done while they sleep via covert entry of their home, or at distance with a special pneumatic sniper rifle.
- According to several news accounts, countless livestock has been slaughtered with the implants still in place, their meat ground and sold, and consumed by unaware purchasers. Despite massive recall efforts, not one package of meat was recovered. RFID implants are made of glass, plastic, and poisonous metals.
- Some school systems are requiring children to use their fingerprints with scanners in order to get their school lunches. This is bad enough, but the firm that makes the equipment used also offers an RFID attachment in lieu of the fingerprint scanner, and mentions implants in their literature as an option.
- One maker of RFID, in marketing it for aircraft part identification in an assembled aircraft (the goal being to track parts which might be subject to safety recall, and a feature useful in crash investigations) chose a trade name for their RFID of ‘The Mark.’ The part number when Boeing Aircraft orders it from the maker is alleged by employees to be 666.
What can you do to defend against it?
Aside from sharing this post, not much. Be very vocal and protesting at every opportunity any discovered use of the technology. You might demand RFID tagged merchandise be detagged or the tag neutralized before you leave the store, but that would make you look crazy. However, organizing endless group protests can have an effect. Any firm that covertly uses it should be razed to the ground (sued into oblivion for violation of privacy). Any government office holder should be kicked out of office if they support the technology in any way, shape or form, or simply fail to oppose it. In my opinion, preparation for revolution should be made if these efforts fail, because that would be the only remaining recourse prior to full enslavement.
Back to the bible. In The Book of Revelations where the reference originates, there is also one more clue RFID will be the basis of the Mark of the Beast. One at a time, the Seven Angels open the Seven Seals to unleash seven deadly punishments upon the unfaithful on the earth. One of these states that those with the Mark of the Beast will suffer severe pain and many will perish from it. A subtle clue.
As it happens, there is one feature about RFID which must be told to make sense of this, and it suggests how to thwart the tech: if exposed to high energy radiation, RFID heats up incredibly and explodes. A burst of high energy radiation levels will literally destroy it… such as an intense solar CME blast (Coronal Mass Ejection – a high RF/EMF energy field). At this time, I cannot tell you how to generate such an energy and safely use and aim it, but it has been suggested by other experts than a ten second microwave oven exposure should be sufficient. Now if I just had a portable unit I could waltz through the retail Aisles with… set to ‘Burst’ mode… but you can bet there will be or already are laws written to make that illegal.
But there is something simpler which also defeats the technology. Metal shields the signals. Thus wrapping a National ID or an RFID equipped credit card or object (i.e., chipped hand) in aluminum foil defeats the device’s ability to communicate. When the revolution comes, if that is our future, there will be portable devices which anyone could build from easily obtained parts to detect or destroy RFID at will. I fear the day this is needed. I also say woe to those involved in the use of RFID should it come to that. End excerpted material.
There is one other thing you can do. The response time for reading a scanned RFID is very brief. There is a ‘failure’ in reading called ‘tag collision.’ When too many RFID tags of the same frequency (usually dictated by type of tag/use of tag) are present in a confined space, the scanner can fail to capture the data, or capture the wrong data. Therefore, if one were to collect dozens of RFID tags of various types and put them into a bag to carry along with them, it would effectively become a scanner blocker. Keep all your old canceled credit cards in the same wallet as your valid ones, sandwiching the new between the old, and pull them ALL out to select the one to use, holding them all in the same hand to swipe.
I also advise against Smart Appliances, and smart meters. RFID is at the heart of interaction with Smart Meters, which in turn is its own invasive privacy and stalking threat (widely experienced as a directed energy weapon). Worse, it is tied to mapping of the interior of your home; the floor layout, location of furnishings and other appliances and electronics, smart or otherwise. Programs are being developed to allow such mapping information to be available to manufacturers of smart devices and used to market to you based on use of not just their product, but all products. Naturally, all that can be accessed by government, as well… and hackers partnered with burglars.
I also suggest taking advantage of these resources as contingency against the worst:
The history of RFD tells all
It starts with Howard Hughes, though he was a victim, not an instigator. Most of us are familiar with his rise to being the richest man on Earth in his day, and his fall due to a mental condition which impacted his ability to interact with people, and life in general. The untold story is that once debilitated, CIA agents and Mormons (CIA likes to recruit from Mormans, and Masons, because such cults have secrets and know how to keep them through compartmentalization and other methods) became his ‘caregivers and managers.’ He trusted them, and they took advantage.
Once in control, his vast resources were diverted to CIA control and application. Hughes Shipbuilding built several spy vessels including the Glomar Explorer and companion vessel, both designed to retrieve sunken Soviet Subs. Hughes TWA aircraft and assets were diverted to form (over time) three different CIA ‘airlines,’ including the most recent, Evergreen Aviation, which wound up acquiring Hughes’ Spruce Goose for its museum. Hughes Tools, the financial cash cow of Howard’s meteoric rise, a maker of drilling systems for the oil industry, would eventually become Enron, and we know how that wound up vanishing billions of dollars into thin air. The remnants of Enron’s data processing center would be applied to CIA fronts engaged in porn (to profile user sexual preferences for possible blackmail application), web site hijacking (I was a victim of that, documented here), offshore gambling, and 4-1-9 scams (Nigerian money investment scams).
Then there were Hughes operations which would evolve to serve CIA’s efforts in Political Control Technology development and application. It starts with Hughes Aircraft’s electronics division, eventually become Hughes Electronics, which invented the RFID concept. These were originally used to identify and track cattle, marketed through Hughes Identification Devices, but also found their way into humans involved in early (late 1940s) non consensual CIA mind control projects and Atomic Energy Commission radiation experiments on civilians. I wound up with one in my leg, when as a child, when I was injected with a radioactive substance in Yakima, near the Hanford Energy Reservation.
From Hughes, the chip was migrated to Destron Fearing, and from there to our friend, Digital Angel. We will come back to them. More CIA fronts or partners duped into participation would be created in America and globally to market implants for humans. They do big business in ‘police state’ countries, often for the purpose of chipping persons in the criminal system. Of course, it is privately understood they are good for tracking anyone you wish to track, such as embarrassing political activists and whistleblowers.
LocatePLUS is a Homeland Security created and CIA infected front which pushes the implant in America and advertizes that it maintains 12 billion records covering 98% of the American Population. The DHS/CIA knows all about you and is making money selling you to anyone with the money. In America, the front markets to FBI, ATF, DEA, and 2000 law enforcement agencies, primarily non implant products such as ankle bracelets.
In Europe, the front Worldwide Information is a LocatePLUS spinoff doing much the same. Global reach far outstrips American consumption (there are a lot of fascists out there, in almost every government system): Universal Microchip in Italy, IDECHIP S.A. markets in Ecuador and Brazil, Solusat Medica in Mexico, Scientific Innovation and Integration (SII) in Korea, Taiwan, China, and Japan, Inforlexus Inc., for Malaysia and Indochina, Biometronix for Germany, Glezer Technology in Israel, and Cybertek in Puerto Rico. This list continues to grow; the Swedish firm Biohax International is behind the implant for snacks story.
The primary American front (a sister to LocatePLUS), Metro Risk Management Group, sold $13M worth of chips over 5 years to the Bonneville Power Administration (to track fish, officially). BPA is a Department of Energy firm which had in the same time frame been in the news because of high-tech spying operations having been detected taking place in their facilities… while BPA and Enron were significant others in the same bed. The U.S. Military contracted for $24M, while they sold $1M to private citizens wishing to chip their children or themselves. They sold $7M to the greater Intelligence community, and $73M for ‘internal use,’ which is to say, CIA, itself. Such orders are a combination of implants and scanner systems, both portable handhelds and installable units for security gates and doorways. A typical order might consist of hundreds of thousands of devices and a thousand scanners.
All this data represents 2005-2009. Sales are increasing over time, but increasingly hard to track for a variety of reasons, including corporate name changes, mergers, spinoffs, and other tactics often seen in CIA fronts trying to be a moving target. And the implant business is a target by activists and activist organizations worried about invasion of privacy and civil rights, to say nothing of some kind of New World Order nightmare ending with the Antichrist at Armegeddon. And, they are constantly being sued in court for a wide variety of reasons.
And this brings us back to Digital Angel, the key point in the bioimplant tracking food chain. As stated, a lot of business names and hanky-panky tactics are often employed by CIA fronts, as outlined in The Professional Paranoid, a privacy/security how to which, in covering that topic, helps readers to identify who is really causing the bumps in their night, should they be so unlucky (as was I). So let’s take a look at Digital Angel, again based on older ten-year research (I’m not going through that, again).
Let’s talk corporate names as clues: though most commonly known as Digital Angel (Florida), also DBA Verachip, they were formerly Applied Digital Solutions… which was formerly Applied Cellular Technology (because RFID tracking often relies on cell phone services)… which also used the DBA ACT Financial… formely Axiom Information Technology… formerly Axiom Computer Consultants… DBA Great Bay Acquisition Company (those all based in Wisconsin/Minnesota). Digital Angel divorced itself from Verachip (being sued out of business), but then Verachip merged with Steel Vault… which became PositiveID, which then in turn tried to acquire Digital Angel… which also operates Signature Communications in the U.K., where it might (conjecture based on company data and ties to CIA fronts) enjoy backdoor access to encrypted government radio communications, the assumption being that receiving units employ an RFID chip which, like the cell phone paradigm, authorizes descrambling of transmitted data, as well as authenticated identification of the sender and recipient. Finally, Digital Angel, also being sued and hounded, ran off to the U.K. where they now promote themselves as “a developer and publisher of consumer applications and mobile games designed for tablets, smartphones and other mobile devices, as well as a distributor of two-way communications equipment.” But they still push implants, and through Signature, the two-way communications gear.
Let’s talk facts as clues: Digital Angel does not make RFID. No. They merged with Destron Fearing, the actual imputus of modern RFID systems claiming to have invented RFID technology. No, that was Hughes Aircraft’s Electronic Division. Digital Angel at one point claimed to be founded in 1948. No, but Destron Fearing was founded in 1945, did the RFID for cattle thing in 1948. No one cited so far, actually makes RFID tags, the heart of the implant. No, that’s Raytheon, a military/CIA contractor… formerly known as Hughes Aircraft. That makes sense, since it is the U.S. Army which tracks all RFID tag assignments (unique tag number assigned to (whatever) user data). Meanwhile…
Let’s talk connected dots as clues: CIA’s HHMI (Howard Hughes Medical Institute) is steadily pushing for the use of RFID in both implant and non implant versions to hospitals (49 major facilities as of 2005, more every year) and the medical industry at large, and Hughes Satellite and Hughes Communications services RFID tracking systems via cellular/wifi. How do I know this? By temporarily working for both Hughes Satellite and a major cell phone carrier where I was able to verify specific cell phone traffic and routing of tracking data. The phone account was tied to an individual which shared an address with one of the above firms (how I found it). And that led to finding dozens of such phones for more firms. And even more looking at other fronts known to me outside of the RFID playing field. In fact, such details are part of my evolving insurance policy against ‘accidents.’
Let’s talk key people as clues: Another CIA front trait has to do with who is involved in the corporate structure. At ADS (old data) Dr. Richard Seelio was Director of Medical Applications. Really? He is a Bariatric Surgeon, so he knows how to suck fat out of your thighs, not exactly as advertised by his title (a typical front man). The Senior Vice President was, prior to installation, a small time lawyer (a cutout man). A look at the Board of Directors of almost many of the above firms variously will find persons of wealth and influence, persons with backgrounds or ties to military/intelligence (or both), and persons with membership in the nefarious NWO Round Table Groups, such as the Council on Foreign Relations, Trilateralists, and the Bilderbergers. This is a kind of corporate structure is a fingerprint that lets anyone track just who are the trackers.
The other shoe drops
As I wrote this, I was listening to radio, where Clyde Lewis more thoughtfully reviewed a greater enveloping matter on his Ground Zero show, things equally important to understand, and far more sinister. Listen to it, here. The short of it is that chipping people is not just about spying on them, it is about control. It will enable a complete rewrite of social, political, religious, and economic existence, and the script is already being followed step by step, RFID again at the core. You didn’t think ‘Global Warming’ was about weather, or that Transgender Issues were about rights, or that Terrorism was about political or religious ideologies, did you?
It is, all of it, in support of ‘a brave new world’ which the New World Order seeks to establish, a world where there are only three classes of people. While my friend Clyde did not use my labels for these classes, he did so describe: there will be Meons (a Club of Rome/Bilderberger label based on an ancient word for someone worthless, less than a peon – a ‘useless eater’ who will not likely survive the NWO on their own, and who will be made to ‘go away’ in time); Peons who will be usefully employed to run the system (government, business) for the elites; and the Elites, the 1% of the 1% who will rule.
Clyde explains how the Middle Class will be eliminated, divided between those willing to implant and deemed useful (peons), and those unwilling or deemed useless (meons), and the a host of new topics and proofs you have likely never heard of, and more. Naturally, the upper class will be peons, and the lower class, meons. Bio implants (part of Transhumanism) are key to all these plans. You had better understand all of this or you won’t be able to cope, and likely, will end up in the red list for population reduction.
Low Cost RF/MW reading devices are often purchased by TIs as a defensive tool against their targeting fears. However, the general topic (TSCM – Technical Security CounterMeasures) is just that: TECHNICAL, and readings from such a device can easily lead a TI to panic and over react. Here is why, and how to get more out of such devices, without the risk of serious mistakes.Updated Dec 2017 – Corrected technical boo boo and added a couple of closing paragraphs somehow deleted and not caught. Changes indicated with red intro. What you will learn reading this post: • all TIs could benefit from professional TSCM electronic sweeps; • that isn’t likely to happen; • the poor-man’s TSCM pro isn’t a pro, and might be a fraud; • there are low-cost meters but improper use can be dangerous in many ways; • there is a solution, and help implementing it — and here it is…
The way it is
A Targeted Individual can almost always benefit greatly from a professional TSCM sweep. Such a sweep, clandestinely done, could provide significant courtroom quality proof of electronic surveillance and/or harassment with directed energy weapons or mind altering signals, such as EEG entrainment, subliminal messaging, V2S, implants, and more. If you are new to targeting and don’t know these terms, read my books. With very rare exceptions, virtually all TIs are exposed to some form of electronic targeting, and such a sweep can precisely identify who is operating the equipment, the nature of targeting, and evaluate the threat and suggest defensive/offensive options. That typically includes their providing documented reports and personal courtroom expert testimony. Combined with optional services equivalent to a private investigator, it could even end up revealing who ordered and is behind the targeting. They can also potentially detect bioimplants in the victim’s body.
Unfortunately, there are two reasons no TI has ever used TSCM professionals with success, and hardly any have ever used it, at all. The first reason is, that only the wealthy can afford it. A truly effective sweep of a home or work place, can cost between $20,000 and $60,000. That is because the professional will need to apply towards a million dollars worth of specialized gear, and must have decades of experience in order to be qualified to do so and have the results stand up in court. Rather than ‘meters,’ they employ sophisticated signal analyzers and other toys for a full-spectrum solution (including light and audio threats).
Sigh. Add to Christmas wish list, and hope Santa is generous.
The second reason, is that all such qualified TSCM are almost always ex government/intelligence community/military/military contractors, and are therefore, by default, subject to ‘conversion,’ because almost all targeting is ultimately at the hands of those same players. By request or by bribe, the risk is that they will give a false report showing no targeting. It is simply impossible to vet a TSCM pro against this risk, unless you happen to have a personal family/friendship relationship in place from the start. I had such a contact, and the government framed him on illegal weapons and drug charges and put him in jail, confiscated all his equipment. James Atkinson (‘Granite Island’) helped me write my first book, filling it with informative information about TSCM and what government agency uses what frequencies for what purposes (data table and other information in The Professional Paranoid). Friends are keeping his informative web site up and running for him. Visit.
So what is a TI to do? One solution, is to go with less than a true pro TSCM guy with all that gear, someone like me, perhaps, who has nearly $20,000 in gear, and some investigated skills (I’ve put a lot of people in jail, shut down illegal CIA fronts, forced corrupt officials to resign, and ended targeting for clients). Unfortunately, there are crooked people out there pretending to be ‘like me’ using even less sophisticated gear (regardless of what they claim). I have seen YouTube videos of alleged ‘bioimplant scans’ where the scanner was charging $100 per implant found, and gee… everyone scanned naturally had between three and six implants, or more — until their money ran out. And yet, not.
The problem was, the meter being used, like most such meters, has an instruction manual warning that false readings will be obtained if one touches the sensing area of the meter (the business end). You are supposed to hold them a certain way to avoid that. A fraudulent scanner, however, holds it differently, such that he merely moves his finger to tap or touch the front whenever he wants to ‘find’ an implant, bug, signal. Sadly, this service was widely promoted by one of the largest and best known TI community groups. It even resulted in a multimillion dollar lawsuit, and that group ultimately disintegrated. One clue it was a scam was ignored by all: to get the scan, you had to fly into a small remote town with all of one Police officer, check into a hotel, and get scanned within a small window of time. Poof! the scanner was gone before the fraud could be reported and investigated, and many thousands of dollars richer for a half-day’s work.
Another solution is to buy your own meter. Prices can be as low as $100, even less (be wary when so). Not quite a perfect solution, in truth, because no such product, even towards $20,000, is designed and sold for the kind of use to which the TI intends. They are designed to measure the same kinds of signals (with significant limitations, usually), but for other cause, such as testing equipment against RF emission safety standards, or to ensure they are putting out the right kind of signal. The instruction manuals only speak to such uses, and the manufacturers/sellers have zero interest in helping a TI do what they need to do with the product. Nor will they accept returns based on failures to be useful in such an application. You are on your own.
Because of the technicalities involved, and in the face of a lack of instructions, it is not only extremely rare that a given TI will know what a given reading means, but also quite likely that they will make a false and potentially dangerous wrong conclusion as to meaning, and then take wrong actions in defense of that false conclusion. A TI easily makes silly mistakes, and the results can be frightening (ex: aiming the meter at the sky will yield seriously high readings, but is NOT a threat. Many TIs assume it means satellite targeting. No, no, and no.) An example of a serious wrong action would be false accusations of an innocent party, or spending limited financial resources for shielding or legal defenses applied uselessly. And there is another common risk…
All too often, a TI will call Police or go to other authorities or perhaps seek legal, medical, or psychological professional help, meter and readings in hand, intending to ‘prove their case.’ All they end up accomplishing, is being marked down as a very strange person with a strange little box and an even stranger and unbelievable story; a lunatic who needs mental health care. No one will understand the little black box or its readings, much less the story offered behind it all. They have never heard of TSCM, most likely, and so the entire concept is like talking about the kind of propulsion systems used on flying saucers. And if they do know about TSCM, they will know your meter is a ‘joke,’ and automatically conclude that your use of it and conclusions are just as silly, no matter what the truth is.
Note: there is one other potential ‘poor man’ solution — the use of a smart phone ap to simulate an RF/EMF meter. Yes, and no. Extremely limited range and scale of operation, extremely broad angle of view, and quite prone to misinterpretation. In fact, it has nothing to do with electronic solution; it only measures the Earths natural EMF. It has no value for personal protection, as I’ve written of, here.
Don’t give up too fast… all is not lost
Don’t give up on the notion, because there are some useful uses for such meters, if approached properly. One must simply alter expectations, and have a better grounding in how to properly use low cost meters such as those described herein from trifield.com, for the purpose. I can help with that. But let’s first talk about expectations:
a) you are not going to use them to find implants with much chance of success. There is only one type of implant they MIGHT find, which is the type which constantly broadcasts information. An example might be a tracking implant, or a health monitoring implant. Under the right circumstances, you might find such an implant. But most implants used in targeting are either not going to broadcast anything… instead receiving signals useless in detection — or they are going to deliberately use special broadcast methods most meters cannot see or respond to usefully;
b) you are not going to use them to find V2S, subliminal, or EEG manipulation signals. You can see these signals, but they blend into the background and do not stand out as such; they cannot be isolated and identified with simple meters;
c) you can use them with some confidence to identify DEW and other targeting signal directional sources. While it is relatively easy to misread signals and erroneously presume them an attack signal, if read during an attack and relying on the strongest signal sources, only, you are likely correct in the presumption. You can then plan shielding strategies more effectively, and narrow your list of suspect enemy positions and personnel to those within that angle of attack. With some luck, you might actually pinpoint the source and perps involved, but it won’t be legally useful. But focused video surveillance (don’t break the law), with luck, may confirm suspicions sufficiently to be considered legally useful evidence. Rely on video documentation of not just the doings at such sites, but also video of meter readings during attacks, to prepare potentially useful evidence… useful to perhaps interest someone into considering your story… knowing the likelihood is that they will still reject it as lunacy. Risk vs. Benefit is your decision guide about attempting to convince them;
d) you can use them to identify the type of signal, in some cases. They type and sophistication of the meter, and your ability to use them properly, will determine if that is the case, or not. It is quite easy to make wrong assumptions, as there are so many kinds of attack signals across a broad spectrum of frequencies (bands of RF energy). Most serious threats operate at frequencies well above the capabilities of low cost meters. Even my $20,000 gear cannot see above 12 gHz microwave, which is where most military bands operate. But if your enemy is not military based, you might have a chance with $20K gear… but with gear costing hundreds of dollars, your chances diminish to the point of being limited, perhaps, to seeing things an amateur or Cop might employ.
e) you can use them to warn of a DEW attack before it becomes a problem in terms of physical/mental effect. There is one particular low cost meter best suited to this use, allowing you to relocate yourself away from the attack area… the meter will advise when escape has been achieved (cease the warning). It will also indicate if you are being ‘tracked’ by a signal by some means (generally some kind of surveillance, or by a locating implant), and can give you a general sense of the direction of the attack signal source, much like the Trifield. It is not, however, a great substitute for the capabilities of the Trifield beyond that, but it is a better warning device than the Trifield, because it is automatic, and always operating, unless switched off. It can even clip to your clothing or be carried in a pocket, or set down anywhere near you;
f) you can use such meters to determine if the signal levels exceed safety limits set by government and NGO organizations. This, in turn, can sometimes be used to force government agencies, most notably the FCC, OSHA, to investigate on your behalf, though it is quite likely such investigations will not match your findings; the enemy will simply shut down temporarily. But at least you get a brief vacation from assault. When concerned about safety levels, you will want to carefully review online searches to compare the latest (always being adjusted downward) standards and what a level represent in terms of health issues, and that will prove to be quite technical — you need to carefully compare your meter reading and scale used for the set limits, which may require unit conversion (usually a matter of multiplying or dividing by 10 or 100; most such resources will give you instructions for conversion or cite alternate unit results for you). With luck, your findings can be matched to specific known physical symptoms for a given reading level, which if matched to your symptoms and reading levels obtained, can be useful if well documented (video of your readings and symptoms + industry data);
g) you might be able to use them to find surveillance technology, to include listening devices and cameras. Again, sophistication and skill of the user are key. There are devices better suited to this purpose which remain low in cost. Use a search engine (bug and camera detection gear) for that. Same for (phone bug detection). See my post on cellphones.
Now as to the other key requirement, proper use…
Fortunately, there are two specific low-cost devices I can recommend with confidence, and for which I can provide rather specific instructional advice on how to use them for TI needs. They are the devices I started with early on for my own needs, after some considerable informed research — and successfully used to confirm my own electronic targeting, source location, and identity of the operator at that location. It allowed effective shielding response which ended the threat, and finding of listening devices. It helped me to develop other tactics to defeat targeting which did not involve shielding. They had other benefits, as well, not the least of which was improved peace of mind.
As result, I made a special deal with the manufacturer (Trifield): they would sell them to me at a small discount for resale to TIs, and send TI requests for information or purchase to me… on the proviso (my idea) that I provide an instruction manual for TI uses, be responsible for any returns and customer service issues arising from TI uses. They did not want that business at all, and would not sell them to TIs if they understood such was their use/need. While I am no longer in a position to provide the service, which as a kind of rent-to-own trial program for which no one ever declined to own (it worked well for them), I do still offer the instructions (an emailed .pdf file, illustrated).
These are for the trusty and versatile Trifield meter (avoid the more costly blue-faced version, generally less useful to TI needs) and SmartAlert 2 microwave detection device offered at trifield.com. Both meters are very low cost: you can buy both for less than $300, just don’t mention targeting. My manual gives broad instructional use for both meters, and additionally includes an idea on how to modify (at relatively low cost) an entire room to be a faraday cage without dramatic change in the appearance of the room.
I used to sell the instructions for $20, with the purchase price applied to the purchase of a meter. The idea was that one could see what the instructions were like without risking the investment in a meter, and if thinking it doable, go for the meter without wasting the $20, as I made it free with a meter if purchased outright. It was a confidence-building approach to decision making.
I also tried to talk people out of doing it by pointing out everything in this article. Only if they got past all the negatives, and still wanted to proceed, DID I HAVE CONFIDENCE IN THEIR DECISION. I needed to feel it was right, too, because I did not want a meter to be returned — a wanted a successful use of it to better the user’s targeting situation.
Since I no longer sell the meter, I make the file available on request by email to anyone willing to make a contribution to the Free Will Society, and our effort there to establish Free Will Haven, a targeting-free, low-cost, self-sustaining intentional community (learn more here). There are two ways to go: A $20 donation gets you the manual. A $50 donation gets you the manual AND membership in the Free Will Society (you must have a Facebook account, as well, to participate in membership dialogs) and an ebook copy of The Professional Paranoid, which also talks about privacy/security issues, which includes material also related to meter use as described in the introduction (frequency usage). That, alone is a $12 value. By all means, donate more, if so moved.
Note: A secondary goal of the Free Will Society, is to subsequently establish a mobile strike team with a full professional TSCM sweep capability, to include a van full of gear (image above). This would be used not only by Free Will Haven, but be able to be sent anywhere in the country to target perps covertly, and nail them to the cross, and blow the whole topic of political control technology wide open in media, and in the halls of government… globally. And yes, that means yet another million dollars are needed. So add zeros to your donation 🙂
The manual’s instructions can generally be applied to any similar products, if one simply reads between the lines, and compares the differences between meters usefully. This is true even if talking about the $20K flavor, though the capabilities will expand greatly as meter sophistication (and price) increases. Just keep in mind that an expensive and more sophisticated meter will likely require some IEEE technical expertise, such as I actually have. I even have some background in microwave technology, and signal processing as employed by the intelligence community (selling and installing such technology, as well as general security and alarm equipment).
The greatest improvement high-end gear offers will be in the range of frequencies (bands) which can be analyzed, but there are many other benefits to better units, as well. For instance, the ability log to memory the readings as you go, plug them into a computer for even more signal analysis (big step up in usefulness), and improved sensitivity in range and angle of reading. A low cost meter reads rather broadly, say 30-40 degrees of arc, perhaps more, where my meter reads as little as 3-6 degrees of arc. Most low cost meters don’t even specify, and the ‘funnel’ nature of a broad angle contributes to misinterpretations of reading importance or meaning. Narrow is good, but you can compensate by taking care and multiple readings from multiple angles (triangulate).
Finally, we need to talk about what constitutes a dangerous signal reading on a meter. These devices display information in a wide variety of formats and scales which leave a non technical person with no understanding of what a high reading actually means. It only matters and is useful defensively if and when the reading exceeds safe levels. Different kinds of signals might be deemed dangerous at a lower level than the kinds of signal. For example, pulsed microwave is the most dangerous of all, and can be so at quite low strength. This is normally the main threat a TI faces, but most low cost meters cannot distinguish between them, or measure them correctly. This is not something commonly mentioned in their specifications, and you need talk to their engineers to inquire, to be sure the meter can deal with it correctly.
As far as safe levels, there are many levels established by many agencies of many countries for many purposes. What is deemed safe in one view or situation, may not be save in another view or situation. The nice thing about the expensive meter I use, is that it knows all these limits and indicates when one or more are exceeded. With a low end meter, you need to compare your reading to the various standards. Learn more about such standards, here.
Being targeted is all about unanswered, yet critical and deeply troubling questions, psychological torture being at least half the intent of targeting. The foremost question is usually ‘Why?’ or ‘Why me?’ There only three answers which matter, and they are not impossible to discern, and knowing can improve one’s ability to resist.
The way it is
The Three Answers
I and others used to think in terms of a fourth factor, which at least seemed to be another category, but it is not, by and large. And yet, as we will see, it remains telling and useful. Let’s start with the big three, first.
them at a personal level. But the bulk of joyriding would seem to be experiments upon the perps.
Knowing the difference can alter TI tactics
About Death Threats
Some 17 years ago, the Unified Conspiracy Theory was formulated. It was so accurate — it was able to predict in 1999 the 2001 downing of the WTC by jetliners and resulting Middle East Oil Wars, and other major news events. Now it can be seen at work in my newest book on the Bilderbergers — where fact and fiction collide… fatally.
Upate Feb. 20, 2017 Paranoia Publishing is set to start shipping hard cover copies of this book as early as first week of March. Amazon will carry it right away. ebook copies available direct from author now at half price ($6 – will return to normal price once hard copy is available) via paypal orders to proparanoidgroup at gmail com.
What led to this book? The definitive International conspiracy.
After ten years of research into crimes of the New World Order, I began to theorize that the bulk of America’s dark bumps in the night were not simply random crimes by assorted forces for varied agenda, but completely orchestrated as a single, logical, step-wise plan toward a single, yet visible goal. It resulting in the Unified Conspiracy Theory, and it was reasoned that if one knew the goal, and the steps thus far taken, such a plan was predictable, and as a theory, the ultimate test would be to do just that.
The first three predictions made with the UCT were so scary, that I had to take actions, do something… anything I could think of, to attempt to thwart them. The first was, that some kind of terror event would bring down the WTC with jetliners, and result in a series of Middle East Oil Wars. So, in the Fall of 1999, knowing no authorities would bother to respond usefully, or quickly, I published a quickly written screenplay featuring such a plot, and put it online with explanative warnings, hoping against hope it might force any such plan to be aborted. No such luck, of course, even though Oliver Stone’s people took a look at the script in search of a project. They thought it an impossible ‘false flag’ scenario.
The second UCT prediction was an assassination attempt on 1992 Independent Presidential Candidate H. Ross Perot, or his family, in order to force him out of the Primary run against Clinton/Bush. I took no chances, and this time, notified the Secret Service of my concerns, expecting they would ask me for details. I used my backchannel contact, someone I had worked with before on several Treasury matters. Some several weeks later, Perot did back out of the election, even though the very night he did so, he had won enough votes to be guaranteed a place on the General Ballot. A few weeks after that, my SS contact confirmed that an attempt had been made just before the Primary, against his family; mailed Anthrax. That has its own telling ‘false flag’ backstory.
The third was that there would be at least two more major false flag attacks to follow, specifically naming the type of attacks, and the cities. One of them was my home town, which I had predicted would suffer a bio-terror attack, and I even identified the means of delivery and rogue CIA Fronts to be used. But by the time frame where that might become a more current concern, I had finished my book set, Fatal Rebirth, which spelled these things out quite clearly, again hoping it might spoil any such plan. I also took steps to notify the City.
Again, no useful results, but fortunately, knowing such details enabled me to personally thwart that attack, or at least postpone it. It is featured on this Blog’s home page. But I was definitely able to thwart second, different terror attack in the same time frame, likely a Plan B to the former. It was called Gas Station Tasking when announced by President Bush; the use of private planes to dive bomb the area’s largest gas station while a tanker truck was offloading gasoline, at the busiest time of the street traffic day. This is also detailed on the home page.
This could easily have taken out two gas stations, four restaurants, two banks, two two hotels, and potentially, two major shopping complexes, and the traffic on the busiest intersection in the County, plus a major Interstate and two State highways. Identified, were two of FBI’s Top Ten Most Wanted Terrorists, and others, including the Christmas Tree Bombers. They were getting help from an FBI Agent known to me, and so, as it was a false flag operation, FBI, CIA, FAA, DHS, in response to my going public, never asked for my evidence, which included fingerprints, video, multiple eye witness confirmations, and more. The cover up was started before the President even heard about it. See home page.
Why UTC matters to this new book
Other UTC predictions have since come to pass, as well. The reason this is all mentioned here, at all, is because the UTC does not just affect America, it relates perfectly to World affairs, as well. And in this world, we have various Round Table Groups of Globalists who push for a One-World Government, which is to say, elements of the modern-day Illuminati. Such groups as the Tri-Lateral Commission, the Council on Foreign Relations, and the Grandaddy of them all, the Bilderbergers, and many more (even United Nations, World Bank, et. al), all tend to be cut from the same New World Order mold.
Which in turn is to say, largely fascist, all-too often satanic, and decidedly power elitists seeking to rule the World through manipulation and control of (everything), and willing to do so at any cost, by any means. Not to go overboard, it is important to note that, with the exception of the Bilderbergers, most Round Table Groups, like FreeMasonry, attempt to draw in newbie membership who are completely innocent Sheep. This gives surface viability and credibility of these groups to mainstream in ways which allow them to mask the darker roles they play in seeking the Globalist rule, while also giving fresh students to draw into their world, especially the more successful up and comers. There is a backstory there, as well, as I have first hand knowledge, x 2 telling examples, having been such an up and coming business man.
Ergo, this new book is designed to do much the same thing as Fatal Rebirth; to warn you just what these people are doing, and why… and why you should be mad as hell about it and doing something to stop them. Only, my new book is global in scope, where Fatal Rebirth concerned itself only with America. And, while Fatal Rebirth began unfolding in 1947, Who’s Killing the Bilderbergers is a current-day affair. As such, it is perhaps more urgent, that you read it, and soon — because the future is revealed to be bleaker than the Dark Ages and time of the Inquisition, for those not forewarned and forearmed.
The plot thickens
I describe this book as ‘an International Novel of Novel International Affairs.’ A grand murder mystery across multiple Continents, trying to resolve mysterious death after death of prominent Globalist leaders. Are they simply random deaths by happenstance, or murders by elaborate design? Officially, they are not due foul play, and yet… each one has many unanswerable questions clouding that view. Just as troubling, their deaths seem to be tied to various strange conspiracy theories, while at the same time tied to various Globalist agenda, either narrative affording motive for murder. And, of course, it is soon enough discovered that they all turn out to be Bilderbergers.
By the time the truth of the deaths starts to be uncovered, the UTC will have started to reveal itself in action. In like manner to UTC’s ability to be predictive, readers will be propelled quickly into the future, headlong into the one final prediction which is the ultimate form of fatal rebirth… for us all. That particular prediction WILLmost certainly come to pass; it has, after all, been foretold by many authors well before my time. Among them, Satanist and high Mason, Adam Weishaupt; it is the entire purpose of and predictive goal of the Illuminati Plan, as he formulated it in 1776, when the group started their journey toward a New World Order (he first coined that term).
As this book reveals, just when it comes to pass, is largely up to you. You, are what you’ve been waiting for. They hope you don’t know that, and remain Sheeple.
An important detail
And, along the way to that story-ending element, readers will also encounter countless real-World conspiracies laid at the feet of Bilderbergers, all done in ways which let the individual decide for his or herself, which, if any, may seem fanciful, and which are more likely true. There is much documentation within the main body, plus more than 150 footnotes (an average of one every page turn), to help that process along. Some of those footnotes are illustrated graphically. The Climax and Ending will then show you the progressional nature of the Globalist plan as it unfolds toward the very last step in the plan, the point of no return for Mankind. These conspiracies back up the UTC usefully, and in fact, understanding them helps refine the UTC more usefully; one tends to validate the other, in both directions.
There is a little known and underreported TI targeting method and symptom based on Stray Voltage, which is usually marked by a dramatic prevalence of ‘static discharges’ when touching things. But there are other symptoms, and happily, tests and cures.
Stray voltage is the technical term given by the power and electronic industries to a situation where an electrical charge is present in the ground, itself. It can also be present in a structure, such as your home or workplace. It tends to be far more likely to be present at the ground-floor level than upper floors, and is commonly found present at insignificant levels almost anywhere electricity is used. It can even be found in places where there is no AC power nearby present, at all, if there is Quartz bearing rock in the substrate. Concentrations of Ferrous rocks and ground water near the surface can impact, as well.
In structures, the type of structure materials and design can impact prevalence, as can furnishings and the layout of property. And though considered rather rare as an actual problem, for some reason, it is normally thought of or understood as being significantly more problematic in rural farms (especially noted in dairy farms) more than in bedroom communities, though it can be found even in downtown high rise areas. It seems to impact Cows in many observable ways, to include reduced milk production, troubled births, general health and premature deaths.
The power industry takes great care to prevent stray voltage levels from being detectible or able to impact living things, including you and me, but things can go wrong. When that happens, and depending on how strong it ends up being, it can be quite detectible, and generally, unpleasant, if not harmful or even dangerous. Some forms are capable of outright electrocution, such as created by downed high-tension power lines. While this post uses the term Smart Meters in the title, it is less about that, except that a possible conspiracy may exist between Smart Meters and stray voltage, as outlined below.
There are many reasons stray voltage might be present at problematic levels. I see these as divisible into three threat levels and causes. The first may be relatively minor in threat level, caused by natural eventualities unrelated to targeting, and unlikely to escalate in nature. An example might be living near to high-tension lines running parallel to metal fencing on your property, where a kind of induction takes place causing the fence to produce an electrical current.
The second is also unrelated to targeting in causality, but may be far more serious, even dangerous, and quite likely to escalate — such as may due to electrical shorts or combinations of other unhappy electrical happenstances. The important thing to take away is that the bulk of stray voltage may have nothing to do with being targeted, but any presence which is detectible should be of great concern to anyone, and pinned down immediately.
The third? I have recently discovered a new possibility, thanks to a coincidentally… even accidentally discovered set of facts learned from one of my very first TI clients. I say coincidentally, because in considering the new information, it dovetailed very nicely with other client information which had otherwise led nowhere. As result, I am now quite confident that there can be deliberate targeting by artificially creating and controlling stray voltage for the purpose.
It can be used to establish a variety of selectable threat levels and targeting effects (symptoms), to include other forms of electronic targeting. This level is not officially recognized to exist by the power industry, though the potential for conspiratorial knowledge and participation in its use surely exists. One would be unwise to broach the possibility with power companies or other parties, unless part of a legal response effort, as mentioned herein. The good new is, that regardless of the three types, any serious threat levels can be dealt with, almost always.
To weaponize AC power in this way (there are other, previously known and frequently spoken of ways, such as found in my book, MC Realities), simply requires shunting of power to the earth at one or, as is more likely, multiple locations around the property. This would likely be done through a control mechanism to throttle the voltage diverted, even to an ‘off’ position, something akin to a remotely controlled dimmer light switch. Naturally, it will consume significant electricity, and that will turn out to be a blessing, as we shall see.
After reading this short introductory post, a TI would be well served to learn more about the topic, even if not thinking themselves impacted by stray voltage, currently. As the link to that information only addresses the first two reasons, the reader should indeed finish this post, first. After reading BOTH sources, then, and only then should they attempt to fit their circumstances into the dialog and consider the best course of action. Feel free to contact me if unsure, at proparanoidgroup gmail com.
Symptoms, regardless of cause
At natural ambient and other low levels of stray voltage there should like be no outward signs discernible. We only need worry about the phenomena if we do start to sense effects. We have all experienced the random static discharge of touching a door knob after walking across a carpet. While discounting such experiences as carpeting woes, they can also be due to stray voltage, which can certainly augment or simulate carpeting-caused static build up, as not all carpets generate the problem to the same degree, or even at all. When you get such discharges in the absence of carpeting, that is a typically a clear sign of stray voltage — though cold dry air can contribute, as well.
Note: normal static discharge is usually relatively high in voltage but low in amperage, quite akin to that associated with spark plugs in an engine; unpleasant to experience, but relatively harmless, more likely to cause injury from jerking away with violent contact with another object, than from the actual shock. They may generate a small visible flash of light, an actual spark jumping a few millimeters, at most. But stray voltage can produce far more varied and dramatic, even dangerous results. There have been instances of seeing discharges which travel inches or even feet, making zapping or popping noises, producing heat. The risk of fire and explosion cannot be ignored, where flammable fumes or pure Oxygen sources might be present. Obviously, the voltage levels in such cases are even higher, as may be the amperage and risk of electrocution.
Serious levels of stray voltage can cause effects similar to other forms of electronic targeting, and may indeed be augmenting such targeting from other sources. In point of fact, especially for persons who also suffer electro-sensitivity, there is a small chance that some persons who see themselves as being a TI may in fact not be. Accidental, or even natural stray voltage might be causing enough symptoms of targeting, by itself, to erroneously presume targeting. This would be good news if the individual is not also experiencing non electronic targeting symptoms, such as organized stalking, or other forms of harassment.
Electronic targeting symptoms are radiographic in nature (radio and electromagnetic), and therefore, stray voltage symptoms, would typically be some combination of any number of things which match those same symptoms. The range of symptoms is broad, from headaches, nausea, dizziness, mood swings, sleep problems, sensations of burning, tingling, vibrating, tinnitus or humming sounds, as well as more unpleasant physiological symptoms such as heart palpitations, chest pains, muscle and joint pains, fibromyalgia-like conditions, twitching or trembling, and so forth. Arguably, there are other symptoms, as well, but these are the more commonly reported ones, and the easiest to identify as being abnormal. That said, the caveat is valid: don’t presume a system does not have a medical explanation; always see a Doctor (without talking about targeting) to make sure you do not have a ‘simple’ health issue in need of treatment.
In fact, stray voltage can simulate or stimulate a variety of general health problems in humans and animals, alike. When doctor’s tests find no other explanation, stray voltage (or other electronic targeting) may be to blame. Some animals are more able to sense stray voltage and will naturally avoid areas where it exists in undesirable levels; they can be ‘Bird Dogs’ to the problem by strange behaviors or health issues. High levels of stray voltage can also cause plants to die, or may result in random discharges between objects otherwise insulated. By way of example, a visible mini-lightening flash between an automobile and the ground or nearby fence or garage door frame.
The interesting thing about stray voltage is that its effects may be amplified by humidity and moisture, or even temperature. Therefore, such effects might tend to be more noticeable if walking in the rain or while wet, as when exiting the shower. Serious stray voltage could make swimming pools and standing water dangerous. But even relatively harmless but noticeable levels of stray voltage can be dangerous, because whatever is causing them could be capable of sudden and unexpected increases to dangerous levels. Take no chances, and deal with it right away, if symptoms are present. See below.
Smart Meters and stray voltage; a possible new conspiracy
A lot of people, including many TIs, feel that the entire power industry’s move to Smart Meters is a Big Brother and/or industry conspiracy. Like most good conspiracies, there are multiple theories involved, ranging from price gouging to spying to mind control, and more. But the big concern and commonality in many of these theories tends to include the very same health issues as found in stray voltage.
Yet when the industry itself, as well as third-party independent testing firms investigate, most such studies indicate smart meters are no more dangerous than your computer’s wifi connectivity. I’m quite unconvinced about their conclusions, but I also understand how conspiracies work, and how the intelligence community thinks — and specifically, how they think about and employ mind control tactics.
It dawns on me as result of the dichotomy between the reality of Smart Meter user experience and test results, that there may be a conspiratorial answer which explains the conflict. Once a Smart Meter is installed, perhaps Big Brother comes along and uses the Meter to establish stray voltage. That would account for the health effects and higher bills, and certainly still enable spying and mind control capabilities.
The simple fact is, the studies giving a clean bill of health to Smart Meters are only testing the meters and the air waves. They are not testing for stray voltage. So, if you have a Smart Meter and are experiencing Smart Meter woes, perhaps you ought to test for stray voltage. If you find it exists, you will undoubtedly be advised by a lawyer that you have an excellent actionable case against the power company.
Note: It has been discovered that the power industry, in order to address public distrust of smart meters, is instead apparently installing meters which look identical at a glance to the old mechanical meters, but which conceal a ‘trojan horse‘ Smart Meter under the skin. They are, however, supposed to be easy to spot. TAKE NO CHANCES, and check YOUR METER, today, even if an ‘opt out’ user. And, if told you were not getting a Smart Meter and discover a trojan horse, you once more have a reason to contact a lawyer, and the media.
Stray voltage as targeting weapon
Deliberately causing stray voltage as a harassment tool is not the only ‘advantage’ to perps. Because electricity can carry embedded RF signatures, it can cause an entire area, such as a home and its yard, to become a kind of transmitter of other forms of targeting signals, just as can house wiring. It can therefore become a kind of amplifier of such methods. But to employ it requires something which should ideally be relatively easy to detect, and defeat.
Simply shunting your existing AC power to ground, a deliberate ‘short,’ if you will, is NOT normally going to be done because the power bill would go up dramatically, and tip the victim off that something was amiss. Therefore, the perp would need a second electrical service on site, which means a separate meter head, which they then ‘weaponize’ for the purpose. In apartments, it might simply mean using a neighboring unit’s meter. In a home, it may mean a separate power line to a concealed meter somewhere on the property or just outside the property line. It may be an underground service, even if the property is otherwise serviced by an overhead feed.
In an apartment situation, all the meter heads for a group of units are mounted at the same location, and labeled as to address/unit. If suspicious, you can wait until a high consumption power period (i.e., using your stove to cook), and then go look at the meters. If you do this when you see signs no one is present at the suspect neighboring unit (not using their stove), but their power meter is drawing more power — you may have found proof of the method and the perp.
In the case of a single domicile, simply call the power company and ask if there is more than one meter assigned to the address, or if there is a meter or extra meter assigned to neighboring lots. If the answer is yes, ask if any extra meter is in use and being billed, or if you might be able to acquire the meter for your own use (to justify why you ask). Any extra meter may be proof of the method and, with some legal steps, lead to identifying a perp.
Proving stray voltage
To confirm any such targeting, you will need to prove stray voltage is present, the same thing which should be done if symptoms are present and targeting is not involved. There are three ways to do this. One is to call the power company, which has a legal liability to insure stray voltage does not exist, in the same manner that natural gas providers must worry about gas leaks. Another is to call an electrician. Either of these methods can also result in identifying and curing the source cause of stray voltage. It will likely be up to you to document their findings, such as with video or witnesses — though they may be willing to provide written documentation where they bear no liability risk. Again, you probably should not mention targeting concerns to these people.
The third method is less useful in terms of evidence unless you are an electrical engineer or have similar credentials validating the quality of your findings; you can obtain test equipment and test the matter yourself, again documenting every step as you go. It is not quite as simple as the illustrated image, and should involve more than one kind of instrument. The procedures will vary depending on where you need to test, and what the location is like or contains in the way of objects and surfaces. The entire property should be assessed, and if done usefully, will ‘map out’ zones of impact from high to low. More information on the ‘how’ is available online, including that link you should read after finishing this post.
Regardless of which method used, where targeting is suspected, know that the power can be turned off remotely as soon as any perps involved discover testing is about to take place. This means you will want to covertly order any such tests, and ideally, try to find a way to avoid having whomever shows up to conduct the test show up in a marked truck, and having them quickly first test somewhere out of sight from any possible perp surveillance position. THAT is the hard part. Doing that yourself is much easier, of course.
If you are a TI or suspect same, I urge all readers of this post to comment as to their findings or conclusions upon further investigation. In two and a half decades of contact with 12,000 TIs, I have only known of perhaps three or four cases where stray voltage was in any way evidenced. As result, it appears to be an entirely ‘unknown’ targeting method (assuming such was the case). I have only recently been made aware of the possibility that a power company can have two different meter heads assigned to a property under two different account names WITHOUT the property’s owner/renter’s awareness, even though BOTH are in use — by SOMEONE.
It can only serve the greater TI community to learn if this is more wide spread than thus far observed, especially given that it can be easily detected and defeated if and when in use. Ditto because of the advent of Smart Meters, in which case this new information may be a very useful weapon for use by activists against the power industry, and legal pressure (lawsuits) by user-victims. It is equally important because where targeting is not involved, education on topic may lead to resolving a potentially deadly stray voltage of less sinister origin, and address final cure to otherwise unresolvable health issues.
And, in closing, let me state it once more. Any instance of serious stray voltage, even if not related to targeting, likely represents an actionable legal issue; you should consult with a lawyer about suing the Power Company and/or whomever pays the bill on any secondary meter head causing the effect, or any otherwise weaponized meter head.
If there is one thing I’ve learned after having contact with 12,000 Targeted Individuals over some 25 years, it is that without help, they have no good chance at properly dealing with their targeting. There are many reasons self help fails, and yet the solutions are not that complex.
The TI dilemma
I have never met a long-term Targeted Individual (TI) who did not have the same generalized and massive array of problems. The easiest victims to help were those who had only recently become aware of targeting, as their problem list was much shorter, making defensive solutions easier to derive and implement. But for everyone else, the list of issues was, well, mind boggling. I would see it in the very first communication (typically email or letter). It would be as if a letter about life from Lil Abner’s (by Al Capp) character, Joe Btfsplk, who never had a good thing happen to him or anyone around him.
Note: I am no longer in a position to offer such personal helps. I do still offer a free Helps Kit by email which is useful to the TI in multiple ways, and I’ve written many how-to books on topic which are quite detailed and useful, to date still the only ones of their kind, as far as I am aware. I am still open to email contact at proparanoidgroup at gmail com, and can field simple generic questions, but I no longer engage in situational analysis and tactical advice, investigations, or direct intervention. This post is intended to help take up that slack.
That first contact would be pages long, typically, in story telling mode, and full of unhappy emotion, a hard thing to read; both in terms of eyestrain and emotional drain. Paragraph after paragraph of one problem or targeting issue after another. There would be a long list of events and suspect perps (perpetrators). It would commonly entail problems with their job, their family, their church or other membership, their neighbors, the cops, the legal system, the medical system, their financial situation, their computer security, and more, to include actual targeting symptoms impacting their health, and at times, the health of their pets and their plants.
The effects would be physiological, emotional, mental, and in some cases, impact physical objects. It must have been even harder for them to compose it, than for me to read it. Each such effect might entail a variety of individual symptoms and clues as to cause. Oddly enough, typically NON OF IT IS USEFUL in providing helps. Their valiant and painful plea for help ends up being little more than an exhaustive rant in terms of value in a practical investigative analysis. The ONLY way to tackle targeting usefully, either as a helper or as a victim, is to start completely over, which is why the Helps Kit was evolved; it started over in a way which simplifies, organizes, and quantifies useful information.
A Detective investigating a crime does not want to hear the long drawn out account of the victim up front. They start with a GENERIC description of the nature of the crime from the Cop on the scene (who did get that account from the victim), and then they INTERVIEW the victim with SPECIFIC simple questions aimed at nibbling away at facts in order to find the ones which represent CLUES. “What did you see? What was said?” and so forth, each question hopefully suggesting another. They then use the answers to solve the crime. A good model for helpers and TIs, alike. A flood of data drowns the truth, but point-by-point realizations build toward it.
There is another problem. While their described symptom or effect may perfectly match a known Political Control Technology (PCT) or method, it is also absolutely true that each and every example could also be due to a natural medical situation, or have a simple but yet as unknown social, or financial cause. Since authorities and professionals who are the natural ‘go to’ for help prefer not to believe in the Boogey Man, the assumption is always that a natural cause is to blame. A wise TI would do the same, seeking to eliminate any such possibility.
Failing the wisdom creates more problems for the TI, even when the go-to helper cannot find the natural cause or address it, because it is next easiest to blame the TI for the problem, even to the point of accusing them of being a paranoiac schizophrenic; the easy out. For the record, when working long term with a TI, I will in time discover the truth, and the truth is, purely imagined targeting among those reaching out to me has proven quite the exception. But some might be delusional, of course, but I’ve also learned that persons with mental issues are often selected for targeting in training projects, so that any serious mistake by trainees will be far less likely to draw interest of authorities, who will make the assumption the whole thing was imagined.
The bigger problem
As result of all these things, a TI is faced with so many problems, and so many clues, that they can literally find themselves immobilized by confusion, unable to reason it out, or even unable to cope. And yet, there is always one more problem, far more serious than the rest: they do not understand the truth of their targeting situation. I’ve never known a long term TI who did not have a false belief as to the nature, cause, purpose, source, and method of their targeting. This is by design, a primary goal of targeting; to create a false belief structure which makes it impossible to defend against, because defenses will be aimed at the wrong problem.
This further makes easier another primary goal, to make the victim seem crazy, either by their reactions being seen as paranoiac, or by telling others things deemed insanely impossible. But to underscore, the biggest problem is that their defenses will not meet the need, resulting in failure and frustration, a tool for their tormentors. So, finally, they come to me in a desperate state, not just in terms of needing help, but in terms of simply needing someone to listen to them and actually believe their story.
No one should presume a TI’s story to be imagined or fake, though it is true there are some who pretend for ulterior motives. In time, the truth will out. But because of their failure to truly understand the nature of their targeting, they might have been led to believe almost any untrue thing which cannot be seen as rational. For instance, one victim (who was schizophrenic, as well) believed they were beset by Alien vampires. In truth, the targeting was evolved against the person because they had discovered a firm involved in illegal dumping of biohazard materials, and to insure that her story was not believed by authorities, they led her to so believe. They relied on her schizophrenia to protect them from discovery both as perps inflicting mind control, but as criminals violating Federal law. The schizophrenia, itself, made that easier to accomplish.
How to eat an Elephant
The old saying is, one bite at a time. Here are the bites, a series of axiomatic advice points presented in a somewhat stepwise manner, the same things I would normally work through with every client. Remember, only you can decide any risks involved, and take the wisest course of actions based upon those perceived risks. This is merely a guideline of what has worked well in the past, and is generic in nature…
- Acknowledge your belief structure has been manipulated and you do not likely truly know the who, what, why, and how of things; you have been deliberately mislead. Following this guideline should help address that flaw, but only if you remain open to the possibility. Educate yourself about PCT and know your enemy, and always seek and eliminate any possible alternative explanations — but also keep in mind the pitfall cited at this post’s end;
- Be wary of professionals which we should otherwise rely upon, such as doctors, lawyers, dentists, and private investigators. Most will either walk away or take advantage of you on the assumption you are crazy, or worse, seek to have you evaluated by mental health professionals. The best strategy regarding that, is to seek an evaluation on your own: a written clean bill of mental health can be a wonderful defense if eventually accused of being delusional, even if by authorities. If you must find a professional, including a therapist, your best bet is to go to a city at least 50 miles away, and find a relatively recent graduate (i.e., a lawyer new to the Bar), of some minority race. They are likely to be hungrier for work, and more anxious to do a good job, and less likely to have had their morals corrupted over time by the industry. Avoid saying you are targeted, just tell them your concern and enough facts to get their interest. Answer their questions, but where a question requires an answer which gets into targeting details, give the details, and offer no presumption of cause, even if asked. Let THEM make that conclusion on their own, or not — it should not change how they perform for you;
- Cops, on the other hand, will either instantly so peg hole you, or worse, turn out to be in place assets working with the enemy against you. If you MUST do so (as in reporting a crime), or if you choose to become a TI activist or otherwise ‘go public’ (includes any Web presence), follow the advice found here;
- Start and maintain an event log. Use a voice activated (VOX) recorder kept on your person to make verbal notes describing questionable events, suspect persons, vehicles, etc. Leave it on to capture events directly, automatically. Transfer this at days end using headphones, to a computer spreadsheet or database file. It should include Time, Date, Location, Description, Details, and your emotional or intuitive thoughts at the time as to what it might mean. Compare new events of the day with older events, looking for patterns, frequent appearances of the same person, vehicle, etc. With respect to persons, give them a ‘code name’ based on their appearance or behavior until able to acquire their actual name. For vehicles, do get plate numbers, but since plates can be replaced or stolen, also note vehicle damage, stickers or decals, and the like. This will help you get closer to the truth of your targeting, and may be useful as evidence at some point;
- Remember that if you have a pattern in your life (such as going to work the same general time of day along a given route), so do others. Do not be concerned in such routines to see others around you repeatedly, because other people also have routines which may overlap with yours. DO be concerned if seeing the same person/vehicle at disparate locations and times when out of routine, and especially if also noted while in routine;
- Establish site security at home, and to the extent possible, work. My book, The Professional Paranoid will help, but in general, you need to insure no door, window, or opening can be accessed from the outside, even with a key, without breaking and entering. Perps don’t like to do that, because it leaves proof you are not imagining things. The only entrance that should be key accessible, should be via a pick proof deadbolt lock. Put one on your garage door, as well. If you can, install security lighting and a video monitoring system. Protect rooms and entrances or items with simple alarms, and employ and document any trip traps you set per the instructions in my book;
- Establish computer security AFTER site security. Backup all files, wipe the hard drive, reformat, reinstall OS, set new password, reinstall apps, restore files. Discard wireless keyboard. Disconnect from Internet. Buy cheap used iMac and set it up to be a local server, connect it to the Internet with Web sharing turned on, connect your main computer to it. Download a Web security monitoring utility to run continuously on the Mac, check it daily. Reset your router/modem to factory specs, install new password. Repeat this process and reset and all passwords regularly, do not use same PW for all. Consider to join the Free Will Society, a closed Facebook Group I maintain (application is via the Helps Kit mentioned in the Note near page top), or any of the many public TI Groups on FB (I am member of many);
- Improve personal security, starting with phone. NO CELL PHONE IS YOUR FRIEND. Keep it in a foil pouch, turned off when not in use. Where that is not practical, remove battery and install only to check for calls to make calls, or other use. If a smart phone, there are a number of apps I suggest you install. Mobile Justice from ACLU; an aircraft tracker that sees transponders; Spectrum Analyzer and/or EMF Detector; RSOE EDIS notifier; iTriage health advisor. You MUST disengage certain features. Cary a camera ready to go (not cell phone) and voice activated recorder to document events. More advice in my book, including land lines and general bug detection;
- While observing (3,4), avoid trying to deal with the sum total of the problem. It becomes a matter of ‘too many clues,’ per the introduction of this post. Instead, choose any ONE. Then review all others for any which seem related, aligned, supportive, or opposing, and set them aside for study as a subset. Analyze these, alone, formulate a means to prove or disprove each clue, and based on those results, validate, reject, or find the subset unresolvable, and move on to the next subset;
- You MUST presume any physiological symptoms are potentially actual health issues and seek a Doctor’s advice. When doing so, do NOT mention targeting, but it is OK to mention external symptoms (pets, plants, etc.) as might possibly be related. Pursue any suggested treatments until no treatment proves useful. ONLY THEN will you know the truth, and be closer to true understanding of your targeting, andy you may actually improve or cure actual health problems as well. Along these lines, anything you can do to impact your physical, mental, and psychological well being is to your good — become a health nut and try everything that claims a benefit, as everyone’s situation and physiology is different, but products seldom attempt claims of addressing targeting effects; you won’t know until you try it — but try only one new thing at a time, or you won’t know which is responsible for good outcome;
- Deal with Gangstalking. Very simple. Ignore it. It is only there to jerk your chain, and that only happens if you allow it to happen. You can choose not to be upset, worried, etc. Document it, yes, but laugh at it and them for wasting their time and money. This is simple in concept, and yet hard to do because of human nature. Stop, Think Act, practice, practice, practice;
- My book MC Realities offers a very good review of how to detect, identify, and deal with PCT. Once a better understanding is obtained from he previous steps, you can start to defend yourself more usefully with these trial and error methods, which should give you some good specific truths about your targeting. In general, we worry about implants, which can include voice to skull (V2S), Directed Energy Weapons (DEW) which cause physical harms, mood/sleep control; and other electronic tech which can also account for V2S. The precise defensive/offensive tactics will vary to type and specifics. Shielding is almost always the best defense, but there are so many factors that the easiest thing to do is to shield an entire room for a few hundred dollars, but other methods should be tried first, as that is where the targeting truths can be learned. Where there are problems still encountered, feel free to contact me;
- If your targeting involves pain inducement DEW, or you have actual medical conditions which cause pain, ask me for my Jedi Mind Trick, the best way to describe a method I have developed which allows one to mask pain with nothing more than the power of their mind. It is difficult to master and requires practice, but once mastered, it is easy to apply, and for some users, it can also turn your body into an EMF meter for advanced warnings of attacks, and has application to general problem solving, including the issue of true understanding of the targeting’s nature. I use it to eliminate pain from toothaches (a Molar who’s roots were growing through my gums, into my mouth, and into my cheek), burns, fibromyalgia, and even tinnitus, and I can use my hands to find power lines in walls, as well as microwave and EMF sources. Demonstrated it many times;
- Once defensive efforts are well in hand, there may be some significant offensive opportunities. These are outlined in my books. Should you think any are appropriate, feel free to run your ideas about implementation by me for fine tuning or other commentary;
- As a rule, a TI has no concrete knowledge of the reason why they are targeted. Exceptions tend to be incorrect, as earlier mentioned. Knowing the who and why us the key-most truth, as it can sometimes lead to establishing a blackmail insurance policy. This key can sometimes be discovered in memories. Go back in time in your mind to a point roughly six months to a year prior to first noticing your targeting. You would be looking for some odd or unusual event or thing overheard or seen. It might be an argument or a document or a conversation which, at the time, did not make much sense to you, but stood out as unusual in some way. Almost always, it is a work related memory, especially if your work had some relationship to government, intellectual property, high finance, or high profile legal matters; the sort of place where conspiracies and dark crimes might hatch, take place, or be evidenced. Should you find such a memory, contact me for general advice on how to verify its usefulness and take advantage of it;
- Where defense cannot be well achieved or maintained, relocation can typically buy several weeks to months of temporary relief. Often, simply going mobile can offer at least partial, if not full relief for a time, especially when not in your own vehicle, and leaving behind all personal possessions (new clothes, luggage, etc.) and taking no phone, NOT CALLING ANYONE, visiting online accounts, or purchasing anything on a card. For a more permanent solution, consider residency at Free Will Haven, a targeting-free self-sufficient and low-cost intentional community project of the Free Will Society, which is based on tiny homes living. I myself have been living quite comfortably in about 120 square feet (excessively tiny) for the last three years, and am quite content to do so, sacrificing little in the way of lifestyle, otherwise. Again, an application is contained within the Helps Kit mentioned in the Note near page top.
- Be prepared for local, regional, national, or even global social turmoil, be it disaster, civil unrest, martial law, real or false flag terrorism, revolution, race war, or political or financial upheaval. PCT has been being ramped up in terms of victim numbers (some estimates place the national number as high as 12,000,000) and individual intensity. It is my belief that the reason so many people are being targeted and the targeting is increasing, is we are heading to a crescendo designed to amplify any crisis turmoil in order to enable a shift in government form, all in the name of restoring national security and social order. Arrange to have a 90 day supply of food and emergency supplies and basic tools. Leverage your preparedness with a visit my special Facebook pages and review each post found there: the Post Apocalyptic Library of portable survival how-to knowledge; the Post Apocalyptic Local Area Defense Network, especially useful to TIs even without a crises event; and the FEMA, Martial Law, Revolution Database;
- Consider dropping off of the Grid; escape the Matrix (there is an actual matrix involved), perhaps even with a new identity. This is seldom possible while still being targeted, but the attempt, if done properly, can buy you significantly more targeting-free time before you are reacquired. This two-part post can help.
There are also some common mistakes that TIs make which can be avoided. Oddly enough, almost every TI has already made them, and yet, tends to continue making them, failing to see the risk they pose until till late. Here is a summary list, but remember, there are no hard and fast rules. There can always be an exception. If you think you have encountered one, contact me for review to see if I might not agree, or why not.
- NEVER seek help from authorities or ERTs due to targeting, itself. If an actual injury or crime is involved, such as vandalism, death threat, theft, etc., by all means report it, as having it on record can be useful evidence of targeting for possible use at some future point — but do not mention targeting concerns, and once more, follow the guidelines found here. If questions are asked as to why someone might undertake an action against you, you CAN mention that there have been strange things happening and you might choose one or two examples, if asked to cite them, but state you have no understanding as to why anyone would do so, and that you have no suspects (even if you do). The last thing you want is an investigation which concludes you are mental, which is where it almost always will end up going the moment you deviate. It may be wise to apply this rule to friends and family, and certainly to co workers, as you can end up destroying relationships with disclosure. The only exception should likely be limited to those living with you, and even then, you will pay a price. I lost a wife and a foster daughter to it, and possibly another daughter;
- NEVER react to targeting stimuli if you can avoid it. Train yourself to Stop, Think, and ACT, do not REACT. You, STOP yourself from reacting, THINK about what they are trying to cause you to do (i.e., get angry), and the ACT contrary to that in some random manner. This both negates the purpose of the targeting, and causes perps all manner of concern, either about the validity of the psychological profile they had prepared on you in order to determine the best targeting methodology, or the operational reliability or skill of any equipment or perps involved. This can at times lead to dramatic increases in targeting efforts, but if you continue the ploy, it will lead to them trying to ‘repair’ whatever problem they think is the cause. That typically results in a small rest period of no attacks. Eventually, it can destroy the effort entirely, especially if this method is applied by someone in early targeting, as it prevents them from advancing to other kinds of targeting, or they advance and abandon the failing method(s). This, and use of the Jedi Mind Trick, and numerous blackmail insurance policies (each time I created one for a client, it protected me, as well) is how I have managed to negate nearly three decades of attempted targeting and its consequences; I do not consider myself a TI, because I keep winning;
- NEVER be overly concerned about death threats, being followed, or about gang stalking events, it will simply make you wax paranoid, and be seen as such. The people who engage in PCT would simply kill you, not threaten you, if they wanted you dead. Unless a threat was quite specific and included a warning that you should do or not do something, ‘or else’ vividly described, it has no basis in any real threat. If you get a threat with such a basis, that basis must represent a clear and present danger to THEM, in order to be valid. Telling you to stop being an activist, or stop investigating why you are being targeted, does not count, unless perhaps, you have gotten to the point where you can CLEARLY identify and prove with legally useful smoking-gun caliber evidence the who, why, when, what and who of it. In such a case, you have the makings of a blackmail insurance policy which can not only counter the threat, but force capitulation and even remuneration for your troubles at their hands. That was how I ended my first targeting, and was offered $40,000 per my demand. It has become the model for all client help efforts ever since. Being followed or gang stalked is merely a jerk-your-chain tool that goes back to Stop, Think, Act. The only real danger is in giving into it. The only targeting which is a real threat is PCT based on electronics of one kind or another, chemical or biological assaults, physical abuses (i.e., rape, beating, accessing you while you sleep), and dirty tricks which impact finances, relationships, reputation, and the like;
- NEVER presume another TI, TI activist group or organization, or general Web resource to know what they are talking about regarding PCT or solutions, for the likelihood they have it right is very low. Take it with a grain of salt, and tuck it away for comparison to other resources. Books are a far better bet at getting at the straight dope. Older books will by now have a reputation establishing usefulness. Avoid newer books or other sources by anyone claiming to be an insider, ex intelligence operative, or other ‘expert,’ as they are likely providing disinformation to insure you continue to fight the wrong problems;
- NEVER hook up with another person, especially another TI. There are many reasons this is important advice, and I assure you that the risks you undertake with even a casual date or one night stand is significant. I see it play out again and again. Rare is the TI that can better their circumstance by not living alone, and a sexual adventure is far too easily a set up opportunity of one kind or another;
- NEVER pay money to anyone offering implant scans, ‘scientific’ testing, or new age solutions without EXTREME CARE; it is likely a scam, even if there are YouTubes or personal testimonies, the likelihood remains high. Research, research, research. Even if you actually did locate an implant by some method, the number of people able to have an implant removed can be counted on one hand; the medical industry will not cooperate. I have yet to see any positive results from testing services or new age approaches, but if you want to submit a chemical sample to an actual laboratory for chemical or spectrum analysis to find out what it is, that is worth the time and money;
- Avoid participating in poorly conceived TI activist efforts to outreach, or outreaching directly yourself. By poorly conceived, I mean an effort which does not heed the advice employed here. At best, such efforts defame and set back the TI movement and each person associated with it, labeling them as mental. Many of these efforts are designed and promoted by perps, and used as a kind of ‘evaluation survey,’ especially those asking you provide personal histories or statements. If legitimate, such statements will tend to seem crazy to anyone not already believing that targeting is real — adding another ‘crazy story’ to a stack of them will not change their minds.
Other facts to consider
The following may temper your views in seeking full understanding and formulating defenses. Simply keep them in mind when reasoning things through.
- Many perps are themselves victims of mind control, typically the worst kind, the Monarch/MK Ultra kind. They know not what they do, literally; they are programmable people based on multiple personalities which can be triggered at will. While some perps are psychopaths, these, are not, though they my be controlled to exhibit the same behavioral traits;
- You may be such a programmable person, yourself, and like them, not be aware. If such a person, and also targeted, you represent some form of ‘failure’ in the programming, and the targeting is designed to neutralize any damage you might cause to the program if you become fully aware of your true situation, which is a real possibility as you work through understanding and defensive efforts. The important and terrible truth is, that such a person will sabotage their own daily efforts in this regard, and make no progress whatsoever. Such a person will likely exhibit many additional symptoms as found in my book, MC Realities. Most notable among these is a question or belief they were targeted or abused as a child, or themselves have abuser thoughts or have so abused. Should you come to suspect you are a programmable, you should contact me for special advice too complex for this forum;
- All PCT is Satanic in nature, origin, and intent. Your enemy is as forecast: Powers and Principalities, and there is scientific proof available. Therefore, your best ally is religious faith, and the best faith for the purpose is Christianity, and the best Christian Church (because it is acknowledged to hold closest to God’s Word in the original Greek and Hebrew translations) is the Wisconsin Synod of the Lutheran Church. There is a whole chapter in my book, MC Realities, which explains exactly why this is true in both practical and Biblical terms;
- You will hear it said all the time, that TIs fear they are being murdered, or that they have been murdered. THERE HAS NEVER been such a case. Being a TI can certainly mean to be suffering in great pain, and it may certainly to some, at times feel like it has the potential to kill. But thus far, the only known deaths of TIs have been from suicides or accidents, or natural causes such as old age or disease, according to official records. While it is true that there are ways to fake such deaths and such ways are known by our enemies… and it is true that some potentially deadly illnesses such as cancer may be caused by targeting… death is NEVER the goal. They invest perhaps a quarter-million dollars a month on a full-time TI. There is no point in killing off such an investment. So the only deaths which bother me are the suicides, because that kills not just the person, but effectively the soul, as that is the only unforgivable sin; a sin against the Holy Ghost. If you give in to it, you are surrendering to your enemy, Satan, not just the perps. I am in communication with literally dozens of persons who have professed to have been being murdered as far back as 1992 or so, and they are STILL HERE, some of them still making the claim from time to time. Only two out of 12,000 are known to have died, one of old age and disease, and the other in a traffic incident;
- There is no place one can go where targeting is not likely to follow within weeks to months, save one or two foreign countries. The only one of these that has been verified by multiple TIs, is Ecuador, which to me does not make sense, but it seems to be true, with three such instances reported to me personally from TIs I had vetted as legitimate TIs.
What will happen if a natural disaster or social upheaval comes and government cannot, or will not be able to defend you, your home, or your community? When armed marauders or looters come, will you stand alone, or will you have your own local network of helpers: Paladins?
What is a Paladin?
“Paladin” is another word for Knight, a kind of soldier of good moral character who in times of Olde served his fellow knights, community, country, and God. P.A.L.A.D.I.N. members are similar, and yet different. They are somewhat modeled after the Paladins in the popular Fallout computer game series, but THIS IS NO GAME. Fallout takes place in a future post apocalyptic World where there is no government, and everyone is struggling to survive, which literally means at times, kill or be killed, perhaps even eaten by others. Several groups compete for control with lust for power as their agenda, but the Paladins were formed in an attempt to maintain order and protect against such threats — a bit like self-organized Police the people come to rely upon.
Almost no one is truly prepared for disaster or civil upheaval. When it strikes, the impact of the disaster is therefore nearly total. All one has to do is look back on Katrina, or any other major disaster or upheaval around the World where local governments were unable or unwilling to respond — to see the value in not having to stand alone in a crises. FEMA and other government ‘help’ in Katrina was less than ‘useless’ for an extended period of time, actually causing more harm than good in many cases. Local law enforcement was either unavailable or, at times, a serious threat to many a resident’s well being. Likewise for the National Guard.
In such events, local governments at any level collapse and become non existent in domino fashion, while regional and national governments play political waiting games. The following is a quote from From Disaster to Lessons Learned: What Went Wrong in the Response to Hurricane Katrina?The Dissolution of Government
As noted earlier, disaster response in the U.S. is predicated on a system of “cascading failure,” in which successively higher levels of government are called in as lower levels are overwhelmed. However, the system requires some government to be in place. When the storm hit, local government in New Orleans, for all intents and purposes, ceased to exist. Both politicians and administrators had evacuated prior to landfall, and what little structure was in place was immediately rendered ineffective. The severity of the disaster also paralyzed state government and stunned federal government officials. A period of many hours passed before coherent calls for help began to travel up and down the system; even then, they were generally unfocused and nonspecific. Mayor Nagin’s media appeals for the federal government to “send everything” were heartfelt, but were so general they were difficult to act upon.
Meanwhile, at higher levels of government, a political showdown was brewing between the White House and Gov. Kathleen Blanco of Louisiana. Louisiana’s National Guard was heavily deployed to Iraq at the time of the storm, and the governor had activated pre-existing agreements with other states to “borrow” National Guard troops prior to landfall. These troops were quickly moved to the area, but the White House wanted to federalize the troops, while Gov. Blanco wanted to keep them under state control. The White House also disputed the timing of the governor’s request to release active-duty military troops into the area, although later evidence showed that the request had come much earlier than initial White House claims.
Even once on site, FEMA and National Guard, et. al., cannot be everywhere at once, and they cannot solve all the problems and threats people face. In some cases, policy or needs dictates result in harm to individual residents, mostly unintentional, but at times, intentional. In the end, almost everyone needs to fend for themselves for a protracted period of time, and that often means defending themselves from each other, or facing general extreme hardships or death, alone.
In Katrina, nearly 2,000 died, and many died at the hands of others (including authorities who opened fire on crowds trying to escape across a bridge). There were, in addition to looters and aggressive authorities, at least one known roving gang of vigilante Whites who had set about to kill Blacks they deemed looters, ‘loosely defined.’ The true number of murders is unknown; few records were kept given the mass casualties, but ‘bullet riddled corpses’ were not hard to find. Where there is no law, lawlessness ensues.
Bad things happen
Disasters are all too common, some worse than others. But imagine an outright siege caused by insurgents, racial violence of the sort this country has recently seen, or even military invasion such as foreseen in Operation Lion Dance; where Chinese flood into America via the Canamex rail system, hiding in container cars which can be parked on any rail siding in America from a laptop. Or perhaps it is simple revolution or civil war born of irreconcilable political differences. There are many such threats, none of which are especially likely, but all of which are specifically possible.
P.A.L.A.D.I.N. stands for Post Apocalyptic Local Area Defense Information Network; the core organization. Do not let the gloomy sounding name deter or fool you. While it certainly could be a possibility that doom and gloom awaits us on a regional, national, or global scale (it is after all forecast by virtually every religion and many experts in military, financial, and political circles), any simple disaster or localized upheaval can result in a crisis government is unable or unwilling to address quickly. It is even possible, some believe, that government might become the cause or actual threat themselves, such as in a military coup. But if having Paladins available to help you fend off a crises in a post apocalyptic tragedy, how much better then that they could be available in a lesser threat, such as a killer quake or storm?
Here are just a few such threats — do you have everything in place to survive? Will you, alone, be able to defend them from those who do not? Or will you be waiting for government to get around to attempting to rescue you, not as a soul in need of help, but a mere politically acceptable (expendable) statistic should they fail?• Sudden Poll Shift — a sudden shift could melt the ice caps and cause serious globally felt quakes • Sudden Ice Age or Ice Cap Melt — choose your favorite scientist and worry with them • Super Volcano — doomsday shroud encircles the planet killing all crops, causing ice age • Super Earthquake — hundreds of thousands or even millions could be homeless and helpless • Asteroid Strike — we’ve already had nearly a half-dozen near misses in the last twenty years • EMP Attack — total loss of all things electric, throwing us into pre industrial age • Solar CME Flare — same as EMP attack, but potentially global in impact • Planet X — we know it’s coming soon, its effects upon Earth could be catastrophic • Nuclear or Bio Terrorism — could render an entire region helpless • Pandemic — we keep coming close to having one, it’s only a matter of time • Financial Collapse — what happens when money has no value or is unavailable? • Civil Insurrection — race war, revolution, response to Martial Law, gun seizure • Military Coup — a top U.S. General has forecast it possible • War or Nuclear War — no nation is immune from invasion or sneak attack • Alien Threat — leaders of several nations and scientists have said it possible • Prophetic End Times Tribulation — seven years a mix of the above, or worse
The P.A.L.A.D.I.N. concept is simple, and addresses an important question: is it better to stand alone trying to protect your home and family against armed marauders or other dangers seeking to take what you need to survive from you, even your very lives… or to be prepared? Prepare a go bag and survival supplies, by all means, but to become a Paladin is to pre establish a local mutual defense network which can protect you and yours, your fellow Paladins, your community, and by extension, your country and way of life. P.A.L.A.D.I.N. is a non militia solution that can effectively become functional equivalent of a small and focused militia — on demand. It does not suffer the overhead and commitment of a militia, nor the political tainting.
Paladins may also elect to engage in general humanitarian missions at any time, for any reason or cause; actively active activists. This includes the possibility of providing aid to stalking victims, the homeless, or anyone being unfairly treated by another group in some way which cannot be well addressed by local authorities. It can even mean choosing to side with civilians against authorities in a non violent protest; whatever the Unit deems appropriate. Were I a Paladin near to the tribal protests in the Dakotas over the oil pipelines, I would have urged my Unit to give on-site support, for instance.
Everyone should join!
Anyone who has much to loose if accosted by armed strangers in a crises should join. Stalking victims and other persons who have experienced unusual targeting should definitely become a Paladin. This will enable you to call upon other Paladins when threats return, and help to document, prosecute, or thwart such targeting. Activists should join Paladin, as it becomes a tool useful in a cause, where you can make good argument to fellow Paladins to engage with you — and enables protection should those opposed to your cause elect illegal harassment campaigns against you (target you). Minorities and others who are consistent victims of gang harassments should also join, as it provides yet one more ally and strengthens your ability to stand against aggression, especially in rioting. Ex military should definitely join as an alternative to a Militia, which often has a bad PR image due to a political or religious bent they may have assumed. All are welcome.
To be a Paladin does not require ownership of a gun, but it is ideal. To own a gun does not require good training or a military background, but it is ideal. Weaponry and combat skills are only important WTSHTF big time, and most gun owners do know how to handle themselves, and they also tend to own more than one weapon, which means that in a pinch, they can share, teach, and lead. The primary requirement is to be of good moral character and to care about your family, your community, and your country. The rest will take care of itself; unity is the key factor.
P.A.L.A.D.I.N. Units of 6 or more Paladins are formed in any given Zip Code once at least half of the members do have arms, and at least one of them has some military or leadership background suitable for acting as Commander. Such leaders are provided with tactical advice on formation and operation of their Unit, and given contact information for any adjacent Units. Paladins can then call upon each other to request aid, or to propose missions to aid others. There are provisions in the formation of Units which allows local Units to join up for improved functionality, and for like hookup with Units in other communities, should regional operations be necessary.
Membership is by default anonymous except between Unit members and adjacent Unit Commanders, but that does not mean members must remain secret. Indeed, public evangelism and recruitment is encouraged (promotional materials will be made available). There is no membership fee to join. However, once a Unit is formed, a small annual membership fee determined by the Unit can be assessed to help fund missions or enhance emergency response capabilities. There can be some small personal expense in order to facilitate Unit functionality, such as the purchase of a Walkie Talkie by each member.
Each Unit is autonomous and stands alone in responsibility; it is not a political body or under the command of a national head, such as myself, even as founder. Therefore, there is no legal liability or risk except for those actions the Unit itself elects to undertake. I am not bound by your actions, nor are yours dictated or bound by mine. You serve only your own Unit member’s best interests and mission goals for public good, and remain subject to all laws in the doing, each member insuring the next does nothing which threatens Unit integrity or viability.
There is no political leaning or bent, nothing which should alarm authorities. In fact, Units should consider making themselves available as volunteers to authorities as emergency helpers or, where law enforcement has such programs, reserve deputies. In such a case, each member is free to participate or abstain, which is generally true in all missions. Units should be prepared to submit to lawful military or law enforcement once order is restored in a crisis, and should maintain records of all actions for use by any needed law enforcement investigations after the fact. That serves both as protection for the Unit and members, as well as a means to prosecute evil doers who may have been confronted by the Unit. Everything is above board and transparent within the Unit, and as private or as public as the Unit itself elects.
TO JOIN: simply email your interest to join to proparanoidgroup at gmail com and provide your City, State, and Zip. This does not obligate you to anything. This will be used to update a database of members maintained anonymously at my Facebook page for the purpose. That page is organized in a way which allows determining if a Unit can yet be formed in a given Zip — your evangelism in recruiting other members is key to that eventuality.
Once a Unit can be formed, members are so advised and connected to one another for the purpose of determining if they should form, and if forming, deciding who will be their Commander. They are also provided with additional support advice on how best to proceed as a functioning unit. Once forming, individual members are then obligated only to commit to the goals established by the Unit for mutual self defense and whatever additional good they may do for community and beyond, in or out of crisis (missions.) Risk and investment are minimal. Rewards can include the possibility of continued life, liberty, and pursuit of happiness — in the face of dire circumstances bent on preventing same.
Other material to consider
The Post Apocalyptic Library is an important collection of life-saving information commonly beyond the average person’s current knowledge base, and which will NOT BE AVAILABLE once disaster strikes. It is a series of links to critical information which can be learned online or downloaded and printed for placement in a go bag or emergency supplies for later use. It is advised that extra copies should be made in advance for handout to others.
The FEMA, Martial Law, and Revolution Database is a collection of materials which seek to educate the public about individual risks and likelihood of events beyond their control, and/or give advice on how best to survive or react. It is an eye opening review of little known facts which may prove quite sobering. Don’t be yet another Sheeple caught totally unaware.
Dropping off the Grid: abandon the Control Matrix. This author has done so for the last three years, and though living a rather spartan life by comparison to what came before, the freedom is enhanced, and the quality of life (happiness) with it. Living simply has proven to be more satisfying — and should be much safer in the event of major troubles. Here is a snapshot of possibilities. I will soon be offering a Seminar or other promotional venue (i.e., video) on the topic.
An Intentional Community is one way to live off the Grid. Here is one example, a low-cost, self-sufficient community based on tiny homes, a project of the Free Will Society I founded to helped stalking victims: it is called Free Will Haven. It has a gofundme. Such a community is by default more or less the functional equivalent of Paladins.
OK, it’s true. There are at least a half-dozen ways the government can ‘claim’ I’m a terrorist. YOU TOO, for that matter. But I have a Record of Arrest and Prosecution ‘sheet’ to illustrate one of the ways I am definitely a terrorist to someone, including people that think I’m merely a conspiracy theorist. I am not ‘mere,’ at anything I do…
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What makes you a terrorist when you live in a Police State?
Simple answer: anything you do. There have been so many Constituion trampling Acts of Congress and Executive Orders, all so vaguely worded as to allow the broadest of interpretations, that it is almost just that easy for someone in government to label YOU (and certainly me) a terrorist. That can have very unfortunate consequences, depending on who labels you, why, and what they do about it. You can end up on the no fly list, or some kind of watch list, or even be vanished forever by Men in Black whisking you off in a black van.
One such example is, that being a conspiracy theorist automatically makes you a terrorist according to FBI. That’s bluntly stated, but true, as an article at Public Intelligence illustrates: “A flyer from a series created by the FBI and Department of Justice to promote suspicious activity reporting states that espousing conspiracy theories or anti-US rhetoric should be considered a potential indicator of terrorist activity. ” The flyer, linked in the article, specifically includes 9-11 Truthers (that’s about 1/3 of the U.S. population).
OK; I’m a conspiracy theorist, or if you prefer, a Conspiracy Terrorist. But I am no ordinary ‘theorist,’ because I have a R.A.P. sheet… a Record of Arrests and Prosecutions. And here it is, below the FBI Fellon ID Card (which shows that not even FBI always gets the right man)… but be sure to read the summary text before you wonder why I’m still walking around freely.
R.A.P. Sheet, H.Michael Sweeney
1976 Wire Tapping, 2 counts, charges dropped for insufficient evidence
1980 Embezzling, charges dropped after resignation from company
1983 Counterfeiting, Drug Smuggling, sentenced
1984 Wire Tapping, charges dropped for insufficient evidence
1985 Shoplifting, 4 counts, sentenced
1987 Fraud, Embezzling (pretending to be a Pastor), Bad Checks, charges dropped after restitution
1988 Wire Fraud, 3 counts, sentenced
1988 Smuggling, 2 counts (bioweapons, diamonds), sentenced
1990 Espionage, Interception of Electronic Communications, charges dropped by NSA intervention
1991 Bank Robbery, 4 counts, sentenced
1991 Wire Tapping, 4 counts, cold case due to flight to avoid prosecution
1992 Fraud, 3 counts, Witness Tampering, 3 counts, Withholding Evidence, 2 counts, Murder,
cold case due to flight to avoid prosecution
1993 Breaking and Entering, 2 counts, Grand Theft, charges dropped after restitution
1994 Wire Tapping, cold case due to flight to avoid prosecution
1994 Attempted Murder, 12 counts, case turned over to Internal Affairs, and dropped
1996 Espionage, 3 counts, Violation of Civil Rights, cold case due to flight to avoid prosecution
1998 Wire Tapping, Stalking, cold case due to flight to avoid prosecution
1998 Grand Theft Auto, Operating Chop Shop, 3 counts, sentenced
1999 Possession of Controlled Substance with Intent to Sell, sentenced
2001 Bioterrorism, Attempted Assassination, investigation closed by DOJ intervention
2002 Terrorism, 4 counts, cold case due to flight to avoid prosecution
2004 Bioterrorism, case closed due to lack of evidence
2004 Cyberterrorism, Hacking (of CIA’s Web site), charges dropped in exchange for services rendered
2016 Armed Robbery, 2 counts, cold case due to flight to avoid prosecution
2016 Bank Robbery, cold case due to flight to avoid prosecution
By now, if you actually read the full list, you realize no one person could be guilty of all those crimes and still be walking free… and that there were crimes on the list immediately after incarceration, and no jail breaks to account for that. This is because these are not crimes that I committed, but crimes I have investigated and exposed, or helped expose and prosecute, often working with Police, FBI, SS, and CIA, sometimes working against rogue elements of those and other agencies, even spy agencies of other governments.
Left out of that list, are perhaps 200 Stalking, Wire Tapping, and Torture cases I’ve worked on as online consultant with victims of such affairs (I’ve had contact with 12,000 individuals in that kind of predicament). I left them out because it would have made the post unreadable, and that’s a shame… a disservice to the thousands of victims of this form of abuse of power and conspiratorial corruption of principalities and powers.
So I do not claim to be a mere terrorist, but to have stopped terrorism. But neither am I a mere conspiracy theorist, because many of the conspiracy theories I’ve investigated have put people in jail, or at least shut them down and forced them to run away. One Governor, possibly two, a National Guard General, an elected County Sheriff, two Police Chiefs, a Criminal Investigation Division Lt., a C.E.O. of an international software firm, and a host of lower law enforcement personnel have all vacated their posts (some being jailed) after I finished doing my thing. While I cannot claim every one of them retired or otherwise departed their posts because of me, as I was not allowed access to official internal documents, I’m fairly certain a good number of them grumbled my name under their breath on the way out the door.
All that said, I hope that you, dear reader, have come to understand that a conspiracy theorist is no different than any other standard investigative force of a more official nature. Except for two small things, we all try to fit the available evidence with the environ of facts to determine the truth. We both form hypothetical postulations as to suspect and motive, prove opportunity and method, and try each point of evidence against all others which might disprove the hypothesis (though as we see all too often, many criminal cases are happy to prosecute the innocent if they think they can make a strong enough case and hide the truth).
We both theorize up front. The first difference is that conspiracy theorists do not have the luxury of making an official determination, while the official investigators do. The second difference, and most important, is that we start with questions regarding failures in logic in the official findings and reports; we question government, which is not only the right, but the DUTY of every citizen, always. How else will you ever find a cover up? We know there have been all manner of cover ups exposed in media over the last few decades, and I remind you, you NEVER have a cover up UNLESS there is a conspiracy, because a cover up itself REQUIRES a conspiracy to execute it, and the affair being covered up is always so complex that it, too, MUST by default represent a conspiracy. Guaranteed.
OK, FBI, come and cuff me… unless I’m wearing a bomb like other terrorists,or have run off to Mexico to escape your ‘justice,’ in which case, just have a better day.
Once more, we see the Federal Government usurping power in ways which both benefit the big corporations at the expense of personal freedoms and financial viability of citizens. This time, it’s the FCC, and not the BLM, and they want to eliminate any chance for you to watch local television without paying through the nose for it… and suffering de facto censorship.
copyright © 2016, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
FTC to Kill Local Television as We Know It
Tuesday last, a little heralded announcement by the FCC once more revealed how controlled mainstream media is. They, more than anyone, perhaps, should have been screaming the news from the rooftops, and complaining about it, as it affects EVERY major and secondary television station in every market across the country. The ramifications are so broad and sweeping as to threaten the very social fabric which defines us as a nation. In summary, the threats are as follows:
- Eliminates all local television service as we know it today, virtually ELIMINATING ALL OVER THE AIR BROADCASTS. No more ‘free TV.’
- All licenses by FCC currently in place are cancelled, and ‘up for sale,’ they want to raise 60 billion dollars which will be unaccountable funds off the FCC budget. This means they can be spent on any black project without any accounting.
- Major stations (e.g., your local ABC/NBC/CBS/FOX affiliates) will be paid many millions from the sale, far more than the stations are actually worth; hush money not to protest, we must presume.
- Secondary stations, including repeater stations or small unaffiliated stations in deep rural markets, and even possibly PBS, will be paid NOTHING, a virtual THEFT, and possibly, a loss of all public broadcasting systems!
- All will be sold to Cable and Web content providers, forcing consumers to get any TV by paid subscription or on-demand purchase.
- Significantly eliminates local news coverage, limiting it to official sources only; the government’s preferred message, a form of censorship which effects de facto mind control.
- Stages the FCC for total control of Web content under the new ‘authority’ it declared for itself last year; easier to censor and dictate what you can learn if there is only ONE resource and it is controlled by government.
It follows the Fascist model: The plan is insidious beyond belief once fully understood. It is perhaps no coincidence whatsoever that it follows Obamacare. If one reviews history of the quiet takeover of nations by Fascists and other dictatorships, those ‘bloodless revolutions’ always start with the complete takeover by government of all health care, followed next by takeover of all media. What follows is usually great financial and social upheaval allowing significant draconian responses, to include something along the lines of Hitler’s Brownshirts and the SS, and a permanent war footing with an expanded military and military police state. But people never learn by the mistakes of history, and there is plenty of that…
It happened that way in Germany, Italy, and in South America, it happened again and again. In each and every case, the takeover steps were quietly initiated and never fully understood even by those involved in enacting the changes. In every case, they inflicted greater hardships socially and financially upon citizens than those woes they claimed would be addressed thereby. In each case, a central power figure emerged who responded with ‘law and order’ and bypassed, neutered, or altered the form of government to a Fascist regime.
Unfortunately, any and all of the current Presidential candidates, save one, could fit that bill in this author’s opinion. Trump appears to be a closet fascist, Cruz appears to be one of the same old gang of criminals who brought us to this point in the first place, Bernie is a closet Communist, and that awful woman is simply a criminal rapist of nations and peoples. But my opinions are unimportant. Even if whomever is elected is not set to be a fomenter of fascist revolution, the power elite who manipulate politics will simply assassinate them or blackmail them to assure the desired outcome.
Naturally, like most draconian moves by government, the official propaganda is worded exactly the opposite in tone to the reality. That’s why we get Bills that actually accomplish the reverse of their title, like ‘Affordable’ Health Care Act. Believe as we say we do, and ignore what we actually do.
Take a look at FCC’s official page, here.
Now, lest you think me simply another lunatic conspiracy theorist, I got my first wind of this plot, to include all points cited herein (save my opinion on SOME of the candidates), from a conservative call-in radio show where the station owner of a secondary market called in to shout a warning and explain exactly how it was rape and pillage of the television industry and the public in favor of Cable and Web bigwigs. I don’t make anything up; I don’t have the time nor inclination!
- Big Brother FCC Plans Internet Tax/Controls What Happens in Homes (universal free press)
- FCC No Longer Just Big Brother, Now Big Parent (huff post)
- FCC Sparks Fears of Big Brother in News Room (fox nation)
The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some Satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.
Are there any patterns in mass shootings?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
Is there any proof mass shootings are not random?
What you will learn reading this post of the posting series…• that select shooting lines form a 3-D perspective view of Cheaps and transparent depiction of all inner passages; • that there are specific ties between Cheops and the goal of the New World Order; • that Cheops is a kind of key to understanding European Illuminati/Templar relationships to mass shootings.
Are mass shootings by intelligent design?
Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View
Is there a mass shooting conspiracy?
Mysteries of Cheops
In the prior post we saw ties between shooting event lines which formed Masonic and Satanic symbols, and a series of orange lines which led us to the Great Pyramid, Cheops, in Egypt. While those were quite remarkable and sufficiently consistent to defy any chance of random coincidence, what follows will dramatically make concrete the notion of intelligent design as well as the importance of Cheops to said design. And finally, we will see there is yet another way to look at Cheops’ roll in the Illuminati/Templar and mass shooting tie-ins, but this time, from the European point of view.
First, we need to understand a bit about Cheops and its importance in mysticism. There is so much which could be said that there are literally countless books on topic which could be entered as ‘evidence.’ Here, I will focus on less than five percent of such material topically, only able to skim the surface of them. Consider it merely to whet your appetite to learn more, for which some suggested links will be provided along the way.
One key aspect of Cheops is that it is rich with magic numbers. This seems to be true regardless of if using the original units of measure employed by ancient Egyptians, or modern day equivalents. Indeed, some of our current units of measure stem directly from the ancient Egyptian measuring system, a fact often laid at the feet of Freemasons and their predecessors, the Masons. While I won’t spend time expounding, many of the measurements of Cheops, both in original and modern increments, enjoy magic number properties, doing so in ways which, like those illustrated in the prior post, are mind boggling. Some serious mathematicians have found even more wondrous relationships to both the ancient and modern discoveries of Man well beyond any possible knowledge to Egyptians of old.
Perhaps the keymost aspect of Cheops which potentially makes it ideal for inclusion in mass shooting patterns is that it is only the Giza Pyramid which has a complex of inner passageways and rooms. Early mystics and even some studies of Cheops by persons with scientific credentials and methods, have proposed and illustrated a belief that the construction of Cheops was an enlightened project involving supernatural or mystical knowledge of the future; the internal passages and chambers thought to be a roadmap to End Times and key events along the way. That is represented by the image, below, from this interesting Web site. Others out there (with less useful images) have more detail with the most recent/current annotation being the year 2010, roughly the height of mass shootings. That marking is in the King’s Chamber, which implies ‘control and authority.’
Of specific interest to mass shooting research and the notion of Illuminati Masonic Warlocks being the architects, thereof, is the fact that shooting lines can be found which quite correctly depict a pyramid across thousands of miles of the United States. More than this, they quite usefully do so in 3-D rendition, even to the point of detailing the inner passageways found in Cheops. In fact, the depiction is so uncanny as to have key aspects ‘to scale’ with measurements which work math magic using modern increments of measure against the ancient’s units of measure; not just scale in size, but across the barriers of time in the expression of numbers in different languages and cultures. Take a look:
Do the pyramids really relate the entire history of the World from beginning to end?
Shootings depict Cheops
As you may recall from the prior proof the orange lines are lines which run from shootings directly to the Great Pyramid, Cheops, each exactly 500 miles apart as measured along a given line which is perpendicular to them all, and which itself runs through several shootings. The green line here, however, is at the distance of 10,000 miles from Cheops, which is one/fourth the distance around the World (the vertical diameter being 40,008 miles on average), and it too transverses several shootings and is perpendicular, but the distance at this point between lines is 505 miles. Each orang line originates dead center of Cheops and is separated by almost exactly 7.5 degrees of arc to achieve this feat. That is interesting for another reason; 360 degrees divides by 7.5 exactly 48 times, and 24,000 miles (the rough diameter of the Earth horizontally), divided by 48 indeed equals 500 miles.
Now there are some admitted problems in trying to depict a pyramid with any degree of accuracy in a 3-D perspective view, especially if with cutaway to reveal interior passages. Such a view does not simply allow us to measure a line and compare it to Cheops with good expectation of results. Perspective causes a measured horizontal to be less as it is depicted further away. A line transiting diagonally in one or more axis in 3-D space is even less useful unless one knew the precise angles for each axis both it and the original against which it was to be compared, were employing (and additionally, the depiction version is arbitrarily decided by the person rendering it, and impossible to discern without their sharing).
The depiction in this case seems slanted over America as if about to slide into the Caribbean. That is for a reason: it is faced (viewed) with the same face (view) as the actual Cheops is when following the orange lines, there — presuming in both cases one is looking from the center orange line towards it. That is to say, looking at Cheops in America from the center of the lines, would give you this same perspective view if standing in the center in Egypt. That cannot be coincidence. The problem with that, however, is that in Egypt, in relation to the Orange lines, one corner is clearly (looking down from Google Earth) nearer the observer’s position than another; there is no line which is not at an angle to the observer.
Note: I further feel it is an error to assume that modern-day Illuminati Warlocks have the skills and knowledge base, or event he interest in the crafts and mathematics of Masonry, which they left to the Adepts when Templer remnants infiltrated the Mason’s Guild and eventually took it over to form Freemasons. They are not likely going to go for precise renderings as much as symbolism; accurate to the point which can be managed simply, but no more, I believe.
Why do Masons, the Illuminati, and Satanists focus on Egypt and Cheops?
How much is a Royal Cubit, anyway?
It is, as result, impossible to establish a precise method or true consistency in relationships (i.e., to test for accuracy in scale) of measurements between Cheops and the American pyramid. The required data and accuracy required to plug into complex formula is beyond our ability to deduce. Ideally, a computer program modling in true 3-D space could be used to compute and confirm such comparisons… if we knew the angles employed by the architect of the American depiction.
But that does not mean we give up. We do the best we can with the tools at hand, and must come away at the very least acknowledging that in the 3-D layout, the mere visual similarities alone are sufficiently ‘coincidental’ to imply intelligent design, and in need of further study with better tools. But that does not mean we cannot ‘cheat,’ and then test to see if our cheat had any merit. After all, perhaps the architects employed a similar gambit. We wont’ know unless we try, ourselves. So…
By rotating the view as I have in the image above, we at least have the illusion that the base line is perpendicular to our viewing angle such that we are tempted to measure it anyway, and then see if there is any discerned relationship to Cheops which results in some kind of conversion factor. If we CAN find one, we can then apply that factor against other test lines and, in theory, if or factor was arrived at by other than coincidental happenstance, we should find the measurements work out correctly in the conversion. Guess what? We can, and it does!
Cheops on a side is 440 Royal Cubits, or 36524 Egyptian inches (a precise year’s worth of inches times 100), which works out to 230.4 m, or 756 feet. I will admit that finding a conversion factor took me some time. I made no headway at all until I realized that the orange lines were like rays of a projection lens in a theater, taking a small image and projecting it to be much larger at a distance. I reasoned there had to be something about analogy involved in the conversion factor. I also felt that any such conversion MUST involve the ancient increments in some conversion to the modern, rather than a modern to modern comparison. Turned out true.
As I discovered, if you divide 36524 by 440 you find that there are 83.009 Egyptian inches in a Royal Cubit. Funny. Both sum to 20. If you then multiply this times the total degrees of arc for the American depiction, which is three orange lines, or 22.5 degrees (±.03), you end up with 1867.7, which is exactly the measurement of the depicted base line… in Kilometers; ancient to modern, using the orange lines as calculator. So, now to test the accuracy and intent, vs. the notion of coincidence (pretty big coincidence, if that is all it is.)
Testing our factor: There are only a couple of other places where lines are similarly ‘perpendicular’ to our view (like the base line) by our peculiar method of so assessing for the purpose. Two of these are passageways to the King and Queens chambers, which just happen to have shootings (house icons employed for this use to match the drawings of the actual Cheops chambers) at the approprate locations to at least approximate the inner passages with an appropriate resemblance. But there is a problem with trying to test these with our conversion factor. It has to do with the Mississippi River.
Looking at the drawing of Cheops’ interior, you will note there is an irregular passageway leading down between the upward and the downward sloping passages. This is thought by some to be a water drain, as there are interior air vents which happen to align with prominent Constellation stars on select key celestial event dates, and that admits water. The lower passage in fact has a chamber with a deep pit which resembles a Well. In America, as it happens, the Mississipi River runs a course reasonably similar to that passageway and at the appropriate points in our depiction, given some small fudge factor.
Clearly, the Illuminati has no control over the course of the Mississipi, which changes slowly with time, and therefor, any depiction of the inner passageways must in some way accommodate those changes. My conclusion is, therefore, that such accommodation would necessarily mean a skewing of measurement accuracy in these passageways. Indeed, no line among them which is angled, nor the passages to the King/Queen chambers, quite works out, though some come closer to doing so than others.
But there is an entirely different story in play once we get past that drainage passageway, at the very bottom of the network. That whole portion is, by the way, beneath the ground level of Cheops by a goodly distance. In fact, the pit, which was filled with loose rocks as if a French Drain, once cleared, measures 60 feet deeper. Now, there are three points of interest with respect to testing our measures, and some landmark verifications we can also apply…
These are: the entrance passage to the Subterranean Chamber; an exit passage which is a dead end; and the pit. Applying our conversion faster, all three lines as depicted are of the correct length and are at the correct scale to the previously computed base line. But there was no shooting or key line to establish these lines (well, one line seems to do so), so we must seek some other verification that these are as intended by design. They do exist. Lets take a look:
The entrance passageway: The entrance passage determines the location of the Subterranean Chamber in the depiction, which we will verify separately. But it also has an unusual feature along its walkway, a kind of antichamber or alcove to one side, with no discernible purpose. On the map, at its correct location in the depiction, we find our old friend, Remington Firearms (the white arrow). That was, in fact, one reason I tested line placement at this site. Interesting then, that both this Proof and the prior Proof find their factories involved in shooting lines, baphomet lines, orange lines, and pyramid lines. That cannot be coincidence, and points to intelligent design, and intent — especially since the other Remington facility from the prior Proof is also present directly along another passageway, as seen in the first image of the depiction from above.
The exit passage and pit, on the otherhand, when extended the correct distance within ONE METER accuracy, end at… water wells, pumps, and tanks; which relate well to the purpose of the Subterranean level. That leaves the Chamber, itself. You will note a graphic image overlay veils in transparent fashion the intersect between the two measured passages and the pit. While there to represent the chamber, it is not really as ‘large’ as the chamber would be if to scale. At a particular location within the Chamber area it does cover, we find a nuclear power plant. This is interesting because much lore about Cheops includes references to end times, and equates the Subterranean Chamber to Hell, and the bottomless pit. One of hottest things we have on Earth is the interior of a thermonuclear power plant, and it burns both with heat, and invisible radiation; hell on Earth, should you care to experience it, with or without an accompanying China Syndrome ‘pit’. But there is an even more interesting verification, which is why the overlay:
The inset is the original artwork from which the overlay was obtained, a sketch of the what the actual Chamber looks like at Cheops, where it is described as seeming more like an underground quarry with lack of intent in what remains. The original is of very low resolution, I’m sorry to say. What I noticed about it that caused me to think to do the overlay, was the leftmost vertical protusion. I’m glad I did, because when I overlaid it, seeking to line it up with the cooling tower of the nuclear plant, I noticed something.
Actually, I noticed it while playing with the transparency level so I could see where I was positioning it. I truly wish I had video capture ability to show you the startling discovery, which, with a slight change in aspect ratio, was maximized; the darket portions of the overlay precisely match and seemingly define changes in terrain or map features. The effect is this: it gives the impression that the terrain to the South and near the power plaint has been cultivated to MATCH the overlay usefully. The best that I could hope to do to depict it here was to increase the contrast of the overlay, and alter the levels. There were originally only two discernable shades, black and gray (it is a B/W original image with some dithering in evidence). There are now four, and only the lightest of these is NOT defining a shape or darker area on the Map.
I apologize in realization that this is nowhere near as useful a description as the visible effect I’d rather show with video, but I assure you it is startling and implies, along with the wells and the Remington matter, that these lines are indeed intended to be here and at these dimensions, which in turn verifies the scale conversion factor discovered. Intention by design, in design.
What is the the relationship of Cheops and Mass shootings to Templars and the Illuminati?
The European point of view
At right is an image looking from Cheops towards Europe, to reveal how it ties in with the Illuminati and Templars of old… not to mention any modern day Illuminati Warlocks operating there, today. Especially if their operations include casting magical designs in mass shooting in America to fast forward the formation of the North American Union and establishment of a one-World government under control of the Antichrist. Observe:
At the bottom we have our orange lines radiating outward at increments of 7.5 degrees of arc, where, in order to get to their designated array of shooting destinations in America, they must first pass through Europe. In Europe, we find one of these lines passes directly through the birthplace of Adam Weishaupt, Masonic founder of the ancient Illuminati (ironically, in 1776 — not truly ancient as most count it).
It is interesting to note that one can create in Europe, using only the birthplace of Weishaupt, and the orange lines, a baphomet which is correctly aligned Northward (the stray orange line), IF, and ONLY IF, running the North-line through the VATICAN IN ROME at the adjacent orange Cheops line. Then, IF, and ONLY IF, electing to use the Weishaupt’s birthplace as the center of said baphomet, will it then result as seen.
The significance of that is manifold. For one, it rests upon the remainder of the orange lines in precisely a mirrored orientation and in like relationships, in general, with the orange lines as does one of the baphomets in America. In other words, just as the depiction of Cheops in America was at the same viewing angle relationship as if looking at the real Cheops from an orange line, so it is, here, with the two baphomets.
Thus once more, the orange lines ‘project’ an image in useful scale with the same orientation to create a sister depiction in America. The difference is, THIS ONE, is properly aligned North for ceremonial use, and the one in America is flipped, so to speak… which allows IT, TOO, to be aligned with North IN AMERICA. How can that be by anything, but design?
Weishaupt’s baphomet, by the way, is at a point along the orange Cheops lines where, if used as a measuring point, they are exactly 333 Km apart, which is 207 miles (sums to 9), and 180 nautical (18), and since 18 = 99, that makes 3 threes and 3 9s, which is 999, or a code number for 666. And, of course, if electing to measure in both directions (the diameter of a circle about the birthplace between two adjacent orange lines), we also get 666.
Finally, we also see in the image the yellow icons for Templar castles and other properties, at least the ones we know about, and the red icons (and one balloon icon) which are Illuminati historical sites. We see also one green and one purple line coming from America, one a guideline from a baphomet depicted, there, and the other from a Masonic emblem, there… where both additionaly go directly to Cheops. The circle is complete; Cheops, European Illuminati and Masonic (Templar) histories (and arguably, current Warlock activities), and shootings in America and their resulting patters, all neatly tied together by six lines which impact all else. Coincidence?
What is the link between Masons, the Illuminati, Satanism, the New World Order, and Egyptology?
Go back to Introduction
Go back to Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart
Go to Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages
Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.
Are there any patterns in mass shootings?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
Is there any proof mass shootings are not random?
What you will learn reading this post of the posting series…• that select shooting lines can be extended to a single spot on the other side of the World; • that spot is the Great Pyramid, Cheops; • that the lines are exactly 500 miles apart at a given point and form the same angle of arc.
Are mass shootings by intelligent design?
Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart
Is there a mass shooting conspiracy?
The last proof resulted in some negative commentaries to group posts announcing its availability, all based on disbelief in the postulations advanced. This requires me to repeat myself: It does not matter what you or I believe, it only matters what the architects of mass shootings believe. Now, in this post, we start to examine the symbolism of Cheops and its ties to the shootings, which is also about what THEY believe. But first, I owe readers of Proof Six an explanation about the relevance of the ‘orange lines’ to select purple lines of the satanic baphomets and green lines of the Masonic emblems discussed as tying directly tie to Proof Seven in an unusual manner. So here we go, referencing the image below…
The orange lines are the multiple lines to Cheops this post is all about, of course, but those lines by and large pass through Europe using what is known as the Polar Route on their way to Egypt; the shortest, most direct route, despite the fact that in the movies they always depict planes flying East over the Atlantic to get to either Europe or the Middle East, or the other way ’round if going to the U.S. This is why, for instance, Iran Contra gun running used a stopover in Denmark and other Euro sites on their way to Iran, something which at first didn’t make sense to me when I learned of it.
The purple and green guidelines used in finding and plotting the baphomets and emblems also go to Europe, and end up doing something the bulk of the orange lines ALSO do: they just happen by ‘coincidence’ to pass through at least one, but more often, MULTIPLE ancient Illuminati and Knights Templar castles and other properties employed in their conspiratorial affairs, including some more modern facilities, and even Adam Weishaupt’s birthplace. He, of course, was the founder of the Illuminati, and a high Mason, and the Templars were the folks who evolved eventually to become the Freemasons we have today, as outlined in my book, MC Realities. There is one other line which does this, which is a red line created from a perfect isosceles triangle from Proof Three, which is the best example of ties to the modern Illuminati, as well as ancient, but also Cheops as it also directly intersects with the famous glass pyramid at the Louvre Museum in Paris.
There are other indications these lines and their relationships with Illuminati and Templars is tied to Cheops, in that some of the lines continue past Europe to the Middle East to find Templar sites, there, and two others, one each from a baphomet and an emblem, go directly to Cheops as if an orange line. It is interesting to note further, that these two are extremely close to the second orange line in from either side of the six orange lines; uniformity. Take a look: each white arrow indicates a line of interest which ties to the Templars or Illuminati. The ‘houses’ represent Templar locations (those icons refuse to float accurately over their respective sites at this viewing altitude), and the harder to see red dots are Illuminati, save Weishaupt’s birthplace, which is well marked. There are 18 lines in all, our magic number which equates to 666 in occult terms, only one of which (orange) does not find a Templar or Illuminati site, but we are talking about locations which in many cases have been lost through the centuries and, likely, it really does do so, but we simply have no such knowledge, today. The modern day Illuminati, however, WOULD know. The line certainly passes through territories where such properties are otherwise existent (not all sites are shown, only those which are intersected by lines).
Cheops I had previously been aware of the importance of Cheops to Masonic and Satanic histories, some more tenuous or doubtful than others, but all generally of a mutually supportive nature. If one reads the Masonic Bible, Morals and Dogma, it is clear that the leadership of the organization at the higher levels, is Satanic in its beliefs, practices, and tactical applications, and that all things of Ancient Egyptian lore play into their belief structures and lore. To Masons, especially, there is significance in the Pyramid, and thereby, also to Satanism.
Yet one can find other resources which state the Pyramid is outright tied to Satanism in one way or another, both inclusive and exclusive of Masonic ties, which came later in history. It is a Chicken or Egg question, or sorts, depending on the factoid being considered, but we need not answer those questions; our concerns are valid regardless of the answer. So when I noticed that some shooting lines seemed to angle off toward what I knew to be the ‘polar route’ to Egypt. I sought to verify, and was immediately proven correct. In the image above, find six orange lines which all meet precisely at the peak of Cheops a third-way around the World. They are all drawn at the same degree of angular separation (about 7.5 degrees).
At a given point in the map, in America, they are all exactly 500 miles apart, and as this image shows, they relate to shootings as they go. To date, only one (left most) has no useful shooting along its path to make the claim, but that does not mean there will not be in the future, and so, it is included. It may prove a means of predicting and even preventing a shooting. CHEOPS ALIGNMENTS x 6 There is no significance in the 500 number — at any given point, the lines are equidistant by some measure, I just chose a point where it produced a round number.
However, as research continued, I learned some things which would seem to make that a more important point. In the image below, this is revealed, and in the doing, we see also how the shootings themselves tie to the lines in important ways. More than this, the actual measurements once more reveal magical use of numbers in the occult manner. We should talk about accuracy. Given the great distance these lines must travel (35 million feet or more), the worst accuracy of these key lines is typically less than .05 degrees of arc (dependent upon Google Earth limitations as discussed early in this posting series), or some 15,000 feet at measure point. These work out to a maximum error of .007% and .0004%, respectively. I’m good enough with that to cite it here as proof of intent, given that the architects of mass shootings likely used the same tools, as I. There has, after all, already been revealed in prior Proofs several clues that such is likely the case.
Here we see some 440 plus mass shootings plotted along with the six orange lines from Cheops. The three green and three red lines are for measurement purposes, and require some dialog in order to appreciate the ‘craftmanship’ employed by the architects; a kind of confirmation this is no random outcome. The Meridianal (vertical) circumference of the Earth varies depending on where measured, but the average is 40,008 Km. This means that the point where the orange lines are furthest apart is some 10,000 Km distant from Cheops. This spot is found at the middle green line, and the measure there is essentially 2,525 miles.
This is confirmed in the red line between adjacent orange lines which measures 505 miles. The other two lines are the points where 500 miles between, is found, for 2,500 miles total separation, there. EACH OF THE THREE HAS AT LEAST THREE SHOOTINGS ALONG ITS PATH. These numbers prove interesting, and thus I also elected to measure the diagonal (vertical red) and ‘hight’ (red along the orange line’s path) of a given rectangle formed by these lines. The vertical line, which happens to be North corrected for magnetic declination, a trait seen time and again in the various alignments of Satanic and Masonic symbols in the prior Proof, measures 777, a magical triplet. The height measures 606 miles. More interesting numbers.
Take a look (numbers are rounded unless otherwise stated, and reflect allowances for measurement errors introduced by Google Earth as previously mentioned): Note: you may wish to review the sidebar post on Magic Numbers before continuing. Because… 500 Miles = a palindromic 434 nautical, which sums in pairs to 77; 777 is not only a magical triplet, but forms by summing in twos (1414) the inverse palindromes 141 and 414, which sum together to form the triplet 555, and equals 675 nautical, which sums to 18, and 1250.46 Km, which sums to 18 by threes; 505 and 606 are both palindromes, of course. And about 2525, divide it by 505, and it goes exactly 5 times. 505 + 606 = the double doublet 1111 (a quad) 500 x 505 = 252500, which sums to the doublet 77; 500 x 606 = 303000, a palindrome times 1,000; 505 x 606 = 306030, a palindrome times 10 which sums in threes to 99, which is a code number for 666 just as is 18; 306030 also = 492508 Km, which sums to form the inverse palindromes 151 and 515; and 606 x 777 = 470862 which is divisible by 18 2,159 times, and the grandaddy 666, 707 times.
So we end up with 505, 606, and 707 palindromes, and the triplets 555, 666, and 777. 505 squared = 255025, which sums by twos to the palindrome 757; 606 squared = 367236, which sums to the the triplet 999, a code number for 666 (upside down); it also divides by 18 to provide the palindrome 20402; 777 squared = 603729, which can produce 999 by summing by 3, 2, 1 digits consecutively, a bit unusual; We can’t easily find the area by simply multiplying 606 x the top or bottom, because they are different. We can do that with both and then average the result. This yields 303000, a palindrome times 1000, and 306030, a palindrome x 10. The total of the two sums to 609360, sums to the palindrome 6116, and which divided by two = 304680. So now we know the area, which is 1680 sq. miles more than the smaller of the two, and that much less than the larger, of course. 1680 = 2704 Km, which not only sums to 13, but is divisible by 13 208 times.
The orange lines in detail
In the last Proof, we found the orange lines tied usefully to the layout of the four baphomets and Masonic emblems. Here, lets relate them more directly to the actual shootings which were also part and parcel of those relationships. The first lines at image left does NOT actually line up with anything, YET. It is presumed they will eventually line up with a shooting and may be useful in prediction of same, as there are very few communities in its path with logical targets which fit with other predictive factors. But I will not state these as our paranoid government tends to make anyone predicting such violence based on ANY criteria as the only ‘terrorist’ or ‘suspect’ in question. They tend to lock down such locations and charge the person who gave the warning with criminal intent of one sort or another, or act harshly against them in some way. Apparently, ‘See Something, Say Something,’ is a trap, and considered a crime. I know that at least twice that I reported terrorist activities, they did nothing about the report other than to harass me and try to cost me my job.
The next line is perhaps the most dramatic in terms of accuracy and alignment. It bisects with extreme accuracy two shooting events, even a third within Google Earth dictated error limits. The third also has three shootings within accuracy limits, two of which almost meet doorway-to-doorway accuracy.That line also passes through the Denver International Airport and quite near to a man-made earthen Ziggurat (stepped) Pyramid thought by many conspiracy theorists to be a D.U.M.B. (Deep Underground Military Base). The site claims to be a landfill, albeit the highest and fastest growing of its kind by far, if true.
It is also true that in its current state, it only appears to be a Pyramid in three of the four sides, the fourth being the area where ‘fill’ is taking place at this time. The next line features the sloppiest, worst-case error with two shooting points in its path. The larger error does not dissuade me, because both are quite equally distant from the line on opposite sides of the line (the line cleanly centers between them). There is additionally a business, Pyramid Foods, almost directly on the line near the Bartlesville HS shooting plot of that line. The next line also sports two shootings, one of which is quite near Meridian, MS; Cheops is itself a similar distance from Meridian, Egypt (a neighborhood name also used in several business names, there). The final Cheops line merely intersects within 1,000 feet of a single shooting event. This is near King’s Highway, and Cheops is a King’s tomb. Thus all the lines currently aligned with shooting points, are several are also aligned with something having to do with a Pyramid. This yields yet more consistency, but feel free to presume it coincidence, if you must. What does Cheops have to do with mass shootings?
Beyond the earlier comments about why Cheops is important to Masons and Satan worshipers, there are a few other things which should be mentioned. One has to do with the construction of the Pyramid, which many historians think drove the establishment of at least some of the ancient Egyptian’s measurement system. What is interesting about that, as casually mentioned earlier in this series, is that as history progressed, their system became in various ways the bases for both the English and Metric systems, as well as the system employed in America. It is alleged that Masons (Templars) were the driving force behind this, in part, to insure or play to the mysteries of magic numbers.
So do not be surprised then, if the next post, I tell you that there is not at least one measurement at Cheops which is duplicated in shooting lines here in America which depict the same part of a pyramid in a 3-D view, but using different increments and a different scale (think miles for inches, for example). I’m still working on verification of a list of suspect instances, but it certainly seems the case. This would NOT be possible if there was not some basic underlying ‘magic’ built into both measuring systems with respect to conversions. But the real thing of interest about Cheops, here, is its lore.
Many learned researchers have studied the Pyramids endlessly to formulate many different theories relating to its design, how it was constructed, what its purpose was, and so forth. Many of their findings are controversial, but few are invalidated by the work of others, but might remain rightly in the realm of speculation, or ‘lore.’ Among these are two which would logically be of interest to a Warlock or high Mason (sometimes, the same thing).
The first involves the inner passageways of Cheops. We know these are important to the architects of shootings because, as we will see in the next Proof, they are faithfully duplicated in the 3-D depiction of Cheops by use of shooting lines and shootings. The reason why would seem to be in the lore, which according to some, says that these passages are a kind of history of the World being depicted from creation to its destruction. They actually make a very good case for this, and my own conclusions would tend to agree there is something to the notion, at least symbolically, if not accurately to the year. The claim was, that each Egyptian inch represented one year of history, a thing which seems to be true at least for specific historical events used as benchmarks.
If, therefore, the need to seat the Antichrist in support of end time prophesies requires taking away guns in America to allow the formation of the North American Union, then our architects, being wise in the magic and lore of Cheops and the like, would most likely incorporate as much of that magic into their plans as they could manage. The second involves what is called Pyramid Power in a book by the same name written by Max Toth, which is as good a reference as any of like conent summarizing the lore of Cheops, including the inches for years theory. If even half of the claims within were true (and I have verified at least two of the main claims in my own experiments), that is one more reason a Warlock would wish to incorporate pyramids into any conspiracy aimed at seating the Antichrist. But again let me say, it does not matter what you or I believe about such lore, it only matters what THEY believe.
Go back to Introduction
Go back to Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols
Go to Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View
It is seen by government as a win-win ploy that raises the stakes to unimaginable levels. What we see on the surface has nothing to do with the sinister plot which it enables and portends. This is our last and only chance to save the country, or loose it to tyranny forever, and rush toward Earth’s final demise.
Will Bundy vs. BLM start Revolution 2.0?
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this notice and byline, are included. Please comment any such repost to original posting.
What is going on in Nevada with the BLM?
What you will learn reading this post…• government’s actions against Bundy are mere window dressing — something more sinister is afoot; • the stakes are incredibly high, but hard to see — your very life and the fate of the World, in fact; • there is only one logical solution, and everyone plays a role. What can I do to help Bundy against the BLM?
Why BLM vs. Bundy matters regardless of if his cause is just or he has no legal leg to stand on
UPDATE: Same day posted… Oh, so now we find out its really for the oil companies? What Corporate Police State? BLM sells 29 oil, gas leases in northeast Nevada End update.
Government made it matter, and with dark purpose. At one glance it is an effort to usurp power over people, and the States, as well as to empower corporate ranching over private ranchers. It is a form of unfair and excessive taxation without representation against a political enemy of financial convenience to friends of the White House. And, it is an opportunity to make yet one more National Police Force out of the BLM. But, thanks to controlled media/government PR, not everyone sees these points of view.
But even that view is incomplete and misses the mark, if we but look closer. It is a deliberate series of escalations by government over time to garner public attention among and inflame we select people (why it gets little due mainstream coverage — save that which slants as it did at Ruby Ridge and Waco). They know the Web will be awash in the circles of we Patriots, Constitutionalists, Activists, and others who oppose the tyranny and oppression our government has come to represent since 9-11. The Sheeple must not be unduly disturbed until it can have false flag impact of calculated value.
I talk a lot about the need for citizens to draw lines in the sand and be willing to become Minuitmen should such lines be crossed. Now comes government to draw it for us, I write here to tell you that you have no choice but accept the challenge, and act decisively. You may perish either way, but I’d rather perish attempting to control my life and future than to leave it to others less kindly inclined to favor me. If there is to be armed revolution, let it be on our terms, not theirs.
Why so conclude? Because if they work it right, the ‘standoff gone wrong’ is a perfect chance to justify taking guns. By forcing a showdown and a gunfight (what the snipers do best – there is no justification for government deploying snipers unless for this cause, AND to selectively inflame those who stand for Liberty and who remember Ruby Ridge). There are two possible ends, of course, though I think they will insure BOTH transpire.
Regardless, such a battle is win-win for government. The “poor defensless BLM armed only with tasers,’ if loosing large numbers will be seen by Sheeple as an outrage, and given that Militia were involved from multiple quarters, and other armed parties, Obama can order Martial Law with suspension of the Constitution. Especially if also employing agent provocateurs for local violence across the country, as was employed in the LA Riots, where National Guardsmen posed as rioters to prime the pump. This would likely result in orders for the military and Police to go door-t0-door. Who knows, Obama might even order the U.N. in as long-feared and first promoted as concept by Henry Kissinger. Or, he might simply order in the military; A-10s, attack choppers, a Stryker Battalion, and so forth.
They can then conveniently ‘quash armed rebels and terrorists,’ confiscate all guns, round up dissidents and politically incorrect opponents (like you and me — why they have been spying on us so earnestly), and hold a Con Con (they are already staging for it) to pass the Constitution of the NewStates of America, already written, which essentially enables the formation of the North American Union and surrender of US sovereignty to the U.N. in stages. All of this leads, of course, to a one-World Government (that Constitution has also already been written), and provides a single seat of power to enable the Antichrist’s coming to power.Note: The NewStates Constitution is reprinted in my booklet, Fatal Rebirth, along with the World Constitution, complete with analysis line by line (NewStates) to show how draconian a document it really is. Rights become privileges which can be revoked at any time by any agency or party of government for any cause, even retroactively, and almost anyone in government can write law, and again, it can be retroactive. And if you think the two-party system and the FED/IRS is bad, wait until you see what follows. You can request a free copy of the ebook version of Vol I of Fatal Rebirth by email request to pppbooks at comcast net.
THAT is what is at stake. Nothing less than EVERYTHING!
So we must be decisive: regardless of how we view Bundy’s cause or government’s viewpoint, regardless of if an armed and concerned citizen or a dumbed down Sheeple, we all have equal stake in this unfolding globalist tragedy. And, we can all play a role no matter our status, and regardless of if present in Nevada, or not. But about that decisive action…
Why is the BLM standoff against Bundy in Nevada taking place?
What we should prefer…
Should we stand up with arms in hand and enable, if not force, the ultimate showdown? I fear this is exactly what government wants, as already stated. But there is another, wiser choice.
By all means, men of arms should rally, but standing firm and waiting for the other side to blink or blunder is a fool’s plan, and it can only end in bloodshed. What must be done is that which can neuter Government’s ploy. And only one set of steps can do that:
a) anyone and everyone should file court actions against any and every agency, branch, and individual of government involved at every level of government. Any and every cause, grievance, or objection, as allowed by and based on State, County, and Federal Law, and the Constitution and Bill of Rights, should be employed. Bury them in legal actions, EACH OF WHICH includes request for either an Injunction or Stay Order. These actions should not all be done at once, but the flood should be continuous, so that new ones can replace those quickly disposed of. THIS BUYS TIME;
b) time is our friend — it generates awareness and understanding. It buys media attention and gives Sheeple a chance to better understand what is taking place. Just as the 99% movement could no longer be contained by a controlled media, so must this matter be brought into every home. Invite major networks, espcially foreign press, to specifically include RT, to set up broadcast facilities right on the Bundy Ranch, and bypassing the see nothing viewpoints established by government for controlling media in the manner done at WACO (NEVER AGAIN!). Install microwave and shortwave communication systems for the purpose. But also, LOCAL media is the key, as is the WWW; do not rely upon mainstream. Militia and other group ‘spokespersons’ in your community should approach their local news sources with proposed interviews to get the word out. IF EVERYONE UNDERSTANDS WHAT IS TRULY AT STAKE, AND TAKING PLACE, GOVERNMENT’S PLOT IS UNDERMINED AND THEY LOOSE THE SHEEPLE;
c) flood the theater with actors. There should be so many people there is not enough room in the minimal areas intended to contain them. OVERFLOW. The ‘1st Amendment’ area, itself an affront to the Constitution, and should be enlarged and enlarged again, forcing retreat or conflict which will make news favorable to our side. If you have access to a professional camera, start a ‘newspaper’ or ‘Radio station’ and flood the press area and make it overflow, as well. And Bundy’s ranch should become a city of tents, and include as many unarmed persons as possible who wield nothing but baseball bats or the proverbial pitchfork. THIS MAKES THE WHOLE AFFAIR MORE VISIBLE and LESS TENABLE TO GOVERNMENT’S GOALS;
d) involve the local Sheriff and State/County Officials. The Sheriff has effectively stated a hands-off non intervention policy. Fine. Perhaps he is a puppet put into place for the purpose, or co opted by any number of means available to government for rendering him neutral. But the flurry of legal actions should be intended to FORCE HIM to intervene on behalf of Bundy and supporters. If nothing else, he should have a presence on the Ranch to insure armed groups behave (public safety). The Governor and Legislators, and County Officials should called to DEMAND it. Perhaps even the National Guard should be called to stand by. A simple invite, if not enough, can be followed by a media blitz and public demand that such action is needed. Any politically motivated decision to remain neutral should be negated, thereby; a political suicide. INVOLVE THE SHERIFF, as WITNESS and PEACEKEEPER;
e) party! No alcohol or drugs, but good cheer, song and dance. Use loudspeakers. Mix well with speeches and ‘town hall’ dialogs. Use the platform (the nation will be watching) to air ALL GRIEVANCES with government, not just this ONE issue. Give voice to the rest of the 99% in a way that movement never was able to achieve on its own. SOROS WILL HAVE NO VOICE, this time;
e) prepare for Martial Law at home. That means emergency kits and plans (like the one government would not approve). It means weapons. If it is declared, you will have scant few hours to choose to fight, run, or to surrender to your fate at the hands of tyranny. If not taken away, you will need to survive for months without anything like normal civilization. No key resource, including electrical power or communication, can be assured, and will likely be withheld on purpose. Travel will be restricted and many will not be able to work, and there is no shopping, only rationing. BE READY TO BE SELF RELIANT, BE READY TO FIGHT IF THAT IS WHAT IT COMES DOWN TO;
f) if and when the shooting starts, DO NOT ENGAGE! Dead BLM or other Agents will be made into martyrs by mainstream. DO NOT GIVE THEM WHAT THEY WANT. Show restraint, and let the casualties be on your side. Keep putting out a continuous feed of information and video so that media and the WWW know what is going on. IF THERE ARE TO BE MARTYRS, LET THEM BE OUR OWN, and LET IT BE TELEVISED LIVE. If a full-scale armed revolt spontaneously errupts nation-wide, then by all means, defend yourself at the Ranch, and FOLLOW YOUR CONSIENCE AND DEFEND THE CONSTITUTION.
g) petition for redress. Redress of grievances is a key component of our Nation’s Constitutional form of government (this post makes clear, mid post). When it fails, we have no government, only tyranny. It seems today there is NO REDRESS POSSIBLE at the Federal level. ONLY THE STATES stand in the way of total Federal domination, which is part of what this whole affair is about; a means to increase Federal power over the States. But while all this is going on… and while we have media platforms established… we should be seeking redress through our State Legislators, making a series of calls for action to quickly pass laws which…
1) nullify all Federal gun laws, NDAA, NSA surveillance, and forbid Federal drone overflights except under warrant and oversight by State authorities;
2) eliminate Federal arrest and warrant power. If a Federal judge issues a warrant, or an Agency is moved to move against a party (like Bundy), they must instead go to the appropriate local Law Enforcement Agency and have them execute on their behalf. They may go along, but as observers, ONLY;
3) make clear a mandate that your State shall NOT approve a new Consitution if a Con Con is held, nor the removal or neutering by Amendment of the current Constitution, and any existing Federal Law which does so should be nullified;
4) add freely to this list anything which addresses abuse of power by the Federal government, such as militarization of Police, Obamacare, etc. This will be your one best chance to spark public dialog and debate, and to make certain that people, and especially State Legislators, realize THEY are the ones with the real power, and the duty to protect freedom and force the Constitution.
What is at stake in Nevada and the BLM standoff with Bundy?
Government has drawn a line in the sand
Let’s make sure they regret it. Force them to be the ones to cross it, and let them trip over their own power play. Now… go forth and spread the word.
Ten easy-to-grasp but remarkable proofs, both visible and hidden: Illuminati style mystical symbolism and related ancient magical mysteries, calling cards, bragging rights, and Warlock spells cast against America, and the World. Conventional clues, too.
Are there any patterns in mass shootings?
Is there any proof mass shootings are not random?
What you will learn reading this multi-part posting series…• there are 10 interlocking proofs that mass shootings are not random; • they include various kinds of patterns, visible and unseen, and even coded information; • that the pattern predicts itself, and understanding may therefore help stop the murder; • that the codes and clues seem to be like signatures identifying the architects.
Are mass shootings by intelligent design?
Introduction: Ten Proofs ‘Random’ Mass Shootings by Intelligent Design
Is there a mass shooting conspiracy?
Note: This series is not yet ready for full presentation, but the most recent Fort Hood forces me to start releasing the material without delay. The reason for delay has had to do with an inability to provide high quality graphics suitable for proofs. This will be overcome, shortly, I hope.
One thing you need to know about me as an investigative writer or, as media and government would prefer you to think of me, a ‘conspiracy theorist,’ is this: whenever I decide to take a close look at a potential conspiracy or lesser matter, I do it right. If I cannot uncover something no one else has brought to light, I’m either not finished, or I’ve backed out concluding it beyond reach, or a dud. If you read my findings on a given research, you will undoubtedly learn something FACTUAL no one else had previously discovered or brought to light. And so…
In this matter, we find the shear volume of startling new information overshadows and renders original headlines and competing theories essentially meaningless — especially media’s version. It will make you angry. It will scare you. The question is, will it motivate you to do something about it? YOU are what you are waiting for, you know.
But in introduction, there is still one other point which must be made; it is in form of a problematic question. Can I get you, the reader, to override your current belief structures long enough to consider the unusual nature of the findings? This presentation will most assuredly fly in the face of what most people consider ‘traditional wisdom,’ but it also will explain why it is non-the-less valid. Can you handle the Truth, or will you wimp out to the comfort zone of current beliefs?
Area all mass shooters psycho?
On suspending belief structures
I began a ten-year research project for a book, Fatal Rebirth, in late 1989, which also begat a screenplay published on line in 1999 (The Electronic Apocalypse). In the book’s Introduction I urged the reader to suspend their belief structures briefly and read the material as if merely fiction for entertainment’s sake, because many of the concepts within were so new and unusual as to defy belief — likely seen as ‘far-fetched’ by most uninformed readers. I offered over 1,500 footnotes and a huge Appendix section to help them consider why I deemed them factual.
This blog post should be read in like manner, especially if you are content with government’s actions, are a politician, member of a government agency, military, or any part of the justice system, or Media. Especially if you are involved in a mass shooting incident as a professional or a victim seeking to know the truth. And even more so if you are gun owner, or even among what 2nd Amendment supporters refer to as a ‘gun grabber.’ I plead, therefore, that you suspend your belief structures briefly as if reading a political/horror-science fiction piece. That’s what it is, actually, minus the fiction component.
You will, like readers of Fatal Rebirth, I would hope, realize the truth by the time you reach the end. Or, at the very least, you will be entertained for all your reluctance to let the message sink in and take root.
If nothing else, even if you choose to doubt some of the more obscure subtopics (i.e., relating to mysticism) have any factual basis in REALITY, consider this: it matters NOT what YOU think, given they ARE taken as real by persons likely to be behind any such conspiracy (i.e., ‘Illuminati’ Satanists). You MUST also ask yourself, “Can the sheer magnitude of interlocking clues be ignored?” Because at every turn they defy the odds of coincidental probability, as illustrated by carefully crafted control study groups. If thinking logically, you MUST concur that intelligent design is revealed despite what you may think about the logic of the beliefs which lay behind it, or the unusual way in which the evidence was revealed.
Pending you conclusion, by all means feel free to think me mad if you must. Read just for fun, but please read it through to end before you render final judgment as to if madness or truth be present. A logical reader will be converted unless their mind is already so firmly made up that they do not wish to be confused by facts which destroy their belief structures. Judge not what ye know not, but that upon which ye are well informed and have considered fully, judge freely.
Your future and the future of your children could well be at stake, a statement applying to all mankind. Why do I say this? The book mentioned above, Fatal Rebirth, was based on trying to illustrate what I call the Unified Conspiracy Theory; the notion that all of America’s darkest bumps in the night for the last half of the prior Century, forward, were not random oddities by random people for random agenda, but carefully orchestrated by the same core group of people with but one goal for the World in mind.
I termed them Shadow, but they are also known by other names; the New World Order, the Illuminati, the Power Elite, Globalists, and among them, member names like CIA, Skull and Bones, Bilderbergers, Council on Foreign Relations, and many more of like nature. Their goal I termed End Game; the establishment of a One World government, a single seat of power in order to seat the Antichrist upon his throne and bring us to Armageddon.
The Unified Conspiracy Theory, once justified in research and taking shape in book form, led me to realize that their stepwise actions over fifty years of mysteries were indeed leading to one goal. Knowing the goal, I reasoned, it should be possible to forecast the next logical steps. So the book also included within its presentation several terrible event predictions expected to take place in our near future. Thus far, though I do not claim to have gotten all event details precisely correct, many terrible forecasts have already come to pass. Among these were:
a) an assassination attempt on Ross Perot or his family to cause him to drop out of the Presidential Race, a matter which indeed transpired using mailed Anthrax according to a Secret Service back channel contact;
b) the false flag downing of the World Trade Center by civilian passenger jets which;
c) resulted in a series of Middle East Oil Wars. Other predictions include two more terror plots which are part and parcel of this blog post. Those are…
e) MASS SHOOTINGS.
Note: you can get a free copy of Vol I of Fatal Rebirth (ebook) by email request to pppbooks at Comcast (net). You will be glad you did, as it will take you far deeper into the Rabbit Hole than Alice or Neo had ever gone. This pill is black, though trimmed in red, white, and blue.
So, if ready to suspend your belief structure, let us begin. Pretend there is, despite media’s recent attempt in the Cincia shooting to portray anyone who believes in the New World Order as mentally ill and anti-patriotic, that such a conspiracy is actually afoot. Also pretend, if you must, that Political Control Technology in the form of the Manchurian Candidate is real. There are real-life Jason Bournes out there, as my book, MC Realities, and other books on Political Control Technology illustrate more than adequately. Even the Smithsonian channel knows.
This will make the key postulations, testing methods, conclusions, and proofs of the core material easier to accept, especially as they will be offered in the manner of scientific discovery — exactly as I undertook them as investigative writer. You will, in fact, be able to retrace my work to double check it, if you wish — as long as you review the full series of posts and sidebars before you attempt it, lest you make a critical error. Please subscribe to my blog pages to insure you are notified as the remaining posts in the series are added.
Are mass shootings are by intelligent design?
Some several months ago, insulted by media’s misreporting of Aurora and Sandy Hook and outright clues that a disinformation campaign was afoot, I began finding ample cause for concern. But how might one determine if other mass shootings were arranged as part of some kind of sick criminal conspiracy, one which might involve both real and faked shootings?
I started with several basic presumptions of truth, and then set about to see if the logical evidence such presumptions would require were indeed in place. The ‘illogical’ presumptions fostered by the Unified Conspiracy Theory requiring suspension of belief are as follows:
1) That Shadow and their Globalism requires destruction of America, and its Constitution in order to enable forming the North American Union, a matter which in turn requires that the Right to Bear Arms is first invalidated, and arms confiscated or gun owners otherwise neutralized in a manner similar to that of the Australia;
2) That the New World Order, the modern day Illuminati, if you will, would be well capable of undertaking a campaign of gun violence for such cause, but being an Illumined Power Elite lost to Satanic and Masonic mysticism, they would employ mystical constructs which would leave detectible footprints if knowing what to look for;
3) That the principle tool of such a plot would involve a small army of patsies, cut outs, and fall guys, principally from a category best known to the public as Manchurian Candidates. It may additionally involve a small army of blindly obedient members placed within our armed forces, the intelligence community, and law enforcement to aid more indirectly in supporting roles. This would include logistics, psyops, and cover up, or even command and control, generally unaware as to the truth or reason behind their orders. These are the same players frequently found playing key roles in the lives of mind control victims at large.
All three presumptions must be true to make a proper accusation, for they comprise the basic proofs of any crime: Motive, Opportunity, and Means. Normally, we think of opportunity as meaning access to the scene of the crime, typically proven by forensics such as fingerprints, or better yet, actual eye witnesses. In this case, they deliberately left their fingerprints, in a manner of speaking. In fact, the bulk of the proofs fall into this category, perhaps even naming individuals behind the plot. At the very least, we are indeed dealing with the Elite, those involved in principalities and powers.
Indeed: Two names have already surfaced by such clues, and both are billionaires. I also have a dozen other names of likely conspirators, but no names are released; these things are my Life Insurance Policy.
Sidebar Post: On Programmable People. This sidebar post addresses the notion of the possibility that at least some mass shooters are mind controlled patsies, and reconciles their coexistence with truly random shootings — those which are more naturally spontaneous crimes — which can collectively still both be component parts of the same intelligent design. This leads us to the finer details of how shooting event locations and dates lend importance to our consideration, and just how these things can additionally reveal intentional, yet concealed clues.
Here it should be mentioned, that many observers of the New World Order crowd favor the supposition that among their leadership we might find the modern-day Illuminati in spirit, if not in actual blood lineage, even though they may have since assumed a different family name. By way of example, in my research, I have had reason to conclude that the Rotheschild name was assumed; those assuming it being Knights Templar in hidding, their wealth derived from Templar treasure, and not truly Jewish by ancestry or faith, at all.
Many who favor the notion of a Modern-day Illuminati additionally believe, as do I, that there are at least two, and as many as four groups competing with each other within the movement to be the ones ‘honored’ to have one of their own selected to become the Antichrist. Much of what is discovered in this investigative series will point to this being true in one way, or inherently implied in another. It is, in fact, one very good reason to employ symbolisms and other clues which act as signatures of those so bidding for selection.
Such evidence was abundant, even easy to find, and I remain convinced that the trio of presumptions are sound enough to warrant seeking incontrovertible proofs. I sought such proofs both in quality and quantity sufficient to illustrate that ‘random’ was not the right word to describe mass shootings, but rather, ‘intelligent design,’ is.
The path of my continued investigation led to endless shocking discoveries, but there was a problem: to describe the methods and explain findings to the casual reader would, it seemed, require a tedious educational process and boring, repetitious citation of facts. It would be about as fun to read as a spreadsheet or database. Not good.
People want visual sound bites easily grasped. More so if Sheeple content with their Evening News and easily frightened off by words like ‘conspiracy theorist,’ and ‘New World Order,’ or similar. Worse, the investigation bogged because of the real life tragedies each shooting represented. Proper investigation meant exhaustive study of individual events, reviewing endless horrific detailed accounts and sad, brutal media imagery. It was taking an emotional and even physical toll upon my body and mind, and my spirit. Eventually, instead of plodding along 10-14 hours a day as at the start, I found myself barely able to work on it a few hours a week.
I played with several ideas on how to present the story NOW, without completion of the full study, for there is indeed already a mountain of proofs uncovered. But again, the complexities in presentation left me feeling it a hopeless task. Finally, I decided to break it down into about a dozen short compartmentalized components suitable for a series of blog posts. Frankly, I’m hoping it will spur someone to offer useful help; it will take funding and staffing to properly complete the study. Or better still, perhaps some Sheriff or other authority will assume the duty as result of shootings in their jurisdiction.
Follows is a synopsis of the Ten Proofs to be presented. There will additionally be, at appropriate points, companion posts detailing the scientific methods or other analytical procedures involved in select proofs where a doubting Thomas type may wish to challenge the validity of claims. I firmly believe that for my proofs to be accepted, they should be presented in a way such that ANYONE can duplicate my work and verify accuracy and conclusions.
This is a legitimate investigation despite its atypical and unorthodox methods and odd topics involved. NOTE: links will NOT WORK until the various posts involved have been posted. You may click on them to discover their current state. Again, subscription to this blog will notify you when new posts are added.
What are the ten proofs of a mass shooter conspiracy?
The Ten Proofs in review…
Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns;Any time you find a cover up, you necessarily have a conspiracy to contend with. Gun grabbing groups, including government and biased or puppet media forces, should be using every opportunity to make their case for gun control, but act as if the bulk of gun violence never took place. Why do they employ selective blinders? There is a reason.
Proof Two: Shootings Exist in Identical ‘Magical’ Categorical Clusters;The Illuminati loves magical numbers, as they can translate into meaningful words or names, or leverage ‘spells’. Interesting then, that basic shooting statistics establish set after set in the most magical and potent number of all, one which decodes to ‘Satan.’ This alone reveals dramatic coincidences well beyond the possibility of random chance.
Proof Three: Shootings Exist in Endless Sets of Three Forming Straight Lines;The same Dispersal Pattern Studies method applied by government researchers to UFO sightings reveals Mass Shootings do something UFO sightings allegedly do not: form repetitive patterns with GPS accuracy, doorway-to-doorway-to-doorway.
Proof Four: Straight Lines in Turn Form Complex and Perfect Shapes;When it comes to symbolism, nothing outperforms a graphical shape. Better still when that shape itself has magical properties or relationships to other shapes, or its own hidden or obvious meaning.
Proof Five: Shapes in Turn Form Complementary ‘Magical’ Clusters;It defies odds that perfect shapes should cluster together in ways which share overlapping lines or corners, and be generally both aligned and mirrored in additional symbolism.
Proof Six: Shootings Also Relate or Depict Masonic and Satanic symbols;Select shootings define such symbols with precision. Masonic Symbols are rendered in 3-D. Satanic Symbols are positioned correctly for magical application by Warlock.
Proof Seven: Shootings Form Multiple Lines to Cheops Exactly 500 Miles Apart;Extending select shooting lines finds them bisecting at the ancient Cheops Pyramid to establish a series of lines all of equal degrees of arc. But that just prepares us for a bigger bombshell.
Proof Eight: Shooting Lines Also Depict Cheops in 3-D Cutaway View;The Great Pyramid in Egypt is one of the Holy of Holies to Masons and some satanic cults, and is specifically tied in mysticism to the End Times and historical catastrophic events. This one will scare you.
Proof Nine: Shooting Sets Share ‘Magical’ Data Points Which Decode to Messages;Shooting line sets share three or more identical magical numbers within their data points. These decode to tell us when and where the next shooting will be, name a shooter, or perfectly prophesy some specific outcome.
Proof Ten: Individual Shootings Examined in Micro Duplicate the National Study ProofsTwo examples are offered; Aurora and Sandy Hook. They not only duplicate the ten proofs, but they mirror each other and one points to the other. Why are mass shootings on the rise?
Are you ready of this? Buckle up!
So let us begin. I propose your best bet will be to SUBSCRIBE to my blog pages so that you are automatically notified as new posts are made to complete the series. Please link, share, tweet, etc., and by all mean vote your ranking at page top of each one, and comment with your questions, criticisms, or thoughts. How else will other know this is important?
Do bear in mind as you read, each offered proof individually seems to defy the odds or logic path required for truly random shooting events. Collectively, it is monumentally clear. Also bear in mind that I am human, and I, like any other, am prone to making mistakes. A ton of information had to be entered and copied from one location to another multiple times (multiple database and software applications). Therefore, either because of a mistake on my part, or perhaps because of a mistake in media or other accounts/records, any given individual data point in any given set of proofs may be found invalid.
By all means let me know if you find such a discrepancy, but please remember this: a single error in a single data point does not invalidate all other data points, and therefore, does not invalidate the conclusions or the suppositions, themselves. In order to dispute my findings, you will need to offer proofs that the method is flawed, the entire data set was in error, or analytical logic was faulty. More: such dispute must address and ultimately invalidate all ten proofs, or short of that, offer equally viable alternative explanations which fit the findings and afford a more innocent explanation.
Since each proof tends to defy all possible odds of random coincidence, and does so consistently, again and again, naysayers will have their work cut out for them. More so, because in many cases, control groups have been established to show truly random data points enjoy no such pattern. I have done my homework, and carefully so.
I will demand the same of naysayers.
Go to Proof One: Gun Grabbers Selectively Ignore Mass Shootings, Conceal Patterns
Go to Side Bar: On on Programmable People
How to spot and deal with Trolls, including a clever tool they use in any social media capable of posting images (VERY prevalent on Facebook), and quite insidious with far reaching implications. BEWARE: you betray yourself and your friends if you take things at face value.
What is a Web Troll?
by H. Michael Sweeney
copyright © 2014, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How does being a web troll work?
UPDATE: Nov. 11, 2014 Perhaps as if to ‘test’ me as result of this article (or not), a Web troll began the process described herein to goad me argumentatively while also employing a good half dozen of the usual disinfo tactics in the 25 Rules of Disinformation (linked below). So I unfriended him and watched: that same day, ‘someone’ created a new FB account and almost immediately friended two of my friends, posted ONE activist post, and ONE peace post, then requested to friend me. Sure. OK. BUT I HAVE MY EYE ON YOU, because that’s how easy it is to get a new identity and hook back up to a target. Not that I care. Trolls are tasty.
Are you being targeted by online government trolls
How Social Network Trolls Target, Track, and Psychologically Profile You
Reading this post you will learn…• That there are three basic kinds of trolls and subsequent ‘missions’ against targets like YOU; • That there are troll profiling and tracking tools or methods which can be recognized; • That there are ways to protect yourself without drawing more unwanted attention; • That the Troll represents a danger in that their ‘assessment’ can lead to escalation in your targeting. Is social media infiltrated by government trolls?
Government and Commercial Trolls
Consider, for example, the friend ranking and layer’s of affiliation tracking tool. A graphic is created containing a simple textual message. It is graphical because there is no easy way to distinguish between two identical text messages, whereas, altering a single pixel’s color by 1 imperceptible shade of difference makes it unique, and allows thousands upon thousands of individually trackable versions. A Troll who has managed to friend a targeted person of interest then posts the textual graphic as if a sincere request. Examples will be shown.
These kinds of posts seem innocent enough and easily get spread as requested, allowing simple computerized search processes by FB’s intelligence community or marketing partners to see not only who is close to the target party, but at what layered level and loyalty or, if you prefer, like minded thinking. In point of fact, ANY image shared with a given political, philosophical, religious, or other belief or emotional message can be so tracked to perfectly define each such poster’s psychological profile, and rank their threat level to the paranoiac governmental powers that be. The same is true of marketing trolls seeking to learn about your product usage or demographic, etc.
The only safe share, then, we might presume, is textual or perhaps the sharing of a URL and it’s image, or an image we ourselves create and have perhaps included in our FB albums. Even with URL’s however, the possibility exists it is still being tracked, especially if a Troll operated resource such as Federal Jack, a known DHS sponsored Sorcha Faal disinformationa conduit targeting conspiracy theorists, activists, and other ‘potential terrorists.’ Their goal is to get you to ‘share’ their links, thereby spreading disinformation while psychologically cataloging YOU and any of your friends’ beliefs; all who click to learn more. They may need to have a troll assigned to them, after all, for being yet another ‘potential terrorist’ — a free thinker, patriot, constitutionalist, etc.
Worse, we have learned from our new Paul Revere of the coming Second American Revolution (Snowden), that NSA is not only monitoring FB activities big time but that Trolls from NSA, FBI, DHS, DOD, and even the FED, and other paranoid agencies, and even corporations who have a strong and growing list of people who think ill of them, like Monsanto and some banks — all regularly maintain false social media identities for entrapment and spying purposes. They even infiltrate online gaming. Snowden’s latest bombshell, according the foreign media analysts, indicates there were so many game Trolls that it was starting to change the character of online gaming, and special tools had to be developed so that Trolls would not end up targeting other Trolls and more easily remain inobvious. We are talking here, about games with chat or other communications capabilities within the game or as part of game support, especially when in a social network manner.
And it is clear that snooping is also rampant among commercial interests, which is certainly true in online gaming, which after all, is a commercial enterprise. FB is perhaps the biggest offender in this area.
How can you spot a social media troll?
Differentiating an innocent graphic from a potential spy tool…
There are several online graphical message generating services. FB themselves seems to be hooked up with one called your-ecards (.com). Another is someecards (.com). Anyone can use these to generate a simple textual graphic with or without use of stock illustration graphics (e.g., a man looking perplexed), typically in silhouette or line art form. They can then easily share it through their favorite social media(s) with a few additional clicks. These can always be recognized because the logo for the creating Web service is displayed at the bottom. An additional hallmark of such services is that the background is almost always colored, and there are scant few colors available. The default color or otherwise most popular seems to be pale blue, pale green, or yellow-orange.
So when you see a colored background, typically with larger or fancier text than a normal posting, you are clearly looking at a graphical text post. The next thing to look for is the logo. If you see a logo, it was likely a sincerely generated message by a genuine human resident of social media. However, if there is no such logo, the message may have been generated by a Troll using his own computerized tools to psychologically target you regarding a select individual hot button. Are you, for instance, a tax protester, pro gun, anti GMO, for or against a given politician or political topic, or simply, who is a good like-minded friend of yours as opposed to some stranger you’ve accepted on the Network. Such messages also tend to be minus any artwork — text only. There is one more defining clue to look for.
Because there may be multiple versions of the same message for targeting different individuals by multiple Trolls interested in gathering information about many someones, there is a need to tell one shared message copy from another, which is exactly why it needs to be a graphic. YOUR version must be physically different from MINE. The simple solution is to vary one or more pixels in a way easy for a software routine to detect, and then match to a targeted individual and their Troll/need. Given the countless millions of users on FB (and other social media) who might be deemed targets, it may mean that many, many dozens of pixels will need to be manipulated. My research shows that, indeed, most of the suspicious postings, in addition to missing the logos, have such visual manipulations. Examples:
So one needs to look for such abberations or flaws in the background, usually darkened pixels along the edge, most commonly gathered in clusters or strips. You have to ask yourself… if going to the trouble to create a custom graphic for a text message instead of simply typing it in, why would they: a) choose the ugly colors used by such as your-ecard if not trying to make you think it such; b) take the extra steps to strip away the logo if using such a service (the point being they did not); and c) end up creating an image with a flawed background (where did the aberration come from, if not deliberate)?
When these clues are present, you are staring at a Trollish spy tool. To then share it betrays and catalogs you and links you and your beliefs with any of your friends who do the same, and theirs, and so forth, on down the line. The proper thing to do is enter into the comments: “I suggest you delete this post because it fits the description of a Troll’s chain-letter spy tool to catalog, track, or psychologically profile and establish links between like-minded persons: learn more here: http://wp.me/p1GyKw-zi” That link goes to this blog post you are reading.
Then I suggest you share the post anyway with a similar message, “Share this to warn others about Troll spy tool chain-letters to catalog or psychologically profile and establish links between like-minded persons. To learn more about this tool, visit this link http://wp.me/p1GyKw-zi.”
Finally, look carefully at the original post. Most social media will have a means to indicate if it was itself being shared, or was a direct post. If direct, it’s YOUR Troll. If shared, the poster was gullible in sharing, and is not likely a Troll… but beware that that could be arranged for as a deceit — so watch to see if the poster repeats the ploy frequently. You might optionally go to the ‘cited source’ of the share and try to find the post on their wall if you want to try to see if they are the Troll, and on to the next if not, and so forth, posting or messaging those encountered along the way who are victims, if you can. But that can be a LOT of work.
Are social media trolls sociopaths or psychopaths?
More Direct Trolls; Psyops and Sociopaths
The real threat to activists and politically incorrect persons online, like myself, is government agents paid to do nothing but sit in front of a computer and pretend to be your social network friend, someone you don’t really know at all, of course. They don’t just post Trollish images, they comment, and even message you. Like the aforementioned tool, they seek to learn everything they can to psychologically profile you, as well as see who ‘likes’ your posts and what THEY comment. But they are also there to play mind games. You are officially a victim of psychological warfare, perhaps even by someone from within the U.S. military, or even the military of another country. They are quite often sociopaths, so chosen because those traits make them more efficient.
Here are some tips on how to spot and deal with this class of Troll, as well as the kind of Troll who is simply out to make trouble for a given collective of people who believe a certain way about a certain topic. You know the type, my favorite example being the warrior Atheist who deems it his life’s mission to ferret out believers in God and annoy them with endless barbs and zings as if they were evil and dangerous for daring to worship. These people will wax sociopathic, too, and even psychopathic, when given enough rope. UNFRIEND these kinds of Trolls.
Hint 1) Trolls work in packs or maintain multiple identities to be a self-contained pack. That way, if you delete one of them, others survive, and then they generate yet another new identity and friend request to maintain the pack. The advantage is that you can suffer a series of ‘In deference to your view, we all seem to believe the same (whatever)’ posts (i.e., you are an idiot on this matter). Sure. You might be an idiot. But at first, the pack is all positive and flattering to your own beliefs so you a) get used to seeing them, and b) start respecting their beliefs and presuming them the same as yours. That’s the worming in stage.
But when it is appropriate for profiling or attempting the role of agent provocateur or disinformationalist, they will all suddenly be believing in something more off the mark, and increasingly so, as often as not. But by now, you like them and their beliefs, and so, your reaction tends to be as they expect; they are pulling your chain, and observing your jerks, evaluating, and cataloging, attempting to modify your behavior through deceit — a form of mind control. Can you be controlled, or are you firmly centered in your beliefs? Are your notions your own, or being foisted upon you?
Hint 2) New Troll requests tend to be persons with scant history on the network, and very few posts, but posts akin to your own in substance. Note that Facebook asks you to suggest friends to them. NEVER do this unless someone you ACTUALLY KNOW in the real World. If you do it, you are giving them a list of new targets. Since I don’t fear and even enjoy playing with Trolls, I let anyone into my friend list, but that does not mean they get what they want from me. But you may be better off simply passing on marginally viable friend requests.
Hint 3) Try posting something deep and yet somehow provocative (in the eyes of the establishment) which requires a bit of reading and thought before drawing conclusions. Look for a pattern in response from the same suspect persons; a) almost instantaneous response in the manner of (Hint 1), and typically emotional rather than logical in nature. This is almost always short and designed to be inflammatory or provocative, a bit testy. This is followed by b) one or more secondary (pack) responses delayed rather a bit in time. These will be more in depth and thoughtful, and validate the former with logical argument, and may contain a link to give further credibility. Other brief pack replies may be sprinkled in for effect. Collectively, they are all in agreement regarding your idiocy (or whatever).
It is when the same people tend to respond in these patterns that you are very likely dealing with a Troll pack. You will find this is true regardless of what time of day or night you post. They never sleep because every psyops Troll is actually three people manning a keyboard around the clock. They can always respond quickly with the first response, but the careful response requires that they actually research and formulate the best supporting answer based on all they know about you and the topic, which they might need to first research, and likely, it involves a supervisor’s approval or must be compared against preset guidelines.
Hint 4) Thick skin, undaunted. There is nothing you can do to make these people not remain your friend, short of unfriending them, yourself. While they may match or even exceed your own expression of ire, they won’t go away no matter how you might choose to argue, or confront with insult. Indeed, they tend never to deal with insults directly, at all; they are irrelevant and serve no usefulness to their goal. A real person has an ego that must be defended, but they are just playing psychological games and feel superior regardless of what you say. But when you argue, watch out for the next hint, which is commonly employed in their responses.
This is also true of the sociopathic/psychopathic ‘cause’ trolls.
Hint 5) They tend to employ the 25 Rules of Disinformation. Easy to spot, easy to deal with, if you know what to look for. Be careful, though, because ordinary people sometimes use flawed presentation style or less-than-thoughtful posts which on the surface appear to fit one or more of the rules, when they are just being human. Watch for repeat performances, to know the difference. Give them rope.
Can trolls lead to real-world targeting?
Dangerous escalations; why we dare not ignore trolls
The real danger in online Trolls is this: their whole purpose in targeting you online can be to determine if you deserve real-World targeting, as well. With a few keystokes you can end up having your entire life put under a microscope; phone surveillance, tails, observation posts, bugs and cameras covertly placed in your home, mail intercepted and snooped, and so forth. Men in Black stuff. Its why I wrote The Professional Paranoid; a how-to book on detecting and dealing with this kind of targeting.
And, it can escalate further: electronic harassment, dirty tricks, political control technology (mind control) to make you look mentally ill to others, destroy personal relationships, wreck your income, and sabotage your life. For that, I wrote MC Realities, another how-to.
But it can also lead to the worst of all possible escalations; NDAA vanishing. If truly a pain in the neck to the government, a threat which needs to be dealt with more urgently… you can ‘legally’ (so they claim) kidnap you and make you vanish without any legal process. They can elect to torture you or give you over to some other country for ‘processing.’ Or, if they want, they can murder you and dispose of your body. This is how we know we are living in a tyrannical Police State, and why, then, government dare not tolerate free thinkers without Trolling them, and trampling on rights and freedoms at every turn, and why fear mongering is their number one justification. ‘Oooh… terrorists are everywhere! We need to TSA and NSA your ass for your own safety.’
What should I do if I encounter a social media troll?
What to do with a Troll
I personally do not mind their presence so much as some might. I enjoy providing them with disinformation, or provoking them to try to chase down a given pathway of dialogs only to suddenly drop the matter as if it never happened, or I don’t really care, or even was deliberately jerking their chain. I even kid them.
But most people would prefer to unfriend them, and there is NOTHING WRONG WITH THAT. Just know they will be right back with a new identity. It may be better to deal with the ones you know than to worry about finding the new ones you don’t yet know.
My favorite thing, however, is to educate them. I like posting factual material which challenges their personal beliefs that their job and their boss are operating on valid or just principles or beliefs, and purposes. I make them ashamed or feel guilt, whenever possible. It does not work with everyone, of course, but it is fun to try.
Are social media trolls dangerous?
Your privacy and personal safety could be at stake if you are in the hands of Trolls. The threat level is determined by how much our paranoid government fears people who fear government’s growing fascist police state/spying mentality, and dare to talk openly about it. The more vocal you are, or the more aligned with or closer in links to others of like mind, or the more active you are elsewhere on the Web, or the more followers you have, and even the kinds of searches you make (that, too, is being watched by government) and certainly, your own original postings… each of these things determine if you might become the victim of someone else’s Troll, or have a Troll assigned to you, and what kind of Troll.
And once your ‘threat level’ has been assessed, that could lead to escalations that you will not likely want to experience. If you get a sense that such escalations are already in place or happening, by all means read my books, because they will help you know for sure, help identify the players, and form defenses. You can also contact me personally for free and for-fee online consulting or direct intervention services.
It’s what I do when I’m not being a thorn in the side of tyranny… and attracting Trolls.
When the stinkiest FEMA kind of stuff hits the fan, anyone who has a business dealing in key resources will find their valuable inventories and property at risk of sack and pillage by looters, or outright theft by government. There is a way to protect such assets while at the same time insuring better chances of survival of families.
How do I protect my business in a disaster?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What can gun shop owners do to protect against gun consfication?
The Threat to Business Property is significant in a disaster…
In the prior part of this series we reviewed a wide variety of disaster situations that make emergency preparedness an ultra-important concern for families, reasons far more serious and far reaching than mere quakes, floods, or tornadoes. In the second part, we proposed a disaster preparedness plan much more comprehensive and truly useful than that advised by FEMA/DHS, albeit one government will never approve. Why? Because it’s closer to their own preparations and mimics their own capabilities, and removes you from dependence upon them. That means they cannot control you by being your only source for key survival items.
But the previous material addressed family needs from their perspective. And, there were certain aspects of such a plan which would prove difficult for many families without the help of an outside party. Then we have businesses to consider, who have their own unique concerns as to what happens in dire emergencies. Business owners or responsible managers of many kinds of retail and other business with select kinds of inventories or resources, should be every bit as concerned as a family, and looking for a disaster preparedness plan which specifically protects their valuable business assets, both real property and inventories.
There are several key reasons to consider this a critical concern: One, many disasters are deemed Acts of God and are therefore not included under insurance provisions unless, perhaps, paying extra premiums for specific policy riders such as a flood or tornado insurance. No insurance policy provides protection against acts of war, which includes revolution, military coups and similar political unrest, often even excluding protection against riot losses — regardless of the cause of the riot.
And beyond the worry of insurance protection, FEMA’s plan for your assets in an emergency will very likely include confiscation and take over of your property ‘for the good of the community.’ Similar concerns exist in any Martial Law situation. So if you have such a business, you should worry and wonder if there is not some way you can protect your assets from such total or near-total loss or take over. Never fear, the Professional Paranoid is here to help…
What will happen to gun shops in a FEMA declared emergency?
Partnering with Family Collectives
The prior posts in this series dealt with idea of forming multi-family unit collectives for improved emergency preparedness at the family level, as well as why such preparedness plans and kits should go well beyond minimal FEMA advice and prepare for long-term disasters, not just three day fire/quake/flood protection. This involved numerous considerations and plans in terms of organization and supplies, individual responsibilities and more. But for many such collectives as might be established, some items become difficult to come by or store due to cost or special attributes.
The bottom line is, in a serious emergency situation, looting and general criminal activity become a serious threat to any owner of a business handling inventories of critical resources which are also valuable to long-term disaster kits. Often just as important, many such inventories represent a storage problem for long-term home survival kits. Gun shops especially, and even food or fuel can be difficult to store in quantity suitable for a long-lived disaster. Many more items could be added to such a list, as a given collective of families will have their own unique set of limitations and issues to resolve. As result, even a motorcycle shop or car dealership, auto parts store, tire shop, or tool shop, may find themselves in the same position as a gun shop. In some communities, for example, boats will be a key product in need of protection and in demand as an emergency item. So there are many kinds of businesses who can take advantage of the ideas offered here.
My goal in this series of posts was to attempt to find a solution addressing both these concerns by partnering family collectives with such owners. And, the word owners could in some cases mean ‘managers,’ where owners are corporations or persons who do not themselves manage and/or live near enough to ‘take charge’ for the purpose. Such partnerships are simple: the owner joins or heads a family collective, either one they formed on their own (perhaps made up of employee families), or by joining with someone who approaches them with an acceptable offer.
In some cases, such as gun shop owners or owners of vey large facilities (e.g., super market,), they may wish to partner with multiple collectives. This is because in the event of worst-case long-term disaster scenarios, there may be a need for significant armed resistance against third parties, even to include unconstitutional seizure by Federal forces. By unconstitutional, I mean in the event of an attempt to overthrow the government by the military, or armed insurrection to restore the Republic against some other form of tyranny. We will know that horse when it rides into town; mass arrests or attempts to seize weapons door-to-door will be its hallmarks.
We all remember the LA Riots? Even though the National Guard was deployed, it was up to citizens to protect their own property. Neither soldier nor Police and Fire were of much help. Korean family-owned businesses gave us the model we need to consider following; they armed themselves to the teeth and took to the roofs of their stores and residences and fended off looters. Family units can band together in like fashion, and better yet if also joining with a one or more business owners in some mutually beneficial arrangement.
Gun shop owners, in particular, have a serious need. They become the highest-value target in town, and therefore, need many able-bodied people to bear arms — in sufficient number to become a significant deterrent to assault. This works well for the families involved, as well, providing them with low or no-cost access to weapons needed to protect their families and homes. The trick is to find ways to do it which do not amount to simply giving away inventory. Not a problem, given that provisional contractual agreements can be drawn up in advance.
How can we prevent government confiscation of our business assets in a declared emergency?
Making it work for all concerned
I propose that such partnerships might be best approached with a contractual agreement for mutual protection. The agreement should provision for both the possibility of taking possession of weapons and munitions immediately and only after a serious event transpires. It might provide for trade of ownership of weapons deployed once the crises is over for a minimum guarantee of service to the shop owner providing protection of the business property. Weapons can be deemed as ‘rented’ during the disaster with options to purchase afterwards, perhaps with rental applying to the price, or may be considered as ‘payment’ for protection helps rendered, or some mix, thereof. Such items, pre any event, need not be fully deployed to family possession, allowing for normal inventory turnover so that older inventory is sold off and replaced with new, and families don’t need to worry about storage.
Take a gun shop: Only if the family collective partner wishes to take possession (ownership) of weapons for storage at home up front (the suggested kit calls for one pistol minimum), need any money change hands. Once a serious emergency transpires, the families can be issued the additional firearms from shop inventory, and sign for them. They must keep them safe, and must use them on call or by schedule in protection of the store property. It would only take one person from each family unit at a time, given the quantity of family partnerships participating — to adequately defend the store. They ‘pay for what they use’ in the form of a rental/purchase option to be addressed after the emergency ends, perhaps involving payment terms (perhaps involving very small payments pre disaster). There are any number of creative solutions to make it mutually viable.
I am no lawyer, but in a civil emergency, many laws fall by the wayside as a matter of practicality. A gun permit process is not something you worry about when the government is shut down and lives are at stake. However, a wise shop owner might want to check with a lawyer and get some advice and deal with such concerns up front. There is no reason a single individual from each family collective could not undergo a permit process as part of the contingency preparation. What they do with the weapons in an emergency should at that point no longer matter to the shop owner, with reasonable agreements to avoid illegal uses in place. One might also want to address how to safely store key records in order to insure lists of gun holders are not compromised and lead to confiscations, anyway.
Other kinds of businesses? Consumables such as food from a grocery store which have dates of expiration would be lost, anyway, so any financial arrangement to distribute storables in an emergency with any level of appropriate financial reimbursement or property protection services of participants should, IMO, be eagerly embraced. For most shop owners, it converts a disaster where they face the potential loss of all inventory and significant property damage into a situation that more closely approximates the ultimate ‘sale’ where all inventory goes out the door to happy customers, AND the property is protected.
From the family side, a collective should easily be able to field 6-10 adults to defend as many different business sites simultaneously, while still retaining sufficient adults to protect the home base camp. Therefore, they have access to 6-10 different key survival items they might not otherwise be able to afford or store long term. It is a win-win situation for everyone but looters and would-be confiscators.
Upon event occurrence, family members ‘report for duty’ and are issued weapons, sending the appropriate portion back to the family for home defense and protection from confiscation by FEMA/Military. I propose an organized convoy is the only safe way, as otherwise, armed interlopers might dare to ambush a lone person or single vehicle. I further suggest that, if not already the case by natural instinct, a strict military-like organization and rules for command and engagement be established. Such a model should ideally trickle down to the family units as well, if a long-term event is involved.
Therefore, prior military service, especially in combat or involving combat training, is to be highly prized in any collective or partnership. Where such experience is found in a retired Officer (as opposed to an enlisted rank), so much the better. If there is additionally someone with prior intelligence or forward observer experience, or demolitions or military engineering background, better still. Likewise for any medical corps. or other medical background.
In closing, the business itself should have on hand sufficient stores of foods and other resources (as opined in the prior post) to sustain several months of a ‘stand off’ in defensive posture. A key factor will be the ability to communicate with partnering family units that they may be called in to provide force rotation, deliver emergency supplies, or outright tactical relief against assaulting forces. The prior posts cover communications alternatives in a total outage of all utilities.
How can I protect my business as well as my family in a disaster?
- FEMA Preparing Military Police For Gun Confiscations and Martial Law (eutimes.net)
- The Use of Food As a Weapon Against American Citizens (republicbroadcasting.org)
A sure sign that the government fears a military coup or the military itself is about to attempt one, is a purge. The government will purge those it fears unloyal, and/or the military purges itself of those unwilling to go along. Whoever best purges post haste, just might win. Either way, however, the people tend to loose to an errant government and/or would-be military dictator. It is, after all, how authoritarian Police States are born.
Is Obama conducting a purge of the military?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What causes a military purge to take place?
Reading this post you will learn:
- That history proves purges take place when governments fear their military is about to take over…
- Or when the military prepares for such takeover…
- And such tyranny grows from purges within political circles and the military to involve citizens…
- Everyone is challenged with loyalty oaths, untrue (or otherwise) accusations, tricky questions, or even torture…
- The wrong answer can mean death, prison, or ‘vanishing;’
- Evidence abounds that we have been in a pre-event purge for several years…
- That the purge is nearing the point of reaching open armed conflict;
- That the result of a purge is almost always a Police State, regardless of which side wins
Why is Obama conducting a military purge?
Updated Nov. 14 2013 Changes indicated in RED reflect latest termination and dim view of purge by Russia and China who see it as possible PRELUDE TO WAR.
Updated Dec. 10 2013 Section added and indicated in RED as relating possible ties to Global Research Web site going dark and decade old CIA plot to capture Soviet nuclear warheads.
History on Parade…
History is rife with examples of political purges, both bloody and near bloodless, and unfortunately, both sides can end up playing the game. Sadly, we also see that most bloodless purges end up being bloody at one point or another; they push the other side into reactionary defensive acts. Worse, once one side or the other becomes dominant, the purge is extended from the national politik (government officials and military) to local politik (regional-to-city leadership and law enforcement), and from there, down to every day citizens; any such purge portends a intended shift in power to an actual or de facto authoritarian dictatorship.
The classic example would be found in the Russian Communist Revolution, which actually evolved as successive political leaders reshaped ‘the revolution’ to suit their own visions. But you find the same things generally true in the French Revolution, Mao’s Red China, or even in the American Civil War, where the Union employed the Ironclad Oath, and various Generals (see last paragraph in the link under ‘1862’) exercised internal ‘loyalty and fitness’ purges, ad hoc. One could easily be shot for a careless comment or answer.
Why would Obama conduct a purge?
A purge HERE?
There has, in fact, already been an attempted military coup in the United States. We are, or were, fortunate at the time, that the attempt failed before the purge which would have been required could get started. While most Sheeple have never heard of it because it was contained and not made public, most of the rest of us are aware of the Business Plot of 1932 which attempted to stage a fascist takeover in America by means of a military coup. Some of the biggest Industrialists of the day were involved, names which still today are iconic labels on everyday products, like Singer, and Dupont.
But thanks to one-tough and loyal Marine who tricked his would-be conspiratorial recruiters, the affair backfired. That’s a big ‘Hua!’ for Major General Smedley Butler. But a purge did follow, one which sought to eliminate the threat from the cadre of business leaders and their friends involved, including other military — along with an attempt to cover up the entire matter in order to maintain confidence in the nation’s internal and external affairs.
One thing remains clear: the general purge model is especially of concern when one is dealing with a bloody purge, because it does work its way down to citizens, Sheeple or otherwise. Especially otherwise. And so, I strongly urge that we must take a very close look at our current troubled situation and most recent history with respect to Presidents, politics, economy, international affairs, and the military. So, what’s going on, here in America, right NOW? Well, the answer to that won’t be found in mainstream media unless, perhaps, you are talking about press from abroad.
Now comes a new worry: The European Union Times is reporting the both the Russians and Chinese consider Obama an unstable, power-hungry madman and, with the latest firing (added below with RED) , have themselves taken unprecedented military responses towards possible military conflict with the U.S. and any of its Allies. Seemingly related, are two other news stories in one at the Web site regarding Chinese troops (and a spy ship) in Hawaii, and a simultaneous FEMA ‘simulation’ of cyber attack (Fire Sale) on US power and communications networks, itself timed to coincide with the largest Cannibalistic Corona Mass Ejection the World has ever recorded striking the earth and disrupting our magnetic field in a way which threatens disruptions similar to said cyber attacks . A grain of salt is due, here, as the EUT is, well… extremist in nature. Extreme ‘what’ remains in question… a bit like a super-market tabloid without aliens and pictures of personalities doing naughty things or being too fat on the beach.
Update Dec 10, in support of prior update…
Is the U.S. military conducting an internal purge?
Proof of a purge?
Many observers think its happening, including people who are far from being conspiracy theorists; media types, military professionals, and more. In simple terms, consider the following statistics and facts, none of which are in dispute, though almost all of which are veiled from Sheeple’s eyes by media and government. Mainstream employs careful wording and skips filling in the blanks with useful detail. But others mince no words.
And speaking of words, we must realize that when a bloodless purge is underway, there must simultaneously be ‘disinformation’ to cover up the fact. This means that excuses will be used to veil the truth, and this will be quietly accepted at first by both sides, often because, at least for the individuals involved, some form of blackmail or other threat is in place to insure their silent acceptance. For some, it may be some form of National Security agreement. For others, it may be a sexual indiscretion, or a criminal or financial matter which dictates cooperation lest it be made public.
So take what is often offered in ‘face value’ with a grain of salt. It is the fuller picture which is painted in the broader strokes which overpower individual words, or lack of words… and bear in mind that when there is a purge, one must also look at resignations as part of the ‘flow’ of things — especially if related to protests or potentially motivated as a self-defense move. Doubly so if in numbers.
Why is the U.S. Military conducting a purge?
Is Obama conducting a purge?
Many think so, and the preponderance of evidence cited would seem to support the notion. It is, after all, what prompted my own review (more detailed than theirs, naturally — that’s always my goal, at least). Consider these reviews, and the fact that many sources claim Obama’s differences with military leadership have to do with his asking them if they were willing to shoot Americans, presumably in a gun-grabbing operation of some kind:
Freedom Connector, Nov 16, 2012: What’s Behind Obama’s Military Purge? — by Bob Livingston, an ultra-conservative newsletter writer;
The Independent Journal Review, on June 28, 2013: Obama’s Purge; Military Officers Replaced Under the Commander-in-Chief — a situational analysis by Kyle Becker;
The Western Center for Journalism: Obama Escalates Military Purge — by the Editor
World Net Daily, The Examiner, The Guardian, and many others citing The Blaze, Oct. 23, 2013: Blaze Sources: Obama Purging Military Commanders — Sara Carter citing actual fired military commanders’ viewpoints.
There are many more, but you get the idea. From the outside, looking at the observable clues leaking out from the inside, and sometimes even from the mouths of those involved, the impression is a Presidential purge is under way. More: since the above, Sorento’s desire to attack Syria met with such resistance in military circles as to warrant an article (translated from an unstated German source), well worth a read: Historical Disgrace: The U.S. Military Mutiny Forced Obama to Retreat. Yet as already mentioned, other stories relate that the purge is because the Military is refusing to go along with plans to grab guns and shoot Americans who refuse to comply.
Why does a military purge predict a shift towards authoritarian dictatorship?
Flip side: is the military is purging itself of White Hats?
No one else on the Web seems to think so, but I’m wondering why not? When the stability of a country comes into question, forces within the military tend to start wondering if they need not do something drastic to change things, and eventually, a strongman General is able to recruit others of like mind to work out ‘contingencies.’ One of the first steps in preparing for possible enactment of such plans (a coup) is to evaluate the remaining Officer Corps, and get rid of loyalists.
Or, it may be a group of powerful business leaders who make the call, and who recruit members of the military for their cause, resulting in the same process, a ‘la The Business Plot of 1932, already mentioned.
You know something sinister and deeply troubling is going on when Veterans are being told they can’t fly the American Flag on public property, Officers, even Chaplains, are threatened with court marshal for having a Bible on their office desk or speaking about religion with others who are not already in the same faith, and telling them to resign if they have a problem with the policy. What? Oh, I forgot: the military and military policy is dominated, according to authors like Alex Constantine, by Satanists.
In point of fact, as Alex and others have pointed out, self-proclaimed Satanist General Michael Aquino, was a chief architect of the Revolution in Military Affairs, the policy which defines the next major new war type the military will face is ‘A People’s War,’ where the enemy is disgruntled patriots, Constitutionalists, and the poor and disenfranchised. Well, now, that’s just about everybody in the U.S. but the ten percenters at the top, and dumb Sheeple, is it not?
Now, while the first section paints a picture of a Presidential purge, I must remind you that both sides of a major power rift often purge, and that outwardly, the signs will typically tend to look the same. So now, let’s take a closer look at those purged and their circumstances, to see what we might decide for ourselves. After all, other Web sources speculate the reason for Obama’s purge is that he fears a military coup, a notion which alledgedly originates directly from the Russian Military and the Kremlin.
However, that story would seem to be related to another alleged Kremlin and GRU (a KGB-like Russian Spy group similar to CIA) claiming Obama had ordered the detonation of a nuclear bomb in or near Charleston as a false flag event and the military refused, prompting the firing of so many nuclear commanders. I find this fascinating, because in my book Fatal Rebirth, I predicted Charleston would be the target of a nuclear false flag attack AFTER the also predicted (in 1999) downing of the WTC by passenger jets and resulting in a series of Middle East oil wars.
Snopes.com, whom I do not entirely trust as a legitimate ‘debunker,’ does attempt to debunk the above story by attributing its true source to Sorcha Faal, a known professional disinformationalist who works for, among other people, DHS. So then, why would DHS promote this particular disinfo? That makes no more sense than the outlandish conspiracy claimed by the story. But if baseless, and not Russian sourced, why has RT (Russian Television in English) News not ALSO debunked it, and instead reported on it as factual?
So understanding if there is a purge, and who is undertaking it, and why, is going to be difficult. Really, you can’t tell your players (or their position on the team/role in the game) without a roster. So here it is, so you can decide for yourself…
What are the signs of a military or political purge?
Point Comparisons: Roster of 266 Vanquished Officers and Key Staff under Obama
This is an updated and more accurate compilation the found in lists elsewhere which cite 197 or fewer. More than 50 being offered in rich detail, here. These numbers represent a massive bloodletting not seen under any prior President in American history. There are so many you might be tempted not to read them, but in the reading, at least of their name and command position, you find some interesting, if not scary things, not to mention patterns. To be sure, some who were let go may have indeed been let go for non-purge and quite legitimate reasons, but the large numbers of higher rank Officers and the nature of the clumps of specialities/assignments/duties, especially, amplify reason for concern that more is afoot than ‘bad conduct’…
Fired Nov. 3rd, Colonel Eric Tilley, Commander of Japan’s largest U.S. base in Japan for ‘allegations of unstated misconduct.’
First Lieutenant Ehren Watada was the first Officer to refuse deployment to Iraq as an illegal war, was eventually allowed to resign. Now, if his view was unjustified in the eyes of military, why was there no court marshall? If justified, why did we go to war? It implies disparate viewpoints in military ranks, and between military leadership and the President;
Major Stefan F. Cook, US Army Reserve, refused to deploy because he did not believe Barry Sorento was a legally elected President, joining with two other officers according to Wikipedia (no Web source names them, but they are described as a retired Army Major General and Active Reserve USAF Lieutenant) in a law suit (Cook vs. Good – scan down). They did not win their suite, but neither did they have to serve, again meaning disparate viewpoints. Touche’;
Captain Connie Rhodes, US Army Physician filed a similar suit (just beneath prior link, same page);
Predator Drone Pilot Brandon Bryant resigns USAF over immorality of drone attacks on noncombatants, making five people who refused to serve and suffered no court marshall;
Colonel James H. Johnson III, Commander 173rd Airborn, fired and convicted of bigamy and fraud in expense accounting, apparently jumping out of the airplane and into the frying pan;
General Joseph Carter, Commander Camp Edwards and Adjutant General of the Massachusetts National Guard resigned even though a months investigation failed to produce evidence of a rape allegation;
Brig. General Jeffery A Sinclair, former Dep. Commander 82nd Airborn in Afghanistan, fired and facing possible Grand Jury review for criminal sexual indiscretions — sounding a bit like the CIA entrapment of Wikileaks mastermind, Julian Assange;
Army Major General Peter Fuller, Commander in Afghanistan (of unstated forces — which to me implies intelligence hanky-panky), let go in 2011;
Marine Major General C. M. M. Gurganus, Commander Regional Command Southwest and 1st Marine Expeditianary Force (also Afghanistan) was let go in 2013;
Marine Major General Gregg A. Sturdevant, Commander Aviation Wing at Camp Bastion, Afghanistan, and Director of Strategic Planning and Policy for US. Pacific Command, let go in 2013;
General David D. McKiernen, Commander of the Afghanistan Theater was let go at Obama’s orders after four months of arrival, for saying the campaign was less noble than was Iraq. That was 2009, making him the first four-star General released by a Commander-in-Chief since MacArthur by Truman. In 2010, Obama fired…
General Stanley McChyrstal, Commander of NATO International Security Assistance Force (IASF), Afghanistan, a matter linked to the death of reporter Michael Hastings. He was replaced by another soon-enough-to-be-fired General Petraeus, below. Seems like Obama liked no one involved in the Middle East, does it not?;
General David H. Petraeus, also left the Army as NATO IASF Commander as to be appointed by Obama as Director of Intelligence, CIA. He then resigned CIA over charges of an extramarital love triangle, but at the time there was the controversy about the CIA’s role in the handling of Benghazi intelligence and no-go rescue aftermath. And, stepping back once more, the man who replaced him at ISAF when he stepped up to CIA was…
Former General Michael T. Hayden, in like manner yet again, quit the USAF to be appointed by Bush II to be Director of NSA, and then, also like Petraeus, was fired over extra-marital sexual conduct (officially), and unofficially, over internal disagreements with Obama on intelligence policy and validity of evidence regarding alleged Syrian nerve gas attacks (shades of Bush and Weapons of Mass Destruction in Iraq);
Marine General John R. Allen, Commander of NATO International Security Assistance Force, Afghanistan, was investigated and removed for ‘inappropriate communications regarding Bengahzi’ (he countermanded White House orders not to attempt rescue of the besieged Embassy). The investigation continues without fruit, be he was also seemingly an injured party in the above Petraeus love triangle. You couldn’t make this stuff up as screenwriter of a Kardashian’s in Uniform special. Now, regarding Bengahzi…
General Carter Ham, Commander Africommand (counter terror operations) also relieved of command and arrested for attempting rescue despite orders from White House to stand down… and before him…
General William ‘Kip’ Ward, 1st Commander of the Africommand fired for ‘financial irregularities’ in expense accounts;
Rear Admiral Charles M. Gaouette, Commander of the Stennis Aircraft Carrier Strike Group relieved of command in the middle of Middle East deployment for unstated ‘inappropriate leadership judgement’ also thought Benghazi related. But not just him…
Capt. Owen Hornors, Commanding Officer of the Carrier Enterprise, no less, was let go for ‘making and showing to the crew raunchy cartoons.’ No patterns here, folks — move along, move along;
Rear Admiral Ron Horton, Commander of Western Pacific Logistics Group was also fired for knowing about and failing to put a stop to the Enterprise cartoon shows;
Brigadier General Bryon Roberts, Commander of Ft. Jackson (training facility) resigned over charges of an ‘altercation’ with a woman. He commanded the training of the Iraqi Security Forces slated to replace US Military, and served directly under the Joint Chiefs with distinction;
Vice Admiral Tim Guardina, U.S. Central Command, drops two ranks to Rear Admiral, and looses his 2nd in Command position in charge of nuclear weapons for allegedly using counterfeit casino chips (felony fraud). Now that would be easy to set up as a frame up… which begs the question, why no criminal charges or court marshall, if true — or a resignation? It’s called ‘leverage’ and keeping a close eye on a person in question by keeping them close at hand;
Four-Star General James Mattis, Commander of US Central Command, being fired for ‘Mad Dog’ warnings to the Obama adminstration on the dangers of proposed Middle East military actions in Syria. Very interesting if, as stated in the next item link, he was the one responsible for that firing, and perhaps more so, if it was his replacement who arranged it (at this point, I’ve not been able to isolate which might be closer to being true, if either);
USAF Major General Michael Carey, Commander 20th Air Force (that’s 3 Wings of ICBMs/450 warheads at three AF Bases) was let go in 2013, making the third man in charge of nuclear forces to be let go — unprecedented;
Army Major General Ralph Baker, Commander Joint Task Force Horn of Africa in Djibouti, Africa, let go in 2013 — anti piracy and counter terrorism support unit, also likely to know what really happened in ZeroDark Thirty;
Lt. Col. Matthew Dooley, 20 yr Vet Army Instructor for National Defense University and Joint Forces Staff College allegedly fired at Obama’s request for teaching a previously approved course called Perspectives of Islam and Islamic Radicalism (for which he had also previously been commended) because it was deemed ‘offensive’ to Muslim organizations who somehow managed to learn about it (but had not experienced it). On the other hand, the Army Vice Chairman of the Joint Chiefs, now head of US Central Command himself described it as “against our values,” and so, this appears more likely a military purge victim than an Obama victim, done in a way that blames Obama publicly. A nice two-edged blade being twisted;
Commodore of Logistics, Lt. Col. Allen B. West, Battalion Commander, 4th Infantry, 20 year vet forced to retire pensionless for coercing terror attack information from a prisoner in Afghanistan by discharging his weapon to get his attention. Now that’s odd, because Logistics has nothing to do with prisoners. However, Logistics is THE MOST KEY tactical element of ANY military action;
Marine Colonel Daren Margolin, Commander of Quantico’s Security Batallion — FBI’s and USMC training facilities also used in joint LEA/Military trainings even when disallowed by Posse Comitatus;
Marine Colonel James Christmas, Commander 22nd Marine Expiditionary Unit and Special-Purpose Marine Air-Ground Task Force Crisis Response Unit, let go in 2013;
In 2012, Six USAF Training Officers from Lackland AFB base were fired after being charged with rape and adultery;
In 2011, 25 Command Naval Officers below the rank of Admiral were let go (not already mentioned), including captains of nuclear missile warships and submarines;
Recall the TV show Last Resort, where an American sub commander staves off an unjust false-flag nuclear first-strike against Pakistan as part of a military-coup deception… by threatening D.C. with attack, instead?;
Also vanished in 2011, 12 senior enlisted Navel personnel in charge of key programs, facilities, and projects;
In 2012, an additional 28 Command Naval Officers below the rank of Admiral were let go, again including several captains of nuclear missile warships and submarines.
Also vanished in 2012; 15 senior enlisted Navel personnel in charge of key programs, facilities, and projects;
Meanwhile, still in 2012, 157 Career USAF Officers below the rank of General were forced to quit. Moreover, and potentially related, the USAF has resorted to offering nearly a quarter-million dollar bonus to fighter pilots to keep them from resigning after meeting their minimum obligation. Yet the 157 were ‘let go due to budget constraints’ according to the official story?
All the while this has been going on, and Obama’s proposed actions in Syria have not been sitting well with anyone but Sheeple on the citizen side, it turns out the military was not too crazy about the idea, either. Not just General Mattis and other officers already mentioned, but rank and file enlisted: a spontaneously created ‘photo-bomb’ campaign flooded the White House with individual refusals to serve in any military action ‘helping Al Qaeda’ fight the Syrian Christian government… appropriately went viral on facebook.
Does Obama fear a military coup?
Another kind of Roster: 92,600 Enlisted are being disbanded
Bloomberg is reporting, with the official line being budget cuts, that nearly 100,000 soldiers, sailors, and Marines are being let go starting the first of this month (several weeks ago, Oct.). The troubling element is that the bulk of these (67,000) are US Army. If gun grabbing operations took place, the brunt of such action would involve the Army. That fact, and the fact that the military has been using a Shoot Americans Questionnaire which would help them purge themselves of those unwilling to do so — if their actual plan, makes me wonder who is being forced out, and why?
And here’s another reason to wonder: If the Sorcha Faal story was done for DHS, and keeping in mind that DHS ordered enough ammo to kill everyone in North America several times over, the ONLY possible motive I can deduce for fostering Faalishness is to fuel a counter conspiracy to the real conspiracy. That is, if they were planning to shoot Americans over gun grabbing efforts, then why not create a counter story saying the Military was revolting because the President was going to grab guns and order them to shoot Americans to do it? It would be another two-edged sword blaming Obama. Watch the left hand so you don’t see what the right hand is doing.
I’m just saying. I really have no way of knowing any more than do you. But I do know how disinformation works, and that is definitely one way it is used. It’s how it got its name.
What does a purge of the U.S. Military mean?
The broad view: being caught in the middle
The stage has already been set for our consideration, and depending on who is doing the looking, lots of people are starting to see that a purge is taking place, almost all eyes focusing on the US Military and/or the Obama administration. Point of view dictates how they analyze the whys and wherefores, but they all agree that purge is the word.
Bloodless, thus far to be sure… but to remind… a bloodless purge tends to force the other side’s hand and can easily escalate to a bloody one, if not also outright armed conflagration. At some point, someone elects to do something to end the gutting of their power base, and that something is not usually gentle in nature.
That DHS has been buying up weapons, munitions, coffins, medicines, and other key items in quantities suitable for a twenty-five year war… and that FEMA has launched a massive ‘disaster’ preparedness advertising campaign, simply adds fuel to whatever may be the real cause of the mysterious smoke under consideration.
If you find this all a bit troubling, you may wish to do some more reading. One place I can suggest you start, is my own book set, Fatal Rebirth, which written in 1999, predicted the entire pickle we now see ourselves in, from the bringing down of the WTC by passenger jets to financial debacles to the purge, and much more.
A free ebook copy of Vol I can be obtained by email request to pppbooks at Comcast dot net. Given the violence purges tend to evoke, you may also wish to read my post (series) on emergency/disaster plans and resource kits to cover ANY threat, natural or man made. Who else but the Professional Paranoid would dare bribe you with a free book just to read a blog post? Email me!
Who is purging the military and why?
- Obama’s Military Purge (canadafreepress.com)
- U.S. Military Could Depose Obama, So He’s Destroying It (calvinistview.com)
- Obama Firing of Military Reminiscent of Stalin’s Purge (vaticproject.blogspot.com)
When the CDC starts talking about zombie attacks, DHS buys more ammunition than God and calls out all Federal Agencies to prepare for (something) at 100% strength with two weeks notice… while a Zombie blockbuster movie scares our pants off… there might just be something to worry about.
When do Zombies act on behalf of National Security?
by H. Michael Sweeney
copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Federal zombies may be in our future
OK, this might be tongue in cheek. MIGHT BE.
But it is completely factual (scary movie music rises). I just saw a couple of video blogs (streaming Web radio) where one of my kindred spirits (translation: conspiracy theorist, or on a good day, as we prefer it, investigative reporter) was interviewing someone claiming to be in the know: DHS, FBI, FEMA, and just about every other agency, military as well, have been ordered to bring all manpower, reserves, and resources, to 100% capacity by July 3, and to stand by for further instructions.
I’m not comforted by the fact that ALL the search engines can NO LONGER FIND THIS WARNING no matter what I type in (it would have helped if some of the words were not in use in gazillions of other vids, too). Thing is, two days ago, it was EASY to find using the same words. Who has the power to do that? No matter. I’m on the job. A few ones changed to zeros in government’s Internet won’t stop me.Note: This kind of censorship and information manipulation is one reason I formed nnn.osp.org to create a 100% citizen-owned-and-operated wireless Internet alternative where there is no ISP (no monthly bill), no government or corporate censorship, spying, or control: YOU are the Web!
In trying to solve that problem, I encountered something which revealed even more useful information than I was searching for. The CDC is apparently involved, too. We are talking about a terror drill involving a ‘fake’ outbreak of (something awful). Wince. Gee. What could that be? Well, I got to thinking. Recall the CDC warning about what to do if a zombie attack broke out?
Well, they claimed that was tongue in cheek, too. But I’m starting to wonder. Have you seen World War Z? Nothing seems far fetched after that! I mean… first CDC puts out the defense guide… then DHS buys enough ammunition to kill all the extras in WWZ (and every citizen in North America, with order quantities in Satanic numbers, no less)… not to mention enough coffins to take care of the half-eaten bodies… and now DHS, FEMA, FBI, the National Guard, (and CDC) are manning up for something very big.
And even if not Zombies… let us not forget that some guy named Kokesh (not related to David Koresh) is planning a ‘Million-man’ armed march on Washington, D. C. on July 4th. I mean… Damn! I don’t know what it means, but what I’ve more recently learned does not make me feel any better about, it all…
Why is terror drill set to coincide with Scout Jamboree?
Terror Drill Set for Scouting Jamboree
The orders for these agencies are to be at 100% by July 3rd, and then to stand by. Turns out, unless a cover story for a general Martial Law (you don’t suppose Kokesh is going to end up in a shootout with Feds, do you?) move to seize power by the New World Order, that there is to be a terror drill in Yellowstone during the Scout National Jamboree (July 15-24). But wait one minute; is it not true that at almost EVERY major terror event blamed on some turban wrapped, kidney machine toting, Koran spouting man with a beard… that there was simultaneously a terror drill of the same exact sort taking place at the same time?
Is that not the HALLMARK of a false flag operation? You create an exercise or drill on the same date in the same community for the same kinds of details (e.g., type of attack, type of target), and then, if the people really responsible (no turban, kidney machine, or Holy book) happen to get caught before they can pull it off, you say ‘It’s OK, they are with us, and everything is coolness.’ Where have we seen that used before?
A few places. The Sarin gas attacks in Japan. Sept. 11. The London Subway bombing. Bombing in Madrid. The Norway mass shooting. Even Aurora and Sandy Hook. Retired Army Intelligence Officer, Captain Eric May has said, “The easiest way to carry out a false flag attack is by setting up a military exercise that simulates the very attack you want to carry out.”
Are Zombies real after all?
Zombies on parade
Again, ‘tongue in cheek’ can only go so far to making one comfortable about the facts. Also while searching for the missing radio show links, I instead found some disturbing video — tons of it, in fact, which claim to evidence real Zombie attacks, including one faked ‘secret FBI briefing.’ But only one of these bothers me enough to deserve sharing, as it is a montage of real news stories that are quite shocking and, collectively, imply there are real people out there who are certainly acting like Zombies, and who are apparently quite hard to kill, too.
But that’s not the only disturbing thing about the video.
The second is found at the end of the long-winded (classified) reading of a (classified) Bill on the Senate Floor that (classified) seems to regard some kind of (classified) serious catastrophe, and what government is going to do about (classified.) At the very end, as if a causal afterthought of NO IMPORTANCE, the reader quotes, “and draft a NEW BILL OF RIGHTS.”
E X C U S E ME?
A new Bill of Rights? What’s wrong with the one we have such that once this (classified) happens, it is no longer useful? To me, the ONLY scenario where that makes sense is if the country has become an official Police State under perpetual Martial Law, the result of a military (classified.) Well, let me tell you if I see even a hint of that taking place, I’m going to (classified) and (classified) and all of (classified) had better double their (classified). Even if they claim it was the Onion Congress.
Well, that’s all I can think of to say about something that is so far fetched and based on ‘less than mainstream’ resources. So I’ll simply leave you with the original video which started the whole thing off. I did find it. But I warn you, it is not the sort of thing I would normally care very much about paying attention to now days, given the veritable flood of such ‘sky is falling’ reports on YouTube.
However, I also remind you, in my book set Fatal Rebirth, and resulting screen play published on the Internet in 1999, that the sky was going to fall in New York City, raining passenger jets upon the World Trade Center, and resulting in Middle East Wars. Some of us Chicken Little’s base our warnings on a bit more than conjecture. You can get a free ebook copy of Volume One, and see what else I’ve correctly predicted, and what things I’ve warned of which have yet to transpire.
It also behooves me to add, here, that as a specialist in privacy/security who helps targeted individuals and deals regularly with Political Control Technology… that I should mention that some estimates are that the government has created up to two million ‘sleeper’ agents using Manchurian Candidate mind control methodology. If true, we are talking about programmable people who can, with a simple text message or other signal, be launched off on almost any kind of mission with no recourse or understanding. Blindly obedient.
Such people can be made to believe any unreal circumstance, or believe themselves to be anything or anyone, and are often capable of exhibiting super-human traits (such as seeming to be bullet resistant). I’d hate to think about what would happen if a flood of such persons were unleashed thinking themselves Zombies. They soon enough would be, for all practical purposes. I’d not want to be in their warpath. World War Z, indeed.
- False Flag Biological Attack Expected This Summer? (pakalertpress.com)
- National Scout Jamboree 2013 False Flag Insider Warning (thetruthseeker.co.uk)
- NEVADA GOVERNOR CANDIDATE Warns BOY SCOUT JAMBOREE MAY BE NEXT FALSE FLAG (secretsofthefed.com)
- May 21st Is Judgment Day So Begins the Zombie Apocalypse (wholesalecostumeclub.com)
- The Government’s Knowledge of the Zombie Apocalypse (costumediscounters.com)
- False Flag Insider Warning – National Scout Jamboree 2013 (oneworldchronicle.com)
- Mass Casualty Terror Drill Planned for July 2013 During Boy Scout Jamboree (2012thebigpicture.wordpress.com)
Though a controlled media is suppressing the story, 40 tons of GMO crops were torched, prompting an FBI investigation. We The People do NOT WANT GMO, and if the Monsanto Congress does not watch their step, arson will become outright violence, and from there, even lead to revolution.
Why were sugar beets set on fire in Oregon?
by H. Michael Sweeney
Who is Oregonians for Food and Shelter?
Update June 22, 2013: Additional research reveals some interesting things about the who and why behind the $10K reward offered for the beet burners… at document end.
Are Monsanto and Syngenta GMO criminals?
What you will learn reading this post…
- People are taking the law into their own hands to kill GMO production[
- There is an apparent media blackout, even on the Web;
- The government is ramping up for what may end up being another WACO/Ruby Ridge standoff;
- We may be looking at the Boston Tea Party of 2012 just before the next American Revolution.
Who is the earth liberation front?
Rebirth of the early Earth Liberation Front?
I Can’t Believe I’m the FIRST and ONLY one to report this on the Web.
NOT ONE MEDIA OUTLET outside of local circles has dared to mention it, perhaps because government fears that if the public learns that other people are getting fighting mad (literally), they might join in, and become an actual revolution. It was only reported locally live on KXL Radio and echoed by the Oregonian, where the ONLY Web mention exists, hard to find because the headline wording is carefully avoids the most likely keywords for a search — took me rather a while to find it. Here’s the scoop — PASS IT ON!
40 Tons of GMO Sugar Beets were set ablaze in Eastern Oregon, yesterday. FORTY TONS — the entire acreage of two full fields of crops IN THE GROUND were set ablaze over a THREE NIGHT PERIOD OF TIME. That means ARSON. And I have to say I am cheering! The only way could feel better about it is if I had dared to do it myself — which to be clear, I would not: I don’t look good in prison orange, and would be too worried about possible loss of life if things went terribly wrong.
Evidence is that 6,500 plants were destroyed BY HAND, ONE PLANT AT A TIME. That, in turn, implies A LOT OF PEOPLE were involved: would you want to stick around once a fire was going and wait to be discovered? No, someone (many someones) probably wanted to move as quickly as possible. WE ARE TALKING ABOUT A MOVEMENT, a kind of ORGANIZED REVOLT — and this is exactly the kind of retribution I’ve warned was coming; when lawmakers and corporations refuse to honor the Constitution and instead engage in ‘legalized’ criminal acts such as enabled by the ‘Monsanto Protection Act.’
This is all shades of… well, the BOSTON TEA PARTY. Instead of throwing tea into the harbor to protest taxes, someone was throwing flames onto crops in the ground to protest New World Order shenanigans. We are a long ways from Boston, but more recently we have the Earth Liberation Front, a group which also had its roots in Oregon (I love my State and our people; we have core beliefs and fight for them). The ELF, in 2000, burned the offices of a GMO research project at the University of Michigan, a project funded by the Federal government and Monsanto at the time.
The ELF, or ‘Elves’ as they are sometimes called, is an ad-hoc group with its actual origins in the U.K. But forest mismanagement caused splinter cells to be established in Oregon, and subsequently, Michigan and elsewhere as new corporate wrongdoings became evident. Like the IRA, they have an official, public side, one not associated with criminal adventure, and instead focused on educating the public on the issues, such as the Gulf oil spill. They are a kind of militant Green Peace, perhaps.
But ELF cells normally come forward immediately to claim responsibility, because to them, its all about publicity to educate the public. Since there has been no statement, I’m deducing it is simply Oregon Farmers who have said, ‘Enough!’ Another clue that may be the case is that this comes on the heels (two weeks) of Japan’s rejection of the entire Oregon Wheat crop for the year (a tremendous financial blow because over 80% of Oregon Wheat is exported) because ONE report said ONE field was contaminated with at least ONE GMO plant.
The rightful fear is, because of pollination processes, once you introduce a GMO crop of a given variety ANYWHERE, the wind and insects will spread its genetic contamination to non GMO fields, and thereby ruin the ENTIRE INDUSTRY for a region. In fact, Oregon farmers have tendered a multi-billion dollar class action law suite against Monsanto, joining a long list of states doing so. Monsanto has experimented with GMO crops before they were approved in 16 states. They were supposedly all destroyed, but state after state is finding out the hard way, that Pandora’s box has been deliberately left open.
But while other governments in Europe and elsewhere are passing laws to ban GMO crops, and burning entire crops themselves, in America, our government is passing laws protecting Monsanto from legal repercussions, and therefore, it seems, farmers are forced to burn the crops, themselves. This means that where in other countries, citizens are being protected from corporate crimes, in America, citizens are forced to become ‘terrorists’ to survive. That’s how blatantly corrupt our corporate police state has become, I’m afraid.
Can GMO spark an armed revolution?
First Blow For the Revolution?
In this case, both fields belonged to the same Corporate Agricultural giant known for embracing GMO, though trying to do so quietly, another reason perhaps big media has kept the story from reaching the Internet. We are talking about Syngenta. Nowhere on their US Web site will you find mention of GMO, but that is exactly what the company is about. They have even lied publicly in writing on this issue with a public declaration. Yet their very corporate name shouts GMO.
But the FBI, and local media knows better (and now, you)… because apparently someone from the Syngenta operated farms mentioned the fact as a possible motive for the arson. This is a serious matter in many respects. It throws down the gauntlet and says, WE ARE MAD AS HELL AND ARE NOT GOING TO LET YOU GET AWAY WITH THIS BULLSHIT ANYMORE! But it also raises the stakes and put lives and property at risk, and if it goes wrong, could end up sparking an armed revolution.
Imagine the likely scenario: the FBI identifies a particular non GMO farmer as being participant and puts together a 100 man assault team to surround their homestead, land they’ve been farming for generations. What do you suppose would happen if they stood their ground? You would have another WACO standoff, another Ruby Ridge. Do you suppose that the other several dozen participants in the crop burning would stand by and let them pick them all off like that, one by one? I doubt it.
They would muster every rifle their families could carry, and call in farmers from adjacent counties, and likely be joined by some number of citizens from the local communities, and surround the FBI and other local authorities. They might even be joined by local Sheriffs, if not out of sympathetic understanding and general GMO angst, then in hopes of defusing the situation. I’m telling you, this can easily get out of hand.
And in a way, I’m hoping it does. Because I think WE NEED A DEFINITIVE EVENT to send a CLEAR MESSAGE and draw a line in the sand: NOT ONE INCH MORE — BACK OFF! It would rally the informed to action, stir the Sheeple to understanding, and FORCE THEM to take a side, lest they end up in a possible cross fire if shooting breaks out everywhere GMO crops and corporate properties exist, and their executives live.
Even though it could easily spark a full-scale revolution, I’m still for it. That threat is not lightweight, either — it is incredibly easy to start and carry out a successful revolution. I’d be tickled pink to live in America, once more, a country based on a social contract called the Constitution and Bill of Rights, where government was BY THE PEOPLE, FOR THE PEOPLE, of the people, and not a fascist police state in the making BY CORPORATIONS, FOR THE NEW WORLD ORDER.
GMO? Burn, baby, burn…
Mongressanto? You may just be next.
Who are Oregonians for Food and Shelter?
Update: The Who and Why of the $10,000 Reward
‘Oregonians’ for ‘Food and Shelter’ sounds like a charity that provides food and shelter, but that’s not right. Their Web site describes themselves in terms which, after thoughtful consideration, would leave you believing them a non profit NGO, a special interest group (SIG) of professionals seeking to educate their peers in the latest timber and agriculture technologies. Closer to the truth, is that they are a Political Action PAC, putting out their own Voter’s Guide, and involving themselves in political matters impacting timber and farming.
Their members are a who’s who of AG and Timber, but with a specific bent toward biotech… specific biotech. Their Boards and Chairs are well peppered with people from Monsanto, Syngenta, and other firms with a vested interest in GMO, and firms they do business with. In fact, there are even two firms represented who have had consensual dealings with Central Intelligence Agency fronts. One of these was harmless and related to fire-fighting, but the other (Portland General Electric) was tied to much darker matters, though I’m sure they were not quite aware of such details. But then, those same folks also went to bed with ENRON (also a CIA operation), didn’t they?
The OFS founder is one Terry L. Witt, who cites himself as a professional Manager of Non Profit Groups, as though you should go see him if you have one in need of management. Really? The Web site was founded in 1999. Within a few months, Terry was writing in support of Monsanto’s patent infringement suit against a farmer over GMO crop migration (contamination) such as faced by Oregon Wheat growers. It would not be the first time he would play hatchet man for GMO, additionally using op-ed in the Oregonian to disinform on behalf of (again) Monsanto.
Indeed, if you look at the one and only truly informational page at the Web site (despite the fact they list three topics to choose from – the other two have no links provided), the topic is… you guessed it; pro GMO. So what is the real agenda, again? But perhaps we should overlook this narrow view, because they do point out their Web site is still under construction. What?
Established in 1999, and still under construction? Could it be because the Web designer is (whois information) Troy, Terry’s son, operating out of their $700,000 home in Tigard? Hmmm. Troy has his own business (he is a photographer and ‘lead designer’ at a ‘design studio’), and his Web site is even more under construction: it consists ONLY of a logo (ergo, my use of quotes). There is not even a statement on being under construction since created in 2005. “Focused Marketing, Messaging, and Design,” the logo claims.
This could be the trait of (choose one):a) someone not very good at what they do; b) a CIA front; c) a corporate front for money laundering (e.g., payments from Monsanto); d) a front or over billing a client (e.g., Monsanto); e) a clever ploy to distract conspiracy theorists and waste blog reader’s time; f) all of the above.
I’m sorry, but I come away with the distance impression OFS is nothing but a surrogate for GMO interests, and thinly veneered, at that.
That’s the WHO and the WHY of the $10K reward.
Frankly, given these facts, I’d rather someone offer a $100K reward if they would all simply go away.
- Monsanto Video Revolt: Global anti-GMO online rally launches – RT News (2012indyinfo.com)
- Monsanto Killing U.S. Agriculture (personalliberty.com)
- Monsanto Declares Defeat In European Market (fastcoexist.com)
- Belizean Activists: Illegal Planting of GMOs an Act of Biopiracy (foodfreedomgroup.com)
For nearly a decade I’ve been trying to get media and the public to examine some simple proofs of a conspiracy we call Flight 800 Friendly Fire; the downing of a jumbo jet killing 230 souls with a Navy missile fired in a war game exercise gone wrong. They only wanted to call me ‘just another conspiracy theorist.’
NOT ANY MORE.
Was flight 800 shot down by a navy missile?
by H. Michael Sweeney
NTSB admits Flight 800 shot down
Seven years is a long time in Sheeple years (1 year in Sheeple years = 40 years of apathetic stupidity) and most Sheeple don’t even remember what Flight 800 was about, and some readers here may be younger and simply have no clue, or wish a refresher. In simple terms, Flight 800 was Trans World Airlines 747 jet bound out of New York late evening on July 17, 1996. Twelve minutes later, the plane and all 230 on board were lost in a fiery crash into the sea just off of Long Island. No one knew why, but rumors quickly sprang up that it was shot down by a Navy missile. Even military witnesses said so.
Even faster, the Wag-the-Dog disinformation engine of the U.S. Navy, Department of Defense, CIA, FBI, and the rest of the Federal Government launched one of the biggest criminal conspiracies of all time to cover up the truth. From the very beginning, I quickly involved myself as investigative writer because I quickly spotted traits of disinformation at play, and because I was compelled by a very credible claim that friendly fire was to blame by a revered source.
Non other than Pierre Salinger, former Press Secretary for Presidents John Kennedy and Lyndon Johnson, and former ABC Newsman, said that he was calling a press conference to reveal information from a CIA informant confirming the fact. But he had been set up for a fall with one of the oldest tricks in the disinformation handbook (as result, I wrote the 25 Rules of Disinformation to expose such tricks — my most famous and most read work with over 25,000,000 downloads); he was to become a strawman sacrifice to quash the rumor and associate it with ‘an untrustworthy Internet.’ Hence, the Salinger Syndrome. It destroyed him, but he is a hero for it.
I won’t explain the details of that, here (there is plenty of detail at my Flight 800 pages), nor much else about Flight 800 or the three-year running battle with Federal agents I and other civilian investigators had to endure to simply seek the truth and justice. I will only say that they used every dirty trick to shut us up they could muster, including sending out whole teams of FBI agents to intimidate us in person, Naval Intelligence people to pump us to see what we knew (pretending to be ordinary citizens), and I even got death threats from a foreign agent. Surveillance? You bet, including multiple vehicle tails, various aircraft, high-speed chases, and literally having to walk around Federal and local operatives to get from one side of a public venue to another. They wanted us to know they were dogging us.
But the one OTHER thing they did universally was to discount us by calling us ‘conspiracy theorists,’ and then ignoring anything we had to say. When the NTSB report finally came out, I personally had a field day combing over it and pointing out the obvious lies. They had falsified evidence, concealed evidence, and manufactured evidence to prove it was an electrical short which exploded a fuel tank. But that was also clearly impossible as even their own report showed. For each such point I’ve just mentioned, I was easily able to offer three different proofs. See my Three Simple Proofs (look for the small image of the gold NTSB CD a ways down the page).
But I was merely a ‘conspiracy theorist,’ and so, they still ignored me. Not one local news director would air my material, and the Oregonian flat refused my editorials. Of course, every major Network at the time was owned (controlling interest) by a major military contractor making Navy missile parts. Never mind that the proof was easy to illustrate. I was a conspiracy theorist, and THAT, was that. “Don’t confuse us with the facts, our minds are made up for us.”
Fast Forward a little.
The report finished, only one thing remained. The head of FBI, who personally monitored material I posted to my Web site (I cannot tell you how I know this without someone at FBI getting into a lot of trouble), and the head of the NTSB investigation, all resigned their posts at the end of the affair (publishing of the report), literally walking out on a scheduled meeting with a waiting collective of fellow civilian investigators, family members, and other ‘conspiracy theorists’ who were refusing to buy magic fuel tank explosion as ‘fact.’ They could not bear to look them in the face and lie to them in person, it seems.
With their resignations, NO ONE had ANYONE they could officially speak with, no one who would listen to, much less answer questions or challenges regarding the lies and blatant evidence of same. This was true in the halls of government, and in the newsrooms. We were all once more easily dismissed; conspiracy theorists are political and social zeroes in government and media circles. That’s why government loves to label dissenters. Pick a label, any label… in a political storm.
Fast Forward a LOT.
TODAY! On the radio today I heard that several NTSB Investigators have come forward and publicly admitted that the official report was doctored, stating flatly it was impossible that the fuel tank was responsible, and that there was indeed (as I had not only been saying, but showing) evidence of missile fire; it was a massive cover up.
What this means to YOU.
It means that conspiracy theorists (the good ones, like me – if you will permit me to so claim) are merely investigators forced to wear a label. It also means that many conspiracies are REAL, and self evident by the conflicting information in the official stories, and the cover up efforts and disinformation which follow. A cover up is itself proof of a conspiracy. You cannot have a cover up unless there is something to cover up, and its existence proves not only the crime is real, but it cannot even be undertaken except by a conspiracy of multiple parties to effect cover up; two interlocking conspiracies in one.
The lesson is: QUESTION GOVERNMENT, they lie. QUESTION THE OFFICIAL LINE, it has holes. QUESTION MEDIA, they are bought.
I urge you to read about Flight 800 at my Web site. There, you will learn things no other investigator has revealed. I was the only one to discover and illustrate the actual fraud in the NTSB Report. I was the first one to identify the ship most likely to have fired the missile (and subsequently visited by a foreign Agent making a death threat on behalf of their country — which should tell you something about the accuracy of my claims).
It will show you how easy it is to pull the wool over a Sheep’s eyes, and make us all into Sheep. It will show you how easy it is to fake it, and to make the public believe an unreal thing. It will reveal how easy it is to have a controlled media. It should leave you with a much greater respect for Truthers, and for conspiracy theorists, in general.
But why should I care, you might well ask? After all, I’m no longer a conspiracy theorist now that my theory has been proven FACT, and the conspiracy proven REAL, right?
WRONG. As long as Mr. Sorento and his crew run government, or others of like mind succeed him, there will be fresh lies to expose, new crimes to investigate. In fact, I’m working on a backlog, because that man and his cronies, like all Globalist Presidents, has more dark plots and evil deeds to dare than one conspiracy theorist, alone, can keep up with. Pray for me!
Care to help me out in other ways? All it takes is to pay attention, ask questions when facts conflict, and challenge government and media when they don’t get it right. And challenge the guy standing next to you when they don’t get it, because Sheeple are a terrible thing to leave running around loose in a Wolve’s playpen. If you ask me, that’s just plain good citizenship.
Or is that yet simply one more way of saying ‘terrorist’ in D.C.? Move along, Citizen, nothing to see here. Move along.
- Former investigators ‘break silence’ about NTSB cover-up of TWA Flight 800 crash (nydailynews.com)
- TWA Flight 800 Crash Not as Reported: Documentary (newser.com)
- Conspiracy Confirmed! TWA Flight 800 Whistleblowers Speak Out – NTSB Told Them To Lie (fromthetrenchesworldreport.com)
- Six NTSB Investigators Claim the Official TWA Flight 800 Crash Story Is a Lie (ajmacdonaldjr.wordpress.com)
What you believe determines how you react under and are able to defend against targeting. That’s a key reason that targets are psychologically profiled before targeting even begins; the enemy needs to know what chains best to jerk. Turns out, there’s a simple way to jerk back.
Free will: a Tis greatest asset, oft hardest to employby H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
What can you do if you are a targeted individual?
What you will learn reading this in-depth post…
- That belief structures define us, establish our psychology, and our responses to stimuli;
- There are many ways targeting both takes advantage of and yet alters beliefs to weaken the will to resist;
- Will power equates to Free Will, the greatest gift of God to Man short of salvation through Christ and life, itself;
- The pitfalls of targeting psychology as it relates to Free Will, and;
- How to use Free Will to thwart targeting and run psyops on the perps.
Where do you get help if you are a targeted individual?
Challenge][ As author, lecturer, and consultant on personal privacy and security, and abuse of power, I invite the reader, especially if a Targeted Individual (TI), to make a comparison. Compare the nature and content of this post with the typical posts or emailed materials by other persons offering insight into targeting methods or technology, and/or defensive tactics. Then decide which closer resembles the reality of your experience, and which plays instead to the very fears and results ascribed herein to be unexpected weapons. You become what you believe: let’s take an in-depth and lengthy examination, and see…
Is the information offered insightful and helpful, or more likely to lead the victim deeper into the proverbial Rabbit Hole of dread. There is a difference between education and helpful advice through understanding (what a consultant or educator tries to provide), and the rhetoric and trivial dialogs of technospeak or psychobabble offered with questionable veracity, something closer to beliefs and opinions, or even mis- or disintormation than well-sourced facts — regardless of if offered with good intent, or ill.
Topic][ We are talking about TI’s, Targeted Individuals, of course; persons harassed endlessly by organized groups using Political Control Technology (PCT), which can mean any number of things from gang stalking to electronic weapons, and much, much more. PCT is military and intelligence community developed technology, so if one is targeted, the perpetrators (‘Perps’) are almost always from those quarters, or from parties with whom they interact, undertaken for political or criminal purposes.
We should be grateful, in a way, for PCT. Prior to advances in PCT made since WW II, when a person became a roadblock or threat to a political agenda or criminal plot, they were simply done away with; murdered, typically a ‘wet job’ assassination or, if time allowed, dealt ‘an accident,’ or what we call ‘heart attacked.’ PCT, however, allows a whole new way of dealing with ‘inconvenient’ person who are not quite an immediate threat, thus avoiding the pitfalls of murder investigations and unwanted publicity they entail, and dangerous questions they raise.
When the target is a person of wealth and power, or public influence, it is less likely to be used. PCT works best on those unable to afford exotic defenses which would render it near useless, if not completely pointless. Those in the public eye may be too well observed already to risk deployment of useful PCT methods without risking detection by third parties. PCT only works when no one believes it is being used except the target. So unless they can first financially destroy or socially discredit such persons, they may elect instead a good old fashioned murder. Ask Vince Foster, Ron Brown, or even Marilyn Monroe or Princess Di. People with high credulity working for them can’t answer hurtful questions once they are dead.
Perps often fear victims][ It is fear that such questions might be answered by the target which drives any consideration for either assassination or PCT. When someone is thus targeted, it can be said they actually fear the target, fear them enough to justify ‘self defense’ and pre-emptive action. Thus the TI may actually hold an ace up their sleeve and simply not know it.
Part of my job as consultant is to seek to see if that is the case, identify it, and wield it as offensive weapon. For such victims, PCT was elected as a preferred method not just because it seems safer, but because of the way it works; the goal of PCT is to render the target into a social, financial, and political zero. No one pays attention to a zero, it is nothing of value to them.
This targeting achieves by making the victim seem crazy; no one wants to believe in the Boogeyman, so when they start talking about being targeted, they are presumed paranoiac and/or schizophrenic, and discounted. Once they achieve this status, of course, neither will anyone believe any information they may offer which caused them to be feared in the first place, even if they have evidence which might otherwise raise eyebrows. But that does not mean the information has no power over perps, if realized and properly used.
Other reasons for targeting][ This is not the only reason for targeting, however. One cannot deploy technology without training users on the methods and devices involved, and that requires live, unwitting subjects. In like manner, one cannot develop devices and improve method without experimenting on human Guinea Pigs. This is all fact, and even found in the Congressional Record (Church and Rockefeller Commission Reports), but for some reason, we still can’t quite believe in the Boogeyman enough to consider the possibility that someone is telling the truth when they complain of targeting. Finally, one can also be targeted for joy riding (psychopathic pleasures) or vendetta — both forms essentially an abuse of power through access to the technology for personal reasons.
The reason one is targeted often defines the entire game, including best defense strategy. But that is beyond the scope of this post, and indeed, inappropriate — because every situation, though perhaps similar in generic description to another, will have sufficient variables in play such that strategies should be tailored to the individual circumstance. Environmental, social, and personal matters all come into play, and more.
Why won’t people believe it when someone says they are being targeted?
It gets tricky
Self as a weapon][ The first step in targeting is surveillance from afar and the development of a psychological profile, which is the definitive ‘self.’ The goal is to calculate the victim’s likelihood of being responsive to an array of attack options. It also seeks to uncover some key ‘theme’ for the attack psychology. For some it will be guilt, trying to make the person feel they are targeted because they are bad. Others might come to think the theme is to suicide, or to undertake a specific course of action. It can be almost anything, or it may be completely generic harassment without a theme, because we all different psychological makeups.
Now, while more than one assault method is available, only one will likely be brought to bear at a time, and fostered until it achieves a certain level of success. I call this a calibration phase. Additional targeting methods are brought on line in a sequence designed such that the success in the former better aids the progress of the next, which in turn ideally augments or reinforces the former. While that is not always the case, doing so is a high-value procedural goal; it is important to achieve as prompt a negative impact on the psyche and behavioral responses as possible, so that responses to attack will be seen as being due mental aberrations — rather than the actions of a Boogeyman.
Disbelief as a weapon][ Such disbelief as to true cause by onlookers is, thereby, almost guaranteed. Paranoiac responses (e.g., looking over one’s shoulder to see if being followed) are natural when one is targeted, but do not mean the target is actually paranoid. But they immediately seem paranoid to others, even as the process begins. Yet in time, they wax toward true paranoia, as fear and assault from general targeting starts them to questioning more and more events around them in fears they might be connected to targeting.
Soon enough, even innocent things are indeed so judged. It is this same mechanism which renders professional spies less than useful, in time, because they start to over react to their daily dread of discovery. Intelligence agents are, by retirement age, generally speaking, quite paranoid. But there is more such as this, to come. This is not mental illness as some count paranoia to be, but rote conditioning; paranoia by reflexive repetition.
Imagination as a weapon][ Part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They seek to create a belief that the problems they face are beyond their ability to resist, and other than they really are. Clearly, any onset of paranoiac beliefs will play to this, and create opportunities to put the ploy into full play. Once achieved, when they fight back defensively, they fight the wrong problem with the wrong solution, further cementing the notion that resistance is futile when the effort fails.
This ploy is also used another way; to make them think the wrong people, or at least additional people, are involved, but who are not. Targets are goaded into lashing out, if not verbally, more dangerously, that they might get into trouble, and have key support relationships sabotaged, even face arrest or other legal entanglements — or ideally, be forced into mental evaluation and perhaps even institutionalized ‘for their own protection.’
Mistrust as a weapon][ On the flip side of this tactic, they often approach persons close to the victim and attempt to subvert them with lies hoping to induce actual participation. They may present credentials or badges of trust, and talk of child pornography or other criminal behaviors, even terrorism, and sow seeds of mistrust and ‘patriotism.’ Once a victim begins to experience such mistrust, they in turn, feeling betrayed, begin to mistrust others close to them. The net result is that they can never be sure who the players and helpers really are, again fostering whole new paranoiac fears.
Fear as a weapon][ The above fears are very effective. Yet some PCT is so fearsome, such as bioimplants, that even suspecting it is in use, heightens paranoia. There are many tricks which can cause victims to assume implants in place, or some other dread, when not true. However, this is more commonly the case with long-term victims who have already been well along the paranoiac response path, and have had their beliefs altered well away from the true nature of their enemy. The longer one is targeted, the closer to this state they tend to become.
At such a point, paranoia can naturally grow to the edge of schizophrenia in appearance, perhaps better described as the form of hypochondria in terms of ‘sensing’ symptoms (such as where the implants are thought to be placed, or whatever the dread may be). Fear and imagination, when combined in an unending onslaught, can manufacture new false realities of any construct.
Once that transpires, or where implants really are in use, it is almost impossible to work one’s way out. Doctors will refuse to inspect for implants, and X-rays won’t reveal them because they are set for tissue examination, and not dense matter. The latest generation of low-cost implants are indeed fearsome: they are far too easy to place without the user’s knowledge (thought to be an insect bite) while they sleep, are extremely small in many cases, and are designed to bond with and look like bits of flesh if uncovered with scalpal. It takes a good magnifier to see signs of man-made tech.
Who is responsible for political control technology?
Consequences of false beliefs:
To be a helper first of all and foremost requires no preconceptions of what is true or imagined by the target. For the very reasons described herein (false beliefs), alone. But also because even if truly schizophrenic, that does not mean the person is not ALSO targeted. In point of fact, the class of victim who is a test or training subject is often chosen exactly because they are already schizophrenic; there is no possible way for anyone to believe that they are targeted no matter how badly a trainee or test goes haywire. And paranoia, being natural, is actually closer to a proof of targeting than a reason for disbelief.
This is exactly why it is so hard to get good helps from the very people who should help (e.g., Cops, Lawyers, Doctors, Politicians), and why I do not prejudge based on ‘wild’ or implausible claims or implied clues that something is wrong with their facts. If, in the end, if the person is schizophrenic, I’ll eventually come to understand that, and deal with it. If they are ONLY schizophrenic, I’ll by then be in a better position to guide them to the proper psychiatric helps.
But also, if schizophrenic and actually targeted, the illness will not deter detection of that truth, nor prevent me from addressing it — though it makes it more difficult. And I will still try to help the victim obtain the helps for the chemical imbalance causing their aberration, as well. And that is all it is. It is not being crazy, and if it did not have such a scary sounding name, people would realize it is not that big of a deal to so suffer.
This approach is also critical because it means I can ignore (mostly) any obvious or even inobvious false beliefs held by the victim. They are inconsequential to the true nature of targeting unless I myself also rely on the false facts, but I do not, or at least try not to so rely. Ignorance in this case is bliss. However, at some point, any errors in belief structures must be repaired or, perhaps, tested. It may, for instance, be me who has false perception. A good test can teach whomever is wrong the true nature of things, provided their minds are not sealed to logic (that can be the case).
The logical path][ Were I able to go into a TI’s home and install pickproof locks and facilitate true site security, render their computer and phones secure and defeat surveillance devices, make various targeting method tests, set up defenses in response, and do the appropriate investigations and analyze victim history — I can make ALWAYS make progress. It may not be total victory, but if not, the resulting shift will see the targeting closer to an annoyance than a trauma.
I’m talking about all the things I advise my client Tis to do, of course, since I cannot do it for them at distance (while I do offer direct intervention, it is generally too costly for a TI to afford, as it usually involves securing other professional specialists or services, as well). This is what I do: play 20 questions, give assignments, some of which are tests to undertake, and figure it out as we go. Repeat as needed.
Rationalization as weapon][ But victims tend not to follow my advice even after agreeing, or fail to undertake steps correctly, or misconstrue the results, or even reject the advice or conclusions out of hand — all generally because their current belief structures (as to the nature of the beast) will not allow them to yield fully to my advice or to the possibility of another reality. Their minds are closed to logic, and they rationalize an excuse for the subconscious decision.
Strangely, this is often even true when the instruction is a test which would make that very determination. My best successes have only been possible when the victim was relatively new and had as of yet had no such strong false belief structures to struggle with. Long term victims tend to have a ‘been there, done that’ not-going-there again approach even though they haven’t, yet, really (at least not in the manner as prescribed).
And understand, I’m not saying I’m always right, by any means. I’m frequently wrong; since I am not there, I must rely on the information I’m given, but it comes from people who are not consistently capable of giving me the correct information— because it is all filtered through their belief structure born of targeting falsehoods. Even if I were on site, I myself might be misled by clues or symptoms, or miss something key, or simply make wrong conclusions. So imagine how much harder it is for the Victim, alone in a stressful environment.
Desperation as weapon][ It leads to desperation, and in that state, victims do things they ought not. They almost habitually (mix and match) ‘hook up’ with other Tis, seek sexual encounters with strangers; move into places indefensible, write to authorities in an inappropriate manner, spend serious money on foolish or fraudulent defenses, and more. They rationalize wrong choices via hope instead of choosing carefully with logic, and by that same rationalization, discount failures and thus end up repeating the same error, again.
Speaking to my introduction paragraph, they tend to believe at the drop of a hat most any technical or tactical explanation or offer for help (especially if a new or unusual method, and for too many, even if seeming nonsense) — especially if it in any way reinforces a false belief already held. And they tend to reveal too much information when in dialogs, further aiding perps in psychological profile and targeting fine tuning. These things they do in hopes it will somehow at last lead to something that does help.
The path unwanted][ All this further exaggerates their false beliefs, and then typically in the end they call those same people (with home they hooked up or from whom they obtained information or helps) Perps when things don’t work out as expected. Regardless, seldom will they toss out the newly acquired fears or beliefs about tech. There is such a desire to ‘understand’ the problem, that they consume and eagerly share information constantly, even if there are logical signposts that it is incorrect. Eyes are raised if anyone dares point out such flaws, and their honest appraisal becomes circumspect. Of course, sometimes, the objections are indeed false, perhaps from a perp.
Division as weapon][ Thus in the end, the victim community ends up bickering and fighting and being suspicious of one the other. Even though it is sometimes absolutely true one is a Perp (or just as bad in net result, a true schizophrenic believing themselves a victim), way too many thought to be, are not. For those wrongly accused, help is subsequently even harder to come by, as they tend to isolate themselves defensively. Victims end up torturing victims unwittingly in a mass self-reinforcement of victimization.
This is why I no longer participate in group dialogs, polls, petitions, etc.
And why was false advice given in the first place? When not because the giver was a perp, it is most likely a false belief structure which allowed the giver to sincerely think it would help, perhaps because they used it in their own targeting. But they failed to realize the perps took steps to make it seem like it helped. This takes us back to the opening statement: part and parcel of MC is to make the victim believe in a false reality as to their circumstances. They giveth and taketh away after it has led to more division in the TI community.
How sinister the weapons are][ But even when the advice or information is good, if filtered through false belief structures, it will not be useful to the victim as a rule, and for the reasons cited already. It matters not who is giving the advice; me or a TI, or some third party. False belief structures still get in the way, and perhaps, for some individuals, pride contributes; they do not wish to admit they’ve been wrong all along.
I can sometimes make decent progress with a long-term victim suffering false beliefs, but seldom as much progress as desired. Regardless, and this is almost always true for all clients, when even a small level of progress is made, the victim gains strength and the will to continue fighting. They become a Survivor, and are no long victim, and that alone is worthwhile. If I can get that far, there is hope that more progress can be made, and in time, it usually is, but every new gain tends to be hard earned… but with luck, at some point, there is an opportunity to suddenly break away altogether.
But you often dare not tell a victim they have false beliefs (as I attempt, here) or a key to truly understanding their problems, even once a survivor, because it will probably be rejected along with other advice. They have to somehow come to realize it on their own, and start from zero; that’s when good advice and helps can actually work. Even then, they must also have the will power remaining to force themselves to stop the bad practices which deter helps and neuter advice, as well as the bad habits born of desperation.
What is political control technology?
But then there is FREE WILL
Free Will, the Survivor’s weapon][ Exercise of Free Will, the gift of God which no other can take away unless freely given in submission, is the greatest weapon a TI has: only if they CHOOSE to allow an attack method to have emotional impact, will it be so. Street theater, V2S (voice to skull), and even pain generating tech becomes little more than a bad joke when one is able to simply decide it has NOTHING TO DO with their ATTITUDE and emotion, or their psychology and philosophical approach to daily life.
A Cancer victim in constant pain who CHOOSES to continue to live and enjoy life… such a person in such a state is a wondrous thing to behold, because we see they can be truly happy in life, accepting their fate and enjoying life even MORE than someone uninflected because of it. So why cannot a TI do the same? Only because they CHOOSE to suffer the very psychological effects the targeting pushes them reflexively into. But unlike cancer, there is a cure for that.
Never REACT][ Instead STOP, THINK, and consciously ACT; stop yourself from reacting, think what your reflexive instincts were telling you to do — and consider if that was not what was expected of you. With that in mind, then ACT contrary to it in some manner, doing so as if an actor in a play. In the beginning you will have to act like an actor, because it will not seem ‘normal,’ but in time, you will find that things get easier, and eventually, reflexive, such that targeting no longer has any control, not even to force you to stop, think and act. THAT will be true freedom; the day you no longer automatically respond as predicted by your profile — because you have created a whole new profile, one which is targeting resistant, and one they cannot understand or deal with.
To me, the real beauty of this method is that it is mind control in reverse; the perps become confused, and are rendered victims of your psychological warfare upon them. The accuracy of their psychological profile is diluted and eventually becomes useless and meaningless. The lack of progress and success causes underlings to get in trouble with superiors on up the line. People get ‘fired’ and replaced.
They even start replacing equipment, thinking it defective. And from that fact comes a warning: expect attacks to intensify, either as punative response, or in experimentation to see what’s wrong. But they will not want them to get so intense that they damage tissue or leave other physical evidence, so if you start getting microwave burns, for instance, go to a Doctor and get it documented, and photograph them for evidence, and as always, update your log of targeting events with great detail. They will back off if this starts to happen, almost always. If they do not, let me know. I have thoughts on that, too.
- Gang Stalking – We targets are alone. (neverending1.wordpress.com)
When peaceful change does not correct a tyrannical government, what remains is armed revolution — or — docile subjugation. History shows revolutions are slow to come, but when they do, swift to take hold. Yet, there is an important difference between being able to say ‘this government is tyrannical…’ as opposed to ‘This government is Godless…’
Does God ever approve of deposing tyrannical governments?by H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
Does God approve of revolution?
Reading this post you will learn:
- Citizens of any nation may believe there is reason for armed revolt
- That the Antichrist cannot come to power until there is a massive Global revolt
- That God commands we not revolt against authority
- But that there may be some forms of government where revolt is not revolt, but just punishment in the eyes of God
Who is really in charge? Who SHOULD be in charge?
In a prior post we sought by means of two polls, to determine who the real authority and source of power is in America, currently, compared to who is the RIGHTFUL source of authority. If you have not read that post, this post will likely be more valuable to you if you first at least review the Poll, and hopefully, employ it. Now, while the answers are specific to the United States, the question posed in THIS blog post, remain valid for any country under any form of government, even if Islamic.
The reason it applies globally, and as many of my posts point out, we are in a life and death battle with the New World Order, then we are up against powers and principalities who seek to seat the Antichrist. Even if not so, if we feel our government tyrannical and evil, we may be predisposed to considering armed revolt if we see no peaceful choices working.
But also as pointed out, if we resist properly, we can delay the unpleasant and totally fatal End Times that go along with that scenario. That means a Righteous (right-use-ness) fight to assert our right to God’s gift of free will as opposed to an evil (vile-use) motivation.
Scripture clearly tells us that we are to submit to authorities, even if they are oppressive, the example given being Caesar; the Roman Empire, eventually headed by an ungodly man who thought he was a God, and which literally enslaved most of the known World at the time. There are several verses which we should consider to see if there is perhaps any exception or justification for rebellion:
Hebrews 13:17 and Romans 13:1-7 are the primary establishing commands we seek to question, saying, “Obey them that have the rule over you, and submit yourselves: for they watch for your souls, as they that must give account, that they may do it with joy, and not with grief: for that [is] unprofitable for you.” “Let every soul be subject unto the higher powers. For there is no power but of God: the powers that be are ordained of God.”
1 Peter 2:13-14 echoes, “Submit yourselves to every ordinance of man for the Lord’s sake: whether it be to the king, as supreme; Or unto governors, as unto them that are sent by him for the punishment of evildoers, and for the praise of them that do well.”
Thus if we are faithful to God, it seems we must presume even tyrants were given authority over men with God’s blessing for some reason known only to him, and that their authority serves Him in such hidden cause. Yet it also sounds like it is based on the assumption that there is at least some degree of responsibility to protect and care for the nation, to specifically include spiritual care for their souls. And it is true, that even Caesar allowed the captive Jews to worship their own God. How odd was that, when such as he would soon claim to be a God?
So two questions come to mind which may alter the equation, and deserve further consideration.
One: What if the authorities actively seek to destroy God by advancing the Antichrist?
That is, after all, the primary premise which is in play up front and which drives the new World Order movement at its inner-most core. It is one thing to revolt because of tyranny and loss of freedoms, which is certainly a motivation in any revolt. But it is another to do so because the authorities seek to destroy men, destroy their spirituality and lead them to sin, and destroy God. What does scripture say about that?
An answer may exist in the complex story of Nabal and Abigail. Overly simplified, perhaps, for the sake of focus to topic and the limited space of a blog, Nabal was a powerful man of self-assumed authority at a local level who, when some of David’s people came under his power, was harsh with them, and took actions which were a threat to even David’s life by denial of food, offering instead great insult. Nabal worshiped Belial, a name for Satan.
David responds by gathering 400 men in arms to confront and deal with Nabal in reprisal. But one of David’s men warned Abigail, Nabal’s wife, explaining the problem. 1 Samual 25:17 is his conclusion and of interest to answering our question. “Now therefore know and consider what thou wilt do; for evil is determined against our master, and against all his household: for he [is such] a son of Belial, that [a man] cannot speak to him.”
Is that not how powerless we feel in the face of the NWO and their ceaseless crimes against us, plots all against God? Do they listen to our reasonable pleas?
But rather than justifying David’s intended battle, which we might deem rebellion, Abigail intercedes with great wisdom on behalf of and in acting authority of Nabal’s houshold. She brought food to David, and pleaded that there be no battle. David agreed, and Abigail returned to Nabal saying nothing. In the days that followed, Nabal died, God’s judgement upon him.
The story would seem to have no true relevance if that were the end of examination, for there is no Abigail likely to intercede on our behalf within the construct of the NWO (if one exists, please email me, and let’s fix this!). But there is one more passage which does apply. David, as God’s servant in the passage, thanks Abigail for stopping him from attacking Nabal, an act he himself describes as, in afterthought, evil (unrighteous). In part…
1 Samual 25:39 “And when David heard that Nabal was dead, he said, Blessed be the Lord, that hath pleaded the cause of my reproach from the hand of Nabal, and hath kept his servant from evil: for the Lord hath returned the wickedness of Nabal upon his own head.” In other words, had David attacked, it would have been wrong. He indeed should have left the matter to God, who in the end did take care of it.
On this, then, we see the Bible remains adamant that we not ‘fall away,’ the term for rebellion, even when authority is clearly Satanic and seeks to harm us. And yet, I still wonder… there is the one other question…
Two: What if WE are the authority, and it is our servants that we need take to task by force of arms?
This is one reason why the poll was offered in the prior post. One may find there is a distinct difference between a government based on divine right as addressed by the above Bible admonishments to submission, and government based on a social contract; the Constitution and Bill of Rights. If, in the polls, We the People or the Constitution/Bill of Rights were seen as the ultimate authority, and especially if the poll also showed that the darkness of the New World Order was the true current power, then divine right would no longer seem a valid component.We would not be rebelling against authority, for we are that authority.
We would instead be rebuking those assigned the task of executing authority on our behalf, our public servants. Restated, if We the People deemed to grant the power of governmental authority to those in Congress, the White House, the military, and so forth… by means of a document we (our Forefathers, anyway) penned and signed as their charter of such powers, then they serve us at our pleasure, and should they err and refuse correction, we ought be justified in using force to end the matter, per Thomas Jefferson’s beliefs and intent; the whole reason for the 2nd Amendment right to bear arms of like capability as the military.
Biblically, that would be a Master-servant relationship, and we would still be in compliance with God’s Word to punish our errant servants. A master does not fall away from a servant in rebuking, punishing, or even killing him for just cause, nor does he do an evil thing in the eyes of God. Indeed, it is the servant that falls away in violating the will of the master, and punishment of any kind may be in order according to circumstance.
Luke 12:47 “And that servant, which knew his lord’s will, and prepared not himself, neither did according to his will, shall be beaten with many stripes.”
And one more thing…
If the poll would seem to insufficiently justify the above reasoning, or you otherwise find it unacceptable, the Bible does specify one, and only one other just reason to fall away and not obey authority. That singular reason is when authority commands something which is contrary to God’s commands. You are to obey God, and not man, in such a case.
Acts 5:27-29 (and similar in Acts 4:19) makes clear: “And when they had brought them, they set them before the council: and the high priest asked them, Saying, Did not we straitly command you that ye should not teach in this name? and, behold, ye have filled Jerusalem with your doctrine, and intend to bring this man’s blood upon us. Then Peter and the other apostles answered and said, We ought to obey God rather than men.”
Therefore, we must seek and define just cause for rebellion; such deeds or laws or deciets which prevent or thwart obedience to God. How can we judge if this be the case, or no? Start with what God has commanded, and compare. Look to the Ten Commandments, and we only find two which may qualify.
One: Thou shalt have no other Gods before me. Unless and until we are commanded to worship some other God, this is no justification. If the one-World religion is forced upon us, we might justly revolt, but that is something not expected until after the falling away and the one-World government is established. It is yet for a future time.
Six: Thou shalt not kill. Now we start to wonder if this is not a basis. Wars fostered by deceit to steal resources and confound the God of Abraham by putting Satanic sects in power (Hashemites – see prior post) would seem to be commanding our soldiers to kill for unjust cause. Depopulation efforts such as Chemtrails, Agenda 21 and Codex Alimentarius, and GMO crops is asking us to submit to being killed, and if we do not submit, to aid in the killing of our own children.
Indeed, the laws have already been written to enable and essentially require that we unknowingly allow the State to guide our unwed teens to kill their children by abortion. The 1.4 billion rounds of munitions ordered by DHS likewise seems destined to be used against us. Must we submit ourselves and our families unto death?
Suppose they do at last come for the guns? To do so is the final step in their revolt against our authority. Once they have the guns, they become the Master, and we become the servents; slaves, really. From that moment forward we are forced to serve Satan’s desires of any and all manner without recourse, and no longer have any means to resist. The Antichrist can come to power, and it is End Game.
Does God intend we should serve Satan without a fight, or is that a sin. There are more than a dozen verses on this but the one with the strongest and simplest clarity perhaps is Matthew 4:10 “Then saith Jesus unto him, Get thee hence, Satan: for it is written, thou shalt worship the Lord thy God, and him only shalt thou serve.”
Only Him shalt thou serve.
And how do we do that? Do we grab our guns and start shooting? It is, after all, relatively easy to start a revolution. I hope not, unless perhaps it is in defense of the guns, that final signpost, that final straw… or perhaps if some cold, hard proof of genocide or like atrocity toward depopulation. But then, we each draw our own lines in the sand, and choose how to resist. I’m thinking there needs to be a way to fight back which does not require violence, one which can be applied more safely, and immediately… by anyone… today. This moment.
It’s available to us all, and has been all along.
It’s called the 1st Amendment; free speech, and when combined with an even more powerful tool, God’s gift of Free Will, it is all powerful. Become activist and use these weapons, or the entire Constitution and Bill of Right have no meaning for you, and perhaps the Word of God as well, for you may end up being doomed and unable to obey it when it is found to be, for you, too late. You can always just opt out of the system… and drop off their control Matrix (take the Red Pill).
The Mark of the Beast, or death may be your only choice, then — or armed revolt. But if you ever end up deciding the time is ripe for such revolt, I pray you do so in agreement with God’s view of your actions as being righteous (right-use-ness). That is one reason for having two polls to compare one to the other: if we be the rightful authority, than it is not revolt, at all, but due punishment, and not just our right, but our obligation in the eyes of the God.
- Devotions: I Samuel 25 (spiritualgym.wordpress.com)
I really don’t think we can answer that so easily. Is it Mr. Sorento and his Executive Orders? Congress and their unconstitutional laws they don’t even read? Bankers and the FED? The Military and Arms Industry? The Individual States? The United Nations and their Treaties? The Council on Foreign Relations? The Illuminati, the New World Order? Or… is it We, the People and the Constitution?Update: May 14, 2013 Preliminary results indicate 75% of us think the rightful power in America should be We the People and the Constitution/BIll of Rights — but only 6% of us think that we actually achieve that ideal. More than 70% think the real power currently in force have nothing to do with government, at all. IS THAT RIGHT? I hope not, and thankfully, the sampling is fairly small (only 21 votes). WE NEED MORE VOTES to truly get a handle. TELL YOUR FRIENDS TO TAKE THE POLL! by H.Michael Sweeney Copyright © 2013, all right reserved. Because this involves a Poll, it makes sense not to allow normal reblog. Permission hereby granted to reproduce this blog in full with respect to commentary, including this paragraph, but WITHOUT the pole, itself, using instead links to this blog at the appropriate point. All other links and text must remain in tact. A Poll: Who Is the Real Authority and Power in America?
What you will learn reading this post and answering a Poll…
- That there are many possible answers to the question;
- That each is supported by useful argument;
- That each is arguably false by countering logic;
- That God has given us signposts that we might choose wisely;
Who is our true Master in America?
I’ll start by saying I’ve been the fool, as I think have we all. Nothing anymore is black and white, it seems, though most of us operate as if it were. That’s how we make mistakes. The visible things on the surface of matters which guide our opinions and actions are more and more subverted with falsehoods and concealments, and manipulation, and yet like the Ostrich, we prefer to believe what is apparent without question. Look where it has led us:
Never before in history has there been so much talk about the end of the World… about global revolution, wars, and rumors of wars… about religious beliefs and disbeliefs, and bitter differences between them. Or about the New World Order, which can only serve to seat the Antichrist and lead to Armageddon… about powers and principalities, plots and conspiracies.
Count me guilty of all such talk. It’s on my mind almost every day, if not the forefront, then nagging at me in the background. There are simply too many news events where things simply do not add up to equal the facts offered in the telling. Things are rapidly becoming Biblic in scope, things forecast in that very book. The signs are everywhere, even as also forecast. I cannot help but consider, and write. I think we all need to consider, lest we blunder into oblivion. Of course, that may just be me being paranoid, again.
Is it mere paranoia as some say, even hope? Or is it a growing shared consciousness coming to the surface? Or is it simply proper attention to signposts and the very Word of God?
When have we had so many signs in the heavens? So many serious earthquakes and mega disasters? Dieoffs of large numbers of people and animals? So many people in unrest simultaneously? So many wars and rumors of wars? So many sightings of strange creatures, UFOs, odd visions and even noises of no tangeble explanations? So many rare events in and from the stars? When has the Earth been so polluted and ecologically threatened? NEVER. All these things have been forecast.
Ought we not heed them? Moreover, when has there been such a fascination in our entertainment with the occult, witchcraft and satanic things, zombies, monsters, and other dark things including end-of-the World scenarios? Are we being conditioned to accept the Antichrist’s rise to power, that we may yield to the Mark of the Beast more easily?
When in history have there been such vast schemes forced on the masses by a handful of powerful people with questionable agenda? I speak of Agenda 21, the sustainability movement which would deny you the right to own property, have a car, choose where you live, and work, and if you can have children. I speak of Codex Alimentarius which makes natural herbals and vitamins illegal, and forces you to rely on big pharma drugs, and to be subject to inoculations. I speak of the plan to establish a one-world religion which melds everything from Shamen to Buda to Christ and Mohamed and even Satan. I speak of HARRP and mapping the brain so that mind control weapons can regulate thought and mood on demand, and of chemtrails, GMO, and Seed Vaults and race specific pathogens (gene-guided bioweapons) which enable depopulation. There is more such as this which could be added.
The answer as to who is the true authority in charge is a serious question not easily answered, but one which is critical to trying to answer and deal with the rest. In the end, there is probably no useful concensus given multiple ways it can be thought of, born of differing perspectives, and that is why a Poll is being offered. But it is critical that we know, because we are at a crossroads in history which will determine the fate of the World, though most of us are asleep to the matter.
If we are truly at such crossroads, the Bible warns that before the Antichrist can come to power, there must be a ‘falling away,’ a revolt. 2 Thessalonians 2:3 “Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed, the son of perdition;” In the text of King James, ‘falling away’ means ‘rebellion,’ and the day spoken of is the End Days, the ‘son of perdition’ the Antichrist; the rise to power of Satan.
It does not say who wins, and indeed, it may not matter, because the Antichrist could rise from either side of such a battle. But as I’ve said in my prior posts, I believe that if sufficient numbers of people are found to be righteous (right-use-ness) as opposed to evil (vile-use) in application of Free Will, God will let the World continue. I believe Armageddon comes by the dictates of our own actions, that there is no set time for it as Men consider time. And if that is the case, I’d rather have more time than less.
How about you?
Who is the real authority and power in America?
Who truly rules us, right here in America?
Is it Mr. Sorento? The presidency, regardless of who sits. But I refuse to use the other name this man claims, for he is indeed a man of questionable legal authority to hold the Office of the President. If he is legal ruler, why did the military allow troops to decline assignment to combat if stating they did not believe him their lawful Commander in Chief? There is a significant chance he will be proven a fraud in court by some accounts. If a fraud, his Executive Orders and Bills signed into law are null and void. But the real question is, is any President the true power?
Is it Congress? All they do is propose and submit laws to the President. They don’t actually tell us what to do in any direct way. Worse, they don’t even read the laws they vote upon, and never seem to question that massive bills thousands of pages long are ready for their consideration within days of most ‘needs,’ things otherwise unexpected. The Patriot Act was written well before 9-11, for instance. The body is widely viewed as corrupt and acting against the best interests of the country and those who elected them.
Is it the Military? They are supposed to answer to the President, and civilian authority. Yet they have threatened Martial Law, suspension of the Constitution, and a military form of government. They now presume the right under NDAA to murder, vanish, and torture any American without due process. They raid our cities in mock drills. Their documents indicate they intend to shoot Americans demonstrators who protest (they already did so at Kent State), if confronted. Others define a new form of warfare most likely to be faced in the future as ‘Peoples War,’ where the enemy is a group of ‘Ex military, Constitutionalists, patriots, religious extremists, the poor and disenfranchised.’
They have approved a plan (the blueprint of terrorism we now face) called Operation Northwoods, which we find duplicated almost to the letter in terrorism: it was to blow up American ships in harbor (the USS Cole), blow up American buildings (US Embassy Bombings, WTC Bombing), assassinate Americans on our streets (DC Sniper), shoot down remote-control airliners thought full of Americans (9-11 attack), and blame it on (in the plot, Cuba, but it can be used as a tool against any group or nation with the right operatives) in order to justify a war. All of this is detailed in Fatal Rebirth, right down to the circuit boards employed. Want a free ebook copy of Volume One?
Is it the Supreme Court and Court System? They are only called into play as a kind of last resort, and only indirectly tell us what to do on select things which come before them. And yet, they are supposed to be the final, ultimate authority in the scheme of checks and balances which define the construct of our government.
Is it the States, and States’ Rights? The Federal Government is limited in what it can do to force compliance at State level. International treaties cannot be signed and entered into without ratification by the States. It is by agreed upon Union of the States which formed and empowered what we call the Federal Government, for the purpose of doing their bidding for the collective good.
Only by coercing State compliance voluntarily with Federal funding programs are most Federal mandates found sufficiently ‘convenient’ at the State level. But if it is the State, then the question of the Military comes back to haunt us, because there is hardly a standing Army as such; the bulk of the Military outside of the DOD is in the form of National Guards (Army and Air Force units), which are State militia. The Navy, Marines, and Coastguard are the exceptions.
Is it the County Sheriffs and local law enforcement? If there were large-scale civil unrest, and/or a move by the Federal government to enforce gun controls deemed unconstitutional, who is the true local authority over you, when so many Sheriffs have unified themselves to tell Sorento they would not enforce such laws and would even arrest Federal agents if they attempted to do so. So important is this issue, that we now learn that in response, Sorento is asking to form a whole new Federal law enforcement agency (itself thought unconstitutional – a National Police) to arrest Sheriffs who take such a stance. Who will side with whom, against whom, when push comes to shove?
Deputize me, and Barry will find out. And know this: it will take only One Governor to order his National Guard into D.C., and one Constitutionally loyal General to arrest and detain anyone guilty of treason as result of such forced confrontations.
Is it FEMA and/or DHS? A state of Emergency was declared because of Sept. 11 attacks. It has not been lifted. The FEMA Charter under law gives them absolute authority over almost everything in such declared emergencies, including the Military. If you read the list of what they control and can do, you would say Hitler would have envied their absolute power. Yet we see no visible signs this is being exercised… unless you are observant. Their vehicles can be seen driving our streets, and Police-like uniforms are being worn here, and there, with FEMA patches. They are too quiet, methinks…
Much the same can be said of DHS, which was created by the Anser Institute, a shadowy military-intelligence think tank. It was formed exactly two years prior to Sept. 11 attacks, almost simultaneous to the Project for a New Amrican Century’s war plans for a series of domino wars in the Middle East to gain control of natural resources, and give power to puppet governments run by what they called in their PowerPoints, Hashemites. The Hashemites are an ancient Satanic sect predating Allah that involved opiates in their religious ceremonies, and are brethren to the Assassins, of like construct. Their historical trails will lead you to the Knights Templars, to Rosecrucians, witches and warlocks, to Masons/Freemaonry, and to the Illuminati. DHS has ordered 1.4 billion rounds of ammunition and is doing all manner of things dark and sinister which cause many people to think them planning a war with American citizens.
Is it a Secret Shadow Government? Unseen string pullers. I call it Shadow in my book set Fatal Rebirth. Some call it Illuminati, perhaps in the form of the so-called Round Table Groups (evolved from Knights Templar meetings), like the Bilderbergers, Council on Foreign Relations, and even Rhodes Scholars. Some say it is the high Freemasons, Skull and Bones, and the like. Others think it the Jewish Cabal (bankers, mostly, primarily due the Rothschildes influence, but I maintain they were Knight Templars who assumed Jewish identities to avoid persecution by the Pope). Such forces do exist and make themselves felt, and all those elements cited can be seen as a collective. But do they actually rule, or are we grasping at paranoiac straws? Do they really control all power in order to seek the New World Order, and to seat the Antichrist, as first suggested?
Is it the FED and Banksters? Wallstreet & Culprits, Inc. This rightly belongs in the Shadow category, but it is such a singular force in American life that it deserves to be listed separately. What one giveth, the other oft takes away, resulting in yo-yo financial forces which define our economy in ways which in turn define our politics and national policies. Attempts at to police them tend to be negated with ease by these institutions, who repeatedly bring us to the brink of fiscal doom and then propel themselves forward with profits galore, often out of thin air. But seldom do we gain or recover our losses from wealth redistribution to their favor.
Is it the Corporations? Big Pharma? The Oil Companies? Military contractors? The Board Rooms of legally defined living entities seem to hold sway over Congress and even the President. Monsanto writes laws which give it a blank check, submitted to Congress by their pocket Congressman, and Monsanto backed PACS contribute to other Congressmen to insure passage. Then the President not only signs the Bill into law (deliberate lower case, I refuse to believe his signature lawful), and appoints Monsanto kingpins to guide the FDA to ‘oversee’ Monsanto. We see the same thing in Big Pharma, in the Oil Industry, and in the Defense Sector. The fix is in. The public trough is for sale to the highest bidder; it should be renamed corporate trough, because the Public cannot access it — we just pay for it.
The Constitution and Bill of Rights? This is the very charter which defines the organization, operation, limits and authority of all branches of our government. Without it, there is no authority of the President, Congress, or the Supreme Court. And yet, it does not actually rule us, as such. And most certainly, it seems to be loosing its power as both Congress and the President continually issue laws and executive orders deemed to violate and negate it. This is why so many people deem our leaders to be outlaws, and why Sheriffs are starting to say ‘NO!’ It’s why many people are buying guns, and talking about Revolution being a real possibility.
It’s the primary reason I write, in fact.
We the People? We are, after all, the ones who authored and empowered the Charter. It has no power except that which we gave it by our signature (Founding Fathers), which means neither does the President, Congress, etc. have power but that which the charter affords. We are supposed to be the ones who control government, giving it limited powers to manage our nation for us. Government is supposed to be a tool which works for us, not the reverse. They are supposed to fear our anger should they err, we are not supposed to fear our government, which is more and more our sad state.
Who really rules, as opposed to who is the rightful ruler?
The Poll, in two parts
So please use the Poll so we can see if there is consensus as to who is the RIGHTFUL ruler, vs. who truly rules at the moment. There are, therefore, two parts: who is the PROPER final authority in the power structure; and who do you think really controls us, currently? These two answers will define much of what follows; our fates, and as I fear most likely so, our judgment by God, and, more to the point, how soon it comes to pass. Will that be two o’s or three (SOOON!)?
Please use both polls; you may vote for any THREE choices in each (e.g., the three branches of the Federal government, the three most conspiratorial choice, etc.). The closing comments show why it is important to answer both polls, and will lead to the first of two analysis posts which logically result.
And here’s why it’s critical we know the answer to BOTH polls, as we will explore further in parts II, and III… if there is a dichotomy in the two Polls’ results… where the current power resides not in the hands of the rightful authority, then should not that be rectified? If, for example, the rightful authority is We, the People or even the Constitution, and we find any other in power instead… then ought we not be seeking in earnest to change that?
And more to the point, if we see there is no peaceful way to effect such change, there is a more key question we must ask (part II):
Part III will be a specific analysis of Poll results once sufficient votes are cast.
- One in four Americans fear Barack Obama is antichrist (metro.co.uk)
- Poll: 1 of 5 Republicans Believe Obama is the Antichrist (atlantablackstar.com)
No matter how simple the weapons and tactics of war, you need a checklist; an action plan which is your method to the madness which is war.
by H. Michael Sweeney
How to drop out of society
Continuation of prior post: a checklist on how to drop out
In the prior segment we introduced the notion of going to War with the New World Order by defining the problem, the underlying mechanics and principles involved, and getting a good look at our enemy. If you have not read that, and especially if you are skeptical that such a War MUST be waged, please read it now. We closed with Step Two of how to take the War to our Globalist enemy: Drop out of the System. That, in turn, opens up a series of possible tactics from which one might choose to employ, offered here as if a checklist for customizing your battle plan.
To repeat an important consideration, don’t expect to jump in with both feet, but rather, ease into those things which seem easiest to accomplish, and then expand upon them as opportunity and ability allows, and in like manner, move into other areas. Unless one simply happens to have the needed resources and capabilities in place, it is not likely even possible to undertake all of the ideas simultaneously: Some of them you simply might not care for, or accept as viable or workable with respect to their goals or your personal circumstances. Don’t feel you need to follow these suggestions any more than you need to ‘play their game.’ After all, it is about free will choice; God’s greatest gift to Man short of life itself.
And that’s exactly what we are trying to stop the New World Order from ending. Free Will.
What do I do to drop out of the system?
❑ Don’t buy into the system: Don’t rely upon credit of any form. Debt is control, a thing admitted through history by bankers themselves. They sell credit to you with the promise of instant gratification and convenience, and even ‘perks,’ but the price is not mere interest, but firm control which locks you into their system. Once there, they own you and are assured you will not easily revolt. The banks and lending institutions, and the retail creditors, oil companies all… all rely upon credit to trap you into a Debtor Control System some call the Matrix, or the Grid.
Then there is the endless electronic transaction trail it generates which is of great interest to TIAO (Total Information Awareness Office — since renamed Terrorist IAO to make us think we are not the true targets of interest) to track your every movement. TIA is designed to eventually detect and record any and all forms of social transactions where information, money, or property changes hands, and even to calculate psychological profiles and future actions based on that information.
If enough people stopped using credit religiously, the banks would falter and interest rates would be less artificial and manipulative. The shockwaves would have a negative, inflationary impact on the economy, especially for MIIM corporations, because the dollar would falter against foreign competitors, seeking its true value (0).
Since the bulk of the National Debt is held in the form of Bonds owned almost entirely by the wealthy elite who make up the NWO, their financial power base is eaten away from within by the very stuff they covet most, which dwindles in value and usefulness. While a bad economy also has a negative impact on personal situations, it also hastens the general public’s realization that MIIM’s system serves them more than us, and will lead to more converts over time, and lead to victory and the chance to rebuild anew. That is the long term effect.
In the short term, forgoing credit and relying instead on alternatives herein not only saves you interest (money), but allows you the freedom to choose what you will pay with. In essence, it makes it easier for you to survive a bad economy by relying instead on an underground economy, ignoring fake Federal IOUs in favor of the truest currency of all; value given for value received, in a transaction where each transactional party dictates what is of value, and its worth.
For instance, there are barter institutions which allow you to trade goods and services for other goods and services — no money or little money needs be involved at all. They act as a kind of ‘bank’ trading ‘credits’ used in such barters for a small percentage of the transaction — much less than would be the interest in a credit-purchase situation. But of course, you can also effect barter with individuals directly, often providing increased flexibility in coming to an agreement.
Be careful, however, when using services, because there are tax issues which generally force such services to report at least select transactions, and that may be undesirable. The System is trying to make barter unworkable, even illegal. But in an underground economy, such concerns are no different than highway speed limit signs when hurry, you must. You can simply offer to trade directly with those you personally do commerce with most often. Offer to trade excess items or items you make, or services, for whatever you want. There are people who live completely by this method, not even paying rent with cash or credit, though such is rare. I could tell of wonderful outcomes with barter, personally.
Somewhere, if you ask around with persistence, you will find someone who is willing to trade, and in such a case, you mutually agree upon values and no one, not even Uncle Sam, gets a cut in the ideal circumstances. Enter Craigslist, and the like. Of course, there will be things you cannot easily barter for, many of them essential, such as certain foods, rent, and utilities. We will address such needs elsewhere.
❑ Don’t fund the NWO brand names: Determine what companies belong to MIIM, and boycott their goods and services, and do not buy their stocks. That means some hard decisions. If the company is a military contractor, or a multinational, or owned or controlled by one (a subsidiary), it is a company you should avoid doing business with and one worthy of constant public condemnation in activist style. Also, avoid purchases of any precious gems or metals, since the great bulk of the mines are owned by the NWO — else why to think they push these commodities so hard by selling fear and uncertainty?
Unfortunately, this means doing without certain goods altogether, such as new cars and appliances as technology advances. It IS OK to buy used, if it is not going to be financed. I drive a six year-old car and use a six-year old computer — and they work great. I am not so far behind the technology curve as to ‘hurt.’ I might spend more on repairs but have no monthly payments and the original cost was well below new — so it costs considerably less to give up a little prestige or performance, or whiz-bang feature. Doing so means the system is not profiting by my presence — I am not participating. You can amplify upon this by growing your own food (to be illegal under Agenda 21 and Codex Alimentarius), making your own clothes, and similar self reliance.
❑ Don’t buy the advertising: Boycott the newspapers, magazines, and media outlets owned by MIIM. Obviously, you will need to keep up with the news, somehow, despite the fact that you know you cannot fully trust any such source for complete honesty. I suggest TV can stay, or perhaps radio, but NEVER select ONE news source (channel, station, commentator).
But whenever you hear an ad for a product on ANY mainstream source, or see one in a magazine you happen to read despite your strategy (e.g., waiting rooms), take a moment to write a letter, even if a form letter, to the advertiser(s). Do not use Email for the purpose, for only a written letter will have impact — and then, only if it is business-like and polite. Don’t wax as politically indignant as might I; “Dear Fascist: Regarding your sinful and shamless partnership with XYZ Media in their evil plot to…”
Better idea: tell them you do not trust the media source which aired their ad and believe it biased, because it is owned by (insert the appropriate military contractor or megacorps, here), and thus, you refuse to buy their products because they are paying for disinformation to be disseminated. If enough people did this religiously, advertisers would be more careful, and Media would falter, its income stream hampered and profitability down. It might even wax honest.
❑ Don’t be tracked by purchases: Demand retailers destroy or remove RFID chips on products you buy, and protest their use. Most will have no clue, so educate them at the register, perhaps forcing a call to a Manager… simultaneously educating those waiting in line (no angry rants — just calm explanations and politeness). In the end you will likely need to destroy them yourself (microwave oven for tiny ones, scissors, shredder or burning for larger ones).
Items where removal and destruction is not possible should be kept in a foil pouch when not in use (this includes some state drivers licenses, passports, and other chipped items). Pull clothing tags and similar, and destroy them, shred purchase documents unless you are desperate to be allowed a return or warranty remedy in event of a defective item, in which cass.. Simple discarding may not be sufficient for such items if you think you are being sought or surveilled; trash is not your friend, it is a data mine. Don’t pay by debit card unless it is prepaid and not tied to you by name (one reason many places don’t accept prepaid). Cash is King of safety, though it labels you a convenient ‘terrorist,’ in FBI retailer snitch programs (one reason we need to kill the System; its insane paranoia creates that which it fears in self-fulfilling cycles).
❑ Don’t work for the system; Do not allow yourself to be employed by a member of MIIM or one of their subsidiaries unless willing to use that employment to their disadvantage. An example would be seeking to find and expose information damaging to the company, especially if exposing wrongdoing. I, for instance, took a job working at Shell Oil, where I uncovered a terror plot, by chance. More likely, it would simply be better to take a job with a smaller firm, one more likely to itself be a struggling competitor to the larger MIIM players in its field.
Help them to succeed, remembering that a small firm is more nimble and creative, and can often fare quite well compared to a megacorps, which relies mostly on boardroom antics and bookkeeping tricks to advance its position. If enough people did this, MIIM firms would not know which employees they could trust and it would likely force them to be more honest and less conspiratorial for fear of being exposed. And, they would need pay more to attract better people, driving the wage base upwards for all workers, instead of conspiring to beat it downward.
❑ Avoid the paper trails: Avoid seeking permits and licenses where at all practical. Consider doing so under an alias, and using bogus addresses. An illegal extreme might be completely false ID, or multiple IDs, which I’d not advise as wise unless there was a shooting war. Remember that an alias is legal, as long as it still ties to your true identity. It is where and when you allow a given tie (i.e., your correct phone number) to be used or established that will help limit the usefulness of the paper trail.
If unsure, check with a lawyer. If enough people did this, the tracking systems would bog down in duplicated efforts and be confused by the alternatives, increasing your true freedom; paper trails that go nowhere. You literally route paper trails to alternate addresses or phone numbers. These can be real-World addresses/numbers where you have access and discovery regarding any attempt to use them (by the system), or PO boxes or similar mail drops (i.e., blind drops, double blind drops).
Examples might be relative’s addresses, or unused mail boxes such as where an apartment complex of 44 units has 45 mailboxes (slap a number on it), and so forth. Keep your real world address only for those things which you wish to receive mail for — and I don’t mean bills. They should go to one of the alternates. Have many such alternates, and establish a list of parameters as to the type of material you allow to be sent there. This is how to deal with utilities in a way that reduces trails. There is a difference between a physical address where the service is delivered, and a billing address.
Another very valuable tool is a lawyer or bookkeeping service, or any professional service that is willing to hold mail for you. Another tool is to swap addresses with trusted friends, or to take select mail at work, if you have access to it in a way that is not obtrusive or invasive to your employer. This is an even better way to deal with utilities: send the bills to your lawyer for collection. You can establish a trust and put the bills in that name, or pay directly through a lawyer. There are similar arrangements possible through financial management services available through banks and elsewhere, though they keep records and report to government. Think outside the box, and get some expert advice about alternatives.
❑ Avoid communications traps: Avoid using mainstream communications channels. Use disposable prepaid cell phones you replace frequently, donating old units to groups who give them to battered women and others who need a way to dial 911 without having a monthly bill for the privelege of safety. Read this about cell phone privacy and security issues. Create and employ a steady stream of free Webmail accounts and abandon older ones as you go, keeping perhaps three active at any given time, and using alternatives for varied purposes. I use one for Real-World contact in key transactions (let’s call it the ‘official’ number), one for my most important confidants, and one for things between. Consider mail box services, blind drops, etc., if needing secure and neutral mail delivery, such as described in my book, The Professional Paranoid.
❑ Don’t fall into the insurance trap: Avoid insurance whenever possible, to the extent your strategy allows. This advice can be very bad advice for some people, so be sure to examine the option carefully before you decide. I only suggest some alternative logic paths may increase the choices available to you, which are these…
Insurance is a bet between you and the insurance company and like all good casinos, the odds are stacked in their favor. The bet is this: They bet you and others like you will face problems which requires insurance pay outs which are collectively less than the monthly premiums paid by you and others like you. In the meantime, they invest your payments in stocks and other business deals and earn interest or dividends on your money while waiting to pay out any claims.
You, in turn, are betting that you will benefit by having a problem which exceeds your personal ability to cover the expense yourself. Who cares? Only those who fear the odds should care. The insurance company knows they will win, or they would not make the bet. If enough people did not take that bet, the cost of insurance would rise (because of fewer participants increase their risk to profit ratio) to the point that the system would fail; only the rich could afford it, and they don’t need it.
Take medical insurance. If you don’t have it, hospitals must still accept you and treat you. So you end up owing them a big fortune? Even a three day stay can cost between 12 and 100 thousand dollars! The insurance wouldn’t have covered it all, anyway, and you would still end up owing them a small fortune. If you are reading this, likely, you could no more easily pay back a small fortune than a big one. So let the debt stand, as either way, they would have no means to collect it if you have dropped out of the system.
Regardless, the hospitals (the big ones owned by MIIM) will write off the debt or work with you to cover it. There is also bankruptcy as an option, if they press you, as discussed later. I’ve used that one, myself, and while it had its down side, it had many benefits. Yet in the final analysis, if you don’t pay, and have no assets which can be attached, and don’t care about your credit rating… let them go fish! Bankruptcy is not needed, just toss the bills into the trash, and don’t talk to them on the phone.
Likewise with home or renter’s insurance. If you don’t have it, the worst case scenario is that you are homeless and without your possessions. All the insurance company would do for you, after an endless battle of paperwork and legal moves designed to avoid paying, is help offset some of your expense. With insurance with the same firm for nearly fourty years, I had some $40,000 in computers stolen, and never saw a dime, for instance. But gee, they were quick to pay off a $1,600 repair bill… and increase my premiums to compensate. Good neighbor?
In the meantime, you would still be depending on charity and the mercy of relatives or friends. You can go that route all the way and fare just as well in the end, avoid the legal hassles, and the insurance payments. Sure, for many of you that’s probably untenable advice. But tell me, what are the odds of a total casualty loss? If truly concerned, stuff that money away in your own investment methods against such a need; self insure. Some states have Self Insure laws which make it easier to do that effectively and safely, a bit like being Bonded.
Auto insurance is another problem. In many states, you cannot get a license or buy a car without it. So, perhaps you should not own a car, or have a license. If you choose to drive without and get caught without a license or insurance, the vehicle will probably be impounded or even permanently confiscated depending on local law, so the risk may be great. Or, you could just drive a junker and abandon it to the system in such a case.
But if your identification does not well track to you (per the earlier suggestions), you may care little about the fines and courtroom proceedings demanded by traffic tickets and fines which result. If your car was a $200 beater, as suggested, you may consider it expendable and cheaper to have lost it than paying the insurance and tickets over time.
On the other hand, remember that part of auto insurance is liability, and you probably don’t want to wind up being responsible for another citizen’s financial woes because you did not have insurance. Of course, one can buy just liability insurance and minimally be in the system. But if you are in a ‘no fault’ state, the other fellow’s insurance would cover it, and if he was uninsured, like you, then that was by his choice, making you de facto partners in suffering.
Doing without a car altogether may be the best bet — relying instead on public transportation. In fact, overloading public transportation will tax the system greatly and hasten good results, because it is inordinately expensive infrastructure which never quite pays its own way. Convenience isn’t everything. A Monthly Pass, $40. Watching the transportation system go bankrupt, Priceless. Moreso because they CAN’T shut it down, but will instead ‘bail it out,’ and that will cause more people to join with you, in the end.
❑ Don’t feed the system: Avoid paying taxes where possible, always vote taxes down if given a chance (unless something you just can’t resist supporting), and always demand more services which require tax funding. If enough people did this, the system would be forced to raise taxes to cover the need against the will of the people; more and more citizens will come to realize the system is not working, or not working to meet their needs. The movement grows.
There are many ways to avoid paying taxes, and most all of them are legal, though they represent a significant exposure to harassment and punitive response. It only takes courage to use them. I won’t waste the reader’s time with the details, because there is a wealth of material on the Web about the tax protest movement. Here are a few to get you started, including some eye openers which addresses the tax protest movement in historical and practical terms, as well as religious — many of them (those critical of ‘schemes to avoid taxes’) being created by the system to protect the system (use a grain of salt). On the flip side, some advice is just plain wrong, even fraudulent or criminal (take care).
One can simply decide they are not going to pay taxes, and opt out of the IRS’ system. This is fraught with danger despite claims in some quarters that there are legal ways to do so, per several of the links found in the pages cited above, so I’m not suggesting it is a great idea for everyone. One could further rely on multiple IDs and poor tracking to addresses, and frequent change of jobs (if we had a better job market), declaring tax exempt status each time. You get to keep more of your pay until such time as you feel you are being closed in upon by the system demanding you comply or account for yourself, and then move on, and reinvent yourself once more.
Taken to the extreme, one could obtain false ID under the Social Security number of a deceased person. This would be illegal, and is not being advised — but CIA agents do this all the time, even multiple times for a given assignment. At some point, if a shooting revolution begins, this would be a more logical step, one we should all consider for personal safety. But by then there may be a National ID and chipping in place, rendering it an unworkable alternative. Preemptive moves may be wisest of all.
But if you can seek income from self employment or be legally considered a ‘contractor,’ you become responsible for your own taxation, and that offers opportunities to deal with taxes in a more useful manner. But it would take a book to discuss all of the many strategies involved in a good tax game plan. The Web links provided mention more than I’ve covered, here, including such books. And, of course, it is always true that you should seek every legal deduction or tool you can to simply reduce the taxes actually owed. You shouldn’t need to be a disenfranchised activist to see the value.
❑ Know what the system knows and help them unlearn it: Make a list of every business and governmental agency that likely has information on you. Contact each of them and ask for a complete hard copy of what they hold on you. Invoke FOIA if you must with agencies, and rely upon various consumer laws for the business sources. Force them to expend the hundreds of hours (in many cases) and other resources it takes to comply. If enough people did this often enough, their cost of doing business would skyrocket.
Take the care and time to review information carefully, and fight to have errors corrected. Demand that businesses do not share information about you with others (specifically forbid them to sell your name or information to others). If possible, ask to be expunged entirely from their electronic records. Many laws or corporate policies require them to comply, unless you are talking about data on contractual or financial obligations, or other legal histories of like importance.
❑ Don’t bank with the system: Avoid checkbooks and savings accounts. If possible, arrange to sign over your paycheck to a relative who does bank and have them cash you out. Of course, you can also go to the check cashing services, but they will demand ID and charge a hefty fee. The less paperwork, the better, but if dealing with a relative, have a written understanding between you so that the IRS won’t claim all your money is income they have not paid taxes upon.
The best arrangement would be an employer or work situation where cash payrolls were involved, ideally with no reporting to the IRS. Illegal migrant workers are often paid under the table and don’t get taxed, and thus working for less than ‘minimum wage’ may mean you still have almost the same spending power as if getting the minimum. So, perhaps joining them is better than fighting them for service jobs. That would truly take you off the grid.
❑ Consider Bankruptcy as a tool and a weapon: Do not fear bankruptcy, but do not blindly embrace it, either. Study and know the full ramifications of a bankruptcy as it would play in your specific circumstances, before deciding on its use. For many people, it is a valuable tool for exiting the system. Not only does it allow a fairly clean exit, but it can do harm to the system in the process where the creditors are of the MIIM variety.
I know of some people who deliberately build up large debt with MIIM institutions and firms, and then go bankrupt. Even though they may have hundreds of thousands of dollars in such debts, this is actually only a minor inconvenience and a drop in the bucket to most MIIM players. Still, I suppose, if enough people used this approach, immoral though I rank it, it could add up rather quickly. It is a dirty war forced upon us, and thus such immorality is not mine to judge, but yours and God’s.
Just know that while bankruptcy provides certain protections and allows the complete elimination of commercial and private debt, it does not protect against taxes and may not prevent repossession of some goods. The exception can be one’s home, car, and tools, but laws vary from state to state and even case to case — and the government is trying to make it so hard, it is almost impossible. A lawyer should likely be involved, and that is yet another expense to consider. Even a simple bankruptcy will mean many hundreds of dollars out of pocket up front.
❑ Don’t Educate Within The System: Take your kids out of public school and put them into private school or home school programs. The quality of education will rise (as will the cost, because you will still be paying taxes for schools unless you have dropped off the property tax roles). The moral teachings and principles of leadership and responsibility will once more be included as part of education. If you remain in the system, don’t be shocked when you learn your underage daughter has an abortion without your knowledge, or if your kids start being put on Prozac or similar psychotropic drugs without your consent. They will certainly be dumbed down politically, and have no useful grasp of history for preservation of America’s true heritage and core beliefs.
This ends the overt or outward steps one can take to drop out of the System. There are many other good ideas out there. I’ve tried to focus on the mainmost effective steps to start you thinking outside the box. In the next section, we will look at COVERT steps you can take, thinks not outward in nature, things which will increase your defensive posture should things turn nasty, even to include a shooting war. They remain none-the-less critical to your ability to well live off the grid, in or out of a shooting war, as they leverage your personal abilities by allying with others of like interest.
That will be Step Three, the final step: Establish and underground network
❑ Network and establish an underground: There is already a large network of ‘underground’ players which you may choose to rely upon. For a more trusting relationship, it is easier to start your own. Find like-minded people in your area and establish relationships based on keeping to as many of the below advised procedures as can be achieved. You will find that you can help one another in immeasurable ways.
One of the most valuable may prove to be bartering amongst networked peers, and learning from one another what works and what does not, or how best to apply a given tactic. My wisdom is miniscule compared to someone who is in your exact situation and who has already tried and discarded, or tried and refined a tactic. Make their experience work for you.
One place to look for established networks is public access television and radio, and underground newspapers. You can also find allies through bulletin boards at local colleges and places frequented by modern society’s ‘les miserables,’ such as head shops, book stores, music stores, secondhand stores, and so forth. Political rallies, especially for more Constitutional issues or controversies, is also a good place. While it is preferred that your network be closely aligned politically, remember thaty the enemy of your enemy is your friend, even if they be an Anarchist or Communist at heart.
Start up conversations and be friendly. Find common bonds (music, books, news topics) and get started just like any other attempt to make new friends. Then pose a question or offer a sentence which suggests you are dropping out of the system for political cause, and state your concerns. If they don’t know what you mean, educate them. If they do know, or after hearing your explanation, you will know almost immediately if they are kindred spirits. Develop such relationships with appropriate caution and reasonable paranoia towards possible betrayal. With a little time and patience, you will find some real gems. Discard the losers, and attempt to rehabilitate fence sitters.
Another way to network is to directly use Public Access radio and television resources, or the underground presses, yourself. You can (for free) learn to use broadcast equipment and create and present your own public access programs, or simply be a guest or participant in someone else’s show. Such shows are a wealth of information relevant to a broad array of social injustice and crimes or other victimization, and how to fight back. You will find allies, and you will make converts. In short, you will become an activist if not one already. That is what the system fears most — someone that pricks them, and they can’t reach out and correctively scratch back.
❑ Establish a Personal Network: Within the broader network, set up your own, smaller core underground support group using methodology similar to that used by the intelligence community when setting up an organization or project. This raises several sub topics, to include information as well as personnel issues. First, figure out who is the primary authority for the group (group leader). It need not be you if you don’t have a head for leadership or a desire for the tremendous responsibility it can represent.
Compartmentalization is a key intelligence community tool, and it would serve organizers to read up on that methodology, as well as other methods intelligence spooks employ. A hint of these methodologies is offered in these general guidelines or ‘talking points.’ As you seek to establish your group, these should indeed be discussed among you as issues to be addressed and decided upon.
Terms like covert, secret, and sensitive as used herein could be misconstrued to imply the purpose of such a group is clandestine or illegal in nature. That need not be true, but could be so, to a degree, yet still not be dark in purpose. For instance, you may wish to barter or trade services or goods privately in deference to what the system would prefer or considers legal. You will need a network of people with like interests in order to do this at will, safely. You will want to protect that network from discovery or the system will move to squash it (and you).
Of course, if a shooting war erupts, you will then have everything in place to escalate to darker needs as you see appropriate in defense of your family, country, and the Constitution. Everything will be illegal, then, but the true criminals are the ones judging it so. A network can easily be adapted for true intelligence gathering and black ops against any usurper of power, or formed into underground combat units, were that to become your collective wish. That is the real reason they won’t like the existence of networks. Here are some basic covert network guidelines:
❑ Categorize information: Identify material as being either sensitive (controlled) or public, (uncontrolled) and determine who has both a right to know (authority), and need to know (required to do their job/assignment) for access to controlled information.
Establish a formal means for controlling (restricting) and tracking (recording) both access and the ability to make copies. Never give both access and the ability to copy unless the copies and the process that generates them are also controlled and tracked. You need to be able to reconstruct any possible leak of sensitive information based on who accessed it, when, and how. Eject from your group any violators of protocols, even if accidental or seemingly innocent. The Network’s integrity is more important than risking it further to an uncertain loyalty.
❑ Safeguard information: Where possible, insert dummy information into sensitive information as a further tool for tracking leaks. Dummy information should be ‘detectible’ in terms of identifying the nature of the leak and ‘neutral’ in terms of impact on those accessing it (it should not cause them to alter their legitimate use of the information). It should be unique to a given or limited person or group of persons in terms of access, to better identify the leak source; a given person knows a given thing no one else knows, something which seems important and rightfully sensitive, but which is not, and something which would be easy to detect if leaked (cause visible actions as result). Establish ways to test such loyalties and detect any betrayal.
❑ Control access to information: Organizational members (family, fellow dropouts, and trusted friends or coworkers who support you in any way) should be categorized as protected or visible in terms of identities and operations. Protected individuals will be given and referred to only by code names, and only their operators or handlers (i.e., group leader) will know who they are and how to contact them. A protected person may assume a cover as a visible person, or may prefer to be seen as completely unaffiliated with the group. A good example would be a liaison with another group. A visible person might be a spokesperson, or a Lawyer, etc.
❑ Likewise with operations: Things you plan to do should be categorized as sensitive (covert) or open (overt) in nature. Only team leaders assigned a given operation will know all details. Even the assigning authority (team leader) might not need to know all details, though they will need to know those required to accomplish the goal and the general plan, that they might pick the best team members, and properly monitor the outcome or status of the effort.
Team members (operatives) may or may not need not know precise plans, timetables, operatives, lead-in event details, actual objectives, and so forth. Individual operatives will know only their individual assignments, restrictions or other parameters, and goal, but not have an understanding of the nature of the project or the identities of others involved unless part of the same interim goal.
❑ Form network alliances: The primary authority (group leader) will likely wish to establish special relationships as part of an ‘intelligence’ network for seeking out and sharing of critical information useful to the needs of the group. This should likely include counterparts in similar groups located elsewhere, where such trades of information can be mutually useful. But it might include ‘insiders’ positioned within non underground businesses, agencies, or groups able to provide useful information, persons considered friendly to your cause for whatever reason.
The usual formal first-contact means is a simple presentation of needs/interests and possibly the exchange of bona fides (proof of identity, purpose, and sincerity of beliefs based on prior accomplishments). It is better to rely upon gradual building of trust and bonds. Don’t show all your cards up front; it can backfire and get you into trouble, or scare them away.
You will want to establish simple tests of fidelity for the alliance partners, too, and conduct these with a subtle degree of covert manipulation, being careful to insure you can demonstrate, if caught, any deceit was not intended to be harmful to the other side and was necessary for your satisfaction of their integrity. Restated, give them something which seems like it could be used against you but which would backfire if they do (a trip wire, of sorts), and yet, which you can explain as such should they detect the deceit.
❑ Protect alliances: This creates a network of networks and amplifies the power base and resources for each group. It is acceptable to define limits of operation, mutual goals, etc., each group is willing or interested in working on. It would be dangerous to assume anything about another group, as there can be ‘guilt by association’ complications if something they do causes too much attention. Likewise, whatever you do can cause problems for others, so be sincere and honest when presenting your beliefs and intents, or you may find yourself cast to the wolves by an angry cadre. In essence, you live or die as a group by what you say as well as what you do, so live up to your own stated expectations, and hold everyone accountable for failures so there are no mysteries as to why they failed.
❑ Establish a Recon Team: The primary authority should find persons with skills and real-World resources, contacts, etc., suitable to establish conduits of reliable covert collection of information (intelligence gathering) about key strategic matters relating to persons or groups deemed a threat or activism target of the group. All group members should participate to the extent possible in overtly safe ways, but some individuals would excel in covert application, and their assignment to duties in this regard should not be known to the group. Special skills such as investigative or research skills, photography, locksmithing, communications technology, and computers are good starting points for considering who to assign.
This function is critical in a shooting war, but even if just trying to survive as an underground community, there will be threats which will require attention, and activism toward preferred reforms will need to continue in ways which do not threaten group integrity of operation. To fail to have such team in place as an underground group could be a significant risk if matters evolved to a shooting war.
Additionally, omnipresence in the greater community is desired with respect to information access. Therefore, project leaders and even group members may be asked to separately recruit ‘operatives’ who will contribute to the project or goals of the group without necessarily having allegiance to it, or even be aware of its existence. This is ‘recruitment’ which may involve any of the inducement methods used by the intelligence community itself, provided such methods have been approved by the group leader (some might be seen as illegal or immoral, such as bribes or blackmail). Not everyone will be good at recruitment, but those who are become good candidates for inclusion in the Recon Team.
❑ Establish a security team: The primary authority will also wish to establish a small team of persons who covertly address internal security — counterintelligence. They should be active in various projects as if ordinary team members, but would additional focus on internal security matters (watching for security leaks, infiltrators, etc.) Only the most trusted of persons should be members of this group, but all members should share the responsibility of watching for and reporting signs of security threats, external and internal.
❑ Use a consistent model: Each project leader will wish to mirror the organization of the group in small scale with respect to networking policies and layout, but bona fides will not be an issue, nor will they need their own security team, but rather, one individual would be assigned internal security matters. They will likewise wish to mirror the group leader with respect to operatives who will report directly to the project leader, only.
❑ Be discrete with all communications: Communications between various covert components must be established such that contact, sharing of instructions, information, and reporting, can be undertaken without anyone within or outside of the group being the wiser. The use of code names, code words or phrases, and flag actions (i.e., placing an object in a certain place or position), covert meetings, blind drops, and so forth, will be called for in almost every instance.
❑ Delegate where possible: These operational guidelines create a certain project management overhead which should be delegated downward so that a higher level is not overly involved in the operational details of a lower level. Upward/downward reports or downward group- or team-wide presentations keep leaders and group members informed as appropriate. The group leader should not worry about how the project leader communicates with his operatives, etc. Everyone with a special skill should seek to clone themselves by training a possible replacement so that the loss of any person’s would not seriously harm the group’s operational integrity, and delegate tasks to trainees to test their abilities and grow their confidence.
❑ Weapons of war: Early in the formation of the group, a consensus should be sought regarding definition of what weapons of war are deemed acceptable or required to meet group goals and maintain operational integrity. It is presumed and hoped that such weapons will be limited to the same weapons as used by any activist outside of an underground group (words, public protest, etc.). But given that Homeland Security has placed bid requests for 1.4 billion rounds of ammunition for use outside of the military, it seems clear that someone intends or expects there to be a shooting war, soon.
Therefore, a ‘policy’ should be calculated to everyone’s satisfaction regarding actual weapons and munitions which may be needed if a shooting war erupts, be they intended for self defense or for offensive operations against forces of oppression, be it on an individual or group basis. Considerations should include: a) access — will there money available to purchase, will there be a market in tact which can sell? If not, get them while you still can and stockpile for future need — you won’t want to wait until your only option is a criminal black market under Martial Law; b) choice — is there someone in the group who knows what weapons are good for what uses? If not, assign someone to find out; c) training — is anyone able to shoot a weapon or even comfortable doing so? If not, they should take courses while they still can; d) storage — where will they be kept until needed, stowed by individuals or the group? A secure place safe from deliberate detection efforts will be required.
Thus ends our review on how to drop out of the system and form your own underground. These are fairly basic in nature, and yet may simply be too much for most readers to contemplate. But sooner or later, the way MIIM is heading, we are all going to have to make a tough choice: do we stay within the system and be controlled by it, or do we break away from the system and seek its destruction, or at least be ready to do so at some strategic point before it is too late to do so?
Our survival as free-will individuals and citizens, and as a free nation, will likely depend on that decision. Better to make the decision sooner, than later. Better to do it methodically and with good principles of operation than by spontaneous guesswork. When MIIM makes its final moves, the warning may be mere hours before they start going door-to-door and results in shooting, and it will be too late for decisions, much less planning, then.
Do I hear someone knocking at your door? Better check your political watch and peek out the window before you open it.
- 20 Key Ways to Defeat The New World Order (thedailysheeple.com)
- New polls on N.W.O beliefs and need for Revolution are in! Truth is rising in the light! (notesonthenwo.wordpress.com)
If you are no fan of the notion of a fascist, satanic World government ruling a depopulated World with all the power of the Antichrist, you may want to know there is one simple weapon we hold that the NWO fears we will discover and use, one more dangerous than guns.
How to War with the New World Order (a Primer)by H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How to war with the New World Order
Any enemy can be defeated if you know their weaknesses
Follows is an abbreviated collection of excerpts and updates from my book, The Professional Paranoid Defensive Field Guide, which includes many more such tactical advices, many being useful in any kind of war the New World Order force upon us, even a shooting war. But this post addresses a war that we can more safely bring to them, one non violent, perhaps forestalling the need for guns altogether by stopping the NWO cold.
Regardless, it also undoubtedly gets me listed officially as a ‘financial terrorist’ with evil Men in Black (or Army green, Police blue). Who cares? We are all treated as terrorists anyway, pending a moment of convenient political gain for actual ‘attention’ to our particular branding. Screw them and their paranoiac need to so label free thinkers, of whom Thomas Jefferson says government should rightly fear (for cause of making them BEHAVE RIGHTLY).
They can NDAA-vanish me at anytime, if they dare — just as they can any of YOU. That’s the whole point, isn’t it? If one man is not free because government violates its own Constitutional Law, then no one can rightly claim to be free. And so, given Homeland Security has placed bid requests for 1.4 billion rounds of ammunition for use outside of the military, the threat of an outlaw government seeking or expecting a shooting war with Constitutionalists forces me to write. If they so expect, so must we.
I must write, if for no other reason than personal self defense, which depends in turn upon the successful defense of others, give such advice. It is the collective WE, The People, who must survive, not mere individuals. Governments can come and go, can fail and be reconstituted, overnight if need be. But if freedom dies and We the People become a historical footnote, transformed into mere chattle as manageable individuals for feeding the profit grist mill of a corporate state (that’s fascism, by the way), something precious and extremely difficult to replace is lost for a long, long time.
The advice of which I speak consists of three simple steps, each with multiple topical elements, options, or ways to grasp and effect them. This post details Steps One of three. Collectively, they would allow us to be effective in the effort, and better assure individual and collective safety even if armed conflict is forced upon us.
And there are other resources online, some of which I have linked as you read. There is, for instance, fightthenwo.org, numerous sites promoting an effort called ‘global noncompliance’, and illuminati-news.com, where one finds an article somewhat like my own. Just type in the appropriate search terms to amplify your knowledge base, and your options, and to cement your confidence if daring to stand against the machine as do I.
You and I are not alone, given the broad range of topics which stir people to activisim in causes with which you should become familiar, for it makes of such persons a thing called allies. You need not agree with them all, but we all should stand together, for all such activists become targets of the NWO. I’m talking about things like Agenda 21, Canamex Highway, gun bans, Codex Alimentarius, Digital Angel, TIAO Dataveillance, RFID, NDAA, the FED, Political Control Technology, Chemtrails, Animal Rights, Occupy, Anonymous, and on and on and on.
Often, we should consider allying with both sides, perhaps one more than another if so moved — but ever mindful that the enemy loves to divide and conquer by fueling our disdain for one side over another. Fighting amongst ourselves means we don’t even see the real enemy. All these groups, save moments of manipulation, should be ally and enemy to the Globalist agenda, and not enemy, mine. To steal from another anti-NWO group’s slogan… which I essentially endorse, and again for which the operative word elected is WE…
“We are Anonymous. We are Legion. We do not forgive. We do not forget. Expect us.”
What can we learn from Anonymous? The most obvious lesson is that invisibility equates to an invulnerability to retaliation. Sure, they have losses, but the group is getting stronger and gaining in popularity in pop culture and elsewhere, and doing some real good as it goes, as some count good (no movement pleases all its supporters all the time). But by and large, their integrity as a working force against evil is unchecked because of their anonymity. They are off the Grid, beyond the Matrix (though hiding within and manipulating it), they have gone Underground.
That is were we must be to be both safe and effective in battle; underground.
So begins our review on how to drop out of the system and form your own underground — which is also to say, how to more covertly and safely defend your country from enemies foreign and domestic. These are fairly basic ideas, and yet may simply be too much for most readers to contemplate actually undertaking, at least wholesale (easing in may indeed be easier). But sooner or later, the way MIIM is heading with insane abandon, we are all going to be forced to make a tough choice: do we stay within the system and be controlled by it with no recourse, or do we break away from the system and seek its destruction through violent confrontation, or at least prepare for that eventuality? I think dropping out is a better, safer choice, one which also serves as preparation for a possible violent day; it covers all bases.
Our survival as free-will individuals and citizens, and as a free nation, will likely depend on our decision. Better to make the decision sooner, than later. Better to do it methodically under a plan and with good principles of operation than by forced into spontaneous guesswork on the fly by sudden, unexpected perils. When MIIM makes its final moves, the warning may be mere hours before they start going door-to-door and shooting erupts, and politically incorrect persons are vanished. It will be too late for decisions, much less planning, then.
What can be done to stop the New World Order?
Step 1: Understand the Problem, Know Thy Enemy
One must realize that the New World Order movement, with its roots going back to the Satanic Illuminati in, perhaps not so coincidentally, 1776, was a centuries-long plan to form a one-World government that their might be one World leader; the Antichrist. Believe it or not, we are dealing with powers and principalities, a relentless and seemingly unstoppable force which never sleeps, has countless minions of dark allies and dupes like forces to work with them unknowingly, and employs clever deceits and sinister plots to lubricate its machinations. Most of the battle is invisible, as often is also the outcome; we can loose significant ground and not even be aware until much later — the price of forgetting or pretending there is no Satan or Hell… or even a God, for too many of us.
It is not the United States Federal Government, or the United Nations, or the initialed Agencies or Department of Defense, or local law enforcement that we face. It is not globalist corporate giants, the FED and Jewish or international bankers, or the Military-Industrial Complex or the oil companies who are our enemies, nor their boards of directors, foundations, religious and charity fronts, or their political action groups. It is not the modern-day leadership of Illuminati philosophies inherent in the Power Elite round table groups such as the Bilderbergers, Club of Rome, Council on Foreign Relations, Tri Lateral Commission, Rhodes Scholar disciples, or even the infamous Skull and Bones/Thule Societies and their counterparts, or even the Freemasons from which sprang the Satanic Illuminati. Neither is it CIA, FBI, NSA, DHS, DEA, ATF, ONI, DIA, or any of the endless initialed investigative and enforcement agencies.
No. It is instead all these entities combined, and much, much more, who make up the face of our enemy. To define or limit the enemy to any one group or several, short of the whole, will miss the mark, and fail. It matters not if they participate knowingly in support of Illuminati goals, or by coincidentally by coincidentally aligned or secretly guided agenda. They are the collective wall of hardened, massive stones which lay between being free in all pursuit of life, and being a slave dead to God. Those stones form the Pyramid upon which sits the All-Seeing Eye, which is the symbolism of the very Antichrist and End Times; the ‘eye’ of Lucifer taking up the key-most position (where one should instead find a stone referred to as the frustrum), thereby frustrating the placement of the capstone, the return of Christ.
The question then arises, what chance does the individual (YOU, me, all of us who prefer FREEDOM and LIFE to slavery and death) against such a vast array of forces? What chance would we have to make a difference in what essentially appears on the surface to be prophecy being fulfilled, day by day, regarding a predestined final-day battle between God and Satan? Who are we that dare intercede in such contests between Titans of Biblic proportions, and what could we possibly hope to contribute of any value or impact in a battle of such scale; that which leads to and includes the showdown at Armageddon?
The answer is, in my humble opinion, EVERYTHING.
It is not simply God vs. the Devil. It is God and the good sought and achieved by Man through God’s gift of free will vs. Satan and the evil done by Man by subversion of free will. It is about righteousness (right-use-ness) vs. evil (vile-ness), both effected by our own individual choices. I believe that to the extent that there remains sufficient good will and righteousness in Man in his time on Earth, the date of Armageddon, and those things which lead to it, are delayed. Scripture refers to this as Grace.
This whole notion is reflected manifold in scripture, for those willing to heed a rather short Bible lesson, which is an all important part of Step 1 — to fully understand the stakes involved and the true unseen mechanisms which guide outcome…
Jerimiah 5:1 regarding God’s Judgement upon Jerusalem for failing to honor God and his Commandments says “Go up and down the streets of Jerusalem, look around and consider, search through her squares. If you can find but one person who deals honestly and seeks the truth, I will forgive this city.”
Genesis 18:26 regarding Abraham’s prayers beseeching God not to destroy Sodom, God says in respose, “If I find fifty righteous people in the city of Sodom, I will spare the all the place for their sakes.” Abraham negotiates the number down to 10, an important number spiritually.
Romans 2:4 tells us why the forbearance of Grace is offered (though all-too often sadly betrayed by Man’s delight in sin) with “Or do you show contempt for the riches of his kindness, forbearance and patience, not realizing that God’s kindness is intended to lead you to repentance?”
2 Peter 3:9 is more to the point with dialog on the coming of Judgement Day, and Christ’s return. “The Lord is not slow in keeping his promise, as some understand slowness. Instead he is patient with you, not wanting anyone to perish, but everyone to come to repentance.” Being patient, he gives us time (a period of Grace) in which to work toward salvation. What we do with that time is our own choice.
But if we make no effort on behalf of good in the face of evil, no matter how overwhelming it may seem, then we deserve the fruits of evil, as spelled out in Ecclesiastes 9:3 “This is the evil in everything that happens under the sun: the same destiny overtakes all. The hearts of people, moreover, are full of evil and there is madness in their hearts while they live, and afterward they join the dead.” More such as this can be found.
So let us also heed God’s advice and enter into battle. Ephesians 6:13 tells us how: “Therefore put on the full armor of God, so that when the day of evil comes, you may be able to stand your ground, and after you have done everything, to stand.” Much more is also available on this topic, as well. But hey – this video says it in an extremely beautiful way.
The number 10 in the Bible (and elsewhere), for instance, represents fullness, full measure, fulfillment. Thus, as long as Good can be seen sufficiently ‘full,’ as in ‘full of Grace,’ which is God’s forgiveness and forbearance, there is no reason for Judgement Day to come to pass. Should Man drop below a rating of ’10,’ Judgement is enabled and will come to pass. Thus, I argue; it is all up to you and me, to decide that moment — perhaps why ‘No man knoweth the hour,’ of that day, for we cannot take self measure.
The Bible offers more and better advice, than this feeble attempt at presentation. I simply offer how you might apply it using specific strategems. Let us consider:
Short of armed revolution, and in the absence of any seeming control over our government through the traditional election processes, the alleged system of checks and balances and for obtaining redress in the courts… as illustrated by the failure of Congress and the Courts to ever address crimes of the White House, or to curb the military or intelligence communities when they go awry… and surely their failure to quash NDAA, the Patriot Act, the outrageous acts of TSA, ICE, and all such madness — is the option to undertake another kind of war with the NWO; a guerrilla war fought on our terms, not theirs. I speak of an offensive war, one which effects a defensive posture, as well.
It may be time we take the battle to them, and use their own System to ensnare them.
Let’s face it. The enemy, as it otherwise stands, holds all the cards: We must use their money, follow their laws and suffer under their court judgements (for most of us, relying upon their lawyers appointed on our behalf — unless we are wealthy, in which case, we are more likely part of the problem), are subjected to controls by their police and military, must depend on our news from sources their Military-Industrial-Intelligence-Media complex (MIIM) controls, send our kids to schools in an educational system they manipulate, and use their insurance to visit their Doctors, hospitals, and take their drugs, etc. All the way we foot the bill for these things which define our limitations, and profit their machine.
At every turn, they hold control over our lives: we cannot get a job without identifying ourselves using their number. We cannot keep that job without giving them a huge portion of our wages as taxes, which they then frequently use against us, along with other monies they manage to extort, steal, or siphon from us through societal forces of their design. We cannot well protest our lot because they own the media by which we would have our say, and we use an Internet rife with their control, censorship, and eavesdropping (there is a better Web alternative in works, however — take a look).
We cannot ‘vote the scoundrels out’ because they control the voting process and the choices we are to be given. Ergo, Dog and Poney shows replete with hanging chads or worse, and if not that, assassination of candidates or death threats against them or their loved ones. In short, the terms ‘Republic’ and ‘Democratic Process’ have become a sham, as no matter who we vote for, the same old policies are continued toward NWO domination.
As bad, ‘redress’ is a word no longer in the American political lexicon; the System is rigged at every turn to defy it except in the most well-funded of battles, it costing millions for instance to employ media to advantage, or prosecute a case through the Courts, and the Internet is so controlled by cyberwarrior tactics that most organizational efforts there are easily derailed through infiltration and sabotage. And now they want to take the guns, which if allowed to come to pass, will mean all doors for redress can be permanently shut tight against us.
No thank you. Gunfire before gun grabbing, for me.
But the purpose of this post is to avoid the need for that eventuality. We must realize who MIIM is, and deal with them accordingly. MIIM’s arrayed forces and allies are by and large fascists and racists, and even Satanists, or some combination thereof. They tend to be psychopaths and sociopaths who wield immense wealth and power in all areas of societal and governmental structures. Their collective is hundreds of years old, and thus, they have had ample time to calculate and think ahead, to plan for every contingency, and tend to easily defeat a defense before we can think to undertake it.
But there is good news in all this.
Despite their position of dominance, it happens that there is one thing all principalities and powers fear, something which we possess… something they fear we will discover as the weakness or flaw in their plan. And it is such a simple thing, and defines Step Two. The beauty of it is, that implementing it now not only weakens their hand and strengthens ours, but if at some point the war becomes a shooting war, we will stand a much better chance of being able to either run and hide or to stand and fight. Either way, it will be harder for them to find and manipulate and destroy individuals, and thereby, the whole.
You can do neither if they collect you, first, or already control you outright in their System, what some call the Matrix. The solution? That’s the next post…
What scares the New World Order?
Step Two: Drop out of the System:
To explain that first requires that we understand what the System is. The System is two infrastructural parts; the commercial side and the government side. The commercial side sells itself to you every day. Advertising for products and services creates desire. Desire leads to purchase. Purchase yields profits against cost, and is a two-edged sword used against you. Part of the cost is payroll, which is used to pay you less than you are actually worth. They reap the GNP at your expense; you provide both the labor and the capital which drives their machine, so whatever they pay you, they get back by the resale of your fruits (you effectively work for free by giving them back their own money in exchange for very little of true value).
All along the way, taxes are levied to fund the other part of the System. They win-win, you loose-loose, but you get (something) they’ve convince you that you can’t live without, despite the fact that the World did just fine without it since the beginning of time. Everything from better deoderant to cars that talk, from perfect pills to pornographic movies through your cable company. And let us not forget GMO produce and foods so processed and full of additives that ants no longer eat anything in our kitchens but raw suger. As Dr. Phil has said, “If it wasn’t food 100 years ago, it probably isn’t food, today.”
Lucky you to have it so good, at long last. Whatever happened to happiness; the contentment that comes from simply living and enjoying nature and the company of others, and the fruits of our own labor? Who decided that these things had to be purchased in newly constituted forms, and that we should have no other choices? And, I might add, who can believe anything they tell you about what is good for you when every few years a new study reverses a previous finding, and perfect pills result in class action law suits for the harm they do?
Oh, but the System cares not for trivial details as these, because we are so dumbed down we don’t see the problem, and buy the next new thing.
Meanwhile, the government part of the system tracks and manipulates our participation in the first part in many ways. Your social security number, as mentioned, plays a major role. Your credit rating and banking numbers further track your every move financially, and government’s FINCEN (Financial Crimes Enforcement Network) and the Total Information Awareness Office (Department of Defense) are both gearing up to access every transaction from birth to death for every citizen. As the Bible has predicted, you already can hardly buy or sell without a number of some sort, a de facto Mark of the Beast by some accounts. But that yolk has not yet come to pass in its bitter fullness (Digital Angel awaits you).
The money itself also has tracking systems built into the bills (the little embedded strip you can see holding the bills up to the light can be sensed by special equipment), and FINCEN will be able to track cash as easily as credit once it is fully established and retail systems have evolved to accommodate the technology, called RFID (Radio Frequency Identification Device).
The Military AND the commercial side are partnering to establish wholesale use of RFID technology which will allow transactional tracking at points of sale to include a complete and total understanding of each and every product you purchase, effectively giving it a unique serial number. It can tell how and when you acquired it, whatever it is, right down to razor blades (already chipped). In fact, retailers have actually used cameras to track shoppers as they move through the store by zeroing in on select RFID chips in products in their cart, or already owned and in their possession (e.g., lipstick tube). You are the sum of your RFID, and once cataloged, you can be tracked anywhere.
As you read this, cash registers, inventory control systems, and security systems (doorway monitors, cameras, traffic monitors) are being designed and built which can scan RFID at a distance. Millions of credit cards, mailing labels, ID cards and driver’s licenses, and even cell phones have already been chipped with RFID, and some things, like select cell phones and cars, include GPS tracking. Security cameras and roadside or sidewalk monitors are being upgraded to track them. Unless you go naked in the World, or make your own clothes and use no manufactured objects, you can be tracked by RFID, because everything manufactured and sold will eventually have chips embedded.
We register with government for everything. We register to be born and to die. We register for school, to vote, to get driver’s licenses, to fish or hunt, to buy or rent a car or home, to have a phone or utility services, or to save a little extra money when we shop or to use credit, and so forth. At every turn we are giving out information about ourselves which is fed into computers, computers with back doors and inherent ‘links’ or leaks between databases to serve marketing and or government purposes. Hence Dataveillance.
How else do you suppose that you get so much junk mail with your name on it? One CIA front (two fronts, actually, one here and one in Europe), as I document in my book, the Professional Paranoid Defensive Field Guide offer to sell information on 98% of American adults. The other two percent have already dropped out of the system. Why should government intelligence agencies be in the business of spying on you and then selling your little ones and zeros for a profit? Do something about it, and drop out. Let them sell just zeros, if they can.
If you elect to remain in the System, if and when they want to reach out and get you for some reason, they will know right where you are, that very moment. Their data will let them profile you psychologically and predict your actions (as described in the Department of Defense’s original RFP White Paper for the TIAO). Don’t answer that knock at the door… you don’t want what they are selling. And you won’t be able to run at that point, because they can freeze all your financial assets, and in some cases, can remotely disable your car, and in all cases, turn resources such as your cell phone against you. It will be too late, then.
Proactive and preemptive tactics are what you need.
To preempt, disengage yourself from the system. When someone drops out of the system, the overhead of the system is actually increased to a degree, but the funding thereof is reduced. This causes subtle instability within the system which impacts the remainder of those still within the system. By deliberately weakening the system in this way, the New World Order is forced to become less transparent, and more domineering, more visible to those who have not yet seen that particular light. It compounds like interest as more and more people figure out they should exit.
Thus, more persons will exit, recruiting others as they go; the cycle will continue to the point where the system must either fail, or seek to seize absolute control sooner than it otherwise intended, before they are ready to do so with full confidence of victory. A shift in balance of power is achieved, the stronger side left unstable and off balance, giving the weaker side a chance to make significant gains with smaller efforts. The domino effect, slow motion though it will seem, at first.
Dropping out is fairly easy — just stop playing the game. Take actions which reduce your exposure to their ever evolving control matrix, and which free you up for further actions at reduced risk. Risk tends to lessen with time as you get better at living off the grid. Most of these things are very easy to do, and have little true risk, but may represent major inconveniences or social roadblocks up front.
You may likely face serious decisions about how you execute such a plan, and to what extent you are willing to go to make it happen. Fortunately, it need not be an overnight matter, which means you can ease into it over several months time, perhaps a few years (presuming we have that much time remaining). Just know that for every cost you are willing to bear up front, the benefits to which it leads tend to be far more valuable in the final analysis. The more steps you manage to accomplish, the easier are the remaining steps.
This ends the introduction to Step Two. What follows in the next segment are a series of suggested guidelines or action options to actually be effective doing it. Some of them you simply might not care for, or accept as viable or workable with respect to their goals or your personal circumstances. Don’t feel you need to follow these suggestions any more than you need to ‘play their game.’ After all, it is about free will choice; God’s greatest gift to Man short of life itself.
And that’s exactly what we are trying to stop the New World Order from ending: Free Will.
What are the tools of the New World Order?
Next up: How to War With the New World Order (Drop Out Checklist)
A reality check for citizens in every nation, democratic, communist, totalitarian, or religiously governed (e.g., Islamic); terrorism is not waged between governments or ideologies as outwardly advertised, but a covert weapon for political control used by Globalists against all peoples, especially the very members of terror groups duped into participation. More to the point, it is waged by powers and principalities, against God and Man, and serves Satan.
Globalism’s Deliberate Self-Fulfilling Cycles of Paranoiac ‘Terror Threats’
by H. Michael Sweeney
What you will learn reading this post…
- Terrorism is a sham, a weapon of political control technology;
- Terrorism never benefits terrorists in any real way, given the backlash;
- Terrorism is never approached as a problem to actually be solved because it serves the ‘target’ government’s interests as long as it exists;
- Terrorism is about control of the masses through fears designed to sponsor a willingness to subjugate ourselves to the New World Order;
- Therein is the real secret; the NWO is Satan’s Illuminati plan to seat the Antichrist, terrorism being a mere tool.
Who benefits from terrorism?
Reality Check Time for citizens of all nations
Rewind the clock and review the last few decades or so — the time frame of the alleged ‘War against Terrorism.’ If you consider cause and effect relationships with much care, you quickly see that there would be no terrorism of true consequence except for government’s need to both instill fear in you as a form of Political Control Technology (behavior and thought control through deciet), and as a generator of ‘fuel’ for that very mechanism.
Look more closely, however, and we find even the governments are not the true benefactors. That would be Globalists, which put in other terms, is the modern-day Illuminati; the New World Order movement for a one-World government. This is governments run by the power elite, also called Fascism in some circles. Such rule is required if the Antichrist is ever to come to power. That is what I hope to illustrate in this post, along with some other eye openers of like nature:
Case Study; Control Group
But before we do that, we should first establish and consider, in the method of good scientific study, a ‘control group.’ We can then hold up the control group for comparison to the ‘terror group’ of events we will consider to make our final findings. Any differences should be for us valuable clues. For this purpose, let’s use something entirely unrelated which, like terrorism, represents a deadly threat to lives and the wellbeing of any nation; traffic accidents. Rewind the last decade or two in your mind and replay as you consider…
At regional and local levels, mostly, and to somewhat lesser degree at national levels, the high death toll and financial cost to the nation inherent in traffic crashes, including GNP impact, typically sparks ongoing efforts to improve highway and auto safety. This consists of an endless series of changes in rules, laws, and regulations, as well as advertising campaigns to educate drivers.
Specific examples over the years would include improving crash safety standards for auto makers, improved highway lighting, signage, and general design considerations, mandating seat belt use, ‘Don’t drink and drive,’ and other safety ad campaigns, tougher traffic laws and fines, more enforcement, and so forth.
In replay of that history, can you uncover recollection of ANY instance where a given governmentally sponsored approach significantly resulted in an INCREASE of traffic accidents or fatalities? I think not. The point is, in this control group review, we see that a problem which is seriously addressed for its own sake tends to evolve improvements, rather than degradation, over time. Restated, a legitimate problem genuinely and sincerely addressed in this way can always be made better by a cure, or an ineffective cure can be discarded in favor of a renewed attempt.
We must also ask, for reasons which should become apparent, who benefits thereby? The answer is, essentially, everyone. Drivers live longer and suffer less as a class, costs of accidents go down, though costs of ownership of vehicles tends to increase somewhat due to more expense in manufacturing and, for some, higher fines or fees associated with use of their vehicles, and taxes for improvements in highways. Most of us are content with these offsetting costs, and do not complain too much. The nation’s quality of life and GNP are enhanced.
More to the point, there are no significant losses of freedom or increases in political control by government, though new laws addressing safety issues may impose changes in procedures and provide for penalties; no one is unduly oppressed or repressed thereby, and basic rights remain unscathed.
Hmm… that seems to fit rather well with Titus 2:7 “In all things shewing thyself a pattern of good works: in doctrine shewing uncorruptness, gravity, sincerity.”
The Comparison Group; Terrorism
Rewinding and replaying the same period of time, but this time looking at Terrorism, let us compare to the Control Group. One difference we see almost immediately is that virtually all of the effort to combat ‘the problem’ stems from national government responses, rather than regional and local levels. They, alone, by and large, have defined the problem and ‘solutions offered.’ That, alone, might be a significant clue; a small handful of Men, all of like nature and purpose within the power elite, control all aspects related to the issue.
Indeed, no one else’s opinions are even allowed to hold sway, regardless of their quality of logic or popularity among the People. In almost every case we find, in reverse to the Control Group, that their actions have stimulated, rather than abated, the problem of terrorism. Indeed, if we go back far enough, we find that the problem did not even exist except for the causality of their actions. To make the point, let us look at several ‘models’ of terrorism. Start with the European model:
Go back to the time prior to the European Community, and you find that terrorism essentially was non existent in the early years of Post War Europe. But it came to be, based on the nature of groups formed to foment terrorism, because of ‘Cold War tensions,’ if we believe the political rhetoric of the day. Based on the rest of this presentation, I’m thinking you will rightly conclude that assumption a sham, and the true cause lay elsewhere: false flag psychological operations. And should you not naturally so conclude, we will see there is proof it is so.
In point of fact, the processes which will be described, next (in the American model), apply to quite well to the European model. Terror attacks in Europe enabled the same exact processes, and in Europe, I assert, directly helped and led to the formation of the European Community, itself, a key Globalist early goal. Remember that notion as we near the end of looking at the American model, which will bring the point home in unexpected ways, and fully relate the Globalist aspect.
I only thought to bring up European model because it underscores and echoes in reenforcement the discoveries we will find in the American model. Any nation which has in the past or currently experiences terrorism should find these same factors in play, as well; they are portable concepts useful in any governmental environment. But in all cases, they serve only one special interest group, a group present in every governmental environment; Globalists. Allow me to make the case…
In America, terrorism was not even in the American lexicon until CIA began funding, training, and arming radical Muslims as part of their meddling in the affairs of Islamic nations rich with natural resources. Such meddling is a sure-fire way to generate resentment and hatred given their religious beliefs, beliefs which impact political actions in ways perhaps uncommon elsewhere.
I remember, in fact, one of the early newspaper articles (and later, others) on topic having to actually DEFINE the basic terminologies of terrorism in order to write about terror events. The point is, however, that we can lay terrorism at the feet of CIA and American foreign policy (on the one hand closest to our observation), and, as we will see, on Globalism, on the other, less visible hand.
If I were willing to make this blog longer than you would wish it in reading time, I could detail that for you to a level which showed CIA and the Department of Defense, often in alliance with military contractors and Globalist firms, actually imported most terrorists we have heard about acting on US soil (and elsewhere), often aiding in their visitation, training, and financing up to the moment of their terror acts, and even in their escape and any subsequent reentry into country. This I do in my four volume bookset, Fatal Rebirth, with over 1,500 footnotes of factual evidence. Want a free ebook of volume one?
So we see right away that the very problem was created by government. In defense, or rather concealment of the fuller truth, they claimed it unintended, even coincidental or unavoidable, and most of us believed them. But the footnotes I speak of show otherwise, especially in terms of lesser known ‘smoking gun’ events. One test of the sincerity of the claim is the question, does government move to ‘address’ this new terrorism problem as they did in our Control Group? Well, sort of…
The very first effort in response of note was the Patriot Act, a major assault on Constitutionally guaranteed liberties which, they promised, would be repealed as soon as they got a handle on the problem. Tyrannical governments which have evolved throughout history have always got their start with that very argument in justification of repressive actions, creating for themselves that slippery slope of no return. So many times have they had the chance to repeal the Patriot Act and instead elected to extend it, if not add to it, that I’ve lost count. Full grease ahead, downard, Ho!
Virtually all Congressional and White House actions aimed at combating terrorism have followed this self-same pattern: repressive responses which reduce Liberty in exchange for alleged security, a formula known to leave the people with neither, and which instead leads to a totalitarian police state. That’s how the Communist revolution in Russia led to something Karl Marx never intended for his movement. That’s how South American dictators grew their power. That’s how Hitler came to be, and so forth. But it is not how you combat terrorism, for it has not abated, though one may argue there is a current lull. So again, I ask, who profits?
To be sure, not the terrorists, who are guaranteed to generate a backlash against their own homelands. Examine all of history, and it is rare to find an example of the use of terror which resulted in good outcome for the nation from whence attacks originated, and on whose behalf their acts were supposedly committed. Their people suffered, typically through military response, worse casualties and consequence, than did the nation targeted with terrorism. It is a loose-loose situation for terrorists. There is but one exception, to be noted shortly.
Indeed, it is instead the nations targeted by terrorism who benefit. Not the citizens thereof, who bear the brunt of attacks at a personal level, but the men and political forces in power. Terrorism, in fact, gives power to the national government and its leaders, big time. Always; Hitler the perfect example. In international terrorism, the real loosers are the citizens of both nations, and more importantly, all religions who worsiph the God of Abraham; the Jewish, Christian, and Islamic faiths for whom terrorism is a great tool for Globalist (Satanic Illuminati) divide and conquer tactics.
But it is a double whammy for citizens of the target nation, because they not only suffer the casualties of attacks, but the loss of freedoms and rights usurped by a government become more tyrannical. Such benefits are why false flag terrorism is often the tool of one’s own government. Hitler used it, and many Americans are convinced George Bush used it in Sept. 11, and so forth. Fatal Rebirth offers much evidence in support of that belief. Such powers and principalities go out of their way to foment or fake terror acts, even if they have to supply and fund the ‘leadership’ of the terrorists and grow them into a local power — the only terrorists to benefit being those paid and empowered at leadership levels.
Proof, in Fatal Rebirth, shows the number two man of al Quaeda, in fact, to be a double or triple agent working for CIA and the Department of Defense. That’s right, the man who not only planned, but helped execute the attacks on American Embassies, the USS Cole, and the bombing of the World Trade Center, the man who managed to put bin Laden into power and unify other terror groups under his command… was one of our own. And if that were not enough, he held a job with a major defense contractor when not employed by the United States Army.
Is terrorism false flag?
Terror culture growth in a petri dish
The macro illustrates further. Government actions to combat terror actually stimulate it, rather than fighting it. Every action in the Middle East has tended to angrify Muslims even more, making it easier for them to recruit combatants to use against us. Middle East policy continues to be based on previous failures, with no learning curve in evidence. Even those things we would outwardly see as ‘good acts,’ were often deliberate betrayals.
For example, an American company providing schoolbooks for use in the Middle East for very young children used pictures of bombs, grenades, and guns for counting exercises… early enough that by the time CIA was training Osama bin Laden, those children were old enough to be recruited into al Quaeda. Now, once we have invaded and seized control of Afghanistan, the same publisher is providing books with butterflies and Poppy blooms. So now, instead of growing terrorists, Afghanistani youth will grow up thinking it perfectly normal to grow and sell the crops used to make Heroine, those fields guarded by American soldiers as you read.
We continually arm radical groups for use against their own local regimes we conveniently deem ‘repressive’ after decades of working with them as allies and arming them to the teeth in many cases. And then wonder why the radicals soon enough turn those weapons on us, irrespective of if a new regime was put in place, or not. Moreover, any new regime is more dangerous than the old, outwardly, though I maintain it is an intended consequence. This is indeed on purpose of our terror and foreign policies, as reflected by the fact that we keep repeating these mistakes as if oblivious to their cause and effect relationships. There is proof.
Fatal Rebirth, recounts a specific PowerPoint presentation at the Pentagon by Defense Policy Board kingpin, Richard Perle, part of the PNAC (Project for a New American Century) plans to take control of the Middle East, and by capture of the bulk of remaining Oil repositories therein, to control the World. It is all based on concepts espoused by the Council on Foreign Relations and other Globalists, and Zionist interests via a partnership with a joint US-Israeli think tank. It laid out a multi-year, multi-war/revolution plan for takeover of the major Middle East nations in domino fashion, specifically with the intent of giving control over to radicals, specific persons controlled by or partnering with Globalists. Every war in the Middle East, including the more current revolts, was in the Power Point, with more such to come.
For example, Fatal Rebirth shows you that the top two people now running the Afghani government were both former CIA employees who also did work for the Oil Industry, and both were directly involved in trying to get the Taliban to grant oil and gas pipeline rights to American oil companies. Do you honestly think citizens at large in Afghanistan would benefit by and approve of covert CIA/oil industry control of their nation in the guise of a new democracy? This is what I mean when I say outwardly, new regimes may seem less than friendly, but secretly, they remain Globalist puppets to perpetuate control mechanisms there, as well as elsewhere.
Make no mistake. This is not an American plot so much as an international plot by Globalists, the modern Illuminati.
This is also revealed in the referenced PowerPoint, where even darker aspects tie directly to Mysticism, Satanism, and Illuminati principles, matters requiring too much detail to explain in this venue. But I will add that Perle himself has his own CIA front-like operation which works directly with Arms smugglers for the purpose. Stability in the Middle East is NOT a goal, and never was. Such political machinations foster a kind of hidden control of the Middle East through secret alliances with terrorist leadership in exchange for quid-pro quo cooperation (attacks). There is no usefulness for political control plots found in peace and stability.
This covert alliance betrays the very reasons rank and file membership of terror groups join, as well as the greater citizenry and governments of their homelands, not to mention putting at risk the long-term welfare of religious doctrine which often guides their nation and political movements. If the people joining terror groups fully understood this, they would behead their leaders as traitors, and rethink their strategies in realization that terrorism is political control weapon being used against their own people as well is those of the target nation(s). Only the Globalists and their proxies in the involved governments and terror groups, can possibly win.
It deserves restating of who benefits, and how: in funding, arming, and aiding in terror attacks against the U.S. and other nations where Globalism runs rampant, the target nation governmentals (and the Globalist movement) gain two things, and the leaders of terror groups gain prestige and power over their own people for their ‘successes,’ and loyalty and devotion in anger evolving out of backlash-sponsored ‘failures.’ The two things the Globalist proxies gain are an empowerment to further restrict freedoms and wax oppressive through legislative response to terror event ‘successes,’ and validating police state mentality by offering minimal proofs of effectiveness at the few terror attack-sponsord ‘failures.’ Perfect quid-quo pro.
So we see that regardless of if a terror even is effective, or fails, there is win-win for the Globalist and their terrorist cohorts, but only loose-loose for citizens and terror participants, who are mere pawns in a grand deceit.
Ergo, in our comparison, Luke 6:43-44 seem quite appropriate; “For a good tree bringeth not forth corrupt fruit; neither doth a corrupt tree bring forth good fruit. For every tree is known by its own fruit. Figs aren’t gathered from thornbushes, or grapes picked from a bramble bush.”
A need to shift gears: homegrown terror
A kind of proof that such terror is artificially generated and outcome is controlled lays in the fact that if it were NOT so, the focus would remain on the foreign sponsored terrorism, and changes or experimentation in solutions would evolve to some eventual gaining of ground. But, if one is intending a Police State, one realizes that eventually, there will be internal resistance and insurrection forces to be dealt with at some point — given that the only solutions applied are repressive to freedom in nature. There is only so far one can go in oppressive reduction of personal freedoms without sparking resistance.
What is domestic state sponsored terrorism?
The answer? Raise the stakes and ‘broaden the war.’
Therefore, almost immediately on the heels of the Truther movement, we here in America started to hear about homegrown terrorism, a thing which caused most of us to respond with ‘???’ And from this has evolved a whole new series of staged events to justify the next waves of repressive acts and moves which, like those for Islamic terror, actually tend to foment and generate the very terrorism they would pretend to combat.
These also served to empower the TSA and other repressive acts designed to train us to be obedient to Police State social controls (and the basest of personal insults and groping to which we dare not protest.) This additionally causes us to realize we need to fear and respect our government, despite the fact that our whole form of government is based on the notion that they should fear displeasure of We, the People. Once we have it upside down in our head, it is easier for them to advance with less meaningful resistance.
But then, they had yet to meet the 99%.
But the general strategy creats self-fulfilling harbingers. To worry about and act to ‘prevent’ or ‘combat’ terrorism will eventually spawn it. At some point, you no longer need false flag or even entrapment provocateurs. Fascists want and need internal civil unrest in order to justify further tightening of their power grip, and the unraveling of and discarding of the Constitution (esp. 2nd Amendment) that they may evolve into a truly Globalist entity. Specifically, in America, as I frequently detail in other posts, the establishment of the NAU; the North American Union. An exact replay of Europe, and why that model was briefly examined.
We see signs this is so by the fact that there are separate non terror-related actions which are preparing for acceptance of Globalist programs which can only function if there is a new Constitution under an NAU construct. Agenda 21, Codex Alimentarius, the CANAMEX Highway, United Nations Small Arms Treaty and other U.N. sponsored mandates such as Biospheres, all clue us in to this fact. Our Constitution and, more directly, the Second Amendment make these things almost impossible under our present form of government. They need Martial Law, suspension of the Constitution, seizure of firearms, and a new Constitution with more leeway.
They are easing us into the mentality of Globalist control by selling us on grandiose benefits which seem lofty, but which are truly unworkable and intended to conceal the truth: total control is not freedom, but slavery, and a one World government sponsored by the New World Order is nothing but a mechanism to seat the Antichrist as World Leader — the whole point of the Satanic Illuminati plan to create the NWO in the first place.
So they push for gun control legislation guaranteed to make more militant the mindset of gun owners. Then we conveniently have a wave of gun violence worthy of sparking demands for gun control, a matter deeply tied psychotropic drugs evolved out of CIA mind control research. I don’t even own a gun and yet they make me want to stockpile weapons and ammunition to protect the Second Amendment from panic-driven, unthinking gun grabbers and their Globalist sponsors.
I can only imagine that militia members are waxing paranoid and actively planning for and training for combat with government or United Nations forces. Eventually, someone from such a group will undertake an act of violence to ‘strike a blow for freedom,’ but it will most likely be a false flag event intended to justify efforts to enact gun confiscation. It will, in point of fact, be labeled as ‘terrorism.’ No right thinking group of gun owners would effect a first strike policy, knowing this would be the result, though a paranoidal schizophrenic individual, may, with entrapment encouragements.
They passed the NDAA and the DOD embarked on reckless and provocative mock raids of American cities in violation of Posse Commitatus to make us fear government to levels that may spark shooting of federal agents, soldiers, or cops in perceived self defense, as examined in an earlier post. Again, if some truly paranoid person does not eventually do so, I fear a false flag series of events will be staged. It is absolutely critical that government be able to vilify gun owners if the NAU is to come to pass, lest there be a full-scale armed revolt.
They passed the Monsanto Protection Act, which protects Monsanto from liability and enables their forcing of dangerous genetically modified crops into the food chain (to include meat supplies since corn and soy are fed to animals as well as to humans). This will most surely make militant a number of the millions of farmers who have sued Monsanto, and tens of millions more who realize GMO foods KILL livestock, cause birth defects or sterility, and even cause hair to grow through the digestive tract from tongue to intestines.
Eventually, again as I have posted earlier in full review, someone will get the idea in their head to act out in a violently against Monsanto, perhaps an arson or a bombing, or worse. When you take away the right of redress through the courts, you guarantee revolt in some violent form. False flag efforts will hardly be needed, IMO, but entrapment encouragements will likely be involved. Fascists NEED such violence to come to power, and once more, they will call it ‘terrorism:’
We must have terror and internal chaos if we are to have a New World Order. In fact, it would seem it is forecast by God to follow a period of great upheaval. 2 Thessalonians 2:3 “Let no man deceive you by any means: for that day shall not come, except there come a falling away first, and that man of sin be revealed, the son of perdition;” In the text of King James, ‘falling away’ means ‘rebellion,’ and the day spoken of is the End Days, the ‘son of perdition’ the Antichrist. Be not deceived by your leaders.
How is terrorism a tool for political control?
In summary, we see the pattern is complete in all instances, following the path of cause and effect which is opposite the model of the Control Group. There is no effort to combat terror, but instead, to generate it. It is a political control technology, a kind of mind control; it generates fear to enable tighter security control at the expense of liberty, generates resentment to foment new terror threats and, thereby, to repeat the cycle even well after any foreign threats might be abated through takeover of their governments (per the PowerPoint).
There is a great falling away taking place in the Muslim World, as they war amongst themselves for radical supremecy. In the non Muslim World, where radical Islam conducts terror strikes, populations loose freedoms which will steadily lead them toward having no other choice but armed revolt. My prior blogs are full of this warning, and show how perilously close it may be right here, in America. But this is a World-wide phenomenon, as the Occupy movement has shown. We are ripe. We have been deceived by a cyclic strategy which brings us ever closer to boil over.
Such cyclic strategy worked in the Middle East flavor, it worked in the European flavor, and the South American flavor, and it will work in the homegrown flavor (if we allow it). Dumbed-down Sheeple comply with little true objection in the false belief it is perfectly logical to so evolve, not realizing, like the frog in pot of water on the stove, that the political control temperature will soon be fatal and leave them with no way to escape a terrible unwanted and unforeseen fate; rule by a totalitarian police state, and even the Antichrist. Got 666? Almost.
In Fatal rebirth, the cover of the first volume expresses it all this way: Terrorism creates Nationalism (obedience and loyalty to government — who’s political leaders benefit from terrorism); Nationalism fosters Capitalism (most notably, the Military-Industrial-Intelligence-Media Complex — who profit from terrorism); Capitalism empowers Globalism — the power elite of the round table groups, the modern Illuminati (who benefit and profit from terrorism); Globalism therefore requires Terrorism — funding it directly, and through their control mechanisms within capitalism, nationalism. In effect, it is nothing more than a cyclic machine, an engine to power control mechanisms, and made up of control mechanisms, cyclic in nature.
I call it the Armageddon Machine. I also call it treason, though that is just the outer shell at the national level. If a shooting war erupts (armed revolt), the shooting should not stop until that machine is destroyed. It will not be a revolution simply to restore the Constitution and reestablish freedom, but to delay or prevent the end of the World as we know it. The modern Illuminati, the Globalists of the World, will be the true enemy, not just some handful of govermentals and their obedient armies. It will be a war with powers and principalities, the truest source and form of terror imaginable.
They exist not just here in our own country, but in other countries, from whence they manipulate and participate in events, here. We will likely have to take that war to them, as well. Any such revolution will need to be enlarged to an internationally scope, or we will never be able to start anew with hope of long success. Emptying Freedom’s lifeboat of Illuminati water has little effect if the satanic hole from which it springs forth is not also plugged.
This is true in every nation. Fascism, the outward manifestation of Globalism, exists in every government to one degree or another. The more affluent and powerful the nation, the more it controls the nation in subversively covert or openly overt ways. It matters not if the country is socialist, communist, democratic, or religiously governed (e.g., Islamic); fascist-globalist mechanisms guide it toward Illuminati goals. As the Occupy movement has illustrated, there is hardly a nation where the people are not starting to awaken to these facts.
The next revolution will undoubtedly spread to be global — especially if it originate in the one nation thought to be ‘most’ free. As America goes, so goes Canada, and Mexico. As America and Canado goes, so goes Britain. As Mexico goes, so goes Central and South America. As Britain goes, so goes the European Community. As they go, so goes the entirety of the former Soviet Bloc. And from there it is only logical that Middle East and Asiatic, and the rest, join in.
Is the war on terrorism fake?
That possibility moves me to employ something from the Prolog of Fatal Rebirth as Epilog, here. Because all men seeking freedom in such a battle will become John Gault in that day. If not, or if John Gault falters and fails, the Antichrist will come to power; we suffer End Game. But if Gault prevails, as in the fictional character’s role in Atlas Shrugged (Ayn Rand), the World will come to a screeching halt on its current course to Hell, and get a second chance, a reprieve, and an extension to our lease on the Planet, though at great cost. From Fatal Rebirth:
Truth cannot live on a diet of secrets, withering within a web of entangled lies. Freedom cannot live on a diet of lies, in the end surrendering to the veil of their oppression. The human spirit cannot live on a diet of oppression, being subservient against the will to that unchecked evil. God, as truth incarnate, will not long let stand a world devoted to such evils. Therefore, let us have the truth and freedom our spirits require… or let us die seeking these things, for without them, we shall surely and justly perish in an evil world.
And yet, in final note for this post, I am also moved to write… as the Bible text indicates, that to so revolt may play directly into their hands. The answer is found in the nature and outcome of any such revolt, especially if Global. The key, I am convinced, is where the revolt starts, when and why, and how it concludes. That, however, will be another blog post. Here, I will simply say this: God has our back, either way — provided we make no foolish mistakes and act without right-use-ness of Free Will (righteousness). Subscribe to learn more.
- Non-Muslims Carried Out More than 90% of All Terrorist Attacks on U.S. Soil ! Jewish & ‘Latino’ Extremists Carried Out Even More Attacks Than Muslims! (socioecohistory.wordpress.com)
- The FBI’s Fake Terror Plots – Judge Napolitano (therebel.org)
- N. Korea EMP Attack Next False Flag per Wag-The-Dog Evidence (proparanoid.wordpress.com)
Sometimes a citizen has to think Boston Tea Party. My time has come. Neither will I be forced into indentured servitude as involuntary tax collector, nor will I allow government to tax the sweat of my brow creating the goods I sell. There is more I will not, as well.
by H. Michael Sweeney
The Senate passed the Marketplace Fairness Bill (Internet Tax)
Just say no!
This is in point of fact sweetheart legislation to benefit Amazon.com and select other firms, though they claim instead that it will benefit local retailers who ‘suffer’ because people can buy goods for less at times on the Web. So what is this, really, a tax on savings? Where do they get the nerve to steal from us yet one more time? And how do they get the nerve to call Federal Price fixing against select businesses the ‘Marketplace Fairness Act.’
If you really want to level the playing field among sellers, pass a law eliminating sales tax that States might join with Alaska, Delaware, Montana, New Hampshire, and Oregon, who have no sales tax. Take Oregon, for instance, where voters must approve any tax, and pay only income tax; NO SALES TAX. Sales tax, especially when citizens have no say over it’s levy, or no, is legalized highway robbery by the taxing authority.
If the Bill passes the House the way the it is currently written, a Web marketer would henceforth be required to collect sales tax for all federal, regional, and local taxing authorities where the purchaser resides. This creates a nightmare of calculations which can only be met by using complex point-of-sale software, software which Amazon.com has already written according to radio commentator and former newsman, Lars Larson. Amazon is the only Web firm pushing for this law, the only Web company with the nerve to charge a 2.9% service fee on tax collection, payable by the third party seller who sells through Amazon.
That’s just one reason I don’t sell anything through Amazon, who has a bad habit of running rough shod over smaller businesses. That is exactly what the tax being forced upon its lesser Web competitors will be doing.
My findings are somewhat different than Larson’s, however. The service fee is correct, but Amazon uses third-party software solutions from a company called Vertex, which is currently the new name for (by acquisition) the old Arthur Anderson Accounting firm… you know… the CIA’s preferred accounting hijinks firm to conceal money laundering from illegal arms sales, drug sales, and terrorist payoffs. See 2002 on the firm’s timeline.
The government says they will give the software away, but do you suppose Amazon (or Vertex) will give it to them, for free? And what about firms like PayPal, where Web transactions are already complicated, and where Amazon/Vertex software will not likely fit nor be well adapted? Important, because a lot of Web marketers work out of simple Web sites which rely exclusively on PayPal for payment transactions, and have no site processing capabilities, even if handed the software, having no means of implementation short of paying someone to re-engineer their Web site.
The Supreme Court has already ruled that you cannot force a business without a physical presence in a State to collect tax for products or services paid for from persons within that State. But Congress is being asked (by Governors of Sales Tax States, naturally) to write such a law, anyway. That’s highwaymen writing laws to make highway robbery legal without even having to visit themselves upon highway travelers. Automatic holdups.
I refuse, thank you
And that notion brings us to the bottom line. Take me. I sell books. Books I wrote and self publish. This is the sweat of my brow and I will not have anyone charge a tax on one when I sell it. Nor will I do the job of tax collectors without being paid for the trouble, and certainly will not pay someone else for the trouble ‘on my behalf.’
You cannot force someone to do a job for free, that is called slavery. So instead of the highwaymen at least confronting the travelers and demanding taxes under threat of punishment, themselves, they instead intend to force others to do so on their behalf, and or to pay a third party (i.e., Amazon/Vertex) for the privelege; this is clearly indentured servitude, and forced contractual agreements with no say so in the terms, thereof.
Hmm… sounds a lot like Obamacare, doesn’t it. Funny, that was called a tax bill, too, once the Supreme Court told them forced contractual obligations were unconstitutional. Making it a tax made it legal, somehow.
Bottom line: If you want me to collect and pay such taxes, use someone’s software or services, or see me pay a sales tax on anything I purchase from another State via the Internet, then bring your guns that you can stand over me at every transaction. Bring lots of bullets, too; say all 1.4 billion of them, because I, and perhaps many others, will probably be forcing you to duck for cover in the effort.
Else go to Hell.
O.K. I’m calmer, now, having got that out of my system. And sure, the law only applies to businesses doing over $1M annually, and that is not (yet), me. But if anyone wishes to place an order for $1M or more in books, I WILL NOT TAX the sale, nor pay such a tax upon demand. That’s my promise… and THERE IS a harbor close enough for me to dump… well… in the absence of any bales of tea… the taxman who cometh. I’d even throw in a Congressman or two for good measure, except I can’t throw them any farther than I trust them.
If a military coupe planner needed an excuse for Martial Law in a hurry, what better way than to EMP the country and blame N. Korea? Such an attack from N. K. is impossible, and yet Sheeple wallow in the wag-the-dog Sheep Dip in a daze.
North Korea EMP Attack Next False Flag per Wag-The-Dog Evidenceby H. Michael Sweeney copyright © 2013, all rights reserved. Permission to repost hereby granted provided entire post with all links in tact, including this paragraph, are included.
How will North Korea attack America?
What you will learn reading this post…
- A review of signs that a false flag EMP nuclear detonation in our atmosphere will be staged;
- A review of what such an event enables and sponsors of value to the NWO traitors;
- What you can do to preempt and deal with consequences if it happens;
- How you can help prevent it from happening.
Is an EMP attack against America possible?
Why I write and you should read…
On April 3rd someone advised me that Google showed there were almost 200,000 Web sites claiming doom and gloom in the form of a North Korean EMP attack on the U.S. While many of these were the usual conspiracy theory resources (some with good reputations, some questionable, and some known disinfo organs such as federaljack.com.), unlike many conspiracy matters, there were also some mainstream news sorces carrying the story.
That, alone, made me sit up, but two days later, it had jumped to over 309,000, and is now nearly 900,000 (Korea + EMP attack.)
Even many mainstream outlets (e.g., Newsmax, Investors Business Daily, Washington Times) normally quite conservative were forecasting the darkest of all possible outcomes, some claiming up to 9 out of 10 Americans would die as result. I smelled, as did the person sending me the information, a big federal disinformation rat. Ever hear of Wag-The-Dog? Remember WMD in Iraq? That was really WTD.
If not, go rent or otherwise watch the Dustin Hofman, Robert De Niro movie with the same name, Wag The Dog. It will give you a hilarious review of EXACTLY what it is, and how it works, in a tongue-in-cheek presentation of real-World disinformation tactics employed by the Military-Industrial-Intelligence-Media complex. It’s all about manipulating people so they won’t question government crimes.
This EMP attack story is particularly disconcerting because it smacks of portending a false flag attack by our own government for reasons explained herein. Shades of the hit TV series Revolution, in fact, where there is sudden loss of power and political chaos results, almost as if the TV show was to prep us for what is to come that we might be easier to subdue in appreciation to military ‘rescue.’
What is an EMP attack?
What is an EMP attack?
When a nuclear bomb is set off, huge bursts of radiation of all manner are released in an unstoppable flood. Everything from heat and light to atomic radiation. Normally such bombs are used for their physical destruction capability, eviscerating a core area and causing blast and fire damage over a much broader area, and radioactively poisoning and rendering unsafe an even greater area. But there is another, more tactical use.
It is widely known but little spoken of, untill late (wag-the-dog tactic: foster massive dialogs in support of false story point), that if such a device is detonated high in the atmosphere over an enemy territory, the sudden burst of gamma rays creates a massive electromagnetic pulse (EMP.) So massive, in fact, that it destroys or interferes with most anything electronic. Motors, generators, and many digital and non digital components are, in fact, destroyed if in operation at the time, and some items will be harmed even if not in use, unless sufficiently shielded. The entire power grid would, in fact, fail and be extremely difficult to repair for a long, long time.
The result in such an attack on a modern society is total and instantaneous transportation into the Stone Age (more correctly, perhaps, the 18th Century, the agricultural age). But given that modern societies have no infrastructures in place which rely upon 18th Century technology, it might as well be the Stone Age. The ONLY defense against EMP attacks is to destroy the warhead in flight to destination, one of the reasons America has stubbornly tried to develop anti-ballistic missile systems since the time of Reagan and, truth be known, before.
But I note that wag-the-dog disinformation tends not to mention this factuality. Better if we think we are defenseless, where the only benefit to such a belief exists if one intends a false flag event.
Note: most of what is written from this point forward is covered, along with other related topics, in great detail in my four volume book set, Fatal Rebirth, including copies of the Constitutions mentioned below, with analysis. Want a free ebook of volume one? The book literally predicted 9-11 and resulting Middle East wars, and much, much more. It also predicted false flag attacks would be used to justify the Martial Law and subsequent events discussed herein, and what can be done about it.
What is a false flag event?
The nature of False Flag attacks
When a country wishes to start a war or enact some terribly repressive changes in political/governmental paradigms, it is historically common to stage a fake attack by some designated group or country as fall-guy. The people become enraged and demand retaliation, enabling a war, and wax super-patriotic and tolerant of any losses of freedoms or dramatic shifts in the structure of government to ‘better assure victory.’ Wag-the-dog rhetoric is required well before the event to paint the would-be source of the attack as a very dangerous opponent, vile and full of unchecked hatred — but the real purpose is to build fear and hatred of the ‘enemy.’
Internationally, the country employing false flag is seen as innocent victim, and may bash away at their new enemy freely, perhaps even recruiting ally nations. In some cases, even the people in the target country think their own country guilty as charged, which can foster an underground or more overt revolt which further helps assure victory. Only their leaders know the truth, but who will believe their claims?
Not very many beyond the most loyal, not many that count. Wag-the-dog efforts must, therefore, include ‘evidences’ after the fact, but one clue is that such evidences may seem just a little too convenient and quick to be located — such as the old reliable and oft used ‘found wallet’ belonging to the terrorits. Sheeple really are stupid to fall for that time and again. It has been used about six times, now.
All that is required is to stage a single, large-scale or politically sensitive event (e.g., assassination), or several smaller events which can be tied together at the desired time, all ‘evidence’ pointing to the same (false) source, also a job for the wag-the-dog folks. Hitler used the Reichstag Fire, burning of the beloved national library and many rare books, which was blamed on the Communists to justify changes in governmental structure which altered Germany from a Republic to a one-man show controlled by the fascist Nazi party. It launched the World down the path to WWII.
How can you spot false flag events?
Detecting false flag operations
The Truther movement can offer a great deal of evidence that Sept. 11 was such an operation, and in fact, as I will offer in another post (and detail in Fatal Rebirth), most, if not all, terrorism against America and elsewhere, is demonstrably false flag in nature. All that is needed to establish or illustrate a false flag event is to use one’s brain in review of the basic facts, which, of course, Sheeple don’t know how to do because they’ve been dumbed down by psyops TV programming technology, rich with wag-the-dog. False flags look like this:
a) there is an abundance of early, pre-event wag-the-dog negative media coverage painting the bad guys as evil and out of control, building them up as a huge threat — perhaps even a specific threat;
(e.g. pre 9-11, Osama bin Laden was not exactly a household word, not even amongst the many radical Muslim terror groups, but he had an excellent PR firm, called CIA, who was fond of trotting out videos of him making threats, and listing him as prime suspect in prior attacks — while a CIA station chief pays him a visit in a Saudi hospital.)
b) the event takes place and immediate evidence is produced;
(e.g., within mere hours of 9-11, a terrorist’s wallet was found ‘laying in the street amid debris’, and other evidence sufficient to allow President Bush to provide the full names of all 19 alleged participants.)
c) the official story and available facts conflict, often in spades;
(e.g. 9-11 hijack flight passengers used cell phones to call relatives; cell phones did not work in flight in those days)
d) it contains nonsensical or illogical, impossible facts, or ‘magic bullet’ explanations;
(e.g. the nose of the South Tower plane passes completely through the building in tact, but nothing larger than a shard is found of it on the ground — no plane blown up by missile, by bomb, or fuel tank explosion has ever had the nose section destroyed so utterly, large sections of it should have been found.)
e) there are signs of a cover up regarding evidence: vanishing, altering, or manufacturing of evidence;
(e.g. Flight 993 cratered into a field, again with only shards remaining, and yet the crater is shown by earlier satellite images to have existed as a geographic feature well before 9-11. No FAA investigations looking at serial numbers of parts, either.)
f) there is a wag-the-dog disinformation effort evident; a cover up;
(e.g., American media refused to report what international media had already reported: that the date of the Afghan invasion was set, and allie